2 Web Scraping 2 Web Scraping

2.1 Sandvig v. Sessions 2.1 Sandvig v. Sessions

Sandvig v. Sessions

UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA

CHRISTIAN W. SANDVIG, et al.,
Plaintiffs,
v.
JEFFERSON B. SESSIONS III,
in his official capacity as Attorney General of the United States,
Defendant.

Civil Action No. 16-1368 (JDB)
March 30, 2018

MEMORANDUM OPINION

It’s a dangerous business, reading the fine print. Nearly every website we visit features Terms of Service (“ToS”), those endless lists of dos and don’ts conjured up by lawyers to govern our conduct in cyberspace. They normally remain a perpetual click away at the bottom of every web page, or quickly scrolled past as we check the box stating that we agree to them. But to knowingly violate some of those terms, the Department of Justice tells us, could get one thrown in jail. This reading of federal law is a boon to prosecutors hoping to deter cybercrime. Yet it also creates a dilemma for those with more benign intentions. Plaintiffs in this case, for instance, are researchers who wish to find out whether websites engage in discrimination, but who have to violate certain ToS to do so. They have challenged the statute that they allege criminalizes their conduct, saying that it violates their free speech, petition, and due process rights. First, however, they must show that they have a sufficient injury to make it through the courthouse door, and that their suit is plausible enough to continue. For the following reasons, the Court finds that plaintiffs have standing, and that they can bring one (but not the rest) of their claims.

I. BACKGROUND

This case centers on a few sections of the Computer Fraud and Abuse Act (CFAA), a law dedicated to “deterring the criminal element from abusing computer technology.” H.R. Rep. No. 98–894, at 4 (1984). Plaintiffs directly challenge one section, referred to here as the Access Provision, which sweeps in the greatest amount of conduct. The Access Provision states that “[w]hoever . . . intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . information from any protected computer . . . shall be punished as provided in subsection (c) of this section.” 18 U.S.C. § 1030(a)(2)(C). The CFAA defines “protected computer” to mean, among other things, “a computer . . . which is used in or affecting interstate or foreign commerce or communication.” Id. § 1030(e)(2)(B). This definition encompasses just about all computers hooked up to the Internet—including computers that house website servers. See, e.g., United States v. Nosal, 676 F.3d 854, 859 (9th Cir. 2012). The statute also defines “exceeds authorized access” as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). Thus, the Access Provision applies to anyone who purposely accesses an Internet-connected computer without authorization, or uses a legitimate authorization to receive or change information that they are not supposed to, and thereby obtains information from the computer.

The CFAA provides for a fine and/or imprisonment for up to one year upon a first violation of the Access Provision, or up to ten years for any further offenses. Id. § 1030(c)(2)(A), (C). However, the punishment for an initial violation rises to a sentence of up to five years’ imprisonment if the offense (1) “was committed for purposes of commercial advantage or private financial gain,” (2) was “in furtherance of any criminal or tortious act in violation of the Constitution” or state or federal law, or (3) involved obtaining information valued at more than $5,000. Id. § 1030(c)(2)(B). Thus, meeting one of these three conditions makes a first violation a felony; if none are met, the first violation is a misdemeanor.

Plaintiffs in this case are four professors and a media organization: Christian W. Sandvig of the University of Michigan; Kyratso “Karrie” Karahalios of the University of Illinois; Alan Mislove of Northeastern University; Christopher “Christo” Wilson of Northeastern University; and First Look Media Works, Inc. (“Media Works”), which publishes the online news platform The Intercept. Compl. [ECF No. 1] ¶¶ 13–14, 16–17, 19. Plaintiffs are conducting studies to respond to new trends in real estate, finance, and employment transactions, which increasingly have been initiated on the Internet. Id. ¶¶ 15, 18, 55. Data brokers assemble consumers’ information from myriad sources and place consumers into models that include racial, ethnic, socioeconomic, gender, and religious inferences about them. Id. ¶¶ 56–57. After brokers create consumer profiles, those profiles follow consumers around online through tracking technologies such as cookies. Id. ¶¶ 58–59. Tracking allows websites and advertisers to display content targeted at particular groups, based on consumers’ inferred characteristics or the sorts of websites they visit. Id. ¶¶ 59–60. But plaintiffs are concerned, “[g]iven the . . . history of racial discrimination in housing and employment,” that this technology may be “harnessed for discriminatory purposes.” Id. ¶ 61. They are also concerned that, “when algorithms automate decisions, there is a very real risk that those decisions will unintentionally have a prohibited discriminatory effect.” Id. ¶ 62.

One way to determine whether members of protected classes are being discriminated against is to engage in “outcomes-based audit testing.” Id. ¶ 67. Such testing commonly involves accessing a website or other network service repeatedly, generally by creating false or artificial user profiles, to see how websites respond to users who display characteristics attributed to certain races, genders, or other classes. Id. ¶ 70. This method is similar to classical paired testing procedures, in which multiple people—identical but for one legally protected trait—apply for the same house or job. Such procedures are often used to uncover violations of housing and employment discrimination laws in the physical world. Id. ¶¶ 41, 50, 52.

Plaintiffs plan to engage, and are engaging, in such audit testing. Sandvig and Karahalios are investigating whether computer programs that decide what to display on real estate websites discriminate against users based on race or other factors. Id. ¶ 82. They are writing a computer program that will create bots—automated agents that will each browse the Internet and interact with websites as a human user might. Id. ¶ 88. Each bot will create a number of distinct user profiles, each of which is called a “sock puppet.” Id. ¶ 89. Sandvig and Karahalios will program the bots to visit real estate websites and search for properties, while also engaging in behaviors correlated with members of a particular race. Id. ¶¶ 90–91. Sandvig and Karahalios will use an automatic data recording technique known as scraping to record the properties that each bot sees on the real estate sites. Id. ¶¶ 90, 92. They can then examine their data to determine whether race- associated behaviors caused the sock puppets to see different sets of properties. Id. ¶ 93.

Similarly, Mislove and Wilson plan to conduct a study to see whether hiring websites’ algorithms end up discriminating against job seekers based on protected statuses like race or gender. Id. ¶ 107. They will first use bots to crawl the profiles of a random selection of job- seekers to obtain baseline demographic data, then create fake employer profiles so that they can search for candidates and record how the algorithms rank those candidates.[FN1] Id. ¶¶ 114–17. They will also create fictitious sock-puppet job seeker profiles, and have the fictitious seekers—who will vary along different demographic axes—apply for fictitious jobs, to examine how the algorithms rank the candidates. Id. ¶¶ 118–19, 121–22. Mislove and Wilson will prevent real people from applying for the false jobs by giving them titles that say “[t]his is not a real job, do not apply,” and will delete the fictitious accounts and jobs when they finish. Id. ¶ 120.

Media Works and its journalists seek to investigate online companies, websites, and platforms, including by examining any discriminatory effects of their use of algorithms. Id. ¶ 130.

Mislove and Wilson plan to publish their findings in academic papers, and to bring the results of their research to the public. Id. ¶ 123. Media Works intends to use the results of its journalistic investigations to inform the public about online business practices. Id. ¶ 132. Sandvig and Karahalios do not explicitly claim that they will publish their work, but state that their findings “would produce important new scientific knowledge about the operation of computer systems, discrimination, and cumulative disadvantage.” Id. ¶ 94.

Plaintiffs are all aware that their activities will violate certain website ToS. Id. ¶¶ 95, 124, 131. All intend to use scraping to record data, which is banned by many of the websites plaintiffs seek to study. Id.; see id. ¶¶ 70–71. Many of the housing websites that Sandvig and Karahalios will study prohibit the use of bots. Id. ¶¶ 71, 95. All of the hiring websites that Mislove and Wilson will study prohibit the use of sock puppets, and most prohibit crawling. Id. ¶¶ 71, 124. Additionally, some websites control when and how visitors may speak about any information gained through the site—even in other forums—by including non-disparagement clauses in their ToS. Id. ¶ 72. Some sites also have ToS that require advance permission before using the sites for research purposes, which, plaintiffs allege, creates the possibility of viewpoint-discriminatory permission schemes. Id. ¶ 73. Aside from their ToS violations, plaintiffs’ experiments will have at most a minimal impact on the operations of the target websites. Id. ¶¶ 96, 125. All plaintiffs but Media Works have already begun some of the activities involved in their research plans, including activities that require violating websites’ TOS. Id. ¶¶ 98, 126.

Plaintiffs claim that they must either refrain from conducting research, testing, and investigations that (they argue) constitute protected speech or expressive activity, or else expose themselves to the risk of prosecution under the Access Provision of the CFAA. Id. ¶ 137. Plaintiffs therefore filed this suit against the Attorney General, raising four causes of action: (1) a facial overbreadth and as-applied challenge under the Free Speech and Free Press Clauses of the First Amendment, id. ¶¶ 180–86; (2) a First Amendment Petition Clause challenge, ¶¶ 187–93; (3) a vagueness claim under the Fifth Amendment’s Due Process Clause, id. ¶¶ 194–98; and (4) a claim of unconstitutional delegation to private parties under the Fifth Amendment, id. ¶¶ 199–202. The government has moved to dismiss under Federal Rules of Civil Procedure 12(b)(1) and 12(b)(6) for lack of standing and failure to state a claim. See Mot. to Dismiss [ECF No. 10].

II. DISCUSSION

We begin with the familiar standards that govern Rule 12(b) analysis. When facing a Rule 12(b)(1) motion to dismiss for lack of subject-matter jurisdiction, a plaintiff “bears the burden of showing that he has standing.” Summers v. Earth Island Inst., 555 U.S. 488, 493 (2009). Just because a plaintiff makes it through the courthouse doors on one claim does not mean that other claims can tag along; rather, a plaintiff “must demonstrate standing for each claim he seeks to press and for each form of relief that is sought.” Town of Chester v. Laroe Estates, Inc., 137 S. Ct. 1645, 1650 (2017) (citation omitted). On a motion to dismiss, plaintiffs must plead facts that, taken as true, raise a plausible standing claim. See Humane Soc’y of the U.S. v. Vilsack, 797 F.3d 4, 8 (D.C. Cir. 2015). The Court must take all facts alleged in the complaint as true and make all reasonable inferences in plaintiffs’ favor. See Gulf Coast Mar. Supply, Inc. v. United States, 867 F.3d 123, 128 (D.C. Cir. 2017). However, the Court “may consider materials outside the pleadings in deciding whether to grant a motion to dismiss for lack of jurisdiction.” Id.

To survive a motion to dismiss for failure to state a claim under Rule 12(b)(6), a complaint must “contain sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007)). Plausibility does not mean certainty, or that a claim is more likely to succeed than not, but rather that the claim at issue rises “above the speculative level.” Twombly, 550 U.S. at 555. In other words: if what plaintiffs lay out in the complaint actually happened, is it more than merely possible that the law has been violated? Plaintiffs cannot meet this standard through “[t]hreadbare recitals of the elements of a cause of action, supported by mere conclusory statements.” Iqbal, 556 U.S. at 678. Likewise, a court need not accept a plaintiff’s legal conclusions, even if they are dressed up as factual allegations. See Sickle v. Torres Advanced Enter. Sols., LLC, 884 F.3d 338, 345 (D.C. Cir. 2018). However, courts must accept as true all facts stated in the complaint, making all reasonable inferences in plaintiffs’ favor. Id.

A. THE INTERNET AS PUBLIC FORUM

At the outset, it is necessary to answer a question that affects both the standing and the merits inquiries in this case: what is the First Amendment status of the Internet? And, more particularly, what powers does the government possess to regulate activity on individual websites?

The government bases much of its argument that plaintiffs do not have standing, and that they have not alleged a First Amendment violation, on the premise that this case is about “a private actor’s abridgment of free expression in a private forum.” Reply in Supp. of Def.’s Mot. to Dismiss (“Def.’s Reply”) [ECF No. 15] at 2; see Mem. of P. & A. in Supp. of Def.’s Mot. to Dismiss (“Def.’s Mem.”) [ECF No. 10-1] at 10–13, 22–24. This argument finds some support in Supreme Court case law, which has rejected the First Amendment claims of individuals who wished to distribute handbills or advertise a strike in shopping centers against the wishes of the property owners. See Hudgens v. NLRB, 424 U.S. 507, 520 (1976); Lloyd Corp. v. Tanner, 407 U.S. 551, 567–68 (1972). Private property, the Court determined, does not “lose its private character merely because the public is generally invited to use it for designated purposes.” Lloyd, 407 U.S. at 569. Why, then, would it violate the First Amendment to arrest those who engage in expressive activity on a privately owned website against the owner’s wishes?

The answer is that, quite simply, the Internet is different. The Internet is a “dynamic, multifaceted category of communication” that “includes not only traditional print and news services, but also audio, video, and still images, as well as interactive, real-time dialogue.” Reno v. Am. Civil Liberties Union, 521 U.S. 844, 870 (1997). Indeed, “the content on the Internet is as diverse as human thought.” Id. (citation omitted). Only last Term, the Supreme Court emphatically declared the Internet a primary location for First Amendment activity: “While in the past there may have been difficulty in identifying the most important places (in a spatial sense) for the exchange of views, today the answer is clear. It is cyberspace . . . .” Packingham v. North Carolina, 137 S. Ct. 1730, 1735 (2017) (citation omitted).

With this special status comes special First Amendment protection. The Packingham Court applied public forum analysis to a North Carolina law that banned former sex offenders from using social media websites, employing intermediate scrutiny because the law was content-neutral. See id. at 1736. The fact that the statute restricted access to particular websites, run by private companies, did not change the calculus. Consider: on one of the sites the Court treated as an exemplar of social media, LinkedIn, “users can look for work, advertise for employees, or review tips on entrepreneurship,” id. at 1735—the same activities in which Mislove and Wilson wish to engage for their research. As the Court warned, the judiciary “must exercise extreme caution before suggesting that the First Amendment provides scant protection for access to vast networks in [the modern Internet].” Id. at 1736. The government’s proposed public/private ownership distinction cannot account for the Court’s determination in Packingham that privately-owned sites like Facebook, LinkedIn, and Twitter are part of a public forum, government regulation of which is subject to heightened First Amendment scrutiny. The Internet “is a forum more in a metaphysical than in a spatial or geographic sense, but the same principles are applicable.” Rosenberger v. Rector & Visitors of Univ. of Virginia, 515 U.S. 819, 830 (1995).

An analogy to the real world, while necessarily imperfect, may help illustrate the point. Stroll out onto the National Mall on any day with decent weather and you will discover a phalanx of food trucks lining the streets. Those food trucks are privately owned businesses. Customers interact with them for the private purpose of buying a meal. If they were a brick-and-mortar store on private property, they would encounter no First Amendment barrier to removing a patron who created a ruckus. Yet if a customer standing on a public sidewalk tastes her food and then yells at those in line behind her that they should avail themselves of the myriad other culinary options nearby, the truck could not call the police to arrest her for her comments. She is in a public forum, and her speech remains protected even when she interacts with a private business located within that forum.

It makes good sense to treat the Internet in this manner. “Each medium of expression . . . must be assessed for First Amendment purposes by standards suited to it, for each may present its own problems.” Se. Promotions, Ltd. v. Conrad, 420 U.S. 546, 557 (1975). Regulation of the Internet presents serious line-drawing problems that the public/private distinction in physical space does not. The decisions in Lloyd and Hudgens concerned “property privately owned and used nondiscriminatorily for private purposes only.” Lloyd, 407 U.S. at 568. It is difficult to argue that most websites readily meet this description. As the Supreme Court has recognized, the Internet “provides relatively unlimited, low-cost capacity for communication of all kinds.” Reno, 521 U.S. at 870. Much of this communication takes place on websites that, in the physical world, would be seen solely as private, commercial spaces. Take Amazon.com. As a “popular retail website,” Amazon undoubtedly has a private use “as a seller of products.” Packingham, 137 S. Ct. at 1741 (Alito, J., concurring in the judgment). Yet the site also “facilitates the social introduction of people for the purpose of information exchanges,” since it “allows a user to create a personal profile” and, “[w]hen someone purchases a product on Amazon, the purchaser can review the product and upload photographs, and other buyers can then respond to the review.” Id. Conversely, Facebook—to which the Court pointed in Packingham as a quintessential site for protected First Amendment activity—allows users to buy and sell products in its Marketplace, and, like many social media sites, sells ads to make revenue.[FN2] Simply put: the public Internet is too heavily suffused with First Amendment activity, and what might otherwise be deemed private spaces are too blurred with expressive spaces, to sustain a direct parallel to the physical world.

At the same time, however, it would be ill-advised to “equate the entirety of the [I]nternet with public streets and parks.” Id. at 1738 (emphasis added). To do so would “gloss[] over the dual public and private nature of digital arenas,” and subject to heightened scrutiny regulations on even the Internet’s most secluded nooks and crannies. Note, First Amendment-Freedom of Speech-Public Forum Doctrine-Packingham v. North Carolina, 131 Harv. L. Rev. 233, 238 (2017). Rifling through a business’s confidential files is no less a trespass merely because those files are located in the cloud. A hacker cannot legally break into a Gmail account and copy the account-holder’s emails, just as a busybody cannot legally reach into someone else’s mailbox and open her mail. The First Amendment does not give someone the right to breach a paywall on a news website any more than it gives someone the right to steal a newspaper.

What separates these examples from the social media sites in Packingham is that the owners of the information at issue have taken real steps to limit who can access it. But simply placing contractual conditions on accounts that anyone can create, as social media and many other sites do, does not remove a website from the First Amendment protections of the public Internet. If it did, then Packingham—which examined a law that limited access to websites that require user accounts for full functionality—would have come out the other way. 137 S. Ct. at 1737; see also Orin S. Kerr, Cybercrime’s Scope: Interpreting “Access” and “Authorization” in Computer Misuse Statutes, 78 N.Y.U. L. Rev. 1596, 1658 (2003) (“Applying a contract-based theory of authorization in a criminal context . . . may be constitutionally overbroad, criminalizing a great deal beyond core criminal conduct, including acts protected by the First Amendment.”). Rather, only code-based restrictions, which “carve[] out a virtual private space within the website or service that requires proper authentication to gain access,” remove those protected portions of a site from the public forum. Orin S. Kerr, Essay, Norms of Computer Trespass, 116 Colum. L. Rev. 1143, 1171 (2016). Stealing another’s credentials, or breaching a site’s security to evade a code-based restriction, therefore remains unprotected by the First Amendment.

To return to the National Mall example, suppose that a food truck remains stationed on the Mall but boards up for the night, and the owner returns home. By shutting the food in a truck, perhaps along with her cooking instructions, the owner has placed a barrier between that property and the public forum outside. Thus, while the police could not arrest a customer for telling others in line that the food tastes terrible, or for reading the menu on the truck’s exterior, they could arrest

that customer for breaking into the boarded-up truck seeking confidential culinary information. This is true even if the customer claimed she was doing so in order to broadcast to the world the truck’s substandard ingredients and ill-conceived recipes. While the First Amendment has free rein on the Mall generally, it does not protect those who circumvent barriers that demarcate private areas, even if those private areas are surrounded by an otherwise public forum. This distinction guides the Court’s analysis here.

B. STANDING

Before reaching the merits of plaintiffs’ claims, the Court must assure itself that they have standing—a sufficient stake to transform this dispute into one of the “Cases” or “Controversies” on which federal courts may pass judgment. U.S. Const. art. III, § 2. “The ‘irreducible constitutional minimum of standing contains three elements’: (1) injury-in-fact, (2) causation, and (3) redressability.” Rainbow/PUSH Coal. v. FCC, 330 F.3d 539, 542 (D.C. Cir. 2003) (quoting Lujan v. Defs. of Wildlife, 504 U.S. 555, 560 (1992)). Plaintiffs must plead or prove each element of standing “with the manner and degree of evidence required at the successive stages of the litigation.” Lujan, 504 U.S. at 561. Here, therefore, “general factual allegations of injury resulting from the defendant’s conduct may suffice” to allege standing, “for on a motion to dismiss we ‘presum[e] that general allegations embrace those specific facts that are necessary to support the claim.’” Id. (alteration in original) (citation omitted). For any given claim or form of relief, “the presence of one party with standing is sufficient” to reach the issue. Rumsfeld v. Forum for Acad. & Institutional Rights, Inc., 547 U.S. 47, 53 n.2 (2006).

Because this is a pre-enforcement challenge, plaintiffs must meet more specific conditions to satisfy the injury-in-fact requirement. They must plausibly allege “an intention to engage in a course of conduct [1] arguably affected with a constitutional interest, but [2] proscribed by a statute, and [3] [that] there exists a credible threat of prosecution thereunder.” Susan B. Anthony List v. Driehaus, 134 S. Ct. 2334, 2342 (2014) (quoting Babbitt v. United Farm Workers Nat’l Union, 442 U.S. 289, 298 (1979)). The government argues that plaintiffs cannot meet this test. See Def.’s Mem. at 8–19. Plaintiffs contend that they do intend to engage in constitutionally protected speech, and that they have pled a credible threat of prosecution. See Pls.’ Mem. of P. & A. in Opp’n to Def.’s Mot. to Dismiss (“Pls.’ Mem.”) [ECF No. 13] at 18–30. It is clear that any injury to plaintiffs is caused by the government’s criminalization of websites’ ToS, and that the declaratory and injunctive relief plaintiffs seek, see Compl. at 46–47, would redress the injury. Therefore, the question is whether plaintiffs allege a sufficient injury in the first place.

Generally speaking, a court’s standing analysis must be “especially rigorous when reaching the merits of the dispute would force us to decide whether an action taken by one of the other two branches of the Federal Government was unconstitutional.” Raines v. Byrd, 521 U.S. 811, 819– 20 (1997). However, the D.C. Circuit has interpreted the Supreme Court’s pre-enforcement standing doctrine broadly in the First Amendment sphere. Indeed, “the courts have shown special solicitude to pre-enforcement challenges brought under the First Amendment.” N.Y. Republican State Comm. v. SEC, 799 F.3d 1126, 1135 (D.C. Cir. 2015). Therefore, the Circuit has found, “the courts’ willingness to permit pre-enforcement review is ‘at its peak’ when claims are rooted in the First Amendment.” Id. at 1135 (citation omitted). “Pre-enforcement review, particularly in the First Amendment context, does not require plaintiffs to allege that they ‘will in fact’ violate the regulation in order to demonstrate an injury.” U.S. Telecom Ass’n v. FCC, 825 F.3d 674, 739 (D.C. Cir. 2016) (quoting Driehaus, 134 S. Ct. at 2345), reh’g en banc denied, 855 F.3d 381 (D.C. Cir.), cert. docketed, No. 17-504 (U.S. Oct. 3, 2017). Nor need they show that they are likely to be prosecuted. Rather, “[s]tanding ‘to challenge laws burdening expressive rights requires only a credible statement by the plaintiff of intent to commit violative acts and a conventional background expectation that the government will enforce the law.’” Id. (quoting Act Now to Stop War & End Racism Coal. v. District of Columbia (ANSWER I), 589 F.3d 433, 435 (D.C. Cir. 2009)).

1. “Arguably Affected With a Constitutional Interest”

Plaintiffs assert that their conduct falls within three categories of First Amendment- protected activity. Scraping data from their target websites, they allege, is subject to the First Amendment right to record or preserve information. Pls.’ Mem. at 10–14. Moreover, employing bots and sock puppets and creating false user accounts constitute harmless false speech. Id. at 14– 17. And their planned post-research activities are protected by the right to publish. Id. at 17–18. All of these claims are sufficiently plausible to conclude that plaintiffs’ proposed conduct is “arguably affected with a constitutional interest.” Driehaus, 134 S. Ct. at 2342.

First, scraping plausibly falls within the ambit of the First Amendment. “[T]he First Amendment goes beyond protection of the press and the self-expression of individuals to prohibit government from limiting the stock of information from which members of the public may draw.” First Nat. Bank of Boston v. Bellotti, 435 U.S. 765, 783 (1978). The Supreme Court has made a number of recent statements that give full First Amendment application to the gathering and creation of information.[FN3] Additionally, six courts of appeals have found that individuals have a First Amendment right to record at least some matters of public interest, in order to preserve and disseminate ideas.[FN4] That plaintiffs wish to scrape data from websites rather than manually record information does not change the analysis. Scraping is merely a technological advance that makes information collection easier; it is not meaningfully different from using a tape recorder instead of taking written notes, or using the panorama function on a smartphone instead of taking a series of photos from different positions. And, as already discussed, the information plaintiffs seek is located in a public forum. Hence, plaintiffs’ attempts to record the contents of public websites for research purposes are arguably affected with a First Amendment interest.

Second, plaintiffs have a First Amendment interest in harmlessly misrepresenting their identities to target websites. The complaint alleges that plaintiffs’ research requires them to create false employer and job-seeker profiles on employment websites, and to use sock puppets to make it appear to a number of housing and employment sites that multiple people are accessing the information they have made available. Compl. ¶¶ 88–93, 114–21. Because “some false statements are inevitable if there is to be an open and vigorous expression of views in public and private conversation,” and because “[t]he Government has not demonstrated that false statements generally should constitute a new category of unprotected speech,” false claims that are not “made to effect a fraud or secure moneys or other valuable considerations” fall within First Amendment protection. United States v. Alvarez, 567 U.S. 709, 718, 722–23 (2012). Plaintiffs allege that their conduct will cause minimal, if any, harm to the targeted websites, and that they will take steps to avoid affecting third-party users of the website (such as informing job seekers that their fake positions are fake). Compl. ¶¶ 96, 120, 125. Thus, plaintiffs’ harmless false or misleading speech to website owners is arguably affected with a constitutional interest.[FN5]

Third, plaintiffs contend that they have the right, and the desire, to publish the results of their research, and that some sites’ ToS prohibit them from doing so without prior permission or else employ anti-disparagement clauses. Pls.’ Mem. at 17. The Supreme Court has made very clear that the right to publish falls within the core of the First Amendment’s protections. See, e.g., Bartnicki v. Vopper, 532 U.S. 514, 527 (2001) (“As a general matter, ‘state action to punish the publication of truthful information seldom can satisfy constitutional standards.’” (quoting Smith v. Daily Mail Publishing Co., 443 U.S. 97, 102 (1979)). Applying criminal sanctions for publishing original material that uses publicly available information, or for making negative statements about a website, triggers First Amendment scrutiny.

The government raises two overarching objections to all of these alleged rights. It initially claims that the First Amendment does not regulate the decisions that private entities make about how to control access to their private websites—in other words, that there is no state action here. See Def.’s Mem. at 21–24; Def.’s Reply at 6–12; see also Columbia Broad. Sys., Inc. v. Democratic Nat. Comm., 412 U.S. 94, 114 (1973) (“[The First Amendment] is a restraint on government action, not that of private persons.”). However, private speech prohibitions can still implicate the First Amendment when given the imprimatur of state protection through civil or criminal law. See, e.g., New York Times Co. v. Sullivan, 376 U.S. 254, 265 (1964). Moreover, plaintiffs claim injury from a potential criminal action against them—and “a criminal prosecution under the CFAA would undoubtedly constitute state action” because the government itself is policing website ToS violations. hiQ Labs, Inc. v. LinkedIn Corp., 273 F. Supp. 3d 1099, 1114 n.12 (N.D. Cal. Aug. 14, 2017), appeal docketed, No. 17-16783 (9th Cir. Sept. 6, 2017).

The government also claims that the First Amendment does not protect plaintiffs’ conduct because, under Zemel v. Rusk, 381 U.S. 1, 16–17 (1965), and Houchins v. KQED, Inc., 438 U.S. 1, 10–11 (1978) (plurality opinion), the First Amendment does not create a right to acquire information in whatever manner one desires. Def.’s Mem. at 10–12. In Zemel, the Court held that the government did not implicate any First Amendment rights by refusing to issue the plaintiff a passport to visit Cuba, which the plaintiff claimed interfered with his ability to acquaint himself with the effects of the government’s policies in relation to Cuba. 381 U.S. at 16. The Court rejected the claim, stating that “[t]he right to speak and publish does not carry with it the unrestrained right to gather information.” Id. at 17. Then, in Houchins, the Court held that journalists had no special First Amendment right to access inmates in a jail just because they sought to write stories about the jail; the Court rejected the “notion that the First Amendment confers a right of access to news sources.” 438 U.S. at 11. However, the Court did note that “[t]he right to receive ideas and information is not the issue in this case,” and that “[t]he issue is a claimed special privilege of access.” Id. at 12. Thus, “[t]here is an undoubted right to gather news ‘from any source by means within the law,’” but the First Amendment does not “compel[] others—private persons or governments—to supply information.” Id. at 11.

Here, plaintiffs are not asking the Court to force private websites to provide them with information that others cannot get. Instead, they seek only to prevent the government from prosecuting them for obtaining or using information that the general public can access—though they wish to do so in a manner that could have private consequences, such as a website banning them or deleting their accounts. See Compl. ¶ 4 (“[Plaintiffs] have no intent . . . to access any data or information that is not made available to the public.”). Because plaintiffs neither want a special privilege of access nor seek to force websites to give them otherwise unobtainable information, the Zemel and Houchins line of cases is inapposite here. Plaintiffs therefore plausibly allege that their conduct is arguably affected with a constitutional interest.

2. “Proscribed by a Statute”

Under D.C. Circuit precedent, “at the motion to dismiss stage, a plaintiff’s non-frivolous contention regarding the meaning of a statute must be taken as correct for purposes of standing.” Info. Handling Servs., Inc. v. Def. Automated Printing Servs., 338 F.3d 1024, 1030 (D.C. Cir. 2003). Because plaintiffs’ reading of the statute to encompass all ToS violations is not frivolous, and because plaintiffs allege that their conduct would violate websites’ ToS, it is clear for standing purposes that their intended actions would violate the statute.

The government contests this conclusion in only one instance. In two sentences in its reply brief, the government claims that plaintiffs lack standing for any injuries relating to their ability to publish. As the government sees it, “[t]he Complaint contains no allegation that any website on which plaintiffs intend to conduct their activity contains” a restriction on future publication, “and plaintiffs lack standing to assert claims based on hypothetical circumstances.” Def.’s Reply at 12.

This argument is unavailing. True, plaintiffs do not explicitly allege that their target websites restrict subsequent publication. But the complaint does allege that “[p]laintiffs wish to . . . report on their findings to the public,” and that “[t]he research, testing, and investigative methods they have designed would, if carried out, violate the [Access] Provision, because they all require violating the [ToS] of the targeted website.” Compl. ¶¶ 134–35 (emphasis added); see also id. ¶ 160 (“Plaintiffs wish to have the option of publishing the results of their research, including any findings of discrimination, even if a target website’s ToS prohibit doing so.”). “[O]n a motion to dismiss we presum[e] that general allegations embrace those specific facts that are necessary to support the claim.” Food & Water Watch, Inc. v. Vilsack, 808 F.3d 905, 913 (D.C. Cir. 2015) (second alteration in original) (citation omitted). Plaintiffs’ allegations allow for the presumption that reporting on their research findings would violate some targeted websites’ ToS. While far from the degree of proof necessary for summary judgment, see Lujan, 504 U.S. at 561, at this early stage plaintiffs have plausibly alleged that the CFAA prevents all of their conduct.

3. “Credible Threat of Prosecution”

Even if plaintiffs’ intended conduct is arguably affected with a constitutional interest, and is prohibited by the CFAA, plaintiffs still must show that there is a credible threat of prosecution for that conduct under the statute. See Driehaus, 134 S. Ct. at 2342. The government asserts that plaintiffs cannot meet this test, because “plaintiffs make no allegation that the government has threatened them with CFAA enforcement,” plaintiffs “cite no instances in which the government has enforced the challenged provision for harmless [ToS] violations,” and DOJ “has expressly stated that it has no intention of prosecuting harmless [ToS] violations that are not in furtherance of other criminal activity or tortious conduct.” Def.’s Reply at 13. The government is, for the most part, correct on the facts. The complaint does not allege that plaintiffs have actually been threatened with prosecution. The two cases plaintiffs cite to show that prosecutors have used the Access Provision to punish ToS violations did, in fact, involve harmful conduct. And DOJ’s guidance to federal prosecutors does discourage them—though somewhat tepidly—from bringing CFAA cases based solely on harmless ToS violations. See U.S. Att’y Gen., Intake and Charging Policy for Computer Crimes Matters (“Charging Policy”) (Sept. 11, 2014) [ECF No. 15–1] at 5.

However, both Supreme Court and D.C. Circuit precedent create a low standing bar in cases like this one. Because plaintiffs “challenge [a] law[] burdening expressive rights,” and because their complaint provides “a credible statement . . . of intent to commit violative acts,” plaintiffs may rely on the “conventional background expectation that the government will enforce the law.” U.S. Telecom Ass’n, 825 F.3d at 739 (citation omitted); accord Act Now to Stop War & End Racism Coal. v. District of Columbia (ANSWER II), 846 F.3d 391, 401–02 (D.C. Cir. 2017), cert. denied, 138 S. Ct. 334 (2017) (mem.). Indeed, the D.C. Circuit has occasionally found standing without inquiring into whether the government has actually enforced the challenged restriction. See U.S. Telecom Ass’n, 825 F.3d at 739–40.

Here, there are sufficient indications of a credible threat to enforce the Access Provision, both in general and as applied to plaintiffs’ activities. To begin with, the parties have sparred over whether DOJ has enforced the Access Provision specifically against harmless ToS violations. See Compl. ¶ 31; Def.’s Mem. at 14–17; Pls.’ Mem. at 3–4, 25. Yet a number of cases have looked to whether the statutory provision as a whole—or at least the particular term being challenged—has been enforced through prosecutions, without asking whether the facts were similar to those the plaintiffs alleged. See, e.g., Holder v. Humanitarian Law Project, 561 U.S. 1, 16 (2010); Babbitt, 442 U.S. at 302; N. Carolina Right to Life, Inc. v. Bartlett, 168 F.3d 705, 710 (4th Cir. 1999). If one need only find a history of enforcement of the Access Provision generally, or enforcement of the “exceeds authorized access” language in particular, plaintiffs would have no trouble showing that there is a significant history. Indeed, the Supreme Court decided a case just two years ago that involved a prosecution under the Access Provision, in part for exceeding authorized access. Musacchio v. United States, 136 S. Ct. 709, 713 & n.1 (2016).[FN6]

Even looking more closely at similar factual scenarios, plaintiffs have shown that prosecutions have stemmed from close enough facts that it would be credible to fear a future prosecution for their own activities. Plaintiffs cite two cases in which individuals were prosecuted under the Access Provision for violating ToS agreements: United States v. Lowson, No. 10-cr-114 (KSH), 2010 WL 9552416 (D.N.J. Oct. 12, 2010), and United States v. Drew, 259 F.R.D. 449 (C.D. Cal. 2009). Compl. ¶ 31. Lowson, as the government points out, did not solely involve violations of website ToS; it also involved ticket scalpers’ attempts “to defeat code-based security restrictions” on Ticketmaster’s website. 2010 WL 9552416, at *5. However, the indictment alleged “both contract- and code-based violations,” id. at *6, and laid out the websites’ prohibitions that the defendants allegedly violated, see Superseding Indictment at 5–9, Lowson, 2010 WL 9552416 (No. 10-cr-114), ECF No. 10-2. More directly on point is Drew, in which the government prosecuted a woman for lying about her age and creating a false account on Myspace in order to cyberbully her daughter’s teenage classmate—thus violating Myspace’s ToS in order to commit the tort of intentional infliction of emotional distress. 259 F.R.D. at 452. Prosecutors included both a felony count under the Access Provision—because the violation was in furtherance of a tortious act—and a misdemeanor count for the standalone ToS violations. Id. at 451. The jury acquitted Drew on the felony count, id.; the court then dismissed the misdemeanor conviction, as coverage of ToS violations rendered the Access Provision unconstitutionally vague, id. at 467.

That the government brought the Drew case without enough evidence to ultimately prove the added harm required for a felony conviction, and chose to include a misdemeanor count for harmless ToS violations, lends some credibility to plaintiffs’ fears of prosecution. The government also does not know whether prosecutors may have employed the Access Provision to obtain plea agreements in which defendants admitted to harmless ToS violations. See Tr. of Mot. Hr’g [ECF No. 20] at 17:15–18:13.[FN7] These prior prosecutions, whether under the Access Provision generally or under related factual circumstances, provide “somewhat more than the ‘conventional background expectation that the government will enforce the law.’” ANSWER I, 589 F.3d at 435 (citation omitted). Thus, even if more were necessary, plaintiffs have provided it.

Finally, the government has not expressly disavowed any intent to prosecute plaintiffs, which would defeat the normal expectation of enforcement. The government points to a 2014 memorandum that the Attorney General sent to United States Attorneys regarding charging policy under the CFAA, which the government claims is the current “binding guidance” on this issue. Def.’s Reply at 14. According to the government, plaintiffs’ fear of prosecution is “implausible” because (1) the charging policy focuses on several factors that would not apply to harmless ToS violations, (2) prosecutions based solely on such violations are discouraged, and (3) attorneys must consult with the Criminal Division of DOJ before making CFAA charging decisions. Id. However, to disprove an otherwise credible threat of prosecution, courts have normally required an explicit statement “that plaintiffs will not be prosecuted if they do what they say they wish to do.” Humanitarian Law Project, 561 U.S. at 16. The government has not made such a declaration. DOJ’s charging policy states that, “if the defendant exceeded authorized access solely by violating an access restriction contained in a contractual agreement or [ToS] with an Internet service provider or website, federal prosecution may not be warranted.” Charging Policy at 5 (emphasis added). This is a far cry from the sort of disavowal required by case law.[FN8]

In an attempt to provide such a disavowal, and at the Court’s suggestion, the government filed an affidavit from John T. Lynch, Jr., Chief of the Computer Crime and Intellectual Property Section of the Criminal Division of DOJ. Aff. of John T. Lynch, Jr. [ECF No. 21-1]. He points to the charging factors mentioned above, id. at 2–3, and states that he “do[es] not expect that the Department would bring a CFAA prosecution based on such facts and de minimis harm,” id. at 3. But many things that we do not expect in fact come to pass. An official’s prognostication does not substitute for a declaration of non-prosecution. Moreover, even explicit disavowals are most valuable when they are made “on the basis of the Government’s own interpretation of the statute and its rejection of plaintiffs’ interpretation as unreasonable.” Blum v. Holder, 744 F.3d 790, 798 (1st Cir. 2014). Here, the government has implicitly—and in past prosecutions, explicitly—read the Access Provision to include ToS violations. See Charging Policy at 4–5. “[T]o rely upon prosecutorial discretion to narrow the otherwise wide-ranging scope of a criminal statute’s highly abstract general statutory language places great power in the hands of the prosecutor.” Marinello v. United States, No. 16-1144, 2018 WL 1402426, at *6 (U.S. Mar. 21, 2018). The Constitution “does not leave us at the mercy of noblesse oblige,” United States v. Stevens, 559 U.S. 460, 480 (2010), which is all the government ultimately offers.

One final point. Until now, this standing analysis has focused on plaintiffs’ First Amendment challenge. But plaintiffs also bring due process claims. In Seegars v. Gonzales, 396 F.3d 1248 (D.C. Cir. 2005), the D.C. Circuit applied a more rigorous “imminence” standard for non-First-Amendment constitutional claims. But the court took pains to point out that it was forced to follow circuit precedent that conflicted with the Supreme Court’s and the D.C. Circuit’s own laxer standing test for First Amendment pre-enforcement challenges. See id. at 1252–54. Subsequent cases have confirmed that the “more demanding standard” required by Seegars does not apply when challenging “laws burdening expressive rights.” ANSWER I, 589 F.3d at 435. Here, plaintiffs’ Fifth Amendment claims allege an injury-in-fact essentially identical to that alleged for their First Amendment claims. Pls.’ Mem. at 23 n.2. Both the Supreme Court and the D.C. Circuit have upheld standing for dual First- and Fifth-Amendment pre-enforcement challenges, under a less rigorous imminence standard, without distinguishing between the two amendments for standing purposes. See Humanitarian Law Project, 561 U.S. at 11–12, 15–16; ANSWER II, 846 F.3d at 396, 401–02; ANSWER I, 589 F.3d at 434–35. Plaintiffs therefore have standing to bring their Fifth Amendment claims along with their First Amendment ones.

For the foregoing reasons, plaintiffs have plausibly pled standing at the motion to dismiss stage, and the government’s Rule 12(b)(1) motion will be denied.

C. INTERPRETING THE STATUTE

Plaintiffs allege only constitutional claims in this case. Likely because they are bringing a pre-enforcement challenge, they are not claiming that the statute, properly read, does not apply to them. However, nearly all of their claims require the Court to determine the reach of the Access Provision before deciding the constitutional question. Since the Court does not accept plaintiffs’ legal conclusions as true for purposes of a motion to dismiss under Rule 12(b)(6), see Doe v. Rumsfeld, 683 F.3d 390, 391 (D.C. Cir. 2012), plaintiffs’ reading of the statute to cover their conduct does not control. Instead, the Court must interpret the law.

Courts are split as to how to read the relevant provisions. The CFAA defines the phrase “exceeds authorized access” as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). The Second, Fourth, and Ninth Circuits have held that this language prohibits only unauthorized access to information. See United States v. Valle, 807 F.3d 508, 523– 28 (2d Cir. 2015); WEC Carolina Ener. Solutions LLC v. Miller, 687 F.3d 199, 206 (4th Cir. 2012); Nosal, 676 F.3d at 863; see also Pulte Homes, Inc. v. Laborers’ Int’l Union of N. Am., 648 F.3d 295, 304 (6th Cir. 2011) (stating, based on Ninth Circuit precedent, that “an individual who is authorized to use a computer for certain purposes but goes beyond those limitations . . . has ‘exceed[ed] authorized access’” (citation omitted) (alteration in original)). Meanwhile, the First, Fifth, and Eleventh Circuits have held that it also covers (at least in some instances) unauthorized use of information that a defendant was authorized to access only for specific purposes. See EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577, 583 (1st Cir. 2001); United States v. John, 597 F.3d 263, 271 (5th Cir. 2010); United States v. Rodriguez, 628 F.3d 1258, 1263 (11th Cir. 2010); see also Int’l Airport Centers, LLC v. Citrin, 440 F.3d 418, 420–21 (7th Cir. 2006) (holding that an employee who deleted his employer’s files in violation of his employment contract had terminated the agency relationship that authorized him to access the information). Courts have also split over whether violating a website’s ToS exceeds authorized access for purposes of the CFAA.[FN9] The D.C. Circuit has never opined on either question. Several district judges in this Circuit, however, have held that the provision only applies to unauthorized access to information, not to unauthorized use of properly accessed material. See Hedgeye Risk Mgmt., LLC v. Heldman, 271 F. Supp. 3d 181, 194–95 (D.D.C. 2017) (collecting cases).

At one point in their briefing, plaintiffs suggest a different dividing line: a limiting construction that carves out harmless ToS violations from the statute. Pls.’ Mem. at 31–33, 35. However, “[t]he text will not bear such a reading.” INS v. Yueh-Shaio Yang, 519 U.S. 26, 30 (1996). It is one thing to carve out such violations by determining that the statute is unconstitutional as applied, but the text of the statute itself—“exceeds authorized access”—and its statutory definition do not appear to allow for such a surgical slicing off of conduct. How does the text differentiate between ToS violations and violations of employers’ computer use policies, for instance? And how does the text distinguish between “[ToS] violations alone,” Pls.’ Mem. at 35, and ToS violations that cause damage or involve fraud, which plaintiffs admit are covered by §§ 1030(a)(4) and (a)(5), id. at 31–32? One can just as easily “use [authorized] access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter,” § 1030(e)(6), whether it is a website or some other entity that is doing the authorizing, and whether the violation is harmful or harmless.

The question thus remains whether “exceeds authorized access” refers to access alone or to access, use, and other violations. The Court finds the narrow interpretation adopted by the Second, Fourth, and Ninth Circuits—and by numerous other district judges in this Circuit—to be the best reading of the statute. First, the text itself more naturally reads as limited to violations of the spatial scope of one’s permitted access. To “exceed[] authorized access,” one must have permission to access the computer at issue, and must “use such access”—i.e., one’s authorized presence on the computer—“to obtain or alter information in the computer.” Id. Thus, unlike the phrase “unauthorized access” used alongside it in several CFAA provisions, the phrase “exceeds authorized access” refers not to an outside attack but rather to an inside job. See, e.g., Nosal, 676 F.3d at 858. The rest of the definition requires that the information at issue be information “that the accesser is not entitled so to obtain or alter.” Id. The key word here is “entitled.” “And, in context, the most ‘sensible reading of “entitled” is as a synonym for “authorized.”’” Hedgeye, 271 F. Supp. 3d at 194 (quoting Nosal, 676 F.3d at 857). The focus is thus on whether someone is allowed to access a computer at all, in the case of “unauthorized access,” or on whether someone is authorized to obtain or alter particular information, in the case of “exceeds authorized access.” In neither instance does the statute focus on how the accesser plans to use the information.[FN10]

The statutory context buttresses this narrower reading of the text. Reading “exceeds authorized access” to turn on the accesser’s purpose in seeking out the information would eliminate a major difference between the Access Provision—which has no purpose requirement—and other provisions that require intent to defraud. E.g., 18 U.S.C. § 1030(a)(4). It would also water down the difference between the misdemeanor penalty provisions and the felony provisions that enhance sentences for violations committed for fraud or financial gain. Id. § 1030(c)(2); see also S. Rep. No. 104-357, at 8 (1996) (“[T]he statutory penalties are structured to provide that obtaining information of minimal value is only a misdemeanor, but obtaining valuable information, or misusing information in other more serious ways, is a felony.” (emphasis added)). After all, just about any attempt to use proprietary information to defraud or for personal or commercial gain would likely violate a computer use policy or website ToS. See Nosal, 676 F.3d at 858 n.4. Congress knew how to draft a specific intent requirement, and did so in these other sections of the CFAA. It would be rather odd, then, for Congress to also smuggle a specific intent factor into its definition of the actus reus of the offense. While this context is certainly not dispositive— Congress often drafts overlapping or even redundant provisions—it is best to avoid readings that “would render superfluous another part of the same statutory scheme.” Marx v. Gen. Revenue Corp., 568 U.S. 371, 386 (2013).

Legislative history also points to an access-based, rather than an intended-use-based, reading of “exceeds authorized access.” The Second Circuit has already canvassed in great detail the congressional intent and history behind the definition of “exceeds authorized access,” see Valle, 807 F.3d at 525–26, and this Court will not repeat it here. This Court agrees with the Second Circuit, however, that “the legislative history consistently characterizes the evil to be remedied— computer crime—as ‘trespass’ into computer systems or data, and correspondingly describes ‘authorization’ in terms of the portion of the computer’s data to which one’s access rights extend.” Id. at 525. Congress thus viewed exceeding authorized access as the digital equivalent of being allowed into a house but entering a room within it that the owner has declared to be off-limits. A sensible conception, particularly considering that the language at issue was written in 1986— before the World Wide Web or websites existed. See Kerr, Norms of Computer Trespass, supra, at 1161.

The amendment history of the definition supports this reading. The initial language of the CFAA applied to anyone who, knowingly “having accessed a computer with authorization, uses the opportunity such access provides for purposes to which such authorization does not extend, and thereby obtains information.” Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, Pub. L. No. 98-473, tit. II, ch. 21, § 2102(a), 98 Stat. 1837, 2190–91 (emphasis added). In 1986, however, in a section entitled “Modification of Authorized Access Aspect of Offenses,” Congress replaced this language with the phrase “exceeds authorized access,” and, in a section entitled “Conforming Amendments to Definitions Provision,” added the current definition of that phrase. See Computer Fraud and Abuse Act of 1986, Pub. L. No. 99-474, § 2(c), (g)(4), 100 Stat. 1213, 1215. It is not clear that Congress intended this language change to be substantive. See S. Rep. No. 99-432, at 9 (1986) (“The Committee intends this change to simplify the language in 18 U.S.C. 1030(a)(1) and (2), and the phrase ‘exceeds authorized access’ is defined separately in Section (2)(g) of the bill.”); 132 Cong. Rec. 28,821 (1986) (statement of Rep. Hughes) (stating, as the chairman of the drafting subcommittee just before final passage, that “the basic thrust of this bill remains its three new offenses with some minor changes in the existing law”). Yet it is notable that Congress did not simply transpose the existing, purpose-oriented language into the definition section—which still would have simplified the language of § 1030(a), as desired—but instead replaced it with new language that focuses on authorization to access particular information. Indeed, if Congress did not think it was making a substantive change, the legislative history suggests that this was because Congress thought the initial language also was limited to access, since “when Congress referenced the user’s ‘purposes,’ it spoke in terms of the particular computer files or data to which the user’s access rights extended.” Valle, 807 F.3d at 526.

Finally, plaintiffs raise numerous First and Fifth Amendment concerns with the Access Provision that would arise out of reading “exceeds authorized access” to include the purpose or use restrictions that appear in many ToS. When a court is “deciding which of two plausible statutory constructions to adopt,” and when “one of them would raise a multitude of constitutional problems, the other should prevail.” Clark v. Martinez, 543 U.S. 371, 380–81 (2005). This maxim holds doubly true for criminal statutes. See Marinello, 2018 WL 1402426, at *4 (“[Courts] have traditionally exercised restraint in assessing the reach of a federal criminal statute, both out of deference to the prerogatives of Congress and out of concern that ‘a fair warning should be given to the world in language that the common world will understand, of what the law intends to do if a certain line is passed.’” (citation omitted)). While the CFAA’s text and legislative history point strongly toward an access-only interpretation of “exceeds authorized access,” a broader reading is not entirely implausible; therefore, constitutional avoidance applies. Cf. Jennings v. Rodriguez, 138 S. Ct. 830, 842 (2018). In interpreting the statutory text, the Court need not determine whether plaintiffs’ constitutional arguments would actually win the day. Rather, the Court undertakes “a narrow inquiry” into whether one reading “presents a significant risk that [constitutional provisions] will be infringed.” NLRB v. Catholic Bishop of Chicago, 440 U.S. 490, 533 (1979).

Here, significant risks abound. By providing for both civil and criminal enforcement of websites’ limitless ToS—including enforcement by the same entities that write the ToS—a broader reading of the CFAA “would appear to criminalize a broad range of day-to-day activity” and “subject individuals to the risk of arbitrary or discriminatory prosecution and conviction,” raising Fifth Amendment concerns. United States v. Kozminski, 487 U.S. 931, 949 (1988); see Valle, 807 F.3d at 527–28; Nosal, 676 F.3d at 862. By incorporating ToS that purport to prohibit the purposes for which one accesses a website or the uses to which one can put information obtained there, the CFAA threatens to burden a great deal of expressive activity, even on publicly accessible websites—which brings the First Amendment into play. See Packingham, 137 S. Ct. at 1736. If “exceeds authorized access” is read broadly, plaintiffs claim, the Access Provision could even run afoul of the Fifth Amendment by delegating power to private parties to define restrictions “limitless in time and space,” which can then operate as petty civil and criminal codes. Pls.’ Mem. at 10; see Ass’n of Am. R.Rs. v. U.S. Dep’t of Transp. (Ass’n of Am. R.Rs. II), 821 F.3d 19, 31 (D.C. Cir. 2016) (“[T]he Supreme Court has consistently concluded the delegation of coercive power to private parties can raise . . . due process concerns.”); Note, The Vagaries of Vagueness: Rethinking the CFAA as a Problem of Private Nondelegation, 127 Harv. L. Rev. 751, 768–71 (2013) (arguing that a broadly-read CFAA violates the nondelegation doctrine). One need neither slay nor succumb to this Hydra-headed set of objections to acknowledge it as formidable.

All of these factors, therefore, lead the Court to adopt a narrow reading of the term “exceeds authorized access.”[FN11] Just as an individual “accesses a computer ‘without authorization’ when he gains admission to a computer without approval,” an individual “‘exceeds authorized access’ when he has approval to access a computer, but uses his access to obtain or alter information that falls outside the bounds of his approved access.” WEC Carolina, 687 F.3d at 204.

This interpretation gets us far, but not all the way. At oral argument, both parties agreed that the Access Provision applies only to access restrictions. See Tr. of Mot. Hr’g at 19:17–20:3, 34:10–35:22. But they have very different ideas about what that means. The government treats this difference as a largely temporal one. It argues that “the moment the violation occurs is on access,” so that subsequent usage of information lawfully obtained does not constitute a CFAA violation. Id. at 20:12–:18. But the government also claims that “it’s appropriate to analyze the issue of whether access is authorized according to a broad context of background facts that could include limitations on the purpose for which information is accessed,” such as “access restrictions that are contained in the [ToS] that the website itself has prepared.” Id. at 19:21–20:2. Plaintiffs, on the other hand, argue that the distinction between access and use turns on the conduct being prohibited, rather than whether the website attempts to cast the conduct as related to access rather than use. Id. at 61:17–:23. Plaintiffs’ reading is the more natural one, and better reflects the constitutional avoidance concerns that support the Court’s interpretation of the statute. Therefore, the Court must make an objective inquiry into the conduct alleged to violate websites’ ToS. The focus is on what information plaintiffs plan to access, not on why they wish to access it, the manner in which they use their authorization to access it, or what they hope to do with it.

Applying this standard, it becomes clear that most of plaintiffs’ proposed activities fall outside the CFAA’s reach. Scraping or otherwise recording data from a site that is accessible to the public is merely a particular use of information that plaintiffs are entitled to see. The same goes for speaking about, or publishing documents using, publicly available data on the targeted websites. The use of bots or sock puppets is a more context-specific activity, but it is not covered in this case. Employing a bot to crawl a website or apply for jobs may run afoul of a website’s ToS, but it does not constitute an access violation when the human who creates the bot is otherwise allowed to read and interact with that site. See Kerr, Norms of Computer Trespass, supra, at 1170. The website might purport to be limiting the identities of those entitled to enter the site, so that humans but not robots can get in. See Star Wars: Episode IV – A New Hope (Lucasfilm 1977) (“We don’t serve their kind here! . . . Your droids. They’ll have to wait outside.”). But bots are simply technological tools for humans to more efficiently collect and process information that they could otherwise access manually. Cf. Star Wars: Episode II – Attack of the Clones (Lucasfilm 2002) (“[I]f droids could think, there’d be none of us here, would there?”).

Out of plaintiffs’ proposed activities, then, only Mislove and Wilson’s plan to create fictitious user accounts on employment sites would violate the CFAA. Unlike plaintiffs’ other conduct, which occurs on portions of websites that any visitor can view, creating false accounts allows Mislove and Wilson to access information on those sites that is both limited to those who meet the owners’ chosen authentication requirements and targeted to the particular preferences of the user.[FN12] Creating false accounts and obtaining information through those accounts would therefore fall under the Access Provision. With that in mind, the Court must turn to the government’s motion to dismiss plaintiffs’ constitutional claims.

D. FREEDOM OF SPEECH AND FREEDOM OF THE PRESS

Plaintiffs first claim that the Access Provision violates the First Amendment’s guarantees of freedom of speech and of the press.[FN13] They assert that the provision is both facially overbroad and unconstitutional as applied to their own conduct. The Court will analyze these claims in turn.

1. Facial Overbreadth

Plaintiffs allege that the Access Provision “creates virtually limitless restrictions on speech and expressive activity,” such that the statute “is unconstitutionally overbroad on its face.” Compl. ¶ 183. In a typical facial challenge, plaintiffs must show “‘that no set of circumstances exists under which [the Access Provision] would be valid,’ . . . or that the statute lacks any ‘plainly legitimate sweep.’” Stevens, 559 U.S. at 472 (citations omitted). However, First Amendment cases allow for “‘a second type of facial challenge,’ whereby a law may be invalidated as overbroad if ‘a substantial number of its applications are unconstitutional, judged in relation to the statute’s plainly legitimate sweep.’” Id. at 473 (citation omitted). This second, lower bar is the one against which plaintiffs—and the Court—measure their challenge.

The government argues that plaintiffs have failed to state a plausible overbreadth claim. See Def.’s Reply at 18–19. The Court agrees. “The first step in overbreadth analysis is to construe the challenged statute; it is impossible to determine whether a statute reaches too far without first knowing what the statute covers.” United States v. Williams, 553 U.S. 285, 293 (2008). The Court has now done so. Plaintiffs have operated under the assumption that the Access Provision covers all ToS violations; but, properly read, the Access Provision incorporates only those ToS that limit access to particular information. This fact alone is enough to dispose of plaintiffs’ overbreadth claim. “Invalidation for overbreadth is strong medicine,” id. (citation omitted), to be “employed . . . sparingly and only as a last resort,” Broadrick v. Oklahoma, 413 U.S. 601, 613 (1973). A court should not invalidate a provision for overbreadth “when a limiting construction has been or could be placed on the challenged statute.” Id.

Plaintiffs concede that a limiting construction would address their overbreadth concerns— though they contend that the Access Provision would need to be “construed not to reach [ToS] violations alone.” Pls.’ Mem. at 35. While the Court’s reading of “exceeds authorized access” is not as narrow as the reading plaintiffs might prefer, it does eliminate many of the potentially unconstitutional applications of the Access Provisions. To be overbroad, a statute’s unconstitutional scope must be “substantial, not only in an absolute sense, but also relative to the statute’s plainly legitimate sweep.” Williams, 553 U.S. at 292. As purpose, use, or manner restrictions fall outside the Access Provision’s reach, plaintiffs have not plausibly alleged that the provision’s potentially unconstitutional applications are substantial relative to its legitimate ones. Moreover, plaintiffs also bring an as-applied claim, and facial challenges are disfavored when a case “may be disposed of on narrower grounds.” Texas v. Johnson, 491 U.S. 397, 403 n.3 (1989). Hence, Plaintiffs’ overbreadth claim will be dismissed.

2. As-Applied Challenge

Plaintiffs allege that, “[a]s applied to the[m],” the Access Provision “unconstitutionally restricts their protected speech.” Compl. ¶ 184. “[T]o prevail on an as-applied First Amendment challenge,” plaintiffs “must show that the [Access Provision is] unconstitutional as applied to their particular speech activity.” Edwards v. District of Columbia, 755 F.3d 996, 1001 (D.C. Cir. 2014). “‘[T]he distinction between facial and as-applied challenges . . . goes to the breadth of the remedy employed by the Court, not what must be pleaded in a complaint.’ . . . The substantive rule of law is the same for both challenges.” Id. (citations omitted).

Aside from the overarching objections that the Court has already rejected, the government’s primary response to plaintiffs’ as-applied claim is that the Access Provision regulates conduct, rather than speech, and is therefore subject to limited scrutiny. See Def.’s Mem. at 21, 27. But even if a law “says nothing about speech on its face,” it is “subject to First Amendment scrutiny” if “it restricts access to traditional public fora.” McCullen v. Coakley, 134 S. Ct. 2518, 2529 (2014). As the Access Provision both limits access to and burdens speech in the public forum that is the public Internet, see supra Part II.A, heightened First Amendment scrutiny is appropriate. “In particular, the guiding First Amendment principle that the ‘government has no power to restrict expression because of its message, its ideas, its subject matter, or its content’ applies with full force in a traditional public forum.” Id. (citation omitted). Content- or viewpoint- based restrictions receive strict scrutiny. See Reed v. Town of Gilbert, 135 S. Ct. 2218, 2226 (2015); Rosenberger, 515 U.S. at 829. On the other hand, if a statute is content-neutral and only “impose[s] reasonable restrictions on the time, place, or manner of protected speech,” McCullen, 134 S. Ct. at 2529, it is subjected to intermediate scrutiny. “In order to survive intermediate scrutiny, a law must be ‘narrowly tailored to serve a significant governmental interest,’” Packingham, 137 S. Ct. at 1736 (citation omitted), and must “leave open ample alternative channels for communication of the information,” McCullen, 134 S. Ct. at 2529.[FN14]

Plaintiffs claim that the Access Provision allows websites to impose direct speech restrictions, including content-based restrictions, and that it is therefore subject to strict scrutiny. Pls.’ Mem. at 34–35. However, the statute itself does not target speech, or impose content-based regulations, on its face. Nor have plaintiffs plausibly alleged that the government’s purpose is to restrict speech based on its content or viewpoint. Indeed, while the government has not yet been able to proffer much evidence of the purposes behind the provision, the legislative history indicates that Congress was interested in passing the Access Provision to prevent the digital equivalent of theft. See S. Rep. 104–357, at 7 (“The proposed subsection 1030(a)(2)(C) is intended to protect against the interstate or foreign theft of information by computer. . . . This subsection would ensure that the theft of intangible information by the unauthorized use of a computer is prohibited in the same way theft of physical items are protected [sic].”). Therefore, strict scrutiny does not apply. See Pursuing America’s Greatness v. FEC, 831 F.3d 500, 509 (D.C. Cir. 2016) (stating that courts must determine content neutrality based on text, and then purpose).

From the information available so far, significant interests appear to underlie the Access Provision. In addition to the legislative history regarding theft prevention, the government suggests that the Court analogize the CFAA to trespass law, arguing that Congress was also trying to prohibit the digital equivalent of trespassing. Def.’s Reply at 3–5. While plaintiffs dispute the trespass analogy, they recognize that the CFAA was passed to prevent computer theft and other cybercrime, and have not disputed that this is a significant interest. Pls.’ Mem. at 31. The question is thus whether the statute fails narrow tailoring as applied to Mislove and Wilson’s plan to “creat[e] profiles containing false information,” Compl. ¶ 124, and “access[] websites using artificial tester profiles, in violation of [ToS] that prohibit providing false information,” id. ¶ 154.

“To satisfy narrow tailoring, the [government] must prove the challenged regulations directly advance its asserted interests.” Edwards, 755 F.3d at 1003. This means “the government must show ‘a close fit between ends and means,’” such “that the regulation ‘promotes a substantial government interest that would be achieved less effectively absent the regulation,’” and does “not ‘burden substantially more speech than is necessary to further the government’s legitimate interests.’” A.N.S.W.E.R. Coalition v. Basham, 845 F.3d 1199, 1213–14 (D.C. Cir. 2017) (citations omitted). At this early stage, the government has not put forward any evidence to show that prosecuting those who provide false information when creating accounts, without more, would advance its interest in preventing digital theft or trespass.

Indeed, presuming the allegations in the complaint to be true, it appears that the government’s interest “is not implicated on these facts” at all. Johnson, 491 U.S. at 410. Plaintiffs allege that their conduct “will not cause material harm to the target websites’ operations,” and that “they have no intent to commit fraud or to access any data or information that is not made available to the public.” Compl. ¶ 4. It is difficult to argue that trespass or theft concerns can justify restricting—or even apply to—viewing information that a website makes available to anyone who chooses to create a username and password. Cf. Kerr, Cybercrime’s Scope, supra, at 1646. And any inadvertent “fraud” plaintiffs may perpetrate against the target websites by creating fictitious accounts will be, plaintiffs allege, harmless. The CFAA already punishes harmful, intentional fraud in a separate section, see 18 U.S.C. § 1030(a)(4), providing additional evidence that the government can further its legitimate interests just as well without applying the Access Provision to plaintiffs’ bare false statements. At this stage, “absent any evidence that the speech [would be] used to gain a material advantage,” Alvarez, 567 U.S. at 723, plaintiffs’ false speech on public websites retains First Amendment protection, see id. at 722, and rendering it criminal does not appear to advance the government’s proffered interests. Hence, plaintiffs have plausibly alleged an as-applied First Amendment claim, and the motion to dismiss that claim will be denied.

E. RIGHT TO PETITION

In addition to their free speech and press claims, plaintiffs allege that the Access Provision violates their rights under the Petition Clause of the First Amendment. Compl. ¶ 193. That clause states: “Congress shall make no law . . . abridging . . . the right of the People . . . to petition the Government for a redress of grievances.” U.S. Const. amend. I. Plaintiffs assert that the Access Provision, by criminalizing websites’ prohibitions on critical speech or publishing, prevents people from using any information they might gain from plaintiffs’ planned research to inform Congress or agencies about potential discrimination by those websites. Id. ¶¶ 162–67, 189. They also assert that, for the same reasons, the Access Provision prevents people from accessing the courts to enforce Title VII or the Fair Housing Act: nobody who had visited a website with a non- disparagement clause in its ToS could bring discrimination claims against that site in court without opening him- or herself up to a potential CFAA prosecution. Id. ¶¶ 168–69, 190.

These allegations are focused on ToS that restrict subsequent speech: disparagement, for instance, or use of the sites’ information in court. However, such ToS constitute restrictions on the use of information, not on access to it. They therefore do not fall within the Access Provision’s ambit, as properly interpreted. But even if one assumes that plaintiffs allege that access restrictions criminalized by the Access Provision violate the Petition Clause, see Compl. ¶ 162, plaintiffs’ petition challenge is, at best, no stronger than their free speech challenge. Speech and petition rights are “generally subject to the same constitutional analysis,” Wayte v. United States, 470 U.S. 598, 610 n.11 (1985), unless “the special concerns of the Petition Clause would provide a sound basis for a distinct analysis,” Borough of Duryea v. Guarnieri, 564 U.S. 379, 389 (2011). Here, the rights appear to overlap: plaintiffs’ Petition Clause claim focuses on speech restrictions that could then affect the petitioning process. Thus, plaintiffs “just as easily could have alleged”—and do, in fact, allege—a Speech Clause violation on the same set of facts. Id. at 387.

And it is on that free speech claim that plaintiffs’ First Amendment case must rise or fall. The Speech and Press Clauses, rather than the Petition Clause, provide the more natural home for plaintiffs’ concerns about the Access Provision. Plaintiffs assert that the CFAA “prevents them from engaging in” petitioning because some websites’ ToS (and thus the Access Provision) “prohibit the speech necessary to engage in . . . petitioning.” Pls.’ Mem. at 43. The real concern, then, is the Access Provision’s alleged restrictions on speech, which have ripple effects in a variety of contexts. The application of the Access Provision to the petitioning process constitutes one small subset of the speech and conduct the provision allegedly prohibits. Any effect the statute might have on plaintiffs’ petition rights, then, is an extra step removed from the central speech harm, and is thus too attenuated to state a plausible claim for relief.

Ultimately, “the Petition Clause protects the right of individuals to appeal to courts and other forums established by the government for resolution of legal disputes,” and “[i]nterpretation of the Petition Clause must be guided by the objectives and aspirations that underlie the right.” Borough of Duryea, 564 U.S. at 387–88. As the government notes, the clause is not aimed at the right to gather facts, or to speak while doing so, as a preliminary step to help prepare that petition in a preferred way. See Def.’s Mem. at 28. That right is more naturally the province of the Speech and Press Clauses than of the Petition Clause. See Burt Neuborne, Madison’s Music: On Reading the First Amendment 11–12, 89 (2015) (arguing that the First Amendment’s protected rights form “a rigorous chronological narrative of free citizens governing themselves in an ideal democracy,” and that the Petition Clause “concludes Madison’s narrative, protecting [an] idea’s introduction into the formal democratic process, forcing the legislature to place the issue on its agenda”). Hence, plaintiffs’ Petition Clause claim will be dismissed.

F. VAGUENESS

Plaintiffs next allege that the Access Provision violates the Due Process Clause because it is unconstitutionally vague. A statute is void if it is “[1] so vague that it fails to give ordinary people fair notice of the conduct it punishes, or [2] so standardless that it invites arbitrary enforcement.” Johnson v. United States, 135 S. Ct. 2551, 2556 (2015). Plaintiffs allege that the Access Provision meets both prongs of this test. Compl. ¶¶ 171–72. Because of potential chilling effects, “a more stringent vagueness test” applies when a law “interferes with the right of free speech.” Vill. of Hoffman Estates v. Flipside, Hoffman Estates, Inc., 455 U.S. 489, 499 (1982).

Properly interpreted, however, the Access Provision is not unconstitutionally vague. “A plaintiff whose speech is clearly proscribed cannot raise a successful vagueness claim” based on a lack of fair notice. Expressions Hair Design v. Schneiderman, 137 S. Ct. 1144, 1151–52 (2017) (quoting Humanitarian Law Project, 561 U.S. at 20). Nor can that plaintiff bring a facial vagueness challenge “based on the speech of others.” Humanitarian Law Project, 561 U.S. at 20. As we have already seen, the Access Provision plainly proscribes the creation of false accounts, but does not prohibit plaintiffs’ other activities. Indeed, plaintiffs allege that they are aware that their proposed conduct would violate their target websites’ ToS restrictions on creating false accounts. Compl. ¶ 124. As the Court has determined that the Access Provision applies to one of their activities but not to the others, and as plaintiffs admit that they have the requisite mens rea to commit the crime, no facial claim or as-applied notice claim can go forward.

Nor can plaintiffs plausibly allege that the Access Provision invites arbitrary enforcement. “[A] statute’s vagueness is either susceptible to judicial construction or is void for vagueness based on the application of traditional rules for statutory interpretation.” United States v. Bronstein, 849 F.3d 1101, 1106 (D.C. Cir. 2017). Thus, “before striking a federal statute as impermissibly vague,” courts must “consider whether the prescription is amenable to a limiting construction.” Welch v. United States, 136 S. Ct. 1257, 1268 (2016) (citation omitted). The Court has already determined that a more limited construction is not only possible, but is in fact more natural than the broad reading that raises vagueness concerns. Read to apply only to access, and not to use, restrictions, the Access Provision severely curtails both websites’ ability to define the law and prosecutors’ freedom arbitrarily to enforce it. Plaintiffs’ Fifth Amendment vagueness claim will be dismissed.

G. NONDELEGATION DOCTRINE

Finally, plaintiffs allege that the Access Provision violates the Fifth Amendment because it delegates the content of criminal law to private parties. Compl. ¶¶ 173–77, 201. The primary case laying out the private nondelegation doctrine is Carter v. Carter Coal Co., 298 U.S. 238 (1936). The statute at issue in that case delegated to coal industry groups the power to create binding codes for the regulation of coal miners’ wages and hours. Id. at 310–11. The Court stated that this power “is legislative delegation in its most obnoxious form; for it is not even delegation to an official or an official body, presumptively disinterested, but to private persons whose interests may be and often are adverse to the interests of others in the same business.” Id. at 311. Prior to Carter Coal, the Supreme Court also twice struck down ordinances that sanctioned a “standardless delegation of power to a limited group of property owners.” City of Eastlake v. Forest City Enterprises, Inc., 426 U.S. 668, 678 (1976) (discussing Eubank v. Richmond, 226 U.S. 137 (1912), and Washington ex rel. Seattle Title Trust Co. v. Roberge, 278 U.S. 116 (1928)).

The D.C. Circuit has gleaned two rules from these cases. First, “[f]ederal lawmakers cannot delegate regulatory authority to a private entity.” Ass’n of Am. R.Rs. v. U.S. Dep’t of Transp. (Ass’n of Am. R.Rs. I), 721 F.3d 666, 670 (D.C. Cir. 2013), vacated and remanded on other grounds, 135 S. Ct. 1225 (2015). Unlike with delegations to agencies, “[e]ven an intelligible principle cannot rescue a statute empowering private parties to wield regulatory authority.” Id. at 671. And second, “the due process of law is violated when a self-interested entity is ‘intrusted with the power to regulate the business . . . of a competitor.’” Ass’n of Am. R.Rs. II, 821 F.3d at 31 (quoting Carter Coal, 298 U.S. at 311). Plaintiffs claim that the Access Provision violates the first of these principles. They allege that the law allows website owners to define the content of a crime—thus sweeping beyond other statutes that merely enforce private contractual agreements— and that the statute relinquishes any government control over the lawmaking process. Compl. ¶¶ 174–76. They also assert that the Access Provision provides no standards to guide what website owners may effectively criminalize. See Pls.’ Mem. at 40.

Plaintiffs raise an intriguing argument, but it is ultimately an unsuccessful one. As with First Amendment overbreadth and vagueness, the courts can avoid nondelegation concerns by “giving narrow constructions to statutory delegations that might otherwise be thought to be unconstitutional.” Mistretta v. United States, 488 U.S. 361, 373 n.7 (1989). Plaintiffs assert that the Access Provision provides a limitless, standardless delegation of power to individual websites to define crimes. But that assertion is based on a reading of the provision that sweeps in use, purpose, or manner restrictions on obtaining or altering information. Properly read as applying only to access restrictions, websites can write whatever ToS they please, but a congressionally- imposed standard limits which ToS can lead to liability or prosecution. Nor do websites have the power to impose formal rules on an industry or otherwise exercise regulatory authority in the manner that courts have found constitutionally impermissible. See, e.g., Yakus v. United States, 321 U.S. 414, 424 (1944); Carter Coal, 298 U.S. at 310–11; Ass’n of Am. R.Rs. I, 721 F.3d at 670–72. Plaintiffs have cited no case—nor has the Court found one—in which a court struck down on private nondelegation grounds a statute that incorporated private parties’ chosen restrictions, which are only binding on those who interact with those parties’ individual businesses. It is thus difficult to argue that the Access Provision improperly delegates legislative or regulatory authority.

Indeed, when read narrowly, the Access Provision looks similar to many criminal laws that are rendered operative by a private party’s decision whether to authorize certain conduct. Examples cited in the government’s brief, see Def.’s Mem. at 32–33, include criminal trespass laws, see D.C. Code § 22–3302; 25 C.F.R. § 11.411, and laws against misappropriation of trade secrets, see 18 U.S.C. § 1831, copyrights, see 17 U.S.C. §§ 106, 506, individuals’ identities, see 18 U.S.C. § 1029, and money (e.g., embezzlement). In none of these instances does a private party’s control over the law’s operation render it a nondelegation problem. Rather, “a legislative delegation to private citizens” is constitutional so long as “[1] the underlying exercise of authority [is] a reasonable regulation within the power of the government . . . . and [2] the legislature’s restriction [is] in the form of a general prohibition, and the delegation [is] in the form of permitting private citizens to waive the protection of that prohibition.” Silverman v. Barry, 845 F.2d 1072, 1086 (D.C. Cir. 1988). A different rule would make it so that “[a]lmost any system of private or quasi-private law could be subject to the” nondelegation doctrine. New Motor Vehicle Bd. of Cal. v. Orrin W. Fox Co., 439 U.S. 96, 109 (1978). Since the Access Provision creates a blanket prohibition on accessing information in protected computers, which owners of those computers can waive through permission, plaintiffs do not plausibly allege that the provision unconstitutionally delegates legislative power. Hence, the nondelegation claim will be dismissed.

CONCLUSION

This case raises important questions about the government’s ability to criminalize vast swaths of everyday activity on the Internet. However, the Court need not answer all of them today, because it concludes that the CFAA prohibits far less than the parties claim (or fear) it does. For the reasons explained above, plaintiffs have plausibly alleged that they have standing to sue, and that the Access Provision violates the Free Speech and Free Press Clauses of the First Amendment as applied to them. The government’s motion to dismiss for lack of standing and on this single as- applied claim will therefore be denied. But the Access Provision, as the Court reads it, does not sweep widely enough to render plausible plaintiffs’ First Amendment overbreadth and petition claims, or their Fifth Amendment vagueness and nondelegation claims. The government’s motion to dismiss those claims, therefore, will be granted. A separate order will issue on this date.

Footnotes

[FN1] This second step involves both crawling the profiles of ranked candidates to determine their demographic data and scraping to record the overall rankings. Compl. ¶¶ 114–16.

[FN2] See Facebook, Facebook Ads, https://www.facebook.com/business/products/ads; Facebook, Marketplace, https://www.facebook.com/marketplace/learn-more.

[FN3] See Packingham, 137 S. Ct. at 1737 (holding that banning people from “gain[ing] access to information,” “knowing current events,” and “checking ads for employment” through social media inhibits “the legitimate exercise of First Amendment rights”); Sorrell v. IMS Health Inc., 564 U.S. 552, 570 (2011) (“This Court has held that the creation and dissemination of information are speech within the meaning of the First Amendment. Facts, after all, are the beginning point for much of the speech that is most essential to advance human knowledge and to conduct human affairs.” (citations omitted)); Brown v. Entm’t Merchants Ass’n, 564 U.S. 786, 792 n.1 (2011) (“Whether government regulation applies to creating, distributing, or consuming speech makes no difference.”); Citizens United v. FEC, 558 U.S. 310, 340 (2010) (“Laws enacted to control or suppress speech may operate at different points in the speech process . . . .”).

[FN4] See Gericke v. Begin, 753 F.3d 1, 7 (1st Cir. 2014); Fields v. City of Philadelphia, 862 F.3d 353, 359 (3d Cir. 2017); Turner v. Lieutenant Driver, 848 F.3d 678, 688–89 (5th Cir. 2017); ACLU of Ill. v. Alvarez, 679 F.3d 583, 595 (7th Cir. 2012); Animal Legal Def. Fund v. Wasden, 878 F.3d 1184, 1203 (9th Cir. 2018); W. Watersheds Project v. Michael, 869 F.3d 1189, 1195–97 (10th Cir. 2017); Smith v. City of Cumming, 212 F.3d 1332, 1333 (11th Cir. 2000); see also Rideout v. Gardner, 838 F.3d 65, 75 (1st Cir. 2016), cert. denied, 137 S. Ct. 1435 (2017) (stating that “[t]here are strong First Amendment interests” in photographically recording one’s own completed ballot, because the “‘use of illustrations or pictures . . . serves important communicative functions’” (citation omitted)).

[FN5] The government counters that Alvarez and the cases that follow it do not “address facially neutral statutes of general applicability, such as the CFAA.” Def.’s Reply at 10. However, that goes to the standard of review on the merits rather than to whether plaintiffs’ activities are imbued with any First Amendment interest at all.

[FN6] For some other recent examples, see United States v. Batti, 631 F.3d 371, 372 (6th Cir. 2011); United States v. Willis, 476 F.3d 1121, 1124 (10th Cir. 2007); United States v. Cave, No. 8:12CR417, 2013 WL 3766550, at *1 (D. Neb. July 16, 2013); United States v. Roque, No. CRIM. 12-540 KM, 2013 WL 2474686, at *1 (D.N.J. June 6, 2013); United States v. Auernheimer, No. 11-CR-470 SDW, 2012 WL 5389142, at *1 (D.N.J. Oct. 26, 2012), rev’d, 748 F.3d 525 (3d Cir. 2014); United States v. Aleynikov, 737 F. Supp. 2d 173, 190 (S.D.N.Y. 2010).

[FN7] It also matters that the CFAA is a civil as well as a criminal statute. The possibility of administrative or private civil actions, even without a threat of criminal prosecution, may buttress—or perhaps independently provide— standing for pre-enforcement challenges. See, e.g., Babbitt, 442 U.S. at 302 n.13; Chamber of Commerce v. FEC, 69 F.3d 600, 603 (D.C. Cir. 1995).

[FN8] The government also offers the statement of the Deputy Assistant Attorney General for the Criminal Division before a congressional subcommittee in 2015, in which the DAAG stated that DOJ “has no interest in prosecuting harmless violations of use restrictions” and suggested amending the CFAA so that it would essentially only apply to the acts that currently give rise to a felony under the Access Provision. Statement of David M. Bitkower, Deputy Ass’t Att’y Gen., Crim. Div., Dep’t of Justice, Before the Subcomm. On Crime and Terrorism, S. Comm. on the Judiciary (July 8, 2015) [ECF No. 10-3] at 6. However, this is no stronger a disavowal than is DOJ’s statement in its charging policy. Moreover, Congress never adopted DOJ’s proposed amendments.

[FN9] Compare Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058, 1067 (9th Cir. 2016) (“[A] violation of the terms of use of a website—without more—cannot establish liability under the CFAA.”), cert. denied 138 S. Ct. 313 (2017) (mem.); Valle, 807 F.3d at 528 (rejecting unauthorized use reading of “exceeds authorized access” because “the government’s interpretation of ‘exceeds authorized access’ makes every violation of a private computer use policy a federal crime”); WEC Carolina, 687 F.3d at 206 (noting that the unauthorized use reading “would impute liability to an employee who with commendable intentions disregards his employer’s policy against downloading information to a personal computer so that he can work at home”), with EarthCam, Inc. v. OxBlue Corp., 703 Fed. App’x 803, 808 & n.2 (11th Cir. 2017) (stating that “one of the lessons from [circuit precedent] may be that a person exceeds authorized access if he or she uses the access in a way that contravenes any policy or term of use governing the computer in question,” and noting the dissenting views of other circuits); CollegeSource, Inc. v. AcademyOne, Inc., 597 Fed. App’x 116, 130 (3d Cir. 2015) (suggesting that defendants can be prosecuted under the CFAA if they “breach[ed] any technological barrier or contractual term of use”); EF Cultural Travel BV v. Zefer Corp., 318 F.3d 58, 62 (1st Cir. 2003) (“A lack of authorization could be established by an explicit statement on the website restricting access. . . . Many webpages contain lengthy limiting conditions, including limitations on the use of scrapers.”).

[FN10] Nor does the word “so,” which has inspired a good deal of exegesis in prior opinions, see WEC Carolina, 687 F.3d at 205–06; Nosal, 676 F.3d at 857–58, meaningfully change this focus. Read in the context of the phrase “so to obtain or alter,” “so” most naturally refers back to the earlier phrase “such access,” emphasizing that the accesser must not have been entitled to obtain or alter that particular information through the particular authorization used— even if, theoretically, there were another way in which the accesser might legally obtain or alter the information.

[FN11] A number of other courts have applied the rule of lenity to limit the scope of “exceeds authorized access.” See Valle, 807 F.3d at 526; WEC Carolina, 687 F.3d at 204; Nosal, 676 F.3d at 363. The rule of lenity “requires ambiguous criminal laws to be interpreted in favor of the defendants subjected to them.” DePierre v. United States, 564 U.S. 70, 88 (2011) (citation omitted). However, lenity is to be used “only ‘at the end of the process of construing what Congress has expressed’ when the ordinary canons of statutory construction have revealed no satisfactory construction.” Lockhart v. United States, 136 S. Ct. 958, 968 (2016) (citation omitted). Text, context, legislative history, congressional intent, and constitutional avoidance all point in one direction here. Because these tools “allow [the Court] to make far more than ‘a guess as to what Congress intended,’ the rule of lenity does not apply.” DePierre, 564 U.S. at 89. If the question were closer, however, lenity would undoubtedly come to plaintiffs’ aid.

[FN12] Professor Kerr argues that “a website that appears to require a username and password to access the contents of the site, but that actually grants access for any username and password combination,” should not be seen as creating an access restriction, because it “would appear to a user to regulate by code, but would actually work more like a system of regulation by contract.” Kerr, Cybercrime’s Scope, supra, at 1646. The distinction between code- based and contract-based barriers matters for First Amendment analysis, see supra Part II.A, but it does not quite line up with the Court’s reading of the CFAA. Social media sites like Facebook, for instance, grant access for any username and password combination, but they still allow those with accounts to access data that those who merely visit the site without signing up cannot. Hence, conditions placed on account creation can still be access restrictions.

[FN13] Courts normally subject free speech and free press claims to the same level of scrutiny. See, e.g., Citizens United, 558 U.S. at 352; McConnell v. FEC, 251 F. Supp. 2d 176, 234–35 (D.D.C.) (three-judge court) (per curiam), aff’d in part, rev’d in part, 540 U.S. 93 (2003). The Court will thus treat the speech claim as a proxy for both.

[FN14] The standard that governs expressive conduct prohibitions with “incidental limitations on First Amendment freedoms,” see United States v. O’Brien, 391 U.S. 367, 376 (1968), is inapposite to this as-applied claim. “The law here may be described as directed at conduct, . . . but as applied to plaintiffs the conduct triggering coverage under the statute consists of communicating a message.” Humanitarian Law Project, 561 U.S. at 28. Plaintiffs are informing the websites of who they are, and claiming to be employers, much in the same way that the defendant in Alvarez had claimed to be a decorated war veteran, or the plaintiffs in Humanitarian Law Project had sought to train terrorists to engage in peaceful activity. All of these forms of conduct communicate messages to the recipients. Moreover, it is the content of plaintiffs’ speech to the targeted websites—that they represent their identities falsely or misleadingly instead of truthfully—that triggers the sites’ ToS and, thereby, the criminal penalties of the CFAA. In other words, Mislove and Wilson would violate the Access Provision “because of the [false] content of [their] particular message.” Id. In these circumstances, the government must meet a “more demanding standard” than the O’Brien test. Id. (quoting Johnson, 491 U.S. at 403). Even if that test were applicable, however, “in the last analysis [it] is little, if any, different from the standard applied to time, place, or manner restrictions,” Johnson, 491 U.S. at 407, and incorporates narrow tailoring requirements, see Edwards, 755 F.3d at 1002–03, so the analysis would not meaningfully change.

2.2 Sandvig v. Sessions 2.2 Sandvig v. Sessions

Sandvig v. Sessions

UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA

CHRISTIAN W. SANDVIG, et al.,
Plaintiffs,
v.
JEFFERSON B. SESSIONS III,
in his official capacity as Attorney General of the United States,
Defendant.

Civil Action No. 16-1368 (JDB)
March 30, 2018

MEMORANDUM OPINION

It’s a dangerous business, reading the fine print. Nearly every website we visit features Terms of Service (“ToS”), those endless lists of dos and don’ts conjured up by lawyers to govern our conduct in cyberspace. They normally remain a perpetual click away at the bottom of every web page, or quickly scrolled past as we check the box stating that we agree to them. But to knowingly violate some of those terms, the Department of Justice tells us, could get one thrown in jail. This reading of federal law is a boon to prosecutors hoping to deter cybercrime. Yet it also creates a dilemma for those with more benign intentions. Plaintiffs in this case, for instance, are researchers who wish to find out whether websites engage in discrimination, but who have to violate certain ToS to do so. They have challenged the statute that they allege criminalizes their conduct, saying that it violates their free speech, petition, and due process rights. First, however, they must show that they have a sufficient injury to make it through the courthouse door, and that their suit is plausible enough to continue. For the following reasons, the Court finds that plaintiffs have standing, and that they can bring one (but not the rest) of their claims.

I. BACKGROUND

This case centers on a few sections of the Computer Fraud and Abuse Act (CFAA), a law dedicated to “deterring the criminal element from abusing computer technology.” H.R. Rep. No. 98–894, at 4 (1984). Plaintiffs directly challenge one section, referred to here as the Access Provision, which sweeps in the greatest amount of conduct. The Access Provision states that “[w]hoever . . . intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains . . . information from any protected computer . . . shall be punished as provided in subsection (c) of this section.” 18 U.S.C. § 1030(a)(2)(C). The CFAA defines “protected computer” to mean, among other things, “a computer . . . which is used in or affecting interstate or foreign commerce or communication.” Id. § 1030(e)(2)(B). This definition encompasses just about all computers hooked up to the Internet—including computers that house website servers. See, e.g., United States v. Nosal, 676 F.3d 854, 859 (9th Cir. 2012). The statute also defines “exceeds authorized access” as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). Thus, the Access Provision applies to anyone who purposely accesses an Internet-connected computer without authorization, or uses a legitimate authorization to receive or change information that they are not supposed to, and thereby obtains information from the computer.

The CFAA provides for a fine and/or imprisonment for up to one year upon a first violation of the Access Provision, or up to ten years for any further offenses. Id. § 1030(c)(2)(A), (C). However, the punishment for an initial violation rises to a sentence of up to five years’ imprisonment if the offense (1) “was committed for purposes of commercial advantage or private financial gain,” (2) was “in furtherance of any criminal or tortious act in violation of the Constitution” or state or federal law, or (3) involved obtaining information valued at more than $5,000. Id. § 1030(c)(2)(B). Thus, meeting one of these three conditions makes a first violation a felony; if none are met, the first violation is a misdemeanor.

Plaintiffs in this case are four professors and a media organization: Christian W. Sandvig of the University of Michigan; Kyratso “Karrie” Karahalios of the University of Illinois; Alan Mislove of Northeastern University; Christopher “Christo” Wilson of Northeastern University; and First Look Media Works, Inc. (“Media Works”), which publishes the online news platform The Intercept. Compl. [ECF No. 1] ¶¶ 13–14, 16–17, 19. Plaintiffs are conducting studies to respond to new trends in real estate, finance, and employment transactions, which increasingly have been initiated on the Internet. Id. ¶¶ 15, 18, 55. Data brokers assemble consumers’ information from myriad sources and place consumers into models that include racial, ethnic, socioeconomic, gender, and religious inferences about them. Id. ¶¶ 56–57. After brokers create consumer profiles, those profiles follow consumers around online through tracking technologies such as cookies. Id. ¶¶ 58–59. Tracking allows websites and advertisers to display content targeted at particular groups, based on consumers’ inferred characteristics or the sorts of websites they visit. Id. ¶¶ 59–60. But plaintiffs are concerned, “[g]iven the . . . history of racial discrimination in housing and employment,” that this technology may be “harnessed for discriminatory purposes.” Id. ¶ 61. They are also concerned that, “when algorithms automate decisions, there is a very real risk that those decisions will unintentionally have a prohibited discriminatory effect.” Id. ¶ 62.

One way to determine whether members of protected classes are being discriminated against is to engage in “outcomes-based audit testing.” Id. ¶ 67. Such testing commonly involves accessing a website or other network service repeatedly, generally by creating false or artificial user profiles, to see how websites respond to users who display characteristics attributed to certain races, genders, or other classes. Id. ¶ 70. This method is similar to classical paired testing procedures, in which multiple people—identical but for one legally protected trait—apply for the same house or job. Such procedures are often used to uncover violations of housing and employment discrimination laws in the physical world. Id. ¶¶ 41, 50, 52.

Plaintiffs plan to engage, and are engaging, in such audit testing. Sandvig and Karahalios are investigating whether computer programs that decide what to display on real estate websites discriminate against users based on race or other factors. Id. ¶ 82. They are writing a computer program that will create bots—automated agents that will each browse the Internet and interact with websites as a human user might. Id. ¶ 88. Each bot will create a number of distinct user profiles, each of which is called a “sock puppet.” Id. ¶ 89. Sandvig and Karahalios will program the bots to visit real estate websites and search for properties, while also engaging in behaviors correlated with members of a particular race. Id. ¶¶ 90–91. Sandvig and Karahalios will use an automatic data recording technique known as scraping to record the properties that each bot sees on the real estate sites. Id. ¶¶ 90, 92. They can then examine their data to determine whether race- associated behaviors caused the sock puppets to see different sets of properties. Id. ¶ 93.

Similarly, Mislove and Wilson plan to conduct a study to see whether hiring websites’ algorithms end up discriminating against job seekers based on protected statuses like race or gender. Id. ¶ 107. They will first use bots to crawl the profiles of a random selection of job- seekers to obtain baseline demographic data, then create fake employer profiles so that they can search for candidates and record how the algorithms rank those candidates.[FN1] Id. ¶¶ 114–17. They will also create fictitious sock-puppet job seeker profiles, and have the fictitious seekers—who will vary along different demographic axes—apply for fictitious jobs, to examine how the algorithms rank the candidates. Id. ¶¶ 118–19, 121–22. Mislove and Wilson will prevent real people from applying for the false jobs by giving them titles that say “[t]his is not a real job, do not apply,” and will delete the fictitious accounts and jobs when they finish. Id. ¶ 120.

Media Works and its journalists seek to investigate online companies, websites, and platforms, including by examining any discriminatory effects of their use of algorithms. Id. ¶ 130.

Mislove and Wilson plan to publish their findings in academic papers, and to bring the results of their research to the public. Id. ¶ 123. Media Works intends to use the results of its journalistic investigations to inform the public about online business practices. Id. ¶ 132. Sandvig and Karahalios do not explicitly claim that they will publish their work, but state that their findings “would produce important new scientific knowledge about the operation of computer systems, discrimination, and cumulative disadvantage.” Id. ¶ 94.

Plaintiffs are all aware that their activities will violate certain website ToS. Id. ¶¶ 95, 124, 131. All intend to use scraping to record data, which is banned by many of the websites plaintiffs seek to study. Id.; see id. ¶¶ 70–71. Many of the housing websites that Sandvig and Karahalios will study prohibit the use of bots. Id. ¶¶ 71, 95. All of the hiring websites that Mislove and Wilson will study prohibit the use of sock puppets, and most prohibit crawling. Id. ¶¶ 71, 124. Additionally, some websites control when and how visitors may speak about any information gained through the site—even in other forums—by including non-disparagement clauses in their ToS. Id. ¶ 72. Some sites also have ToS that require advance permission before using the sites for research purposes, which, plaintiffs allege, creates the possibility of viewpoint-discriminatory permission schemes. Id. ¶ 73. Aside from their ToS violations, plaintiffs’ experiments will have at most a minimal impact on the operations of the target websites. Id. ¶¶ 96, 125. All plaintiffs but Media Works have already begun some of the activities involved in their research plans, including activities that require violating websites’ TOS. Id. ¶¶ 98, 126.

Plaintiffs claim that they must either refrain from conducting research, testing, and investigations that (they argue) constitute protected speech or expressive activity, or else expose themselves to the risk of prosecution under the Access Provision of the CFAA. Id. ¶ 137. Plaintiffs therefore filed this suit against the Attorney General, raising four causes of action: (1) a facial overbreadth and as-applied challenge under the Free Speech and Free Press Clauses of the First Amendment, id. ¶¶ 180–86; (2) a First Amendment Petition Clause challenge, ¶¶ 187–93; (3) a vagueness claim under the Fifth Amendment’s Due Process Clause, id. ¶¶ 194–98; and (4) a claim of unconstitutional delegation to private parties under the Fifth Amendment, id. ¶¶ 199–202. The government has moved to dismiss under Federal Rules of Civil Procedure 12(b)(1) and 12(b)(6) for lack of standing and failure to state a claim. See Mot. to Dismiss [ECF No. 10].

II. DISCUSSION

We begin with the familiar standards that govern Rule 12(b) analysis. When facing a Rule 12(b)(1) motion to dismiss for lack of subject-matter jurisdiction, a plaintiff “bears the burden of showing that he has standing.” Summers v. Earth Island Inst., 555 U.S. 488, 493 (2009). Just because a plaintiff makes it through the courthouse doors on one claim does not mean that other claims can tag along; rather, a plaintiff “must demonstrate standing for each claim he seeks to press and for each form of relief that is sought.” Town of Chester v. Laroe Estates, Inc., 137 S. Ct. 1645, 1650 (2017) (citation omitted). On a motion to dismiss, plaintiffs must plead facts that, taken as true, raise a plausible standing claim. See Humane Soc’y of the U.S. v. Vilsack, 797 F.3d 4, 8 (D.C. Cir. 2015). The Court must take all facts alleged in the complaint as true and make all reasonable inferences in plaintiffs’ favor. See Gulf Coast Mar. Supply, Inc. v. United States, 867 F.3d 123, 128 (D.C. Cir. 2017). However, the Court “may consider materials outside the pleadings in deciding whether to grant a motion to dismiss for lack of jurisdiction.” Id.

To survive a motion to dismiss for failure to state a claim under Rule 12(b)(6), a complaint must “contain sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007)). Plausibility does not mean certainty, or that a claim is more likely to succeed than not, but rather that the claim at issue rises “above the speculative level.” Twombly, 550 U.S. at 555. In other words: if what plaintiffs lay out in the complaint actually happened, is it more than merely possible that the law has been violated? Plaintiffs cannot meet this standard through “[t]hreadbare recitals of the elements of a cause of action, supported by mere conclusory statements.” Iqbal, 556 U.S. at 678. Likewise, a court need not accept a plaintiff’s legal conclusions, even if they are dressed up as factual allegations. See Sickle v. Torres Advanced Enter. Sols., LLC, 884 F.3d 338, 345 (D.C. Cir. 2018). However, courts must accept as true all facts stated in the complaint, making all reasonable inferences in plaintiffs’ favor. Id.

A. THE INTERNET AS PUBLIC FORUM

At the outset, it is necessary to answer a question that affects both the standing and the merits inquiries in this case: what is the First Amendment status of the Internet? And, more particularly, what powers does the government possess to regulate activity on individual websites?

The government bases much of its argument that plaintiffs do not have standing, and that they have not alleged a First Amendment violation, on the premise that this case is about “a private actor’s abridgment of free expression in a private forum.” Reply in Supp. of Def.’s Mot. to Dismiss (“Def.’s Reply”) [ECF No. 15] at 2; see Mem. of P. & A. in Supp. of Def.’s Mot. to Dismiss (“Def.’s Mem.”) [ECF No. 10-1] at 10–13, 22–24. This argument finds some support in Supreme Court case law, which has rejected the First Amendment claims of individuals who wished to distribute handbills or advertise a strike in shopping centers against the wishes of the property owners. See Hudgens v. NLRB, 424 U.S. 507, 520 (1976); Lloyd Corp. v. Tanner, 407 U.S. 551, 567–68 (1972). Private property, the Court determined, does not “lose its private character merely because the public is generally invited to use it for designated purposes.” Lloyd, 407 U.S. at 569. Why, then, would it violate the First Amendment to arrest those who engage in expressive activity on a privately owned website against the owner’s wishes?

The answer is that, quite simply, the Internet is different. The Internet is a “dynamic, multifaceted category of communication” that “includes not only traditional print and news services, but also audio, video, and still images, as well as interactive, real-time dialogue.” Reno v. Am. Civil Liberties Union, 521 U.S. 844, 870 (1997). Indeed, “the content on the Internet is as diverse as human thought.” Id. (citation omitted). Only last Term, the Supreme Court emphatically declared the Internet a primary location for First Amendment activity: “While in the past there may have been difficulty in identifying the most important places (in a spatial sense) for the exchange of views, today the answer is clear. It is cyberspace . . . .” Packingham v. North Carolina, 137 S. Ct. 1730, 1735 (2017) (citation omitted).

With this special status comes special First Amendment protection. The Packingham Court applied public forum analysis to a North Carolina law that banned former sex offenders from using social media websites, employing intermediate scrutiny because the law was content-neutral. See id. at 1736. The fact that the statute restricted access to particular websites, run by private companies, did not change the calculus. Consider: on one of the sites the Court treated as an exemplar of social media, LinkedIn, “users can look for work, advertise for employees, or review tips on entrepreneurship,” id. at 1735—the same activities in which Mislove and Wilson wish to engage for their research. As the Court warned, the judiciary “must exercise extreme caution before suggesting that the First Amendment provides scant protection for access to vast networks in [the modern Internet].” Id. at 1736. The government’s proposed public/private ownership distinction cannot account for the Court’s determination in Packingham that privately-owned sites like Facebook, LinkedIn, and Twitter are part of a public forum, government regulation of which is subject to heightened First Amendment scrutiny. The Internet “is a forum more in a metaphysical than in a spatial or geographic sense, but the same principles are applicable.” Rosenberger v. Rector & Visitors of Univ. of Virginia, 515 U.S. 819, 830 (1995).

An analogy to the real world, while necessarily imperfect, may help illustrate the point. Stroll out onto the National Mall on any day with decent weather and you will discover a phalanx of food trucks lining the streets. Those food trucks are privately owned businesses. Customers interact with them for the private purpose of buying a meal. If they were a brick-and-mortar store on private property, they would encounter no First Amendment barrier to removing a patron who created a ruckus. Yet if a customer standing on a public sidewalk tastes her food and then yells at those in line behind her that they should avail themselves of the myriad other culinary options nearby, the truck could not call the police to arrest her for her comments. She is in a public forum, and her speech remains protected even when she interacts with a private business located within that forum.

It makes good sense to treat the Internet in this manner. “Each medium of expression . . . must be assessed for First Amendment purposes by standards suited to it, for each may present its own problems.” Se. Promotions, Ltd. v. Conrad, 420 U.S. 546, 557 (1975). Regulation of the Internet presents serious line-drawing problems that the public/private distinction in physical space does not. The decisions in Lloyd and Hudgens concerned “property privately owned and used nondiscriminatorily for private purposes only.” Lloyd, 407 U.S. at 568. It is difficult to argue that most websites readily meet this description. As the Supreme Court has recognized, the Internet “provides relatively unlimited, low-cost capacity for communication of all kinds.” Reno, 521 U.S. at 870. Much of this communication takes place on websites that, in the physical world, would be seen solely as private, commercial spaces. Take Amazon.com. As a “popular retail website,” Amazon undoubtedly has a private use “as a seller of products.” Packingham, 137 S. Ct. at 1741 (Alito, J., concurring in the judgment). Yet the site also “facilitates the social introduction of people for the purpose of information exchanges,” since it “allows a user to create a personal profile” and, “[w]hen someone purchases a product on Amazon, the purchaser can review the product and upload photographs, and other buyers can then respond to the review.” Id. Conversely, Facebook—to which the Court pointed in Packingham as a quintessential site for protected First Amendment activity—allows users to buy and sell products in its Marketplace, and, like many social media sites, sells ads to make revenue.[FN2] Simply put: the public Internet is too heavily suffused with First Amendment activity, and what might otherwise be deemed private spaces are too blurred with expressive spaces, to sustain a direct parallel to the physical world.

At the same time, however, it would be ill-advised to “equate the entirety of the [I]nternet with public streets and parks.” Id. at 1738 (emphasis added). To do so would “gloss[] over the dual public and private nature of digital arenas,” and subject to heightened scrutiny regulations on even the Internet’s most secluded nooks and crannies. Note, First Amendment-Freedom of Speech-Public Forum Doctrine-Packingham v. North Carolina, 131 Harv. L. Rev. 233, 238 (2017). Rifling through a business’s confidential files is no less a trespass merely because those files are located in the cloud. A hacker cannot legally break into a Gmail account and copy the account-holder’s emails, just as a busybody cannot legally reach into someone else’s mailbox and open her mail. The First Amendment does not give someone the right to breach a paywall on a news website any more than it gives someone the right to steal a newspaper.

What separates these examples from the social media sites in Packingham is that the owners of the information at issue have taken real steps to limit who can access it. But simply placing contractual conditions on accounts that anyone can create, as social media and many other sites do, does not remove a website from the First Amendment protections of the public Internet. If it did, then Packingham—which examined a law that limited access to websites that require user accounts for full functionality—would have come out the other way. 137 S. Ct. at 1737; see also Orin S. Kerr, Cybercrime’s Scope: Interpreting “Access” and “Authorization” in Computer Misuse Statutes, 78 N.Y.U. L. Rev. 1596, 1658 (2003) (“Applying a contract-based theory of authorization in a criminal context . . . may be constitutionally overbroad, criminalizing a great deal beyond core criminal conduct, including acts protected by the First Amendment.”). Rather, only code-based restrictions, which “carve[] out a virtual private space within the website or service that requires proper authentication to gain access,” remove those protected portions of a site from the public forum. Orin S. Kerr, Essay, Norms of Computer Trespass, 116 Colum. L. Rev. 1143, 1171 (2016). Stealing another’s credentials, or breaching a site’s security to evade a code-based restriction, therefore remains unprotected by the First Amendment.

To return to the National Mall example, suppose that a food truck remains stationed on the Mall but boards up for the night, and the owner returns home. By shutting the food in a truck, perhaps along with her cooking instructions, the owner has placed a barrier between that property and the public forum outside. Thus, while the police could not arrest a customer for telling others in line that the food tastes terrible, or for reading the menu on the truck’s exterior, they could arrest

that customer for breaking into the boarded-up truck seeking confidential culinary information. This is true even if the customer claimed she was doing so in order to broadcast to the world the truck’s substandard ingredients and ill-conceived recipes. While the First Amendment has free rein on the Mall generally, it does not protect those who circumvent barriers that demarcate private areas, even if those private areas are surrounded by an otherwise public forum. This distinction guides the Court’s analysis here.

B. STANDING

Before reaching the merits of plaintiffs’ claims, the Court must assure itself that they have standing—a sufficient stake to transform this dispute into one of the “Cases” or “Controversies” on which federal courts may pass judgment. U.S. Const. art. III, § 2. “The ‘irreducible constitutional minimum of standing contains three elements’: (1) injury-in-fact, (2) causation, and (3) redressability.” Rainbow/PUSH Coal. v. FCC, 330 F.3d 539, 542 (D.C. Cir. 2003) (quoting Lujan v. Defs. of Wildlife, 504 U.S. 555, 560 (1992)). Plaintiffs must plead or prove each element of standing “with the manner and degree of evidence required at the successive stages of the litigation.” Lujan, 504 U.S. at 561. Here, therefore, “general factual allegations of injury resulting from the defendant’s conduct may suffice” to allege standing, “for on a motion to dismiss we ‘presum[e] that general allegations embrace those specific facts that are necessary to support the claim.’” Id. (alteration in original) (citation omitted). For any given claim or form of relief, “the presence of one party with standing is sufficient” to reach the issue. Rumsfeld v. Forum for Acad. & Institutional Rights, Inc., 547 U.S. 47, 53 n.2 (2006).

Because this is a pre-enforcement challenge, plaintiffs must meet more specific conditions to satisfy the injury-in-fact requirement. They must plausibly allege “an intention to engage in a course of conduct [1] arguably affected with a constitutional interest, but [2] proscribed by a statute, and [3] [that] there exists a credible threat of prosecution thereunder.” Susan B. Anthony List v. Driehaus, 134 S. Ct. 2334, 2342 (2014) (quoting Babbitt v. United Farm Workers Nat’l Union, 442 U.S. 289, 298 (1979)). The government argues that plaintiffs cannot meet this test. See Def.’s Mem. at 8–19. Plaintiffs contend that they do intend to engage in constitutionally protected speech, and that they have pled a credible threat of prosecution. See Pls.’ Mem. of P. & A. in Opp’n to Def.’s Mot. to Dismiss (“Pls.’ Mem.”) [ECF No. 13] at 18–30. It is clear that any injury to plaintiffs is caused by the government’s criminalization of websites’ ToS, and that the declaratory and injunctive relief plaintiffs seek, see Compl. at 46–47, would redress the injury. Therefore, the question is whether plaintiffs allege a sufficient injury in the first place.

Generally speaking, a court’s standing analysis must be “especially rigorous when reaching the merits of the dispute would force us to decide whether an action taken by one of the other two branches of the Federal Government was unconstitutional.” Raines v. Byrd, 521 U.S. 811, 819– 20 (1997). However, the D.C. Circuit has interpreted the Supreme Court’s pre-enforcement standing doctrine broadly in the First Amendment sphere. Indeed, “the courts have shown special solicitude to pre-enforcement challenges brought under the First Amendment.” N.Y. Republican State Comm. v. SEC, 799 F.3d 1126, 1135 (D.C. Cir. 2015). Therefore, the Circuit has found, “the courts’ willingness to permit pre-enforcement review is ‘at its peak’ when claims are rooted in the First Amendment.” Id. at 1135 (citation omitted). “Pre-enforcement review, particularly in the First Amendment context, does not require plaintiffs to allege that they ‘will in fact’ violate the regulation in order to demonstrate an injury.” U.S. Telecom Ass’n v. FCC, 825 F.3d 674, 739 (D.C. Cir. 2016) (quoting Driehaus, 134 S. Ct. at 2345), reh’g en banc denied, 855 F.3d 381 (D.C. Cir.), cert. docketed, No. 17-504 (U.S. Oct. 3, 2017). Nor need they show that they are likely to be prosecuted. Rather, “[s]tanding ‘to challenge laws burdening expressive rights requires only a credible statement by the plaintiff of intent to commit violative acts and a conventional background expectation that the government will enforce the law.’” Id. (quoting Act Now to Stop War & End Racism Coal. v. District of Columbia (ANSWER I), 589 F.3d 433, 435 (D.C. Cir. 2009)).

1. “Arguably Affected With a Constitutional Interest”

Plaintiffs assert that their conduct falls within three categories of First Amendment- protected activity. Scraping data from their target websites, they allege, is subject to the First Amendment right to record or preserve information. Pls.’ Mem. at 10–14. Moreover, employing bots and sock puppets and creating false user accounts constitute harmless false speech. Id. at 14– 17. And their planned post-research activities are protected by the right to publish. Id. at 17–18. All of these claims are sufficiently plausible to conclude that plaintiffs’ proposed conduct is “arguably affected with a constitutional interest.” Driehaus, 134 S. Ct. at 2342.

First, scraping plausibly falls within the ambit of the First Amendment. “[T]he First Amendment goes beyond protection of the press and the self-expression of individuals to prohibit government from limiting the stock of information from which members of the public may draw.” First Nat. Bank of Boston v. Bellotti, 435 U.S. 765, 783 (1978). The Supreme Court has made a number of recent statements that give full First Amendment application to the gathering and creation of information.[FN3] Additionally, six courts of appeals have found that individuals have a First Amendment right to record at least some matters of public interest, in order to preserve and disseminate ideas.[FN4] That plaintiffs wish to scrape data from websites rather than manually record information does not change the analysis. Scraping is merely a technological advance that makes information collection easier; it is not meaningfully different from using a tape recorder instead of taking written notes, or using the panorama function on a smartphone instead of taking a series of photos from different positions. And, as already discussed, the information plaintiffs seek is located in a public forum. Hence, plaintiffs’ attempts to record the contents of public websites for research purposes are arguably affected with a First Amendment interest.

Second, plaintiffs have a First Amendment interest in harmlessly misrepresenting their identities to target websites. The complaint alleges that plaintiffs’ research requires them to create false employer and job-seeker profiles on employment websites, and to use sock puppets to make it appear to a number of housing and employment sites that multiple people are accessing the information they have made available. Compl. ¶¶ 88–93, 114–21. Because “some false statements are inevitable if there is to be an open and vigorous expression of views in public and private conversation,” and because “[t]he Government has not demonstrated that false statements generally should constitute a new category of unprotected speech,” false claims that are not “made to effect a fraud or secure moneys or other valuable considerations” fall within First Amendment protection. United States v. Alvarez, 567 U.S. 709, 718, 722–23 (2012). Plaintiffs allege that their conduct will cause minimal, if any, harm to the targeted websites, and that they will take steps to avoid affecting third-party users of the website (such as informing job seekers that their fake positions are fake). Compl. ¶¶ 96, 120, 125. Thus, plaintiffs’ harmless false or misleading speech to website owners is arguably affected with a constitutional interest.[FN5]

Third, plaintiffs contend that they have the right, and the desire, to publish the results of their research, and that some sites’ ToS prohibit them from doing so without prior permission or else employ anti-disparagement clauses. Pls.’ Mem. at 17. The Supreme Court has made very clear that the right to publish falls within the core of the First Amendment’s protections. See, e.g., Bartnicki v. Vopper, 532 U.S. 514, 527 (2001) (“As a general matter, ‘state action to punish the publication of truthful information seldom can satisfy constitutional standards.’” (quoting Smith v. Daily Mail Publishing Co., 443 U.S. 97, 102 (1979)). Applying criminal sanctions for publishing original material that uses publicly available information, or for making negative statements about a website, triggers First Amendment scrutiny.

The government raises two overarching objections to all of these alleged rights. It initially claims that the First Amendment does not regulate the decisions that private entities make about how to control access to their private websites—in other words, that there is no state action here. See Def.’s Mem. at 21–24; Def.’s Reply at 6–12; see also Columbia Broad. Sys., Inc. v. Democratic Nat. Comm., 412 U.S. 94, 114 (1973) (“[The First Amendment] is a restraint on government action, not that of private persons.”). However, private speech prohibitions can still implicate the First Amendment when given the imprimatur of state protection through civil or criminal law. See, e.g., New York Times Co. v. Sullivan, 376 U.S. 254, 265 (1964). Moreover, plaintiffs claim injury from a potential criminal action against them—and “a criminal prosecution under the CFAA would undoubtedly constitute state action” because the government itself is policing website ToS violations. hiQ Labs, Inc. v. LinkedIn Corp., 273 F. Supp. 3d 1099, 1114 n.12 (N.D. Cal. Aug. 14, 2017), appeal docketed, No. 17-16783 (9th Cir. Sept. 6, 2017).

The government also claims that the First Amendment does not protect plaintiffs’ conduct because, under Zemel v. Rusk, 381 U.S. 1, 16–17 (1965), and Houchins v. KQED, Inc., 438 U.S. 1, 10–11 (1978) (plurality opinion), the First Amendment does not create a right to acquire information in whatever manner one desires. Def.’s Mem. at 10–12. In Zemel, the Court held that the government did not implicate any First Amendment rights by refusing to issue the plaintiff a passport to visit Cuba, which the plaintiff claimed interfered with his ability to acquaint himself with the effects of the government’s policies in relation to Cuba. 381 U.S. at 16. The Court rejected the claim, stating that “[t]he right to speak and publish does not carry with it the unrestrained right to gather information.” Id. at 17. Then, in Houchins, the Court held that journalists had no special First Amendment right to access inmates in a jail just because they sought to write stories about the jail; the Court rejected the “notion that the First Amendment confers a right of access to news sources.” 438 U.S. at 11. However, the Court did note that “[t]he right to receive ideas and information is not the issue in this case,” and that “[t]he issue is a claimed special privilege of access.” Id. at 12. Thus, “[t]here is an undoubted right to gather news ‘from any source by means within the law,’” but the First Amendment does not “compel[] others—private persons or governments—to supply information.” Id. at 11.

Here, plaintiffs are not asking the Court to force private websites to provide them with information that others cannot get. Instead, they seek only to prevent the government from prosecuting them for obtaining or using information that the general public can access—though they wish to do so in a manner that could have private consequences, such as a website banning them or deleting their accounts. See Compl. ¶ 4 (“[Plaintiffs] have no intent . . . to access any data or information that is not made available to the public.”). Because plaintiffs neither want a special privilege of access nor seek to force websites to give them otherwise unobtainable information, the Zemel and Houchins line of cases is inapposite here. Plaintiffs therefore plausibly allege that their conduct is arguably affected with a constitutional interest.

2. “Proscribed by a Statute”

Under D.C. Circuit precedent, “at the motion to dismiss stage, a plaintiff’s non-frivolous contention regarding the meaning of a statute must be taken as correct for purposes of standing.” Info. Handling Servs., Inc. v. Def. Automated Printing Servs., 338 F.3d 1024, 1030 (D.C. Cir. 2003). Because plaintiffs’ reading of the statute to encompass all ToS violations is not frivolous, and because plaintiffs allege that their conduct would violate websites’ ToS, it is clear for standing purposes that their intended actions would violate the statute.

The government contests this conclusion in only one instance. In two sentences in its reply brief, the government claims that plaintiffs lack standing for any injuries relating to their ability to publish. As the government sees it, “[t]he Complaint contains no allegation that any website on which plaintiffs intend to conduct their activity contains” a restriction on future publication, “and plaintiffs lack standing to assert claims based on hypothetical circumstances.” Def.’s Reply at 12.

This argument is unavailing. True, plaintiffs do not explicitly allege that their target websites restrict subsequent publication. But the complaint does allege that “[p]laintiffs wish to . . . report on their findings to the public,” and that “[t]he research, testing, and investigative methods they have designed would, if carried out, violate the [Access] Provision, because they all require violating the [ToS] of the targeted website.” Compl. ¶¶ 134–35 (emphasis added); see also id. ¶ 160 (“Plaintiffs wish to have the option of publishing the results of their research, including any findings of discrimination, even if a target website’s ToS prohibit doing so.”). “[O]n a motion to dismiss we presum[e] that general allegations embrace those specific facts that are necessary to support the claim.” Food & Water Watch, Inc. v. Vilsack, 808 F.3d 905, 913 (D.C. Cir. 2015) (second alteration in original) (citation omitted). Plaintiffs’ allegations allow for the presumption that reporting on their research findings would violate some targeted websites’ ToS. While far from the degree of proof necessary for summary judgment, see Lujan, 504 U.S. at 561, at this early stage plaintiffs have plausibly alleged that the CFAA prevents all of their conduct.

3. “Credible Threat of Prosecution”

Even if plaintiffs’ intended conduct is arguably affected with a constitutional interest, and is prohibited by the CFAA, plaintiffs still must show that there is a credible threat of prosecution for that conduct under the statute. See Driehaus, 134 S. Ct. at 2342. The government asserts that plaintiffs cannot meet this test, because “plaintiffs make no allegation that the government has threatened them with CFAA enforcement,” plaintiffs “cite no instances in which the government has enforced the challenged provision for harmless [ToS] violations,” and DOJ “has expressly stated that it has no intention of prosecuting harmless [ToS] violations that are not in furtherance of other criminal activity or tortious conduct.” Def.’s Reply at 13. The government is, for the most part, correct on the facts. The complaint does not allege that plaintiffs have actually been threatened with prosecution. The two cases plaintiffs cite to show that prosecutors have used the Access Provision to punish ToS violations did, in fact, involve harmful conduct. And DOJ’s guidance to federal prosecutors does discourage them—though somewhat tepidly—from bringing CFAA cases based solely on harmless ToS violations. See U.S. Att’y Gen., Intake and Charging Policy for Computer Crimes Matters (“Charging Policy”) (Sept. 11, 2014) [ECF No. 15–1] at 5.

However, both Supreme Court and D.C. Circuit precedent create a low standing bar in cases like this one. Because plaintiffs “challenge [a] law[] burdening expressive rights,” and because their complaint provides “a credible statement . . . of intent to commit violative acts,” plaintiffs may rely on the “conventional background expectation that the government will enforce the law.” U.S. Telecom Ass’n, 825 F.3d at 739 (citation omitted); accord Act Now to Stop War & End Racism Coal. v. District of Columbia (ANSWER II), 846 F.3d 391, 401–02 (D.C. Cir. 2017), cert. denied, 138 S. Ct. 334 (2017) (mem.). Indeed, the D.C. Circuit has occasionally found standing without inquiring into whether the government has actually enforced the challenged restriction. See U.S. Telecom Ass’n, 825 F.3d at 739–40.

Here, there are sufficient indications of a credible threat to enforce the Access Provision, both in general and as applied to plaintiffs’ activities. To begin with, the parties have sparred over whether DOJ has enforced the Access Provision specifically against harmless ToS violations. See Compl. ¶ 31; Def.’s Mem. at 14–17; Pls.’ Mem. at 3–4, 25. Yet a number of cases have looked to whether the statutory provision as a whole—or at least the particular term being challenged—has been enforced through prosecutions, without asking whether the facts were similar to those the plaintiffs alleged. See, e.g., Holder v. Humanitarian Law Project, 561 U.S. 1, 16 (2010); Babbitt, 442 U.S. at 302; N. Carolina Right to Life, Inc. v. Bartlett, 168 F.3d 705, 710 (4th Cir. 1999). If one need only find a history of enforcement of the Access Provision generally, or enforcement of the “exceeds authorized access” language in particular, plaintiffs would have no trouble showing that there is a significant history. Indeed, the Supreme Court decided a case just two years ago that involved a prosecution under the Access Provision, in part for exceeding authorized access. Musacchio v. United States, 136 S. Ct. 709, 713 & n.1 (2016).[FN6]

Even looking more closely at similar factual scenarios, plaintiffs have shown that prosecutions have stemmed from close enough facts that it would be credible to fear a future prosecution for their own activities. Plaintiffs cite two cases in which individuals were prosecuted under the Access Provision for violating ToS agreements: United States v. Lowson, No. 10-cr-114 (KSH), 2010 WL 9552416 (D.N.J. Oct. 12, 2010), and United States v. Drew, 259 F.R.D. 449 (C.D. Cal. 2009). Compl. ¶ 31. Lowson, as the government points out, did not solely involve violations of website ToS; it also involved ticket scalpers’ attempts “to defeat code-based security restrictions” on Ticketmaster’s website. 2010 WL 9552416, at *5. However, the indictment alleged “both contract- and code-based violations,” id. at *6, and laid out the websites’ prohibitions that the defendants allegedly violated, see Superseding Indictment at 5–9, Lowson, 2010 WL 9552416 (No. 10-cr-114), ECF No. 10-2. More directly on point is Drew, in which the government prosecuted a woman for lying about her age and creating a false account on Myspace in order to cyberbully her daughter’s teenage classmate—thus violating Myspace’s ToS in order to commit the tort of intentional infliction of emotional distress. 259 F.R.D. at 452. Prosecutors included both a felony count under the Access Provision—because the violation was in furtherance of a tortious act—and a misdemeanor count for the standalone ToS violations. Id. at 451. The jury acquitted Drew on the felony count, id.; the court then dismissed the misdemeanor conviction, as coverage of ToS violations rendered the Access Provision unconstitutionally vague, id. at 467.

That the government brought the Drew case without enough evidence to ultimately prove the added harm required for a felony conviction, and chose to include a misdemeanor count for harmless ToS violations, lends some credibility to plaintiffs’ fears of prosecution. The government also does not know whether prosecutors may have employed the Access Provision to obtain plea agreements in which defendants admitted to harmless ToS violations. See Tr. of Mot. Hr’g [ECF No. 20] at 17:15–18:13.[FN7] These prior prosecutions, whether under the Access Provision generally or under related factual circumstances, provide “somewhat more than the ‘conventional background expectation that the government will enforce the law.’” ANSWER I, 589 F.3d at 435 (citation omitted). Thus, even if more were necessary, plaintiffs have provided it.

Finally, the government has not expressly disavowed any intent to prosecute plaintiffs, which would defeat the normal expectation of enforcement. The government points to a 2014 memorandum that the Attorney General sent to United States Attorneys regarding charging policy under the CFAA, which the government claims is the current “binding guidance” on this issue. Def.’s Reply at 14. According to the government, plaintiffs’ fear of prosecution is “implausible” because (1) the charging policy focuses on several factors that would not apply to harmless ToS violations, (2) prosecutions based solely on such violations are discouraged, and (3) attorneys must consult with the Criminal Division of DOJ before making CFAA charging decisions. Id. However, to disprove an otherwise credible threat of prosecution, courts have normally required an explicit statement “that plaintiffs will not be prosecuted if they do what they say they wish to do.” Humanitarian Law Project, 561 U.S. at 16. The government has not made such a declaration. DOJ’s charging policy states that, “if the defendant exceeded authorized access solely by violating an access restriction contained in a contractual agreement or [ToS] with an Internet service provider or website, federal prosecution may not be warranted.” Charging Policy at 5 (emphasis added). This is a far cry from the sort of disavowal required by case law.[FN8]

In an attempt to provide such a disavowal, and at the Court’s suggestion, the government filed an affidavit from John T. Lynch, Jr., Chief of the Computer Crime and Intellectual Property Section of the Criminal Division of DOJ. Aff. of John T. Lynch, Jr. [ECF No. 21-1]. He points to the charging factors mentioned above, id. at 2–3, and states that he “do[es] not expect that the Department would bring a CFAA prosecution based on such facts and de minimis harm,” id. at 3. But many things that we do not expect in fact come to pass. An official’s prognostication does not substitute for a declaration of non-prosecution. Moreover, even explicit disavowals are most valuable when they are made “on the basis of the Government’s own interpretation of the statute and its rejection of plaintiffs’ interpretation as unreasonable.” Blum v. Holder, 744 F.3d 790, 798 (1st Cir. 2014). Here, the government has implicitly—and in past prosecutions, explicitly—read the Access Provision to include ToS violations. See Charging Policy at 4–5. “[T]o rely upon prosecutorial discretion to narrow the otherwise wide-ranging scope of a criminal statute’s highly abstract general statutory language places great power in the hands of the prosecutor.” Marinello v. United States, No. 16-1144, 2018 WL 1402426, at *6 (U.S. Mar. 21, 2018). The Constitution “does not leave us at the mercy of noblesse oblige,” United States v. Stevens, 559 U.S. 460, 480 (2010), which is all the government ultimately offers.

One final point. Until now, this standing analysis has focused on plaintiffs’ First Amendment challenge. But plaintiffs also bring due process claims. In Seegars v. Gonzales, 396 F.3d 1248 (D.C. Cir. 2005), the D.C. Circuit applied a more rigorous “imminence” standard for non-First-Amendment constitutional claims. But the court took pains to point out that it was forced to follow circuit precedent that conflicted with the Supreme Court’s and the D.C. Circuit’s own laxer standing test for First Amendment pre-enforcement challenges. See id. at 1252–54. Subsequent cases have confirmed that the “more demanding standard” required by Seegars does not apply when challenging “laws burdening expressive rights.” ANSWER I, 589 F.3d at 435. Here, plaintiffs’ Fifth Amendment claims allege an injury-in-fact essentially identical to that alleged for their First Amendment claims. Pls.’ Mem. at 23 n.2. Both the Supreme Court and the D.C. Circuit have upheld standing for dual First- and Fifth-Amendment pre-enforcement challenges, under a less rigorous imminence standard, without distinguishing between the two amendments for standing purposes. See Humanitarian Law Project, 561 U.S. at 11–12, 15–16; ANSWER II, 846 F.3d at 396, 401–02; ANSWER I, 589 F.3d at 434–35. Plaintiffs therefore have standing to bring their Fifth Amendment claims along with their First Amendment ones.

For the foregoing reasons, plaintiffs have plausibly pled standing at the motion to dismiss stage, and the government’s Rule 12(b)(1) motion will be denied.

C. INTERPRETING THE STATUTE

Plaintiffs allege only constitutional claims in this case. Likely because they are bringing a pre-enforcement challenge, they are not claiming that the statute, properly read, does not apply to them. However, nearly all of their claims require the Court to determine the reach of the Access Provision before deciding the constitutional question. Since the Court does not accept plaintiffs’ legal conclusions as true for purposes of a motion to dismiss under Rule 12(b)(6), see Doe v. Rumsfeld, 683 F.3d 390, 391 (D.C. Cir. 2012), plaintiffs’ reading of the statute to cover their conduct does not control. Instead, the Court must interpret the law.

Courts are split as to how to read the relevant provisions. The CFAA defines the phrase “exceeds authorized access” as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). The Second, Fourth, and Ninth Circuits have held that this language prohibits only unauthorized access to information. See United States v. Valle, 807 F.3d 508, 523– 28 (2d Cir. 2015); WEC Carolina Ener. Solutions LLC v. Miller, 687 F.3d 199, 206 (4th Cir. 2012); Nosal, 676 F.3d at 863; see also Pulte Homes, Inc. v. Laborers’ Int’l Union of N. Am., 648 F.3d 295, 304 (6th Cir. 2011) (stating, based on Ninth Circuit precedent, that “an individual who is authorized to use a computer for certain purposes but goes beyond those limitations . . . has ‘exceed[ed] authorized access’” (citation omitted) (alteration in original)). Meanwhile, the First, Fifth, and Eleventh Circuits have held that it also covers (at least in some instances) unauthorized use of information that a defendant was authorized to access only for specific purposes. See EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577, 583 (1st Cir. 2001); United States v. John, 597 F.3d 263, 271 (5th Cir. 2010); United States v. Rodriguez, 628 F.3d 1258, 1263 (11th Cir. 2010); see also Int’l Airport Centers, LLC v. Citrin, 440 F.3d 418, 420–21 (7th Cir. 2006) (holding that an employee who deleted his employer’s files in violation of his employment contract had terminated the agency relationship that authorized him to access the information). Courts have also split over whether violating a website’s ToS exceeds authorized access for purposes of the CFAA.[FN9] The D.C. Circuit has never opined on either question. Several district judges in this Circuit, however, have held that the provision only applies to unauthorized access to information, not to unauthorized use of properly accessed material. See Hedgeye Risk Mgmt., LLC v. Heldman, 271 F. Supp. 3d 181, 194–95 (D.D.C. 2017) (collecting cases).

At one point in their briefing, plaintiffs suggest a different dividing line: a limiting construction that carves out harmless ToS violations from the statute. Pls.’ Mem. at 31–33, 35. However, “[t]he text will not bear such a reading.” INS v. Yueh-Shaio Yang, 519 U.S. 26, 30 (1996). It is one thing to carve out such violations by determining that the statute is unconstitutional as applied, but the text of the statute itself—“exceeds authorized access”—and its statutory definition do not appear to allow for such a surgical slicing off of conduct. How does the text differentiate between ToS violations and violations of employers’ computer use policies, for instance? And how does the text distinguish between “[ToS] violations alone,” Pls.’ Mem. at 35, and ToS violations that cause damage or involve fraud, which plaintiffs admit are covered by §§ 1030(a)(4) and (a)(5), id. at 31–32? One can just as easily “use [authorized] access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter,” § 1030(e)(6), whether it is a website or some other entity that is doing the authorizing, and whether the violation is harmful or harmless.

The question thus remains whether “exceeds authorized access” refers to access alone or to access, use, and other violations. The Court finds the narrow interpretation adopted by the Second, Fourth, and Ninth Circuits—and by numerous other district judges in this Circuit—to be the best reading of the statute. First, the text itself more naturally reads as limited to violations of the spatial scope of one’s permitted access. To “exceed[] authorized access,” one must have permission to access the computer at issue, and must “use such access”—i.e., one’s authorized presence on the computer—“to obtain or alter information in the computer.” Id. Thus, unlike the phrase “unauthorized access” used alongside it in several CFAA provisions, the phrase “exceeds authorized access” refers not to an outside attack but rather to an inside job. See, e.g., Nosal, 676 F.3d at 858. The rest of the definition requires that the information at issue be information “that the accesser is not entitled so to obtain or alter.” Id. The key word here is “entitled.” “And, in context, the most ‘sensible reading of “entitled” is as a synonym for “authorized.”’” Hedgeye, 271 F. Supp. 3d at 194 (quoting Nosal, 676 F.3d at 857). The focus is thus on whether someone is allowed to access a computer at all, in the case of “unauthorized access,” or on whether someone is authorized to obtain or alter particular information, in the case of “exceeds authorized access.” In neither instance does the statute focus on how the accesser plans to use the information.[FN10]

The statutory context buttresses this narrower reading of the text. Reading “exceeds authorized access” to turn on the accesser’s purpose in seeking out the information would eliminate a major difference between the Access Provision—which has no purpose requirement—and other provisions that require intent to defraud. E.g., 18 U.S.C. § 1030(a)(4). It would also water down the difference between the misdemeanor penalty provisions and the felony provisions that enhance sentences for violations committed for fraud or financial gain. Id. § 1030(c)(2); see also S. Rep. No. 104-357, at 8 (1996) (“[T]he statutory penalties are structured to provide that obtaining information of minimal value is only a misdemeanor, but obtaining valuable information, or misusing information in other more serious ways, is a felony.” (emphasis added)). After all, just about any attempt to use proprietary information to defraud or for personal or commercial gain would likely violate a computer use policy or website ToS. See Nosal, 676 F.3d at 858 n.4. Congress knew how to draft a specific intent requirement, and did so in these other sections of the CFAA. It would be rather odd, then, for Congress to also smuggle a specific intent factor into its definition of the actus reus of the offense. While this context is certainly not dispositive— Congress often drafts overlapping or even redundant provisions—it is best to avoid readings that “would render superfluous another part of the same statutory scheme.” Marx v. Gen. Revenue Corp., 568 U.S. 371, 386 (2013).

Legislative history also points to an access-based, rather than an intended-use-based, reading of “exceeds authorized access.” The Second Circuit has already canvassed in great detail the congressional intent and history behind the definition of “exceeds authorized access,” see Valle, 807 F.3d at 525–26, and this Court will not repeat it here. This Court agrees with the Second Circuit, however, that “the legislative history consistently characterizes the evil to be remedied— computer crime—as ‘trespass’ into computer systems or data, and correspondingly describes ‘authorization’ in terms of the portion of the computer’s data to which one’s access rights extend.” Id. at 525. Congress thus viewed exceeding authorized access as the digital equivalent of being allowed into a house but entering a room within it that the owner has declared to be off-limits. A sensible conception, particularly considering that the language at issue was written in 1986— before the World Wide Web or websites existed. See Kerr, Norms of Computer Trespass, supra, at 1161.

The amendment history of the definition supports this reading. The initial language of the CFAA applied to anyone who, knowingly “having accessed a computer with authorization, uses the opportunity such access provides for purposes to which such authorization does not extend, and thereby obtains information.” Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, Pub. L. No. 98-473, tit. II, ch. 21, § 2102(a), 98 Stat. 1837, 2190–91 (emphasis added). In 1986, however, in a section entitled “Modification of Authorized Access Aspect of Offenses,” Congress replaced this language with the phrase “exceeds authorized access,” and, in a section entitled “Conforming Amendments to Definitions Provision,” added the current definition of that phrase. See Computer Fraud and Abuse Act of 1986, Pub. L. No. 99-474, § 2(c), (g)(4), 100 Stat. 1213, 1215. It is not clear that Congress intended this language change to be substantive. See S. Rep. No. 99-432, at 9 (1986) (“The Committee intends this change to simplify the language in 18 U.S.C. 1030(a)(1) and (2), and the phrase ‘exceeds authorized access’ is defined separately in Section (2)(g) of the bill.”); 132 Cong. Rec. 28,821 (1986) (statement of Rep. Hughes) (stating, as the chairman of the drafting subcommittee just before final passage, that “the basic thrust of this bill remains its three new offenses with some minor changes in the existing law”). Yet it is notable that Congress did not simply transpose the existing, purpose-oriented language into the definition section—which still would have simplified the language of § 1030(a), as desired—but instead replaced it with new language that focuses on authorization to access particular information. Indeed, if Congress did not think it was making a substantive change, the legislative history suggests that this was because Congress thought the initial language also was limited to access, since “when Congress referenced the user’s ‘purposes,’ it spoke in terms of the particular computer files or data to which the user’s access rights extended.” Valle, 807 F.3d at 526.

Finally, plaintiffs raise numerous First and Fifth Amendment concerns with the Access Provision that would arise out of reading “exceeds authorized access” to include the purpose or use restrictions that appear in many ToS. When a court is “deciding which of two plausible statutory constructions to adopt,” and when “one of them would raise a multitude of constitutional problems, the other should prevail.” Clark v. Martinez, 543 U.S. 371, 380–81 (2005). This maxim holds doubly true for criminal statutes. See Marinello, 2018 WL 1402426, at *4 (“[Courts] have traditionally exercised restraint in assessing the reach of a federal criminal statute, both out of deference to the prerogatives of Congress and out of concern that ‘a fair warning should be given to the world in language that the common world will understand, of what the law intends to do if a certain line is passed.’” (citation omitted)). While the CFAA’s text and legislative history point strongly toward an access-only interpretation of “exceeds authorized access,” a broader reading is not entirely implausible; therefore, constitutional avoidance applies. Cf. Jennings v. Rodriguez, 138 S. Ct. 830, 842 (2018). In interpreting the statutory text, the Court need not determine whether plaintiffs’ constitutional arguments would actually win the day. Rather, the Court undertakes “a narrow inquiry” into whether one reading “presents a significant risk that [constitutional provisions] will be infringed.” NLRB v. Catholic Bishop of Chicago, 440 U.S. 490, 533 (1979).

Here, significant risks abound. By providing for both civil and criminal enforcement of websites’ limitless ToS—including enforcement by the same entities that write the ToS—a broader reading of the CFAA “would appear to criminalize a broad range of day-to-day activity” and “subject individuals to the risk of arbitrary or discriminatory prosecution and conviction,” raising Fifth Amendment concerns. United States v. Kozminski, 487 U.S. 931, 949 (1988); see Valle, 807 F.3d at 527–28; Nosal, 676 F.3d at 862. By incorporating ToS that purport to prohibit the purposes for which one accesses a website or the uses to which one can put information obtained there, the CFAA threatens to burden a great deal of expressive activity, even on publicly accessible websites—which brings the First Amendment into play. See Packingham, 137 S. Ct. at 1736. If “exceeds authorized access” is read broadly, plaintiffs claim, the Access Provision could even run afoul of the Fifth Amendment by delegating power to private parties to define restrictions “limitless in time and space,” which can then operate as petty civil and criminal codes. Pls.’ Mem. at 10; see Ass’n of Am. R.Rs. v. U.S. Dep’t of Transp. (Ass’n of Am. R.Rs. II), 821 F.3d 19, 31 (D.C. Cir. 2016) (“[T]he Supreme Court has consistently concluded the delegation of coercive power to private parties can raise . . . due process concerns.”); Note, The Vagaries of Vagueness: Rethinking the CFAA as a Problem of Private Nondelegation, 127 Harv. L. Rev. 751, 768–71 (2013) (arguing that a broadly-read CFAA violates the nondelegation doctrine). One need neither slay nor succumb to this Hydra-headed set of objections to acknowledge it as formidable.

All of these factors, therefore, lead the Court to adopt a narrow reading of the term “exceeds authorized access.”[FN11] Just as an individual “accesses a computer ‘without authorization’ when he gains admission to a computer without approval,” an individual “‘exceeds authorized access’ when he has approval to access a computer, but uses his access to obtain or alter information that falls outside the bounds of his approved access.” WEC Carolina, 687 F.3d at 204.

This interpretation gets us far, but not all the way. At oral argument, both parties agreed that the Access Provision applies only to access restrictions. See Tr. of Mot. Hr’g at 19:17–20:3, 34:10–35:22. But they have very different ideas about what that means. The government treats this difference as a largely temporal one. It argues that “the moment the violation occurs is on access,” so that subsequent usage of information lawfully obtained does not constitute a CFAA violation. Id. at 20:12–:18. But the government also claims that “it’s appropriate to analyze the issue of whether access is authorized according to a broad context of background facts that could include limitations on the purpose for which information is accessed,” such as “access restrictions that are contained in the [ToS] that the website itself has prepared.” Id. at 19:21–20:2. Plaintiffs, on the other hand, argue that the distinction between access and use turns on the conduct being prohibited, rather than whether the website attempts to cast the conduct as related to access rather than use. Id. at 61:17–:23. Plaintiffs’ reading is the more natural one, and better reflects the constitutional avoidance concerns that support the Court’s interpretation of the statute. Therefore, the Court must make an objective inquiry into the conduct alleged to violate websites’ ToS. The focus is on what information plaintiffs plan to access, not on why they wish to access it, the manner in which they use their authorization to access it, or what they hope to do with it.

Applying this standard, it becomes clear that most of plaintiffs’ proposed activities fall outside the CFAA’s reach. Scraping or otherwise recording data from a site that is accessible to the public is merely a particular use of information that plaintiffs are entitled to see. The same goes for speaking about, or publishing documents using, publicly available data on the targeted websites. The use of bots or sock puppets is a more context-specific activity, but it is not covered in this case. Employing a bot to crawl a website or apply for jobs may run afoul of a website’s ToS, but it does not constitute an access violation when the human who creates the bot is otherwise allowed to read and interact with that site. See Kerr, Norms of Computer Trespass, supra, at 1170. The website might purport to be limiting the identities of those entitled to enter the site, so that humans but not robots can get in. See Star Wars: Episode IV – A New Hope (Lucasfilm 1977) (“We don’t serve their kind here! . . . Your droids. They’ll have to wait outside.”). But bots are simply technological tools for humans to more efficiently collect and process information that they could otherwise access manually. Cf. Star Wars: Episode II – Attack of the Clones (Lucasfilm 2002) (“[I]f droids could think, there’d be none of us here, would there?”).

Out of plaintiffs’ proposed activities, then, only Mislove and Wilson’s plan to create fictitious user accounts on employment sites would violate the CFAA. Unlike plaintiffs’ other conduct, which occurs on portions of websites that any visitor can view, creating false accounts allows Mislove and Wilson to access information on those sites that is both limited to those who meet the owners’ chosen authentication requirements and targeted to the particular preferences of the user.[FN12] Creating false accounts and obtaining information through those accounts would therefore fall under the Access Provision. With that in mind, the Court must turn to the government’s motion to dismiss plaintiffs’ constitutional claims.

D. FREEDOM OF SPEECH AND FREEDOM OF THE PRESS

Plaintiffs first claim that the Access Provision violates the First Amendment’s guarantees of freedom of speech and of the press.[FN13] They assert that the provision is both facially overbroad and unconstitutional as applied to their own conduct. The Court will analyze these claims in turn.

1. Facial Overbreadth

Plaintiffs allege that the Access Provision “creates virtually limitless restrictions on speech and expressive activity,” such that the statute “is unconstitutionally overbroad on its face.” Compl. ¶ 183. In a typical facial challenge, plaintiffs must show “‘that no set of circumstances exists under which [the Access Provision] would be valid,’ . . . or that the statute lacks any ‘plainly legitimate sweep.’” Stevens, 559 U.S. at 472 (citations omitted). However, First Amendment cases allow for “‘a second type of facial challenge,’ whereby a law may be invalidated as overbroad if ‘a substantial number of its applications are unconstitutional, judged in relation to the statute’s plainly legitimate sweep.’” Id. at 473 (citation omitted). This second, lower bar is the one against which plaintiffs—and the Court—measure their challenge.

The government argues that plaintiffs have failed to state a plausible overbreadth claim. See Def.’s Reply at 18–19. The Court agrees. “The first step in overbreadth analysis is to construe the challenged statute; it is impossible to determine whether a statute reaches too far without first knowing what the statute covers.” United States v. Williams, 553 U.S. 285, 293 (2008). The Court has now done so. Plaintiffs have operated under the assumption that the Access Provision covers all ToS violations; but, properly read, the Access Provision incorporates only those ToS that limit access to particular information. This fact alone is enough to dispose of plaintiffs’ overbreadth claim. “Invalidation for overbreadth is strong medicine,” id. (citation omitted), to be “employed . . . sparingly and only as a last resort,” Broadrick v. Oklahoma, 413 U.S. 601, 613 (1973). A court should not invalidate a provision for overbreadth “when a limiting construction has been or could be placed on the challenged statute.” Id.

Plaintiffs concede that a limiting construction would address their overbreadth concerns— though they contend that the Access Provision would need to be “construed not to reach [ToS] violations alone.” Pls.’ Mem. at 35. While the Court’s reading of “exceeds authorized access” is not as narrow as the reading plaintiffs might prefer, it does eliminate many of the potentially unconstitutional applications of the Access Provisions. To be overbroad, a statute’s unconstitutional scope must be “substantial, not only in an absolute sense, but also relative to the statute’s plainly legitimate sweep.” Williams, 553 U.S. at 292. As purpose, use, or manner restrictions fall outside the Access Provision’s reach, plaintiffs have not plausibly alleged that the provision’s potentially unconstitutional applications are substantial relative to its legitimate ones. Moreover, plaintiffs also bring an as-applied claim, and facial challenges are disfavored when a case “may be disposed of on narrower grounds.” Texas v. Johnson, 491 U.S. 397, 403 n.3 (1989). Hence, Plaintiffs’ overbreadth claim will be dismissed.

2. As-Applied Challenge

Plaintiffs allege that, “[a]s applied to the[m],” the Access Provision “unconstitutionally restricts their protected speech.” Compl. ¶ 184. “[T]o prevail on an as-applied First Amendment challenge,” plaintiffs “must show that the [Access Provision is] unconstitutional as applied to their particular speech activity.” Edwards v. District of Columbia, 755 F.3d 996, 1001 (D.C. Cir. 2014). “‘[T]he distinction between facial and as-applied challenges . . . goes to the breadth of the remedy employed by the Court, not what must be pleaded in a complaint.’ . . . The substantive rule of law is the same for both challenges.” Id. (citations omitted).

Aside from the overarching objections that the Court has already rejected, the government’s primary response to plaintiffs’ as-applied claim is that the Access Provision regulates conduct, rather than speech, and is therefore subject to limited scrutiny. See Def.’s Mem. at 21, 27. But even if a law “says nothing about speech on its face,” it is “subject to First Amendment scrutiny” if “it restricts access to traditional public fora.” McCullen v. Coakley, 134 S. Ct. 2518, 2529 (2014). As the Access Provision both limits access to and burdens speech in the public forum that is the public Internet, see supra Part II.A, heightened First Amendment scrutiny is appropriate. “In particular, the guiding First Amendment principle that the ‘government has no power to restrict expression because of its message, its ideas, its subject matter, or its content’ applies with full force in a traditional public forum.” Id. (citation omitted). Content- or viewpoint- based restrictions receive strict scrutiny. See Reed v. Town of Gilbert, 135 S. Ct. 2218, 2226 (2015); Rosenberger, 515 U.S. at 829. On the other hand, if a statute is content-neutral and only “impose[s] reasonable restrictions on the time, place, or manner of protected speech,” McCullen, 134 S. Ct. at 2529, it is subjected to intermediate scrutiny. “In order to survive intermediate scrutiny, a law must be ‘narrowly tailored to serve a significant governmental interest,’” Packingham, 137 S. Ct. at 1736 (citation omitted), and must “leave open ample alternative channels for communication of the information,” McCullen, 134 S. Ct. at 2529.[FN14]

Plaintiffs claim that the Access Provision allows websites to impose direct speech restrictions, including content-based restrictions, and that it is therefore subject to strict scrutiny. Pls.’ Mem. at 34–35. However, the statute itself does not target speech, or impose content-based regulations, on its face. Nor have plaintiffs plausibly alleged that the government’s purpose is to restrict speech based on its content or viewpoint. Indeed, while the government has not yet been able to proffer much evidence of the purposes behind the provision, the legislative history indicates that Congress was interested in passing the Access Provision to prevent the digital equivalent of theft. See S. Rep. 104–357, at 7 (“The proposed subsection 1030(a)(2)(C) is intended to protect against the interstate or foreign theft of information by computer. . . . This subsection would ensure that the theft of intangible information by the unauthorized use of a computer is prohibited in the same way theft of physical items are protected [sic].”). Therefore, strict scrutiny does not apply. See Pursuing America’s Greatness v. FEC, 831 F.3d 500, 509 (D.C. Cir. 2016) (stating that courts must determine content neutrality based on text, and then purpose).

From the information available so far, significant interests appear to underlie the Access Provision. In addition to the legislative history regarding theft prevention, the government suggests that the Court analogize the CFAA to trespass law, arguing that Congress was also trying to prohibit the digital equivalent of trespassing. Def.’s Reply at 3–5. While plaintiffs dispute the trespass analogy, they recognize that the CFAA was passed to prevent computer theft and other cybercrime, and have not disputed that this is a significant interest. Pls.’ Mem. at 31. The question is thus whether the statute fails narrow tailoring as applied to Mislove and Wilson’s plan to “creat[e] profiles containing false information,” Compl. ¶ 124, and “access[] websites using artificial tester profiles, in violation of [ToS] that prohibit providing false information,” id. ¶ 154.

“To satisfy narrow tailoring, the [government] must prove the challenged regulations directly advance its asserted interests.” Edwards, 755 F.3d at 1003. This means “the government must show ‘a close fit between ends and means,’” such “that the regulation ‘promotes a substantial government interest that would be achieved less effectively absent the regulation,’” and does “not ‘burden substantially more speech than is necessary to further the government’s legitimate interests.’” A.N.S.W.E.R. Coalition v. Basham, 845 F.3d 1199, 1213–14 (D.C. Cir. 2017) (citations omitted). At this early stage, the government has not put forward any evidence to show that prosecuting those who provide false information when creating accounts, without more, would advance its interest in preventing digital theft or trespass.

Indeed, presuming the allegations in the complaint to be true, it appears that the government’s interest “is not implicated on these facts” at all. Johnson, 491 U.S. at 410. Plaintiffs allege that their conduct “will not cause material harm to the target websites’ operations,” and that “they have no intent to commit fraud or to access any data or information that is not made available to the public.” Compl. ¶ 4. It is difficult to argue that trespass or theft concerns can justify restricting—or even apply to—viewing information that a website makes available to anyone who chooses to create a username and password. Cf. Kerr, Cybercrime’s Scope, supra, at 1646. And any inadvertent “fraud” plaintiffs may perpetrate against the target websites by creating fictitious accounts will be, plaintiffs allege, harmless. The CFAA already punishes harmful, intentional fraud in a separate section, see 18 U.S.C. § 1030(a)(4), providing additional evidence that the government can further its legitimate interests just as well without applying the Access Provision to plaintiffs’ bare false statements. At this stage, “absent any evidence that the speech [would be] used to gain a material advantage,” Alvarez, 567 U.S. at 723, plaintiffs’ false speech on public websites retains First Amendment protection, see id. at 722, and rendering it criminal does not appear to advance the government’s proffered interests. Hence, plaintiffs have plausibly alleged an as-applied First Amendment claim, and the motion to dismiss that claim will be denied.

E. RIGHT TO PETITION

In addition to their free speech and press claims, plaintiffs allege that the Access Provision violates their rights under the Petition Clause of the First Amendment. Compl. ¶ 193. That clause states: “Congress shall make no law . . . abridging . . . the right of the People . . . to petition the Government for a redress of grievances.” U.S. Const. amend. I. Plaintiffs assert that the Access Provision, by criminalizing websites’ prohibitions on critical speech or publishing, prevents people from using any information they might gain from plaintiffs’ planned research to inform Congress or agencies about potential discrimination by those websites. Id. ¶¶ 162–67, 189. They also assert that, for the same reasons, the Access Provision prevents people from accessing the courts to enforce Title VII or the Fair Housing Act: nobody who had visited a website with a non- disparagement clause in its ToS could bring discrimination claims against that site in court without opening him- or herself up to a potential CFAA prosecution. Id. ¶¶ 168–69, 190.

These allegations are focused on ToS that restrict subsequent speech: disparagement, for instance, or use of the sites’ information in court. However, such ToS constitute restrictions on the use of information, not on access to it. They therefore do not fall within the Access Provision’s ambit, as properly interpreted. But even if one assumes that plaintiffs allege that access restrictions criminalized by the Access Provision violate the Petition Clause, see Compl. ¶ 162, plaintiffs’ petition challenge is, at best, no stronger than their free speech challenge. Speech and petition rights are “generally subject to the same constitutional analysis,” Wayte v. United States, 470 U.S. 598, 610 n.11 (1985), unless “the special concerns of the Petition Clause would provide a sound basis for a distinct analysis,” Borough of Duryea v. Guarnieri, 564 U.S. 379, 389 (2011). Here, the rights appear to overlap: plaintiffs’ Petition Clause claim focuses on speech restrictions that could then affect the petitioning process. Thus, plaintiffs “just as easily could have alleged”—and do, in fact, allege—a Speech Clause violation on the same set of facts. Id. at 387.

And it is on that free speech claim that plaintiffs’ First Amendment case must rise or fall. The Speech and Press Clauses, rather than the Petition Clause, provide the more natural home for plaintiffs’ concerns about the Access Provision. Plaintiffs assert that the CFAA “prevents them from engaging in” petitioning because some websites’ ToS (and thus the Access Provision) “prohibit the speech necessary to engage in . . . petitioning.” Pls.’ Mem. at 43. The real concern, then, is the Access Provision’s alleged restrictions on speech, which have ripple effects in a variety of contexts. The application of the Access Provision to the petitioning process constitutes one small subset of the speech and conduct the provision allegedly prohibits. Any effect the statute might have on plaintiffs’ petition rights, then, is an extra step removed from the central speech harm, and is thus too attenuated to state a plausible claim for relief.

Ultimately, “the Petition Clause protects the right of individuals to appeal to courts and other forums established by the government for resolution of legal disputes,” and “[i]nterpretation of the Petition Clause must be guided by the objectives and aspirations that underlie the right.” Borough of Duryea, 564 U.S. at 387–88. As the government notes, the clause is not aimed at the right to gather facts, or to speak while doing so, as a preliminary step to help prepare that petition in a preferred way. See Def.’s Mem. at 28. That right is more naturally the province of the Speech and Press Clauses than of the Petition Clause. See Burt Neuborne, Madison’s Music: On Reading the First Amendment 11–12, 89 (2015) (arguing that the First Amendment’s protected rights form “a rigorous chronological narrative of free citizens governing themselves in an ideal democracy,” and that the Petition Clause “concludes Madison’s narrative, protecting [an] idea’s introduction into the formal democratic process, forcing the legislature to place the issue on its agenda”). Hence, plaintiffs’ Petition Clause claim will be dismissed.

F. VAGUENESS

Plaintiffs next allege that the Access Provision violates the Due Process Clause because it is unconstitutionally vague. A statute is void if it is “[1] so vague that it fails to give ordinary people fair notice of the conduct it punishes, or [2] so standardless that it invites arbitrary enforcement.” Johnson v. United States, 135 S. Ct. 2551, 2556 (2015). Plaintiffs allege that the Access Provision meets both prongs of this test. Compl. ¶¶ 171–72. Because of potential chilling effects, “a more stringent vagueness test” applies when a law “interferes with the right of free speech.” Vill. of Hoffman Estates v. Flipside, Hoffman Estates, Inc., 455 U.S. 489, 499 (1982).

Properly interpreted, however, the Access Provision is not unconstitutionally vague. “A plaintiff whose speech is clearly proscribed cannot raise a successful vagueness claim” based on a lack of fair notice. Expressions Hair Design v. Schneiderman, 137 S. Ct. 1144, 1151–52 (2017) (quoting Humanitarian Law Project, 561 U.S. at 20). Nor can that plaintiff bring a facial vagueness challenge “based on the speech of others.” Humanitarian Law Project, 561 U.S. at 20. As we have already seen, the Access Provision plainly proscribes the creation of false accounts, but does not prohibit plaintiffs’ other activities. Indeed, plaintiffs allege that they are aware that their proposed conduct would violate their target websites’ ToS restrictions on creating false accounts. Compl. ¶ 124. As the Court has determined that the Access Provision applies to one of their activities but not to the others, and as plaintiffs admit that they have the requisite mens rea to commit the crime, no facial claim or as-applied notice claim can go forward.

Nor can plaintiffs plausibly allege that the Access Provision invites arbitrary enforcement. “[A] statute’s vagueness is either susceptible to judicial construction or is void for vagueness based on the application of traditional rules for statutory interpretation.” United States v. Bronstein, 849 F.3d 1101, 1106 (D.C. Cir. 2017). Thus, “before striking a federal statute as impermissibly vague,” courts must “consider whether the prescription is amenable to a limiting construction.” Welch v. United States, 136 S. Ct. 1257, 1268 (2016) (citation omitted). The Court has already determined that a more limited construction is not only possible, but is in fact more natural than the broad reading that raises vagueness concerns. Read to apply only to access, and not to use, restrictions, the Access Provision severely curtails both websites’ ability to define the law and prosecutors’ freedom arbitrarily to enforce it. Plaintiffs’ Fifth Amendment vagueness claim will be dismissed.

G. NONDELEGATION DOCTRINE

Finally, plaintiffs allege that the Access Provision violates the Fifth Amendment because it delegates the content of criminal law to private parties. Compl. ¶¶ 173–77, 201. The primary case laying out the private nondelegation doctrine is Carter v. Carter Coal Co., 298 U.S. 238 (1936). The statute at issue in that case delegated to coal industry groups the power to create binding codes for the regulation of coal miners’ wages and hours. Id. at 310–11. The Court stated that this power “is legislative delegation in its most obnoxious form; for it is not even delegation to an official or an official body, presumptively disinterested, but to private persons whose interests may be and often are adverse to the interests of others in the same business.” Id. at 311. Prior to Carter Coal, the Supreme Court also twice struck down ordinances that sanctioned a “standardless delegation of power to a limited group of property owners.” City of Eastlake v. Forest City Enterprises, Inc., 426 U.S. 668, 678 (1976) (discussing Eubank v. Richmond, 226 U.S. 137 (1912), and Washington ex rel. Seattle Title Trust Co. v. Roberge, 278 U.S. 116 (1928)).

The D.C. Circuit has gleaned two rules from these cases. First, “[f]ederal lawmakers cannot delegate regulatory authority to a private entity.” Ass’n of Am. R.Rs. v. U.S. Dep’t of Transp. (Ass’n of Am. R.Rs. I), 721 F.3d 666, 670 (D.C. Cir. 2013), vacated and remanded on other grounds, 135 S. Ct. 1225 (2015). Unlike with delegations to agencies, “[e]ven an intelligible principle cannot rescue a statute empowering private parties to wield regulatory authority.” Id. at 671. And second, “the due process of law is violated when a self-interested entity is ‘intrusted with the power to regulate the business . . . of a competitor.’” Ass’n of Am. R.Rs. II, 821 F.3d at 31 (quoting Carter Coal, 298 U.S. at 311). Plaintiffs claim that the Access Provision violates the first of these principles. They allege that the law allows website owners to define the content of a crime—thus sweeping beyond other statutes that merely enforce private contractual agreements— and that the statute relinquishes any government control over the lawmaking process. Compl. ¶¶ 174–76. They also assert that the Access Provision provides no standards to guide what website owners may effectively criminalize. See Pls.’ Mem. at 40.

Plaintiffs raise an intriguing argument, but it is ultimately an unsuccessful one. As with First Amendment overbreadth and vagueness, the courts can avoid nondelegation concerns by “giving narrow constructions to statutory delegations that might otherwise be thought to be unconstitutional.” Mistretta v. United States, 488 U.S. 361, 373 n.7 (1989). Plaintiffs assert that the Access Provision provides a limitless, standardless delegation of power to individual websites to define crimes. But that assertion is based on a reading of the provision that sweeps in use, purpose, or manner restrictions on obtaining or altering information. Properly read as applying only to access restrictions, websites can write whatever ToS they please, but a congressionally- imposed standard limits which ToS can lead to liability or prosecution. Nor do websites have the power to impose formal rules on an industry or otherwise exercise regulatory authority in the manner that courts have found constitutionally impermissible. See, e.g., Yakus v. United States, 321 U.S. 414, 424 (1944); Carter Coal, 298 U.S. at 310–11; Ass’n of Am. R.Rs. I, 721 F.3d at 670–72. Plaintiffs have cited no case—nor has the Court found one—in which a court struck down on private nondelegation grounds a statute that incorporated private parties’ chosen restrictions, which are only binding on those who interact with those parties’ individual businesses. It is thus difficult to argue that the Access Provision improperly delegates legislative or regulatory authority.

Indeed, when read narrowly, the Access Provision looks similar to many criminal laws that are rendered operative by a private party’s decision whether to authorize certain conduct. Examples cited in the government’s brief, see Def.’s Mem. at 32–33, include criminal trespass laws, see D.C. Code § 22–3302; 25 C.F.R. § 11.411, and laws against misappropriation of trade secrets, see 18 U.S.C. § 1831, copyrights, see 17 U.S.C. §§ 106, 506, individuals’ identities, see 18 U.S.C. § 1029, and money (e.g., embezzlement). In none of these instances does a private party’s control over the law’s operation render it a nondelegation problem. Rather, “a legislative delegation to private citizens” is constitutional so long as “[1] the underlying exercise of authority [is] a reasonable regulation within the power of the government . . . . and [2] the legislature’s restriction [is] in the form of a general prohibition, and the delegation [is] in the form of permitting private citizens to waive the protection of that prohibition.” Silverman v. Barry, 845 F.2d 1072, 1086 (D.C. Cir. 1988). A different rule would make it so that “[a]lmost any system of private or quasi-private law could be subject to the” nondelegation doctrine. New Motor Vehicle Bd. of Cal. v. Orrin W. Fox Co., 439 U.S. 96, 109 (1978). Since the Access Provision creates a blanket prohibition on accessing information in protected computers, which owners of those computers can waive through permission, plaintiffs do not plausibly allege that the provision unconstitutionally delegates legislative power. Hence, the nondelegation claim will be dismissed.

CONCLUSION

This case raises important questions about the government’s ability to criminalize vast swaths of everyday activity on the Internet. However, the Court need not answer all of them today, because it concludes that the CFAA prohibits far less than the parties claim (or fear) it does. For the reasons explained above, plaintiffs have plausibly alleged that they have standing to sue, and that the Access Provision violates the Free Speech and Free Press Clauses of the First Amendment as applied to them. The government’s motion to dismiss for lack of standing and on this single as- applied claim will therefore be denied. But the Access Provision, as the Court reads it, does not sweep widely enough to render plausible plaintiffs’ First Amendment overbreadth and petition claims, or their Fifth Amendment vagueness and nondelegation claims. The government’s motion to dismiss those claims, therefore, will be granted. A separate order will issue on this date.

Footnotes

[FN1] This second step involves both crawling the profiles of ranked candidates to determine their demographic data and scraping to record the overall rankings. Compl. ¶¶ 114–16.

[FN2] See Facebook, Facebook Ads, https://www.facebook.com/business/products/ads; Facebook, Marketplace, https://www.facebook.com/marketplace/learn-more.

[FN3] See Packingham, 137 S. Ct. at 1737 (holding that banning people from “gain[ing] access to information,” “knowing current events,” and “checking ads for employment” through social media inhibits “the legitimate exercise of First Amendment rights”); Sorrell v. IMS Health Inc., 564 U.S. 552, 570 (2011) (“This Court has held that the creation and dissemination of information are speech within the meaning of the First Amendment. Facts, after all, are the beginning point for much of the speech that is most essential to advance human knowledge and to conduct human affairs.” (citations omitted)); Brown v. Entm’t Merchants Ass’n, 564 U.S. 786, 792 n.1 (2011) (“Whether government regulation applies to creating, distributing, or consuming speech makes no difference.”); Citizens United v. FEC, 558 U.S. 310, 340 (2010) (“Laws enacted to control or suppress speech may operate at different points in the speech process . . . .”).

[FN4] See Gericke v. Begin, 753 F.3d 1, 7 (1st Cir. 2014); Fields v. City of Philadelphia, 862 F.3d 353, 359 (3d Cir. 2017); Turner v. Lieutenant Driver, 848 F.3d 678, 688–89 (5th Cir. 2017); ACLU of Ill. v. Alvarez, 679 F.3d 583, 595 (7th Cir. 2012); Animal Legal Def. Fund v. Wasden, 878 F.3d 1184, 1203 (9th Cir. 2018); W. Watersheds Project v. Michael, 869 F.3d 1189, 1195–97 (10th Cir. 2017); Smith v. City of Cumming, 212 F.3d 1332, 1333 (11th Cir. 2000); see also Rideout v. Gardner, 838 F.3d 65, 75 (1st Cir. 2016), cert. denied, 137 S. Ct. 1435 (2017) (stating that “[t]here are strong First Amendment interests” in photographically recording one’s own completed ballot, because the “‘use of illustrations or pictures . . . serves important communicative functions’” (citation omitted)).

[FN5] The government counters that Alvarez and the cases that follow it do not “address facially neutral statutes of general applicability, such as the CFAA.” Def.’s Reply at 10. However, that goes to the standard of review on the merits rather than to whether plaintiffs’ activities are imbued with any First Amendment interest at all.

[FN6] For some other recent examples, see United States v. Batti, 631 F.3d 371, 372 (6th Cir. 2011); United States v. Willis, 476 F.3d 1121, 1124 (10th Cir. 2007); United States v. Cave, No. 8:12CR417, 2013 WL 3766550, at *1 (D. Neb. July 16, 2013); United States v. Roque, No. CRIM. 12-540 KM, 2013 WL 2474686, at *1 (D.N.J. June 6, 2013); United States v. Auernheimer, No. 11-CR-470 SDW, 2012 WL 5389142, at *1 (D.N.J. Oct. 26, 2012), rev’d, 748 F.3d 525 (3d Cir. 2014); United States v. Aleynikov, 737 F. Supp. 2d 173, 190 (S.D.N.Y. 2010).

[FN7] It also matters that the CFAA is a civil as well as a criminal statute. The possibility of administrative or private civil actions, even without a threat of criminal prosecution, may buttress—or perhaps independently provide— standing for pre-enforcement challenges. See, e.g., Babbitt, 442 U.S. at 302 n.13; Chamber of Commerce v. FEC, 69 F.3d 600, 603 (D.C. Cir. 1995).

[FN8] The government also offers the statement of the Deputy Assistant Attorney General for the Criminal Division before a congressional subcommittee in 2015, in which the DAAG stated that DOJ “has no interest in prosecuting harmless violations of use restrictions” and suggested amending the CFAA so that it would essentially only apply to the acts that currently give rise to a felony under the Access Provision. Statement of David M. Bitkower, Deputy Ass’t Att’y Gen., Crim. Div., Dep’t of Justice, Before the Subcomm. On Crime and Terrorism, S. Comm. on the Judiciary (July 8, 2015) [ECF No. 10-3] at 6. However, this is no stronger a disavowal than is DOJ’s statement in its charging policy. Moreover, Congress never adopted DOJ’s proposed amendments.

[FN9] Compare Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058, 1067 (9th Cir. 2016) (“[A] violation of the terms of use of a website—without more—cannot establish liability under the CFAA.”), cert. denied 138 S. Ct. 313 (2017) (mem.); Valle, 807 F.3d at 528 (rejecting unauthorized use reading of “exceeds authorized access” because “the government’s interpretation of ‘exceeds authorized access’ makes every violation of a private computer use policy a federal crime”); WEC Carolina, 687 F.3d at 206 (noting that the unauthorized use reading “would impute liability to an employee who with commendable intentions disregards his employer’s policy against downloading information to a personal computer so that he can work at home”), with EarthCam, Inc. v. OxBlue Corp., 703 Fed. App’x 803, 808 & n.2 (11th Cir. 2017) (stating that “one of the lessons from [circuit precedent] may be that a person exceeds authorized access if he or she uses the access in a way that contravenes any policy or term of use governing the computer in question,” and noting the dissenting views of other circuits); CollegeSource, Inc. v. AcademyOne, Inc., 597 Fed. App’x 116, 130 (3d Cir. 2015) (suggesting that defendants can be prosecuted under the CFAA if they “breach[ed] any technological barrier or contractual term of use”); EF Cultural Travel BV v. Zefer Corp., 318 F.3d 58, 62 (1st Cir. 2003) (“A lack of authorization could be established by an explicit statement on the website restricting access. . . . Many webpages contain lengthy limiting conditions, including limitations on the use of scrapers.”).

[FN10] Nor does the word “so,” which has inspired a good deal of exegesis in prior opinions, see WEC Carolina, 687 F.3d at 205–06; Nosal, 676 F.3d at 857–58, meaningfully change this focus. Read in the context of the phrase “so to obtain or alter,” “so” most naturally refers back to the earlier phrase “such access,” emphasizing that the accesser must not have been entitled to obtain or alter that particular information through the particular authorization used— even if, theoretically, there were another way in which the accesser might legally obtain or alter the information.

[FN11] A number of other courts have applied the rule of lenity to limit the scope of “exceeds authorized access.” See Valle, 807 F.3d at 526; WEC Carolina, 687 F.3d at 204; Nosal, 676 F.3d at 363. The rule of lenity “requires ambiguous criminal laws to be interpreted in favor of the defendants subjected to them.” DePierre v. United States, 564 U.S. 70, 88 (2011) (citation omitted). However, lenity is to be used “only ‘at the end of the process of construing what Congress has expressed’ when the ordinary canons of statutory construction have revealed no satisfactory construction.” Lockhart v. United States, 136 S. Ct. 958, 968 (2016) (citation omitted). Text, context, legislative history, congressional intent, and constitutional avoidance all point in one direction here. Because these tools “allow [the Court] to make far more than ‘a guess as to what Congress intended,’ the rule of lenity does not apply.” DePierre, 564 U.S. at 89. If the question were closer, however, lenity would undoubtedly come to plaintiffs’ aid.

[FN12] Professor Kerr argues that “a website that appears to require a username and password to access the contents of the site, but that actually grants access for any username and password combination,” should not be seen as creating an access restriction, because it “would appear to a user to regulate by code, but would actually work more like a system of regulation by contract.” Kerr, Cybercrime’s Scope, supra, at 1646. The distinction between code- based and contract-based barriers matters for First Amendment analysis, see supra Part II.A, but it does not quite line up with the Court’s reading of the CFAA. Social media sites like Facebook, for instance, grant access for any username and password combination, but they still allow those with accounts to access data that those who merely visit the site without signing up cannot. Hence, conditions placed on account creation can still be access restrictions.

[FN13] Courts normally subject free speech and free press claims to the same level of scrutiny. See, e.g., Citizens United, 558 U.S. at 352; McConnell v. FEC, 251 F. Supp. 2d 176, 234–35 (D.D.C.) (three-judge court) (per curiam), aff’d in part, rev’d in part, 540 U.S. 93 (2003). The Court will thus treat the speech claim as a proxy for both.

[FN14] The standard that governs expressive conduct prohibitions with “incidental limitations on First Amendment freedoms,” see United States v. O’Brien, 391 U.S. 367, 376 (1968), is inapposite to this as-applied claim. “The law here may be described as directed at conduct, . . . but as applied to plaintiffs the conduct triggering coverage under the statute consists of communicating a message.” Humanitarian Law Project, 561 U.S. at 28. Plaintiffs are informing the websites of who they are, and claiming to be employers, much in the same way that the defendant in Alvarez had claimed to be a decorated war veteran, or the plaintiffs in Humanitarian Law Project had sought to train terrorists to engage in peaceful activity. All of these forms of conduct communicate messages to the recipients. Moreover, it is the content of plaintiffs’ speech to the targeted websites—that they represent their identities falsely or misleadingly instead of truthfully—that triggers the sites’ ToS and, thereby, the criminal penalties of the CFAA. In other words, Mislove and Wilson would violate the Access Provision “because of the [false] content of [their] particular message.” Id. In these circumstances, the government must meet a “more demanding standard” than the O’Brien test. Id. (quoting Johnson, 491 U.S. at 403). Even if that test were applicable, however, “in the last analysis [it] is little, if any, different from the standard applied to time, place, or manner restrictions,” Johnson, 491 U.S. at 407, and incorporates narrow tailoring requirements, see Edwards, 755 F.3d at 1002–03, so the analysis would not meaningfully change.

2.3 Associated Ppress v. Meltwater U.S. Holdings, Inc. 2.3 Associated Ppress v. Meltwater U.S. Holdings, Inc.

931 F. Supp. 2d 537 (2013)

THE ASSOCIATED PRESS, Plaintiff,
v.
MELTWATER U.S. HOLDINGS, INC.; MELTWATER NEWS U.S., INC.; and MELTWATER NEWS U.S. 1, INC., Defendants.

No. 12 Civ. 1087 (DLC).

United States District Court, S.D. New York.

March 21, 2013.

Elizabeth McNamara, Alison Brooke Schary, Colin James Peng-Sue, Linda Jane Steinman, Davis Wright Tremaine LLP, New York, NY, for the Plaintiff.

David Kramer, Brian Willen, Catherine Grealis, Tonia Klausner, Wilson Sonsini Goodrich & Rosati, New York, NY, for the Defendants.

Amici Curiae: Charles S. Smims, Proskauer Rose LLP, New York, NY for amici curiae the New York Times Company, Advance Publications, Inc., Gannett Co., Inc., the McClatchy Company, the Newspaper Association of America, and BurrellesLuce, in support of plaintiff.

Julie A. Ahrens, Stanford Law School, Center for Internet & Society, Standard, CA (Corynne McSherry and AKurt Opsahl, Electronic Frontier Foundation, San Francisco, CA, and Sherwin Siy, Public Knowledge, Washington, DC, on the brief) for amici curiae Electronic Frontier Foundation and Public Knowledge in support of defendants.

Kathleen M. Sullivan, Quinn Emanuel Urquhart & Sullivan, LLP, New York, NY (Jonathan B. Oblak and Todd Anten on the brief) for amicus curiae Computer & Communications Industry Association in support of neither party.

OPINION AND ORDER

DENISE COTE, District Judge.

This Opinion addresses cross-motions for summary judgment filed by The Associated Press ("AP"), a news cooperative, and Meltwater US Holdings Inc., Meltwater News US Inc., and Meltwater News US1 Inc. (collectively "Meltwater"), an Internet media monitoring service. In this action, AP principally contends that Meltwater is infringing AP's copyright in its published news stories. Meltwater uses a computer program to scrape news articles on the web and, among other things, provides excerpts of those stories, including many AP stories, in reports it sends each weekday to its subscribers. Meltwater does not dispute that it has taken expressive content from AP stories that is protected by the Copyright Act, but has interposed five defenses to AP's copyright infringement claim.

Meltwater's principal defense against the infringement claim is that its excerpting of AP news stories is a fair use. Even though Meltwater's service is a closed system for subscribers only, Meltwater equates itself with Internet search engines. It argues that search engines transform the work they take from Internet news sites by using that content for a new purpose, that is, as an integral part of an information-location tool. According to Meltwater, this transformative purpose qualifies as a fair use of the copyright-protected material. It will be assumed for purposes of this Opinion that Internet search engines are a transformative use of copyrighted work. Nonetheless, based on undisputed facts, AP has shown that it is entitled to summary judgment on its claim that Meltwater has engaged in copyright infringement and that Meltwater's copying is not protected by the fair use doctrine.

This Opinion begins with a description of the facts taken from the parties' submissions on these cross-motions for summary judgment. The facts are largely undisputed; where there are factual disputes, those will be noted. Following a description of AP's business as it relates to these claims, and then Meltwater's, there will be a brief description of the procedural history of this lawsuit. The next sections of the Opinion will analyze the legal issues. They will include a discussion of Meltwater's five affirmative defenses to the claim of copyright infringement: fair use, implied license, equitable estoppel, laches, and copyright misuse. Finally, this Opinion will address Meltwater's motion for summary judgment on AP's secondary infringement claims and some of Meltwater's evidentiary objections.

BACKGROUND

I. AP

AP was established in 1846; it is owned by over 1,400 newspapers across the United States and employs a staff of approximately 3,700 people. On any given day it produces between 1,000 and 2,000 news articles.

Each article is the result of a process that involves a number of creative decisions by AP reporters and editors. First, AP must select the topic to be covered in the article. The selection process can involve sifting through numerous press releases, comments made by politicians, and news tips received by AP in order to decide which topics are worthy of coverage. The actual writing of the story is often an iterative process, involving consultations between the reporter and editor about how to handle the assignment. During this process, the articles are reviewed for "completeness, clarity, balance and accuracy." The structure of a news article is itself the product of strategic and stylistic choices. For instance, breaking news stories are traditionally organized in the form of an "inverted triangle." The purpose of the "inverted triangle" structure is to include "as much key information as possible in the `lede,' or first portion of the story." As AP's Standards Editor has explained, an AP story lede "is meant to convey the heart of the story, rather than serving as a teaser for the remainder of the story." In connection with this action, the AP obtained copyright registrations for thirty-three of its articles ("Registered Articles").[1]

The news products that AP offers take many forms. For instance, subscribers can choose to subscribe to a regional news product, like AP's Latin American News, or Asia-Pacific News. Alternatively, a subscriber can select an AP product that is focused on a particular industry, like AP's Business Alert, Defense Alert, or Technology Alert.

Each of the thirty-three Registered Articles at issue in this lawsuit was written by an AP reporter. Most of articles authored by AP reporters are published by its members or licensees and not by AP itself. Thus, a principal component of AP's revenue comes from licensing fees it earns by licensing uses of its news products to its roughly 8,000 licensees. AP earns hundreds of millions of dollars in licensing fees annually.

In the digital age, AP's license agreements have expanded to permit the publication of its articles on the Internet. AP's license agreements with its digital and commercial clients account for more than $75 million of AP's annual gross revenue. Many of the websites on which AP content appears permit readers to access the articles without paying any fee.

AP's licensing agreements are crafted around the kind of redistribution rights the licensee wishes to have. For instance, AP's licensing agreements with LexisNexis and Factiva permit those services to give their customers access to full AP articles and to search through AP's archives. AP also has licensing agreements that permit the distribution of excerpts from or snippets of its articles. The license agreements between AP and three news clipping services that are competitors of Meltwater are examples of this kind of license. One such license granted the Internet news clipping service a license to distribute "AP text scraped from third party AP licensee websites ("AP Articles") . . . as well as links to AP Articles and excerpts of AP Articles." In a second such license, AP permits the Internet news clipping service to redistribute "Snippets" of AP articles "as a part of an aggregated feed of licensed content," to a primary market of Media Monitoring & Evaluation companies who cater to "Internal corporate communications and PR professionals and their external agents." This license defines "Snippets" to mean "headlines and leading 140 characters from AP content." In a final example, the licensing agreement allows the news clipping service to make available directly or via its affiliate "snippets of [certain AP content] in response to search requests."

AP also offers a web-based platform known as AP Exchange to its licensees, which permits the licensees to search AP articles by keywords. Each AP article contains metadata tags. These tags attach to certain information appearing in AP articles including people, companies, geographic locations, and organizations. Through AP Exchange, customers can run either simple or advanced searches to locate AP news stories. This platform also allows AP's customers to save their searches and to receive search results on an ongoing basis. AP's customers can receive email alerts when an article that is responsive to one of their custom searches has been published. In addition, AP has licensed its content to customers that, in turn, permit their users to search for AP articles using keyword search terms.

II. Meltwater News

Meltwater is an international "software as a service" ("SaaS") company that operates in twenty-seven countries. It was founded in 2001 in Norway. Its United States subsidiaries currently have four hundred employees, nine U.S. offices, and an annual income of [REDACTED. dollars.

In 2005, Meltwater began offering a news monitoring service to subscribers in the United States called Meltwater News. Meltwater News now has more than [REDACTED] customers in the United States. Its U.S. customers are businesses, non-profit organizations, and government agencies. An annual subscription fee costs thousands of dollars.

Meltwater News subscribers have access to Meltwater's "Global Media Monitoring" product, which offers a suite of online services. The Global Media Monitoring product enables users to monitor the news based on the presence of certain words or phrases in news articles appearing on the Internet and to receive excerpts of those news articles. Meltwater uses automated computer programs or algorithms to copy or "scrape" an article from an online news source, index the article, and deliver verbatim excerpts of the article to its customers in response to search queries.[2] Through this automated mechanism, Meltwater copied each of the thirty-three Registered Articles at issue in this litigation and delivered excerpts from them to subscribers.

Meltwater markets its services to communications and public relations professionals as a tool that will assist them in locating "mentions" of their businesses in the media, in tracking their company's press releases, and in conducting comparative research. Some of Meltwater's marketing materials and sales representatives also advertise Meltwater News as a useful tool for staying informed of general news developments. One Meltwater sales representative described Meltwater News as "provid[ing] the most news in the most efficient manner" and referred to the Meltwater News Reports as "customized news digest[s]." Another Meltwater employee has recommended telling customers that a Meltwater News excerpt "saves you time so you don't have to read the full article."

Meltwater competes with AP and its licensees for business. Meltwater identifies companies and services like LexisNexis, Cision, Google News, and BurrellesLuce as its competitors. Each of these companies has held an AP license. Meltwater has succeeded in winning what it described as a "mega-contract" away from an AP licensee, and both AP and Meltwater have submitted bids to the same potential customers. In 2010, for instance, both AP and Meltwater submitted proposals to the House of Representatives in response to an "official solicitation for proposals to provide web based delivery of local, national and international news."

Like Internet search engines, Meltwater News employs automated computer programs known as "crawlers" to scan the Internet for news. Meltwater's crawlers scan approximately 162,000 online news websites from over 190 countries each day to create an index of the websites' content. The program usually crawls a news website at roughly [REDACTED] intervals. Most of these websites make their articles available to readers without charge.

The crawlers extract and download content from the websites. The downloaded content is organized into a structured internal format that has seven fields, including a times-tamp reflecting when the document was first seen by the crawler. The extracted content is then placed in a queue for indexing. Using an Application Programming Interface or API, an index is created that links or "maps" most of the words in the document to the document.

A. News Reports

Meltwater's creation of the index permits its subscribers to search for and request delivery of information that is responsive to their search queries. Its subscribers can conduct two types of searches of the index.

First, a customer can use the Meltwater News platform to set up standing search queries known as "agents." An agent is a single string of words or phrases that will be used in searching Meltwater's index of online news content. For example, a customer interested in obtaining information on education policy might create an agent that reads: "("teachers" or "students") and education* and policies." The creation of an agent query allows the particular search to be conducted automatically on a recurring basis. A basic subscription offers a customer the ability to create five standing agent queries.

Customers receive agent search results in two ways. Most customers receive emails every weekday that contain the excerpts responsive to their standing search requests. These are labeled "News Reports." Customers can also view those same search results by logging onto their Meltwater News online account, where they can see all of their News Reports from the last seven months.

A typical News Report takes the following form. At the top of the News Report a banner appears that reads "News Report from Meltwater News." Directly beneath the banner appears a table entitled "Report Overview." The Table ordinarily consists of two columns; the first column contains the name of the "agent" query that retrieved hits; the second displays the raw number of hits in a given period of time (such as 3 in 1 day, or 635 in 23 hours).

The actual search results follow the Report Overview. They are organized in subcategories based on the agent query to which they respond. Within each agent category, the results appear in reverse chronological order, with the excerpt of the most recently published article appearing first.[3] Three icons appear next to each search result; they read, "Translate," "Share," and "Archive." AP articles account for over a third of the search results in some News Reports.

Each search result in the News Report generally includes the following text: (1) the headline or title of the article and a hyperlink to the URL for the website from which the article was indexed; (2) information identifying the article's source, such as the publisher and the country of origin; and (3) usually two excerpts from the article. The first excerpt consists of up to 300 characters (including white space) from the opening text of the article or lede. The second excerpt is shorter and is known as the "Hit Sentence." It is approximately 140 characters (not including white spaces) "surrounding a single, algorithmically chosen appearance of one of the customer's matched search keywords." If the keyword appears in the lede, then the lede is repeated twice.

On occasion, the hyperlink to the article no longer leads to the article because the article has been removed from the web. Meltwater contends that when that occurs, the hyperlink will lead the Meltwater subscriber to the website where the article originally appeared, and the reader will see whatever content the operator of the webpage has chosen to display in place of the original article.

B. Analytics

A Meltwater News subscriber can choose to have certain charts and graphs included in their News Reports. These charts and graphs — known as "Dashboard Analytics" or "Mail Analytics" — provide additional information about the search results. For instance, customers who opt to have Mail Analytics included in their daily News Report will see a pie chart showing the three or four countries that have had the highest coverage of a particular agent. They also have a choice of seeing an "up-and-down coverage" chart that indicates whether the volume of coverage has gone up or down during a certain period of time, or a "word cloud" illustrating certain buzz words appearing in the search results.

A subscriber can also view additional analysis of its agent searches by logging on to the Meltwater News platform. When it logs on, it encounters a "dashboard" page containing five tools; some of these tools overlap with the tools that can be delivered in the News Reports. Using the dashboard, the customer can view (1) a "tone analysis" tool, which analyzes whether the tone of the news coverage is negative, positive, or neutral; (2) a "word cloud" graphic, which illustrates the frequency with which a keyword appears in the search results; (3) a list of the "top publications" providing the most coverage of a given agent query; (4) an "up-and-down trend analysis" chart, which indicates "whether the volume of media coverage related to a given search query has increased or decreased over a given period;" and (5) a map that illustrates the "geographical distribution of relevant news coverage."

C. Ad Hoc Searches

The second way in which customers can conduct searches of the Meltwater News index is through an "ad hoc" search. To perform an ad hoc search, a Meltwater News subscriber logs on to its Meltwater account, clicks on a "Search" tab, and types in keywords of its choice.

Ad hoc searches do not generate News Reports, but the format for presenting the results generated by an ad hoc search is identical to that in News Reports. The results of ad hoc searches are not saved on the Meltwater system unless the subscriber saves them to the subscriber's own archive folder. There is no limit on the number of ad hoc searches that a subscriber can perform.

D. Archiving

A subscriber with a basic subscription has the ability to archive material in two ways. First, subscribers can archive any of their search results in a personal archive stored on Meltwater's database. For instance, as described above, an "Archive" button appears next to each excerpt contained in a Meltwater News Report. Clicking this button archives the search result. When a search result is archived in this way, the information stored in the archive includes (1) the headline or title of the article and the URL link; (2) a description of the source of the article; (3) an excerpt of the article, consisting only of the opening text; and (4) any text the user has typed or pasted into a comment box. In other words, the Hit Sentence is not automatically archived.

Second, Meltwater offers a tool called "Article Editor" that is accessible from the Meltwater News online platform. Clicking on the Article Editor tool causes a pop-up window to appear. The window contains boxes with the labels "Date, Title, Opening Text, Body Text, URL, Name of Publisher, and Country." The subscriber can type text into these boxes or can copy and paste text from other websites. For instance, if a customer clicks on a hyperlink provided as part of a search result, the customer can proceed to copy the article from the publishing website and paste the text into the Article Editor. The text can be saved in an "external archive folder" on Meltwater's system for as long as the subscriber remains a customer.

E. Newsletter and Newsfeed

For an additional fee, Meltwater News assists its subscribers in creating their own newsletters. Material that has been saved in a subscriber's archive folder — search results or material entered into the Article Editor — can be incorporated into a "Newsletter" and sent to third-party recipients.

Alternatively, subscribers can elect to have their search results incorporated into a Newsfeed on their internal or external website. Meltwater describes the Newsfeed as a "dynamic list of search results, including links to full articles."

III. The Thirty-Three Registered Articles

Meltwater delivered excerpts of each of the thirty-three Registered Articles to its customers in News Reports as a result of agent searches.[4] Meltwater scraped the Registered Articles from roughly 1,200 websites — including the websites of AP's licensees and AP Hosted, which is a private label website where AP hosts content for its members. Twenty-four of the thirty-three articles were published within six months of the date Meltwater responded to a discovery request in this action. As a result, Meltwater was able to calculate from its records that it made at least 22,297 excerpts from the twenty-four Registered Articles available to its customers in the United States in response to agent queries.

The parties have not calculated the percentage of each original AP news story that was excerpted and delivered in each of the News Reports, but it probably ranged from as low as 4.5% to slightly over 60%. There are several factors that affect the calculation of the percentage. One is the length of the Registered Article. The average length of the full text of the thirty-three Registered Articles is 2,571 characters (not including spaces), or 504 words. But, some of the articles are short and some are long; they vary in length from 75 words to 1,321 words. Moreover, if the keyword that is searched appears in the lede, then the lede and Hit Sentence will overlap. AP has shown that with respect to some of the Registered Articles, a single Meltwater excerpt consisted of more than 30% of the text of the article and in at least one instance it constituted 61% of the article's text.

For example, from the shortest Registered Article — entitled "Modern pentathlon tightens anti-doping policy" — Meltwater delivered the following excerpt:

MONACO (AP) — Modern pentathlon has joined other sports in adopting a "no needles" policy as part of its anti-doping rules ahead of the 2012 London Olympics.

. . . says athletes can receive injections only from a "certified medical professional" after an appropriate diagnosis and only if there is no alternative.

The full text of the Registered Article reads as follows:

MONACO (AP) — Modern pentathlon has joined other sports in adopting a "no needles" policy as part of its anti-doping rules ahead of the 2012 London Olympics.

Governing body UIPM says athletes can receive injections only from a "certified medical professional" after an appropriate diagnosis and only if there is no alternative.

The UIPM says all injections must be reported to competition doctors.

Governing bodies in cycling, gymnastics and rowing have also introduced "no needles" rules this year.

Some of Meltwater's customers have received multiple excerpts from the same AP article, apparently in a single News Report. In such instances, the percentage of the article that is provided to the Meltwater customer may increase since the Hit Sentence in the various excerpts can change.

Excerpts from the Registered Articles were also included in ten Newsletters created by Meltwater customers in the United States. There is no evidence, however, that any Meltwater subscriber used the Meltwater Newsletter feature to cut and paste a complete copy of any of the thirty-three Registered Articles into its customized newsletter.

Finally, Meltwater subscribers only clicked on the hyperlinks for seven of the thirty-three Registered Articles. The average click-through rate for the thirty-three Registered Articles is roughly 0.08%.[5] Meltwater has not provided any information on any other measure of its click-through rates.[6]

PROCEDURAL HISTORY

On February 14, 2012, AP filed this action against Meltwater. AP's amended complaint asserts six causes of action with respect to the Registered Articles: (1) copyright infringement; (2) contributory copyright infringement; (3) vicarious copyright infringement; (4) declaratory judgment of copyright infringement; (5) "hot news" misappropriation under New York common law; and (6) removal or alteration of copyright management information. In response, Meltwater has raised four counterclaims: (1) declaratory judgment of non-infringement; (2) declaratory judgment of safe harbor from infringement claims based upon the Digital Millennium Copyright Act ("DMCA"); (3) libel per se; and (4) tortious interference with business relations.

At a pretrial conference held on April 20, 2012, the Court proposed that the parties conduct an initial phase of discovery focused on Meltwater's liability on AP's copyright claims based on the nineteen articles identified in its original complaint. The parties thereafter agreed on a schedule that would permit them to focus on the core discovery needed to allow early briefing of the central legal issues in this case. At a May 11 conference, the Court determined that AP should be permitted to take targeted discovery not only of Meltwater's alleged infringement with respect to the Registered Articles, but also broader discovery of Meltwater's general practices and procedures.

On July 13, AP filed an amended complaint in which it included fourteen additional articles — bringing the total number of Registered Articles at issue to thirty-three. Discovery proceeded on all thirty-three articles and broader issues to permit the parties to litigate through summary judgment practice the copyright infringement claim and Meltwater's affirmative defenses to that claim.

Both sides filed the instant cross-motions for summary judgment on November 9.[7] AP and Meltwater both move for summary judgment on Meltwater's fair use defense. AP has also moved for summary judgment on Meltwater's implied license defense. Each of Meltwater's affirmative defenses is implicated by this motion practice since Meltwater also contends that there are triable issues of fact on its affirmative defenses of implied license, equitable estoppel, laches, and copyright misuse that prevent summary judgment from being entered for AP. Meltwater has also moved for summary judgment on AP's contributory and vicarious copyright infringement claims.

These motions were fully submitted on January 23, 2013. Redacted sets of these motion papers were publicly filed in December 2012 and January 2013. The defendants also filed on December 26, 2012 and January 24, 2013, two motions to strike certain declarations submitted by the plaintiff and the plaintiff's Fed.R.Civ.P. 56.1 Statement.

Three amici curiae briefs were accepted for filing. Computer & Communications Industry Association ("CCIA") represents that it is not filing in support of either AP or Meltwater. Electronic Frontier Foundation and Public Knowledge have filed in support of Meltwater; the New York Times Company, Advance Publications, Inc., Gannett Co., Inc., the McClatchy Company, the Newspaper Association of America, and BurrellesLuce have filed in support of AP ("New York Times, et al.").

DISCUSSION

The parties have cross-moved for summary judgment. Summary judgment may not be granted unless the submissions of the parties taken together "show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law." Rule 56(c), Fed. R. Civ. P. The moving party bears the burden of demonstrating the absence of a material factual question, and in making this determination the court must view all facts in the light most favorable to the nonmoving party. See Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 247 (1986); Celotex Corp v. Catrett, 477 U.S. 317, 323 (1986); Azrielli v. Cohen Law Offices, 21 F.3d 512, 517 (2d Cir. 1994) ("[T]he court must resolve all ambiguities and draw all reasonable inferences in favor of the nonmoving party."). When the moving party has asserted facts showing that the nonmovant's claims cannot be sustained, the opposing party must "set forth specific facts showing that there is a genuine issue for trial," and cannot rest on the "mere allegations or denials" of his pleadings. Rule 56(e), Fed. R. Civ. P. See also Goenaga v. March of Dimes Birth Defects Found., 51 F.3d 14, 18 (2d Cir. 1995). In deciding whether to grant summary judgment, therefore, this Court must determine (1) whether a genuine factual dispute exists based on the evidence in the record, and (2) whether the fact in dispute is material based on the substantive law at issue.

In this case, the substantive law governing the parties' dispute is found in the law of copyright. The Copyright Act of 1976 invests a copyright holder with a bundle of exclusive rights. 17 U.S.C. § 106 et seq. This bundle consists of the rights to "reproduce, perform publicly, display publicly, prepare derivative works of, and distribute copies of" the copyrighted work. Arista Records v. Doe 3, 604 F.3d 110, 117 (2d Cir. 2010); see also 17 U.S.C. § 106. "The principle purpose of the Copyright Act is to encourage the origination of creative works by attaching enforceable property rights to them." Matthew Bender & Co., Inc. v. West Pub. Co., 240 F.3d 116, 122 (2d Cir. 2001).

To prevail on a claim of copyright infringement, "two elements must be proven: (1) ownership of a valid copyright, and (2) copying constituent elements of the work that are original." Arista Records, 604 F.3d at 117 (citation omitted). A certificate of copyright registration is prima facie evidence of both valid ownership of copyright and originality. See Scholz Design, Inc. v. Sard Custom Homes, LLC, 691 F.3d 182, 186 (2d Cir. 2012); see also Boisson v. Banian, 273 F.3d 262, 268 (2d Cir. 2001). The copying of the constituent elements of the work that are original can be established through direct or indirect evidence. Boisson, 273 F.3d at 267.

The reporting of facts is not protectable under the Copyright Act since facts are "never original to an author." Nihon Keizai Shimbun, Inc. v. Comline Business Data, Inc., 166 F.3d 65, 70 (2d Cir. 1999). But compilations of facts may be protected under the Act since the arrangement or presentation of facts "can display originality." Id. There is even more room for originality in descriptions of facts. Id. Thus, news articles may be entitled to protection under the Copyright Act to the extent they contain original expression. Id.

AP has carried its burden to show both its ownership of a valid copyright in the Registered Articles and Meltwater's copying of protected elements of those works. Meltwater does not contest this showing, but relies instead on five affirmative defenses. Its principal defense is that it made fair use of the Registered Articles. It also contends that there are triable issues of fact that require a trial as to four additional defenses: its possession of an implied license, estoppel, laches, and copyright misuse. Each of these defenses will be addressed in turn, but none of them prevents the issuance of summary judgment in AP's favor based on its copyright claim.

I. Fair Use

Meltwater contends that its use of the Registered Articles is fair because Meltwater News functions as an Internet search engine, providing limited amounts of copyrighted material to its subscribers in response to their queries and thereby pointing its subscribers to a source of information online. It contends that this service is transformative of the original works. Based on undisputed evidence, Meltwater's fair use defense fails.

Notwithstanding the copyright protections guaranteed by Section 106 of the Copyright Act, the law of copyright recognizes the need for "breathing space." Campbell v. Acuff-Rose Music, 510 U.S. 569, 579 (1994); see also On Davis v. The Gap, Inc., 246 F.3d 152, 174 (2d Cir. 2001). Thus, even where a plaintiff has established a prima facie case of copyright infringement, liability is excused where the defendant demonstrates that he made "fair use" of the plaintiff's copyrighted work. Because fair use is an affirmative defense, the burden of proof rests with party relying on the defense. Infinity Broadcast Corp. v. Kirkwood, 150 F.3d 104, 107 (2d Cir. 1998). The availability of a fair use defense permits courts to avoid the "rigid application of the copyright statute" when "it would stifle the very creativity which the law is designed the foster." Campbell, 510 U.S. at 577.

The fair use doctrine, although of common law origin, has been codified at 17 U.S.C. § 107. This section provides that

[n]otwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work . . . for purposes such as criticism, comment, news reporting, teaching . . . scholarship, or research, is not an infringement of copyright.

17 U.S.C. § 107. The applicability of the fair use defense is a mixed question of law and fact. Bill Graham Archives v. Dorling Kindersley, Ltd., 448 F.3d 605, 608 (2d Cir. 2006). The issue of fair use may be resolved on summary judgment where the court determines that there is no genuine dispute of material facts. Id.

In determining whether a defendant has made fair use of the plaintiff's copyrighted work, the court is guided by four nonexclusive statutory factors:

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

(4) the effect of the use upon the potential market for or value of the copyrighted work.

17 U.S.C. § 107. No single factor is determinative. "All are to be explored, and the results weighed together, in light of the purpose of copyright." Campbell, 510 U.S. at 578. At bottom, "[t]he ultimate test of fair use is whether the copyright law's goal of promoting the Progress of Science and useful Arts would be better served by allowing the use than by preventing it." Bill Graham Archives, 448 F.3d at 608 (citation omitted).

When these four factors are examined in light of the purpose of the copyright law, AP has shown through undisputed evidence that Meltwater's copying is not protected by the fair use doctrine. Each of these four factors will be examined in turn.

A. Purpose and Character of the Use

The first factor of the fair use analysis poses a deceptively simple question. It asks

whether the new work merely supersedes the objects of the original creation, or instead adds something new, with a further purpose or different character, altering the first with new expression, meaning or message; it asks, in other words, whether and to what extent the new work is transformative.

Campbell, 510 U.S. at 579 (citation omitted). A decision on whether a work is transformative need not be an all-or-nothing assessment. Nihon, 166 F.3d at 72. The inquiry asks not merely whether the new work is transformative, but also the extent to which it transforms the copyrighted work. "[T]he more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use." Campbell, 510 U.S. at 579. The inquiry into the transformative nature of the work is "guided by" the preamble to § 107, which directs attention to whether the use of copyrighted material is for the several listed purposes, among them news reporting and research. Id. at 578. But, the list of fair uses included in the preamble of section 107 is only "illustrative." Infinity Broadcast Corp., 150 F.3d at 107 (citation omitted). Nonetheless, "the illustrative nature of the categories should not be ignored." Id.

Of course, not all alterations of a copyrighted work are "transformative." A "use of copyrighted material that merely repackages or republishes the original is unlikely to be deemed a fair use" and a "change of format, though useful" is not transformative. Infinity Broadcast Corp., 150 F.3d at 108 & n.2 (citation omitted). On the other hand, if copyrightable expression in the original work is used as "raw material, transformed in the creation of new information, new aesthetics, new insights and understandings — this is the very type of activity that the fair use doctrine intends to protect for the enrichment of society." Pierre N. Leval, Toward a Fair Use Standard, 103 Harv. L. Rev. 1105, 1111 (1990); see also Castle Rock Entm't, Inc. v. Carol Publ'g Group, Inc., 150 F.3d 132, 142 (2d Cir. 1998). In considering whether the second work has transformed the original, it is appropriate to consider the percentage of the allegedly infringing work that is made up of the copyrighted work since this offers some indication of whether the defendant's use of the "original materials has been sufficiently transformative."[8] Bill Graham Archives, 448 F.3d at 611.

Another aspect of the first fair use factor is the extent to which the new work has a commercial or non-profit educational purpose. The commerciality of the use must be considered with care. After all, not-for-profit enterprises may infringe copyrights, and conversely, if

commerciality carried presumptive force against a finding of fairness, the presumption would swallow nearly all of the illustrative uses listed in the preamble paragraph of § 107, including news reporting, comment, criticism, teaching, scholarship, and research, since these activities are generally conducted for profit in this country.

Campbell, 510 U.S. at 584 (citation omitted). The fact that a given use is profit-driven is not the focus of the commerciality inquiry. Instead, the "crux of the profit/nonprofit distinction is . . . whether the user stands to profit from the exploitation of the copyrighted material without paying the customary price." Harper & Row Publishers, Inc. v. Nation Enterp., 471 U.S. 539, 562 (1985). Thus, the fair use doctrine "distinguishes between a true scholar and a chisler who infringes a work for personal gain." Id. at 563 (citation omitted).

A determination of whether a use "exploits" a copyrighted work calls for a careful exploration of the link between the defendant's precise use of the copyrightable elements of the plaintiff's work and the defendant's financial gain. Where a defendant did not gain "direct or immediate commercial advantage" from the copying, its status as a for-profit enterprise is less relevant. Am. Geophysical Union v. Texaco, Inc., 60 F.3d 913, 921 (2d Cir. 1994). Conversely, "when the copier directly and exclusively acquires conspicuous financial rewards from its use of the copyrighted material" a finding of fair use is less likely. Blanch v. Koons, 467 F.3d 244, 253 (2d Cir. 2006). Of course, a use that generates value for the "broader public interest" weighs in favor of fair use. Id.

In analyzing the purpose of the use, a court may consider as well other aspects of a defendant's purpose. For instance, was the copying intended to supplant the copyright holder's "commercially valuable right of first publication." Harper & Row, 471 U.S. at 562. As the term itself suggests, "[f]air use presupposes good faith and fair dealing." Id. (citation omitted).

Neither the purpose nor use of the Meltwater News Reports, nor its excerpts from the Registered Articles in the News Reports, is transformative. Meltwater uses its computer programs to automatically capture and republish designated segments of text from news articles, without adding any commentary or insight in its News Reports. Meltwater copies AP content in order to make money directly from the undiluted use of the copyrighted material; this is the central feature of its business model and not an incidental consequence of the use to which it puts the copyrighted material. Thus, it is not surprising that Meltwater's own marketing materials convey an intent to serve as a substitute for AP's news service. Meltwater describes its Meltwater News products as "News at a glance" and "News brought to you." They trumpet that "Meltwater News continuously tracks news sources, updating its database continuously throughout the day so searches return fresh, relevant content," and advertise that "your news is delivered in easy to read morning and/or afternoon reports."

Nor is Meltwater's taking of copyrighted material more defensible because its business relates to news reporting and research — two of the purposes of the fair use doctrine captured in the statute's preamble. The news reporting and research upon which Meltwater relies was not done by Meltwater but by AP; the copyrighted material that Meltwater has taken is the news reporting and research that AP labored to create.

For this same reason, the examination of the public interest weighs against Meltwater. Paraphrasing James Madison, the world is indebted to the press for triumphs which have been gained by reason and humanity over error and oppression. Investigating and writing about newsworthy events occurring around the globe is an expensive undertaking and enforcement of the copyright laws permits AP to earn the revenue that underwrites that work. Permitting Meltwater to take the fruit of AP's labor for its own profit, without compensating AP, injures AP's ability to perform this essential function of democracy.

While commercial Internet news clipping services like Meltwater perform an important function for their clients, the public interest in the existence of such commercial enterprise does not outweigh the strong public interest in the enforcement of the copyright laws or justify allowing Meltwater to free ride on the costly news gathering and coverage work performed by other organizations. Moreover, permitting Meltwater to avoid paying licensing fees gives it an unwarranted advantage over its competitors who do pay licensing fees.[9]

As will be further explored below, Meltwater characterizes itself as an Internet search engine and emphasizes the importance of search engines to the operation of the Internet. Together, search engines and the Internet have delivered the world's knowledge to the fingertips of multitudes across the globe. There is a strong public interest in preserving this democratic, instantaneous, and efficient access to information. But, there is no necessary tension between these two important public goods: news reporting and search engines. Quite to the contrary, these interests are complementary. The Internet would be far poorer if it were bereft of the reporting done by news organizations and both are enhanced by the accessibility the Internet provides to news gathered and delivered by news organizations. Neither Meltwater nor its amici have shown that a finding that Meltwater's activities do not amount to fair use threatens Internet search engines in any way. For all of these reasons, the first factor in the fair use analysis decidedly favors AP.

Meltwater's argument that its use of the Registered Articles is transformative is premised on a single contention. It characterizes Meltwater News as a search engine that directs users to a source of information online and whose search results provide insight into "where, when, how often, and in what context" certain words or phrases appear on the Internet. Meltwater defines a search engine as a system that by design and operation improves access to information that is available on the Internet. According to Meltwater, the design and function of a search engine should decrease the likelihood that users would put the material displayed by the search engine to the same use as the original works.

But, as can be gleaned from the discussion of Meltwater's operations in earlier sections of this Opinion, Meltwater's own description of Internet search engines does not correspond to how Meltwater News itself functions.[10] Meltwater News is an expensive subscription service that markets itself as a news clipping service, not as a publicly available tool to improve access to content across the Internet. And, as further confirmation that Meltwater News is neither designed nor operated to improve access to the complete, linked news story, Meltwater has chosen not to offer evidence that Meltwater News customers actually use its service to improve their access to the underlying news stories that are excerpted in its news feed.[11]

As far as the thirty-three Registered Articles are concerned, customers rarely clicked-through to the underlying AP article. It occurred just 0.08% of the time. In her deposition, a Meltwater executive testified that a click-through rate of 0.05% would be consistent with her expectations. The click-through rate for the thirty-three Registered Articles is also consistent with a UK tribunal's finding that Meltwater's services produced a click-through rate of 0.5% for certain UK news sources.[12] Meltwater has not offered any evidence that this seemingly small click-through rate is equivalent to that experienced by any of the Internet search engines to which it compares itself.[13] While it might be more telling to learn what the click-through rate is for any single Meltwater News Report, rather than for a single article excerpted in a News Report, Meltwater has not provided that information either. Nor has it offered a comparison between the click-through rate for any single News Report and the rate for a single Google News search or any other search for news conducted through a recognized Internet search engine.[14]

This was a conscious decision on Meltwater's part. During the discovery period, AP repeatedly requested additional data about Meltwater's click-through rate in anticipation of any argument by Meltwater that Meltwater News directs traffic to the original websites for the news articles. Meltwater took the position that the data was not relevant to these summary judgment motions and refused to provide this discovery. The upshot is that Meltwater has no evidence that its system systematically drives its customers to third-party websites.

Instead of driving subscribers to third-party websites, Meltwater News acts as a substitute for news sites operated or licensed by AP. Meltwater always reprints the story's title and lede, as well as material surrounding one targeted keyword. Just as a news clipping service should do, Meltwater systematically provides its subscribers with what in most instances will be the essence of the AP article relevant to that reader.[15] And again, despite the obvious point of comparison given its characterization of itself as a search engine, Meltwater does not attempt to show that the extent of its taking from the copyrighted articles is no greater than that customarily done by search engines. AP, in contrast, has offered evidence that Google News Alerts do not systematically include an article's lede and are — on average — half the length of Meltwater's excerpts.[16]

Rather than offering any evidence from which to compare its actual performance with that of Internet search engines, Meltwater has chosen to rely on two decisions from the Ninth Circuit Court of Appeals. Meltwater argues from these two decisions that the extent of its copying of the underlying work is irrelevant to the fair use analysis since even the copying of the full work can be transformative when done by an Internet search engine. Those two decisions, however, provide little comfort to Meltwater.

In Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146 (9th Cir. 2007), the Ninth Circuit vacated a preliminary injunction and held that Google was likely to succeed in showing at trial that the display of small images called "thumbnails," which were reduced, lower-resolution versions of the plaintiff's copyrighted photographs of nude models, on Google Image Search webpages was a fair use of the images. Id. at 1154-55, 1168. The court found that Google's use of thumbnails was "highly transformative" since its function was to serve as a pointer to a source of information rather than serving as a form of entertainment. Id. at 1165.

Similarly, in Kelly v. Arriba Soft Corp., 336 F.3d 811 (9th Cir. 2003), the Court of Appeals for the Ninth Circuit held that the display of small low-resolution pictures, again called thumbnails, on the website of an Internet search engine constituted a fair use of the plaintiff's photographs of the American West. Id. at 815. The search engine in Kelly produced only thumbnails in response to a user's query, and no text. The court found that the use of the thumbnails was transformative because their use was "unrelated to any aesthetic purpose" since any enlargement "results in a significant loss of clarity of the image, making them inappropriate as display material." Id. at 818. The display of thumbnails did not "stifle artistic creativity" or "supplant the need for the originals." Id. at 820.

There are several distinctions to be drawn between the instant dispute and the issues at stake in Perfect 10 and Kelly. The first and most obvious is that it was undisputed in both cases that the fair use defense was being applied to a search engine engaged in a transformative purpose. Unlike the searches in Perfect 10 and Kelly, Meltwater's searches are not publicly available and are run against a defined list of content providers. As already noted, Meltwater has also not offered evidence that it actually functions like a search engine in other important respects. In short, use of an algorithm to crawl over and scrape content from the Internet is surely not enough to qualify as a search engine engaged in transformative work.

The second observation that should be made is that the two Ninth Circuit decisions on which Meltwater relies provide little support for its argument that the reprinting of the entirety of a copyrighted work is a fair use so long as the reprinting is done by a search engine. The works at issue in the two Ninth Circuit decisions were photographs, which by their nature are indivisible. Neither Perfect 10 nor Kelly can be fairly read to support Meltwater's claim that it is irrelevant how much of the Registered Articles it displayed in its search results. By emphasizing the small size and low resolution of the thumbnails, the Ninth Circuit relied on the fact that the thumbnails could not substitute adequately for the copyrighted works. If Meltwater captured and displayed the complete text of copyrighted news stories, it could no longer attempt to defend its business model as simply a search engine that aims to direct readers to the underlying story.

Moreover, Meltwater's discussion of search engines is to some extent beside the point. While it is important to understand how Meltwater News functions, even if it were a search engine it would still be necessary to examine whether Meltwater had acted to violate the Copyright Act. The fact that Perfect 10 and Kelly addressed the issue of the fair use defense in the context of webpages created by a search engine, and found the defense available to those defendants, does not relieve Meltwater of its independent burden to prove that its specific display of search results for its subscribers qualifies as a fair use. In other words, using the mechanics of search engines to scrape material from the Internet and provide it to consumers in response to their search requests does not immunize a defendant from the standards of conduct imposed by law through the Copyright Act, including the statutory embodiment of the fair use defense.

By the same token, even though it could be said that a search engine merely "repackages" the original work, Infinity Broadcast Corp., 150 F.3d at 108 & n.2., and does not transform it in the sense of adding "new expression, meaning or message," Campbell, 510 U.S. at 579, that does not mean that its taking is ineligible for protection under the fair use defense. Where a defendant's use "is plainly different from the original purpose" for which the work was created, that use may be transformative. Bill Graham Archives, 448 F.3d at 609 (approving reproduction of a small image of poster along a timeline in a biography). As described by amici, the purpose of search engines is to allow users to sift through the deluge of data available through the Internet and to direct them to the original source. That would appear to be a transformative purpose. But, as discussed above, Meltwater has not shown that that is how it functions.

Based on the undisputed facts in this record, Meltwater provides the online equivalent to the traditional news clipping service. Indeed, Meltwater has described itself as adding "game-changing technology for the traditional press clipping market." There is nothing transformative about that function. See, e.g., Video Pipeline, Inc. v. Buena Vista Home Entm't, Inc., 342 F.3d 191, 199 (3d Cir. 2003) (clip previews of movies); Nihon, 166 F.3d at 72 (abstracts of news articles); Infinity Broadcast Corp., 150 F.3d at 108 (radio monitoring service); Los Angeles News Service v. Tullo, 973 F.2d 791, 797, 799 (9th Cir. 1992) (video news clipping service.); Pacific and Southern Co., Inc. v. Duncan, 744 F.2d 1490, 1496 (11th Cir. 1984) (TV news clipping service).

Finally, Meltwater seeks to defend its copying of the Registered Articles by pointing out that it used the content it takes from the Internet to also provide its subscribers with services like Dashboard Analytics. Meltwater argues that this use of the material constitutes a transformative use. This lawsuit does not challenge the display of any of Meltwater's analytics to its subscribers. AP has not argued that the analysis of its publicly available content through these tools violates it rights. The display of that analysis — whether it be a graphic display of geographic distribution of coverage or tone or any other variable included by Meltwater — is an entirely separate service, however, from the publishing of excerpts from copyrighted articles. The fact that Meltwater also offers a number of analysis tools does not render its copying and redistribution of article excerpts transformative. In sum, the purpose and character of Meltwater's use of AP's articles weigh against a finding of fair use.

B. Nature of the Copyrighted Work

The second factor — the nature of the copyrighted work — considers principally two characteristics of the copyrighted work. First, this factor calls for consideration of "whether the work is expressive or creative, such as a work of fiction, or more factual." Blanch, 467 F.3d at 256 (citation omitted). Works of fiction are "closer to the core of intended copyright protection" than are works that are predominantly factual. Infinity Broadcast Corp., 150 F.3d at 109 (citation omitted). Accordingly, the scope of fair use is broader with respect to factual works than it is with respect to works of fiction. See Nihon, 166 F.3d at 73.

The second characteristic of the copyrighted work that is relevant to this factor is whether the work is published or unpublished. The right of first publication is an important right held by the copyright owner and "the scope of fair use is narrower with respect to unpublished works." Wright v. Warner Books, Inc., 953 F.2d 731, 737 (2d Cir. 1991) (citation omitted).

AP's articles are news stories and therefore more vulnerable to application of the fair use defense than works of fiction. Moreover, Meltwater copied works that were already published. As a consequence, this factor "is at most neutral on the question of fair use," Nihon, 166 F.3d at 73, and should be weighed in favor of finding fair use.

C. Amount and Substantiality of the Copying

The third factor examines the amount and substantiality of the copying by the infringing work. This factor has both quantitative and qualitative dimensions, NXIVM Corp. v. the Ross Inst., 364 F.3d 471, 480 (2d Cir. 2004), and is reviewed "with reference to the copyrighted work, not the infringing work." Wright, 953 F.2d at 738.

The quantitative assessment examines the portion of the copyrighted work that was taken in relation to the whole of that work. The qualitative dimension of this factor considers the importance of the expressive components of the portion copied. See Campbell, 510 U.S. at 587; see also Rogers v. Koons, 960 F.2d 301, 311 (2d Cir. 1992). In other words, the court should consider whether the portion taken is "essentially the heart" of the copyrighted expression. NXIVM Corp., 364 F.3d at 480 (citation omitted). The "most relevant" question for this factor is whether the infringer has taken "no more" than is necessary. Infinity Broadcast Corp., 150 F.3d at 110.

In terms of quantitative copying, the Second Circuit has found that copying as little as eight percent of the original work may tip this factor against a finding of fair use. Iowa State Univ. Research Found., Inc. v. Am. Broad. Co., 621 F.2d 57, 61-62 (2d Cir. 1980) (broadcasting of eight percent of student-made film); see also Salinger v. Random House, Inc., 811 F.2d 90, 98 (2d Cir. 1987) (copying one-third of seventeen letters and ten percent of forty-two letters weighed against finding of fair use). It is clear, however, that no bright-line rule exists with respect to how much copying is too much. New Era Publ'ns Intern., ApS v. Carol Publ'g Group, 904 F.2d 152, 158 (2d Cir. 1990). Thus, in other cases, copying up to eight percent of an original work is not inconsistent with fair use. Id. (eight percent); Maxtone-Graham v. Burtchaell, 803 F.2d 1253, 1263 (2d Cir. 1986) (4.3 percent). Indeed, while appropriation of a copyrighted work in its entirety weighs against a finding of fair use, where a work is indivisible it is not an absolute bar to such a finding. See Bill Graham Archives, 448 F.3d at 613 (image of poster). At the same time, relatively small takings may be significant if the portions taken are qualitatively important. Harper & Row, 471 U.S. at 564-65 (copying of 300 words of biography held substantial where copied portion was "essentially the heart of the book").

The reasonableness of the amount and portions copied will vary depending on the character and purpose of the secondary use. It may be necessary for the secondary user to copy a certain amount or specific portion of the original work in order to accomplish the transformative purpose. The Supreme Court's analysis in Campbell v. Acuff-Rose Music, 510 U.S. 569 (1994), is instructive. In that case, a rap group — 2 Live Crew — sampled portions of Roy Orbison and William Dees' song "Oh, Pretty Woman" in a rap parody entitled "Pretty Woman." Id. at 572. In considering the amount and substantiality of the copying, the Supreme Court offered the following analysis:

When parody takes aim at a particular work, the parody must be able to `conjure up' at least enough of that original to make the object of its critical wit recognizable. What makes for this recognition is quotation of the original's most distinctive or memorable features, which the parodist can be sure that audience will know. Once enough has been taken to assure identification, how much more is reasonable will depend, say, on the extent to which the song's overriding purpose and character is to parody the original or, in contrast, the likelihood that the parody may serve as a market substitute for the original.

Id. at 588 (citation omitted). An analysis of this factor may offer insight into the fourth factor of the fair use analysis as well. In effect, the substantiality of the copying may foreshadow the extent to which the second work will be capable of serving as a market substitute for the original work. Id. at 587.

This factor weighs strongly against a finding of fair use here. Meltwater has not shown that its taking from the Registered Articles was defensible from either a quantitative or qualitative perspective.

Meltwater took between 4.5% and 61% of the Registered Articles. It automatically took the lede from every AP story. As described by AP's Standards Editor, the lede is "meant to convey the heart of the story." A lede is a sentence that takes significant journalistic skill to craft. There is no other single sentence from an AP story that is as consistently important from article to article — neither the final sentence nor any sentence that begins any succeeding paragraph in the story.

Nor has Meltwater attempted to show that it took no more than necessary to perform as a search engine, which is how it seeks to justify its infringement. It has not offered evidence that its automated programs for culling and displaying passages from articles are consistent with the industry standards for search engines. As the evidence offered on this motion illustrates, search engines regularly display briefer segments of news articles. As the CCIA describes the segments taken by search engines, they are no more than "a headline and a snippet of context" designed to direct users to the original source. Indeed, in its foreign operations, it is undisputed that Meltwater provides its customers with far less material than it provides in the United States. In Canada it delivers only headlines, and in the United Kingdom its excerpts are far shorter.

Meltwater makes essentially three arguments to support its infringement under the third factor's quantitative and qualitative tests. None of these arguments is persuasive.

First, Meltwater relies on Nihon, 166 F.3d at 65, to argue that its taking was not quantitatively significant. In Nihon, the Second Circuit found, although acknowledging that it was a "close call," that the copying of only one paragraph of a six-paragraph news article was not an act of infringement since the two articles were not substantially similar in a "quantitative sense." Id. at 71. Since Meltwater has not chosen, however, to contest AP's showing that its copying of each of the Registered Articles was an act of infringement, the Nihon court's discussion about the substantial similarity test for infringement has limited relevance here. In any event, when it reached the fair use defense, the Nihon court found that the abstracting of news articles by the defendant was not a fair use of those articles. In connection with the third factor, it emphasized the amount of copying of protectable expression and held that this factor also tipped against fair use. Id. at 73.[17]

Next, Meltwater argues that the extent of its copying is justified because its purpose is to serve as a search engine. But, Meltwater has failed to show that it takes only that amount of material from AP's articles that is necessary for it to function as a search engine. Indeed, the evidence is compellingly to the contrary.

Finally, Meltwater disagrees that the lede is qualitatively significant. It points out that two of the ledes are teasers and not summaries of news.[18] This observation misses the mark. If anything, the observation emphasizes the creativity and therefore protected expression involved with writing a lede and the skill required to tweak a reader's interest.

D. The Effect of the Use on the Potential Market or Value of the Work

The final fair use factor is multi-faceted. It

requires courts to consider not only the extent of market harm caused by the particular actions of the alleged infringer, but also whether unrestricted and widespread conduct of the sort engaged in by the defendant would result in a substantially adverse impact on the potential market for the original.

Campbell, 510 U.S. at 590 (citation omitted). Where there is a fully functioning market for the infringer's use of the copyrighted material, it will be difficult for the infringing party to show that it made fair use without paying a licensing fee. See Harper & Row, 471 U.S. at 566 n.9. In contrast, "when the only possible adverse effect occasioned by the secondary use would be to a potential market or value that the copyright holder has not typically sought to, or reasonably been able to, obtain or capture," this fourth factor will favor the infringer. Am. Geophysical Union, 60 F.3d at 930. But, again, because fair use is an affirmative defense, it is the defendant's burden to present evidence of relevant markets that is favorable to its defense. Campbell, 510 U.S. at 590; Infinity Broadcast Corp., 150 F.3d at 110.

When analyzing the fourth factor, "the impact on potential licensing revenues is a proper subject for consideration." Am. Geophysical Union, 60 F.3d at 929. In considering this type of harm, however, a court must be wary of falling into the trap of circular reasoning. The Second Circuit has provided the following guidance:

[I]t is not unsound to conclude that the right to seek payment for a particular use tends to become legally cognizable under the fourth fair use factor when the means for paying for such a use is made easier. This notion is not inherently troubling: it is sensible that a particular unauthorized use should be considered more fair when there is no ready market or means to pay for the use, while such an unauthorized use should be considered less fair when there is a ready market or means to pay for the use. The vice of circular reasoning arises only if the availability of payment is conclusive against fair use.

Id. at 930-31. Thus, in order to prevent the loss of licensing fees from becoming a syllogistic consideration, courts consider only the loss to potential licensing revenues from "traditional, reasonable, or likely to be developed markets." Id. at 930; see also Bill Graham Archives, 448 F.3d at 614.

Consequently, when the use is transformative or takes place in a market that the copyright holder is unlikely to develop, it is more likely that the defendant has engaged in a fair use of the material. After all, "[c]opyright holders rarely write parodies of their own works, or write reviews of them, and are even less likely to write news analyses of their underlying data from the opposite political perspective." Twin Peaks Products, Inc. v. Publ'ns Intern LTD, 996 F.2d 1366, 1377 (2d Cir. 1993) (citation omitted); cf. Campbell, 510 U.S. at 592-93. Accordingly, while a copyright holder's current participation in a given market is relevant to the determination of whether the market is "traditional, reasonable, or likely to be developed," it is not determinative.

[A] copyright holder cannot prevent others from entering fair use markets merely by developing or licensing a market for parody, news reporting, educational or other transformative uses of its own creative work.

Bill Graham Archives, 448 F.3d at 614-15 (citation omitted). In other words, "[c]opyright owners may not preempt exploitation of transformative markets." Id. at 615 (citation omitted). Additionally, this factor requires careful attention to the source or cause of the harm.

If the harm resulted from a transformative secondary use that lowered the public's estimation of the original (such as a devastating review of a book that quotes liberally from the original to show how silly and poorly written it is), this transformative use will be found to be a fair use, notwithstanding the harm.

On Davis, 246 F.3d at 175. The concern of this factor is not with "whether the secondary use suppresses or even destroys the market for the original work or its potential derivatives, but [with] whether the secondary use usurps or substitutes for the market of the original." Castle Rock Entm't, 150 F.3d at 145.

The fourth factor weighs strongly against Meltwater. AP has expended considerable effort to develop an on-line presence. Among other things, it licenses its content to media monitoring services that live in the very commercial space in which Meltwater resides. By refusing to pay a licensing fee to AP, Meltwater not only deprives AP of a licensing fee in an established market for AP's work, but also cheapens the value of AP's work by competing with companies that do pay a licensing fee to use AP content in the way that Meltwater does. The value of AP's work is further harmed by the fact that Meltwater directly competes with AP for customers. Through its use of AP content and refusal to pay a licensing fee, Meltwater has obtained an unfair commercial advantage in the marketplace and directly harmed the creator of expressive content protected by the Copyright Act.

Meltwater ignores most of this record. It relies almost exclusively on its contentions that it is a search engine and that search engines make a transformative use of the copyrighted news stories. But, as discussed above, AP has not shown that it should be characterized as a search engine imbued with a transformative purpose; adopting technology used by search engines does not by itself make one a search engine in this sense. As tellingly, Meltwater has not shown that it has taken only that amount of content that is necessary for it to function as a search engine.

E. Aggregate Assessment of the Fair Use Factors

Examining the four factors individually, and considering them as a whole in light of the purposes of the Copyright Act and the fair use defense, Meltwater has failed to raise a material question of fact to support its fair use defense. Meltwater's business model relies on the systematic copying of protected expression and the sale of collections of those copies in reports that compete directly with the copyright owner and that owner's licensees and that deprive that owner of a stream of income to which it is entitled. Meltwater's News Reports gather and deliver news coverage to its subscribers. It is a classic news clipping service. This is not a transformative use. As significantly, the rejection of the fair use defense here will further the ultimate aim of the Copyright Act, which is to stimulate the creation of useful works for the public good. Harper & Row, 471 U.S. at 558.

Throughout its discussion of the fair use defense, Meltwater has attempted to escape the straight forward application of the four-part fair use test by characterizing itself as a search engine. Meltwater has failed to show, however, that its interactions with its subscribers are equivalent in any material way to the functioning of search engines, as that term is commonly understood. Exploitation of search engine technology to gather content does not answer the question of whether the business itself functions as a search engine. In any event, however Meltwater's business is classified, it must still show that its use of copyrighted expressive content was a fair use. This it has not done.

II. Implied License

AP has also moved for summary judgment on Meltwater's second affirmative defense, the defense that Meltwater was granted an implied license by AP. It is a defense to copyright infringement that the alleged infringer possessed a license to use the copyrighted work. Graham v. James, 144 F.3d 229, 236 (2d Cir. 1998). The burden of proving that a license exists falls on the party invoking the defense. Id.

Pursuant to the Copyright Act, all grants of exclusive rights in a copyright must be made in writing. 17 U.S.C. § 204(a). Nonexclusive licenses, however, need not be in writing. 17 U.S.C. § 101; see also MacLean Assocs. Inc. v. VM. M. Mercer-Medinger-Hansen, Inc., 952 F.2d 769, 778-79 (3d Cir. 1991). Thus, a nonexclusive license can be granted orally or it can be implied from conduct. See MacLean Assocs., 952 F.2d at 778-79. As the Supreme Court explained in De Forest Radio Telephone & Telegraph v. United States, 273 U.S. 236 (1927), in the course of deciding whether a company had given a license to the United States to manufacture a product covered by patents:

No formal granting of a license is necessary in order to give it effect. Any language used by the owner of the patent or any conduct on his part exhibited to another, from which that other may properly infer that the owner consents to his use of the patent in making or using it, or selling it, upon which the other acts, constitutes a license, and a defense to an action for a tort.

Id. at 241.

The test for determining whether an implied license exists in the copyright context has three elements. The defendant must show that

(1) the licensee requested the creation of a work;

(2) the licensor made that particular work and delivered it to the licensee who requested it; and

(3) the licensor intended that the licensee copy and distribute his work.

See Latimer v. Roaring Toyz, Inc., 601 F.3d 1224, 1235 (11th Cir. 2010); see also Wilchombe v. TeeVee Tonns, Inc., 555 F.3d 949, 956 (11th Cir. 2009); Atkins v. Fischer, 331 F.3d 988, 991-92 (D.C. Cir. 2003); Nelson-Salabes, Inc. v. Morningside Development, LLC, 284 F.3d 505, 514 (4th Cir. 2002); I.A.E. Inc. v. Shaver, 74 F.3d 768, 776 (7th Cir. 1996). The circumstances in which an implied license may be found are therefore quite "narrow." SmithKline Beecham Consumer Healthcare v. Watson Pharmaceuticals, Inc., 211 F.3d 21, 25 (2d Cir. 2000) (citation omitted).

Even those courts that do not require evidence of each of these three elements do require evidence of a meeting of the minds between the licensor and licensee such that it is fair to infer that the licensor intended to grant a nonexclusive license. Baisden v. I'm Ready Prods., Inc., 693 F.3d 491, 501 (5th Cir. 2012) (collecting cases); see also Psihoyos v. Pearson Educ. Inc., 855 F.Supp.2d 103, 124 (S.D.N.Y. 2012). Since an implied license is a creature of contract law, the parties' intent is a critical factor. I.A.E., 74 F.3d at 775-76; see also Johnson v. Jones, 149 F.3d 494, 502 (6th Cir. 1998).

Meltwater has failed to offer evidence from which a reasonable juror could conclude that AP impliedly granted Meltwater a license to copy and distribute its articles. It is undisputed that the Registered Articles were not created at Meltwater's request. Moreover, the parties had essentially no contact with each other before this litigation.[19] As a result, Meltwater is unable to point to any interaction with AP from which it could be inferred that there was a meeting of minds between the parties that AP was granting Meltwater a nonexclusive license to extract and re-publish excerpts of its news stories that appeared on the Internet.

Meltwater has not shown that it had the type of interaction with AP that existed in any of those few instances in which Courts of Appeals across the country have found evidence of an implied license. See, e.g. Lukens Steel Co. v. Am. Locomotive Co., 197 F.2d 939, 941 (2d Cir. 1952) (the parties "were engaged in business relationship involving mutual confidence and mutual effort"); Atkins, 331 F.3d at 990 (parties had formal agreement under which appellant would create designs for appellees' product); I.A.E., 74 F.3d at 771-72, 776 (architect prepared schematic design drawings at company's request and delivered copies to company).

Nor has Meltwater offered any evidence of interaction with any of AP's licensees from which it could be inferred that any one of those licensees had impliedly granted a sublicense to Meltwater to excerpt material found on their websites. This is unsurprising since AP's licenses do not grant its licensees the authority to sublicense AP content.

In its opposition, Meltwater makes one argument to support its affirmative defense of implied license. It once again equates its activities with those of a search engine that makes its searches freely available to the public in order to direct the Internet user to the websites that respond to the user's search requests. Meltwater argues that AP impliedly granted Meltwater a license to use the Registered Articles when it did not require its licensees to employ on their websites robots.txt protocol to exclude web crawlers.[20]

Meltwater has not offered any expert testimony about robots.txt, but the parties appear to agree that it functions as follows. Robots.txt protocol, also known as the Robot Exclusion Standard, was designed by industry groups to instruct cooperating web crawlers not to access all or part of a website that is publicly viewable. If a website owner uses the robots.txt file to give instructions about its site to web crawlers, and a crawler honors the instruction, then the crawler should not visit any pages on the website. The protocol can also be used to instruct web crawlers to avoid just a portion of the website that is segregated into a separate directory.

For several reasons, the failure of AP's licensees to employ the robots.txt protocol did not give Meltwater an implied license to copy and publish AP content. First, what Meltwater is suggesting would shift the burden to the copyright holder to prevent unauthorized use instead of placing the burden on the infringing party to show it had properly taken and used content.

As significantly, there is no fair inference, based simply on the absence of the robots.txt protocol, that there has been a meeting of the minds between the copyright owner and the owner of the web crawler about the extent of copying. The implied license that Meltwater is advocating would reach to every web crawler with no distinction between those who make fair use and those who do not, or between those whose uses may be publicly observed and those whose uses are hidden within closed, subscriber systems. Meltwater has presented no evidence to suggest that robots.txt instructions are capable of communicating which types of use the copyright holder is permitting the web crawler to make of the content or the extent of the copying the copyright holder will allow.

There are also practical problems with Meltwater's argument in the event that AP and its licensees wanted to continue to permit search engines to visit their sites. AP is engaged in an ongoing licensing program that includes granting licenses that permit the scraping of AP content by web crawlers from online sources. Robots.txt protocol can be adopted to allow or disallow specific web crawlers. If Meltwater's argument were successful, with each change in the list of licensees AP and each of its licensees would have to update their robots.txt protocol to indicate which web crawlers had permission to visit each site's webpages.[21]

There is yet another policy reason against the use of robots.txt protocol to enforce the Copyright Act. The protocol is a helpful innovation that gives instructions to cooperating crawlers. But, in the interest of openness on the Internet, one would expect it to be used only when it is in the clear interest of the website to broadly limit access. It is fair to assume that most Internet users (and many owners of websites) would like crawlers employed by search engines to visit as many websites as possible, to include those websites in their search results, and thereby to direct viewers to a vast array of sites. Adopting Meltwater's position would require websites concerned about improper copying to signal crawlers that they are not welcome.

Finally, in support of its argument, Meltwater cites Field v. Google, 412 F.Supp.2d 1106 (D. Nev. 2006), and Parker v. Yahoo!, Inc., No. 07 Civ. 2757, 2008 WL 4410095 (E.D. Pa. Sept. 25, 2008). Neither decision suggests that AP impliedly consented to the copying done by Meltwater because its licensees permitted search engines to crawl their sites. These two decisions principally discuss a website protocol that performs a different function than robots.txt. They address the storage of web pages by search engines. The "cached" pages at issue allowed users of the search engines to access an archival copy of a webpage stored in the search engine's system. The archival copy shows the page as it appeared the last time the search engine visited the page. Field, 412 F.Supp.2d at 1111. This can be particularly useful when a page has been removed from its original location. Id. By adopting a "no-archive" meta-tag, the website owner could instruct the search engines not to provide a cached link to search engine users. Id. at 1112-13. The copyright owners in each of these decisions chose not to use the "no-archive" meta-tags, knew that the search engines would honor the meta-tags, and also knew the search engines would remove the cached copy upon request. In such circumstances, the courts found an implied license. Id. at 1116; Parker, 2008 WL 4410095, at *4.

Meltwater does not provide its subscribers with access to cached pages, reserves the right to disregard certain robots.txt instructions, and has not suggested that it will remove content from its system at the request of the copyright owner. As a result, these two decisions have limited relevance.

It is worth observing that, when a crawler is making a fair use of a website's content, it does not need to resort to the implied license doctrine; where it does not, then the website's failure to use the robots.txt protocol to block its access will not create an implied license. Accordingly, Meltwater's implied license defense fails as a matter of law.[22]

III. Equitable Estoppel

Meltwater relies on three additional affirmative defenses as reasons why summary judgment may not be entered in favor of AP on its copyright infringement claim. The first is equitable estoppel.

Meltwater argues that AP is estopped from bringing its claim of copyright infringement because it failed to take protective measures and was silent in the face of Meltwater's actions. This defense is no more effective than Meltwater's affirmative defense of implied license.

The doctrine of equitable estoppel applies "where the enforcement of the rights of one party would work an injustice upon the other party due to the latter's justifiable reliance upon the former's words or conduct." Marvel Characters, Inc. v. Simon, 310 F.3d 280, 292 (2d Cir. 2002) (citation omitted). Essential to any finding of estoppel is "detrimental reliance on the adverse party's misrepresentations." Republic of Ecuador v. Chevron Corp., 638 F.3d 384, 400 (2d Cir. 2011). Reliance is not justifiable if the party invoking estoppel "had the means by which with reasonable diligence he could acquire the knowledge so that it would be negligence on his part to remain ignorant by not using those means." In re Becker, 407 F.3d 89, 99 (2d Cir. 2005) (citation omitted) (Emphasis omitted.) Silence alone is rarely a basis for finding equitable estoppel, but "where a party has a legal duty to speak, silence can constitute an affirmative `misrepresentation.'" Kosakow v. New Rochelle Radiology Assocs., P.C., 274 F.3d 706, 725 (2d Cir. 2001); see also Veltri v. Bldg 32B-J Pension Fund, 393 F.3d 318, 326 (2d Cir. 2004); General Elec. Capital Corp. v. Armadora, S.A., 37 F.3d 41, 45 (2d Cir. 1994).

Meltwater has not carried its burden of raising a question of fact suggesting that AP made any misrepresentations or acted in any way that would have justified Meltwater believing that it was entitled to publish the excerpts from the Registered Articles or would not be sued for copyright infringement if it did. Meltwater has not pointed to any representation by AP or its licensees that led it to believe that it could act as it did in publishing the excerpts of AP articles. To the contrary, many if not all of AP's licensees display terms of use on their websites prohibiting the commercial use of content.[23] Nor has Meltwater shown that it acted with the diligence required to assert this defense. Indeed, Meltwater has not offered any evidence that it actually held the belief that AP had authorized it to publish the excerpts it took from AP online articles.

Meltwater relies instead on two omissions by AP to support its affirmative defense of equitable estoppel. The first is that AP did not restrict general access to its online content by requiring its licensees to put AP content behind a paywall, require registration for access, or use robots.txt instructions to signal that AP content was off-limits. AP had no duty to take any of these steps before it could act to enforce its rights against copyright infringement. No infringer of AP's copyright could reasonably rely on the absence of these measures to excuse infringement.

Meltwater next argues that, until it initiated this lawsuit, AP never told Meltwater that it had any objection to Meltwater's use of AP content. But, Meltwater has offered no evidence of any relationship or communication with AP that imposed upon AP the duty to speak. In the absence of a duty to speak, Meltwater could not reasonably rely on AP's alleged silence about its copyright infringement.

Not only has Meltwater failed to offer evidence of any justifiable reliance, but the evidence submitted on these motions also indicates that Meltwater was on notice of the risk it ran of being sued by AP for copyright infringement. As mentioned, many — if not all — of the websites that Meltwater crawled in order to copy AP articles post terms of use that specifically prohibit commercial use of the website's content. In October of 2007, AP sued one of Meltwater's competitors — Moreover Technologies, Inc. ("Moreover") — for copyright infringement on the basis of Moreover's scraping of AP content from websites and distribution of excerpts or entire articles to Moreover's customers.[24] In April 2009, AP issued a press release describing its launch of an industry initiative to protect news content from online misappropriation. Later that year, AP announced that an initiative to monitor the use of AP's content online had been created. Had Meltwater been reasonably diligent in acquiring knowledge about AP's views on the commercial redistribution of its content, it could not have remained ignorant of the true facts. Meltwater has failed, therefore, to show that the doctrine of equitable estoppel prevents the entry of summary judgment in favor of AP.

IV. Laches

Meltwater also argues that its affirmative defense of laches prevents summary judgment from being granted in AP's favor. The Copyright Act sets a three-year statute of limitations for copyright infringement claims. 17 U.S.C. § 507(b). A copyright claim accrues "when a plaintiff knows or has reason to know of the injury upon which the claim is premised." Merchant v. Levy, 92 F.3d 51, 56 (2d Cir. 1996). When the copyright claim is based on infringement, the "action may be commenced within three years of any infringing act, regardless of any prior acts of infringement." Kwan v. Schlein, 634 F.3d 224, 228 (2d Cir. 2011). The parties agree that the plaintiff's copyright infringement claims with respect to the Registered Articles were filed within the three-year statute of limitations.

The defendant claims that while the statute of limitations may not bar the plaintiff's claims, the doctrine of laches does. The doctrine of laches is derived from the equitable principle that "equity aids only the vigilant, and not those who sleep on their rights." Ivani Contracting Corp. v. City of New York, 103 F.3d 257, 259 (2d Cir. 1997) (citation omitted). The doctrine of laches has three elements: "(1) the plaintiff knew of the defendant's misconduct; (2) the plaintiff inexcusably delayed in taking action; and (3) the defendant was prejudiced by the delay." Ikelionwu v. United States, 150 F.3d 223, 237 (2d Cir. 1998) (laches applied to request for return of seized property).

There is disagreement among the Circuits regarding whether laches is a viable defense to a copyright claim brought within the three-year statute of limitation. See Petrella v. Metro-Goldwyn-Mayer, Inc., 695 F.3d 946, 958 (9th Cir. 2012) (Fletcher, J., concurring) (describing the circuit split). In the Second Circuit, "[t]he prevailing rule" in the context of a federal statutory claim seeking legal relief, is one in which "laches cannot bar that claim, at least where the statute contains an express limitations period within which the action is timely." Ivani Contracting Corp., 103 F.3d at 260. Even in the context of an action in equity, the doctrine of laches will rarely be applied within this circuit to an action brought within the statutory period. Ikelionwu, 150 F.3d at 238. Nonetheless, severe prejudice coupled with unconscionable delay may limit injunctive relief in a copyright action. New Era Publ'ns, 873 F.2d at 584-85.

Accordingly, laches is not a defense to the plaintiff's claim for damages. Laches is also not available to Meltwater as a defense to copyright infringement to the extent AP seeks prospective injunctive relief. See Peter Letterese and Assocs. Inc., 533 F.3d at 1321. Equitable considerations — like laches — may arise, however, where a plaintiff seeks retrospective injunctive relief and can demonstrate each of the traditional elements of the laches defense. See New Era Publ'ns, 873 F.2d at 584.

In its amended complaint, AP seeks both damages and injunctive relief. In terms of injunctive relief, AP seeks both prospective relief and an order requiring Meltwater to "delete from its database and all computers under Defendants' control all copyrighted materials owned by AP and all AP news reports." Should Meltwater carry its burden of showing laches, it would at most be able to bar AP's request that AP's content be swept from Meltwater's databases. The parties will be given an additional opportunity to address whether retrospective injunctive relief should be granted in this case.

V. Copyright Misuse

As its fifth and final affirmative defense to AP's copyright infringement claims, Meltwater argues that AP should be barred from enforcing its copyrights because — by engaging in price-fixing with competing news organizations in violation of the antitrust laws — it has misused its copyrights. This final defense fails as well.

The Second Circuit has not yet recognized the affirmative defense of copyright misuse. See Shady Records v. Source Enters., 03 Civ. 9944 (GEL), 2005 WL 14920, at *15 (S.D.N.Y. Jan. 3, 2005). Although copyright misuse has been acknowledged as a potential affirmative defense to an action for copyright infringement in at least five circuits, only a handful of decisions have ever applied it to bar an otherwise successful claim of copyright infringement. See Video Pipeline, 342 F.3d at 206 (recognizing defense but finding no misuse); Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d 772, 795 (5th Cir. 1999) (plaintiff's copyright misuse barred it from obtaining injunctive relief on its copyright infringement claim); Practice Mgmt. Info. Corp. v. Am. Med. Assoc., 121 F.3d 516, 521 (9th Cir. 1997) (reversing award of damages and injunction for copyright infringement because of plaintiff's copyright misuse); Lasercomb Am. v. Reynolds, 911 F.2d 970, 979 (4th Cir. 1990) (reversing award of damages and injunction for copyright infringement due to plaintiff's copyright misuse); United Telephone Co. of Missouri v. Johnson Pub. Co., Inc., 855 F.2d 604, 612 (8th Cir. 1988) (assuming defense exists but finding no misuse).

The defense of copyright misuse arises from the better-known defense of patent misuse described in Morton Salt Co. v. G.S. Suppiger, 314 U.S. 488 (1942). In Morton Salt, the patent holder for the design of a salt-depositing machine also produced salt tablets. Morton Salt entered into licensing agreements that required its licensees to use Morton salt tablets exclusively. When Morton Salt brought suit for patent infringement, the Supreme Court found that its suit was barred by its use of its "patent monopoly to restrain competition in the marketing of unpatented articles." Id. at 491. The Supreme Court described the rationale behind the defense as follows:

The grant to the inventor of the special privilege of a patent monopoly carries out a public policy adopted by the Constitution and laws of the United States, `to promote the Progress of Science and useful Arts, by securing for limited Times to Inventors the Exclusive Rights . . . to their `new and useful' inventions. But the public policy which includes inventions within the granted monopoly excludes from it all that is not embraced in the invention. It equally forbids the use of the patent to secure an exclusive right or limited monopoly not granted by the Patent Office and which it is contrary to public policy grant.

Id. at 492 (citation omitted).

In 1990, the Fourth Circuit became the first circuit to expressly recognize the defense of copyright misuse. Lasercomb Am., 911 F.2d at 977-79. Relying on "[t]he origins of patent and copyright law in England, the treatment of these two aspects of intellectual property by the framers of our Constitution, and the later statutory and judicial development of patent and copyright law in this country," the court concluded that the misuse of copyright should be available as a defense to copyright infringement. Id. at 974. It further concluded that the existence of an antitrust violation was not a pre-requisite to a viable copyright misuse claim:

[W]hile it is true that the attempted use of a copyright to violate antitrust law probably would give rise to a misuse of copyright defense, the converse is not necessarily true — a misuse need not be a violation of antitrust law in order to comprise an equitable defense to an infringement action. The question is not whether the copyright is being used in a manner violative of antitrust law . . . but whether the copyright is being used in a manner violative of the public policy embodied in the grant of copyright.

Id. at 978. Consistent with this rationale, it described copyright misuse as arising from a copyright holder's attempt to use its copyright in a particular expression "to control competition in an area outside the copyright." Id. at 979.

Whatever the metes and bounds of the defense, it is one that is applied "sparingly." Apple Inc. v. Pystar Corp., 658 F.3d 1150, 1157 (9th Cir. 2011). Its focus is on the improper stifling of competition. Id. at 1157-59.

Meltwater contends that it has offered sufficient evidence that AP engaged in a per se violation of the antitrust laws to raise a question of fact that prevents summary judgment being granted on AP's copyright infringement claim. Specifically, Meltwater asserts that it has offered evidence that AP violated antitrust law "[b]y foisting a pricing structure and minimum target prices upon a licensing entity, and by sharing its own pricing information" with that licensing agency and its members.

The licensing entity to which Meltwater is referring is NewsRight. NewsRight is a joint venture between AP and other publishers formed in 2011 and publicly launched in 2012. NewsRight's stated aim is to "work with third parties — such as commercial aggregators and media-monitoring companies — to license content from a large set of major publishers and to allow both publishers and third-party licensees to track and analyze the use of news content online." Those news publishers that are members of NewsRight have authorized NewsRight to license their content on a nonexclusive basis. So far, NewsRight has entered into two license agreements, but it has not yet licensed any AP content.

Even assuming that this circuit were to adopt the affirmative defense of copyright misuse to a claim of copyright infringement, and assuming further that Meltwater had raised a question of fact as to whether AP shared its own pricing information with NewsRight and "imposed" a pricing structure on and minimum prices for the licenses offered by the joint venture, Meltwater has not shown that summary judgment should not be granted to AP on its copyright infringement claim. AP's alleged conduct does not amount to copyright abuse. Nothing in the conduct alleged by Meltwater suggests that AP has improperly leveraged its copyrights to exert control over competition in the delivery of news. Every one of its competitors, whether a member of NewsRight or not, retains the power to issue its own licenses according to whatever pricing scale it chooses. AP does not create the news, control access to the news, or have any power to restrict any other party's entry into the business of reporting the news. Meltwater has not explained how AP's supposed actions would have interfered with the Copyright Act's goal of "increas[ing] the store of creative expression for the public good." Video Pipeline, 342 F.3d at 205.

Moreover, Meltwater's proffered evidence does not even suggest any misconduct by AP. Meltwater's argument that AP has used its participation in NewsRight to engage in price fixing relies on essentially three documents. The most significant of these is an email from 2011, in which AP suggests that the aggregator market be divided into three segments (Top players; Premium Institutional Specialists; and PR Community/Press Clipping Services) and then suggests minimum target licensing fees for NewsRight's licenses within each of the segments.[25] NewsRight ultimately rejected this approach and developed a different licensing structure. Nothing in this opening gambit about the appropriate pricing structure for the creation of a new product by a joint venture suggests a violation of the antitrust laws. In sum, Meltwater has not shown that the doctrine of copyright misuse, even if adopted in this circuit, should prevent summary judgment being awarded to AP on its claim of copyright infringement.[26]

VI. Meltwater's Motion for Summary Judgment on AP's Secondary Infringement Claims

In addition to moving for summary judgment on the basis of its fair use defense, Meltwater has moved for summary judgment on AP's claims of contributory and vicarious copyright infringement. These claims are based on AP's allegations that Meltwater has encouraged and assisted its customers to copy, store, and redistribute AP articles or portions of AP articles, in particular, through the use of Meltwater's archiving, Newsletter, and Newsfeed functions. In its motion for summary judgment, Meltwater points out that AP has offered no evidence that an actual Meltwater customer ever stored or distributed full text versions of any of the thirty-three Registered Articles.[27] Because there is no evidence of direct infringement by its customers, Meltwater contends, there can be no finding of contributory or vicarious copyright infringement. In an affidavit submitted pursuant to Federal Rule of Civil Procedure 56(d), AP requests additional discovery. Because Meltwater's motion for summary judgment is based principally on AP's failure of proof, and because AP is entitled to additional discovery on these claims, Meltwater's motion is denied without prejudice to renewal.

VII. Meltwater's Evidentiary Objections

Meltwater has filed two motions to strike. In Meltwater's first motion, it seeks to strike: (1) the declaration of Elizabeth McNamara in its entirety and sixty-seven of the accompanying exhibits; (2) portions of the declaration of Sue Cross ("Cross") and eight of the accompanying exhibits; (3) portions of the declaration of Thomas Curley ("Curley") and four of the accompanying exhibits; (4) portions of the declaration of Joy Jones ("Jones") and seven of the accompanying exhibits; (5) portions of the declaration of Thomas Kent; (6) portions of the declaration of John D. Rizzo and four of the accompanying exhibits; and (7) substantial parts of AP's Rule 56.1 statement. The second motion seeks to strike: (1) the declaration of Alison B. Schary in its entirety and eight of the accompanying exhibits; and (2) portions of the declaration of Linda Steinman. In addition, both parties have raised objections in their Rule 56.1 counterstatements of undisputed material facts. Some of these objections have already been addressed. To the extent that any objection is not discussed in this Opinion and the Court relied on the challenged evidence, the objection has been considered and rejected. Three more categories of objections are addressed below.

First, however, it is important to note that most of the facts in this case are undisputed. In particular, the Opinion's description of Meltwater's system is taken largely from Meltwater's own documents and the accounts of its own affiants and deponents. Many of Meltwater's evidentiary objections instead focus on the manner in which AP characterizes certain evidence. The Court has disregarded the parties' characterizations and relied on the underlying documents.

In its motions to strike, Meltwater argues that the Court should also strike statements and documents regarding matters occurring prior to 2009, because "AP unilaterally imposed a date restriction of January 1, 2009" in responding to Meltwater's document requests. Both parties preserved their objections to the production of older documents. AP generally objected to production of documents predating January 1, 2009, and Meltwater objected to producing documents predating March 1, 2010. Despite that general objection, AP proceeded to produce responsive documents dated before 2009, including each of the documents submitted in connection with these summary judgment motions. Meltwater never indicated during discovery that AP's general objection was a concern and it did not seek to compel the production of other documents dated prior to 2009. Furthermore, AP placed no timeframe restriction on its witnesses when they were deposed. Under the circumstances, Meltwater has shown no basis to strike all documents and statements relating to matters occurring prior to 2009, which in any event are few in number.

Meltwater has also objected on grounds of relevance to the submission by AP of many of the Meltwater documents produced in discovery. These include its promotional materials and samples of its News Reports. It also objects on relevance grounds to the samples of Google News Alerts. The objections to these and other documents on the ground of relevance have been considered and rejected.

Meltwater has raised objections to the declarations of Cross, Curley, and Jones, among others, on the ground that these individuals have not set forth facts showing that they have personal knowledge of the matters described in their declarations. Cross has been AP's Senior Vice President of Business Development and Partner Relations for the Americas since 2010. Previously, she held a number of positions with AP, including Bureau Chief in Los Angeles, Vice President for the Western Region, Vice President for Online Services for U.S. Newspapers, and Senior Vice President for Global New Media and Media Markets for the Americas. To the extent the Court has relied on Cross's declaration it has been for facts such as the number of AP's licensees, AP's annual licensing revenues, AP's agreements with its licensees, AP's business model, and a description of AP Hosted. All of these matters are plainly within her personal knowledge. Similarly, Jones (Vice President for Platform Strategy and Operations) and Curley (former Chief Executive Officer) offered statements expressly based on their personal knowledge about the composition of AP, NewsRight,[28] AP's licensing scheme, AP Hosted, and AP's lack of contact with Meltwater. Each of these declarants has described facts sufficient to demonstrate that they have personal knowledge of the matters referenced herein.

CONCLUSION

The plaintiff's November 9, 2012 motion for summary judgment is granted, with one exception. The defendants' November 9 motion for summary judgment is denied. The parties will be given an additional opportunity to address whether retrospective injunctive relief should be granted in this case.

Appendix

Article #1

Title: Help wanted at new casino for Toledo, Ohio Full Text Meltwater News Excerpt TOLEDO, Ohio (AP) — Job (AP) TOLEDO, Ohio — Job seekers can roll the dice to seekers can roll the dice to land work at another of the land work at another of the four casinos coming soon to four casinos coming soon to Ohio. Ohio. Hollywood Casino Hollywood Casino Toledo Toledo has posted more than has posted more than 600 job 600 job listings on its listings on its website this website this week. . . . week. Multiple media outlets restaurant workers, slots and report the positions include table games supervisors, bar and restaurant workers, groundskeepers and security slots and table games officers. The casino is supervisors, grounds keepers scheduled to open in the and security officers. spring with . . . The casino is scheduled to open in the spring with 1,200 employees. The Cleveland casino, which will open first, advertised for 750 non-gaming jobs on Monday, while the Columbus casino posted openings for executive positions. Cincinnati also is getting a casino. All four were approved by Ohio voters in 2009.

Article #2

Title: Wikileaks suspect's trial near super-secure NSA Full Text Meltwater News Excerpt FORT MEADE, Md. (AP) — The FORT MEADE, Md. (AP) — The military intelligence complex military intelligence complex an hour outside Washington an hour outside Washington where the WikiLeaks case goes where the WikiLeaks case goes to court this week is known as to court this week is known a cloak-and-dagger sanctum as a cloak-and-dagger sanctum off-limits to the public — a off-limits to the public — a reputation that's only partly reputation that's only partly true. true. Maryland's Fort Meade is, . . . low-level clearance and for the most part, an ordinary a Lady Gaga CD. The Army post, its 5,000-acres prosecution can only hope mostly made up of neat rows of that their arguments, or the army barracks and homes, a PX, evidence, will reveal the and a golf course. secrets of how, . . . Only one small part of the base houses the supersecure compound of the codebreaking National Security Agency. Yet that juxtaposition still provides the greatest irony: Pfc. Bradley Manning, the soldier accused of one of the largest intelligence heists in U.S. history, will stand trial in a military court room on the same post as the intelligence agency charged with covertly collecting and cracking secrets. Manning's case, a cause celebre for anti-secrecy activists, hackers and even human rights groups, is subject to unprecedented security restrictions. The military says Fort Meade was chosen for the Manning hearing not because of its secure location but because the garrison's Magistrate Court has the largest military courtroom in the Washington area. It's where you would go to argue your case if military police pulled you over for breaking the 15 to 35 mph speed limit. Like any Army post, Fort Meade does have security. If you're on the entry list at the garrison's front gate, you can drive in unescorted after a routine check of your vehicle. NSA is located on a separate, far-harder-to-enter compound, contiguous with the main base. Entry requires the highest of clearances or the most diligent of escorts, and NSA's own elite detail provides security. The compound is equipped with various electronic means to ward off an attack by hackers. The compound's experts include cryptologists, computer hackers and "siginters," the signals intelligence experts who can track a conversation inside an Iranian nuclear scientist's office from the vibrations of the windows. Yet despite their focus on cracking secrets, the agency itself is hardly hidden. NSA's main complex is visible from a major highway, and features a U-shaped building with a couple of 1980s-style glass office blocks attached, surrounded on all sides by a parking lot and a chain-link fence. You can study the buildings at your leisure, in photos posted to the NSA's own online photo gallery. And you can test your own code-breaking skills at the agency's National Cryptologic Museum, open to the public just outside the NSA compound. After punching a code or two into a genuine World War II German Enigma code-making machine, you can pick up a "No Such Agency" T-shirt at the gift shop. The throngs of reporters covering the Manning trial probably won't have time to see any of that. They'll be busy following the case against a defendant alleged to be so devious and creative that he came up with a way to spirit away hundreds of thousands of classified files, armed only with guile, a low-level clearance and a Lady Gaga CD. The prosecution can only hope that their arguments, or the evidence, will reveal the secrets of how, and why, so much classified information ended up online, for all the world to read. Even the NSA's experts might want to know that.

Article #3

Title: Sun shines on the mountain and Pearce rides again Full Text Meltwater News Excerpt BRECKENRIDGE, Colo. (AP) — BRECKENRIDGE, Colo. — Basking in the sun and snow, Basking in the sun and snow, surrounded by his fans and surrounded by his fans and friends, Kevin Pearce carved friends, Kevin Pearce carved sweet turns down a gentle run sweet turns down a gentle run called "Springmeier" — called "Springmeier" — kicking up just enough powder kicking up just enough powder behind him to remind people behind him to remind people that, yes, this kid can still that, yes, this kid can still ride. ride. . . . The three trips he took down though, as he labored through that hill, some might say, his grueling rehabilitation, were a storybook ending to a Pearce never gave up hope life-altering journey that that he might ride again — began when Pearce nearly died if not across a rail or during a training accident through a . . . while preparing for the Olympics. Or was it a new beginning? "That's kind of my goal," Pearce said, "is to continue to have special days like this." Yes, Tuesday was a special day — the 24-year-old champion snowboarder's first trip down the mountain since Dec. 31, 2009, which is when he banged his head on the halfpipe in Utah while trying a difficult trick that, had he pulled it off a few months after that, might have won him a gold medal at the Vancouver Olympics. The accident left him in a coma and his life hung in the balance for several days. When he finally awoke, severe head trauma turned the most basic of activities — walking, talking, seeing straight — into pressing challenges for the young athlete. In the back of his mind, though, as he labored through his grueling rehabilitation, Pearce never gave up hope that he might ride again — if not across a rail or through a halfpipe, then at least down a mountain. On a sunsplashed afternoon in the Colorado high country, 712 days after the accident, he did. The day began with a trip to Vail, where Pearce hooked up with snowboarding mogul Jake Burton and the close-knit group of pro snowboarders who call themselves the "Frends" — — because there is no `I' in friendship. After a few mellow trips on that mountain, Pearce came to Breckenridge to ride with other friends, along with the public, a few hundred of whom cheered when he walked out of the lunchroom and toward the lift, ready to ride again. "I didn't know if anyone was going to show up today," Pearce said. "When I walked out there and there were all these people there to support me and have my back the way they have for the last two years, it brings this feeling. It's a hard feeling to explain." Instead of sporting the old "I Ride For Kevin" stickers that dotted every mountainside after the accident, those on the slopes with him on this day wore stickers and T-shirts with a new message: "Ride With Kevin." The return to the snow wasn't without the most minor of falls, a very small tipping that came courtesy of a rider who bumped him on the hill. No damage done, though. Only smiles at the bottom, where two years of hard, emotional work — filled with hundreds of tiny steps forward and a fair share of tiny steps back, as well — culminated in a day that was never guaranteed. "The doctors said to me, `Don't take his hope away,'" said Pearce's mother, Pia. "And that's the message. It's about doing it, but doing it safely. It's about him making good choices. It's about him being a role model and a mentor for all those . . . athletes who get concussions. To be smart about it. Enjoy life. Have fun. But when he needs to make a hard choice and not do something, as his life goes on, we need to see. Can he stop himself when he wants to take that jump?" Indeed, the future holds many more questions for Pearce, who, to those who don't know him, seems as healthy and happy as any 20something on the mountain. Even he concedes everything is not all perfect. "I don't think anyone in this room except my mom and my brother have any idea what's really going on with me right now," Pearce said, a few hours after the ride. "There's so much more than what you see." But on this day, it wasn't so much about the road ahead as the celebration at hand. Out on the mountain in a bright blue jacket, Pearce was the star, even with dozens of world-class riders practicing nearby for the Dew Tour event that will take place on the same mountain later this week. Pearce will be on hand for that, though he knows joining those guys at the top is not in his future. "Jumps and halfpipes and rails and that stuff aren't important to me anymore," he said. "What's important to me is to be able to get up there and be happy with what I'm doing. Riding powder. Riding with all my friends. There are so many things you can do up on the mountain that don't involve competition. That stuff, that's the stuff I'm looking forward to the most."

[1] Each Registered Article is appended to the plaintiff's amended complaint. They include stories on a diverse set of subjects, as the following examples illustrate: exhibits F (Sri Lankan fruit traders); G (Casino jobs in Ohio); H (anti-austerity protests in Portugal); I, O, U (life and death of former Alaska Senator Ted Stevens); J (anti-doping rules for pentathlon); K (Mississippi Blues Trail marker for deceased singer); L (parliamentary vote in Egypt), M ("Senate upset erases Alaska seniority"); N (secret CIA prison in Romania); P (snowboarder Kevin Pearce); Q (one-year anniversary of border agent's death); R & X (WikiLeaks suspect); S (security guard's ear cut off); T (Congressman cleared in DOJ probe); V (case against VECO CEO); W (late Christmas celebrations); Y ($5B deal between Northeast Utilities & NStar); and Z (fact check of Romney's Solyndra claim). The Appendix gives three examples of the Registered Articles chosen for their differences in length and shows an excerpt copied and distributed by Meltwater from these three examples.

[2] Meltwater purports to dispute that the excerpts that Meltwater distributed from the Registered Articles can be found verbatim in the Registered Articles. While it is undisputed that Meltwater's excerpts do not contain the complete article, a comparison of the excerpts with the Registered Article shows that the excerpts were taken word-for-word from the original. There is, therefore, no genuine dispute that the excerpts are taken verbatim from the AP articles. See, e.g. Appendix.

[3] If a responsive article was published on more than one website, the News Report will often retrieve duplicate results. When a result is a duplicate it is clustered with the other identical results. The most recent publication of the article will be the hit that is initially visible in the News Report. To the left of the headline of the visible result is a plus sign. Clicking the plus sign permits the subscriber to see the duplicate results.

[4] Meltwater does not retain ad hoc search results as part of its ordinary business practices. Therefore, there is no evidence in the record indicating whether any excerpts from the thirty-three Registered Articles were provided to Meltwater subscribers in response to ad hoc searches.

[5] For twenty-six of the Registered Articles, Meltwater's investigation in response to AP's discovery requests uncovered no clicks. For these articles, regardless of the number of times a hyperlink was presented to a customer, the click-through rate is 0%. The click-through data for the remaining seven articles is as follows: (1)"AP Exclusive: Inside Romania's secret CIA prison" was provided to Meltwater subscribers 134 times, and the accompanying links were clicked on two occasions, resulting in a 1.5% click-through rate; (2) "When the most wonderful day of the year comes late": 3,081 links, 1 click, 0.03% click-through rate; (3) "Wikileaks suspect seen as hero, traitor": 1,668 links, 1 click, 0.06% click-through rate; (4) "Northeast Utilities, NStar close $5B deal": 2,917 links, 1 click, 0.03% click-through rate; (5) "Apple lent weight to dividend comeback in 1Q": 1,552 links, 1 click, 0.06%; (6) "7 accused of $375M Medicare, Medicaid fraud": 1,313 links, 12 clicks, 0.91% click-through rate; (7) "Things are looking up for state budgets": 2,361 links, 3 clicks, 0.13% click-through rate.

[6] AP made repeated requests during the discovery period for additional data on Meltwater's click-through rates. Meltwater indicated that it was not surprised by a click-through rate of.05% and refused to provide additional data. It took the position that it would be burdensome to obtain more click-through rate data since it does not keep such data in the normal course of its business. Its Technical Manager of SaaS Operations opined that it might take twenty-four to thirty-six hours to run the necessary queries against its database and that it might also be prudent to copy the data first onto a separate set of servers so that the queries would not interfere with the performance of Meltwater's system.

[7] Meltwater has also moved for judgment on the pleadings with respect to AP's claims of "hot news" misappropriation and removal or alteration of copyright management information. AP has in turn moved for judgment on the pleadings as to Meltwater's counterclaims for libel, tortious interference, and declaratory judgment of safe harbor under the Digital Millennium Copyright Act, 17 U.S.C. § 512(c). Those motions are not addressed in this Opinion.

[8] Where the copyrighted work constitutes a greater percentage of the secondary work, the latter work is more likely to be non-transformative. This inquiry is distinct from the analysis in the third factor, part of which considers what portion or percentage of the copyrighted work was used in the second work.

[9] Meltwater has entered into very few licenses to obtain content.

[10] Relying on the publicly available filings in this case, the CCIA pointedly does not take a position on the ultimate question of whether Meltwater's copying of expressive content created by AP is a fair use. It simply asks the Court to take into account the effect that any ruling may have on the operation of "legitimate" online services. That the Court has done.

[11] While Meltwater asserts that its U.S. subscribers clicked-through to the underlying story millions of times during just the first six months of 2012, it has not placed that figure in context by disclosing the rate of click-throughs that this number represents. Moreover, it rebuffed AP's repeated requests for data on click-through rates and as a result cannot fairly rely on this raw number.

[12] In litigation in Great Britain, the click-through rate was calculated during litigation over licensing fees to be paid for services rendered by media monitoring companies. During the litigation, a Meltwater affiliate agreed to pay a web database license and lost its argument that it was unnecessary to have a license as wellfor end users of its service.

[13] Amici Curiae New York Times, et al., has referred to an article summarizing a 2010 report that found the click-though rate for Google News was 56%, a rate that the author of the article believed was probably an understatement. See http://techcrunch.com/2010/01/19/outsell-google-news/.

[14] In its Rule 56(d) motion, Meltwater has not suggested that it needs further discovery regarding click-through rates from third parties before these cross-motions for summary judgment may be decided. Quite the contrary, in its own summary judgment motion, Meltwater takes the position that it is entitled to judgment on its fair use defense based on the record submitted.

[15] While not all of this content is expressive or protected by copyright law, Meltwater has not disputed that some portion of it is.

[16] The sample Google News Alert excerpts provided with this motion are on average roughly 207 characters long (not including white spaces).

[17] In Nihon, the court found that the average abstract used two-thirds of the protectable material, using the same structure and organization of facts. 166 F.3d at 71.

[18] Meltwater quotes the following two ledes: "When Emily Russell's two young sons wake up on Christmas morning, they'll find that Santa left them a note instead of the videogames they requested;" and "To much of the nation, Ted Stevens was the crotchety senator who famously referred to the Internet as `a series of tubes' and fought to build the `Bridge to Nowhere.'"

[19] Meltwater insists that the parties had no contact in 2009, 2010, or 2011, while AP contends there was "a casual" exchange between the parties in January 2011.

[20] Meltwater makes this argument with respect to AP licensees alone, but Meltwater's argument would seemingly apply with equal force to AP's own websites. Applying Meltwater's reasoning, AP itself would have to adopt a robots.txt protocol to limit the access of web crawlers to its own websites or be deemed to have granted them an implied license.

[21] While the robots.txt protocol could work precisely the opposite way, that is, to indicate that every web crawler is permitted access except for those for whom permission is denied, it is difficult to envision how a website could effectively manage a program that requires it to keep an accurate list of all crawlers who are roaming the web and for whom permission is being denied. Meltwater has reserved the right, however, to ignore an exclusion list that lists it.

[22] Although Meltwater has not moved for summary judgment on its affirmative defense of an implied license, it has argued that the evidence presented in connection with these summary judgment motions "establishes" its implied license "as a matter of law." Nonetheless, it makes one request pursuant to Rule 56(d) in the event the Court disagrees and believes that AP's motion has merit. Meltwater contends that it needs discovery of AP's internal documents that discuss the "viability" of robots.txt. This argument does not prevent an entry of summary judgment for AP. Meltwater never mentioned the phrase "robots.txt" in any of its document requests of AP or in any application to the Court for additional discovery. It had a full opportunity to take discovery of AP on this issue and every other issue related to this summary judgment motion and may not prevent entry of summary judgment for AP through this belated request. In any event, discovery of AP's internal deliberations regarding the robots.txt protocol would have no impact on the decision reached above.

[23] AP has offered examples of the terms of use found on a number of AP's licensees' websites. Meltwater objects that AP has not demonstrated that these terms of use were present on the licensees' websites during the time period in which Meltwater scraped articles from those websites. It is undisputed, however, that in at least one instance, Meltwater had knowledge of a website's terms of use prohibiting commercial use of the website's content and nonetheless scraped an AP article from that website a month later.

[24] Meltwater objects to the evidence of AP's complaint against Moreover on the ground that it constitutes inadmissible hearsay. The complaint has not been received for the truth of the matters asserted. Instead it has been received as evidence of Meltwater's notice that AP was unlikely to consider Meltwater's actions authorized.

[25] The other two documents, two letters exchanged between AP and the Department of Justice, are about a proposed voluntary registry. A version of that voluntary registry was apparently incorporated into NewsRight and nothing in that correspondence suggests misconduct.

[26] Meltwater contends that the evidence it has gathered raises a triable issue of fact on its copyright misuse defense, but argues in its Rule 56(d) motion that if the Court disagrees with Meltwater that Meltwater should be permitted to take further discovery about AP's relationship with NewsRight since AP only produced documents "sufficient" to show NewsRight's role in licensing AP content and did not respond completely to the document requests posed by Meltwater.

Meltwater made a limited request of AP for documents concerning NewsRight, and that request related to the licensing of the Registered Articles by NewsRight. It is undisputed that the Registered Articles were never licensed by NewsRight. Despite Meltwater's narrow document request, AP searched all of its e-discovery custodians for communications with NewsRight concerning licensing efforts generally and produced such documents. It also searched for hard-copy documents from those same custodians and produced documents sufficient to show NewsRight's role in licensing AP content, among other things. Meltwater examined AP deponents at length about NewsRight. In sum, Meltwater has not shown that it is entitled to further discovery on this issue before summary judgment may be entered for AP.

[27] There is evidence that AP's investigator copied and stored the full text of AP articles using a trial subscription to Meltwater News. There is also evidence that Meltwater customers used excerpts from two of the Registered Articles and distributed them in ten newsletters.

[28] Meltwater also makes an unfounded objection to Curley's description of NewsRight on hearsay grounds.

2.4 Associated Ppress v. Meltwater U.S. Holdings, Inc. 2.4 Associated Ppress v. Meltwater U.S. Holdings, Inc.

931 F. Supp. 2d 537 (2013)

THE ASSOCIATED PRESS, Plaintiff,
v.
MELTWATER U.S. HOLDINGS, INC.; MELTWATER NEWS U.S., INC.; and MELTWATER NEWS U.S. 1, INC., Defendants.

No. 12 Civ. 1087 (DLC).

United States District Court, S.D. New York.

March 21, 2013.

Elizabeth McNamara, Alison Brooke Schary, Colin James Peng-Sue, Linda Jane Steinman, Davis Wright Tremaine LLP, New York, NY, for the Plaintiff.

David Kramer, Brian Willen, Catherine Grealis, Tonia Klausner, Wilson Sonsini Goodrich & Rosati, New York, NY, for the Defendants.

Amici Curiae: Charles S. Smims, Proskauer Rose LLP, New York, NY for amici curiae the New York Times Company, Advance Publications, Inc., Gannett Co., Inc., the McClatchy Company, the Newspaper Association of America, and BurrellesLuce, in support of plaintiff.

Julie A. Ahrens, Stanford Law School, Center for Internet & Society, Standard, CA (Corynne McSherry and AKurt Opsahl, Electronic Frontier Foundation, San Francisco, CA, and Sherwin Siy, Public Knowledge, Washington, DC, on the brief) for amici curiae Electronic Frontier Foundation and Public Knowledge in support of defendants.

Kathleen M. Sullivan, Quinn Emanuel Urquhart & Sullivan, LLP, New York, NY (Jonathan B. Oblak and Todd Anten on the brief) for amicus curiae Computer & Communications Industry Association in support of neither party.

OPINION AND ORDER

DENISE COTE, District Judge.

This Opinion addresses cross-motions for summary judgment filed by The Associated Press ("AP"), a news cooperative, and Meltwater US Holdings Inc., Meltwater News US Inc., and Meltwater News US1 Inc. (collectively "Meltwater"), an Internet media monitoring service. In this action, AP principally contends that Meltwater is infringing AP's copyright in its published news stories. Meltwater uses a computer program to scrape news articles on the web and, among other things, provides excerpts of those stories, including many AP stories, in reports it sends each weekday to its subscribers. Meltwater does not dispute that it has taken expressive content from AP stories that is protected by the Copyright Act, but has interposed five defenses to AP's copyright infringement claim.

Meltwater's principal defense against the infringement claim is that its excerpting of AP news stories is a fair use. Even though Meltwater's service is a closed system for subscribers only, Meltwater equates itself with Internet search engines. It argues that search engines transform the work they take from Internet news sites by using that content for a new purpose, that is, as an integral part of an information-location tool. According to Meltwater, this transformative purpose qualifies as a fair use of the copyright-protected material. It will be assumed for purposes of this Opinion that Internet search engines are a transformative use of copyrighted work. Nonetheless, based on undisputed facts, AP has shown that it is entitled to summary judgment on its claim that Meltwater has engaged in copyright infringement and that Meltwater's copying is not protected by the fair use doctrine.

This Opinion begins with a description of the facts taken from the parties' submissions on these cross-motions for summary judgment. The facts are largely undisputed; where there are factual disputes, those will be noted. Following a description of AP's business as it relates to these claims, and then Meltwater's, there will be a brief description of the procedural history of this lawsuit. The next sections of the Opinion will analyze the legal issues. They will include a discussion of Meltwater's five affirmative defenses to the claim of copyright infringement: fair use, implied license, equitable estoppel, laches, and copyright misuse. Finally, this Opinion will address Meltwater's motion for summary judgment on AP's secondary infringement claims and some of Meltwater's evidentiary objections.

BACKGROUND

I. AP

AP was established in 1846; it is owned by over 1,400 newspapers across the United States and employs a staff of approximately 3,700 people. On any given day it produces between 1,000 and 2,000 news articles.

Each article is the result of a process that involves a number of creative decisions by AP reporters and editors. First, AP must select the topic to be covered in the article. The selection process can involve sifting through numerous press releases, comments made by politicians, and news tips received by AP in order to decide which topics are worthy of coverage. The actual writing of the story is often an iterative process, involving consultations between the reporter and editor about how to handle the assignment. During this process, the articles are reviewed for "completeness, clarity, balance and accuracy." The structure of a news article is itself the product of strategic and stylistic choices. For instance, breaking news stories are traditionally organized in the form of an "inverted triangle." The purpose of the "inverted triangle" structure is to include "as much key information as possible in the `lede,' or first portion of the story." As AP's Standards Editor has explained, an AP story lede "is meant to convey the heart of the story, rather than serving as a teaser for the remainder of the story." In connection with this action, the AP obtained copyright registrations for thirty-three of its articles ("Registered Articles").[1]

The news products that AP offers take many forms. For instance, subscribers can choose to subscribe to a regional news product, like AP's Latin American News, or Asia-Pacific News. Alternatively, a subscriber can select an AP product that is focused on a particular industry, like AP's Business Alert, Defense Alert, or Technology Alert.

Each of the thirty-three Registered Articles at issue in this lawsuit was written by an AP reporter. Most of articles authored by AP reporters are published by its members or licensees and not by AP itself. Thus, a principal component of AP's revenue comes from licensing fees it earns by licensing uses of its news products to its roughly 8,000 licensees. AP earns hundreds of millions of dollars in licensing fees annually.

In the digital age, AP's license agreements have expanded to permit the publication of its articles on the Internet. AP's license agreements with its digital and commercial clients account for more than $75 million of AP's annual gross revenue. Many of the websites on which AP content appears permit readers to access the articles without paying any fee.

AP's licensing agreements are crafted around the kind of redistribution rights the licensee wishes to have. For instance, AP's licensing agreements with LexisNexis and Factiva permit those services to give their customers access to full AP articles and to search through AP's archives. AP also has licensing agreements that permit the distribution of excerpts from or snippets of its articles. The license agreements between AP and three news clipping services that are competitors of Meltwater are examples of this kind of license. One such license granted the Internet news clipping service a license to distribute "AP text scraped from third party AP licensee websites ("AP Articles") . . . as well as links to AP Articles and excerpts of AP Articles." In a second such license, AP permits the Internet news clipping service to redistribute "Snippets" of AP articles "as a part of an aggregated feed of licensed content," to a primary market of Media Monitoring & Evaluation companies who cater to "Internal corporate communications and PR professionals and their external agents." This license defines "Snippets" to mean "headlines and leading 140 characters from AP content." In a final example, the licensing agreement allows the news clipping service to make available directly or via its affiliate "snippets of [certain AP content] in response to search requests."

AP also offers a web-based platform known as AP Exchange to its licensees, which permits the licensees to search AP articles by keywords. Each AP article contains metadata tags. These tags attach to certain information appearing in AP articles including people, companies, geographic locations, and organizations. Through AP Exchange, customers can run either simple or advanced searches to locate AP news stories. This platform also allows AP's customers to save their searches and to receive search results on an ongoing basis. AP's customers can receive email alerts when an article that is responsive to one of their custom searches has been published. In addition, AP has licensed its content to customers that, in turn, permit their users to search for AP articles using keyword search terms.

II. Meltwater News

Meltwater is an international "software as a service" ("SaaS") company that operates in twenty-seven countries. It was founded in 2001 in Norway. Its United States subsidiaries currently have four hundred employees, nine U.S. offices, and an annual income of [REDACTED. dollars.

In 2005, Meltwater began offering a news monitoring service to subscribers in the United States called Meltwater News. Meltwater News now has more than [REDACTED] customers in the United States. Its U.S. customers are businesses, non-profit organizations, and government agencies. An annual subscription fee costs thousands of dollars.

Meltwater News subscribers have access to Meltwater's "Global Media Monitoring" product, which offers a suite of online services. The Global Media Monitoring product enables users to monitor the news based on the presence of certain words or phrases in news articles appearing on the Internet and to receive excerpts of those news articles. Meltwater uses automated computer programs or algorithms to copy or "scrape" an article from an online news source, index the article, and deliver verbatim excerpts of the article to its customers in response to search queries.[2] Through this automated mechanism, Meltwater copied each of the thirty-three Registered Articles at issue in this litigation and delivered excerpts from them to subscribers.

Meltwater markets its services to communications and public relations professionals as a tool that will assist them in locating "mentions" of their businesses in the media, in tracking their company's press releases, and in conducting comparative research. Some of Meltwater's marketing materials and sales representatives also advertise Meltwater News as a useful tool for staying informed of general news developments. One Meltwater sales representative described Meltwater News as "provid[ing] the most news in the most efficient manner" and referred to the Meltwater News Reports as "customized news digest[s]." Another Meltwater employee has recommended telling customers that a Meltwater News excerpt "saves you time so you don't have to read the full article."

Meltwater competes with AP and its licensees for business. Meltwater identifies companies and services like LexisNexis, Cision, Google News, and BurrellesLuce as its competitors. Each of these companies has held an AP license. Meltwater has succeeded in winning what it described as a "mega-contract" away from an AP licensee, and both AP and Meltwater have submitted bids to the same potential customers. In 2010, for instance, both AP and Meltwater submitted proposals to the House of Representatives in response to an "official solicitation for proposals to provide web based delivery of local, national and international news."

Like Internet search engines, Meltwater News employs automated computer programs known as "crawlers" to scan the Internet for news. Meltwater's crawlers scan approximately 162,000 online news websites from over 190 countries each day to create an index of the websites' content. The program usually crawls a news website at roughly [REDACTED] intervals. Most of these websites make their articles available to readers without charge.

The crawlers extract and download content from the websites. The downloaded content is organized into a structured internal format that has seven fields, including a times-tamp reflecting when the document was first seen by the crawler. The extracted content is then placed in a queue for indexing. Using an Application Programming Interface or API, an index is created that links or "maps" most of the words in the document to the document.

A. News Reports

Meltwater's creation of the index permits its subscribers to search for and request delivery of information that is responsive to their search queries. Its subscribers can conduct two types of searches of the index.

First, a customer can use the Meltwater News platform to set up standing search queries known as "agents." An agent is a single string of words or phrases that will be used in searching Meltwater's index of online news content. For example, a customer interested in obtaining information on education policy might create an agent that reads: "("teachers" or "students") and education* and policies." The creation of an agent query allows the particular search to be conducted automatically on a recurring basis. A basic subscription offers a customer the ability to create five standing agent queries.

Customers receive agent search results in two ways. Most customers receive emails every weekday that contain the excerpts responsive to their standing search requests. These are labeled "News Reports." Customers can also view those same search results by logging onto their Meltwater News online account, where they can see all of their News Reports from the last seven months.

A typical News Report takes the following form. At the top of the News Report a banner appears that reads "News Report from Meltwater News." Directly beneath the banner appears a table entitled "Report Overview." The Table ordinarily consists of two columns; the first column contains the name of the "agent" query that retrieved hits; the second displays the raw number of hits in a given period of time (such as 3 in 1 day, or 635 in 23 hours).

The actual search results follow the Report Overview. They are organized in subcategories based on the agent query to which they respond. Within each agent category, the results appear in reverse chronological order, with the excerpt of the most recently published article appearing first.[3] Three icons appear next to each search result; they read, "Translate," "Share," and "Archive." AP articles account for over a third of the search results in some News Reports.

Each search result in the News Report generally includes the following text: (1) the headline or title of the article and a hyperlink to the URL for the website from which the article was indexed; (2) information identifying the article's source, such as the publisher and the country of origin; and (3) usually two excerpts from the article. The first excerpt consists of up to 300 characters (including white space) from the opening text of the article or lede. The second excerpt is shorter and is known as the "Hit Sentence." It is approximately 140 characters (not including white spaces) "surrounding a single, algorithmically chosen appearance of one of the customer's matched search keywords." If the keyword appears in the lede, then the lede is repeated twice.

On occasion, the hyperlink to the article no longer leads to the article because the article has been removed from the web. Meltwater contends that when that occurs, the hyperlink will lead the Meltwater subscriber to the website where the article originally appeared, and the reader will see whatever content the operator of the webpage has chosen to display in place of the original article.

B. Analytics

A Meltwater News subscriber can choose to have certain charts and graphs included in their News Reports. These charts and graphs — known as "Dashboard Analytics" or "Mail Analytics" — provide additional information about the search results. For instance, customers who opt to have Mail Analytics included in their daily News Report will see a pie chart showing the three or four countries that have had the highest coverage of a particular agent. They also have a choice of seeing an "up-and-down coverage" chart that indicates whether the volume of coverage has gone up or down during a certain period of time, or a "word cloud" illustrating certain buzz words appearing in the search results.

A subscriber can also view additional analysis of its agent searches by logging on to the Meltwater News platform. When it logs on, it encounters a "dashboard" page containing five tools; some of these tools overlap with the tools that can be delivered in the News Reports. Using the dashboard, the customer can view (1) a "tone analysis" tool, which analyzes whether the tone of the news coverage is negative, positive, or neutral; (2) a "word cloud" graphic, which illustrates the frequency with which a keyword appears in the search results; (3) a list of the "top publications" providing the most coverage of a given agent query; (4) an "up-and-down trend analysis" chart, which indicates "whether the volume of media coverage related to a given search query has increased or decreased over a given period;" and (5) a map that illustrates the "geographical distribution of relevant news coverage."

C. Ad Hoc Searches

The second way in which customers can conduct searches of the Meltwater News index is through an "ad hoc" search. To perform an ad hoc search, a Meltwater News subscriber logs on to its Meltwater account, clicks on a "Search" tab, and types in keywords of its choice.

Ad hoc searches do not generate News Reports, but the format for presenting the results generated by an ad hoc search is identical to that in News Reports. The results of ad hoc searches are not saved on the Meltwater system unless the subscriber saves them to the subscriber's own archive folder. There is no limit on the number of ad hoc searches that a subscriber can perform.

D. Archiving

A subscriber with a basic subscription has the ability to archive material in two ways. First, subscribers can archive any of their search results in a personal archive stored on Meltwater's database. For instance, as described above, an "Archive" button appears next to each excerpt contained in a Meltwater News Report. Clicking this button archives the search result. When a search result is archived in this way, the information stored in the archive includes (1) the headline or title of the article and the URL link; (2) a description of the source of the article; (3) an excerpt of the article, consisting only of the opening text; and (4) any text the user has typed or pasted into a comment box. In other words, the Hit Sentence is not automatically archived.

Second, Meltwater offers a tool called "Article Editor" that is accessible from the Meltwater News online platform. Clicking on the Article Editor tool causes a pop-up window to appear. The window contains boxes with the labels "Date, Title, Opening Text, Body Text, URL, Name of Publisher, and Country." The subscriber can type text into these boxes or can copy and paste text from other websites. For instance, if a customer clicks on a hyperlink provided as part of a search result, the customer can proceed to copy the article from the publishing website and paste the text into the Article Editor. The text can be saved in an "external archive folder" on Meltwater's system for as long as the subscriber remains a customer.

E. Newsletter and Newsfeed

For an additional fee, Meltwater News assists its subscribers in creating their own newsletters. Material that has been saved in a subscriber's archive folder — search results or material entered into the Article Editor — can be incorporated into a "Newsletter" and sent to third-party recipients.

Alternatively, subscribers can elect to have their search results incorporated into a Newsfeed on their internal or external website. Meltwater describes the Newsfeed as a "dynamic list of search results, including links to full articles."

III. The Thirty-Three Registered Articles

Meltwater delivered excerpts of each of the thirty-three Registered Articles to its customers in News Reports as a result of agent searches.[4] Meltwater scraped the Registered Articles from roughly 1,200 websites — including the websites of AP's licensees and AP Hosted, which is a private label website where AP hosts content for its members. Twenty-four of the thirty-three articles were published within six months of the date Meltwater responded to a discovery request in this action. As a result, Meltwater was able to calculate from its records that it made at least 22,297 excerpts from the twenty-four Registered Articles available to its customers in the United States in response to agent queries.

The parties have not calculated the percentage of each original AP news story that was excerpted and delivered in each of the News Reports, but it probably ranged from as low as 4.5% to slightly over 60%. There are several factors that affect the calculation of the percentage. One is the length of the Registered Article. The average length of the full text of the thirty-three Registered Articles is 2,571 characters (not including spaces), or 504 words. But, some of the articles are short and some are long; they vary in length from 75 words to 1,321 words. Moreover, if the keyword that is searched appears in the lede, then the lede and Hit Sentence will overlap. AP has shown that with respect to some of the Registered Articles, a single Meltwater excerpt consisted of more than 30% of the text of the article and in at least one instance it constituted 61% of the article's text.

For example, from the shortest Registered Article — entitled "Modern pentathlon tightens anti-doping policy" — Meltwater delivered the following excerpt:

MONACO (AP) — Modern pentathlon has joined other sports in adopting a "no needles" policy as part of its anti-doping rules ahead of the 2012 London Olympics.

. . . says athletes can receive injections only from a "certified medical professional" after an appropriate diagnosis and only if there is no alternative.

The full text of the Registered Article reads as follows:

MONACO (AP) — Modern pentathlon has joined other sports in adopting a "no needles" policy as part of its anti-doping rules ahead of the 2012 London Olympics.

Governing body UIPM says athletes can receive injections only from a "certified medical professional" after an appropriate diagnosis and only if there is no alternative.

The UIPM says all injections must be reported to competition doctors.

Governing bodies in cycling, gymnastics and rowing have also introduced "no needles" rules this year.

Some of Meltwater's customers have received multiple excerpts from the same AP article, apparently in a single News Report. In such instances, the percentage of the article that is provided to the Meltwater customer may increase since the Hit Sentence in the various excerpts can change.

Excerpts from the Registered Articles were also included in ten Newsletters created by Meltwater customers in the United States. There is no evidence, however, that any Meltwater subscriber used the Meltwater Newsletter feature to cut and paste a complete copy of any of the thirty-three Registered Articles into its customized newsletter.

Finally, Meltwater subscribers only clicked on the hyperlinks for seven of the thirty-three Registered Articles. The average click-through rate for the thirty-three Registered Articles is roughly 0.08%.[5] Meltwater has not provided any information on any other measure of its click-through rates.[6]

PROCEDURAL HISTORY

On February 14, 2012, AP filed this action against Meltwater. AP's amended complaint asserts six causes of action with respect to the Registered Articles: (1) copyright infringement; (2) contributory copyright infringement; (3) vicarious copyright infringement; (4) declaratory judgment of copyright infringement; (5) "hot news" misappropriation under New York common law; and (6) removal or alteration of copyright management information. In response, Meltwater has raised four counterclaims: (1) declaratory judgment of non-infringement; (2) declaratory judgment of safe harbor from infringement claims based upon the Digital Millennium Copyright Act ("DMCA"); (3) libel per se; and (4) tortious interference with business relations.

At a pretrial conference held on April 20, 2012, the Court proposed that the parties conduct an initial phase of discovery focused on Meltwater's liability on AP's copyright claims based on the nineteen articles identified in its original complaint. The parties thereafter agreed on a schedule that would permit them to focus on the core discovery needed to allow early briefing of the central legal issues in this case. At a May 11 conference, the Court determined that AP should be permitted to take targeted discovery not only of Meltwater's alleged infringement with respect to the Registered Articles, but also broader discovery of Meltwater's general practices and procedures.

On July 13, AP filed an amended complaint in which it included fourteen additional articles — bringing the total number of Registered Articles at issue to thirty-three. Discovery proceeded on all thirty-three articles and broader issues to permit the parties to litigate through summary judgment practice the copyright infringement claim and Meltwater's affirmative defenses to that claim.

Both sides filed the instant cross-motions for summary judgment on November 9.[7] AP and Meltwater both move for summary judgment on Meltwater's fair use defense. AP has also moved for summary judgment on Meltwater's implied license defense. Each of Meltwater's affirmative defenses is implicated by this motion practice since Meltwater also contends that there are triable issues of fact on its affirmative defenses of implied license, equitable estoppel, laches, and copyright misuse that prevent summary judgment from being entered for AP. Meltwater has also moved for summary judgment on AP's contributory and vicarious copyright infringement claims.

These motions were fully submitted on January 23, 2013. Redacted sets of these motion papers were publicly filed in December 2012 and January 2013. The defendants also filed on December 26, 2012 and January 24, 2013, two motions to strike certain declarations submitted by the plaintiff and the plaintiff's Fed.R.Civ.P. 56.1 Statement.

Three amici curiae briefs were accepted for filing. Computer & Communications Industry Association ("CCIA") represents that it is not filing in support of either AP or Meltwater. Electronic Frontier Foundation and Public Knowledge have filed in support of Meltwater; the New York Times Company, Advance Publications, Inc., Gannett Co., Inc., the McClatchy Company, the Newspaper Association of America, and BurrellesLuce have filed in support of AP ("New York Times, et al.").

DISCUSSION

The parties have cross-moved for summary judgment. Summary judgment may not be granted unless the submissions of the parties taken together "show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law." Rule 56(c), Fed. R. Civ. P. The moving party bears the burden of demonstrating the absence of a material factual question, and in making this determination the court must view all facts in the light most favorable to the nonmoving party. See Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 247 (1986); Celotex Corp v. Catrett, 477 U.S. 317, 323 (1986); Azrielli v. Cohen Law Offices, 21 F.3d 512, 517 (2d Cir. 1994) ("[T]he court must resolve all ambiguities and draw all reasonable inferences in favor of the nonmoving party."). When the moving party has asserted facts showing that the nonmovant's claims cannot be sustained, the opposing party must "set forth specific facts showing that there is a genuine issue for trial," and cannot rest on the "mere allegations or denials" of his pleadings. Rule 56(e), Fed. R. Civ. P. See also Goenaga v. March of Dimes Birth Defects Found., 51 F.3d 14, 18 (2d Cir. 1995). In deciding whether to grant summary judgment, therefore, this Court must determine (1) whether a genuine factual dispute exists based on the evidence in the record, and (2) whether the fact in dispute is material based on the substantive law at issue.

In this case, the substantive law governing the parties' dispute is found in the law of copyright. The Copyright Act of 1976 invests a copyright holder with a bundle of exclusive rights. 17 U.S.C. § 106 et seq. This bundle consists of the rights to "reproduce, perform publicly, display publicly, prepare derivative works of, and distribute copies of" the copyrighted work. Arista Records v. Doe 3, 604 F.3d 110, 117 (2d Cir. 2010); see also 17 U.S.C. § 106. "The principle purpose of the Copyright Act is to encourage the origination of creative works by attaching enforceable property rights to them." Matthew Bender & Co., Inc. v. West Pub. Co., 240 F.3d 116, 122 (2d Cir. 2001).

To prevail on a claim of copyright infringement, "two elements must be proven: (1) ownership of a valid copyright, and (2) copying constituent elements of the work that are original." Arista Records, 604 F.3d at 117 (citation omitted). A certificate of copyright registration is prima facie evidence of both valid ownership of copyright and originality. See Scholz Design, Inc. v. Sard Custom Homes, LLC, 691 F.3d 182, 186 (2d Cir. 2012); see also Boisson v. Banian, 273 F.3d 262, 268 (2d Cir. 2001). The copying of the constituent elements of the work that are original can be established through direct or indirect evidence. Boisson, 273 F.3d at 267.

The reporting of facts is not protectable under the Copyright Act since facts are "never original to an author." Nihon Keizai Shimbun, Inc. v. Comline Business Data, Inc., 166 F.3d 65, 70 (2d Cir. 1999). But compilations of facts may be protected under the Act since the arrangement or presentation of facts "can display originality." Id. There is even more room for originality in descriptions of facts. Id. Thus, news articles may be entitled to protection under the Copyright Act to the extent they contain original expression. Id.

AP has carried its burden to show both its ownership of a valid copyright in the Registered Articles and Meltwater's copying of protected elements of those works. Meltwater does not contest this showing, but relies instead on five affirmative defenses. Its principal defense is that it made fair use of the Registered Articles. It also contends that there are triable issues of fact that require a trial as to four additional defenses: its possession of an implied license, estoppel, laches, and copyright misuse. Each of these defenses will be addressed in turn, but none of them prevents the issuance of summary judgment in AP's favor based on its copyright claim.

I. Fair Use

Meltwater contends that its use of the Registered Articles is fair because Meltwater News functions as an Internet search engine, providing limited amounts of copyrighted material to its subscribers in response to their queries and thereby pointing its subscribers to a source of information online. It contends that this service is transformative of the original works. Based on undisputed evidence, Meltwater's fair use defense fails.

Notwithstanding the copyright protections guaranteed by Section 106 of the Copyright Act, the law of copyright recognizes the need for "breathing space." Campbell v. Acuff-Rose Music, 510 U.S. 569, 579 (1994); see also On Davis v. The Gap, Inc., 246 F.3d 152, 174 (2d Cir. 2001). Thus, even where a plaintiff has established a prima facie case of copyright infringement, liability is excused where the defendant demonstrates that he made "fair use" of the plaintiff's copyrighted work. Because fair use is an affirmative defense, the burden of proof rests with party relying on the defense. Infinity Broadcast Corp. v. Kirkwood, 150 F.3d 104, 107 (2d Cir. 1998). The availability of a fair use defense permits courts to avoid the "rigid application of the copyright statute" when "it would stifle the very creativity which the law is designed the foster." Campbell, 510 U.S. at 577.

The fair use doctrine, although of common law origin, has been codified at 17 U.S.C. § 107. This section provides that

[n]otwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work . . . for purposes such as criticism, comment, news reporting, teaching . . . scholarship, or research, is not an infringement of copyright.

17 U.S.C. § 107. The applicability of the fair use defense is a mixed question of law and fact. Bill Graham Archives v. Dorling Kindersley, Ltd., 448 F.3d 605, 608 (2d Cir. 2006). The issue of fair use may be resolved on summary judgment where the court determines that there is no genuine dispute of material facts. Id.

In determining whether a defendant has made fair use of the plaintiff's copyrighted work, the court is guided by four nonexclusive statutory factors:

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

(4) the effect of the use upon the potential market for or value of the copyrighted work.

17 U.S.C. § 107. No single factor is determinative. "All are to be explored, and the results weighed together, in light of the purpose of copyright." Campbell, 510 U.S. at 578. At bottom, "[t]he ultimate test of fair use is whether the copyright law's goal of promoting the Progress of Science and useful Arts would be better served by allowing the use than by preventing it." Bill Graham Archives, 448 F.3d at 608 (citation omitted).

When these four factors are examined in light of the purpose of the copyright law, AP has shown through undisputed evidence that Meltwater's copying is not protected by the fair use doctrine. Each of these four factors will be examined in turn.

A. Purpose and Character of the Use

The first factor of the fair use analysis poses a deceptively simple question. It asks

whether the new work merely supersedes the objects of the original creation, or instead adds something new, with a further purpose or different character, altering the first with new expression, meaning or message; it asks, in other words, whether and to what extent the new work is transformative.

Campbell, 510 U.S. at 579 (citation omitted). A decision on whether a work is transformative need not be an all-or-nothing assessment. Nihon, 166 F.3d at 72. The inquiry asks not merely whether the new work is transformative, but also the extent to which it transforms the copyrighted work. "[T]he more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use." Campbell, 510 U.S. at 579. The inquiry into the transformative nature of the work is "guided by" the preamble to § 107, which directs attention to whether the use of copyrighted material is for the several listed purposes, among them news reporting and research. Id. at 578. But, the list of fair uses included in the preamble of section 107 is only "illustrative." Infinity Broadcast Corp., 150 F.3d at 107 (citation omitted). Nonetheless, "the illustrative nature of the categories should not be ignored." Id.

Of course, not all alterations of a copyrighted work are "transformative." A "use of copyrighted material that merely repackages or republishes the original is unlikely to be deemed a fair use" and a "change of format, though useful" is not transformative. Infinity Broadcast Corp., 150 F.3d at 108 & n.2 (citation omitted). On the other hand, if copyrightable expression in the original work is used as "raw material, transformed in the creation of new information, new aesthetics, new insights and understandings — this is the very type of activity that the fair use doctrine intends to protect for the enrichment of society." Pierre N. Leval, Toward a Fair Use Standard, 103 Harv. L. Rev. 1105, 1111 (1990); see also Castle Rock Entm't, Inc. v. Carol Publ'g Group, Inc., 150 F.3d 132, 142 (2d Cir. 1998). In considering whether the second work has transformed the original, it is appropriate to consider the percentage of the allegedly infringing work that is made up of the copyrighted work since this offers some indication of whether the defendant's use of the "original materials has been sufficiently transformative."[8] Bill Graham Archives, 448 F.3d at 611.

Another aspect of the first fair use factor is the extent to which the new work has a commercial or non-profit educational purpose. The commerciality of the use must be considered with care. After all, not-for-profit enterprises may infringe copyrights, and conversely, if

commerciality carried presumptive force against a finding of fairness, the presumption would swallow nearly all of the illustrative uses listed in the preamble paragraph of § 107, including news reporting, comment, criticism, teaching, scholarship, and research, since these activities are generally conducted for profit in this country.

Campbell, 510 U.S. at 584 (citation omitted). The fact that a given use is profit-driven is not the focus of the commerciality inquiry. Instead, the "crux of the profit/nonprofit distinction is . . . whether the user stands to profit from the exploitation of the copyrighted material without paying the customary price." Harper & Row Publishers, Inc. v. Nation Enterp., 471 U.S. 539, 562 (1985). Thus, the fair use doctrine "distinguishes between a true scholar and a chisler who infringes a work for personal gain." Id. at 563 (citation omitted).

A determination of whether a use "exploits" a copyrighted work calls for a careful exploration of the link between the defendant's precise use of the copyrightable elements of the plaintiff's work and the defendant's financial gain. Where a defendant did not gain "direct or immediate commercial advantage" from the copying, its status as a for-profit enterprise is less relevant. Am. Geophysical Union v. Texaco, Inc., 60 F.3d 913, 921 (2d Cir. 1994). Conversely, "when the copier directly and exclusively acquires conspicuous financial rewards from its use of the copyrighted material" a finding of fair use is less likely. Blanch v. Koons, 467 F.3d 244, 253 (2d Cir. 2006). Of course, a use that generates value for the "broader public interest" weighs in favor of fair use. Id.

In analyzing the purpose of the use, a court may consider as well other aspects of a defendant's purpose. For instance, was the copying intended to supplant the copyright holder's "commercially valuable right of first publication." Harper & Row, 471 U.S. at 562. As the term itself suggests, "[f]air use presupposes good faith and fair dealing." Id. (citation omitted).

Neither the purpose nor use of the Meltwater News Reports, nor its excerpts from the Registered Articles in the News Reports, is transformative. Meltwater uses its computer programs to automatically capture and republish designated segments of text from news articles, without adding any commentary or insight in its News Reports. Meltwater copies AP content in order to make money directly from the undiluted use of the copyrighted material; this is the central feature of its business model and not an incidental consequence of the use to which it puts the copyrighted material. Thus, it is not surprising that Meltwater's own marketing materials convey an intent to serve as a substitute for AP's news service. Meltwater describes its Meltwater News products as "News at a glance" and "News brought to you." They trumpet that "Meltwater News continuously tracks news sources, updating its database continuously throughout the day so searches return fresh, relevant content," and advertise that "your news is delivered in easy to read morning and/or afternoon reports."

Nor is Meltwater's taking of copyrighted material more defensible because its business relates to news reporting and research — two of the purposes of the fair use doctrine captured in the statute's preamble. The news reporting and research upon which Meltwater relies was not done by Meltwater but by AP; the copyrighted material that Meltwater has taken is the news reporting and research that AP labored to create.

For this same reason, the examination of the public interest weighs against Meltwater. Paraphrasing James Madison, the world is indebted to the press for triumphs which have been gained by reason and humanity over error and oppression. Investigating and writing about newsworthy events occurring around the globe is an expensive undertaking and enforcement of the copyright laws permits AP to earn the revenue that underwrites that work. Permitting Meltwater to take the fruit of AP's labor for its own profit, without compensating AP, injures AP's ability to perform this essential function of democracy.

While commercial Internet news clipping services like Meltwater perform an important function for their clients, the public interest in the existence of such commercial enterprise does not outweigh the strong public interest in the enforcement of the copyright laws or justify allowing Meltwater to free ride on the costly news gathering and coverage work performed by other organizations. Moreover, permitting Meltwater to avoid paying licensing fees gives it an unwarranted advantage over its competitors who do pay licensing fees.[9]

As will be further explored below, Meltwater characterizes itself as an Internet search engine and emphasizes the importance of search engines to the operation of the Internet. Together, search engines and the Internet have delivered the world's knowledge to the fingertips of multitudes across the globe. There is a strong public interest in preserving this democratic, instantaneous, and efficient access to information. But, there is no necessary tension between these two important public goods: news reporting and search engines. Quite to the contrary, these interests are complementary. The Internet would be far poorer if it were bereft of the reporting done by news organizations and both are enhanced by the accessibility the Internet provides to news gathered and delivered by news organizations. Neither Meltwater nor its amici have shown that a finding that Meltwater's activities do not amount to fair use threatens Internet search engines in any way. For all of these reasons, the first factor in the fair use analysis decidedly favors AP.

Meltwater's argument that its use of the Registered Articles is transformative is premised on a single contention. It characterizes Meltwater News as a search engine that directs users to a source of information online and whose search results provide insight into "where, when, how often, and in what context" certain words or phrases appear on the Internet. Meltwater defines a search engine as a system that by design and operation improves access to information that is available on the Internet. According to Meltwater, the design and function of a search engine should decrease the likelihood that users would put the material displayed by the search engine to the same use as the original works.

But, as can be gleaned from the discussion of Meltwater's operations in earlier sections of this Opinion, Meltwater's own description of Internet search engines does not correspond to how Meltwater News itself functions.[10] Meltwater News is an expensive subscription service that markets itself as a news clipping service, not as a publicly available tool to improve access to content across the Internet. And, as further confirmation that Meltwater News is neither designed nor operated to improve access to the complete, linked news story, Meltwater has chosen not to offer evidence that Meltwater News customers actually use its service to improve their access to the underlying news stories that are excerpted in its news feed.[11]

As far as the thirty-three Registered Articles are concerned, customers rarely clicked-through to the underlying AP article. It occurred just 0.08% of the time. In her deposition, a Meltwater executive testified that a click-through rate of 0.05% would be consistent with her expectations. The click-through rate for the thirty-three Registered Articles is also consistent with a UK tribunal's finding that Meltwater's services produced a click-through rate of 0.5% for certain UK news sources.[12] Meltwater has not offered any evidence that this seemingly small click-through rate is equivalent to that experienced by any of the Internet search engines to which it compares itself.[13] While it might be more telling to learn what the click-through rate is for any single Meltwater News Report, rather than for a single article excerpted in a News Report, Meltwater has not provided that information either. Nor has it offered a comparison between the click-through rate for any single News Report and the rate for a single Google News search or any other search for news conducted through a recognized Internet search engine.[14]

This was a conscious decision on Meltwater's part. During the discovery period, AP repeatedly requested additional data about Meltwater's click-through rate in anticipation of any argument by Meltwater that Meltwater News directs traffic to the original websites for the news articles. Meltwater took the position that the data was not relevant to these summary judgment motions and refused to provide this discovery. The upshot is that Meltwater has no evidence that its system systematically drives its customers to third-party websites.

Instead of driving subscribers to third-party websites, Meltwater News acts as a substitute for news sites operated or licensed by AP. Meltwater always reprints the story's title and lede, as well as material surrounding one targeted keyword. Just as a news clipping service should do, Meltwater systematically provides its subscribers with what in most instances will be the essence of the AP article relevant to that reader.[15] And again, despite the obvious point of comparison given its characterization of itself as a search engine, Meltwater does not attempt to show that the extent of its taking from the copyrighted articles is no greater than that customarily done by search engines. AP, in contrast, has offered evidence that Google News Alerts do not systematically include an article's lede and are — on average — half the length of Meltwater's excerpts.[16]

Rather than offering any evidence from which to compare its actual performance with that of Internet search engines, Meltwater has chosen to rely on two decisions from the Ninth Circuit Court of Appeals. Meltwater argues from these two decisions that the extent of its copying of the underlying work is irrelevant to the fair use analysis since even the copying of the full work can be transformative when done by an Internet search engine. Those two decisions, however, provide little comfort to Meltwater.

In Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146 (9th Cir. 2007), the Ninth Circuit vacated a preliminary injunction and held that Google was likely to succeed in showing at trial that the display of small images called "thumbnails," which were reduced, lower-resolution versions of the plaintiff's copyrighted photographs of nude models, on Google Image Search webpages was a fair use of the images. Id. at 1154-55, 1168. The court found that Google's use of thumbnails was "highly transformative" since its function was to serve as a pointer to a source of information rather than serving as a form of entertainment. Id. at 1165.

Similarly, in Kelly v. Arriba Soft Corp., 336 F.3d 811 (9th Cir. 2003), the Court of Appeals for the Ninth Circuit held that the display of small low-resolution pictures, again called thumbnails, on the website of an Internet search engine constituted a fair use of the plaintiff's photographs of the American West. Id. at 815. The search engine in Kelly produced only thumbnails in response to a user's query, and no text. The court found that the use of the thumbnails was transformative because their use was "unrelated to any aesthetic purpose" since any enlargement "results in a significant loss of clarity of the image, making them inappropriate as display material." Id. at 818. The display of thumbnails did not "stifle artistic creativity" or "supplant the need for the originals." Id. at 820.

There are several distinctions to be drawn between the instant dispute and the issues at stake in Perfect 10 and Kelly. The first and most obvious is that it was undisputed in both cases that the fair use defense was being applied to a search engine engaged in a transformative purpose. Unlike the searches in Perfect 10 and Kelly, Meltwater's searches are not publicly available and are run against a defined list of content providers. As already noted, Meltwater has also not offered evidence that it actually functions like a search engine in other important respects. In short, use of an algorithm to crawl over and scrape content from the Internet is surely not enough to qualify as a search engine engaged in transformative work.

The second observation that should be made is that the two Ninth Circuit decisions on which Meltwater relies provide little support for its argument that the reprinting of the entirety of a copyrighted work is a fair use so long as the reprinting is done by a search engine. The works at issue in the two Ninth Circuit decisions were photographs, which by their nature are indivisible. Neither Perfect 10 nor Kelly can be fairly read to support Meltwater's claim that it is irrelevant how much of the Registered Articles it displayed in its search results. By emphasizing the small size and low resolution of the thumbnails, the Ninth Circuit relied on the fact that the thumbnails could not substitute adequately for the copyrighted works. If Meltwater captured and displayed the complete text of copyrighted news stories, it could no longer attempt to defend its business model as simply a search engine that aims to direct readers to the underlying story.

Moreover, Meltwater's discussion of search engines is to some extent beside the point. While it is important to understand how Meltwater News functions, even if it were a search engine it would still be necessary to examine whether Meltwater had acted to violate the Copyright Act. The fact that Perfect 10 and Kelly addressed the issue of the fair use defense in the context of webpages created by a search engine, and found the defense available to those defendants, does not relieve Meltwater of its independent burden to prove that its specific display of search results for its subscribers qualifies as a fair use. In other words, using the mechanics of search engines to scrape material from the Internet and provide it to consumers in response to their search requests does not immunize a defendant from the standards of conduct imposed by law through the Copyright Act, including the statutory embodiment of the fair use defense.

By the same token, even though it could be said that a search engine merely "repackages" the original work, Infinity Broadcast Corp., 150 F.3d at 108 & n.2., and does not transform it in the sense of adding "new expression, meaning or message," Campbell, 510 U.S. at 579, that does not mean that its taking is ineligible for protection under the fair use defense. Where a defendant's use "is plainly different from the original purpose" for which the work was created, that use may be transformative. Bill Graham Archives, 448 F.3d at 609 (approving reproduction of a small image of poster along a timeline in a biography). As described by amici, the purpose of search engines is to allow users to sift through the deluge of data available through the Internet and to direct them to the original source. That would appear to be a transformative purpose. But, as discussed above, Meltwater has not shown that that is how it functions.

Based on the undisputed facts in this record, Meltwater provides the online equivalent to the traditional news clipping service. Indeed, Meltwater has described itself as adding "game-changing technology for the traditional press clipping market." There is nothing transformative about that function. See, e.g., Video Pipeline, Inc. v. Buena Vista Home Entm't, Inc., 342 F.3d 191, 199 (3d Cir. 2003) (clip previews of movies); Nihon, 166 F.3d at 72 (abstracts of news articles); Infinity Broadcast Corp., 150 F.3d at 108 (radio monitoring service); Los Angeles News Service v. Tullo, 973 F.2d 791, 797, 799 (9th Cir. 1992) (video news clipping service.); Pacific and Southern Co., Inc. v. Duncan, 744 F.2d 1490, 1496 (11th Cir. 1984) (TV news clipping service).

Finally, Meltwater seeks to defend its copying of the Registered Articles by pointing out that it used the content it takes from the Internet to also provide its subscribers with services like Dashboard Analytics. Meltwater argues that this use of the material constitutes a transformative use. This lawsuit does not challenge the display of any of Meltwater's analytics to its subscribers. AP has not argued that the analysis of its publicly available content through these tools violates it rights. The display of that analysis — whether it be a graphic display of geographic distribution of coverage or tone or any other variable included by Meltwater — is an entirely separate service, however, from the publishing of excerpts from copyrighted articles. The fact that Meltwater also offers a number of analysis tools does not render its copying and redistribution of article excerpts transformative. In sum, the purpose and character of Meltwater's use of AP's articles weigh against a finding of fair use.

B. Nature of the Copyrighted Work

The second factor — the nature of the copyrighted work — considers principally two characteristics of the copyrighted work. First, this factor calls for consideration of "whether the work is expressive or creative, such as a work of fiction, or more factual." Blanch, 467 F.3d at 256 (citation omitted). Works of fiction are "closer to the core of intended copyright protection" than are works that are predominantly factual. Infinity Broadcast Corp., 150 F.3d at 109 (citation omitted). Accordingly, the scope of fair use is broader with respect to factual works than it is with respect to works of fiction. See Nihon, 166 F.3d at 73.

The second characteristic of the copyrighted work that is relevant to this factor is whether the work is published or unpublished. The right of first publication is an important right held by the copyright owner and "the scope of fair use is narrower with respect to unpublished works." Wright v. Warner Books, Inc., 953 F.2d 731, 737 (2d Cir. 1991) (citation omitted).

AP's articles are news stories and therefore more vulnerable to application of the fair use defense than works of fiction. Moreover, Meltwater copied works that were already published. As a consequence, this factor "is at most neutral on the question of fair use," Nihon, 166 F.3d at 73, and should be weighed in favor of finding fair use.

C. Amount and Substantiality of the Copying

The third factor examines the amount and substantiality of the copying by the infringing work. This factor has both quantitative and qualitative dimensions, NXIVM Corp. v. the Ross Inst., 364 F.3d 471, 480 (2d Cir. 2004), and is reviewed "with reference to the copyrighted work, not the infringing work." Wright, 953 F.2d at 738.

The quantitative assessment examines the portion of the copyrighted work that was taken in relation to the whole of that work. The qualitative dimension of this factor considers the importance of the expressive components of the portion copied. See Campbell, 510 U.S. at 587; see also Rogers v. Koons, 960 F.2d 301, 311 (2d Cir. 1992). In other words, the court should consider whether the portion taken is "essentially the heart" of the copyrighted expression. NXIVM Corp., 364 F.3d at 480 (citation omitted). The "most relevant" question for this factor is whether the infringer has taken "no more" than is necessary. Infinity Broadcast Corp., 150 F.3d at 110.

In terms of quantitative copying, the Second Circuit has found that copying as little as eight percent of the original work may tip this factor against a finding of fair use. Iowa State Univ. Research Found., Inc. v. Am. Broad. Co., 621 F.2d 57, 61-62 (2d Cir. 1980) (broadcasting of eight percent of student-made film); see also Salinger v. Random House, Inc., 811 F.2d 90, 98 (2d Cir. 1987) (copying one-third of seventeen letters and ten percent of forty-two letters weighed against finding of fair use). It is clear, however, that no bright-line rule exists with respect to how much copying is too much. New Era Publ'ns Intern., ApS v. Carol Publ'g Group, 904 F.2d 152, 158 (2d Cir. 1990). Thus, in other cases, copying up to eight percent of an original work is not inconsistent with fair use. Id. (eight percent); Maxtone-Graham v. Burtchaell, 803 F.2d 1253, 1263 (2d Cir. 1986) (4.3 percent). Indeed, while appropriation of a copyrighted work in its entirety weighs against a finding of fair use, where a work is indivisible it is not an absolute bar to such a finding. See Bill Graham Archives, 448 F.3d at 613 (image of poster). At the same time, relatively small takings may be significant if the portions taken are qualitatively important. Harper & Row, 471 U.S. at 564-65 (copying of 300 words of biography held substantial where copied portion was "essentially the heart of the book").

The reasonableness of the amount and portions copied will vary depending on the character and purpose of the secondary use. It may be necessary for the secondary user to copy a certain amount or specific portion of the original work in order to accomplish the transformative purpose. The Supreme Court's analysis in Campbell v. Acuff-Rose Music, 510 U.S. 569 (1994), is instructive. In that case, a rap group — 2 Live Crew — sampled portions of Roy Orbison and William Dees' song "Oh, Pretty Woman" in a rap parody entitled "Pretty Woman." Id. at 572. In considering the amount and substantiality of the copying, the Supreme Court offered the following analysis:

When parody takes aim at a particular work, the parody must be able to `conjure up' at least enough of that original to make the object of its critical wit recognizable. What makes for this recognition is quotation of the original's most distinctive or memorable features, which the parodist can be sure that audience will know. Once enough has been taken to assure identification, how much more is reasonable will depend, say, on the extent to which the song's overriding purpose and character is to parody the original or, in contrast, the likelihood that the parody may serve as a market substitute for the original.

Id. at 588 (citation omitted). An analysis of this factor may offer insight into the fourth factor of the fair use analysis as well. In effect, the substantiality of the copying may foreshadow the extent to which the second work will be capable of serving as a market substitute for the original work. Id. at 587.

This factor weighs strongly against a finding of fair use here. Meltwater has not shown that its taking from the Registered Articles was defensible from either a quantitative or qualitative perspective.

Meltwater took between 4.5% and 61% of the Registered Articles. It automatically took the lede from every AP story. As described by AP's Standards Editor, the lede is "meant to convey the heart of the story." A lede is a sentence that takes significant journalistic skill to craft. There is no other single sentence from an AP story that is as consistently important from article to article — neither the final sentence nor any sentence that begins any succeeding paragraph in the story.

Nor has Meltwater attempted to show that it took no more than necessary to perform as a search engine, which is how it seeks to justify its infringement. It has not offered evidence that its automated programs for culling and displaying passages from articles are consistent with the industry standards for search engines. As the evidence offered on this motion illustrates, search engines regularly display briefer segments of news articles. As the CCIA describes the segments taken by search engines, they are no more than "a headline and a snippet of context" designed to direct users to the original source. Indeed, in its foreign operations, it is undisputed that Meltwater provides its customers with far less material than it provides in the United States. In Canada it delivers only headlines, and in the United Kingdom its excerpts are far shorter.

Meltwater makes essentially three arguments to support its infringement under the third factor's quantitative and qualitative tests. None of these arguments is persuasive.

First, Meltwater relies on Nihon, 166 F.3d at 65, to argue that its taking was not quantitatively significant. In Nihon, the Second Circuit found, although acknowledging that it was a "close call," that the copying of only one paragraph of a six-paragraph news article was not an act of infringement since the two articles were not substantially similar in a "quantitative sense." Id. at 71. Since Meltwater has not chosen, however, to contest AP's showing that its copying of each of the Registered Articles was an act of infringement, the Nihon court's discussion about the substantial similarity test for infringement has limited relevance here. In any event, when it reached the fair use defense, the Nihon court found that the abstracting of news articles by the defendant was not a fair use of those articles. In connection with the third factor, it emphasized the amount of copying of protectable expression and held that this factor also tipped against fair use. Id. at 73.[17]

Next, Meltwater argues that the extent of its copying is justified because its purpose is to serve as a search engine. But, Meltwater has failed to show that it takes only that amount of material from AP's articles that is necessary for it to function as a search engine. Indeed, the evidence is compellingly to the contrary.

Finally, Meltwater disagrees that the lede is qualitatively significant. It points out that two of the ledes are teasers and not summaries of news.[18] This observation misses the mark. If anything, the observation emphasizes the creativity and therefore protected expression involved with writing a lede and the skill required to tweak a reader's interest.

D. The Effect of the Use on the Potential Market or Value of the Work

The final fair use factor is multi-faceted. It

requires courts to consider not only the extent of market harm caused by the particular actions of the alleged infringer, but also whether unrestricted and widespread conduct of the sort engaged in by the defendant would result in a substantially adverse impact on the potential market for the original.

Campbell, 510 U.S. at 590 (citation omitted). Where there is a fully functioning market for the infringer's use of the copyrighted material, it will be difficult for the infringing party to show that it made fair use without paying a licensing fee. See Harper & Row, 471 U.S. at 566 n.9. In contrast, "when the only possible adverse effect occasioned by the secondary use would be to a potential market or value that the copyright holder has not typically sought to, or reasonably been able to, obtain or capture," this fourth factor will favor the infringer. Am. Geophysical Union, 60 F.3d at 930. But, again, because fair use is an affirmative defense, it is the defendant's burden to present evidence of relevant markets that is favorable to its defense. Campbell, 510 U.S. at 590; Infinity Broadcast Corp., 150 F.3d at 110.

When analyzing the fourth factor, "the impact on potential licensing revenues is a proper subject for consideration." Am. Geophysical Union, 60 F.3d at 929. In considering this type of harm, however, a court must be wary of falling into the trap of circular reasoning. The Second Circuit has provided the following guidance:

[I]t is not unsound to conclude that the right to seek payment for a particular use tends to become legally cognizable under the fourth fair use factor when the means for paying for such a use is made easier. This notion is not inherently troubling: it is sensible that a particular unauthorized use should be considered more fair when there is no ready market or means to pay for the use, while such an unauthorized use should be considered less fair when there is a ready market or means to pay for the use. The vice of circular reasoning arises only if the availability of payment is conclusive against fair use.

Id. at 930-31. Thus, in order to prevent the loss of licensing fees from becoming a syllogistic consideration, courts consider only the loss to potential licensing revenues from "traditional, reasonable, or likely to be developed markets." Id. at 930; see also Bill Graham Archives, 448 F.3d at 614.

Consequently, when the use is transformative or takes place in a market that the copyright holder is unlikely to develop, it is more likely that the defendant has engaged in a fair use of the material. After all, "[c]opyright holders rarely write parodies of their own works, or write reviews of them, and are even less likely to write news analyses of their underlying data from the opposite political perspective." Twin Peaks Products, Inc. v. Publ'ns Intern LTD, 996 F.2d 1366, 1377 (2d Cir. 1993) (citation omitted); cf. Campbell, 510 U.S. at 592-93. Accordingly, while a copyright holder's current participation in a given market is relevant to the determination of whether the market is "traditional, reasonable, or likely to be developed," it is not determinative.

[A] copyright holder cannot prevent others from entering fair use markets merely by developing or licensing a market for parody, news reporting, educational or other transformative uses of its own creative work.

Bill Graham Archives, 448 F.3d at 614-15 (citation omitted). In other words, "[c]opyright owners may not preempt exploitation of transformative markets." Id. at 615 (citation omitted). Additionally, this factor requires careful attention to the source or cause of the harm.

If the harm resulted from a transformative secondary use that lowered the public's estimation of the original (such as a devastating review of a book that quotes liberally from the original to show how silly and poorly written it is), this transformative use will be found to be a fair use, notwithstanding the harm.

On Davis, 246 F.3d at 175. The concern of this factor is not with "whether the secondary use suppresses or even destroys the market for the original work or its potential derivatives, but [with] whether the secondary use usurps or substitutes for the market of the original." Castle Rock Entm't, 150 F.3d at 145.

The fourth factor weighs strongly against Meltwater. AP has expended considerable effort to develop an on-line presence. Among other things, it licenses its content to media monitoring services that live in the very commercial space in which Meltwater resides. By refusing to pay a licensing fee to AP, Meltwater not only deprives AP of a licensing fee in an established market for AP's work, but also cheapens the value of AP's work by competing with companies that do pay a licensing fee to use AP content in the way that Meltwater does. The value of AP's work is further harmed by the fact that Meltwater directly competes with AP for customers. Through its use of AP content and refusal to pay a licensing fee, Meltwater has obtained an unfair commercial advantage in the marketplace and directly harmed the creator of expressive content protected by the Copyright Act.

Meltwater ignores most of this record. It relies almost exclusively on its contentions that it is a search engine and that search engines make a transformative use of the copyrighted news stories. But, as discussed above, AP has not shown that it should be characterized as a search engine imbued with a transformative purpose; adopting technology used by search engines does not by itself make one a search engine in this sense. As tellingly, Meltwater has not shown that it has taken only that amount of content that is necessary for it to function as a search engine.

E. Aggregate Assessment of the Fair Use Factors

Examining the four factors individually, and considering them as a whole in light of the purposes of the Copyright Act and the fair use defense, Meltwater has failed to raise a material question of fact to support its fair use defense. Meltwater's business model relies on the systematic copying of protected expression and the sale of collections of those copies in reports that compete directly with the copyright owner and that owner's licensees and that deprive that owner of a stream of income to which it is entitled. Meltwater's News Reports gather and deliver news coverage to its subscribers. It is a classic news clipping service. This is not a transformative use. As significantly, the rejection of the fair use defense here will further the ultimate aim of the Copyright Act, which is to stimulate the creation of useful works for the public good. Harper & Row, 471 U.S. at 558.

Throughout its discussion of the fair use defense, Meltwater has attempted to escape the straight forward application of the four-part fair use test by characterizing itself as a search engine. Meltwater has failed to show, however, that its interactions with its subscribers are equivalent in any material way to the functioning of search engines, as that term is commonly understood. Exploitation of search engine technology to gather content does not answer the question of whether the business itself functions as a search engine. In any event, however Meltwater's business is classified, it must still show that its use of copyrighted expressive content was a fair use. This it has not done.

II. Implied License

AP has also moved for summary judgment on Meltwater's second affirmative defense, the defense that Meltwater was granted an implied license by AP. It is a defense to copyright infringement that the alleged infringer possessed a license to use the copyrighted work. Graham v. James, 144 F.3d 229, 236 (2d Cir. 1998). The burden of proving that a license exists falls on the party invoking the defense. Id.

Pursuant to the Copyright Act, all grants of exclusive rights in a copyright must be made in writing. 17 U.S.C. § 204(a). Nonexclusive licenses, however, need not be in writing. 17 U.S.C. § 101; see also MacLean Assocs. Inc. v. VM. M. Mercer-Medinger-Hansen, Inc., 952 F.2d 769, 778-79 (3d Cir. 1991). Thus, a nonexclusive license can be granted orally or it can be implied from conduct. See MacLean Assocs., 952 F.2d at 778-79. As the Supreme Court explained in De Forest Radio Telephone & Telegraph v. United States, 273 U.S. 236 (1927), in the course of deciding whether a company had given a license to the United States to manufacture a product covered by patents:

No formal granting of a license is necessary in order to give it effect. Any language used by the owner of the patent or any conduct on his part exhibited to another, from which that other may properly infer that the owner consents to his use of the patent in making or using it, or selling it, upon which the other acts, constitutes a license, and a defense to an action for a tort.

Id. at 241.

The test for determining whether an implied license exists in the copyright context has three elements. The defendant must show that

(1) the licensee requested the creation of a work;

(2) the licensor made that particular work and delivered it to the licensee who requested it; and

(3) the licensor intended that the licensee copy and distribute his work.

See Latimer v. Roaring Toyz, Inc., 601 F.3d 1224, 1235 (11th Cir. 2010); see also Wilchombe v. TeeVee Tonns, Inc., 555 F.3d 949, 956 (11th Cir. 2009); Atkins v. Fischer, 331 F.3d 988, 991-92 (D.C. Cir. 2003); Nelson-Salabes, Inc. v. Morningside Development, LLC, 284 F.3d 505, 514 (4th Cir. 2002); I.A.E. Inc. v. Shaver, 74 F.3d 768, 776 (7th Cir. 1996). The circumstances in which an implied license may be found are therefore quite "narrow." SmithKline Beecham Consumer Healthcare v. Watson Pharmaceuticals, Inc., 211 F.3d 21, 25 (2d Cir. 2000) (citation omitted).

Even those courts that do not require evidence of each of these three elements do require evidence of a meeting of the minds between the licensor and licensee such that it is fair to infer that the licensor intended to grant a nonexclusive license. Baisden v. I'm Ready Prods., Inc., 693 F.3d 491, 501 (5th Cir. 2012) (collecting cases); see also Psihoyos v. Pearson Educ. Inc., 855 F.Supp.2d 103, 124 (S.D.N.Y. 2012). Since an implied license is a creature of contract law, the parties' intent is a critical factor. I.A.E., 74 F.3d at 775-76; see also Johnson v. Jones, 149 F.3d 494, 502 (6th Cir. 1998).

Meltwater has failed to offer evidence from which a reasonable juror could conclude that AP impliedly granted Meltwater a license to copy and distribute its articles. It is undisputed that the Registered Articles were not created at Meltwater's request. Moreover, the parties had essentially no contact with each other before this litigation.[19] As a result, Meltwater is unable to point to any interaction with AP from which it could be inferred that there was a meeting of minds between the parties that AP was granting Meltwater a nonexclusive license to extract and re-publish excerpts of its news stories that appeared on the Internet.

Meltwater has not shown that it had the type of interaction with AP that existed in any of those few instances in which Courts of Appeals across the country have found evidence of an implied license. See, e.g. Lukens Steel Co. v. Am. Locomotive Co., 197 F.2d 939, 941 (2d Cir. 1952) (the parties "were engaged in business relationship involving mutual confidence and mutual effort"); Atkins, 331 F.3d at 990 (parties had formal agreement under which appellant would create designs for appellees' product); I.A.E., 74 F.3d at 771-72, 776 (architect prepared schematic design drawings at company's request and delivered copies to company).

Nor has Meltwater offered any evidence of interaction with any of AP's licensees from which it could be inferred that any one of those licensees had impliedly granted a sublicense to Meltwater to excerpt material found on their websites. This is unsurprising since AP's licenses do not grant its licensees the authority to sublicense AP content.

In its opposition, Meltwater makes one argument to support its affirmative defense of implied license. It once again equates its activities with those of a search engine that makes its searches freely available to the public in order to direct the Internet user to the websites that respond to the user's search requests. Meltwater argues that AP impliedly granted Meltwater a license to use the Registered Articles when it did not require its licensees to employ on their websites robots.txt protocol to exclude web crawlers.[20]

Meltwater has not offered any expert testimony about robots.txt, but the parties appear to agree that it functions as follows. Robots.txt protocol, also known as the Robot Exclusion Standard, was designed by industry groups to instruct cooperating web crawlers not to access all or part of a website that is publicly viewable. If a website owner uses the robots.txt file to give instructions about its site to web crawlers, and a crawler honors the instruction, then the crawler should not visit any pages on the website. The protocol can also be used to instruct web crawlers to avoid just a portion of the website that is segregated into a separate directory.

For several reasons, the failure of AP's licensees to employ the robots.txt protocol did not give Meltwater an implied license to copy and publish AP content. First, what Meltwater is suggesting would shift the burden to the copyright holder to prevent unauthorized use instead of placing the burden on the infringing party to show it had properly taken and used content.

As significantly, there is no fair inference, based simply on the absence of the robots.txt protocol, that there has been a meeting of the minds between the copyright owner and the owner of the web crawler about the extent of copying. The implied license that Meltwater is advocating would reach to every web crawler with no distinction between those who make fair use and those who do not, or between those whose uses may be publicly observed and those whose uses are hidden within closed, subscriber systems. Meltwater has presented no evidence to suggest that robots.txt instructions are capable of communicating which types of use the copyright holder is permitting the web crawler to make of the content or the extent of the copying the copyright holder will allow.

There are also practical problems with Meltwater's argument in the event that AP and its licensees wanted to continue to permit search engines to visit their sites. AP is engaged in an ongoing licensing program that includes granting licenses that permit the scraping of AP content by web crawlers from online sources. Robots.txt protocol can be adopted to allow or disallow specific web crawlers. If Meltwater's argument were successful, with each change in the list of licensees AP and each of its licensees would have to update their robots.txt protocol to indicate which web crawlers had permission to visit each site's webpages.[21]

There is yet another policy reason against the use of robots.txt protocol to enforce the Copyright Act. The protocol is a helpful innovation that gives instructions to cooperating crawlers. But, in the interest of openness on the Internet, one would expect it to be used only when it is in the clear interest of the website to broadly limit access. It is fair to assume that most Internet users (and many owners of websites) would like crawlers employed by search engines to visit as many websites as possible, to include those websites in their search results, and thereby to direct viewers to a vast array of sites. Adopting Meltwater's position would require websites concerned about improper copying to signal crawlers that they are not welcome.

Finally, in support of its argument, Meltwater cites Field v. Google, 412 F.Supp.2d 1106 (D. Nev. 2006), and Parker v. Yahoo!, Inc., No. 07 Civ. 2757, 2008 WL 4410095 (E.D. Pa. Sept. 25, 2008). Neither decision suggests that AP impliedly consented to the copying done by Meltwater because its licensees permitted search engines to crawl their sites. These two decisions principally discuss a website protocol that performs a different function than robots.txt. They address the storage of web pages by search engines. The "cached" pages at issue allowed users of the search engines to access an archival copy of a webpage stored in the search engine's system. The archival copy shows the page as it appeared the last time the search engine visited the page. Field, 412 F.Supp.2d at 1111. This can be particularly useful when a page has been removed from its original location. Id. By adopting a "no-archive" meta-tag, the website owner could instruct the search engines not to provide a cached link to search engine users. Id. at 1112-13. The copyright owners in each of these decisions chose not to use the "no-archive" meta-tags, knew that the search engines would honor the meta-tags, and also knew the search engines would remove the cached copy upon request. In such circumstances, the courts found an implied license. Id. at 1116; Parker, 2008 WL 4410095, at *4.

Meltwater does not provide its subscribers with access to cached pages, reserves the right to disregard certain robots.txt instructions, and has not suggested that it will remove content from its system at the request of the copyright owner. As a result, these two decisions have limited relevance.

It is worth observing that, when a crawler is making a fair use of a website's content, it does not need to resort to the implied license doctrine; where it does not, then the website's failure to use the robots.txt protocol to block its access will not create an implied license. Accordingly, Meltwater's implied license defense fails as a matter of law.[22]

III. Equitable Estoppel

Meltwater relies on three additional affirmative defenses as reasons why summary judgment may not be entered in favor of AP on its copyright infringement claim. The first is equitable estoppel.

Meltwater argues that AP is estopped from bringing its claim of copyright infringement because it failed to take protective measures and was silent in the face of Meltwater's actions. This defense is no more effective than Meltwater's affirmative defense of implied license.

The doctrine of equitable estoppel applies "where the enforcement of the rights of one party would work an injustice upon the other party due to the latter's justifiable reliance upon the former's words or conduct." Marvel Characters, Inc. v. Simon, 310 F.3d 280, 292 (2d Cir. 2002) (citation omitted). Essential to any finding of estoppel is "detrimental reliance on the adverse party's misrepresentations." Republic of Ecuador v. Chevron Corp., 638 F.3d 384, 400 (2d Cir. 2011). Reliance is not justifiable if the party invoking estoppel "had the means by which with reasonable diligence he could acquire the knowledge so that it would be negligence on his part to remain ignorant by not using those means." In re Becker, 407 F.3d 89, 99 (2d Cir. 2005) (citation omitted) (Emphasis omitted.) Silence alone is rarely a basis for finding equitable estoppel, but "where a party has a legal duty to speak, silence can constitute an affirmative `misrepresentation.'" Kosakow v. New Rochelle Radiology Assocs., P.C., 274 F.3d 706, 725 (2d Cir. 2001); see also Veltri v. Bldg 32B-J Pension Fund, 393 F.3d 318, 326 (2d Cir. 2004); General Elec. Capital Corp. v. Armadora, S.A., 37 F.3d 41, 45 (2d Cir. 1994).

Meltwater has not carried its burden of raising a question of fact suggesting that AP made any misrepresentations or acted in any way that would have justified Meltwater believing that it was entitled to publish the excerpts from the Registered Articles or would not be sued for copyright infringement if it did. Meltwater has not pointed to any representation by AP or its licensees that led it to believe that it could act as it did in publishing the excerpts of AP articles. To the contrary, many if not all of AP's licensees display terms of use on their websites prohibiting the commercial use of content.[23] Nor has Meltwater shown that it acted with the diligence required to assert this defense. Indeed, Meltwater has not offered any evidence that it actually held the belief that AP had authorized it to publish the excerpts it took from AP online articles.

Meltwater relies instead on two omissions by AP to support its affirmative defense of equitable estoppel. The first is that AP did not restrict general access to its online content by requiring its licensees to put AP content behind a paywall, require registration for access, or use robots.txt instructions to signal that AP content was off-limits. AP had no duty to take any of these steps before it could act to enforce its rights against copyright infringement. No infringer of AP's copyright could reasonably rely on the absence of these measures to excuse infringement.

Meltwater next argues that, until it initiated this lawsuit, AP never told Meltwater that it had any objection to Meltwater's use of AP content. But, Meltwater has offered no evidence of any relationship or communication with AP that imposed upon AP the duty to speak. In the absence of a duty to speak, Meltwater could not reasonably rely on AP's alleged silence about its copyright infringement.

Not only has Meltwater failed to offer evidence of any justifiable reliance, but the evidence submitted on these motions also indicates that Meltwater was on notice of the risk it ran of being sued by AP for copyright infringement. As mentioned, many — if not all — of the websites that Meltwater crawled in order to copy AP articles post terms of use that specifically prohibit commercial use of the website's content. In October of 2007, AP sued one of Meltwater's competitors — Moreover Technologies, Inc. ("Moreover") — for copyright infringement on the basis of Moreover's scraping of AP content from websites and distribution of excerpts or entire articles to Moreover's customers.[24] In April 2009, AP issued a press release describing its launch of an industry initiative to protect news content from online misappropriation. Later that year, AP announced that an initiative to monitor the use of AP's content online had been created. Had Meltwater been reasonably diligent in acquiring knowledge about AP's views on the commercial redistribution of its content, it could not have remained ignorant of the true facts. Meltwater has failed, therefore, to show that the doctrine of equitable estoppel prevents the entry of summary judgment in favor of AP.

IV. Laches

Meltwater also argues that its affirmative defense of laches prevents summary judgment from being granted in AP's favor. The Copyright Act sets a three-year statute of limitations for copyright infringement claims. 17 U.S.C. § 507(b). A copyright claim accrues "when a plaintiff knows or has reason to know of the injury upon which the claim is premised." Merchant v. Levy, 92 F.3d 51, 56 (2d Cir. 1996). When the copyright claim is based on infringement, the "action may be commenced within three years of any infringing act, regardless of any prior acts of infringement." Kwan v. Schlein, 634 F.3d 224, 228 (2d Cir. 2011). The parties agree that the plaintiff's copyright infringement claims with respect to the Registered Articles were filed within the three-year statute of limitations.

The defendant claims that while the statute of limitations may not bar the plaintiff's claims, the doctrine of laches does. The doctrine of laches is derived from the equitable principle that "equity aids only the vigilant, and not those who sleep on their rights." Ivani Contracting Corp. v. City of New York, 103 F.3d 257, 259 (2d Cir. 1997) (citation omitted). The doctrine of laches has three elements: "(1) the plaintiff knew of the defendant's misconduct; (2) the plaintiff inexcusably delayed in taking action; and (3) the defendant was prejudiced by the delay." Ikelionwu v. United States, 150 F.3d 223, 237 (2d Cir. 1998) (laches applied to request for return of seized property).

There is disagreement among the Circuits regarding whether laches is a viable defense to a copyright claim brought within the three-year statute of limitation. See Petrella v. Metro-Goldwyn-Mayer, Inc., 695 F.3d 946, 958 (9th Cir. 2012) (Fletcher, J., concurring) (describing the circuit split). In the Second Circuit, "[t]he prevailing rule" in the context of a federal statutory claim seeking legal relief, is one in which "laches cannot bar that claim, at least where the statute contains an express limitations period within which the action is timely." Ivani Contracting Corp., 103 F.3d at 260. Even in the context of an action in equity, the doctrine of laches will rarely be applied within this circuit to an action brought within the statutory period. Ikelionwu, 150 F.3d at 238. Nonetheless, severe prejudice coupled with unconscionable delay may limit injunctive relief in a copyright action. New Era Publ'ns, 873 F.2d at 584-85.

Accordingly, laches is not a defense to the plaintiff's claim for damages. Laches is also not available to Meltwater as a defense to copyright infringement to the extent AP seeks prospective injunctive relief. See Peter Letterese and Assocs. Inc., 533 F.3d at 1321. Equitable considerations — like laches — may arise, however, where a plaintiff seeks retrospective injunctive relief and can demonstrate each of the traditional elements of the laches defense. See New Era Publ'ns, 873 F.2d at 584.

In its amended complaint, AP seeks both damages and injunctive relief. In terms of injunctive relief, AP seeks both prospective relief and an order requiring Meltwater to "delete from its database and all computers under Defendants' control all copyrighted materials owned by AP and all AP news reports." Should Meltwater carry its burden of showing laches, it would at most be able to bar AP's request that AP's content be swept from Meltwater's databases. The parties will be given an additional opportunity to address whether retrospective injunctive relief should be granted in this case.

V. Copyright Misuse

As its fifth and final affirmative defense to AP's copyright infringement claims, Meltwater argues that AP should be barred from enforcing its copyrights because — by engaging in price-fixing with competing news organizations in violation of the antitrust laws — it has misused its copyrights. This final defense fails as well.

The Second Circuit has not yet recognized the affirmative defense of copyright misuse. See Shady Records v. Source Enters., 03 Civ. 9944 (GEL), 2005 WL 14920, at *15 (S.D.N.Y. Jan. 3, 2005). Although copyright misuse has been acknowledged as a potential affirmative defense to an action for copyright infringement in at least five circuits, only a handful of decisions have ever applied it to bar an otherwise successful claim of copyright infringement. See Video Pipeline, 342 F.3d at 206 (recognizing defense but finding no misuse); Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d 772, 795 (5th Cir. 1999) (plaintiff's copyright misuse barred it from obtaining injunctive relief on its copyright infringement claim); Practice Mgmt. Info. Corp. v. Am. Med. Assoc., 121 F.3d 516, 521 (9th Cir. 1997) (reversing award of damages and injunction for copyright infringement because of plaintiff's copyright misuse); Lasercomb Am. v. Reynolds, 911 F.2d 970, 979 (4th Cir. 1990) (reversing award of damages and injunction for copyright infringement due to plaintiff's copyright misuse); United Telephone Co. of Missouri v. Johnson Pub. Co., Inc., 855 F.2d 604, 612 (8th Cir. 1988) (assuming defense exists but finding no misuse).

The defense of copyright misuse arises from the better-known defense of patent misuse described in Morton Salt Co. v. G.S. Suppiger, 314 U.S. 488 (1942). In Morton Salt, the patent holder for the design of a salt-depositing machine also produced salt tablets. Morton Salt entered into licensing agreements that required its licensees to use Morton salt tablets exclusively. When Morton Salt brought suit for patent infringement, the Supreme Court found that its suit was barred by its use of its "patent monopoly to restrain competition in the marketing of unpatented articles." Id. at 491. The Supreme Court described the rationale behind the defense as follows:

The grant to the inventor of the special privilege of a patent monopoly carries out a public policy adopted by the Constitution and laws of the United States, `to promote the Progress of Science and useful Arts, by securing for limited Times to Inventors the Exclusive Rights . . . to their `new and useful' inventions. But the public policy which includes inventions within the granted monopoly excludes from it all that is not embraced in the invention. It equally forbids the use of the patent to secure an exclusive right or limited monopoly not granted by the Patent Office and which it is contrary to public policy grant.

Id. at 492 (citation omitted).

In 1990, the Fourth Circuit became the first circuit to expressly recognize the defense of copyright misuse. Lasercomb Am., 911 F.2d at 977-79. Relying on "[t]he origins of patent and copyright law in England, the treatment of these two aspects of intellectual property by the framers of our Constitution, and the later statutory and judicial development of patent and copyright law in this country," the court concluded that the misuse of copyright should be available as a defense to copyright infringement. Id. at 974. It further concluded that the existence of an antitrust violation was not a pre-requisite to a viable copyright misuse claim:

[W]hile it is true that the attempted use of a copyright to violate antitrust law probably would give rise to a misuse of copyright defense, the converse is not necessarily true — a misuse need not be a violation of antitrust law in order to comprise an equitable defense to an infringement action. The question is not whether the copyright is being used in a manner violative of antitrust law . . . but whether the copyright is being used in a manner violative of the public policy embodied in the grant of copyright.

Id. at 978. Consistent with this rationale, it described copyright misuse as arising from a copyright holder's attempt to use its copyright in a particular expression "to control competition in an area outside the copyright." Id. at 979.

Whatever the metes and bounds of the defense, it is one that is applied "sparingly." Apple Inc. v. Pystar Corp., 658 F.3d 1150, 1157 (9th Cir. 2011). Its focus is on the improper stifling of competition. Id. at 1157-59.

Meltwater contends that it has offered sufficient evidence that AP engaged in a per se violation of the antitrust laws to raise a question of fact that prevents summary judgment being granted on AP's copyright infringement claim. Specifically, Meltwater asserts that it has offered evidence that AP violated antitrust law "[b]y foisting a pricing structure and minimum target prices upon a licensing entity, and by sharing its own pricing information" with that licensing agency and its members.

The licensing entity to which Meltwater is referring is NewsRight. NewsRight is a joint venture between AP and other publishers formed in 2011 and publicly launched in 2012. NewsRight's stated aim is to "work with third parties — such as commercial aggregators and media-monitoring companies — to license content from a large set of major publishers and to allow both publishers and third-party licensees to track and analyze the use of news content online." Those news publishers that are members of NewsRight have authorized NewsRight to license their content on a nonexclusive basis. So far, NewsRight has entered into two license agreements, but it has not yet licensed any AP content.

Even assuming that this circuit were to adopt the affirmative defense of copyright misuse to a claim of copyright infringement, and assuming further that Meltwater had raised a question of fact as to whether AP shared its own pricing information with NewsRight and "imposed" a pricing structure on and minimum prices for the licenses offered by the joint venture, Meltwater has not shown that summary judgment should not be granted to AP on its copyright infringement claim. AP's alleged conduct does not amount to copyright abuse. Nothing in the conduct alleged by Meltwater suggests that AP has improperly leveraged its copyrights to exert control over competition in the delivery of news. Every one of its competitors, whether a member of NewsRight or not, retains the power to issue its own licenses according to whatever pricing scale it chooses. AP does not create the news, control access to the news, or have any power to restrict any other party's entry into the business of reporting the news. Meltwater has not explained how AP's supposed actions would have interfered with the Copyright Act's goal of "increas[ing] the store of creative expression for the public good." Video Pipeline, 342 F.3d at 205.

Moreover, Meltwater's proffered evidence does not even suggest any misconduct by AP. Meltwater's argument that AP has used its participation in NewsRight to engage in price fixing relies on essentially three documents. The most significant of these is an email from 2011, in which AP suggests that the aggregator market be divided into three segments (Top players; Premium Institutional Specialists; and PR Community/Press Clipping Services) and then suggests minimum target licensing fees for NewsRight's licenses within each of the segments.[25] NewsRight ultimately rejected this approach and developed a different licensing structure. Nothing in this opening gambit about the appropriate pricing structure for the creation of a new product by a joint venture suggests a violation of the antitrust laws. In sum, Meltwater has not shown that the doctrine of copyright misuse, even if adopted in this circuit, should prevent summary judgment being awarded to AP on its claim of copyright infringement.[26]

VI. Meltwater's Motion for Summary Judgment on AP's Secondary Infringement Claims

In addition to moving for summary judgment on the basis of its fair use defense, Meltwater has moved for summary judgment on AP's claims of contributory and vicarious copyright infringement. These claims are based on AP's allegations that Meltwater has encouraged and assisted its customers to copy, store, and redistribute AP articles or portions of AP articles, in particular, through the use of Meltwater's archiving, Newsletter, and Newsfeed functions. In its motion for summary judgment, Meltwater points out that AP has offered no evidence that an actual Meltwater customer ever stored or distributed full text versions of any of the thirty-three Registered Articles.[27] Because there is no evidence of direct infringement by its customers, Meltwater contends, there can be no finding of contributory or vicarious copyright infringement. In an affidavit submitted pursuant to Federal Rule of Civil Procedure 56(d), AP requests additional discovery. Because Meltwater's motion for summary judgment is based principally on AP's failure of proof, and because AP is entitled to additional discovery on these claims, Meltwater's motion is denied without prejudice to renewal.

VII. Meltwater's Evidentiary Objections

Meltwater has filed two motions to strike. In Meltwater's first motion, it seeks to strike: (1) the declaration of Elizabeth McNamara in its entirety and sixty-seven of the accompanying exhibits; (2) portions of the declaration of Sue Cross ("Cross") and eight of the accompanying exhibits; (3) portions of the declaration of Thomas Curley ("Curley") and four of the accompanying exhibits; (4) portions of the declaration of Joy Jones ("Jones") and seven of the accompanying exhibits; (5) portions of the declaration of Thomas Kent; (6) portions of the declaration of John D. Rizzo and four of the accompanying exhibits; and (7) substantial parts of AP's Rule 56.1 statement. The second motion seeks to strike: (1) the declaration of Alison B. Schary in its entirety and eight of the accompanying exhibits; and (2) portions of the declaration of Linda Steinman. In addition, both parties have raised objections in their Rule 56.1 counterstatements of undisputed material facts. Some of these objections have already been addressed. To the extent that any objection is not discussed in this Opinion and the Court relied on the challenged evidence, the objection has been considered and rejected. Three more categories of objections are addressed below.

First, however, it is important to note that most of the facts in this case are undisputed. In particular, the Opinion's description of Meltwater's system is taken largely from Meltwater's own documents and the accounts of its own affiants and deponents. Many of Meltwater's evidentiary objections instead focus on the manner in which AP characterizes certain evidence. The Court has disregarded the parties' characterizations and relied on the underlying documents.

In its motions to strike, Meltwater argues that the Court should also strike statements and documents regarding matters occurring prior to 2009, because "AP unilaterally imposed a date restriction of January 1, 2009" in responding to Meltwater's document requests. Both parties preserved their objections to the production of older documents. AP generally objected to production of documents predating January 1, 2009, and Meltwater objected to producing documents predating March 1, 2010. Despite that general objection, AP proceeded to produce responsive documents dated before 2009, including each of the documents submitted in connection with these summary judgment motions. Meltwater never indicated during discovery that AP's general objection was a concern and it did not seek to compel the production of other documents dated prior to 2009. Furthermore, AP placed no timeframe restriction on its witnesses when they were deposed. Under the circumstances, Meltwater has shown no basis to strike all documents and statements relating to matters occurring prior to 2009, which in any event are few in number.

Meltwater has also objected on grounds of relevance to the submission by AP of many of the Meltwater documents produced in discovery. These include its promotional materials and samples of its News Reports. It also objects on relevance grounds to the samples of Google News Alerts. The objections to these and other documents on the ground of relevance have been considered and rejected.

Meltwater has raised objections to the declarations of Cross, Curley, and Jones, among others, on the ground that these individuals have not set forth facts showing that they have personal knowledge of the matters described in their declarations. Cross has been AP's Senior Vice President of Business Development and Partner Relations for the Americas since 2010. Previously, she held a number of positions with AP, including Bureau Chief in Los Angeles, Vice President for the Western Region, Vice President for Online Services for U.S. Newspapers, and Senior Vice President for Global New Media and Media Markets for the Americas. To the extent the Court has relied on Cross's declaration it has been for facts such as the number of AP's licensees, AP's annual licensing revenues, AP's agreements with its licensees, AP's business model, and a description of AP Hosted. All of these matters are plainly within her personal knowledge. Similarly, Jones (Vice President for Platform Strategy and Operations) and Curley (former Chief Executive Officer) offered statements expressly based on their personal knowledge about the composition of AP, NewsRight,[28] AP's licensing scheme, AP Hosted, and AP's lack of contact with Meltwater. Each of these declarants has described facts sufficient to demonstrate that they have personal knowledge of the matters referenced herein.

CONCLUSION

The plaintiff's November 9, 2012 motion for summary judgment is granted, with one exception. The defendants' November 9 motion for summary judgment is denied. The parties will be given an additional opportunity to address whether retrospective injunctive relief should be granted in this case.

Appendix

Article #1

Title: Help wanted at new casino for Toledo, Ohio Full Text Meltwater News Excerpt TOLEDO, Ohio (AP) — Job (AP) TOLEDO, Ohio — Job seekers can roll the dice to seekers can roll the dice to land work at another of the land work at another of the four casinos coming soon to four casinos coming soon to Ohio. Ohio. Hollywood Casino Hollywood Casino Toledo Toledo has posted more than has posted more than 600 job 600 job listings on its listings on its website this website this week. . . . week. Multiple media outlets restaurant workers, slots and report the positions include table games supervisors, bar and restaurant workers, groundskeepers and security slots and table games officers. The casino is supervisors, grounds keepers scheduled to open in the and security officers. spring with . . . The casino is scheduled to open in the spring with 1,200 employees. The Cleveland casino, which will open first, advertised for 750 non-gaming jobs on Monday, while the Columbus casino posted openings for executive positions. Cincinnati also is getting a casino. All four were approved by Ohio voters in 2009.

Article #2

Title: Wikileaks suspect's trial near super-secure NSA Full Text Meltwater News Excerpt FORT MEADE, Md. (AP) — The FORT MEADE, Md. (AP) — The military intelligence complex military intelligence complex an hour outside Washington an hour outside Washington where the WikiLeaks case goes where the WikiLeaks case goes to court this week is known as to court this week is known a cloak-and-dagger sanctum as a cloak-and-dagger sanctum off-limits to the public — a off-limits to the public — a reputation that's only partly reputation that's only partly true. true. Maryland's Fort Meade is, . . . low-level clearance and for the most part, an ordinary a Lady Gaga CD. The Army post, its 5,000-acres prosecution can only hope mostly made up of neat rows of that their arguments, or the army barracks and homes, a PX, evidence, will reveal the and a golf course. secrets of how, . . . Only one small part of the base houses the supersecure compound of the codebreaking National Security Agency. Yet that juxtaposition still provides the greatest irony: Pfc. Bradley Manning, the soldier accused of one of the largest intelligence heists in U.S. history, will stand trial in a military court room on the same post as the intelligence agency charged with covertly collecting and cracking secrets. Manning's case, a cause celebre for anti-secrecy activists, hackers and even human rights groups, is subject to unprecedented security restrictions. The military says Fort Meade was chosen for the Manning hearing not because of its secure location but because the garrison's Magistrate Court has the largest military courtroom in the Washington area. It's where you would go to argue your case if military police pulled you over for breaking the 15 to 35 mph speed limit. Like any Army post, Fort Meade does have security. If you're on the entry list at the garrison's front gate, you can drive in unescorted after a routine check of your vehicle. NSA is located on a separate, far-harder-to-enter compound, contiguous with the main base. Entry requires the highest of clearances or the most diligent of escorts, and NSA's own elite detail provides security. The compound is equipped with various electronic means to ward off an attack by hackers. The compound's experts include cryptologists, computer hackers and "siginters," the signals intelligence experts who can track a conversation inside an Iranian nuclear scientist's office from the vibrations of the windows. Yet despite their focus on cracking secrets, the agency itself is hardly hidden. NSA's main complex is visible from a major highway, and features a U-shaped building with a couple of 1980s-style glass office blocks attached, surrounded on all sides by a parking lot and a chain-link fence. You can study the buildings at your leisure, in photos posted to the NSA's own online photo gallery. And you can test your own code-breaking skills at the agency's National Cryptologic Museum, open to the public just outside the NSA compound. After punching a code or two into a genuine World War II German Enigma code-making machine, you can pick up a "No Such Agency" T-shirt at the gift shop. The throngs of reporters covering the Manning trial probably won't have time to see any of that. They'll be busy following the case against a defendant alleged to be so devious and creative that he came up with a way to spirit away hundreds of thousands of classified files, armed only with guile, a low-level clearance and a Lady Gaga CD. The prosecution can only hope that their arguments, or the evidence, will reveal the secrets of how, and why, so much classified information ended up online, for all the world to read. Even the NSA's experts might want to know that.

Article #3

Title: Sun shines on the mountain and Pearce rides again Full Text Meltwater News Excerpt BRECKENRIDGE, Colo. (AP) — BRECKENRIDGE, Colo. — Basking in the sun and snow, Basking in the sun and snow, surrounded by his fans and surrounded by his fans and friends, Kevin Pearce carved friends, Kevin Pearce carved sweet turns down a gentle run sweet turns down a gentle run called "Springmeier" — called "Springmeier" — kicking up just enough powder kicking up just enough powder behind him to remind people behind him to remind people that, yes, this kid can still that, yes, this kid can still ride. ride. . . . The three trips he took down though, as he labored through that hill, some might say, his grueling rehabilitation, were a storybook ending to a Pearce never gave up hope life-altering journey that that he might ride again — began when Pearce nearly died if not across a rail or during a training accident through a . . . while preparing for the Olympics. Or was it a new beginning? "That's kind of my goal," Pearce said, "is to continue to have special days like this." Yes, Tuesday was a special day — the 24-year-old champion snowboarder's first trip down the mountain since Dec. 31, 2009, which is when he banged his head on the halfpipe in Utah while trying a difficult trick that, had he pulled it off a few months after that, might have won him a gold medal at the Vancouver Olympics. The accident left him in a coma and his life hung in the balance for several days. When he finally awoke, severe head trauma turned the most basic of activities — walking, talking, seeing straight — into pressing challenges for the young athlete. In the back of his mind, though, as he labored through his grueling rehabilitation, Pearce never gave up hope that he might ride again — if not across a rail or through a halfpipe, then at least down a mountain. On a sunsplashed afternoon in the Colorado high country, 712 days after the accident, he did. The day began with a trip to Vail, where Pearce hooked up with snowboarding mogul Jake Burton and the close-knit group of pro snowboarders who call themselves the "Frends" — — because there is no `I' in friendship. After a few mellow trips on that mountain, Pearce came to Breckenridge to ride with other friends, along with the public, a few hundred of whom cheered when he walked out of the lunchroom and toward the lift, ready to ride again. "I didn't know if anyone was going to show up today," Pearce said. "When I walked out there and there were all these people there to support me and have my back the way they have for the last two years, it brings this feeling. It's a hard feeling to explain." Instead of sporting the old "I Ride For Kevin" stickers that dotted every mountainside after the accident, those on the slopes with him on this day wore stickers and T-shirts with a new message: "Ride With Kevin." The return to the snow wasn't without the most minor of falls, a very small tipping that came courtesy of a rider who bumped him on the hill. No damage done, though. Only smiles at the bottom, where two years of hard, emotional work — filled with hundreds of tiny steps forward and a fair share of tiny steps back, as well — culminated in a day that was never guaranteed. "The doctors said to me, `Don't take his hope away,'" said Pearce's mother, Pia. "And that's the message. It's about doing it, but doing it safely. It's about him making good choices. It's about him being a role model and a mentor for all those . . . athletes who get concussions. To be smart about it. Enjoy life. Have fun. But when he needs to make a hard choice and not do something, as his life goes on, we need to see. Can he stop himself when he wants to take that jump?" Indeed, the future holds many more questions for Pearce, who, to those who don't know him, seems as healthy and happy as any 20something on the mountain. Even he concedes everything is not all perfect. "I don't think anyone in this room except my mom and my brother have any idea what's really going on with me right now," Pearce said, a few hours after the ride. "There's so much more than what you see." But on this day, it wasn't so much about the road ahead as the celebration at hand. Out on the mountain in a bright blue jacket, Pearce was the star, even with dozens of world-class riders practicing nearby for the Dew Tour event that will take place on the same mountain later this week. Pearce will be on hand for that, though he knows joining those guys at the top is not in his future. "Jumps and halfpipes and rails and that stuff aren't important to me anymore," he said. "What's important to me is to be able to get up there and be happy with what I'm doing. Riding powder. Riding with all my friends. There are so many things you can do up on the mountain that don't involve competition. That stuff, that's the stuff I'm looking forward to the most."

[1] Each Registered Article is appended to the plaintiff's amended complaint. They include stories on a diverse set of subjects, as the following examples illustrate: exhibits F (Sri Lankan fruit traders); G (Casino jobs in Ohio); H (anti-austerity protests in Portugal); I, O, U (life and death of former Alaska Senator Ted Stevens); J (anti-doping rules for pentathlon); K (Mississippi Blues Trail marker for deceased singer); L (parliamentary vote in Egypt), M ("Senate upset erases Alaska seniority"); N (secret CIA prison in Romania); P (snowboarder Kevin Pearce); Q (one-year anniversary of border agent's death); R & X (WikiLeaks suspect); S (security guard's ear cut off); T (Congressman cleared in DOJ probe); V (case against VECO CEO); W (late Christmas celebrations); Y ($5B deal between Northeast Utilities & NStar); and Z (fact check of Romney's Solyndra claim). The Appendix gives three examples of the Registered Articles chosen for their differences in length and shows an excerpt copied and distributed by Meltwater from these three examples.

[2] Meltwater purports to dispute that the excerpts that Meltwater distributed from the Registered Articles can be found verbatim in the Registered Articles. While it is undisputed that Meltwater's excerpts do not contain the complete article, a comparison of the excerpts with the Registered Article shows that the excerpts were taken word-for-word from the original. There is, therefore, no genuine dispute that the excerpts are taken verbatim from the AP articles. See, e.g. Appendix.

[3] If a responsive article was published on more than one website, the News Report will often retrieve duplicate results. When a result is a duplicate it is clustered with the other identical results. The most recent publication of the article will be the hit that is initially visible in the News Report. To the left of the headline of the visible result is a plus sign. Clicking the plus sign permits the subscriber to see the duplicate results.

[4] Meltwater does not retain ad hoc search results as part of its ordinary business practices. Therefore, there is no evidence in the record indicating whether any excerpts from the thirty-three Registered Articles were provided to Meltwater subscribers in response to ad hoc searches.

[5] For twenty-six of the Registered Articles, Meltwater's investigation in response to AP's discovery requests uncovered no clicks. For these articles, regardless of the number of times a hyperlink was presented to a customer, the click-through rate is 0%. The click-through data for the remaining seven articles is as follows: (1)"AP Exclusive: Inside Romania's secret CIA prison" was provided to Meltwater subscribers 134 times, and the accompanying links were clicked on two occasions, resulting in a 1.5% click-through rate; (2) "When the most wonderful day of the year comes late": 3,081 links, 1 click, 0.03% click-through rate; (3) "Wikileaks suspect seen as hero, traitor": 1,668 links, 1 click, 0.06% click-through rate; (4) "Northeast Utilities, NStar close $5B deal": 2,917 links, 1 click, 0.03% click-through rate; (5) "Apple lent weight to dividend comeback in 1Q": 1,552 links, 1 click, 0.06%; (6) "7 accused of $375M Medicare, Medicaid fraud": 1,313 links, 12 clicks, 0.91% click-through rate; (7) "Things are looking up for state budgets": 2,361 links, 3 clicks, 0.13% click-through rate.

[6] AP made repeated requests during the discovery period for additional data on Meltwater's click-through rates. Meltwater indicated that it was not surprised by a click-through rate of.05% and refused to provide additional data. It took the position that it would be burdensome to obtain more click-through rate data since it does not keep such data in the normal course of its business. Its Technical Manager of SaaS Operations opined that it might take twenty-four to thirty-six hours to run the necessary queries against its database and that it might also be prudent to copy the data first onto a separate set of servers so that the queries would not interfere with the performance of Meltwater's system.

[7] Meltwater has also moved for judgment on the pleadings with respect to AP's claims of "hot news" misappropriation and removal or alteration of copyright management information. AP has in turn moved for judgment on the pleadings as to Meltwater's counterclaims for libel, tortious interference, and declaratory judgment of safe harbor under the Digital Millennium Copyright Act, 17 U.S.C. § 512(c). Those motions are not addressed in this Opinion.

[8] Where the copyrighted work constitutes a greater percentage of the secondary work, the latter work is more likely to be non-transformative. This inquiry is distinct from the analysis in the third factor, part of which considers what portion or percentage of the copyrighted work was used in the second work.

[9] Meltwater has entered into very few licenses to obtain content.

[10] Relying on the publicly available filings in this case, the CCIA pointedly does not take a position on the ultimate question of whether Meltwater's copying of expressive content created by AP is a fair use. It simply asks the Court to take into account the effect that any ruling may have on the operation of "legitimate" online services. That the Court has done.

[11] While Meltwater asserts that its U.S. subscribers clicked-through to the underlying story millions of times during just the first six months of 2012, it has not placed that figure in context by disclosing the rate of click-throughs that this number represents. Moreover, it rebuffed AP's repeated requests for data on click-through rates and as a result cannot fairly rely on this raw number.

[12] In litigation in Great Britain, the click-through rate was calculated during litigation over licensing fees to be paid for services rendered by media monitoring companies. During the litigation, a Meltwater affiliate agreed to pay a web database license and lost its argument that it was unnecessary to have a license as wellfor end users of its service.

[13] Amici Curiae New York Times, et al., has referred to an article summarizing a 2010 report that found the click-though rate for Google News was 56%, a rate that the author of the article believed was probably an understatement. See http://techcrunch.com/2010/01/19/outsell-google-news/.

[14] In its Rule 56(d) motion, Meltwater has not suggested that it needs further discovery regarding click-through rates from third parties before these cross-motions for summary judgment may be decided. Quite the contrary, in its own summary judgment motion, Meltwater takes the position that it is entitled to judgment on its fair use defense based on the record submitted.

[15] While not all of this content is expressive or protected by copyright law, Meltwater has not disputed that some portion of it is.

[16] The sample Google News Alert excerpts provided with this motion are on average roughly 207 characters long (not including white spaces).

[17] In Nihon, the court found that the average abstract used two-thirds of the protectable material, using the same structure and organization of facts. 166 F.3d at 71.

[18] Meltwater quotes the following two ledes: "When Emily Russell's two young sons wake up on Christmas morning, they'll find that Santa left them a note instead of the videogames they requested;" and "To much of the nation, Ted Stevens was the crotchety senator who famously referred to the Internet as `a series of tubes' and fought to build the `Bridge to Nowhere.'"

[19] Meltwater insists that the parties had no contact in 2009, 2010, or 2011, while AP contends there was "a casual" exchange between the parties in January 2011.

[20] Meltwater makes this argument with respect to AP licensees alone, but Meltwater's argument would seemingly apply with equal force to AP's own websites. Applying Meltwater's reasoning, AP itself would have to adopt a robots.txt protocol to limit the access of web crawlers to its own websites or be deemed to have granted them an implied license.

[21] While the robots.txt protocol could work precisely the opposite way, that is, to indicate that every web crawler is permitted access except for those for whom permission is denied, it is difficult to envision how a website could effectively manage a program that requires it to keep an accurate list of all crawlers who are roaming the web and for whom permission is being denied. Meltwater has reserved the right, however, to ignore an exclusion list that lists it.

[22] Although Meltwater has not moved for summary judgment on its affirmative defense of an implied license, it has argued that the evidence presented in connection with these summary judgment motions "establishes" its implied license "as a matter of law." Nonetheless, it makes one request pursuant to Rule 56(d) in the event the Court disagrees and believes that AP's motion has merit. Meltwater contends that it needs discovery of AP's internal documents that discuss the "viability" of robots.txt. This argument does not prevent an entry of summary judgment for AP. Meltwater never mentioned the phrase "robots.txt" in any of its document requests of AP or in any application to the Court for additional discovery. It had a full opportunity to take discovery of AP on this issue and every other issue related to this summary judgment motion and may not prevent entry of summary judgment for AP through this belated request. In any event, discovery of AP's internal deliberations regarding the robots.txt protocol would have no impact on the decision reached above.

[23] AP has offered examples of the terms of use found on a number of AP's licensees' websites. Meltwater objects that AP has not demonstrated that these terms of use were present on the licensees' websites during the time period in which Meltwater scraped articles from those websites. It is undisputed, however, that in at least one instance, Meltwater had knowledge of a website's terms of use prohibiting commercial use of the website's content and nonetheless scraped an AP article from that website a month later.

[24] Meltwater objects to the evidence of AP's complaint against Moreover on the ground that it constitutes inadmissible hearsay. The complaint has not been received for the truth of the matters asserted. Instead it has been received as evidence of Meltwater's notice that AP was unlikely to consider Meltwater's actions authorized.

[25] The other two documents, two letters exchanged between AP and the Department of Justice, are about a proposed voluntary registry. A version of that voluntary registry was apparently incorporated into NewsRight and nothing in that correspondence suggests misconduct.

[26] Meltwater contends that the evidence it has gathered raises a triable issue of fact on its copyright misuse defense, but argues in its Rule 56(d) motion that if the Court disagrees with Meltwater that Meltwater should be permitted to take further discovery about AP's relationship with NewsRight since AP only produced documents "sufficient" to show NewsRight's role in licensing AP content and did not respond completely to the document requests posed by Meltwater.

Meltwater made a limited request of AP for documents concerning NewsRight, and that request related to the licensing of the Registered Articles by NewsRight. It is undisputed that the Registered Articles were never licensed by NewsRight. Despite Meltwater's narrow document request, AP searched all of its e-discovery custodians for communications with NewsRight concerning licensing efforts generally and produced such documents. It also searched for hard-copy documents from those same custodians and produced documents sufficient to show NewsRight's role in licensing AP content, among other things. Meltwater examined AP deponents at length about NewsRight. In sum, Meltwater has not shown that it is entitled to further discovery on this issue before summary judgment may be entered for AP.

[27] There is evidence that AP's investigator copied and stored the full text of AP articles using a trial subscription to Meltwater News. There is also evidence that Meltwater customers used excerpts from two of the Registered Articles and distributed them in ten newsletters.

[28] Meltwater also makes an unfounded objection to Curley's description of NewsRight on hearsay grounds.

2.5 Field v. Google, Inc. 2.5 Field v. Google, Inc.

412 F.Supp.2d 1106

United States District Court,
District of Nevada.

Blake A. FIELD, Plaintiff,
v.
GOOGLE INC., Defendant.

And Related Counterclaims.

No. CV–S–04–0413–RCJ–LJL.
Jan. 19, 2006.

Attorneys and Law Firms  

Blake A. Field, Las Vegas, NV, pro se.

David Kramer, Michael B. Levin, William O'Callaghan, Lance Kavanaugh, William O'Callaghan, Wilson, Sonsini, Goodrich & Rosati, Palo Alto, CA, Kelly Evans, Snell & Wilmer, Las Vegas, NV, for Defendant.

FINDINGS OF FACT AND CONCLUSIONS OF LAW & ORDER

JONES, District Judge.

This is an action for copyright infringement brought by plaintiff Blake Field (“Field”) against Google Inc. (“Google”). Field contends that by allowing Internet users to access copies of 51 of his copyrighted works stored by Google in an online repository, Google violated Field's exclusive rights to reproduce copies and distribute copies of those works. On December 19, 2005, the Court heard argument on the parties' cross-motions for summary judgment.

Based upon the papers submitted by the parties and the arguments of counsel, the Court finds that Google is entitled to judgment as a matter of law based on the undisputed facts. For the reasons set forth below, the Court will grant Google's motion for summary judgment: (1) that it has not directly infringed the copyrighted works at issue; (2) that Google held an implied license to reproduce and distribute copies of the copyrighted works at issue; (3) that Field is estopped from asserting a copyright infringement claim against Google with respect to the works at issue in this action; and (4) that Google's use of the works is a fair use under 17 U.S.C. § 107. The Court will further grant a partial summary judgment that Field's claim for damages is precluded by operation of the “system cache” safe harbor of Section 512(b) of the Digital Millennium Copyright Act (“DMCA”). Finally, the Court will deny Field's cross-motion for summary judgment seeking a finding of infringement and seeking to dismiss the Google defenses set forth above.

STATEMENT OF PROCEDURAL HISTORY & UNDISPUTED FACTS

Procedural History

1. On April 6, 2004, Plaintiff Field, an author and an attorney who is a member of the State Bar of Nevada, filed a complaint against Google asserting a single claim for copyright infringement based on Google's alleged copying and distribution of his copyrighted work entitled Good Tea. Field himself had previously published this work on his personal Web site, www.blakeswritings.com.

2. On May 25, 2004, Field filed an Amended Complaint, alleging that Google infringed the copyrights to an additional fifty of Field's works, which likewise had been published on his personal website. Field did not seek actual damages, but instead requested $2,550,000 in statutory damages ($50,000 for each of fifty-one registered copyrighted works) along with injunctive relief.

3. On September 27, 2005, Field filed a motion for summary judgment that Google infringed the copyrighted works at issue and that Google's defenses based on fair use, implied license, estoppel and the Digital Millennium Copyright Act (“DMCA”) should be dismissed as a matter of law. Google filed a motion for summary judgment based on non-infringement, implied license, estoppel and fair use (Docket No. 51).

4. On December 19, 2005, the Court held a hearing on the parties' cross-motions for summary judgment. At the hearing, Google made an oral cross-motion for partial summary judgment in its favor based upon Section 512(b) of the DMCA.

5. After considering the arguments of counsel, the Court granted Google's motion for summary judgment on each of the grounds it set forth, granted Google's oral cross-motion based on the DMCA and denied Field's motion for summary judgment.

Undisputed Facts

Google, the Google Cache, and “Cached” Links.

6. Google maintains one of the world's largest and most popular Internet search engines, accessible, among other places, on the World Wide Web at www.google.com. See Brougher Decl. ¶ 2. Internet search engines like Google's allow Internet users to sift through the massive amount of information available on the Internet to find specific information that is of particular interest to them. See id. ¶ 3; see also Levine Report ¶ 13.[FN1]

7. There are billions of Web pages accessible on the Internet. It would be impossible for Google to locate and index or catalog them manually. See Brougher Decl. ¶¶ 3–4; see also Levine Report ¶¶ 13–14. Accordingly, Google, like other search engines, uses an automated program (called the “Googlebot”) to continuously crawl across the Internet, to locate and analyze available Web pages, and to catalog those Web pages into Google's searchable Web index. See Brougher Decl. ¶¶ 4–5; see also Levine Report ¶ 14.

8. As part of this process, Google makes and analyzes a copy of each Web page that it finds, and stores the HTML code from those pages in a temporary repository called a cache. See Levine Report ¶ 14; Brougher Decl. ¶ 5. Once Google indexes and stores a Web page in the cache, it can include that page, as appropriate, in the search results it displays to users in response to their queries. See Brougher Decl. ¶ 5.

9. When Google displays Web pages in its search results, the first item appearing in each result is the title of a Web page which, if clicked by the user, will take the user to the online location of that page. The title is followed by a short “snippet” from the Web page in smaller font. Following the snippet, Google typically provides the full URL for the page. Then, in the same smaller font, Google often displays another link labeled “Cached.” See Brougher Decl. ¶ 10.[FN2]

10. When clicked, the “Cached” link directs an Internet user to the archival copy of a Web page stored in Google's system cache, rather than to the original Web site for that page. See Brougher Decl. ¶ 8. By clicking on the “Cached” link for a page, a user can view the “snapshot” of that page, as it appeared the last time the site was visited and analyzed by the Googlebot. See id.

11. The page a user retrieves from Google after clicking on a “Cached” link contains a conspicuous disclaimer at the top explaining that it is only a snapshot of the page from Google's cache, not the original page, and that the page from the cache may not be current. See Brougher Decl. ¶¶ 11–12 & Ex. 2 (“Google's cache is the snapshot that we took of the page as we crawled the Web. The page may have changed since that time.”). The disclaimer also includes two separate hyperlinks to the original, current page. See id.

12. Google has provided “Cached” links with its search results since 1998. See Brougher Decl. ¶ 7. Until this action, Google had never before been sued for providing “Cached” links. See Macgillivray Decl. ¶ 3. The “Cached” link, and the consequences that flow when a user clicks on it, is the subject of Field's lawsuit.

The Purposes Served By Google's “Cached” Links

13. Google enables users to access its copy of Web pages through “Cached” links for several reasons.

14. Archival Copies. Google's “Cached” links allow users to view pages that the user cannot, for whatever reason, access directly. A Web page can become inaccessible to Internet users because of transmission problems, because nations or service providers seek to censor certain information, because too many users are trying to access the same page at the same time, or because the page has been removed from its original location. See Levine Report ¶¶ 17–19. In each case, users who request access to the material from the inaccessible site are still able to access an archival copy of the page via the “Cached” link in Google's search results. See Levine Report ¶¶ 17–19; see also Brougher Decl. ¶ 14. Google's users, including those in academia, describe this functionality as highly valuable. See Levine Decl. ¶ 4 & Exs. 2–5.[FN3] This feature also benefits Web site publishers because it allows users to access their sites when the sites are otherwise unavailable and has allowed Web site owners to recover copies of their own sites that might otherwise have been lost due to computer problems. See Levine Report ¶¶ 16–19; see also Levine Decl., Ex. 7 at 2.

15. Web Page Comparisons. Google's archival functionality is also of considerable importance to those who wish to determine how a particular Web page has been altered over time. By examining Google's copy of the page, people can identify subtle but potentially significant differences between the current version of a page, and the page as it existed when last visited by the Googlebot. See Levine Report ¶ 20; see also Brougher Decl. ¶ 15; Levine Decl., Exs. 10, 11.

16. Identification of Search Query Terms. Google's “Cached” links also allow users to immediately determine why a particular page was deemed responsive to their search query, by highlighting the terms from the user's query as they appear on the page. See Levine Report ¶ 17; see also Brougher Decl. ¶ 16. In some cases, if a user clicks on Google's link to an original Web page, he may be unable to determine how the page relates to his inquiry. That is particularly true for text intensive pages where the user's search term may be very difficult to find. See Levine Report ¶ 17; see also Levine Decl., Ex. 13 at 1. In some cases it may be impossible for a user to find the information on a page that is responsive to a given search where a site owner has altered the text on the original page and removed the relevant language. See Levine Report ¶ 17; see also Brougher Decl. ¶ 16. By allowing access to copies of Web pages through “Cached” links, Google enables users to more quickly determine whether and where a user's search query appears, and thus whether the page is germane to their inquiry.

17. Given the breadth of the Internet, it is not possible for Google (or other search engines) to personally contact every Web site owner to determine whether the owner wants the pages in its site listed in search results or accessible through “Cached” links. See Brougher Decl. ¶ 18; see also Levine Report ¶ 25.

18. The Internet industry has developed a set of widely recognized and well-publicized industry standard protocols by which Web site owners can automatically communicate their preferences to search engines such as Google. See Levine Report ¶¶ 25, 29, 35 (listing sources that document these standards); Brougher Decl. ¶¶ 18–21. Google provides instructions for Web site owners to communicate their preferences to Google at http://www.google.com/remove.html. See Levine Report ¶¶ 30, 35; Brougher Decl. ¶¶ 18–21; O'Callaghan Decl. Ex. 5; see also id. Exs. 4, 6.

19. A principal way for Web site owners to communicate with Google's robot is by placing specific instructions in “meta-tags” within the computer code (called HTML) that comprises a given page. When the Googlebot visits a page, it reads through this code. If it encounters meta-tags, it follows the instructions provided. Thus, for example, a site owner can place the following meta-tag within a page to tell Google's robot not to analyze the page or include it in Google's Web index and search results: “<META NAME=‘ROBOTS' CONTENT=‘NOINDEX, NOFOLLOW’>” See Brougher Decl. ¶ 20; see also Levine Report ¶ 33.[FN4]

20. Using meta-tags, a Web site owner can also tell Google's robot that it can include a given page in Google's index, but that it should not provide a “Cached” link to that page in Google's search results. To do so, the Web site owner uses a “no-archive” meta-tag “<META NAME=‘ROBOTS' CONTENT=‘ NOARCHIVE’>” See Brougher Decl. ¶ 21; see also Levine Report ¶ 35. The “no-archive” meta-tag has been a widely recognized industry standard for years. See Levine Report ¶ 35.

21. If a Web site owner includes the “no-archive” meta-tag on a page, then Google does not provide a “Cached” link when it lists that page in its search results. See Brougher Decl. ¶¶ 21–22.[FN5]

22. Web site owners can also communicate with search engines' robots by placing a “robots.txt” file on their Web site. See Brougher Decl. ¶ 19; see also Levine Report ¶ 29. For example, if the Web site owner does not want robots to crawl the owner's Web site, the owner can create a robots.txt file with the following text: “User-agent: * Disallow: /”. See Brougher Decl. ¶ 19; see also Levine Report ¶ 29. The above text tells the robots that they should not crawl the owner's Web site. See Brougher Decl. ¶ 19; see also Levine Report ¶ 29.[FN6] If Google's robot encounters a robots.txt file with the above text, then it will not crawl the Web site, and there will be no entry for that Web page in Google's search results and no cached link. See Brougher Decl. ¶ 19. The Internet industry has widely recognized the robots.txt file as a standard for controlling automated access to Web pages since 1994. See Levine Report ¶ 29.

Plaintiff Blake Field and His Copyright Claim

23. Plaintiff Blake Field has regularly used Google's search engine over the past several years and was familiar with the manner in which it operates. See Field Dep. at 103:15–20.[FN7]

24. Field has long been aware that Google automatically provides “Cached” links for pages that are included in its index and search results unless instructed otherwise. See id. at 74:8–22, 109:22–110:6. Field decided to manufacture a claim for copyright infringement against Google in the hopes of making money from Google's standard practice. See id. at 79:8–15, 141:15–24.

25. Field admits he knew that any Web site owner could instruct Google not to provide a “Cached” link to a given Web page by using the “no-archive” meta-tag (as discussed above). See Field Dep. at 74:8–22, 81:13–17. Field also knew that Google provided a process to allow Web site owners to remove pages from Google's system cache. See id. at 81:18–21, 83:4–11, 84:15–21; O'Callaghan Decl. Ex. 3 at 1–2 (Pl.'s Resp. to Req. for Admis. Nos. 1, 4). With this knowledge, Field set out to get his copyrighted works included in Google's index, and to have Google provide “Cached” links to Web pages containing those works.

26. Over a three-day period in January 2004, Field created the 51 works at issue in this lawsuit. See O'Callaghan Decl. Ex. 2 (Pl.'s Resp. to Interrog. No. 5).

27. Field registered copyrights for each of these works separately on January 16, 2004. See First Am. Compl. ¶ 7. Field then created a Web site at www.blakeswritings.com and published his works on pages where they were accessible, for free, to the world starting in late January 2004. See Field Dep. at 45:2–4, 94:10–19.

28. Field created a robots.txt file for his site and set the permissions within this file to allow all robots to visit and index all of the pages on the site. See Field Dep. at 46:10–16; Levine Report ¶ 31. Field created the robots.txt file because he wanted search engines to visit his site and include the site within their search results. See Field Dep. at 46:2–4, 17–23.

29. Field knew that if he used the “no-archive” meta-tag on the pages of his site, Google would not provide “Cached” links for the pages containing his works. See Field Dep. at 81:13–17; O'Callaghan Decl. Ex. 3 at 2 (Resp. to Req. for Admis. No. 4). Field consciously chose not to use the “no-archive” meta-tag on his Web site. See Field Dep. at 83:25–84:3.

30. As Field expected, the Googlebot visited his site and indexed its pages, making the pages available in Google search results. When the pages containing Field's copyrighted works were displayed in Google's search results, they were automatically displayed with “Cached” links, as Field intended they would be.

31. According to Google's records, an individual or individuals clicked on the “Cached” links for each of the pages containing Field's works, and retrieved copies of each of the those pages from Google's system cache.

32. When Google learned that Field had filed (but not served) his complaint, Google promptly removed the “Cached” links to all of the pages of his site. See MacGillivray Decl. ¶ 2; see also Countercls. ¶ 22; Ans. to Countercls. ¶ 22. Google also wrote to Field explaining that Google had no desire to provide “Cached” links to Field's pages if Field did not want them to appear. See O'Callaghan Decl. Ex. 7.

CONCLUSIONS OF LAW

Legal Standard for Summary Judgment

A court must grant summary judgment if the pleadings and supporting documents, when viewed in the light most favorable to the non-moving party, “show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law.” Fed.R.Civ.P. 56(c). An issue as to a material fact is only “genuine” if the evidence regarding the disputed fact is “such that a reasonable jury could return a verdict for the nonmoving party,” and a dispute is “material” only if it could affect the outcome of the suit under governing law. Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248–49, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986).

Discussion

I. Direct Infringement of the Copyrighted Works

Google has filed a motion for summary judgment that by operating its cache and presenting “Cached” links to works within it, Google does not directly infringe Field's copyrighted works. Field has filed a cross-motion for summary judgment for a finding of direct infringement. The Court grants Google's motion and denies Field's motion.[FN8]

To demonstrate copyright infringement, “the plaintiff must show ownership of the copyright and copying by the defendant.” Kelly v. Arriba Soft Corp., 336 F.3d 811, 817 (9th Cir. 2003); see also 17 U.S.C. § 501. A plaintiff must also show volitional conduct on the part of the defendant in order to support a finding of direct copyright infringement. See Religious Tech. Ctr. v. Netcom On–Line Commc'n Servs., Inc., 907 F. Supp. 1361, 1369–70 (N.D. Cal. 1995) (direct infringement requires a volitional act by defendant; automated copying by machines occasioned by others not sufficient); CoStar Group, Inc. v. LoopNet, Inc., 373 F.3d 544, 555 (4th Cir. 2004) (“Agreeing with the analysis in Netcom, we hold that the automatic copying, storage, and transmission of copyrighted materials, when instigated by others, does not render an ISP strictly liable for copyright infringement under §§ 501 and 106 of the Copyright Act.”).

The parties do not dispute that Field owns the copyrighted works subject to this action. The parties do dispute whether by allowing access to copyrighted works through “Cached” links Google engages in volitional “copying” or “distribution” under the Copyright Act sufficient to establish a prima facie case for copyright infringement.

Field does not allege that Google committed infringement when its “Googlebot,” like an ordinary Internet user, made the initial copies of the Web pages containing his copyrighted works and stores those copies in the Google cache. See Field Dep. at 143:13–144–1; 98:18–25. Instead, Field alleges that Google directly infringed his copyrights when a Google user clicked on a “Cached” link to the Web pages containing Field's copyrighted works and downloaded a copy of those pages from Google's computers. See id.; see also First Am. Compl. ¶¶ 29–32. According to Field, Google itself is creating and distributing copies of his works. But when a user requests a Web page contained in the Google cache by clicking on a “Cached” link, it is the user, not Google, who creates and downloads a copy of the cached Web page. Google is passive in this process. Google's computers respond automatically to the user's request. Without the user's request, the copy would not be created and sent to the user, and the alleged infringement at issue in this case would not occur. The automated, non-volitional conduct by Google in response to a user's request does not constitute direct infringement under the Copyright Act. See, e.g., Religious Tech. Ctr., 907 F. Supp. at 1369–70 (direct infringement requires a volitional act by defendant; automated copying by machines occasioned by others not sufficient); CoStar Group, 373 F.3d at 555; Sega Enters. LTD v. MAPHIA, 948 F.Supp. 923, 931–32 (N.D. Cal. 1996). Summary judgment of non-infringement in Google's favor is thus appropriate.

II. Google's Defenses

Google and Field have filed cross-motions for summary judgment with respect to various defenses Google has asserted to Field's charge of direct copyright infringement. Assuming that by allowing users to access Field's copyrighted works through its “Cached” links Google is engaged in direct copyright infringement, the Court finds that Google has established four defenses to Field's copyright infringement claim.

A. Implied License

A license is a defense to a claim of copyright infringement. See Effects Assocs., Inc. v. Cohen, 908 F.2d 555, 558–59 (9th Cir. 1990). A copyright owner may grant a nonexclusive license expressly or impliedly through conduct. See id. (citing 3 Melville B. Nimmer & David Nimmer, Nimmer On Copyright § 10.03[A] (1989) (hereinafter “Nimmer”)); see also Quinn v. City of Detroit, 23 F. Supp. 2d 741, 749 (E.D. Mich. 1998). An implied license can be found where the copyright holder engages in conduct “from which [the] other [party] may properly infer that the owner consents to his use.” See, e.g., De Forest Radio Tel. & Tel. Co. v. United States, 273 U.S. 236, 241, 47 S.Ct. 366, 71 L.Ed. 625 (1927) (setting forth requirements for an implied license defense to a charge of patent infringement). Consent to use the copyrighted work need not be manifested verbally and may be inferred based on silence where the copyright holder knows of the use and encourages it. See Keane Dealer Servs., Inc. v. Harts, 968 F. Supp. 944, 947 (S.D.N.Y. 1997) (“consent given in the form of mere permission or lack of objection is also equivalent to a nonexclusive license”); Quinn, 23 F. Supp. 2d at 753.

According to the undisputed testimony of Google's Internet expert, Dr. John Levine, Web site publishers typically communicate their permissions to Internet search engines (such as Google) using “meta-tags.” A Web site publisher can instruct a search engine not to cache the publisher's Web site by using a “no-archive” meta-tag. According to Dr. Levine, the “no-archive” meta-tag is a highly publicized and well-known industry standard. Levine Report ¶¶ 33–37. Field concedes he was aware of these industry standard mechanisms, and knew that the presence of a “no archive” meta-tag on the pages of his Web site would have informed Google not to display “Cached” links to his pages. Despite this knowledge, Field chose not to include the no-archive meta-tag on the pages of his site. He did so, knowing that Google would interpret the absence of the meta-tag as permission to allow access to the pages via “Cached” links. Thus, with knowledge of how Google would use the copyrighted works he placed on those pages, and with knowledge that he could prevent such use, Field instead made a conscious decision to permit it. His conduct is reasonably interpreted as the grant of a license to Google for that use. See, e.g., Keane, 968 F.Supp. at 947 (copyright owner's knowledge of defendant's use coupled with owner's silence constituted an implied license); See also Levine Report ¶ 37 (providing the undisputed expert opinion that Google reasonably interpreted absence of meta-tags as permission to present “Cached” links to the pages of Field's site). Accordingly, the Court grants Google's motion that it is entitled to the defense of implied license, and denies Field's cross-motion that the defense is inapplicable.

B. Estoppel

A plaintiff is estopped from asserting a copyright claim “if he has aided the defendant in infringing or otherwise induced it to infringe or has committed covert acts such as holding out ... by silence or inaction.” See Quinn, 23 F.Supp.2d at 753 (internal quotation marks omitted, citing 4 Nimmer § 13.07 (1990)). To prevail on its estoppel defense, Google must prove the following four elements:

1. Field knew of Google's allegedly infringing conduct;

2. Field intended that Google rely upon his conduct or acted so that Google had a right to believe it was so intended;

3. Google was ignorant of the true facts; and

4. Google detrimentally relied on Field's conduct.

See Carson v. Dynegy, Inc., 344 F.3d 446, 453 (5th Cir. 2003) (citing 4 Nimmer § 13.07 (2002)). Here, all four elements have been established as a matter of law.

First, Field knew of Google's allegedly infringing conduct well before any supposed infringement of his works took place. Field concedes that he knew that Google would automatically allow access to his works through “Cached” links when he posted them on the Internet unless he instructed otherwise. Field also knew that if an Internet user clicked on the “Cached” links to his web pages, the user would immediately download a copy of those pages from Google's system cache. Field was aware of steps he could take to ensure that his web site would not be archived and not included in Google's cache. There is no dispute that Field was aware of the conduct that he challenges in this lawsuit.

Second, Field remained silent regarding his unstated desire not to have “Cached” links provided to his Web site, and he intended for Google to rely on this silence. Field could have informed Google not to provide “Cached” links by using a “no archive” meta-tag or by employing certain commands in robots.txt file. Instead, Field chose to remain silent knowing that Google would automatically interpret that silence as permission to display “Cached” links. Field's silence, particularly given his knowledge of the consequences of that silence, satisfies the second estoppel factor.

Third, Google was not aware that Field did not wish to have Google provide “Cached” links to his works. Macgillivray Decl. ¶ 2.

Fourth, Google detrimentally relied on Field's silence. It is undisputed that if Google had known of Field's preference, it would not have presented “Cached” links to Field's pages. See Macgillivray Decl. ¶ 2; see also O'Callaghan Decl. Ex. 7. Google honors copyright holder's requests that it not display “Cached” links to their pages. Brougher Decl. ¶ 18. Google's reliance on Field's silence was to its detriment. Had Field communicated his preferences to Google, the parties would have avoided the present lawsuit entirely. See Hadady Corp. v. Dean Witter Reynolds, Inc., 739 F. Supp. 1392, 1400 (C.D. Cal. 1990) (ensuing litigation establishes prejudice to defendant).

Because the Court finds that all four estoppel factors are present based on the undisputed facts, the Court grants Google's motion for summary judgment on the defense of estoppel and denies Field's cross-motion.

C. Fair Use

“Fair use” of a copyrighted work “is not an infringement of copyright” under the Copyright Act. 17 U.S.C. § 107. The fair use doctrine “creates a limited privilege in those other than the owner of a copyright to use the copyrighted material in a reasonable manner without the owner's consent,” Fisher v. Dees, 794 F.2d 432, 435 (9th Cir. 1986), and “permits courts to avoid rigid application of the copyright statute when, on occasion, it would stifle the very creativity which that law is designed to foster.” Dr. Seuss Enters., L.P. v. Penguin Books USA, Inc., 109 F.3d 1394, 1399 (9th Cir.1997) (internal quotation marks omitted).

In analyzing whether a particular use qualifies as a “fair use,” the Copyright Act directs a Court to analyze at least four factors:

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

(4) the effect of the use upon the potential market for or value of the copyrighted work. 17 U.S.C. § 107.

The Court must “balance these factors in light of the objectives of copyright law, rather than view them as definitive or determinative tests.” See Kelly, 336 F.3d at 818. While no one factor is dispositive, courts traditionally have given the most weight to the first and fourth factors. Compare Campbell v. Acuff–Rose Music, Inc., 510 U.S. 569, 579, 114 S.Ct. 1164, 127 L.Ed.2d 500 (1994) (focusing primarily on first factor and whether use is transformative) and Leibovitz v. Paramount Pictures Corp., 137 F.3d 109, 114–15 (2d Cir. 1998) (affirming summary judgment of fair use for parody based primarily on the first fair use factor) with Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 566, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985) (“[The fourth] factor is undoubtedly the single most important element of fair use.”).

Based on a balancing of the relevant fair use factors, the Court finds that to the extent that Google itself copied or distributed Field's copyrighted works by allowing access to them through “Cached” links, Google engaged in a “fair use” of those copyrighted works.

1. Factor One: Purpose and Character of the Use.

a. The Google System Cache Serves A Different Purpose From That Of Plaintiff's Original Works

According to the United States Supreme Court, the fair use analysis largely turns on one question:

whether the new [use] merely “supersedes the objects” of the original creation ... or instead adds something new, with a further purpose or different character, altering the first with new expression, meaning, or message; it asks, in other words, whether and to what extent the new work is “transformative” ... Although such transformative use is not absolutely necessary for a finding of fair use, ... the goal of copyright, to promote science and the arts, is generally furthered by the creation of transformative works.

See Campbell, 510 U.S. at 579, 114 S.Ct. 1164 (citations omitted). In the seminal case of Kelly v. Arriba Soft Corp., the Ninth Circuit determined that a search engine's use of copyrighted photographs was a transformative fair use based on the fact that the search engine used the photographs in question to “improv[e] access to information on the internet” while the original function of the work in question was artistic. Kelly, 336 F.3d at 819.

Assuming that Field intended his copyrighted works to serve an artistic function to enrich and entertain others as he claims, Google's presentation of “Cached” links to the copyrighted works at issue here does not serve the same functions. For a variety of reasons, the “Cached” links “add[ ] something new” and do not merely supersede the original work.

First, Google's cache functionality enables users to access content when the original page is inaccessible. The Internet is replete with references from academics, researchers, journalists, and site owners praising Google's cache for this reason. In these circumstances, Google's archival copy of a work obviously does not substitute for the original. Instead, Google's “Cached” links allow users to locate and access information that is otherwise inaccessible. See Kelly, 336 F.3d at 820 (finding search engine's use of copyrighted material transformative in part because it “benefit[ted] the public by enhancing information-gathering techniques on the internet”).

Second, providing “Cached” links allows Internet users to detect changes that have been made to a particular Web page over time. See, e.g., Levine Report ¶ 20. Such comparisons can reveal significant differences that have political, educational, legal or other ramifications. Again, by definition, this information location function cannot be served by the original Web page alone. To conduct such a comparison, a user would need to access both Google's archival copy of a Web page and the current form of the Web page on the Internet. See id. ¶ 22.

Third, offering “Cached” links allows users to understand why a page was responsive to their original query. It is often difficult for users to locate their query terms within a given page, and may be impossible where the language of a page has been modified. Because it controls its archival copy, Google can automatically highlight the user's query in the copy that the user then retrieves. See, e.g., Levine Report ¶ 17; Brougher Decl. ¶¶ 12, 16. By affording access to a page within its cache, Google enables users to determine whether and where the relevant language appears, and thus whether the page is truly germane to their inquiry. The objective of enabling users to more quickly find and access the information they are searching for is not served by the original page. See Kelly, 336 F.3d at 820.

Fourth, Google utilizes several design features to make clear that it does not intend a “Cached” link of a page to substitute for a visit to the original page. In its search results, at the top of each listing, Google prominently features a link to the original Web page. By contrast, when “Cached” links are displayed, they are in a smaller font, and in a less conspicuous location. Further, after a user clicks on a “Cached” link, he sees a prominent disclaimer at the top of the page explaining that he is only viewing a snapshot of the page from Google's cache. See Brougher Decl. ¶ 12 (“Google's cache is the snapshot that we took of the page as we crawled the web. The page may have changed since that time.”). The disclaimer also includes two separate links away from the archival copy and to the original, current page. Accordingly, any user seeking to access the original page has more than ample opportunity to do so. There is no evidence in the record that Internet users accessed the pages containing Field's works via Google's “Cached” links in lieu of visiting those pages directly. Cf. Levine Report ¶ 23 (“[P]eople use the Google system cache as a complement to and not a substitute for the original.”)

Fifth, Google ensures that any site owner can disable the cache functionality for any of the pages on its site in a matter of seconds. See, e.g., Brougher Decl. ¶ 21. Thus, site owners, and not Google, control whether “Cached” links will appear for their pages. The fact that the owners of billions of Web pages choose to permit these links to remain is further evidence that they do not view Google's cache as a substitute for their own pages. Because Google serves different and socially important purposes in offering access to copyrighted works through “Cached” links and does not merely supersede the objectives of the original creations, the Court concludes that Google's alleged copying and distribution of Field's Web pages containing copyrighted works was transformative.

b. Google's Status as a Commercial Enterprise Does Not Negate Fair Use

When a use is found to be transformative, the “commercial” nature of the use is of less importance in analyzing the first fair use factor. See Campbell, 510 U.S. at 579, 114 S.Ct. 1164 (“[Transformative] works thus lie at the heart of the fair use doctrine's guarantee of breathing space within the confines of copyright, ... and the more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use.”). Kelly, 336 F.3d at 818 (citation omitted). While Google is a for-profit corporation, there is no evidence Google profited in any way by the use of any of Field's works. Rather, Field's works were among billions of works in Google's database. See, e.g., Levine Report ¶ 13; Brougher Decl. ¶ 3 (noting that there are billions of Web pages in the Google index). Moreover, when a user accesses a page via Google's “Cached” links, Google displays no advertising to the user, and does not otherwise offer a commercial transaction to the user. See Brougher Decl. ¶ 13; see also O'Callaghan Decl. Ex. 8 (screen capture showing that there was no Google advertising in Google's cache copy of Field's Web pages). The fact that Google is a commercial operation is of only minor relevance in the fair use analysis. The transformative purpose of Google's use is considerably more important, and, as in Kelly, means the first factor of the analysis weighs heavily in favor of a fair use finding.

2. Factor Two: The Nature of the Copyrighted Works

The second fair use factor looks to the nature of the plaintiff's work. When dealing with transformative uses, this factor has been described as “not ... terribly significant in the overall fair use balancing” (see Mattel Inc. v. Walking Mountain Prods., 353 F.3d 792, 803 (9th Cir. 2003)) and “not much help” (see Campbell, 510 U.S. at 586, 114 S.Ct. 1164). The Ninth Circuit in Kelly ruled that this factor weighed slightly in favor of the plaintiff where the copyrighted photographs at issue were “creative.” However, the Court also noted that the photographs had been made available to the world for free on the plaintiff's own Web site. See Kelly, 336 F.3d at 820; see also Diamond v. Am–Law Publ'g Corp., 745 F.2d 142 (2d Cir. 1984) (finding fair use for a letter to the editor that was published in a modified form); Salinger v. Random House, Inc., 811 F.2d 90, 95 (2d Cir.1987) (describing Diamond as “applying fair use to a letter to the editor of a newspaper, which, though not previously printed, was obviously intended for dissemination”).

Even assuming Field's copyrighted works are as creative as the works at issue in Kelly, like Kelly, Field published his works on the Internet, thereby making them available to the world for free at his Web site. See First Am. Compl. ¶¶ 8, 10; see also Field Dep. at 94:10–19. Moreover, Field added a “robots.txt” file to his site to ensure that all search engines would include his Web site in their search listings. Field thus sought to make his works available to the widest possible audience for free. Accordingly, assuming the works at issue are creative, as in Kelly, the “nature” of the works weighs only slightly in Field's favor.

3. Factor Three: The Amount and Substantiality of the Use

The third fair use factor looks at the amount of the work used. The Supreme Court has made clear that even copying of entire works should not weigh against a fair use finding where the new use serves a different function from the original, and the original work can be viewed by anyone free of charge:

[W]hen one considers the nature of a televised copyrighted audiovisual work ... and that timeshifting merely enables a viewer to see such a work which he had been invited to witness in its entirety free of charge, the fact that the entire work is reproduced... does not have its ordinary effect of militating against a finding of fair use.

See Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 449–50, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984) (emphasis added; citations omitted) (affirming as a fair use the “timeshifting” of entire television shows). Similarly, the Ninth Circuit has held that “the extent of permissible copying varies with the purpose and character of the use” and that “[i]f the secondary user only copies as much as is necessary for his or her intended use, then this factor will not weigh against him or her.” See Kelly, 336 F.3d at 820–21. The Ninth Circuit in Kelly thus concluded that the search engine's use of entire photographs was of no significance:

This factor neither weighs for nor against either party because, although Arriba did copy each of Kelly's images as a whole, it was reasonable to do so in light of Arriba's use of the images. It was necessary for Arriba to copy the entire image to allow users to recognize the image and decide whether to pursue more information about the image or the originating web site. If Arriba only copied part of the image, it would be more difficult to identify it, thereby reducing the usefulness of the visual search engine.

See 336 F.3d at 821; see also Mattel, 353 F.3d at 803 n. 8 (holding that “entire verbatim reproductions are justifiable where the purpose of the work differs from the original”). Just like the broadcasters in Sony and the photographer in Kelly, Field made his content available to anyone, free of charge. Also like the fair uses in Sony and Kelly, Google's use of entire Web pages in its Cached links serves multiple transformative and socially valuable purposes. These purposes could not be effectively accomplished by using only portions of the Web pages. Without allowing access to the whole of a Web page, the Google Cached link cannot assist Web users (and content owners) by offering access to pages that are otherwise unavailable. Nor could use of less than the whole page assist in the archival or comparative purposes of Google's “Cached” links. Finally, Google's offering of highlighted search terms in cached copies of Web pages would not allow users to understand why a Web page was deemed germane if less than the whole Web page were provided. See Brougher Decl. ¶¶ 14–16; see also Levine Report ¶¶ 15–20. Because Google uses no more of the works than is necessary in allowing access to them through “Cached” links, the third fair use factor is neutral, despite the fact that Google allowed access to the entirety of Field's works. See Sony, 464 U.S. at 448, 104 S.Ct. 774; Kelly, 336 F.3d at 821.

4. Factor Four: The Effect of the Use upon the Potential Market for or Value of the Copyrighted Work

The fourth fair use factor considers the effect of the defendant's use upon the potential market for the plaintiff's work. “[A] use that has no demonstrable effect upon the potential market for, or the value of, the copyrighted work need not be prohibited in order to protect the author's incentive to create.” See Sony, 464 U.S. at 450, 104 S.Ct. 774.

Here there is no evidence of any market for Field's works. Field makes the works available to the public for free in their entirety, and admits that he has never received any compensation from selling or licensing them. See Field Dep. at 132:10–17. There is likewise no evidence that by displaying “Cached” links for pages from Field's site, Google had any impact on any potential market for those works.[FN9]

More generally, there is no evidence before the Court of any market for licensing search engines the right to allow access to Web pages through “Cached” links, or evidence that one is likely to develop. “Cached” links are simply one way that search engines enable end-users to obtain information that site owners make freely available to the world. There is compelling evidence that site owners would not demand payment for this use of their works. Notwithstanding Google's long-standing display of “Cached” links and the well-known industry standard protocols for instructing search engines not to display them, the owners of literally billions of Web pages choose to permit such links to be displayed. See, e.g., Brougher Decl. ¶¶ 18–22. Sophisticated Internet publishers such as those operating Web sites for Disney, Sports Illustrated, America Online, ESPN and Readers' Digest all permit the display of “Cached” links to the pages of their sites though they could easily prevent it. See id. ¶ 26.

Because there is no evidence that Google's “Cached” links had any impact on the potential market for Field's copyrighted works, the fourth fair use factor weighs strongly in favor of a fair use determination. See Kelly, 336 F.3d at 821–22.

5. Additional Factor: Google's Good Faith in Operating Its System Cache Weighs In Favor Of Fair Use

The Copyright Act authorizes courts to consider other factors than the four non-exclusive factors discussed above. See 17 U.S.C. § 107 (noting court is to consider factors including four specifically listed). In particular, the Ninth Circuit has stated that courts may evaluate whether an alleged copyright infringer has acted in good faith as part of a fair use inquiry. See Fisher, 794 F.2d at 436–37 (“Because ‘fair use presupposes “good faith” and “fair dealing,” ’ courts may weigh the ‘propriety of the defendant's conduct’ in the equitable balance of a fair use determination.”) (citation omitted). The fact that Google has acted in good faith in providing “Cached” links to Web pages lends additional support for the Court's fair use finding.

Google does not provide “Cached” links to any page if the owner of that page does not want them to appear. Google honors industry-standard protocols that site owners use to instruct search engines not to provide “Cached” links for the pages of their sites. See, e.g., Brougher Decl. ¶¶ 18–22. Google also provides an explanation on its Web site of how to deploy these industry-standard instructions, and provides an automated mechanism for promptly removing “Cached” links from Google's search results if the links ever appear. See id.; see also O'Callaghan Decl. Ex. 5. Moreover, Google takes steps to ensure that users seeking an original Web page through Google's search engine can easily access it, and that any user viewing a page from Google's cache knows that it is not the original.

Google's good faith is manifest with respect to Field's works in particular. Field did not include any information on the pages of his site to instruct Google not to provide “Cached” links to those pages. Google only learned that Field objected to the “Cached” links by virtue of discovering Field's Complaint in this litigation. At the time, Field had not even served the Complaint. Nevertheless, without being asked, Google promptly removed the “Cached” links to the pages of Field's site. See Macgillivray Decl. ¶ 2.

Field's own conduct stands in marked contrast to Google's good faith. Field took a variety of affirmative steps to get his works included in Google's search results, where he knew they would be displayed with “Cached” links to Google's archival copy and he deliberately ignored the protocols that would have instructed Google not to present “Cached” links.

Comparing Field's conduct with Google's provides further weight to the scales in favor of a finding of fair use. See Campbell, 510 U.S. at 585 n. 18, 114 S.Ct. 1164; Bill Graham Archives LLC v. Dorling Kindersley Ltd., 75 U.S.P.Q.2d 1192, 1199–1200 (S.D.N.Y. May 11, 2005) (granting summary judgment of fair use based in part on defendant's good faith).

In summary, the first fair use factor weighs heavily in Google's favor because its “Cached” links are highly transformative. The second fair use factor weighs only slightly against fair use because Field made his works available in their entirety for free to the widest possible audience. The third fair use factor is neutral, as Google used no more of the copyrighted works than was necessary to serve its transformative purposes. The fourth fair use factor cuts strongly in favor of fair use in the absence of any evidence of an impact on a potential market for Field's copyrighted works. A fifth factor, a comparison of the equities, likewise favors fair use. A balance of all of these factors demonstrates that if Google copies or distributes Field's copyrighted works by allowing access to them through “Cached” links, Google's conduct is fair use of those works as a matter of law.

III. Digital Millennium Copyright Act

In his motion for summary judgment, Field asked the Court to hold that Google is not entitled to the protections of the DMCA, 17 U.S.C. Sections 512(a)-(d), a series of copyright safe harbors for online service providers. Google opposed the motion and at the hearing on the parties' cross-motions for summary judgment, made an oral cross-motion for partial summary judgment in its favor based upon Section 512(b) of the DMCA.

Field's motion for summary judgment with respect to Sections 512(a), (c) and (d) is not properly presented. Field does not discuss these safe harbors or explain why he believes that Google cannot rely upon them. Field's motion thus does not satisfy the basic requirement of Rule 56, that he show that there is “no genuine issue [of] material fact and that [Field] is entitled to judgment as a matter of law.” See Fed.R.Civ.P. 56(c); Nissan Fire & Marine Ins. Co. v. Fritz Cos., 210 F.3d 1099, 1102 (9th Cir. 2000) (“In order to carry its burden of production, the moving party must either produce evidence negating an essential element of the nonmoving party's claim or defense or show that the nonmoving party does not have enough evidence of an essential element to carry its ultimate burden of persuasion at trial.”). Accordingly, Field's motion with respect to these safe harbors is denied.

The safe harbor of Section 512(b) is directed to system caches and states that “[a] service provider shall not be liable for monetary relief ... for infringement of copyright by reason of the intermediate and temporary storage of material on a system or network controlled or operated by or for the service provider” provided certain requirements are met. See 17 U.S.C. § 512(b)(1). Field contends that three elements of the safe harbor are missing.

First, Field contends that in operating its cache, Google does not make “intermediate and temporary storage of that material” as required by Section 512(b)(1). Field is incorrect. See Ellison v. Robertson, 357 F.3d 1072, 1081 (9th Cir. 2004) (AOL's storage of online postings for 14 days was “intermediate” and “transient” for purposes of Section 512(a)). In Ellison, a case involving the Section 512(a) safe harbor, plaintiff sought to hold America Online (“AOL”) liable for copyright infringement for hosting and allowing end users to access copyrighted materials that had been posted by third parties to a system of online bulletin boards known as the Usenet. Id. at 1075–76. AOL stored and allowed users to access these Usenet postings for approximately 14 days. Id. Citing the DMCA's legislative history, the Ninth Circuit found that AOL's storage of the materials was both “intermediate” and “transient” as required by Section 512(a). Id. at 1081. Like AOL's repository of Usenet postings in Ellison which operated between the individuals posting information and the users requesting it, Google's cache is a repository of material that operates between the individual posting the information, and the end-user requesting it. Further, the copy of Web pages that Google stores in its cache is present for approximately 14 to 20 days. See Brougher Dep. at 68:19–69:2 (Google caches information for approximately 14 to 20 days). The Court finds that Google's cache for approximately 14 to 20 days—like the 14 days deemed “transient storage” in Ellison—is “temporary” under Section 512(b) of the DMCA. The Court thus concludes that Google makes “intermediate and temporary storage” of the material stored in its cache, within the meaning of the DMCA. See, e.g., Gustafson v. Alloyd Co., 513 U.S. 561, 570, 115 S.Ct. 1061, 131 L.Ed.2d 1 (1995) (“identical words used in different parts of the same act are intended to have the same meaning”).

Field next claims that Google's cache does not satisfy the requirements of Section 512(b)(1)(B). Section 512(b)(1)(B) requires that the material in question be transmitted from the person who makes it available online, here Field, to a person other than himself, at the direction of the other person. Field transmitted the material in question, the pages of his Web site, to Google's Googlebot at Google's request. Google is a person other than Field. Thus, Google's cache meets the requirement of Section 512(b)(1)(B).

Finally, Field contends that Google's cache does not fully satisfy the requirements of Section 512(b)(1)(C). Section 512(b)(1)(C) requires that Google's storage of Web pages be carried out through “an automat[ed] technical process” and be “for the purpose of making the material available to users ... who ... request access to the material from [the originating site].” There is no dispute that Google's storage is carried out through an automated technical process. See First Am. Compl. ¶ 19 (Field stating that “[t]hird-party web page content is added to the Google cache by an automated software process.”); see also Brougher Decl. ¶¶ 4–5 (discussing automated technical process). There is likewise no dispute that one of Google's principal purposes in including Web pages in its cache is to enable subsequent users to access those pages if they are unsuccessful in requesting the materials from the originating site for whatever reason. See Brougher Decl. ¶ 14; Levine Report ¶¶ 18–19. Google's cache thus meets the requirements of Section 512(b)(1)(C).

Because Google has established the presence of the disputed elements of Section 512(b) as a matter of law, Field's motion for summary judgment that Google is ineligible for the Section 512(b) safe harbor is denied. There is no dispute between the parties with respect to any of the other requirements of Section 512(b). Accordingly, Google's motion for partial summary judgment that it qualifies for the Section 512(b) safe harbor is granted.

ORDER

For all the foregoing reasons, the Court hereby:

(1) GRANTS Google's Motion for Summary Judgment of non-infringement and DENIES Field's Motion for Summary Judgment of Infringement;

(2) GRANTS Google's Motion for Summary Judgment based on an implied license and DENIES Field's Motion for Summary Judgment that the license defense does not apply;

(3) GRANTS Google's Motion for Summary Judgment based on estoppel and DENIES Field's Motion for Summary Judgment that the estoppel defense does not apply;

(4) GRANTS Google's Motion for Summary Judgment based on fair use and DENIES Field's Motion for Summary Judgment that the fair use doctrine does not apply;

(5) GRANTS Google's Motion for Partial Summary Judgment based on Section 512(b) of the DMCA and DENIES Field's Motion for Summary Judgment that the DMCA safe harbors do not apply.

SO ORDERED.

Footnotes

[FN1] The Levine Report is attached to the Levine Declaration as Exhibit 1.

[FN2] The three most popular search engines—Google, Yahoo!, and MSN—all display “Cached” links with their search results, and operate them identically. See Brougher Decl. ¶ 17; Google, Yahoo!, and MSN collectively account for more than 80% of all Web searches. See Brougher Decl. ¶ 17.

[FN3] For example, the State of Indiana instructs its judges about this capability. See Levine Decl., Ex. 5 at 2 (article entitled “Maximizing Web Searches With Google,” available at http://www.in.gov/judiciary/center/ed/library/judcon–03/google.pdf, explains that “Clicking ‘Cached’ will simply give you an older version of the result page, which represents what the page looked like the last time the Google engine indexed the page. This service exists in case a website's server becomes unavailable.”).

[FN4] A Web site owner can add the “no-archive” meta-tag to a Web page in a matter of seconds. See Brougher Decl. ¶ 21. Web site owners can also use a Google-specific “no-archive” meta-tag to tell Google that it cannot provide “Cached” links, while allowing other search engines (e.g., Yahoo! and MSN) to do so. See id.; see also Levine Report ¶ 35.

[FN5] A Web site owner can also request that Google not display “Cached” links for given pages by using Google's automatic URL removal procedure. See Brougher Decl. ¶ 23. Google's Web site provides step-by-step instructions on using this procedure. See id.; see also O'Callaghan Decl. Ex. 5 (attaching a printout of http://www.google.com/remove.html). Further, Web site owners can contact Google directly to make such a request. Google honors such requests. See Brougher Decl. ¶ 24.

[FN6] By contrast, a Web site owner can invite robots to visit a site without restriction by including a Robots.txt file that reads: “User-agent: * Disallow: Levine Report at ¶¶ 31–32”.

[FN7] Excerpts from the Field Deposition are attached to the O'Callaghan Declaration as Exhibit 1.

[FN8] Field did not contend that Google was liable for indirect infringement (contributory or vicarious liability).

[FN9] Field contends that Google's caching functionality harmed the market for his works by depriving him of revenue he could have obtained by licensing Google the right to present “Cached” links for the pages containing his works. Under this view, the market for a copyrighted work is always harmed by the fair use of the work because it deprives the copyright holder of the revenue it could have obtained by licensing that very use. The Supreme Court has explained that the fourth fair use factor is not concerned with such syllogisms. Instead, it only considers the impact on markets “that creators of original works would in general develop or license others to develop.” See Campbell, 510 U.S. at 592, 114 S.Ct. 1164; cf. Religious Tech. Ctr., 907 F. Supp. at 1378 n. 25 (suggesting fair use where unlikely to be market for licensing the temporary copying of digital works). Where there is no likely market for the challenged use of the plaintiff's works, the fourth fair use factor favors the defendant. See Mattel, 353 F.3d at 806.

2.6 EF Cultural Travel BV v. Explorica, Inc. 2.6 EF Cultural Travel BV v. Explorica, Inc.

274 F.3d 577 (2001)

EF CULTURAL TRAVEL BV, EF Cultural Tours BV, EF Institute for Cultural Exchange, Inc., EF Cultural Services BV, and Go Ahead Vacations, Inc., Plaintiffs, Appellees,
v.
EXPLORICA, INC., Olle Olsson, Peter Nilsson, Philip Gormley, Alexandra Bernadotte, Anders Eriksson, Deborah Johnson, and Stefan Nilsson, Defendants, Appellants.

No. 01-2000.

United States Court of Appeals, First Circuit.

Heard October 1, 2001.
Decided December 17, 2001.

[578] Anthony M. Feeherry, with whom James W. Nagle, R. David Hosp, and Goodwin Proctor LLP were on brief, for appellants.

Nathaniel H. Akerman, with whom Seyfarth Shaw was on brief, for appellees.

Before BOUDIN, Chief Judge, COFFIN, Senior Circuit Judge, and LYNCH, Circuit Judge.

COFFIN, Senior Circuit Judge.

Appellant Explorica, Inc. ("Explorica") and several of its employees challenge a preliminary injunction issued against them for alleged violations of the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030.[1] We affirm the district court's [579] conclusion that appellees will likely succeed on the merits of their CFAA claim, but rest on a narrower basis than the court below.

I. Background

Explorica was formed in 2000 to compete in the field of global tours for high school students. Several of Explorica's employees formerly were employed by appellee EF, which has been in business for more than thirty-five years. EF and its partners and subsidiaries make up the world's largest private student travel organization.

Shortly after the individual defendants left EF in the beginning of 2000, Explorica began competing in the teenage tour market. The company's vice president (and former vice president of information strategy at EF), Philip Gormley, envisioned that Explorica could gain a substantial advantage over all other student tour companies, and especially EF, by undercutting EF's already competitive prices on student tours. Gormley considered several ways to obtain and utilize EF's prices: by manually keying in the information from EF's brochures and other printed materials; by using a scanner to record that same information; or, by manually searching for each tour offered through EF's website. Ultimately, however, Gormley engaged Zefer, Explorica's Internet consultant, to design a computer program called a "scraper" to glean all of the necessary information from EF's website. Zefer designed the program in three days.

The scraper has been likened to a "robot," a tool that is extensively used on the Internet. Robots are used to gather information for countless purposes, ranging from compiling results for search engines such as Yahoo! to filtering for inappropriate content. The widespread deployment of robots enables global Internet users to find comprehensive information quickly and almost effortlessly.

Like a robot, the scraper sought information through the Internet. Unlike other robots, however, the scraper focused solely on EF's website, using information that other robots would not have. Specifically, Zefer utilized tour codes whose significance was not readily understandable to the public. With the tour codes, the scraper accessed EF's website repeatedly and easily obtained pricing information for those specific tours. The scraper sent more than 30,000 inquiries to EF's website and recorded the pricing information into a spreadsheet.[2]

[580] Zefer ran the scraper program twice, first to retrieve the 2000 tour prices and then the 2001 prices. All told, the scraper downloaded 60,000 lines of data, the equivalent of eight telephone directories of information.[3] Once Zefer "scraped" all of the prices, it sent a spreadsheet containing EF's pricing information to Explorica, which then systematically undercut EF's prices.[4] Explorica thereafter printed its own brochures and began competing in EF's tour market.

The development and use of the scraper came to light about a year and a half later during state-court litigation regarding appellant Olsson's departure from appellee EFICE. EF then filed this action, alleging violations of the CFAA; the Copyright Act of 1976, 17 U.S.C. § 101; the Racketeer Influenced and Corrupt Organizations Act, 18 U.S.C. § 1961; and various related state laws. It sought a preliminary injunction barring Explorica and Zefer from using the scraper program and demanded the return of all materials generated through use of the scraper.

On May 30, 2001, the district court granted a preliminary injunction against Explorica based on the CFAA, which criminally and civilly prohibits certain access to computers. See 18 U.S.C. § 1030(a)(4). The court found that EF would likely prove that Explorica violated the CFAA when it used EF's website in a manner outside the "reasonable expectations" of both EF and its ordinary users. The court also concluded that EF could show that it suffered a loss, as required by the statute, consisting of reduced business, harm to its goodwill, and the cost of diagnostic measures it incurred to evaluate possible harm to EF's systems, although it could not show that Explorica's actions physically damaged its computers. In a supplemental opinion[5] the district court further articulated its "reasonable expectations" standard and explained that copyright, contractual and technical restraints sufficiently notified Explorica that its use of a scraper would be unauthorized and thus would violate the CFAA.

The district court first relied on EF's use of a copyright symbol on one of the pages of its website and a link directing users with questions to contact the company,[6] finding that "such a clear statement should have dispelled any notion a reasonable person may have had that the `presumption of open access' applied to information on EF's website." The court next found that the manner by which Explorica accessed EF's website likely violated a confidentiality agreement between appellant Gormley and EF, because Gormley provided to Zefer technical instructions concerning the creation of the scraper. Finally, the district court noted without elaboration that the scraper bypassed technical restrictions embedded in the [581] website to acquire the information. The court therefore let stand its earlier decision granting the preliminary injunction. Appellants contend that the district court erred in taking too narrow a view of what is authorized under the CFAA and similarly mistook the reach of the confidentiality agreement. Appellants also argue that the district court erred in finding that appellees suffered a "loss," as defined by the CFAA, and that the preliminary injunction violates the First Amendment.

II. Standard of Review

A district court may issue a preliminary injunction only upon considering "(1) the likelihood of success on the merits; (2) the potential for irreparable harm if the injunction is denied; (3) the balance of relevant impositions ...; and (4) the effect (if any) of the court's ruling on the public interest." Ross-Simons of Warwick, Inc. v. Baccarat, Inc., 102 F.3d 12, 15 (1st Cir.1996). Appellants challenge only the district court's finding that appellees are likely to succeed on the merits, and we thus confine our review to that factor. As in any other appeal, we review the merits of a preliminary injunction depending on the issue under consideration. "Generally speaking, pure issues of law (e.g., the construction of a statute) are reviewed de novo, findings of fact for clear error, and `judgment calls' with considerable deference...." Langlois v. Abington Hous. Auth., 207 F.3d 43, 47 (1st Cir.2000). Each of these is applicable here, where the district court's judgment relied on both its analysis of the CFAA and its assessment of the voluminous documentary evidence.

III. The Computer Fraud and Abuse Act

Although appellees alleged violations of three provisions of the CFAA, the district court found that they were likely to succeed only under section 1030(a)(4).[7] That section provides

[Whoever] knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value ... shall be punished.

18 U.S.C. § 1030(a)(4).[8]

Appellees allege that the appellants knowingly and with intent to defraud accessed the server hosting EF's website more than 30,000 times to obtain proprietary pricing and tour information, and confidential information about appellees' technical abilities. At the heart of the parties' dispute is whether appellants' actions either were "without authorization" or "exceed[ed] authorized access" as defined by the CFAA.[9] We conclude that because of the broad confidentiality agreement appellants' actions "exceed[ed] authorized access," and so we do not reach the more general arguments made about statutory [582] meaning, including whether use of a scraper alone renders access unauthorized.[10]

A. "Exceeds authorized access"

Congress defined "exceeds authorized access," as accessing "a computer with authorization and [using] such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter." 18 U.S.C. § 1030(e)(6). EF is likely to prove such excessive access based on the confidentiality agreement between Gormley and EF. Pertinently, that agreement provides:

Employee agrees to maintain in strict confidence and not to disclose to any third party, either orally or in writing, any Confidential or Proprietary information ... and never to at any time (i) directly or indirectly publish, disseminate or otherwise disclose, deliver or make available to anybody any Confidential or Proprietary Information or (ii) use such Confidential or [P]roprietary Information for Employee's own benefit or for the benefit of any other person or business entity other than EF.

* * *

As used in this Agreement, the term "Confidential or Proprietary Information" means (a) any trade or business secrets or confidential information of EF, whether or not reduced to writing ...; (b) any technical, business, or financial information, the use or disclosure of which might reasonably be construed to be contrary to the interests of EF.

...

The record contains at least two communications from Gormley to Zefer seeming to rely on information about EF to which he was privy only because of his employment there. First, in an email to Zefer employee Joseph Alt exploring the use of a scraper, Gormley wrote: "[m]ight one of the team be able to write a program to automatically extract prices ... ? I could work with him/her on the specification." Gormley also sent the following email to Zefer employee John Hawley:

Here is a link to the page where you can grab EF's prices. There are two important drop down menus on the right.... With the lowest one you select one of about 150 tours. * * * You then select your origin gateway from a list of about 100 domestic gateways (middle drop down menu). When you select your origin gateway a page with a couple of tables comes up. One table has 1999-2000 prices and the other has 2000-2001 prices. * * * On a high speed connection it is possible to move quickly from one price table to the next by hitting backspace and then the down arrow.

This documentary evidence points to Gormley's heavy involvement in the conception of the scraper program. Furthermore, the voluminous spreadsheet containing all of the scraped information includes the tour codes, which EF claims are proprietary [583] information. Each page of the spreadsheet produced by Zefer includes the tour and gateway codes, the date of travel, and the price for the tour. An uninformed reader would regard the tour codes as nothing but gibberish.[11] Although the codes can be correlated to the actual tours and destination points, the codes standing alone need to be "translated" to be meaningful.

Explorica argues that none of the information Gormley provided Zefer was confidential and that the confidentiality agreement therefore is irrelevant.[12] The case on which they rely, Lanier Professional Services, Inc. v. Ricci, 192 F.3d 1, 5 (1st Cir.1999), focused almost exclusively on an employee's non-compete agreement. The opinion mentioned in passing that there was no actionable misuse of confidential information because the only evidence that the employee had taken protected information was a "practically worthless" affidavit from the employee's successor. Id. at 5.

Here, on the other hand, there is ample evidence that Gormley provided Explorica proprietary information about the structure of the website and the tour codes. To be sure, gathering manually the various codes through repeated searching and deciphering of the URLs[13] theoretically may be possible. Practically speaking, however, if proven, Explorica's wholesale use of EF's travel codes to facilitate gathering EF's prices from its website reeks of use — and, indeed, abuse — of proprietary information that goes beyond any authorized use of EF's website.[14]

Gormley voluntarily entered a broad confidentiality agreement prohibiting his disclosure of any information "which might reasonably be construed to be contrary to the interests of EF."[15] Appellants would face an uphill battle trying to argue that it was not against EF's interests for appellants to use the tour codes to mine EF's pricing data. See Anthony's Pier Four, Inc. v. HBC Assoc., 411 Mass. 451, 471, 583 N.E.2d 806, 820 (1991) (imposing a duty of good faith and fair dealing in all contracts under Massachusetts law). If EF's allegations are proven, it will likely prove that whatever authorization Explorica had to navigate around EF's site (even in a competitive vein), it exceeded that authorization by providing proprietary information and know-how to Zefer to create the scraper.[16] Accordingly, the district [584] court's finding that Explorica likely violated the CFAA was not clearly erroneous.

B. Damage or Loss under section 1030(g)

Appellants also challenge the district court's finding that the appellees would likely prove they met the CFAA's "damage or loss" requirements. Under the CFAA, EF may maintain a private cause of action if it suffered "damage or loss." 18 U.S.C. § 1030(g). "Damage" is defined as "any impairment to the integrity or availability of data, a program, a system, or information that ... causes loss aggregating at least $5,000 in value during any 1-year period to one or more individuals...." 18 U.S.C. § 1030(e)(8). "Loss" is not defined.

The district court held that although EF could not show any "damage" it would likely be able to show "loss" under the statute. It reasoned that a general understanding of the word "loss" would fairly encompass a loss of business, goodwill, and the cost of diagnostic measures that EF took after it learned of Explorica's access to its website.[17] Appellants respond that such diagnostic measures cannot be included in the $5,000 threshold because their actions neither caused any physical damage nor placed any stress on EF's website.

Few courts have endeavored to resolve the contours of damage and loss under the CFAA. See, e.g., Shaw v. Toshiba Am. Info. Sys., 91 F.Supp.2d 926 (E.D.Tex. 1999) (noting the paucity of decisions construing the Act). Two district courts that have addressed the issue have found that expenses such as those borne by EF do fall under the statute. In Shurgard Storage Centers v. Safeguard Self Storage, Inc., 119 F.Supp.2d 1121 (W.D.Wa.2000), the district court found that the need to assess whether a defendant's actions compromised the plaintiff's computers was compensable under the CFAA because the computer's integrity was called into question. The court based its finding on the legislative history of the 1996 amendments to the CFAA:

The 1994 Amendment required both "damage" and "loss," but it is not always clear what constitutes "damage." For example, intruders often alter existing log-on programs so that user passwords are copied to a file which the hackers can retrieve later. After retrieving the newly created password file, the intruder restores the altered log-on file to its original condition. Arguably, in such a situation, neither the computer nor its information is damaged. Nonetheless, this conduct allows the intruder to accumulate valid user passwords to the system, requires all system users to change their passwords, and requires the system administrator to devote resources to re-securing the system. Thus, although there is arguably no "damage," the victim does suffer "loss." If the loss to the victim meets the required monetary threshold, the conduct should be criminal, and the victim should be entitled to relief. [585] S.Rep. No. 104-357, at 11 (1996) (quoted in Shurgard, 119 F.Supp.2d at 1126). Another district court held that this legislative history makes "clear that Congress intended the term `loss' to target remedial expenses borne by victims that could not properly be considered direct damage caused by a computer hacker." In re DoubleClick Inc. Privacy Litig., 154 F.Supp.2d 497, 521 (S.D.N.Y.2001).

We agree with this construction of the CFAA. In the absence of a statutory definition for "loss," we apply the well-known rule of assigning undefined words their normal, everyday meaning. See Inmates of Suffolk Cty. Jail v. Rouse, 129 F.3d 649, 653-54 (1st Cir.1997). The word "loss" means "detriment, disadvantage, or deprivation from failure to keep, have or get." The Random House Dictionary of the English Language 1137 (2d ed.1983). Appellees unquestionably suffered a detriment and a disadvantage by having to expend substantial sums to assess the extent, if any, of the physical damage to their website caused by appellants' intrusion. That the physical components were not damaged is fortunate, but it does not lessen the loss represented by consultant fees. Congress's use of the disjunctive, "damage or loss," confirms that it anticipated recovery in cases involving other than purely physical damage. But see In re Intuit Privacy Litig., 138 F.Supp.2d 1272, 1281 (C.D.Ca.2001) (loss means "irreparable damage" and any other interpretation "would render the term `damage' superfluous"); Register.com, Inc. v. Verio, Inc., 126 F.Supp.2d 238, 252 n. 12 (S.D.N.Y. 2000) (lost business or goodwill could not constitute loss absent the impairment or unavailability of data or systems). To parse the words in any other way would not only impair Congress's intended scope of the Act, but would also serve to reward sophisticated intruders. As we move into an increasingly electronic world, the instances of physical damage will likely be fewer while the value to the victim of what has been stolen and the victim's costs in shoring up its security features undoubtedly will loom ever-larger. If we were to restrict the statute as appellants urge, we would flout Congress's intent by effectively permitting the CFAA to languish in the twentieth century, as violators of the Act move into the twenty-first century and beyond.

We do not hold, however, that any loss is compensable. The CFAA provides recovery for "damage" only if it results in a loss of at least $5,000. We agree with the court in In re DoubleClick Inc. Privacy Litigation, 154 F.Supp.2d 497 (S.D.N.Y. 2001), that Congress could not have intended other types of loss to support recovery unless that threshold were met. Indeed, the Senate Report explicitly states that "if the loss to the victim meets the required monetary threshold," the victim is entitled to relief under the CFAA. S. Rep. 104-357, at 11. We therefore conclude that expenses of at least $5,000 resulting from a party's intrusion are "losses" for purposes of the "damage or loss" requirement of the CFAA.

IV. Conclusion

For the foregoing reasons, we agree with the district court that appellees will likely succeed on the merits of their CFAA claim under 18 U.S.C. § 1030(a)(4). Accordingly, the preliminary injunction was properly ordered.

Affirmed.

[1] The individual defendants-appellants are Olle Olsson, Peter Nilsson, Philip Gormley, Alexandra Bernadotte, Anders Erikkson, Deborah Johnson, and Stefan Nilsson. They are all former employees of plaintiffs-appellees, EF Cultural Tours BV, EF Institute for Cultural Exchange, Inc. ("EFICE"), EF Cultural Services BV, and Go Ahead Vacations, Inc. The appellees are collectively referred to as "EF."

The injunction was also issued against a second company, Zefer Corporation ("Zefer"), which also appealed. After briefing was completed, Zefer filed for bankruptcy. We granted a joint motion to sever Zefer's appeal, which has been stayed.

[2] John Hawley, one of Zefer's senior technical associates, explained the technical progression of the scraper in an affidavit:

[a.] Open an Excel spreadsheet. The initially contains EFTours gateway and destination city codes, which are available on the EFTours web site.

[b.] Identify the first gateway and destination city codes [on the] Excel spreadsheet.

[c.] Create a [website address] request for the EFTours tour prices page based on a combination of gateway and destination city. Example: show me all the prices for a London trip leaving JFK.

[d.] View the requested web page which is retained in the random access memory of the requesting computer in the form of HTML [computer language] code. * * *

[e.] Search the HTML for the tour prices for each season, year, etc.

[f.] Store the prices into the Excel spreadsheet.

[g.] Identify the next gateway and city codes in the spreadsheet.

[8.] Repeat steps 3-7 for all gateway and destination city combinations.

[3] Appellants dispute the relevance of the size of the printed data, arguing that 60,000 printed lines, while voluminous on paper, is not a large amount of data for a computer to store. This is a distinction without a difference. The fact is that appellants utilized the scraper program to download EF's pricing data. In June 2000, EF's website listed 154,293 prices for various tours.

[4] Explorica later varied its prices slightly to mask its across-the-board discount of EF's prices.

[5] Zefer, Explorica's consultant, had objected to the initial decision on the ground that it could face liability under the preliminary injunction even though it had not had an opportunity to respond to EF's preliminary injunction motion. The district court allowed all of the parties to submit supplemental briefs and issued a further decision on July 2, 2001.

[6] The notice stated in full:

Copyright © 2000 EF Cultural Travel BV EF Educational Tours is a member of the EF group of companies.

Questions? Please contact us.

[7] Appellees have not challenged the district court's finding that they were unlikely to succeed on claims brought under 18 U.S.C. §§ 1030(5)(C) and(6)(A).

[8] Although the CFAA is primarily a criminal statute, under § 1030(g), "any person who suffers damage or loss ... may maintain a civil action ... for compensatory damages and injunctive relief or other equitable relief."

[9] At oral argument, appellants contended that they had no "intent to defraud" as defined by the CFAA. That argument was not raised in the briefs and thus has been waived. See Garcia-Ayala v. Parenterals, Inc., 212 F.3d 638, 645 (1st Cir.2000) (failure to brief an argument constitutes waiver despite attempt to raise the argument at oral argument). Likewise, at oral argument Explorica attempted to adopt appellant Zefer's argument that the preliminary injunction violates the First Amendment. The lateness of Explorica's attempt renders it fruitless. See id.

[10] Congress did not define the phrase "without authorization," perhaps assuming that the words speak for themselves. The meaning, however, has proven to be elusive. The district court applied what it termed the "default rule" that conduct is without authorization only if it is not "in line with the reasonable expectations" of the website owner and its users. Appellants argue that this is an overly broad reading that restricts access and is at odds with the Internet's intended purpose of providing the "open and free exchange of information." They urge us to adopt instead the Second Circuit's reasoning that computer use is "without authorization" only if the use is not "in any way related to [its] intended function," United States v. Morris, 928 F.2d 504, 510 (2d Cir.1991). Appellees contend that the result would be the same under either test, but we need not resolve this dispute because we affirm the court's ruling based on the "exceeds authorized access" prong of § 1030(a)(4).

[11] An example of the website address including the tour information is http://www.eftours. com/tours/PriceResult.asp? Gate=GTF & TourID=LPM. In this address, the proprietary codes are "GTF" and "LPM."

[12] The Agreement provides that confidential information does not include anything that "is or becomes generally known within EF's industry."

[13] URL is the acronym for "uniform resource locator," the technical name for the web address typed in by an Internet user. For example, EF's URL is http://www.eftours.com.

[14] Among the several emails in the record is one from Zefer employee Joseph Alt to the Explorica "team" at Zefer:

Below is the information needed to log into EF's site as a tour leader. Please use this to gather competitor information from both a business and experience design perspective. We may also be able to glean knowledge of their technical abilities. As with all of our information, this is extremely confidential. Please do not share it with anyone.

[15] Ironically, appellant Olsson countersigned Gormley's confidentiality agreement as the representative of EF.

[16] EF also claims that Explorica skirted the website's technical restraints. To learn about a specific tour, a user must navigate through several different web pages by "clicking" on various drop-down menus and choosing the desired departure location, date, tour destination, tour length, and price range. The district court found that the scraper circumvented the technical restraints by operating at a warp speed that the website was not normally intended to accommodate. We need not reach the argument that this alone was a violation of the CFAA, however, because the apparent transfer of information in violation of the Confidentiality Agreement furnishes a sufficient basis for injunctive relief.

Likewise, we express no opinion on the district court's ruling that EF's copyright notice served as a "clear statement [that] should have dispelled any notion a reasonable person may have had the `presumption of open access'" to EF's website.

[17] It is undisputed that appellees paid $20,944.92 to assess whether their website had been compromised. Appellees also claim costs exceeding $40,000 that they will incur to "remedy and secure their website and computer." We need not consider whether these expenses constitute loss because the initial $20,944.92 greatly exceeds the threshold.

2.7 Assessment Technologies of Wisc., LLC v. WIREdata, Inc. 2.7 Assessment Technologies of Wisc., LLC v. WIREdata, Inc.

350 F.3d 640

United States Court of Appeals,
Seventh Circuit.

ASSESSMENT TECHNOLOGIES OF WI, LLC, Plaintiff–Appellee,
v.
WIREDATA, INC., Defendant–Appellant.

No. 03–2061.
Argued Nov. 3, 2003.
Decided Nov. 25, 2003.

Attorneys and Law Firms  

Daniel R. Johnson (argued), Ryan, Kromholz & Manion, Milwaukee, WI, for Plaintiff–Appellee.

Alan Deutch (argued), Deutch & Weiss, Fox Point, WI, for Defendant–Appellant.

Before POSNER, DIANE P. WOOD, and EVANS, Circuit Judges.

Opinion

POSNER, Circuit Judge.

This case is about the attempt of a copyright owner to use copyright law to block access to data that not only are neither copyrightable nor copyrighted, but were not created or obtained by the copyright owner. The owner is trying to secrete the data in its copyrighted program—a program the existence of which reduced the likelihood that the data would be retained in a form in which they would have been readily accessible. It would be appalling if such an attempt could succeed.

Assessment Technologies (AT, we'll call it) brought suit for copyright infringement and theft of trade secrets against WIREdata, and the district court after an evidentiary hearing issued a permanent injunction on the basis of AT's copyright claim alone, without reaching the trade secret claim. A sample database in the demo version of AT's product—a version freely distributed for promotional purposes—reveals the entire structure of the database, thus making the trade secret claim incomprehensible to us. But we shall not make a formal ruling on the claim. It was not addressed either by the district court or by the parties in their submissions in this court, and conceivably if improbably it has more merit than we can find in it.

The copyright case seeks to block WIREdata from obtaining noncopyrighted data. AT claims that the data can't be extracted without infringement of its copyright. The copyright is of a compilation format, and the general issue that the appeal presents is the right of the owner of such a copyright to prevent his customers (that is, the copyright licensees) from disclosing the compiled data even if the data are in the public domain.

WIREdata, owned by Multiple Listing Services, Inc., wants to obtain, for use by real estate brokers, data regarding specific properties—address, owner's name, the age of the property, its assessed valuation, the number and type of rooms, and so forth—from the southeastern Wisconsin municipalities in which the properties are located. The municipalities collect such data in order to assess the value of the properties for property-tax purposes. Ordinarily they're happy to provide the data to anyone who will pay the modest cost of copying the data onto a disk. Indeed, Wisconsin's “open records” law, Wis. Stat. §§ 19.31–.39; State ex rel. Milwaukee Police Ass'n v. Jones, 237 Wis.2d 840, 615 N.W.2d 190, 194–96 (2000), which is applicable to data in digital form, see id. at 195–96; Wis. Stat. § 19.32(2), requires them to furnish such data to any person who will pay the copying cost. However, three municipalities refused WIREdata's request. They (or the contractors who do the actual tax assessment for them) are licensees of AT. The open-records law contains an exception for copyrighted materials, id., and these municipalities are afraid that furnishing WIREdata the requested data would violate the copyright. WIREdata has sued them in the state courts of Wisconsin in an attempt to force them to divulge the data, and those suits are pending. Alarmed by WIREdata's suits, AT brought the present suit to stop WIREdata from making such demands of the municipalities and seeking to enforce them by litigation.

The data that WIREdata wants are collected not by AT but by tax assessors hired by the municipalities. The assessors visit the property and by talking to the owner and poking around the property itself obtain the information that we mentioned in the preceding paragraph—the age of the property, the number of rooms, and so forth. AT has developed and copyrighted a computer program, called “Market Drive,” for compiling these data. The assessor types into a computer the data that he has obtained from his visit to the property or from other sources of information and then the Market Drive program, in conjunction with a Microsoft database program (Microsoft Access), automatically allocates the data to 456 fields (that is, categories of information) grouped into 34 master categories known as tables. Several types of data relating to a property, each allocated to a different field, are grouped together in a table called “Income Valuations,” others in a table called “Residential Buildings,” and so on. The data collected by the various assessors and inputted in the manner just described are stored in an electronic file, the database. The municipality's tax officials can use various queries in Market Drive or Market Access to view the data in the file.

WIREdata's appeal gets off on the wrong foot, with the contention that Market Drive lacks sufficient originality to be copyrightable. Copyright law unlike patent law does not require substantial originality. Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340, 345–48, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991). In fact, it requires only enough originality to enable a work to be distinguished from similar works that are in the public domain, Bucklew v. Hawkins, Ash, Baptie & Co., 329 F.3d 923, 929 (7th Cir. 2003); Alfred Bell & Co. v. Catalda Fine Arts, Inc., 191 F.2d 99, 102–03 (2d Cir. 1951), since without some discernible distinction it would be impossible to determine whether a subsequent work was copying a copyrighted work or a public-domain work. This modest requirement is satisfied by Market Drive because no other real estate assessment program arranges the data collected by the assessor in these 456 fields grouped into these 34 categories, and because this structure is not so obvious or inevitable as to lack the minimal originality required, Key Publications, Inc. v. Chinatown Today Publishing Enterprises, Inc., 945 F.2d 509, 513–14 (2d Cir. 1991), as it would if the compilation program simply listed data in alphabetical or numerical order. Feist Publications, Inc. v. Rural Telephone Service Co., supra, 499 U.S. at 362–64. The obvious orderings, the lexical and the numeric, have long been in the public domain, and what is in the public domain cannot be appropriated by claiming copyright. Alternatively, if there is only one way in which to express an idea—for example, alphabetical order for the names in a phone book—then form and idea merge, and in that case since an idea cannot be copyrighted the copying of the form is not an infringement. Ets–Hokin v. Skyy Spirits, Inc., 225 F.3d 1068, 1082 (9th Cir. 2000); Kregos v. Associated Press, 937 F.2d 700, 705–07 (2d Cir.1991). That is not the situation here.

So AT has a valid copyright; and if WIREdata said to itself, “Market Drive is a nifty way of sorting real estate data and we want the municipalities to give us their data in the form in which it is organized in the database, that is, sorted into AT's 456 fields grouped into its 34 tables,” and the municipalities obliged, they would be infringing AT's copyright because they are not licensed to make copies of Market Drive for distribution to others; and WIREdata would be a contributory infringer (subject to a qualification concerning the fair-use defense to copyright infringement, including contributory infringement, that we discuss later). But WIREdata doesn't want the compilation as structured by Market Drive. It isn't in the business of making tax assessments, which is the business for which Market Drive is designed. It only wants the raw data, the data the assessors inputted into Market Drive. Once it gets those data it will sort them in accordance with its own needs, which have to do with providing the information about properties that is useful to real estate brokers as opposed to taxing authorities.

But how are the data to be extracted from the database without infringing the copyright? Or, what is not quite the same question, how can the data be separated from the tables and fields to which they are allocated by Market Drive? One possibility is to use tools in the Market Drive program itself to extract the data and place it in a separate electronic file; this can be done rapidly and easily with just a few keystrokes. But the municipalities may not have the program, because the inputting of the data, which did of course require its use, was done by assessors employed by firms to do this work as independent contractors of the municipalities. And if the municipalities do have the program, still their license from AT forbids them to disseminate the data collected by means of it—a restriction that may or may not be in violation of the state's open-records law, a question we come back to later. A second extraction possibility, which arises from the fact that the database is a Microsoft file accessible by Microsoft Access, is to use Access to extract the data and place it in a new file, bypassing Market Drive. But there is again the scope of the license to be considered and also whether the method of extraction is so cumbersome that it would require more effort than the open-records law requires of the agencies subject to it. It might take a programmer a couple of days to extract the data using Microsoft Access, and the municipalities might lack the time, or for that matter the programmers, to do the extraction. But that should not be a big problem, because WIREdata can hire programmers to extract the data from the municipalities' computers at its own expense.

From the standpoint of copyright law all that matters is that the process of extracting the raw data from the database does not involve copying Market Drive, or creating, as AT mysteriously asserts, a derivative work; all that is sought is raw data, data created not by AT but by the assessors, data that are in the public domain. A derivative work is a translation or other transformation of an original work and must itself contain minimum originality for the same evidentiary reason that we noted in discussing the requirement that a copyrighted work be original. Pickett v. Prince, 207 F.3d 402, 405 (7th Cir. 2000); Gracen v. Bradford Exchange, 698 F.2d 300, 304–05 (7th Cir. 1983). A work that merely copies uncopyrighted material is wholly unoriginal and the making of such a work is therefore not an infringement of copyright. The municipalities would not be infringing Market Drive by extracting the raw data from the databases by either method that we discussed and handing those data over to WIREdata; and since there would thus be no direct infringement, neither would there be contributory infringement by WIREdata. It would be like a Westlaw licensee's copying the text of a federal judicial opinion that he found in the Westlaw opinion database and giving it to someone else. Westlaw's compilation of federal judicial opinions is copyrighted and copyrightable because it involves discretionary judgments regarding selection and arrangement. But the opinions themselves are in the public domain (federal law forbids assertion of copyright in federal documents, 17 U.S.C. § 105), and so Westlaw cannot prevent its licensees from copying the opinions themselves as distinct from the aspects of the database that are copyrighted. See Matthew Bender & Co. v. West Publishing Co., 158 F.3d 693 (2d Cir. 1998); Matthew Bender & Co. v. West Publishing Co., 158 F.3d 674 (2d Cir. 1998).

AT would lose this copyright case even if the raw data were so entangled with Market Drive that they could not be extracted without making a copy of the program. The case would then be governed by Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510, 1520–28 (9th Cir. 1992). Sega manufactured a game console, which is a specialized computer, and copyrighted the console's operating system, including the source code. Accolade wanted to make computer games that would be compatible with Sega's console, and to that end it bought a Sega console and through reverse engineering reconstructed the source code, from which it would learn how to design its games so that they would activate the operating system. For technical reasons, Accolade had to make a copy of the source code in order to be able to obtain this information. It didn't want to sell the source code, produce a game-console operating system, or make any other use of the copyrighted code except to be able to sell a noninfringing product, namely a computer game. The court held that this “intermediate copying” of the operating system was a fair use, since the only effect of enjoining it would be to give Sega control over noninfringing products, namely Accolade's games. See also Sony Computer Entertainment, Inc. v. Connectix Corp., 203 F.3d 596, 602–08 (9th Cir. 2000); Bateman v. Mnemonics, Inc., 79 F.3d 1532, 1539–40 n. 18 (11th Cir. 1996); Atari Games Corp. v. Nintendo of America, Inc., 975 F.2d 832, 842–44 (Fed. Cir. 1992). Similarly, if the only way WIREdata could obtain public-domain data about properties in southeastern Wisconsin would be by copying the data in the municipalities' databases as embedded in Market Drive, so that it would be copying the compilation and not just the compiled data only because the data and the format in which they were organized could not be disentangled, it would be privileged to make such a copy, and likewise the municipalities. For the only purpose of the copying would be to extract noncopyrighted material, and not to go into competition with AT by selling copies of Market Drive. We emphasize this point lest AT try to circumvent our decision by reconfiguring Market Drive in such a way that the municipalities would find it difficult or impossible to furnish the raw data to requesters such as WIREdata in any format other than that prescribed by Market Drive. If AT did that with that purpose it might be guilty of copyright misuse, of which more shortly.

AT argues that WIREdata doesn't need to obtain the data in digital form because they exist in analog form, namely in the handwritten notes of the assessors, notes that all agree are not covered by the Market Drive copyright. But we were told at argument without contradiction that some assessors no longer make handwritten notes to copy into a computer at a later time. Instead they take their laptop to the site and type the information in directly. So WIREdata could not possibly obtain all the data it wants (all of which data are in the public domain, we emphasize) from the handwritten notes. But what is more fundamental is that since AT has no ownership or other legal interest in the data collected by the assessor, it has no legal ground for making the acquisition of that data more costly for WIREdata. AT is trying to use its copyright to sequester uncopyrightable data, presumably in the hope of extracting a license fee from WIREdata.

We are mindful of pressures, reflected in bills that have been pending in Congress for years, Jonathan Band & Makoto Kono, “The Database Protection Debate in the 106th Congress,” 62 Ohio St. L.J. 869 (2001), to provide legal protection to the creators of databases, as Europe has already done. Jane C. Ginsburg, “Copyright, Common Law, and Sui Generis Protection of Databases in the United States and Abroad,” 66 U. Cinc. L.Rev. 151 (1997). (Ironically, considering who owns WIREdata, the multiple-listing services are pressing for such protection. Ron Eckstein, “The Database Debate,” Legal Times, Jan. 24, 2000, p. 16.) The creation of massive electronic databases can be extremely costly, yet if the database is readily searchable and the data themselves are not copyrightable (and we know from Feist that mere data are indeed not copyrightable) the creator may find it difficult or even impossible to recoup the expense of creating the database. Legal protection of databases as such (as distinct from programs for arranging the data, like Market Drive) cannot take the form of copyright, as the Supreme Court made clear in Feist when it held that the copyright clause of the Constitution does not authorize Congress to create copyright in mere data. But that is neither here nor there; what needs to be emphasized in this case is that the concerns (whether or not valid, as questioned in Ginsburg, supra, and also J.H. Reichman & Pamela Samuelson, “Intellectual Property Rights in Data?” 50 Vand. L.Rev. 51 (1997), and Stephen M. Maurer & Suzanne Scotchmer, “Database Protection: Is It Broken and Should We Fix It?” 284 Sci. 1129 (1999)) that actuate the legislative proposals for database protection have no relevance because AT is not the collector of the data that go into the database. All the data are collected and inputted by the assessors; it is they, not AT, that do the footwork, the heavy lifting.

AT points to the terms of its license agreements with the municipalities, which though ambiguous might be interpreted to forbid the licensees to release the raw data, even without the duplication, or revelation of any copyrighted feature, of Market Drive. But AT is not suing for breach of the terms of the agreements—it can't, since WIREdata is not a party to them. Nor is it suing for intentional interference with contract, Frandsen v. Jensen–Sundquist Agency, Inc., 802 F.2d 941, 947–48 (7th Cir. 1986) (Wisconsin law); Dorr v. Sacred Heart Hospital, 228 Wis.2d 425, 597 N.W.2d 462, 478 (1999); Cudd v. Crownhart, 122 Wis.2d 656, 364 N.W.2d 158, 160–61 (1985), which would be the logical route for complaining about WIREdata's inviting the municipalities that are AT's licensees to violate the terms of their license. The licenses do nothing for AT in this case.

So it is irrelevant that ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1453–55 (7th Cir. 1996), holds that a copyright owner can by contract limit copying beyond the right that a copyright confers. See also Bowers v. Baystate Technologies, Inc., 320 F.3d 1317, 1323–26 (Fed. Cir. 2003). Like other property rights, a copyright is enforceable against persons with whom the owner has no contractual relations; so a property owner can eject a trespasser even though the trespasser had not contractually bound himself to refrain from entering the property. That is why AT is suing WIREdata for copyright infringement rather than for breach of contract. The scope of a copyright is given by federal law, but the scope of contractual protection is, at least prima facie, whatever the parties to the contract agreed to. The existence of contractual solutions to the problem of copying the contents of databases is one of the reasons that Professor Ginsburg and others are skeptical about the need for legislative protection of databases. But our plaintiff did not create the database that it is seeking to sequester from WIREdata; or to be more precise, it created only an empty database, a bin that the tax assessors filled with the data. It created the compartments in the bin and the instructions for sorting the data to those compartments, but those were its only innovations and their protection by copyright law is complete. To try by contract or otherwise to prevent the municipalities from revealing their own data, especially when, as we have seen, the complete data are unavailable anywhere else, might constitute copyright misuse.

The doctrine of misuse “prevents copyright holders from leveraging their limited monopoly to allow them control of areas outside the monopoly.” A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1026–27 (9th Cir. 2001); see Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d 772, 792–95 (5th Cir. 1999); Practice Management Information Corp. v. American Medical Ass'n, 121 F.3d 516, 520–21 (1997), amended, 133 F.3d 1140 (9th Cir. 1998); DSC Communications Corp. v. DGI Technologies, Inc., 81 F.3d 597, 601–02 (5th Cir. 1996); Lasercomb America, Inc. v. Reynolds, 911 F.2d 970, 976–79 (4th Cir. 1990). The data in the municipalities' tax-assessment databases are beyond the scope of AT's copyright. It is true that in Reed–Union Corp. v. Turtle Wax, Inc., 77 F.3d 909, 913 (7th Cir. 1996), we left open the question whether copyright misuse, unless it rises to the level of an antitrust violation, is a defense to infringement; our earlier decision in Saturday Evening Post Co. v. Rumbleseat Press, Inc., 816 F.2d 1191, 1200 (7th Cir. 1987), had intimated skepticism. No effort has been made by WIREdata to show that AT has market power merely by virtue of its having a copyright on one system for compiling valuation data for real estate tax assessment purposes. Cases such as Lasercomb, however, cut misuse free from antitrust, pointing out that the cognate doctrine of patent misuse is not so limited, 911 F.2d at 977–78, though a difference is that patents tend to confer greater market power on their owners than copyrights do, since patents protect ideas and copyrights, as we have noted, do not. The argument for applying copyright misuse beyond the bounds of antitrust, besides the fact that confined to antitrust the doctrine would be redundant, is that for a copyright owner to use an infringement suit to obtain property protection, here in data, that copyright law clearly does not confer, hoping to force a settlement or even achieve an outright victory over an opponent that may lack the resources or the legal sophistication to resist effectively, is an abuse of process.

We need not run this hare to the ground; nor decide whether the licenses interpreted as AT would have us interpret them—as barring municipalities from disclosing noncopyrighted data—would violate the state's open-records law. Cf. Antisdel v. City of Oak Creek Police & Fire Comm'n, 229 Wis.2d 433, 600 N.W.2d 1, 3 (App. 1999); Gordie Boucher Lincoln–Mercury Madison, Inc. v. J & H Landfill, Inc., 172 Wis.2d 333, 493 N.W.2d 375, 378 (App. 1992); State ex rel. Sun Newspapers v. Westlake Board of Education, 76 Ohio App.3d 170, 601 N.E.2d 173, 175 (1991); but cf. Pierce v. St. Vrain Valley School District, 981 P.2d 600, 605–06 (Colo. 1999). WIREdata is not a licensee of AT, and AT is not suing to enforce any contract it might have with WIREdata. It therefore had no cause to drag the licenses before us. But since it did, we shall not conceal our profound skepticism concerning AT's interpretation. If accepted, it would forbid municipalities licensed by AT to share the data in their tax-assessment databases with each other even for the purpose of comparing or coordinating their assessment methods, though all the data they would be exchanging would be data that their assessors had collected and inputted into the databases. That seems an absurd result.

To summarize, there are at least four possible methods by which WIRE data can obtain the data it is seeking without infringing AT's copyright; which one is selected is for the municipality to decide in light of applicable trade-secret, open-records, and contract laws. The methods are: (1) the municipalities use Market Drive to extract the data and place it in an electronic file; (2) they use Microsoft Access to create an electronic file of the data; (3) they allow programmers furnished by WIREdata to use their computers to extract the data from their database—this is really just an alternative to WIREdata's paying the municipalities' cost of extraction, which the open-records law requires; (4) they copy the database file and give it to WIREdata to extract the data from.

The judgment is reversed with instructions to vacate the injunction and dismiss the copyright claim.

REVERSED AND REMANDED, WITH INSTRUCTIONS.

2.8 Perfect 10 v. Amazon.com 2.8 Perfect 10 v. Amazon.com

508 F.3d 1146

PERFECT 10, INC., a California corporation, Plaintiff-Appellant,
v.
AMAZON.COM, INC., a corporation; A9.Com Inc., a corporation, Defendants-Appellees.

Perfect 10, Inc., a California corporation, Plaintiff-Appellant,
v.
Google Inc., a corporation, Defendant-Appellee.

Perfect 10, Inc., a California corporation, Plaintiff-Appellee,
v.
Google Inc., a corporation, Defendant-Appellant.

Perfect 10, Inc., a California corporation, Plaintiff-Appellant,
v.
Google Inc., a corporation, Defendant-Appellee.

Perfect 10, Inc., a California corporation, Plaintiff-Appellee,
v.
Google Inc., a corporation, Defendant-Appellant.

Perfect 10, Inc., a California corporation, Plaintiff-Appellee,
v.
Google Inc., a corporation, Defendant-Appellant.

No. 06-55405.
No. 06-55406.
No. 06-55425.
No. 06-55759.
No. 06-55854.
No. 06-55877.
United States Court of Appeals, Ninth Circuit.
Argued and Submitted November 15, 2006.
Filed May 16, 2007.
Amended December 3, 2007.

[1153] Russell J. Frackman and Jeffrey D. Goldman, Mitchell, Silberberg & Knupp LLP, Los Angeles, CA, Jeffrey N. Mausner, Berman, Mausner & Resser, Los Angeles, CA, Daniel J. Cooper, Perfect 10, Inc., Beverly Hills, CA, for plaintiff-appellant Perfect 10, Inc.

Andrew P. Bridges and Jennifer A. Golinveaux, Winston & Strawn LLP, San Francisco, CA, Gene C. Schaerr, Winston & Strawn LLP, Washington, DC, for defendant-appellee and cross-appellant Google Inc.

Mark T. Jansen & Anthony J. Malutta, Townsend and Townsend and Crew LLP, San Francisco, CA, for defendants-appellees Amazon.com and A9.com, Inc.

Fred von Lohmann, Electronic Frontier Foundation, San Francisco, CA, for amicus curiae Electronic Frontier Foundation, American Library Association, Medical Library [1154] Association, American Association of Law Libraries, Association of Research Libraries, and Special Libraries Association in support of Google Inc.

Victor S. Perlman, of counsel, American Society of Media Photographers; Nancy E. Wolff, of counsel, Cowan, DeBaets, Abrahams & Sheppard, LLP; Robert W. Clarida and Jason D. Sanders, Cowan, Liebowitz & Latman, P.C., New York, NY, for amicus curiae American Society of Media Photographers, Inc., Picture Archive Council of America, Inc., British Association of Picture Libraries and Agencies, Inc., Stock Artists Alliance, The Graphic Artists Guild, American Society of Picture Professionals and National Press Photographers, in support of Perfect 10 on issue of Google's liability for the display of full-size images.

Eric J. Schwartz and Steven J. Metalitz, Smith & Metalitz LLP, Washington, DC, for amicus curiae Motion Picture Association of America, Inc. in support of Perfect 10.

Jonathan Band, Jonathan Band PLLC, Washington, DC, for amicus curiae Net-Coalition, Computer and Communications Industry Association, U.S. Internet Service Provider Association, Consumer Electronics Association, Home Recording Rights Coalition, Information Technology Association of America, and Internet Commerce Coalition in support of Google Inc.

Kenneth L. Doroshow and Linda J. Zirkelbach, Recording Industry Association of America, Washington, DC; Jacqueline C. Charlesworth, National Music Publishers' Association, Washington, DC; Robert W. Clarida, Richard S. Mandel and Jonathan Z. King, Cowan, Liebowitz & Latman, P.C., New York, NY, for amicus curiae Recording Industry Association of America and National Music Publishers' Association in support of neither party.

Appeal from the United States District Court for the Central District of California; A. Howard Matz, District Judge, Presiding. D.C. Nos. CV-05-04753-AHM, CV-04-09484-AHM.

Before: CYNTHIA HOLCOMB HALL, HAWKINS, and SANDRA S. IKUTA, Circuit Judges.

IKUTA, Circuit Judge:

In this appeal, we consider a copyright owner's efforts to stop an Internet search engine from facilitating access to infringing images. Perfect 10, Inc. sued Google Inc., for infringing Perfect 10's copyrighted photographs of nude models, among other claims. Perfect 10 brought a similar action against Amazon.com and its subsidiary A9.com (collectively, "Amazon.com"). The district court preliminarily enjoined Google from creating and publicly displaying thumbnail versions of Perfect 10's images, Perfect 10 v. Google, Inc., 416 F.Supp.2d 828 (C.D.Cal.2006), but did not enjoin Google from linking to third-party websites that display infringing full-size versions of Perfect 10's images. Nor did the district court preliminarily enjoin Amazon.com from giving users access to information provided by Google. Perfect 10 and Google both appeal the district court's order. We have jurisdiction pursuant to 28 U.S.C. § 1292(a)(1).[1]

[1155] The district court handled this complex case in a particularly thoughtful and skillful manner. Nonetheless, the district court erred on certain issues, as we will further explain below. We affirm in part, reverse in part, and remand.

I

Background

Google's computers, along with millions of others, are connected to networks known collectively as the "Internet." "The Internet is a world-wide network of networks ... all sharing a common communications technology." Religious Tech. Ctr. v. Netcom On-Line Commc'n Servs., Inc., 923 F.Supp. 1231, 1238 n. 1 (N.D.Cal.1995). Computer owners can provide information stored on their computers to other users connected to the Internet through a medium called a webpage. A webpage consists of text interspersed with instructions written in Hypertext Markup Language ("HTML") that is stored in a computer. No images are stored on a webpage; rather, the HTML instructions on the webpage provide an address for where the images are stored, whether in the webpage publisher's computer or some other computer. In general, webpages are publicly available and can be accessed by computers connected to the Internet through the use of a web browser.

Google operates a search engine, a software program that automatically accesses thousands of websites (collections of webpages) and indexes them within a database stored on Google's computers. When a Google user accesses the Google website and types in a search query, Google's software searches its database for websites responsive to that search query. Google then sends relevant information from its index of websites to the user's computer. Google's search engines can provide results in the form of text, images, or videos.

The Google search engine that provides responses in the form of images is called "Google Image Search." In response to a search query, Google Image Search identifies text in its database responsive to the query and then communicates to users the images associated with the relevant text. Google's software cannot recognize and index the images themselves. Google Image Search provides search results as a webpage of small images called "thumbnails," which are stored in Google's servers. The thumbnail images are reduced, lower-resolution versions of full-sized images stored on third-party computers.

When a user clicks on a thumbnail image, the user's browser program interprets HTML instructions on Google's webpage. These HTML instructions direct the user's browser to cause a rectangular area (a "window") to appear on the user's computer screen. The window has two separate areas of information. The browser fills the top section of the screen with information from the Google webpage, including the thumbnail image and text. The HTML instructions also give the user's browser the address of the website publisher's computer that stores the full-size version of the thumbnail.[2] By following [1156] the HTML instructions to access the third-party webpage, the user's browser connects to the website publisher's computer, downloads the full-size image, and makes the image appear at the bottom of the window on the user's screen. Google does not store the images that fill this lower part of the window and does not communicate the images to the user; Google simply provides HTML instructions directing a user's browser to access a third-party website. However, the top part of the window (containing the information from the Google webpage) appears to frame and comment on the bottom part of the window. Thus, the user's window appears to be filled with a single integrated presentation of the full-size image, but it is actually an image from a third-party website framed by information from Google's website. The process by which the webpage directs a user's browser to incorporate content from different computers into a single window is referred to as "in-line linking." Kelly v. Arriba Soft Corp., 336 F.3d 811, 816 (9th Cir.2003). The term "framing" refers to the process by which information from one computer appears to frame and annotate the in-line linked content from another computer. Perfect 10, 416 F.Supp.2d at 833-34.

Google also stores webpage content in its cache.[3] For each cached webpage, Google's cache contains the text of the webpage as it appeared at the time Google indexed the page, but does not store images from the webpage. Id. at 833. Google may provide a link to a cached webpage in response to a user's search query. However, Google's cache version of the webpage is not automatically updated when the webpage is revised by its owner. So if the webpage owner updates its webpage to remove the HTML instructions for finding an infringing image, a browser communicating directly with the webpage would not be able to access that image. However, Google's cache copy of the webpage would still have the old HTML instructions for the infringing image. Unless the owner of the computer changed the HTML address of the infringing image, or otherwise rendered the image unavailable, a browser accessing Google's cache copy of the website could still access the image where it is stored on the website publisher's computer. In other words, Google's cache copy could provide a user's browser with valid directions to an infringing image even though the updated webpage no longer includes that infringing image.

In addition to its search engine operations, Google generates revenue through a business program called "AdSense." Under this program, the owner of a website can register with Google to become an AdSense "partner." The website owner then places HTML instructions on its webpages that signal Google's server to place advertising on the webpages that is relevant to the webpages' content. Google's computer program selects the advertising automatically by means of an algorithm. AdSense participants agree to share the revenues that flow from such advertising with Google.

[1157] Google also generated revenues through an agreement with Amazon.com that allowed Amazon.com to in-line link to Google's search results. Amazon.com gave its users the impression that Amazon.com was providing search results, but Google communicated the search results directly to Amazon.com's users. Amazon.com routed users' search queries to Google and automatically transmitted Google's responses (i.e., HTML instructions for linking to Google's search results) back to its users.

Perfect 10 markets and sells copyrighted images of nude models. Among other enterprises, it operates a subscription website on the Internet. Subscribers pay a monthly fee to view Perfect 10 images in a "members' area" of the site. Subscribers must use a password to log into the members' area. Google does not include these password-protected images from the members' area in Google's index or database. Perfect 10 has also licensed Fonestarz Media Limited to sell and distribute Perfect 10's reduced-size copyrighted images for download and use on cell phones.

Some website publishers republish Perfect 10's images on the Internet without authorization. Once this occurs, Google's search engine may automatically index the webpages containing these images and provide thumbnail versions of images in response to user inquiries. When a user clicks on the thumbnail image returned by Google's search engine, the user's browser accesses the third-party webpage and in-line links to the full-sized infringing image stored on the website publisher's computer. This image appears, in its original context, on the lower portion of the window on the user's computer screen framed by information from Google's webpage.

Procedural History. In May 2001, Perfect 10 began notifying Google that its thumbnail images and in-line linking to the full-size images infringed Perfect 10's copyright. Perfect 10 continued to send these notices through 2005.

On November 19, 2004, Perfect 10 filed an action against Google that included copyright infringement claims. This was followed by a similar action against Amazon.com on June 29, 2005. On July 1, 2005 and August 24, 2005, Perfect 10 sought a preliminary injunction to prevent Amazon.com and Google, respectively, from "copying, reproducing, distributing, publicly displaying, adapting or otherwise infringing, or contributing to the infringement" of Perfect 10's photographs; linking to websites that provide full-size infringing versions of Perfect 10's photographs; and infringing Perfect 10's username/password combinations.

The district court consolidated the two actions and heard both preliminary injunction motions on November 7, 2005. The district court issued orders granting in part and denying in part the preliminary injunction against Google and denying the preliminary injunction against Amazon.com. Perfect 10 and Google cross-appealed the partial grant and partial denial of the preliminary injunction motion, and Perfect 10 appealed the denial of the preliminary injunction against Amazon.com. On June 15, 2006, the district court temporarily stayed the preliminary injunction.

II

Standard of Review

We review the district court's grant or denial of a preliminary injunction for an abuse of discretion. A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1013 (9th Cir.2001). The district court must support a preliminary injunction with findings of fact, which we review for clear error. Earth Island Inst. v. U.S. Forest Serv., 442 F.3d 1147, 1156 (9th Cir.2006). We review the district court's conclusions of law de novo. Napster, 239 F.3d at 1013.

[1158] Section 502(a) of the Copyright Act authorizes a court to grant injunctive relief "on such terms as it may deem reasonable to prevent or restrain infringement of a copyright." 17 U.S.C. § 502(a). "Preliminary injunctive relief is available to a party who demonstrates either: (1) a combination of probable success on the merits and the possibility of irreparable harm; or (2) that serious questions are raised and the balance of hardships tips in its favor. These two formulations represent two points on a sliding scale in which the required degree of irreparable harm increases as the probability of success decreases." Napster, 239 F.3d at 1013 (internal quotation and citation omitted).

Because Perfect 10 has the burden of showing a likelihood of success on the merits, the district court held that Perfect 10 also had the burden of demonstrating a likelihood of overcoming Google's fair use defense under 17 U.S.C. § 107. Perfect 10, 416 F.Supp.2d at 836-37. This ruling was erroneous. At trial, the defendant in an infringement action bears the burden of proving fair use. See Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 590, 114 S.Ct. 1164, 127 L.Ed.2d 500 (1994). Because "the burdens at the preliminary injunction stage track the burdens at trial," once the moving party has carried its burden of showing a likelihood of success on the merits, the burden shifts to the non-moving party to show a likelihood that its affirmative defense will succeed. Gonzales v. O Centro Espirita Beneficente Uniao do Vegetal, 546 U.S. 418, 429, 126 S.Ct. 1211, 163 L.Ed.2d 1017 (2006); see also Abbott Labs. v. Andrx Pharms., Inc., 473 F.3d 1196, 1201 (Fed. Cir.2007) (to defeat a motion for preliminary injunctive relief in a patent infringement case, the non-moving party must establish a likelihood of success in proving its defenses of invalidity or unenforceability); PHG Techs., LLC v. St. John Cos., 469 F.3d 1361, 1365 (Fed.Cir.2006). Accordingly, once Perfect 10 has shown a likelihood of success on the merits, the burden shifts to Google to show a likelihood that its affirmative defenses will succeed.

In addition to its fair use defense, Google also raises an affirmative defense under title II of the Digital Millennium Copyright Act ("DMCA"), 17 U.S.C. § 512. Congress enacted title II of the DMCA "to provide greater certainty to service providers concerning their legal exposure for infringements that may occur in the course of their activities." Ellison v. Robertson, 357 F.3d 1072, 1076 (9th Cir. 2004) (internal quotation omitted). Sections 512(a) through (d) limit liability for (respectively): "(1) transitory digital network communications; (2) system caching; (3) information residing on systems or networks at the direction of users; and (4) information location tools." Id. at 1077. A service provider that qualifies for such protection is not liable for monetary relief and may be subject only to the narrow injunctive relief set forth in section 512(j). 17 U.S.C. § 512(a). If Perfect 10 demonstrates a likelihood of success on the merits, Google must show a likelihood of succeeding in its claim that it qualifies for protection under title II of the DMCA.[4][1159]

III

Direct Infringement

Perfect 10 claims that Google's search engine program directly infringes two exclusive rights granted to copyright holders: its display rights and its distribution rights.[5] "Plaintiffs must satisfy two requirements to present a prima facie case of direct infringement: (1) they must show ownership of the allegedly infringed material and (2) they must demonstrate that the alleged infringers violate at least one exclusive right granted to copyright holders under 17 U.S.C. § 106." Napster, 239 F.3d at 1013; see 17 U.S.C. § 501(a). Even if a plaintiff satisfies these two requirements and makes a prima facie case of direct infringement, the defendant may avoid liability if it can establish that its use of the images is a "fair use" as set forth in 17 U.S.C. § 107. See Kelly, 336 F.3d at 817.

Perfect 10's ownership of at least some of the images at issue is not disputed. See Perfect 10, 416 F.Supp.2d at 836.

The district court held that Perfect 10 was likely to prevail in its claim that Google violated Perfect 10's display right with respect to the infringing thumbnails. Id. at 844. However, the district court concluded that Perfect 10 was not likely to prevail on its claim that Google violated either Perfect 10's display or distribution right with respect to its full-size infringing images. Id. at 844-45. We review these rulings for an abuse of discretion. Napster, 239 F.3d at 1013.

A. Display Right

In considering whether Perfect 10 made a prima facie case of violation of its display right, the district court reasoned that a computer owner that stores an image as electronic information and serves that electronic information directly to the user ("i.e., physically sending ones and zeroes over the [I]nternet to the user's browser," Perfect 10, 416 F.Supp.2d at 839) is displaying the electronic information in violation of a copyright holder's exclusive display right. Id. at 843-45; see 17 U.S.C. § 106(5). Conversely, the owner of a computer that does not store and serve the electronic information to a user is not displaying that information, even if such owner in-line links to or frames the electronic information. Perfect 10, 416 F.Supp.2d at 843-45. The district court referred to this test as the "server test." Id. at 838-39.

Applying the server test, the district court concluded that Perfect 10 was likely to succeed in its claim that Google's thumbnails constituted direct infringement but was unlikely to succeed in its claim that Google's in-line linking to full-size infringing images constituted a direct infringement. [1160] Id. at 843-45. As explained below, because this analysis comports with the language of the Copyright Act, we agree with the district court's resolution of both these issues.

We have not previously addressed the question when a computer displays a copyrighted work for purposes of section 106(5). Section 106(5) states that a copyright owner has the exclusive right "to display the copyrighted work publicly." The Copyright Act explains that "display" means "to show a copy of it, either directly or by means of a film, slide, television image, or any other device or process...." 17 U.S.C. § 101. Section 101 defines "copies" as "material objects, other than phonorecords, in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device." Id. Finally, the Copyright Act provides that "[a] work is `fixed' in a tangible medium of expression when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration." Id.

We must now apply these definitions to the facts of this case. A photographic image is a work that is "`fixed' in a tangible medium of expression," for purposes of the Copyright Act, when embodied (i.e., stored) in a computer's server (or hard disk, or other storage device). The image stored in the computer is the "copy" of the work for purposes of copyright law. See MAI Sys. Corp. v. Peak Computer, Inc., 991 F.2d 511, 517-18 (9th Cir.1993) (a computer makes a "copy" of a software program when it transfers the program from a third party's computer (or other storage device) into its own memory, because the copy of the program recorded in the computer is "fixed" in a manner that is "sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration" (quoting 17 U.S.C. § 101)). The computer owner shows a copy "by means of a ... device or process" when the owner uses the computer to fill the computer screen with the photographic image stored on that computer, or by communicating the stored image electronically to another person's computer. 17 U.S.C. § 101. In sum, based on the plain language of the statute, a person displays a photographic image by using a computer to fill a computer screen with a copy of the photographic image fixed in the computer's memory. There is no dispute that Google's computers store thumbnail versions of Perfect 10's copyrighted images and communicate copies of those thumbnails to Google's users.[6] Therefore, Perfect 10 has made a prima facie case that Google's communication of its stored thumbnail images directly infringes Perfect 10's display right.

Google does not, however, display a copy of full-size infringing photographic images for purposes of the Copyright Act when Google frames in-line linked images that appear on a user's computer screen. Because Google's computers do not store the photographic images, Google does not have a copy of the images for purposes of the Copyright Act. In other words, Google does not have any "material objects ... in [1161] which a work is fixed ... and from which the work can be perceived, reproduced, or otherwise communicated" and thus cannot communicate a copy. 17 U.S.C. § 101.

Instead of communicating a copy of the image, Google provides HTML instructions that direct a user's browser to a website publisher's computer that stores the full-size photographic image. Providing these HTML instructions is not equivalent to showing a copy. First, the HTML instructions are lines of text, not a photographic image. Second, HTML instructions do not themselves cause infringing images to appear on the user's computer screen. The HTML merely gives the address of the image to the user's browser. The browser then interacts with the computer that stores the infringing image. It is this interaction that causes an infringing image to appear on the user's computer screen. Google may facilitate the user's access to infringing images. However, such assistance raises only contributory liability issues, see Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 545 U.S. 913, 929-30, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005), Napster, 239 F.3d at 1019, and does not constitute direct infringement of the copyright owner's display rights.

Perfect 10 argues that Google displays a copy of the full-size images by framing the full-size images, which gives the impression that Google is showing the image within a single Google webpage. While in-line linking and framing may cause some computer users to believe they are viewing a single Google webpage, the Copyright Act, unlike the Trademark Act, does not protect a copyright holder against acts that cause consumer confusion. Cf. 15 U.S.C. § 1114(1) (providing that a person who uses a trademark in a manner likely to cause confusion shall be liable in a civil action to the trademark registrant).[7]

Nor does our ruling that a computer owner does not display a copy of an image when it communicates only the HTML address of the copy erroneously collapse the display right in section 106(5) into the reproduction right set forth in section 106(1). Nothing in the Copyright Act prevents the various rights protected in section 106 from overlapping. Indeed, under some circumstances, more than one right must be infringed in order for an infringement claim to arise. For example, a "Game Genie" device that allowed a player to alter features of a Nintendo computer game did not infringe Nintendo's right to prepare derivative works because the Game Genie did not incorporate any portion of the game itself. See Lewis Galoob Toys, Inc. v. Nintendo of Am., Inc., 964 F.2d 965, 967 (9th Cir.1992). We held that a copyright holder's right to create derivative works is not infringed unless the alleged derivative work "incorporate[s] a protected work in some concrete or permanent `form.'" Id. In other words, in some contexts, the claimant must be able to claim infringement of its reproduction right in order to claim infringement of its right to prepare derivative works.

[1162] Because Google's cache merely stores the text of webpages, our analysis of whether Google's search engine program potentially infringes Perfect 10's display and distribution rights is equally applicable to Google's cache. Perfect 10 is not likely to succeed in showing that a cached webpage that in-line links to full-size infringing images violates such rights. For purposes of this analysis, it is irrelevant whether cache copies direct a user's browser to third-party images that are no longer available on the third party's website, because it is the website publisher's computer, rather than Google's computer, that stores and displays the infringing image.

B. Distribution Right

The district court also concluded that Perfect 10 would not likely prevail on its claim that Google directly infringed Perfect 10's right to distribute its full-size images. Perfect 10, 416 F.Supp.2d at 844-45. The district court reasoned that distribution requires an "actual dissemination" of a copy. Id. at 844. Because Google did not communicate the full-size images to the user's computer, Google did not distribute these images. Id.

Again, the district court's conclusion on this point is consistent with the language of the Copyright Act. Section 106(3) provides that the copyright owner has the exclusive right "to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending." 17 U.S.C. § 106(3). As noted, "copies" means "material objects ... in which a work is fixed." 17 U.S.C. § 101. The Supreme Court has indicated that in the electronic context, copies may be distributed electronically. See N.Y. Times Co. v. Tasini, 533 U.S. 483, 498, 121 S.Ct. 2381, 150 L.Ed.2d 500 (2001) (a computer database program distributed copies of newspaper articles stored in its computerized database by selling copies of those articles through its database service). Google's search engine communicates HTML instructions that tell a user's browser where to find full-size images on a website publisher's computer, but Google does not itself distribute copies of the infringing photographs. It is the website publisher's computer that distributes copies of the images by transmitting the photographic image electronically to the user's computer. As in Tasini, the user can then obtain copies by downloading the photo or printing it.

Perfect 10 incorrectly relies on Hotaling v. Church of Jesus Christ of Latter-Day Saints and Napster for the proposition that merely making images "available" violates the copyright owner's distribution right. Hotaling v. Church of Jesus Christ of Latter-Day Saints, 118 F.3d 199 (4th Cir.1997); Napster, 239 F.3d 1004. Hotaling held that the owner of a collection of works who makes them available to the public may be deemed to have distributed copies of the works. Hotaling, 118 F.3d at 203. Similarly, the distribution rights of the plaintiff copyright owners were infringed by Napster users (private individuals with collections of music files stored on their home computers) when they used the Napster software to make their collections available to all other Napster users. Napster, 239 F.3d at 1011-14.

This "deemed distribution" rule does not apply to Google. Unlike the participants in the Napster system or the library in Hotaling, Google does not own a collection of Perfect 10's full-size images and does not communicate these images to the computers of people using Google's search engine. Though Google indexes these images, it does not have a collection of stored full-size images it makes available to the public. Google therefore cannot be deemed to distribute copies of these images under the reasoning of Napster or [1163] Hotaling. Accordingly, the district court correctly concluded that Perfect 10 does not have a likelihood of success in proving that Google violates Perfect 10's distribution rights with respect to full-size images.

C. Fair Use Defense

Because Perfect 10 has succeeded in showing it would prevail in its prima facie case that Google's thumbnail images infringe Perfect 10's display rights, the burden shifts to Google to show that it will likely succeed in establishing an affirmative defense. Google contends that its use of thumbnails is a fair use of the images and therefore does not constitute an infringement of Perfect 10's copyright. See 17 U.S.C. § 107.

The fair use defense permits the use of copyrighted works without the copyright owner's consent under certain situations. The defense encourages and allows the development of new ideas that build on earlier ones, thus providing a necessary counterbalance to the copyright law's goal of protecting creators' work product. "From the infancy of copyright protection, some opportunity for fair use of copyrighted materials has been thought necessary to fulfill copyright's very purpose...." Campbell, 510 U.S. at 575, 114 S.Ct. 1164. "The fair use doctrine thus `permits [and requires] courts to avoid rigid application of the copyright statute when, on occasion, it would stifle the very creativity which that law is designed to foster.'" Id. at 577, 114 S.Ct. 1164 (quoting Stewart v. Abend, 495 U.S. 207, 236, 110 S.Ct. 1750, 109 L.Ed.2d 184 (1990)) (alteration in original).

Congress codified the common law of fair use in 17 U.S.C. § 107, which provides:

Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include—

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

(4) the effect of the use upon the potential market for or value of the copyrighted work.

The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors.

17 U.S.C. § 107.

We must be flexible in applying a fair use analysis; it "is not to be simplified with bright-line rules, for the statute, like the doctrine it recognizes, calls for case-by-case analysis.... Nor may the four statutory factors be treated in isolation, one from another. All are to be explored, and the results weighed together, in light of the purposes of copyright." Campbell, 510 U.S. at 577-78, 114 S.Ct. 1164; see also Kelly, 336 F.3d at 817-18. The purpose of copyright law is "[t]o promote the Progress of Science and useful Arts," U.S. CONST. art. I, § 8, cl. 8, and to serve "`the welfare of the public.'" Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 429 n. 10, 104 S.Ct. 774, 78 L.Ed.2d 574 (quoting H.R.Rep. No. 2222, 60th Cong., 2d Sess. 7 (1909)).

[1164] In applying the fair use analysis in this case, we are guided by Kelly v. Arriba Soft Corp., which considered substantially the same use of copyrighted photographic images as is at issue here. See 336 F.3d 811. In Kelly, a photographer brought a direct infringement claim against Arriba, the operator of an Internet search engine. The search engine provided thumbnail versions of the photographer's images in response to search queries. Id. at 815-16. We held that Arriba's use of thumbnail images was a fair use primarily based on the transformative nature of a search engine and its benefit to the public. Id. at 818-22. We also concluded that Arriba's use of the thumbnail images did not harm the photographer's market for his image. Id. at 821-22.

In this case, the district court determined that Google's use of thumbnails was not a fair use and distinguished Kelly. Perfect 10, 416 F.Supp.2d at 845-51. We consider these distinctions in the context of the four-factor fair use analysis.

Purpose and character of the use. The first factor, 17 U.S.C. § 107(1), requires a court to consider "the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes." The central purpose of this inquiry is to determine whether and to what extent the new work is "transformative." Campbell, 510 U.S. at 579, 114 S.Ct. 1164. A work is "transformative" when the new work does not "merely supersede the objects of the original creation" but rather "adds something new, with a further purpose or different character, altering the first with new expression, meaning, or message." Id. (internal quotation and alteration omitted). Conversely, if the new work "supersede[s] the use of the original," the use is likely not a fair use. Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 550-51, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985) (internal quotation omitted) (publishing the "heart" of an unpublished work and thus supplanting the copyright holder's first publication right was not a fair use); see also Wall Data Inc. v. L.A. County Sheriff's Dep't, 447 F.3d 769, 778-82 (9th Cir.2006) (using a copy to save the cost of buying additional copies of a computer program was not a fair use).[8]

As noted in Campbell, a "transformative work" is one that alters the original work [1165] "with new expression, meaning, or message." Campbell, 510 U.S. at 579, 114 S.Ct. 1164. "A use is considered transformative only where a defendant changes a plaintiff's copyrighted work or uses the plaintiff's copyrighted work in a different context such that the plaintiff's work is transformed into a new creation." Wall Data, 447 F.3d at 778.

Google's use of thumbnails is highly transformative. In Kelly, we concluded that Arriba's use of thumbnails was transformative because "Arriba's use of the images serve[d] a different function than Kelly's use—improving access to information on the [I]nternet versus artistic expression." Kelly, 336 F.3d at 819. Although an image may have been created originally to serve an entertainment, aesthetic, or informative function, a search engine transforms the image into a pointer directing a user to a source of information. Just as a "parody has an obvious claim to transformative value" because "it can provide social benefit, by shedding light on an earlier work, and, in the process, creating a new one," Campbell, 510 U.S. at 579, 114 S.Ct. 1164, a search engine provides social benefit by incorporating an original work into a new work, namely, an electronic reference tool. Indeed, a search engine may be more transformative than a parody because a search engine provides an entirely new use for the original work, while a parody typically has the same entertainment purpose as the original work. See, e.g., id. at 594-96, 114 S.Ct. 1164 (holding that 2 Live Crew's parody of "Oh, Pretty Woman" using the words "hairy woman" or "bald headed woman" was a transformative work, and thus constituted a fair use); Mattel, Inc. v. Walking Mountain Prods., 353 F.3d 792, 796-98, 800-06 (9th Cir.2003) (concluding that photos parodying Barbie by depicting "nude Barbie dolls juxtaposed with vintage kitchen appliances" was a fair use). In other words, a search engine puts images "in a different context" so that they are "transformed into a new creation." Wall Data, 447 F.3d at 778.

The fact that Google incorporates the entire Perfect 10 image into the search engine results does not diminish the transformative nature of Google's use. As the district court correctly noted, Perfect 10, 416 F.Supp.2d at 848-49, we determined in Kelly that even making an exact copy of a work may be transformative so long as the copy serves a different function than the original work, Kelly, 336 F.3d at 818-19. For example, the First Circuit has held that the republication of photos taken for a modeling portfolio in a newspaper was transformative because the photos served to inform, as well as entertain. See Nunez v. Caribbean Int'l News Corp., 235 F.3d 18, 22-23 (1st Cir.2000). In contrast, duplicating a church's religious book for use by a different church was not transformative. See Worldwide Church of God v. Phila. Church of God, Inc., 227 F.3d 1110, 1117 (9th Cir.2000). Nor was a broadcaster's simple retransmission of a radio broadcast over telephone lines transformative, where the original radio shows were given no "new expression, meaning, or message." Infinity Broad. Corp. v. Kirkwood, 150 F.3d 104, 108 (2d Cir.1998). Here, Google uses Perfect 10's images in a new context to serve a different purpose.

The district court nevertheless determined that Google's use of thumbnail images was less transformative than Arriba's use of thumbnails in Kelly because Google's use of thumbnails superseded Perfect 10's right to sell its reduced-size images for use on cell phones. See Perfect 10, 416 F.Supp.2d at 849. The district court stated that "mobile users can download and save the thumbnails displayed by Google Image Search onto their phones," and concluded "to the extent that users may choose to download free images to their [1166] phone rather than purchase [Perfect 10's] reduced-size images, Google's use supersedes [Perfect 10's]." Id.

Additionally, the district court determined that the commercial nature of Google's use weighed against its transformative nature. Id. Although Kelly held that the commercial use of the photographer's images by Arriba's search engine was less exploitative than typical commercial use, and thus weighed only slightly against a finding of fair use, Kelly, 336 F.3d at 818-20, the district court here distinguished Kelly on the ground that some website owners in the AdSense program had infringing Perfect 10 images on their websites, Perfect 10, 416 F.Supp.2d at 846-47. The district court held that because Google's thumbnails "lead users to sites that directly benefit Google's bottom line," the AdSense program increased the commercial nature of Google's use of Perfect 10's images. Id. at 847.

In conducting our case-specific analysis of fair use in light of the purposes of copyright, Campbell, 510 U.S. at 581, 114 S.Ct. 1164, we must weigh Google's superseding and commercial uses of thumbnail images against Google's significant transformative use, as well as the extent to which Google's search engine promotes the purposes of copyright and serves the interests of the public. Although the district court acknowledged the "truism that search engines such as Google Image Search provide great value to the public," Perfect 10, 416 F.Supp.2d at 848-49, the district court did not expressly consider whether this value outweighed the significance of Google's superseding use or the commercial nature of Google's use. Id. at 849. The Supreme Court, however, has directed us to be mindful of the extent to which a use promotes the purposes of copyright and serves the interests of the public. See Campbell, 510 U.S. at 579, 114 S.Ct. 1164; Harper & Row, 471 U.S. at 556-57, 105 S.Ct. 2218; Sony, 464 U.S. at 431-32, 104 S.Ct. 774.

We note that the superseding use in this case is not significant at present: the district court did not find that any downloads for mobile phone use had taken place. See Perfect 10, 416 F.Supp.2d at 849. Moreover, while Google's use of thumbnails to direct users to AdSense partners containing infringing content adds a commercial dimension that did not exist in Kelly, the district court did not determine that this commercial element was significant. See id. at 848-49. The district court stated that Google's AdSense programs as a whole contributed "$630 million, or 46% of total revenues" to Google's bottom line, but noted that this figure did not "break down the much smaller amount attributable to websites that contain infringing content." Id. at 847 & n. 12 (internal quotation omitted).

We conclude that the significantly transformative nature of Google's search engine, particularly in light of its public benefit, outweighs Google's superseding and commercial uses of the thumbnails in this case. In reaching this conclusion, we note the importance of analyzing fair use flexibly in light of new circumstances. Sony, 464 U.S. at 431-32, 104 S.Ct. 774; id. at 448 n. 31, 104 S.Ct. 774 ("`[Section 107] endorses the purpose and general scope of the judicial doctrine of fair use, but there is no disposition to freeze the doctrine in the statute, especially during a period of rapid technological change.'" (quoting H.R.Rep. No. 94-1476, p. 65-66 (1976), U.S.Code Cong. & Admin. News 1976, p. 5680)). We are also mindful of the Supreme Court's direction that "the more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use." Campbell, 510 U.S. at 579, 114 S.Ct. 1164.

[1167] Accordingly, we disagree with the district court's conclusion that because Google's use of the thumbnails could supersede Perfect 10's cell phone download use and because the use was more commercial than Arriba's, this fair use factor weighed "slightly" in favor of Perfect 10. Perfect 10, 416 F.Supp.2d at 849. Instead, we conclude that the transformative nature of Google's use is more significant than any incidental superseding use or the minor commercial aspects of Google's search engine and website. Therefore, this factor weighs heavily in favor of Google.

The nature of the copyrighted work. With respect to the second factor, "the nature of the copyrighted work," 17 U.S.C. § 107(2), our decision in Kelly is directly on point. There we held that the photographer's images were "creative in nature" and thus "closer to the core of intended copyright protection than are more fact-based works." Kelly, 336 F.3d at 820 (internal quotation omitted). However, because the photos appeared on the Internet before Arriba used thumbnail versions in its search engine results, this factor weighed only slightly in favor of the photographer. Id.

Here, the district court found that Perfect 10's images were creative but also previously published. Perfect 10, 416 F.Supp.2d at 850. The right of first publication is "the author's right to control the first public appearance of his expression." Harper & Row, 471 U.S. at 564, 105 S.Ct. 2218. Because this right encompasses "the choices of when, where, and in what form first to publish a work," id., an author exercises and exhausts this one-time right by publishing the work in any medium. See, e.g., Batjac Prods. Inc. v. Good-Times Home Video Corp., 160 F.3d 1223, 1235 (9th Cir.1998) (noting, in the context of the common law right of first publication, that such a right "does not entail multiple first publication rights in every available medium"). Once Perfect 10 has exploited this commercially valuable right of first publication by putting its images on the Internet for paid subscribers, Perfect 10 is no longer entitled to the enhanced protection available for an unpublished work. Accordingly the district court did not err in holding that this factor weighed only slightly in favor of Perfect 10.[9] See Perfect 10, 416 F.Supp.2d at 849-50.

The amount and substantiality of the portion used. "The third factor asks whether the amount and substantiality of the portion used in relation to the copyrighted work as a whole ... are reasonable in relation to the purpose of the copying." Campbell, 510 U.S. at 586, 114 S.Ct. 1164 (internal quotation omitted); see also 17 U.S.C. § 107(3). In Kelly, we held Arriba's use of the entire photographic image was reasonable in light of the purpose of a search engine. Kelly, 336 F.3d at 821. Specifically, we noted, "[i]t was necessary for Arriba to copy the entire image to allow users to recognize the image and decide whether to pursue more information about the image or the originating [website]. If Arriba only copied part of the image, it would be more difficult to identify it, thereby reducing the usefulness of the visual search engine." Id. Accordingly, we concluded that this factor did not weigh in favor of either [1168] party. Id. Because the same analysis applies to Google's use of Perfect 10's image, the district court did not err in finding that this factor favored neither party.

Effect of use on the market. The fourth factor is "the effect of the use upon the potential market for or value of the copyrighted work." 17 U.S.C. § 107(4). In Kelly, we concluded that Arriba's use of the thumbnail images did not harm the market for the photographer's full-size images. See Kelly, 336 F.3d at 821-22. We reasoned that because thumbnails were not a substitute for the full-sized images, they did not harm the photographer's ability to sell or license his full-sized images. Id. The district court here followed Kelly's reasoning, holding that Google's use of thumbnails did not hurt Perfect 10's market for full-size images. See Perfect 10, 416 F.Supp.2d at 850-51. We agree.

Perfect 10 argues that the district court erred because the likelihood of market harm may be presumed if the intended use of an image is for commercial gain. However, this presumption does not arise when a work is transformative because "market substitution is at least less certain, and market harm may not be so readily inferred." Campbell, 510 U.S. at 591, 114 S.Ct. 1164. As previously discussed, Google's use of thumbnails for search engine purposes is highly transformative, and so market harm cannot be presumed.

Perfect 10 also has a market for reduced-size images, an issue not considered in Kelly. The district court held that "Google's use of thumbnails likely does harm the potential market for the downloading of [Perfect 10's] reduced-size images onto cell phones." Perfect 10, 416 F.Supp.2d at 851 (emphasis omitted). The district court reasoned that persons who can obtain Perfect 10 images free of charge from Google are less likely to pay for a download, and the availability of Google's thumbnail images would harm Perfect 10's market for cell phone downloads. Id. As we discussed above, the district court did not make a finding that Google users have downloaded thumbnail images for cell phone use. This potential harm to Perfect 10's market remains hypothetical. We conclude that this factor favors neither party.

Having undertaken a case-specific analysis of all four factors, we now weigh these factors together "in light of the purposes of copyright." Campbell, 510 U.S. at 578, 114 S.Ct. 1164; see also Kelly, 336 F.3d at 818 ("We must balance[the section 107] factors in light of the objectives of copyright law, rather than view them as definitive or determinative tests."). In this case, Google has put Perfect 10's thumbnail images (along with millions of other thumbnail images) to a use fundamentally different than the use intended by Perfect 10. In doing so, Google has provided a significant benefit to the public. Weighing this significant transformative use against the unproven use of Google's thumbnails for cell phone downloads, and considering the other fair use factors, all in light of the purpose of copyright, we conclude that Google's use of Perfect 10's thumbnails is a fair use. Because the district court here "found facts sufficient to evaluate each of the statutory factors ... [we] need not remand for further factfinding." Harper & Row, 471 U.S. at 560, 105 S.Ct. 2218 (internal quotation omitted). We conclude that Google is likely to succeed in proving its fair use defense and, accordingly, we vacate the preliminary injunction regarding Google's use of thumbnail images.

IV

Secondary Liability for Copyright Infringement

We now turn to the district court's ruling that Google is unlikely to be secondarily [1169] liable for its in-line linking to infringing full-size images under the doctrines of contributory and vicarious infringement.[10] The district court ruled that Perfect 10 did not have a likelihood of proving success on the merits of either its contributory infringement or vicarious infringement claims with respect to the full-size images. See Perfect 10, 416 F.Supp.2d at 856, 858. In reviewing the district court's conclusions, we are guided by the Supreme Court's recent interpretation of secondary liability, namely: "[o]ne infringes contributorily by intentionally inducing or encouraging direct infringement, and infringes vicariously by profiting from direct infringement while declining to exercise a right to stop or limit it." Grokster, 545 U.S. at 930, 125 S.Ct. 2764 (internal citations omitted).

Direct Infringement by Third Parties. As a threshold matter, before we examine Perfect 10's claims that Google is secondarily liable, Perfect 10 must establish that there has been direct infringement by third parties. See Napster, 239 F.3d at 1013 n. 2 ("Secondary liability for copyright infringement does not exist in the absence of direct infringement by a third party.").

Perfect 10 alleges that third parties directly infringed its images in three ways. First, Perfect 10 claims that third-party websites directly infringed its copyright by reproducing, displaying, and distributing unauthorized copies of Perfect 10's images. Google does not dispute this claim on appeal.

Second, Perfect 10 claims that individual users of Google's search engine directly infringed Perfect 10's copyrights by storing full-size infringing images on their computers. We agree with the district court's conclusion that Perfect 10 failed to provide sufficient evidence to support this claim. See Perfect 10, 416 F.Supp.2d at 852. There is no evidence in the record directly establishing that users of Google's search engine have stored infringing images on their computers, and the district court did not err in declining to infer the existence of such evidence.

Finally, Perfect 10 contends that users who link to infringing websites automatically make "cache" copies of full-size images and thereby directly infringe Perfect 10's reproduction right. The district court rejected this argument, holding that any such reproduction was likely a "fair use." Id. at 852 n. 17. The district court reasoned that "[l]ocal caching by the browsers of individual users is noncommercial, transformative, and no more than necessary to achieve the objectives of decreasing network latency and minimizing unnecessary bandwidth usage (essential to the [I]nternet). It has a minimal impact on the potential market for the original work...." Id. We agree; even assuming such automatic copying could constitute direct infringement, it is a fair use in this context. The copying function performed automatically by a user's computer to assist in accessing the Internet is a transformative use. Moreover, as noted by the district court, a cache copies no more than is necessary to assist the user in Internet use. It is designed to enhance an individual's computer use, not to supersede the copyright holders' exploitation of their works. Such automatic background copying has no more than a minimal effect on Perfect 10's rights, but a considerable public benefit. Because the four fair use factors weigh in favor of concluding that [1170] cache copying constitutes a fair use, Google has established a likelihood of success on this issue. Accordingly, Perfect 10 has not carried its burden of showing that users' cache copies of Perfect 10's full-size images constitute direct infringement.

Therefore, we must assess Perfect 10's arguments that Google is secondarily liable in light of the direct infringement that is undisputed by the parties: third-party websites' reproducing, displaying, and distributing unauthorized copies of Perfect 10's images on the Internet. Id. at 852.

A. Contributory Infringement

In order for Perfect 10 to show it will likely succeed in its contributory liability claim against Google, it must establish that Google's activities meet the definition of contributory liability recently enunciated in Grokster. Within the general rule that "[o]ne infringes contributorily by intentionally inducing or encouraging direct infringement," Grokster, 545 U.S. at 930, 125 S.Ct. 2764, the Court has defined two categories of contributory liability: "Liability under our jurisprudence may be predicated on actively encouraging (or inducing) infringement through specific acts (as the Court's opinion develops) or on distributing a product distributees use to infringe copyrights, if the product is not capable of `substantial' or `commercially significant' noninfringing uses." Id. at 942, 125 S.Ct. 2764 (Ginsburg, J., concurring) (quoting Sony, 464 U.S. at 442, 104 S.Ct. 774); see also id. at 936-37, 125 S.Ct. 2764.

Looking at the second category of liability identified by the Supreme Court (distributing products), Google relies on Sony, 464 U.S. at 442, 104 S.Ct. 774, to argue that it cannot be held liable for contributory infringement because liability does not arise from the mere sale of a product (even with knowledge that consumers would use the product to infringe) if the product is capable of substantial non-infringing use. Google argues that its search engine service is such a product. Assuming the principle enunciated in Sony is applicable to the operation of Google's search engine, then Google cannot be held liable for contributory infringement solely because the design of its search engine facilitates such infringement. Grokster, 545 U.S. at 931-32, 125 S.Ct. 2764 (discussing Sony, 464 U.S. 417, 104 S.Ct. 774, 78 L.Ed.2d 574). Nor can Google be held liable solely because it did not develop technology that would enable its search engine to automatically avoid infringing images. See id. at 939 n. 12, 125 S.Ct. 2764. However, Perfect 10 has not based its claim of infringement on the design of Google's search engine and the Sony rule does not immunize Google from other sources of contributory liability. See id. at 933-34, 125 S.Ct. 2764.

We must next consider whether Google could be held liable under the first category of contributory liability identified by the Supreme Court, that is, the liability that may be imposed for intentionally encouraging infringement through specific acts.[11] Grokster tells us that contribution to infringement must be intentional for liability to arise. Grokster, 545 U.S. at 930, 125 S.Ct. 2764. However, Grokster also directs us to analyze contributory liability in light of "rules of fault-based liability derived from the common law," id. at 934-35, 125 S.Ct. 2764, and [1171] common law principles establish that intent may be imputed. "Tort law ordinarily imputes to an actor the intention to cause the natural and probable consequences of his conduct." DeVoto v. Pac. Fid. Life Ins. Co., 618 F.2d 1340, 1347 (9th Cir. 1980); RESTATEMENT (SECOND) OF TORTS § 8A cmt. b (1965) ("If the actor knows that the consequences are certain, or substantially certain, to result from his act, and still goes ahead, he is treated by the law as if he had in fact desired to produce the result."). When the Supreme Court imported patent law's "staple article of commerce doctrine" into the copyright context, it also adopted these principles of imputed intent. Grokster, 545 U.S. at 932, 125 S.Ct. 2764 ("The [staple article of commerce] doctrine was devised to identify instances in which it may be presumed from distribution of an article in commerce that the distributor intended the article to be used to infringe another's patent, and so may justly be held liable for that infringement."). Therefore, under Grokster, an actor may be contributorily liable for intentionally encouraging direct infringement if the actor knowingly takes steps that are substantially certain to result in such direct infringement.

Our tests for contributory liability are consistent with the rule set forth in Grokster. We have adopted the general rule set forth in Gershwin Publishing Corp. v. Columbia Artists Management, Inc., namely: "one who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another, may be held liable as a `contributory' infringer," 443 F.2d 1159, 1162 (2d Cir.1971). See Ellison, 357 F.3d at 1076; Napster, 239 F.3d at 1019; Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259, 264 (9th Cir.1996).

We have further refined this test in the context of cyberspace[12] to determine when contributory liability can be imposed on a provider of Internet access or services. See Napster, 239 F.3d at 1019-20. In Napster, we considered claims that the operator of an electronic file sharing system was contributorily liable for assisting individual users to swap copyrighted music files stored on their home computers with other users of the system. Napster, 239 F.3d at 1011-13, 1019-22. We stated that "if a computer system operator learns of specific infringing material available on his system and fails to purge such material from the system, the operator knows of and contributes to direct infringement." Id. at 1021. Because Napster knew of the availability of infringing music files, assisted users in accessing such files, and failed to block access to such files, we concluded that Napster materially contributed to infringement. Id. at 1022.

The Napster test for contributory liability was modeled on the influential district court decision in Religious Technology Center v. Netcom On-Line Communication Services, Inc. (Netcom), 907 F.Supp. 1361, 1365-66 (N.D.Cal.1995). See Napster, 239 F.3d at 1021. In Netcom, a disgruntled former Scientology minister posted allegedly infringing copies of Scientological works on an electronic bulletin board service. Netcom, 907 F.Supp. at 1365-66. The messages were stored on the bulletin board operator's computer, then automatically copied onto Netcom's computer, and from there copied onto other computers comprising "a worldwide community" of electronic bulletin board systems. Id. at 1366-67 & n. 4 (internal quotation omitted). Netcom held that if plaintiffs [1172] could prove that Netcom knew or should have known that the minister infringed plaintiffs' copyrights, "Netcom [would] be liable for contributory infringement since its failure to simply cancel [the former minister's] infringing message and thereby stop an infringing copy from being distributed worldwide constitute[d] substantial participation in [the former minister's] public distribution of the message." Id. at 1374.

Although neither Napster nor Netcom expressly required a finding of intent, those cases are consistent with Grokster because both decisions ruled that a service provider's knowing failure to prevent infringing actions could be the basis for imposing contributory liability. Under such circumstances, intent may be imputed. In addition, Napster and Netcom are consistent with the longstanding requirement that an actor's contribution to infringement must be material to warrant the imposition of contributory liability. Gershwin, 443 F.2d at 1162. Both Napster and Netcom acknowledge that services or products that facilitate access to websites throughout the world can significantly magnify the effects of otherwise immaterial infringing activities. See Napster, 239 F.3d at 1022; Netcom, 907 F.Supp. at 1375. The Supreme Court has acknowledged that "[t]he argument for imposing indirect liability" is particularly "powerful" when individuals using the defendant's software could make a huge number of infringing downloads every day. Grokster, 545 U.S. at 929, 125 S.Ct. 2764. Moreover, copyright holders cannot protect their rights in a meaningful way unless they can hold providers of such services or products accountable for their actions pursuant to a test such as that enunciated in Napster. See id. at 929-30, 125 S.Ct. 2764 ("When a widely shared service or product is used to commit infringement, it may be impossible to enforce rights in the protected work effectively against all direct infringers, the only practical alternative being to go against the distributor of the copying device for secondary liability on a theory of contributory or vicarious infringement."). Accordingly, we hold that a computer system operator can be held contributorily liable if it "has actual knowledge that specific infringing material is available using its system," Napster, 239 F.3d at 1022, and can "take simple measures to prevent further damage" to copyrighted works, Netcom, 907 F.Supp. at 1375, yet continues to provide access to infringing works.

Here, the district court held that even assuming Google had actual knowledge of infringing material available on its system, Google did not materially contribute to infringing conduct because it did not undertake any substantial promotional or advertising efforts to encourage visits to infringing websites, nor provide a significant revenue stream to the infringing websites. Perfect 10, 416 F.Supp.2d at 854-56. This analysis is erroneous. There is no dispute that Google substantially assists websites to distribute their infringing copies to a worldwide market and assists a worldwide audience of users to access infringing materials. We cannot discount the effect of such a service on copyright owners, even though Google's assistance is available to all websites, not just infringing ones. Applying our test, Google could be held contributorily liable if it had knowledge that infringing Perfect 10 images were available using its search engine, could take simple measures to prevent further damage to Perfect 10's copyrighted works, and failed to take such steps.

The district court did not resolve the factual disputes over the adequacy of Perfect 10's notices to Google and Google's responses to these notices. Moreover, there are factual disputes over whether there are reasonable and feasible means for Google to refrain from providing access [1173] to infringing images. Therefore, we must remand this claim to the district court for further consideration whether Perfect 10 would likely succeed in establishing that Google was contributorily liable for in-line linking to full-size infringing images under the test enunciated today.[13]

B. Vicarious Infringement

Perfect 10 also challenges the district court's conclusion that it is not likely to prevail on a theory of vicarious liability against Google. Perfect 10, 416 F.Supp.2d at 856-58. Grokster states that one "infringes vicariously by profiting from direct infringement while declining to exercise a right to stop or limit it." Grokster, 545 U.S. at 930, 125 S.Ct. 2764. As this formulation indicates, to succeed in imposing vicarious liability, a plaintiff must establish that the defendant exercises the requisite control over the direct infringer and that the defendant derives a direct financial benefit from the direct infringement. See id. Grokster further explains the "control" element of the vicarious liability test as the defendant's "right and ability to supervise the direct infringer." Id. at 930 n. 9, 125 S.Ct. 2764. Thus, under Grokster, a defendant exercises control over a direct infringer when he has both a legal right to stop or limit the directly infringing conduct, as well as the practical ability to do so.

We evaluate Perfect 10's arguments that Google is vicariously liable in light of the direct infringement that is undisputed by the parties, namely, the third-party websites' reproduction, display, and distribution of unauthorized copies of Perfect 10's images on the Internet. Perfect 10, 416 F.Supp.2d at 852; see supra Section IV.A. In order to prevail at this preliminary injunction stage, Perfect 10 must demonstrate a likelihood of success in establishing that Google has the right and ability to stop or limit the infringing activities of third party websites. In addition, Perfect 10 must establish a likelihood of proving that Google derives a direct financial benefit from such activities. Perfect 10 has not met this burden.

With respect to the "control" element set forth in Grokster, Perfect 10 has not demonstrated a likelihood of showing that Google has the legal right to stop or limit the direct infringement of third-party websites. See Grokster, 545 U.S. at 930, 125 S.Ct. 2764. Unlike Fonovisa, where by virtue of a "broad contract" with its vendors the defendant swap meet operators had the right to stop the vendors from selling counterfeit recordings on its premises, Fonovisa, 76 F.3d at 263, Perfect 10 has not shown that Google has contracts with third-party websites that empower Google to stop or limit them from reproducing, displaying, and distributing infringing copies of Perfect 10's images on the Internet. Perfect 10 does point to Google's AdSense agreement, which states that Google reserves "the right to monitor and terminate partnerships with entities that violate others' copyright[s]." Perfect 10, 416 F.Supp.2d at 858. However, Google's right to terminate an AdSense partnership does not give Google the right to [1174] stop direct infringement by third-party websites. An infringing third-party website can continue to reproduce, display, and distribute its infringing copies of Perfect 10 images after its participation in the AdSense program has ended.

Nor is Google similarly situated to Napster. Napster users infringed the plaintiffs' reproduction and distribution rights through their use of Napster's proprietary music-file sharing system. Napster, 239 F.3d at 1011-14. There, the infringing conduct was the use of Napster's "service to download and upload copyrighted music." Id. at 1014 (internal quotation omitted). Because Napster had a closed system requiring user registration, and could terminate its users' accounts and block their access to the Napster system, Napster had the right and ability to prevent its users from engaging in the infringing activity of uploading file names and downloading Napster users' music files through the Napster system.[14] Id. at 1023-24. By contrast, Google cannot stop any of the third-party websites from reproducing, displaying, and distributing unauthorized copies of Perfect 10's images because that infringing conduct takes place on the third-party websites. Google cannot terminate those third-party websites or block their ability to "host and serve infringing full-size images" on the Internet. Perfect 10, 416 F.Supp.2d at 831.

Moreover, the district court found that Google lacks the practical ability to police the third-party websites' infringing conduct. Id. at 857-58. Specifically, the court found that Google's supervisory power is limited because "Google's software lacks the ability to analyze every image on the [I]nternet, compare each image to all the other copyrighted images that exist in the world ... and determine whether a certain image on the web infringes someone's copyright." Id. at 858. The district court also concluded that Perfect 10's suggestions regarding measures Google could implement to prevent its web crawler from indexing infringing websites and to block access to infringing images were not workable. Id. at 858 n. 25. Rather, the suggestions suffered from both "imprecision and overbreadth." Id. We hold that these findings are not clearly erroneous. Without image-recognition technology, Google lacks the practical ability to police the infringing activities of third-party websites. This distinguishes Google from the defendants held liable in Napster and Fonovisa. See Napster, 239 F.3d at 1023-24 (Napster had the ability to identify and police infringing conduct by searching its index for song titles); Fonovisa, 76 F.3d at 262 (swap meet operator had the ability to identify and police infringing activity by patrolling its premises).

Perfect 10 argues that Google could manage its own operations to avoid [1175] indexing websites with infringing content and linking to third-party infringing sites. This is a claim of contributory liability, not vicarious liability. Although "the lines between direct infringement, contributory infringement, and vicarious liability are not clearly drawn," Sony, 464 U.S. at 435 n. 17, 104 S.Ct. 774 (internal quotation omitted), in general, contributory liability is based on the defendant's failure to stop its own actions which facilitate third-party infringement, while vicarious liability is based on the defendant's failure to cause a third party to stop its directly infringing activities. See, e.g., Ellison, 357 F.3d at 1077-78; Fonovisa, 76 F.3d at 261-64. Google's failure to change its operations to avoid assisting websites to distribute their infringing content may constitute contributory liability, see supra Section IV.A. However, this failure is not the same as declining to exercise a right and ability to make third-party websites stop their direct infringement. We reject Perfect 10's efforts to blur this distinction.

Because we conclude that Perfect 10 has not shown a likelihood of establishing Google's right and ability to stop or limit the directly infringing conduct of third-party websites, we agree with the district court's conclusion that Perfect 10 "has not established a likelihood of proving the [control] prong necessary for vicarious liability." Perfect 10, 416 F.Supp.2d at 858.[15]

C. Digital Millennium Copyright Act

Google claims that it qualifies for the limitations on liability set forth in title II of the DMCA, 17 U.S.C. § 512. In particular, section 512(d) limits the liability of a service provider "for infringement of copyright by reason of the provider referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link" if the service provider meets certain criteria. We have held that the limitations on liability contained in 17 U.S.C. § 512 protect secondary infringers as well as direct infringers. Napster, 239 F.3d at 1025.

The parties dispute whether Google meets the specified criteria. Perfect 10 claims that it sent qualifying notices to Google and Google did not act expeditiously to remove the infringing material. Google claims that Perfect 10's notices did not comply with the notice provisions of section 512 and were not adequate to inform Google of the location of the infringing images on the Internet or identify the underlying copyrighted work. Google also claims that it responded to all notices it received by investigating the webpages identified by Perfect 10 and suppressing links to any webpages that Google confirmed were infringing.

Because the district court determined that Perfect 10 was unlikely to succeed on its contributory and vicarious liability claims, it did not reach Google's arguments under section 512. In revisiting the question of Perfect 10's likelihood of success on its contributory infringement claims, the district court should also consider whether Google would likely succeed in showing that it was entitled to the limitations on injunctive relief provided by title II of the DMCA.

V

Amazon.com

Perfect 10 claims that Amazon.com displays and distributes Perfect 10's copyrighted images and is also secondarily [1176] liable for the infringements of third-party websites and Amazon.com users. The district court concluded that Perfect 10 was unlikely to succeed in proving that Amazon.com was a direct infringer, because it merely in-line linked to the thumbnails on Google's servers and to the full-size images on third-party websites.[16] Perfect 10 v. Amazon, No. 05-4753, consolidated with 04-9484 (C.D.Cal. February 21, 2006) (order denying preliminary injunction). In addition, the district court concluded that Perfect 10's secondary infringement claims against Amazon.com were likely to fail because Amazon.com had no program analogous to AdSense, and thus did not provide any revenues to infringing sites. Id. Finally, the district court determined that Amazon.com's right and ability to control the infringing conduct of third-party websites was substantially less than Google's. Id. Therefore, the district court denied Perfect 10's motion for a preliminary injunction against Amazon.com. Id.

We agree that Perfect 10 has not shown a likelihood that it would prevail on the merits of its claim that Amazon.com directly infringed its images. Amazon.com communicates to its users only the HTML instructions that direct the users' browsers to Google's computers (for thumbnail images) or to a third party's computer (for full-size infringing images). Therefore, Amazon.com does not display or distribute a copy of the thumbnails or full-size images to its users.

We also agree with the district court's conclusion that Amazon.com does not have "the right and ability to supervise the infringing activity" of Google or third parties. The district court did not clearly err in concluding that Amazon.com lacked a direct financial interest in such activities. Therefore, Perfect 10's claim that Amazon.com is vicariously liable for third-party infringement is unlikely to succeed.

However, the district court did not consider whether Amazon.com had "actual knowledge that specific infringing material is available using its system," Napster, 239 F.3d at 1022 (emphasis in original), and could have "take[n] simple measures to prevent further damage" to copyrighted works, Netcom, 907 F.Supp. at 1375, yet continued to provide access to infringing works. Perfect 10 has presented evidence that it notified Amazon.com that it was facilitating its users' access to infringing material. It is disputed whether the notices gave Amazon.com actual knowledge of specific infringing activities available using its system, and whether Amazon.com could have taken reasonable and feasible steps to refrain from providing access to such images, but failed to do so. Nor did the district court consider whether Amazon.com is entitled to limit its liability under title II of the DMCA. On remand, the district court should consider Amazon.com's potential contributory liability, as well as possible limitations on the scope of injunctive relief, in light of our rulings today.

VI

We conclude that Google's fair use defense is likely to succeed at trial, and therefore we reverse the district court's determination that Google's thumbnail versions of Perfect 10's images likely constituted a direct infringement. The district court also erred in its secondary liability [1177] analysis because it failed to consider whether Google and Amazon.com knew of infringing activities yet failed to take reasonable and feasible steps to refrain from providing access to infringing images. Therefore we must also reverse the district court's holding that Perfect 10 was unlikely to succeed on the merits of its secondary liability claims. Due to this error, the district court did not consider whether Google and Amazon.com are entitled to the limitations on liability set forth in title II of the DMCA. The question whether Google and Amazon.com are secondarily liable, and whether they can limit that liability pursuant to title II of the DMCA, raise fact-intensive inquiries, potentially requiring further fact finding, and thus can best be resolved by the district court on remand. We therefore remand this matter to the district court for further proceedings consistent with this decision.

Because the district court will need to reconsider the appropriate scope of injunctive relief after addressing these secondary liability issues, we do not address the parties' arguments regarding the scope of the injunction issued by the district court. For the same reason, we do not address the parties' dispute over whether the district court abused its discretion in determining that Perfect 10 satisfied the irreparable harm element of a preliminary injunction.

Therefore, we reverse the district court's ruling and vacate the preliminary injunction regarding Google's use of thumbnail versions of Perfect 10's images.[17] We reverse the district court's rejection of the claims that Google and Amazon.com are secondarily liable for infringement of Perfect 10's full-size images. We otherwise affirm the rulings of the district court. We remand this matter for further proceedings consistent with this opinion. Each party shall bear its own costs on appeal. See FED. R. APP. P. 39(a)(4).

AFFIRMED IN PART; REVERSED IN PART; REMANDED.

[1] Google argues that we lack jurisdiction over the preliminary injunction to the extent it enforces unregistered copyrights. Registration is generally a jurisdictional prerequisite to a suit for copyright infringement. See 17 U.S.C. § 411. But section 411 does not limit the remedies a court can grant. Rather, the Copyright Act gives courts broad authority to issue injunctive relief. See 17 U.S.C. § 502(a). Once a court has jurisdiction over an action for copyright infringement under section 411, the court may grant injunctive relief to restrain infringement of any copyright, whether registered or unregistered. See, e.g., Olan Mills, Inc. v. Linn Photo Co., 23 F.3d 1345, 1349 (8th Cir.1994); Pac. & S. Co., Inc. v. Duncan, 744 F.2d 1490, 1499 n. 17 (11th Cir.1984). Because at least some of the Perfect 10 images at issue were registered, the district court did not err in determining that it could issue an order that covers unregistered works. Therefore, we have jurisdiction over the district court's decision and order.

[2] The website publisher may not actually store the photographic images used on its webpages in its own computer, but may provide HTML instructions directing the user's browser to some further computer that stores the image. Because this distinction does not affect our analysis, for convenience, we will assume that the website publisher stores all images used on its webpages in the website publisher's own computer.

[3] Generally, a "cache" is "a computer memory with very short access time used for storage of frequently or recently used instructions or data." United States v. Ziegler, 474 F.3d 1184, 1186 n. 3 (9th Cir.2007) (quoting MERRIAM-WEBSTER'S COLLEGIATE DICTIONARY 171 (11th ed.2003)). There are two types of caches at issue in this case. A user's personal computer has an internal cache that saves copies of webpages and images that the user has recently viewed so that the user can more rapidly revisit these webpages and images. Google's computers also have a cache which serves a variety of purposes. Among other things, Google's cache saves copies of a large number of webpages so that Google's search engine can efficiently organize and index these webpages.

[4] Perfect 10 argues that we are bound by the language and structure of title II of the DMCA in determining Google's liability for copyright infringement. We have noted that the DMCA does not change copyright law; rather, "Congress provided that [the DMCA's] limitations of liability apply if the provider is found to be liable under existing principles of law." Ellison, 357 F.3d at 1077 (emphasis and internal quotation omitted). As a result, "[c]laims against service providers for direct, contributory, or vicarious copyright infringement, therefore, are generally evaluated just as they would be in the non-online world." Id.; see also 17 U.S.C. § 512(l) ("The failure of a service provider's conduct to qualify for limitation of liability under this section shall not bear adversely upon the consideration of a defense by the service provider that the service provider's conduct is not infringing under this title or any other defense."). Therefore, we must consider Google's potential liability under the Copyright Act without reference to title II of the DMCA.

[5] 17 U.S.C. § 106 states, in pertinent part:

Subject to sections 107 through 122, the owner of copyright under this title has the exclusive rights to do and to authorize any of the following:

(1) to reproduce the copyrighted work in copies or phonorecords;

....

(3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending;

....

(5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly....

[6] Because Google initiates and controls the storage and communication of these thumbnail images, we do not address whether an entity that merely passively owns and manages an Internet bulletin board or similar system violates a copyright owner's display and distribution rights when the users of the bulletin board or similar system post infringing works. Cf. CoStar Group, Inc. v. LoopNet, Inc., 373 F.3d 544 (4th Cir.2004).

[7] Perfect 10 also argues that Google violates Perfect 10's right to display full-size images because Google's in-line linking meets the Copyright Act's definition of "to perform or display a work `publicly.'" 17 U.S.C. § 101. This phrase means "to transmit or otherwise communicate a performance or display of the work to ... the public, by means of any device or process, whether the members of the public capable of receiving the performance or display receive it in the same place or in separate places and at the same time or at different times." Id. Perfect 10 is mistaken. Google's activities do not meet this definition because Google transmits or communicates only an address which directs a user's browser to the location where a copy of the full-size image is displayed. Google does not communicate a display of the work itself.

[8] We reject at the outset Perfect 10's argument that providing access to infringing websites cannot be deemed transformative and is inherently not fair use. Perfect 10 relies on Video Pipeline, Inc. v. Buena Vista Home Entm't, Inc., 342 F.3d 191 (3d Cir.2003), and Atari Games Corp. v. Nintendo of Am. Inc., 975 F.2d 832, 843 (Fed.Cir.1992). But these cases, in essence, simply apply the general rule that a party claiming fair use must act in a manner generally compatible with principles of good faith and fair dealing. See Harper & Row, 471 U.S. at 562-63, 105 S.Ct. 2218. For this reason, a company whose business is based on providing scenes from copyrighted movies without authorization could not claim that it provided the same public benefit as the search engine in Kelly. See Video Pipeline, 342 F.3d at 198-200. Similarly, a company whose overriding desire to replicate a competitor's computer game led it to obtain a copy of the competitor's source code from the Copyright Office under false pretenses could not claim fair use with respect to its purloined copy. Atari Games, 975 F.2d at 843.

Unlike the alleged infringers in Video Pipeline and Atari Games, who intentionally misappropriated the copyright owners' works for the purpose of commercial exploitation, Google is operating a comprehensive search engine that only incidentally indexes infringing websites. This incidental impact does not amount to an abuse of the good faith and fair dealing underpinnings of the fair use doctrine. Accordingly, we conclude that Google's inclusion of thumbnail images derived from infringing websites in its Internet-wide search engine activities does not preclude Google from raising a fair use defense.

[9] Google contends that Perfect 10's photographic images are less creative and less deserving of protection than the images of the American West in Kelly because Perfect 10 boasts of its un-retouched photos showing the natural beauty of its models. Having reviewed the record, we conclude that the district court's finding that Perfect 10's photographs "consistently reflect professional, skillful, and sometimes tasteful artistry" is not clearly erroneous. Perfect 10, 416 F.Supp.2d at 849 n. 15. We agree with the district court that there is no basis for concluding that photos of the American West are more deserving of protection than photos of nude models. See id.

[10] Because the district court concluded that Perfect 10 was likely to prevail on its direct infringement claim with respect to Google's use of thumbnails, but not with respect to its in-line linking to full-size images, the district court considered Google's potential secondary liability only on the second issue.

[11] Google's activities do not meet the "inducement" test explained in Grokster because Google has not promoted the use of its search engine specifically to infringe copyrights. See Grokster, 545 U.S. at 935-37, 125 S.Ct. 2764. However, the Supreme Court in Grokster did not suggest that a court must find inducement in order to impose contributory liability under common law principles.

[12] "Cyberspace is a popular term for the world of electronic communications over computer networks." Religious Tech. Ctr. v. Netcom On-Line Commc'n Servs., Inc., 907 F.Supp. 1361, 1365 n. 1 (N.D.Cal.1995).

[13] Perfect 10 claims that Google materially contributed to infringement by linking to websites containing unauthorized passwords, which enabled Google users to access Perfect 10's website and make infringing copies of images. However, Perfect 10 points to no evidence that users logging onto the Perfect 10 site with unauthorized passwords infringed Perfect 10's exclusive rights under section 106. In the absence of evidence that Google's actions led to any direct infringement, this argument does not assist Perfect 10 in establishing that it would prevail on the merits of its contributory liability claim. See Napster, 239 F.3d at 1013 n. 2 ("Secondary liability for copyright infringement does not exist in the absence of direct infringement by a third party.").

[14] Napster's system included "Napster's MusicShare software, available free of charge from Napster's Internet site, and Napster's network servers and server-side software." Napster, 239 F.3d at 1011. By downloading Napster's MusicShare software to the user's personal computer, and registering with the Napster system, a user could both upload and download music files. Id. at 1011-13. If the Napster user uploaded a list of music files stored on the user's personal computer to the Napster system, such music files would be automatically available to other Napster users whenever the user was logged on to the Napster system. Id. at 1012. In addition, the Napster user could download music files directly from other users' personal computers. Id. We explained the infringing conduct as "Napster users who upload file names to the [Napster] search index for others to copy violate plaintiffs' distribution rights. Napster users who download files [through the Napster system] containing copyrighted music violate plaintiffs' reproduction rights." Id. at 1014.

[15] Having so concluded, we need not reach Perfect 10's argument that Google received a direct financial benefit.

[16] Amazon.com states that it ended its relationship with Google on April 30, 2006. Perfect 10's action for preliminary injunction against Amazon.com is not moot, however, because Amazon.com has not established "that the allegedly wrongful behavior cannot reasonably be expected to recur." F.T.C. v. Affordable Media, LLC, 179 F.3d 1228, 1238 (9th Cir.1999) (internal quotation omitted).

[17] Because we vacate the injunction, Google's motion for stay of the injunction is moot.

2.9 Cvent, Inc. v. Eventbrite, Inc. 2.9 Cvent, Inc. v. Eventbrite, Inc.

739 F.Supp.2d 927

United States District Court,
E.D. Virginia,
Alexandria Division.

CVENT, INC., Plaintiff,
v.
EVENTBRITE, INC., et al., Defendants.

No. 1:10–cv–00481 (LMB/IDD).
Sept. 15, 2010.

Attorneys and Law Firms

Oliver Garcia, Thomas Edward Shakow, Aegis Law Group, LLP, Washington, DC, for Plaintiff.

Deneen J. Melander, Robbins, Russell, Englert, Orseck, Untereiner & Sauber, LLP, Kevin Edward Byrnes, Schnader, Harrison, Segal & Lewis, LLP, Washington, DC, for Defedants.

MEMORANDUM OPINION

LEONIE M. BRINKEMA, District Judge.

Before the Court is defendant Eventbrite's motion to dismiss several of the counts in the plaintiff's first amended complaint for failure to state a claim. For the reasons stated in open court and in this opinion, the defendant's motion will be granted in part and denied in part.

I. Background

This case arises out of the alleged intellectual property theft of data from plaintiff Cvent's website by Eventbrite and an individual by the name of Stephan Foley, using a method known as “scraping.” Cvent, Inc. is a Delaware software company with its principal place of business in McLean, Virginia, which licenses web-hosted software for use by companies and their meeting planners. Cvent is the owner and operator of a website at www.cvent.com, which, among other things, assists customers in locating venues for and organizing large-scale events. As part of that business; Cvent has created a web-based database of meeting venues around the world, called the Cvent Supplier Network, which includes detailed information about each venue, such as the availability and capacity of meeting rooms and venue amenities and services. Cvent has also undertaken development of a “Destination Guide,” an informational resource of city-specific profiles designed for meeting and event planners. The complaint alleges that Cvent has invested substantial sums of money into developing its website, including the Cvent Supplier Network and the Destination Guide pages, and that it has obtained and registered copyrights for its website, which are displayed on its website pages. Cvent currently holds three copyright registrations for its website content that are relevant to this case, each of which was filed in late April 2010.

Defendant Eventbrite, Inc. is a Delaware corporation with its principal place of business in San Francisco, California, which maintains an online event planning, sales, and registration service hosted on its website, www.eventbrite.com. Cvent alleges that in September and October 2008, Eventbrite set out to create a set of pages (a “Venue Directory”) on its website containing a collection of publicly available information about hotels, restaurants, bars, and meeting venues in various cities. Most of the information in Eventbrite's Venue Directory is publicly available from the website of each hotel and restaurant. Cvent alleges that rather than aggregating that information itself, Eventbrite hired Stephan Foley, a computer engineer, to “scrape” (i.e. copy) the information directly from Cvent's website. Cvent further alleges that Eventbrite then reformatted the material into its own layouts and made it available on the Eventbrite website. Eventbrite compensated Foley in November 2008 for his work in scraping the venue information from the Cvent website.

On May 10, 2010, Cvent filed a complaint against Eventbrite and unknown Does 1–10. On July 28, 2010, following expedited discovery as to the identifies of Does 1–10, Cvent filed a first amended complaint, naming only Eventbrite and Stephan Foley as defendants. The first amended complaint sets out eight claims for relief, on the following grounds:

1. Copyright Infringement, 17 U.S.C. § 101 et seq.

2. Violation of the Computer Fraud and Abuse Act, 18 U.S.C. § 1030 3. Violation of the Virginia Computer Crimes Act, Va.Code Ann. § 18.2–152.3 et seq.

4. Lanham Act “reverse passing off,” 15 U.S.C. § 1125(a)

5. Breach of Contract (based on the Terms of Use posted on the Cvent website)

6. Unjust Enrichment

7. Business Conspiracy, Va.Code Ann. § 18.2–499 et seq.

8. Common Law Conspiracy

Cvent seeks a permanent injunction prohibiting defendants from accessing its website without authorization and enjoining defendants from copying, using, or creating derivative works from any Cvent website content. Plaintiff also requests an order impounding and destroying all infringing copies of Cvent's copyrighted works, along with an order directing Eventbrite to engage in corrective advertising, and also seeks damages, interest, and attorneys fees in an amount exceeding $3,000,000. The requested damages include compensatory damages, lost profits, disgorgement of defendants' profits, statutory damages pursuant to the Copyright Act, treble damages pursuant to the Lanham Act and Va.Code Ann. § 18.2–500, and exemplary damages not in excess of $350,000 because of defendants' willful and malicious conduct.

On August 10, 2010, Eventbrite filed a Motion to Dismiss Claims Two through Eight of plaintiff's first amended complaint, pursuant to Fed.R.Civ.P. 12(b)(6), alleging that those claims are either barred, preempted by federal law, or otherwise fail to state a cause of action. Eventbrite further moves to strike event's prayers for attorneys' fees, statutory damages, punitive damages, and treble damages, arguing that those forms of relief are not available pursuant to event's first claim for relief (copyright infringement). In particular, Eventbrite argues that Cvent has not alleged any post-registration copyright infringement in its complaint, and that statutory damages and attorneys' fees are therefore not appropriate under the Copyright Act.[FN1]

II. Standard of Review

Under Fed.R.Civ.P. 12(b)(6), a complaint should not be dismissed “unless it appears certain that [plaintiff] can prove no set of facts that would support his claim and would entitle him to relief.” Smith v. Sydnor, 184 F.3d 356, 361 (4th Cir. 1999). The Court must accept all of the complaint's well-pleaded allegations as true and view them in a light most favorable to the plaintiff. Smith, 184 F.3d at 361. However, that requirement applies only to facts, not to legal conclusions. Ashcroft v. Iqbal, ––– U.S. ––––, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009). A court need not accept legal conclusions drawn from the facts, nor must it accept unwarranted inferences or unreasonable conclusions. E. Shore Markets, Inc. v. J.D. Assocs. Ltd. P'ship, 213 F.3d 175, 180 (4th Cir. 2000). In addition, “if the well-pled facts do not permit the court to infer more than the mere possibility of misconduct, the complaint has alleged—but it has not ‘show[n]’—that the pleader is entitled to relief.” Iqbal, 129 S.Ct. at 1950. “Factual allegations must be enough to raise a right of relief above the speculative level, on the assumption that all of the allegations in the complaint are true.” Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007).

III. Discussion

The gravamen of Cvent's complaint is, at its core, a claim for intellectual property theft and copyright infringement. Accordingly, Eventbrite does not move to dismiss plaintiff's Copyright Act claim (Claim One), nor could it plausibly do so under Fed.R.Civ.P. 12(b)(6). However, plaintiff has also raised seven other claims premised upon state and federal law, both statutory and common law, all of which Eventbrite moves to dismiss.

Eventbrite has moved to dismiss plaintiff's Virginia Computer Crimes Act (Claim Three), Lanham Act (Claim Four), and unjust enrichment (Claim Six) claims on the theory that they are all preempted by the federal Copyright Act. Eventbrite has also moved to dismiss plaintiff's Computer Fraud and Abuse Act (Claim Two), Breach of Contract (Claim Five), Business Conspiracy (Claim Seven), and Common Law (Claim Eight) claims on the grounds that, for various reasons, they each fail to state a legal claim upon which relief can be granted. Finally, Eventbrite moves to strike portions of plaintiff's prayer for relief. This Court will consider each of Eventbrite's motions in turn.

A. Claim Two: Computer Fraud and Abuse Act, 18 U.S.C. § 1030

Eventbrite moves to dismiss the Computer Fraud and Abuse Act (CFAA) claim on the ground that the CFAA only prohibits hacking or other unauthorized access to files, while the material that Eventbrite is alleged to have scraped from Cvent's website is publicly available, and Eventbrite was thus authorized to access it.

The CFAA is a civil and criminal anti-hacking statute designed to prohibit the use of hacking techniques to gain unauthorized access to electronic data. By its terms, the statute forbids “intentionally access[ing] a computer without authorization or exceed[ing] authorized access, and thereby obtain[ing] ... information from any protected computer.” 18 U.S.C. § 1030(a)(2). “Exceed[ing] authorized access” is explicitly defined as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accessor is not entitled to obtain or alter.” 18 U.S.C. § 1030(e)(6). Eventbrite moves to dismiss this count on the ground that although Cvent may have pled facts giving rise to a plausible inference that defendants made an unauthorized use of the material on the Cvent website, the complaint does not allege sufficient facts to support a claim that defendants obtained unauthorized access to that information. Rather, the data which Eventbrite is alleged to have stripped from Cvent's website is publicly available on the Internet, without requiring any login, password, or other individualized grant of access. By definition, therefore, Eventbrite argues it could not have “exceeded” its authority to access that data.

Cvent's only argument in support of its CFAA claim rests upon the Terms of Use on its website, which state in part that “No competitors or future competitors are permitted access to our site or information, and any such access by third parties is unauthorized ....” Pl.'s Opp. to Def.'s Mot. to Dismiss First Am. Compl. at 4. Notwithstanding that language, Cvent's website in fact takes no affirmative steps to screen competitors from accessing its information. Cvent's CSN venue location database is not password-protected, nor are users of the website required to manifest assent to the Terms of Use, such as by clicking “I agree” before gaining access to the database. Rather, anyone, including competitors in the field of event planning, may access and search event's venue information at will.

Indeed, the Terms of Use for event's website are not displayed on the website in any way in which a reasonable user could be expected to notice them. Based upon screenshots of the website provided to the Court by defense counsel, and to which plaintiff's counsel did not object, the Terms of Use do not themselves appear in the body of the first page of the Cvent website. The link that accesses the Terms is buried at the bottom of the first page, in extremely fine print, and users must affirmatively scroll down to the bottom of the page to even see the link. Specifically, when users scroll down to the bottom of Cvent's homepage, they are confronted with a black band with twenty-eight different links separated into four columns and grouped under four headings: “Event Planning,” “Online Surveys,” “Site Selection,” and “Company Info.” Under the “Company Info” heading, the rightmost heading on the page, the “Terms of Use” link appears two lines down in small white font, sandwiched between “Privacy Policy” and “Contact Us,” Moreover, even when users click on “Terms of Use,” they are directed to a secondary page entitled “Terms of Use for Cvent Products,” which itself has three separate links to three different Terms of Use: “Supplier Network Terms of Use,” “Event Management Terms of Use,” and “Web Survey Terms of Use.” Website users can access the various Terms of Use documents only by clicking on the appropriate links, thereby opening the documents on a new page. The documents themselves are each several pages long.

Cvent's website, including its CSN database, is therefore not protected in any meaningful fashion by its Terms of Use or otherwise. Eventbrite thus properly cites to State Analysis, Inc. v. American Financial Services, Assoc., 621 F.Supp.2d 309 (E.D. Va. 2009) (Brinkema, J.), in which this Court rejected a CFAA claim against a defendant who, like Eventbrite, was accused of using material to which it had lawful access in ways that violated the agreement governing that access. In State Analysis, the plaintiff sued two defendants: the first was alleged to have accessed the plaintiff's website using usernames and passwords that did not belong to it and to which it had never been given lawful access, while the second was alleged to have misused the passwords with which it had been entrusted. This Court allowed the CFAA claim to proceed against the first defendant, but granted the second defendant's motion to dismiss, explicitly-holding that while use of an unauthorized password to access password-protected content may constitute a CFAA violation, a mere allegation that a defendant “used the information [which it had been given lawful authority to access] in an inappropriate way” did not state a claim for relief. Id. at 317.

The overwhelming weight of authority supports this view of the CFAA. See, e.g., LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009); Orbit One Commc'ns, Inc. v. Numerex Corp., 692 F.Supp.2d 373, 383 (S.D.N.Y. 2010); Lewis–Burke Assocs. LLC v. Widder, No. 09–CV–00302–JMF, 725 F.Supp.2d 187, 193-95, 2010 WL 2926161 at *5–*6 (D.D.C. July 28, 2010). Meanwhile, the cases cited by Cvent in its opposition to Eventbrite's motion to dismiss nearly all present factual situations that are distinguishable from the facts in the instant case. For example, America Online v. LCGM, Inc., 46 F.Supp.2d 444 (E.D. Va. 1998) (Lee, J.), the only case cited by plaintiff from this district, upheld a CFAA claim for electronic datastripping. However, the defendants in that case were alleged to have obtained AOL e-mail accounts in order to use extractor software programs to harvest the e-mail addresses of AOL members and then send bulk spam solicitations to them. Id. at 448. Not only was such conduct in violation of AOL's Terms of Use, but the defendants were plainly never given authorized access to the confidential e-mail addresses of other users. The AOL case thus stands in contradistinction to this case, where the entire world was given unimpeded access to Cvent's website, its CSN venue database, and its “Destination Guide.” For those reasons, Eventbrite's motion to dismiss plaintiff's CFAA claim will be granted.

B. Claim Three: Virginia Computer Crimes Act, Va.Code Ann. § 18.2–152.3 et seq.

Eventbrite moves to dismiss plaintiff's claim for violation of the Virginia Computer Crimes Act (VCCA), arguing that it is preempted by the federal Copyright Act. Section 301(a) of the Copyright Act states:

[A]ll legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106 [of the Copyright Act] in works of authorship that are fixed in a tangible medium of expression and come within the subject matter of copyright as specified by sections 102 and 103 ... are governed exclusively by this title.

17 U.S.C. § 301(a). A state law claim is preempted by the Copyright Act if (1) the work at issue is “within the scope of the ‘subject matter of copyright’ as specified in 17 U.S.C.A. §§ 102, 103 and (2) the rights granted under state law are equivalent to any exclusive rights within the scope of federal copyright [law] as set out in 17 U.S.C.A. § 106.” Rosciszewski v. Arete Assocs., Inc., 1 F.3d 225, 228 (4th Cir. 1993). A right under state law is “equivalent” to a right under federal copyright law if that right “may be abridged by an act which, in and of itself, would infringe one of the exclusive rights [granted in the Copyright Act].” Id. 

In support of its motion to dismiss, Eventbrite relies upon the Fourth Circuit's decision in Rosciszewski, which held that where a claim under the Virginia Computer Crimes Act does not require proof of elements beyond those necessary to prove copyright infringement, that claim is preempted by federal copyright law. The elements of a violation of the VCCA are that the defendant (1) uses a computer or computer network; (2) without authority; and (3) either obtains property or services by false pretenses, embezzles or commits larceny, or converts the property of another. Va.Code § 18.2–152.3. In comparing those elements to the scope of the federal Copyright Act under 17 U.S.C.A. § 106, the Fourth Circuit in Rosciszewski determined that “the protection of computer programs from unauthorized copying granted under [the VCCA] is equivalent to the exclusive right of the copyright owner to reproduce a copyrighted work under the Copyright Act. Therefore, [a VCCA cause of action] is preempted to the extent that it is based on reproduction of the copyrighted computer program.” Id. at 230.

In light of the Fourth Circuit's holding, the only basis for finding that the VCCA claim is not preempted would be if the VCCA. violations alleged here are distinguishable in some way from the software copying alleged in Rosciszewski. Cvent argues that this case is distinguishable from Rosciszewski because the VCCA has been amended since the Rosciszewski decision. The earlier version of the VCCA differed from the current version of the statute in one primary respect: the earlier version simply required proof that the defendant used a computer or computer network without authority and with the intent to obtain property or services by false pretenses, to embezzle or commit larceny, or to convert the property of another. See id. By contrast, the statute as amended in 2005 now requires that the defendant must actually commit larceny, false pretenses, embezzlement, or conversion to be liable. See Va.Code Ann. § 18.2–152.3 et seq. Cvent thus attempts to distinguish Rosciszewski, arguing that the current version of the statute presents a distinct claim for relief that is qualitatively different from a claim for alleged copyright infringement.

In its reply, however, Eventbrite properly relies upon State Analysis, cited on page 9 of this Memorandum Opinion, in which this Court found a VCCA claim even under the current amended statute preempted by the Copyright Act. The plaintiff in State Analysis similarly argued that its VCCA claim was based on elements beyond mere copying, including the elements of false pretenses, embezzlement, and/or conversion, and that the claim was therefore not preempted by federal copyright law. Id. at 320. Yet the complaint consistently alleged facts relating to the plaintiff's copyright ownership and the defendant's alleged infringement. Accordingly, this Court found that “[o]n the facts as pled by StateScape, it is difficult to see how any claim under the VCCA would contain any elements making it qualitatively different from the Copyright Act claims,” and dismissed the claim as preempted. Id.

This case is functionally indistinguishable from State Analysis. Cvent's first amended complaint alleges facts almost exclusively relating to Cvent's ownership of copyrights for its website and Eventbrite's alleged infringement of those copyrights by means of unlawful “scraping” techniques. At no point does the complaint plead specific facts giving rise to a plausible inference of larceny, false pretenses, embezzlement, or conversion, as required by the plain text of the VCCA. In fact, Cvent's claim in this case reduces to nothing more than a copyright infringement allegation, dressed up in VCCA garb. As such, the VCCA claim is preempted by the Copyright Act and will be dismissed.

C. Claim Four: Lanham Act, 15 U.S.C. § 1125(a)

Eventbrite next moves to dismiss the Lanham Act claim for “reverse passing off” on the ground that it is barred by Dastar v. Twentieth Century Fox Film Corp., 539 U.S. 23, 123 S.Ct. 2041, 156 L.Ed.2d 18 (2003). In Dastar, the Supreme Court held that although the Lanham Act forbids a reverse passing off of works created by another, that rule regarding the misuse of trademarks is trumped by copyright law, such that if a copyrighted work passes into the public domain, a Lanham Act claim will no longer lie. The Dastar Court also limited the scope of the Lanham Act to “tangible goods offered for sale, and not to the author of any idea, concept, or communication embodied in those goods.” Id. at 32, 123 S.Ct. 2041. The rationale for doing so was that otherwise, a Lanham Act reverse passing off claim would be functionally indistinguishable from a copyright infringement claim.

Following Dastar, many courts have rejected claims of “reverse passing off” based on copying the intellectual property of another and passing it off as one's own. For example, in Smartix International Corp. v. MasterCard International, LLC, No. 06–CV–05174–GBD, 2008 WL 4444554 (S.D.N.Y. Sept. 30, 2008), the court rejected Lanham Act claims based on the allegation that the defendant stole confidential and proprietary materials from the plaintiff's computer server. Similarly, in General Universal Systems, Inc. v. Lee, 379 F.3d 131, 148–49 (5th Cir. 2004), the court held that a defendant's copying a freight tracking software program and marketing it as its own did not give rise to a Lanham Act claim. See also Bob Creeden & Assocs., Ltd. v. Infosoft, Inc., 326 F.Supp.2d 876, 879 (N.D. Ill. 2004); Larkin Group, Inc. v. Aquatic Design Consultants, Inc., 323 F. Supp. 2d 1121 (D. Kan. 2004); McArdle v. Mattel Inc., 456 F. Supp. 2d 769, 783–84 (E.D. Tex. 2006). However, other courts have reached the opposite conclusion, allowing Lanham Act claims to proceed under similar factual circumstances. See, e.g., Cable v. Agence France Presse, No. 09 C 8031, 2010 WL 2902074, at *4–*5 (N.D. Ill. July 20, 2010) (rejecting Dastar challenge in a case involving electronic data stripping); Experian Mktg. Solutions, Inc. v. U.S. Data Corp., No. 8:09 CV 24, 2009 WL 2902957, at *9–*10 (D. Neb. Sept. 8, 2009) (sustaining reverse passing off claim for redistribution of proprietary databases, noting that plaintiff did not allege “copying the ideas embodied in the databases” but “rather they allege[d] improper use of the actual files”).

There is no controlling precedent in the Fourth Circuit on point, nor has this Court ever confronted this precise issue. However, Cvent appears to have the better of the argument, at least insofar as its complaint does not assert that Eventbrite has passed off its ideas as its own, but rather that Eventbrite has re-branded and re-packaged its product (the CSN venue database) and sold it as its own. See First Am. Compl. ¶ 82–84. Admittedly, the Supreme Court's “tangible goods” language in the Dastar opinion is confusing, and tends to suggest that electronic products are not covered by the Lanham Act. However, the Dastar opinion also makes clear that the Court used that language simply to distinguish goods and products offered for sale (which receive Lanham Act protection) from any “idea, concept, or communication embodied in those goods” (which are protected only by copyright laws). Dastar, 539 U.S. at 37, 123 S.Ct. 2041.

Thus, to the extent that Cvent is pleading its Lanham Act claim as an alternative to its copyright claim, it should be permitted to proceed. See J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition § 27:77.1 (2006) (“In many cases a Lanham Act false designation claim accompanies a copyright infringement claim in the complaint because it is unclear if the copyright is valid, is owned by this plaintiff, or is infringed. The Lanham Act claim is included as a back up in case the copyright claim fails.”). Accordingly, Cvent's motion to dismiss the Lanham Act claim will be denied.

D. Claim Five: Breach of Contract

Eventbrite next moves to dismiss plaintiff's breach of contract claim for failure to state a plausible entitlement to relief. Eventbrite sets forth three arguments in support of that motion: (1) any contract claim against Eventbrite is preempted by federal copyright law; (2) Eventbrite is not a party to any contract; and (3) no contract exists.

The first two arguments are unavailing. A breach of contract claim premised upon the Terms of Use on Cvent's website is qualitatively different from a claim for copyright infringement under the Copyright Act and therefore is not preempted. Moreover, as explained below with respect to plaintiff's conspiracy claims, Cvent has explicitly pled that defendant Foley was an agent of defendant Eventbrite, which hired Foley as an independent contractor to perform the alleged “website scraping” conduct at issue here. Thus, to the extent that any contract exists, Foley's assent to that contract would bind Eventbrite, the principal.

However, Cvent's breach of contract claim fails to state an entitlement to legal relief because Cvent has not alleged sufficient facts to support a plausible allegation that a contract existed between Cvent and Eventbrite. Plaintiff's complaint fails to allege any written or oral contract between the parties. Instead, Cvent relies exclusively on its “Terms of Use,” which are displayed on secondary pages of its website and can be accessed only through one of several dozen small links at the bottom of the first page. As noted above in this Court's analysis with respect to plaintiff's Computer Fraud and Abuse Act claim, on pages 8–9 of this Memorandum Opinion, the “Terms of Use” link only appears on Cvent's website via a link buried at the bottom of the first page. Moreover, users of event's website are not required to click on that link, nor are they required to read or assent to the Terms of Use in order to use the website or access any of its content.[FN2] This case is therefore not a “clickwrap” case, but rather falls into a category of alleged contracts that many courts have termed “browsewrap agreements.” See, e.g., Hines v. Overstock.com, Inc., 668 F.Supp.2d 362, 366 (E.D.N.Y., 2009); Doe v. Sexsearch.com, 502 F.Supp.2d 719, 729 n. 1 (N.D.Ohio 2007).

Neither party in this case has cited case law from either the Fourth Circuit or this Court explicitly addressing the validity of this type of browsewrap contract. Most courts which have considered the issue, however, have held that in order to state a plausible claim for relief based upon a browsewrap agreement, the website user must have had actual or constructive knowledge of the site's terms and conditions, and have manifested assent to them. See, e.g., Sw. Airlines Co. v. BoardFirst, LLC, No. 3:06–CV–0891–B, 2007 WL 4823761 at *5 (N.D. Tex. Sept. 12, 2007); Ticketmaster Corp. v. Tickets.Com, Inc., No. CV99–7654, 2003 WL 21406289, at *2 (C.D. Cal. Mar. 7, 2003). In this case, plaintiff has not pled sufficient facts to plausibly establish that defendants Eventbrite and Foley were on actual or constructive notice of the terms and conditions posted on Cvent's website. Plaintiff alleges that “the terms of the TOUs [Terms of Use] are readily available for review,” but has not provided any further factual detail to support that allegation. Pl.'s First Am. Compl. at 5. Under the Supreme Court's recent pleading precedents, such conclusory allegations are insufficient to “nudge [the plaintiff's claims] across the line from conceivable to plausible.” Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007).

Plaintiff nonetheless advances the additional argument that its complaint states a breach of contract claim under the Uniform Computer Information Transactions Act (UCITA), as adopted by Virginia law. UCITA provides a breach of contract claim for violation of electronic Terms of Use, if a person (1) has an “opportunity to review” the terms and (2) engages in statements or conduct indicating, or leading one to infer, the person's “assent” to the terms. Va.Code § 59.1–501.11 & 59.1–501.12. Individuals, however, are only deemed to have had an “opportunity to review” a term if the term is “available in a manner that ought to call it to the attention of a reasonable person,” Va.Code Ann. § 59.1–501.13:1, or if the website “disclose[s] the availability of the standard terms in a prominent place on the site” and “does not take affirmative acts to prevent printing or storage of the standard terms for archival or review purposes.” Va.Code § 59.1–501.14:1.

In its complaint, plaintiff makes bare assertions that its Terms of Use were prominently displayed on its website, that defendants had an “opportunity to review” the Terms of Use pursuant to Va.Code Ann. § 59.1–501.13:1 and Va.Code Ann. § 59.1–501.14:1, and that defendants manifested assent to those terms merely by accessing Cvent's venue location database. However, those conclusory allegations are flatly contradicted by the screenshots of Cvent's website and are plainly insufficient under the Iqbal and Twombly standard to state a plausible claim for relief, The essence of a breach of contract claim is a meeting of the minds and a manifestation of mutual assent. See Restatement (Second) of Contracts § 17 cmt. c (1981). Plaintiff has simply failed to “plead[ ] sufficient factual content to allow the court to draw the reasonable inference that the defendant is liable for the alleged misconduct” with respect to its breach of contract claim. Ashcroft v. Iqbal, ––– U.S. ––––, 129 S.Ct. 1937, 1949, 173 L.Ed.2d 868 (2009) (citing Twombly, 550 U.S. at 556, 127 S.Ct. 1955). Accordingly, Count Five of plaintiff's First Amended Complaint will be dismissed.

E. Claim Six: Unjust Enrichment

Eventbrite also argues that this Court should dismiss plaintiff's unjust enrichment claim on the ground that it is preempted by the Copyright Act. Citing Microstrategy, Inc. v. Netsolve, Inc., 368 F.Supp.2d 533 (E.D.Va.2005) (Lee, J.), Eventbrite contends that state law unjust enrichment claims are preempted to the extent that they are based entirely on an allegation of copying protected works. Specifically, Eventbrite alleges that “Cvent's purported claim is based entirely on its allegation that Eventbrite copied material from Cvent's website and sold it as its own. As that allegation contains no elements other than bare copying and distribution, it is preempted.” Def.'s Mot. to Dismiss Pl.'s First Am. Compl. at 7.

Eventbrite's argument is certainly correct in the mine run of cases. See 1 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 1.01[B][1] (g) (2003) ( “[A] state law cause of action for unjust enrichment [is] pre-empted insofar as it applies to copyright subject matter.”). However, as noted above with respect to the Lanham Act claim, to the extent that Cvent is alleging unjust enrichment based upon Eventbrite's derivation of commercial benefit from its unauthorized scraping and repackaging of Cvent's products (including the CSN database), that states a claim for relief that is separate and distinct from a claim for copyright infringement based upon the alleged theft of event's copyrightable ideas. See Pl.'s First Am. Compl. ¶ 103 (“Defendants have accepted and retained the benefits of their unauthorized scraping, copying, and sale of valuable Cvent property and products in circumstances which render it inequitable for them to retain those benefits at event's expense without payment to Cvent.”) (emphasis added). As this Court noted in Microstrategy, a plaintiff's unjust enrichment claim “may survive a preemption challenge if plaintiffs can demonstrate that defendants were unjustly enriched by ‘material beyond copyright protection.’ ” 368 F.Supp.2d at 537. Accordingly, Eventbrite's argument is premature at this time, and its motion to dismiss plaintiff's unjust enrichment claim will be denied.

F. Claims Seven and Eight: Business and Common Law Conspiracy

Eventbrite moves to dismiss plaintiff's state-law conspiracy claims on the ground that, simply put, one cannot conspire with oneself. Cvent alleges a conspiracy between only two actors: Eventbrite and Stephan Foley. Specifically, Cvent alleges that Eventbrite hired and paid Foley to scrape data from Cvent's website for use on Eventbrite's website. Courts have repeatedly held that “[a]cts of corporate agents are acts of the corporation itself.” ePlus Tech., Inc. v. Aboud, 313 F.3d 166, 179 (4th Cir. 2002) (citing Bowman v. State Bank of Keysville, 229 Va. 534, 331 S.E.2d 797, 801 (1985)). Virginia courts have also specifically adopted the intracorporate immunity doctrine for Virginia conspiracy laws. See Fox v. Deese, 234 Va. 412, 362 S.E.2d 699, 708 (1987). As a result, it is black letter law that a claim that a corporation has conspired with its own agent fails as a matter of law.[FN3]

To avoid this line of reasoning, plaintiff repeatedly argues that Foley was merely an “outside contractor” of Eventbrite, not an employee, and that Foley did not take on any fiduciary duties or other obligations of loyalty or obedience toward Eventbrite. That argument is irrelevant under Virginia law, because the existence of an agency relationship for intracorporate immunity purposes hinges upon the substance, not the form, of the relationship between the corporation and the individual. See Am. Chiropractic Ass'n, Inc. v. Trigon Healthcare, Inc., 367 F.3d 212, 223–24 (4th Cir. 2004). If a corporation delegates a task to an individual (including an independent contractor) to serve corporate purposes, the individual acts with the same general objective as the corporation, and the corporation retains ultimate decisionmaking authority, then the individual and the corporation are for all intents and purposes the same entity. Under such circumstances, the individual and the corporation logically cannot conspire with one another. See Oksanen v. Page Memorial Hosp., 945 F.2d 696, 703 (4th Cir. 1991) (finding that a hospital lacked the legal capacity to conspire with members of an independent peer review committee who were acting on its behalf).

In this case, plaintiff alleges that Eventbrite hired Foley to mine data from Cvent's website for Eventbrite's commercial gain. The “scraped” data was used solely for Eventbrite's benefit, and indeed it is difficult to imagine any independent interest that defendant Foley might have had in acquiring it. Because the allegations in its complaint cannot plausibly allege a business conspiracy or a common law conspiracy between defendants Eventbrite and Foley, Eventbrite's motion to dismiss both of plaintiff's conspiracy claims will be granted.

G. Motion to Strike Plaintiff's Requested Relief

Finally, Eventbrite argues that certain of Cvent's prayers for relief, including its request for treble damages under the Lanham Act and Va.Code Ann. § 18.2–500, and its request for statutory damages and attorneys' fees under the Copyright Act, should be stricken.

Because the Lanham Act claim will remain in this lawsuit, plaintiff's prayer for relief under that statute, including treble damages, still stands.

Cvent is also seeking both statutory damages and attorneys' fees in connection with its Copyright Act claim. Eventbrite moves to strike that prayer for relief on the ground that 17 U.S.C. § 412 bars any award of statutory damages or attorneys' fees if the work at issue was not registered at the time the infringement commenced. In this case, all copyrighted content on the www.cvent.com website, including Cvent's CSN venue location database, was registered in late April 2010, immediately before plaintiff commenced this litigation. However, plaintiff's first amended complaint alleges only that the defendant committed unlawful “scraping” of its website between August 2008 and October 2008. Eventbrite therefore correctly argues that on the allegations in the first amended complaint alone, plaintiff may only recover compensatory damages, not statutory damages or attorney's fees, for its copyright claims based on Eventbrite's alleged pre-registration infringement.

For these reasons, Eventbrite's motion to strike plaintiff's requested relief will be granted in part and denied in part. The motion will be granted in part as to statutory damages or attorney's fees claimed under the Copyright Act claim (Count One), and any other relief claimed with respect to Counts Two, Three, Five, Seven, and Eight. Defendant's motion to strike the remainder of plaintiff's prayer for relief, including the prayer for treble damages and attorneys' fees under the Lanham Act (Count Four) and equitable relief under the unjust enrichment claim (Count Six), will be denied.

IV. Conclusion

For the reasons stated in open court and in this Memorandum Opinion, Eventbrite's motion to dismiss will be granted as to Counts Two, Three, Five, Seven, and Eight, and denied as to Counts Four and Six. Defendant's motion to strike portions of plaintiff's prayer for relief will be granted in part and denied in part, as described above.

Footnotes

[FN1] Defendant Foley has not joined in Eventbrite's motion to dismiss but has been granted an extension of time to file his answer, which is now due on September 17, 2010.

[FN2] Eventbrite has provided the Court with screenshots of the Cvent website, showing the location of the cvent.com Terms of Use, and has requested that the court take judicial notice of those printouts. See Def.'s Reg. for Judicial Notice.

[FN3] The only exception is when the agent has an independent personal stake in the corporation's illegal objectives. See ePlus, 313 F.3d at 179. However, plaintiff has not alleged such an independent personal stake on defendant Foley's part.