throbber
Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 1 of 20 PageID: 1288
`
`FOR PUBLICATION
`
`UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF NEW JERSEY
`
`Civil Action No. 03-5221 (JAG)
`
`OPINION
`
`::
`
`::
`
`::::::::::
`
`:
`
`THE IQ GROUP, LTD. d/b/a
`INSURANCE IQ,
`Plaintiff,
`
`
`v.
`
`WIESNER PUBLISHING, LLC t/a
`ADVISORS DATA SOURCE and t/a IT
`BUYERS, and LISA HULAC; ERIC
`BENDER; NATIONAL SENIOR
`ASSOCIATES COMPANY, LLC;
`CAPITAL CARE, INC.; and
`JOHN DOES 1-100,
`
`Defendants.
`
`APPEARANCES:
`
`Stanley W. Kallmann, Esq.
`Gennet, Kallmann, Antin & Robinson, P.C.
`6 Campus Drive
`Parsippany, NJ 07054
`
`ATTORNEYS FOR PLAINTIFF IQ GROUP, LTD.
`
`Louis J. Seminski, Esq.
`Landman Corsi Ballaine & Ford P.C.
`One Gateway Center, Suite 400
`Newark, NJ 07102-5388
`
`Timothy P. Getzoff, Esq.
`Holland & Hart LLP
`One Boulder Plaza
`1800 Broadway, Suite 300
`Boulder, CO 80302
`
`ATTORNEYS FOR DEFENDANT WIESNER PUBLISHING, LLC
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 2 of 20 PageID: 1289
`
`GREENAWAY, JR., U.S.D.J.
`
`This matter comes before the Court on the Motion for Summary Judgment by Defendant
`
`Wiesner Publishing, LLC (“Wiesner”) and the Cross-Motion for Summary Judgment by Plaintiff
`
`IQ Group, Ltd. (“IQ”), pursuant to FED. R. CIV. P. 56. For the reasons set forth below,
`
`Defendant’s Motion will be granted in part and denied in part. Plaintiff’s Cross-Motion will be
`
`denied.
`
`INTRODUCTION
`
`These motions arise in the context of a dispute between business competitors. IQ and
`
`Wiesner are businesses that provide advertising services for insurance companies: they send ads
`
`by email to insurance agents. In 2003, National Senior Associates Company, LLC (“NSAC”)
`
`and Capital Care, Inc. (“Capital Care”), insurance companies, both hired IQ to send
`
`advertisements. NSAC and IQ dispute who created the ad for NSAC, and thereby who is entitled
`
`to claim authorship and hold the copyright. IQ distributed copies of ads for Capital Care and
`
`NSAC via email to insurance agents; the ads sent by IQ displayed a graphic described by IQ as a
`
`logo. The IQ logo consists of the outline of a capital “Q” with the outline of a lower-case “I” in
`
`the center. Both outlines are shaded, as if in graphical relief. The ads also contained a hyperlink
`
`that, when clicked, directed the user to a page of IQ’s website which IQ claims contained
`
`copyright notices.
`
`
`
` After IQ had distributed the NSAC and Capital Care ads, both NSAC and Capital Care
`
`hired Wiesner to distribute the ads via email. Both NSAC and Capital Care provided Wiesner
`
`with the ads that IQ distributed. Wiesner removed the IQ logo and hyperlink, added new
`
`information so that responses to the ads would go to NSAC and Capital Care, and then copied
`
`2
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 3 of 20 PageID: 1290
`
`and distributed the ads via email.
`
`IQ subsequently applied to the U.S. Copyright Office for copyright registration, claiming
`
`authorship of the NSAC and Capital Care ads. IQ obtained copyright registrations as of October
`
`22, 2003. IQ then filed suit against Wiesner, NSAC, Capital Care and other parties, stating
`
`claims for: 1) slander, libel and conspiracy to defame IQ (Count 1, against Wiesner et al.); 2)
`
`negligence in making false and damaging statements (Count 2, against Wiesner et al.); 3) breach
`
`of contract (Count 3, not against Wiesner); 4) copyright infringement and violations of the
`
`Digital Millennium Copyright Act (“DMCA”) (Count 4, against Wiesner et al.); 5) tortious
`
`interference with business relationships (Count 5, against Wiesner et al.); and 6) copyright
`
`infringement and violations of the DMCA (Count 6, not against Wiesner). Subsequently, IQ
`
`conceded that it is not entitled to statutory damages for copyright infringement related to the
`
`Capital Care ad. (Pl. Mem. Opp. Mot. S.J. 16.)
`
`The instant motion and cross-motion for summary judgment concern the claims of
`
`copyright infringement and violation of the DMCA. Wiesner filed a motion for summary
`
`judgment on these issues: 1) IQ is entitled to a maximum of one award of statutory damages for
`
`copyright infringement of the NSAC and Capital Care ads; and 2) IQ’s DMCA claims, for
`
`violation of 17 U.S.C. § 1202, should be dismissed as a matter of law. IQ filed a cross-motion
`
`for summary judgment on these issues: 1) Wiesner has infringed IQ’s copyright on the NSAC ad;
`
`2) IQ is entitled to statutory damages for Wiesner’s infringement of the copyright on the NSAC
`
`ad; 3) IQ is entitled to increased statutory damages for Wiesner’s willful infringement of the
`
`copyright on the NSAC ad; and 4) Wiesner violated the DMCA, 17 U.S.C. § 1202, with regard to
`
`both the Capital Care and NSAC ads.
`
`3
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 4 of 20 PageID: 1291
`
`ANALYSIS
`
`I.
`
`Governing Legal Standards
`
`A.
`
`Standard for a Rule 56 Motion for Summary Judgment
`
`Summary judgment is appropriate under FED. R. CIV. P. 56(c) when the moving party
`
`demonstrates that there is no genuine issue of material fact and the evidence establishes the
`
`moving party’s entitlement to judgment as a matter of law. Celotex Corp. v. Catrett, 477 U.S.
`
`317, 322-23 (1986); Orson, Inc. v. Miramax Film Corp., 79 F.3d 1358, 1366 (3d Cir. 1996). In
`
`making this determination, the Court must draw all reasonable inferences in favor of the non-
`
`movant. Hullett v. Towers, Perrin, Forster & Crosby, Inc., 38 F.3d 107, 111 (3d Cir. 1994); Nat’l
`
`State Bank v. Fed. Reserve Bank of N.Y., 979 F.2d 1579, 1581 (3d Cir. 1992).
`
`Once the moving party has satisfied its initial burden, the party opposing the motion must
`
`establish that a genuine issue as to a material fact exists. Jersey Cent. Power & Light Co. v.
`
`Lacey Township, 772 F.2d 1103, 1109 (3d Cir. 1985). The party opposing the motion for
`
`summary judgment cannot rest on mere allegations and instead must present actual evidence that
`
`creates a genuine issue as to a material fact for trial. Anderson v. Liberty Lobby, Inc., 477 U.S.
`
`242, 248 (1986); Siegel Transfer, Inc. v. Carrier Express, Inc., 54 F.3d 1125, 1130-31 (3d Cir.
`
`1995). “[U]nsupported allegations . . . and pleadings are insufficient to repel summary
`
`judgment.” Schoch v. First Fid. Bancorporation, 912 F.2d 654, 657 (3d Cir. 1990); see also FED.
`
`R. CIV. P. 56(e) (requiring nonmoving party to “set forth specific facts showing that there is a
`
`genuine issue for trial”).
`
`If the nonmoving party has failed “to make a showing sufficient to establish the existence
`
`of an element essential to that party’s case, and on which that party will bear the burden of proof
`
`4
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 5 of 20 PageID: 1292
`
`at trial, . . . there can be ‘no genuine issue of material fact,’ since a complete failure of proof
`
`concerning an essential element of the nonmoving party’s case necessarily renders all other facts
`
`immaterial.” Katz v. Aetna Cas. & Sur. Co., 972 F.2d 53, 55 (3d Cir. 1992) (quoting Celotex,
`
`477 U.S. at 322-23). In determining whether there are any issues of material fact, the Court must
`
`resolve all doubts as to the existence of a material fact against the moving party and draw all
`
`reasonable inferences – including on issues of credibility – in favor of the non-moving party.
`
`Watts v. Univ. of Del., 622 F.2d 47, 50 (3d Cir. 1980).
`
`II.
`
`Defendant’s Motion for Summary Judgment
`
`A.
`
`Plaintiff’s Maximum Entitlement to Statutory Damages
`
`In the Complaint, pursuant to Count 4, IQ seeks the greater of actual damages or statutory
`
`damages for copyright infringement. The parties do not dispute that Plaintiff has subsequently
`
`elected to seek statutory damages for copyright infringement under 17 U.S.C. § 504(c)(1). The
`
`parties also agree that Plaintiff is not entitled to statutory damages in regard to the Capital Care
`
`ad. Wiesner asks the Court to determine simply whether Plaintiff is entitled to one or multiple
`
`statutory damage awards if infringement of the NSAC ad is proven, under 17 U.S.C. § 504(c).
`
`Wiesner contends that only one award of statutory damages is available under this statute. IQ
`
`does not address the question of number in its responsive brief, which argues only that it is
`
`entitled to statutory damages under 17 U.S.C. § 504(c). In the Complaint, IQ seeks statutory
`
`damages “for each E-mail sent by the defendants in violation of 17 U.S.C. § 1202,” but does not
`
`quantify its request for damages under 17 U.S.C. § 504(c) as to each email. (Compl. 9.) Because
`
`IQ takes no position as to how many damage awards it seeks, there may be no controversy
`
`between the parties on this matter.
`
`5
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 6 of 20 PageID: 1293
`
`Wiesner asks the Court for summary judgment on a question that is speculative rather
`
`than the subject of a live dispute. The Constitution requires that a “case or controversy” be
`
`before a court; judgment on a hypothetical issue is advisory, and federal courts may not render
`
`advisory opinions. Herb v. Pitcairn, 324 U.S. 117, 126 (1945) (“We are not permitted to render
`
`an advisory opinion.”) Wiesner implicitly acknowledges the advisory nature of the relief sought
`
`here in stating that this motion is “in order to assist the parties in a proper valuation of this case.”
`
`(Def.’s Br. Supp. S. J. 16.)
`
`Alternatively, issues of damages are not ready for resolution before the predicate
`
`infringement has been determined: under 17 U.S.C. § 504, only an infringer is liable for
`
`damages, and there has been no judgment of infringement.
`
`Summary judgment on this question is denied, as the issue is not ripe for consideration.
`
`B.
`
`Plaintiff’s DMCA Claim
`
`Pursuant to Count 4 of the Complaint, IQ alleges that Wiesner violated the DMCA, 17
`
`U.S.C. § 1202. The parties do not dispute that, in reproducing and distributing the NSAC and
`
`Capital Care ads, Wiesner removed the IQ logo and the “Legal Notice” hyperlink. IQ claims that
`
`this constitutes actionable 1) removal of copyright management information under § 1202(b)(1);
`
`2) distribution of false copyright management information under § 1202(a)(2); 3) distribution of
`
`copyright management information knowing that the copyright management information has
`
`been removed, under § 1202(b)(2); and 4) distribution of copies of works knowing that the
`
`copyright management information has been removed, under § 1202(b)(3) . Wiesner argues that
`
`the logo and hyperlink cannot fall within the scope of the statute, as set out in 17 U.S.C. §
`
`1202(c), and asks the Court to rule on this as a matter of law.
`
`6
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 7 of 20 PageID: 1294
`
`The DMCA provision at issue, 17 U.S.C. § 1202(c), defines “copyright management
`
`information” in eight categories. IQ contends that the logo falls within category 2 (“[t]he name
`
`of, and other identifying information about, the author of a work”), category 3 (“[t]he name of,
`
`and other identifying information about, the copyright owner of the work”), and category 7
`
`(“[i]dentifying numbers or symbols referring to such information or links to such information”).
`
`IQ contends as well that the hyperlink falls within categories 3 and 7, and that the hyperlink
`
`points to a website containing information falling within category 6 (“[t]erms and conditions for
`
`use of the work”).
`
`Wiesner asks the Court to rule, as a matter of law, that a logo cannot constitute copyright
`
`management information, as defined by 17 U.S.C. § 1202(c). IQ does not argue that the logo is
`
`a name, but that it is identifying information about a name of an author or copyright owner, as
`
`well as an identifying symbol. IQ provides no legal authority for its propositions.
`
`IQ’s arguments that the logo and hyperlink are within the scope of § 1202 fail for two
`
`reasons. First, as to the logo, IQ’s position impermissibly blurs the distinction between
`
`trademark law and copyright law. Second, properly interpreted, § 1202 does not apply to either
`
`the logo or the hyperlink, under these facts.
`
`1.
`
`The DMCA in the framework of trademark and copyright law
`
`In effect, IQ asks this Court to construe the DMCA so as to allow a logo, functioning as a
`
`service mark, to come within the definition of copyright management information which, by
`
`operation of the DMCA, would act to protect the copyright of its owner. This construction of the
`
`DMCA would allow trademarks to invoke DMCA provisions meant to protect copyrights. As
`
`discussed infra, this turns the DMCA into a species of mutant trademark/copyright law, blurring
`
`7
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 8 of 20 PageID: 1295
`
`the boundaries between the law of trademarks and that of copyright. There is no evidence that
`
`Congress intended such an extreme outcome in enacting the DMCA.
`
`A logo, to the extent that it communicates source-distinguishing information about
`
`whatever it is attached to, operates as a trademark or service mark. As IQ appears to use its logo
`
`to indicate itself as the source of the advertising services it provides, it would operate as a service
`
`mark. The Lanham Act defines a service mark as “any word, name, symbol, or device, or any
`
`combination thereof . . . used . . . to identify and distinguish the services of one person, including
`
`a unique service, from the services of others and to indicate the source of the services, even if
`
`that source is unknown.” 15 U.S.C. § 1127. Under this definition, the mark identifies the
`
`services so as to distinguish them from those of others, but merely indicates the source.
`
`Looking only at the literal language of the statute, IQ’s construction is not implausible: a
`
`logo in an email, to the extent that it operates as a trademark or service mark, could communicate
`
`information that indicates the source of the email. It is a symbol that refers to identifying
`
`information, so a very broad interpretation of § 1202(c) might conceivably include a logo. The
`
`problem is that this construction allows a trademark to invoke DMCA protection of copyrights,
`
`eliminating the differentiation of trademark from copyright that is fundamental to the statutory
`
`schemes. If every removal or alteration of a logo attached to a copy of a work gives rise a cause
`
`of action under the DMCA, the DMCA becomes an extension of, and overlaps with, trademark
`
`law.
`
`The Supreme Court cautioned against blurring the boundaries between trademark law and
`
`copyright law in Dastar Corp. v. Twentieth Century Fox Film Corp., 539 U.S. 23 (2003). In
`
`Dastar, Twentieth Century Fox argued for an interpretation of the Lanham Act that would have
`
`8
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 9 of 20 PageID: 1296
`
`established a cause of action under trademark law for “misrepresentation of authorship of
`
`noncopyrighted works.” Id. at 35. The Court reasoned that this would cause an overlap with
`
`copyright law and rejected it: “The problem with this argument according special treatment to
`
`communicative products is that it causes the Lanham Act to conflict with the law of copyright,
`
`which addresses that subject specifically. . . .Thus, in construing the Lanham Act, we have been
`
`careful to caution against misuse or over-extension of trademark and related protections into
`
`areas traditionally occupied by patent or copyright.” Id. at 33-34. The Court warned that
`
`disregarding the trademark/copyright law distinction “would create a species of mutant copyright
`
`law.” Id. at 34.
`
`Here, IQ argues for an interpretation of copyright law that, similarly, would make the two
`
`legal schemes overlap. But rather than an interpretation of the Lanham Act, as in Dastar, IQ here
`
`seeks an interpretation of the DMCA that would blur the boundaries between copyright and
`
`trademark. Following Dastar, this Court rejects this argument.
`
`Furthermore, “intellectual property owners should not be permitted to recategorize one
`
`form of intellectual property as another.” Chosun Int'l v. Chrisha Creations, Ltd., 413 F.3d 324,
`
`328 (2d Cir. 2005). Although IQ has not argued that the logo is a service mark, logos are usually
`
`considered to invoke trademark protection, not copyright protection. IQ should not be permitted
`
`to recategorize its mark so as to invoke copyright protection.
`
`
`
`If this Court were to recategorize the mark so as to invoke copyright protection, it would
`
`lead to another problem: Wiesner observes that the original ads contained not only the IQ logo,
`
`but the logos for NSAC and Capital Care as well. Following IQ’s argument, these logos could
`
`serve as copyright information as well. We could end up with a document with conflicting
`
`9
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 10 of 20 PageID: 1297
`
`copyright information. IQ’s argument could lead to absurd results.
`
`2.
`
`The DMCA: Statutory Interpretation of § 1202
`
`The statutory interpretation of § 1202 is a matter of first impression, as no courts have
`
`reported cases addressing the definition of “copyright management information.” In the reported
`
`cases involving § 1202, courts have denied application of the statute based on failure to prove the
`
`knowledge or intent requirements for violation. See Ward v. Nat'l Geographic Soc'y, 208 F.
`
`Supp. 2d 429, 449 (S.D.N.Y. 2002); Schiffer Publ'g, Ltd. v. Chronicle Books, LLC, 2004 U.S.
`
`Dist. LEXIS 23052 (E.D. Pa. 2004); Kelly v. Arriba Soft Corp., 77 F. Supp. 2d 1116, 1122 (C.D.
`
`Cal. 1999).
`
`The text of § 1202 appears to define “copyright management information” quite broadly,
`
`to the point that the section, read literally, applies wherever any author has affixed anything that
`
`might refer to his or her name. Examination of the legislative history, as well as extrinsic
`
`sources, however, shows that the statute should be subject to a narrowing interpretation.
`
`Law professor Julie E. Cohen has written widely on the DMCA and on copyright
`
`management information. See generally Julie E. Cohen, Copyright and The Jurisprudence of
`
`Self-Help, 13 Berkeley Tech. L.J. 1089 (1998). Cohen explains that, traditionally, authors have
`
`relied on copyright law to define and protect their legal rights. Now, however, new technologies
`
`can control access to works, such that technology attached to the work itself defines and protects
`
`the legal rights of the copyright owner. The DMCA directly protects not the copyrights, but the
`
`technological measures that protect the copyrights. In Cohen’s view, copyright management
`
`10
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 11 of 20 PageID: 1298
`
`information (“CMI”) is limited to components of such technological measures. This central
`1
`
`insight is confirmed by examination of the history of § 1202.
`
`It is frequently stated that Congress enacted the DMCA in order to implement the World
`
`Intellectual Property Organization (“WIPO”) Copyright Treaty and the WIPO Performances and
`
`Phonograms Treaty. H.R. Rep. No. 105-551 (1998). It is true that enactment of the DMCA
`
`brought United States copyright law into compliance with these treaties. Id. Thus, the WIPO
`
`treaties are useful in understanding § 1202.
`
`The WIPO treaties mandated protection of copyright management information.
`
`According to Severine Dusollier, WIPO protected CMI as part of “a double protection for
`
`technical measures.” S. Dusollier, Some Reflections on Copyright Management Information and
`
`Moral Rights, 25 Colum. J.L. & Arts 377, 382 (2003). In the framework of the WIPO treaties,
`
`technical measures such as CMI are components of automated copyright protection systems: “As
`
`digital identification systems and other technologies that enable the marking and protection of
`
`works have started to develop, rightholders have feared that these technological tools might
`
`themselves be cracked by other technologies or machines, or that they might be easily modified
`
`or removed.” Id. The WIPO treaties, and hence the DMCA, protect CMI so as to protect the
`
`technological measures of copyright protection themselves. This echoes the understanding of the
`
`DMCA expressed by Cohen, supra.
`
`
`
`Although many view the DMCA as implementing the WIPO treaties, in fact, §§ 1201 and
`
`1202 were drafted prior to the treaties. President Clinton established the Information
`
`See also Julie E. Cohen, A Right to Read Anonymously: A Closer Look at ‘Copyright
`1
`Management’ in Cyberspace, 28 Conn. L. Rev. 981, 984 (1996) (“new digital monitoring and
`metering technologies define the burgeoning field of ‘copyright management’”).
`
`11
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 12 of 20 PageID: 1299
`
`Infrastructure Task Force in 1993 with the mandate to develop comprehensive information
`
`technology policies and programs that would promote the development of the national
`
`information infrastructure (“NII”). The Working Group on Intellectual Property Rights,
`
`Intellectual Property and the National Information Infrastructure, executive summary (1995).
`
`“The Working Group on Intellectual Property Rights was established within the Information
`
`Infrastructure Task Force to examine the intellectual property implications of the NII and make
`
`recommendations on any appropriate changes to U.S. intellectual property law and policy.” Id.
`
`The Working Group held extensive hearings and wrote the Report of the Working Group on
`
`Intellectual Property Rights, just cited.
`
`Released in September, 1995, and known as the “White Paper,” the Report presented a
`
`draft of §§ 1201 and 1202, and discussed the rationale for these sections:
`
`Systems for managing rights in works are being contemplated in the development
`of the NII. These systems will serve the functions of tracking and monitoring uses
`of copyrighted works as well as licensing of rights and indicating attribution,
`creation and ownership interests. A combination of file- and system-based access
`controls using encryption technologies, digital signatures and steganography are,
`2
`and will continue to be, employed by owners of works to address copyright
`management concerns. Such security measures must be carefully designed and
`implemented to ensure that they not only effectively protect the owner's interests
`in the works but also do not unduly burden use of the work by consumers or
`compromise their privacy. And measures should be studied to ensure that systems
`established to serve these functions are not readily defeated.
`
`To implement these rights management functions, information will likely be
`included in digital versions of a work (i.e., copyright management information) to
`inform the user about the authorship and ownership of a work (e.g., attribution
`information) as well as to indicate authorized uses of the work (e.g., permitted use
`information). For instance, information may be included in an ‘electronic
`envelope’ containing a work that provides information regarding authorship,
`copyright ownership, date of creation or last modification, and terms and
`
`2
`
`As explained in the Report, steganography is digital watermarking. (Id. 188.)
`
`12
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 13 of 20 PageID: 1300
`
`conditions of authorized uses. As measures for this purpose become incorporated
`at lower levels (e.g., at the operating system level), such information may become
`a fundamental component of a file or information object.
`
`Once information such as this is affiliated with a particular information object
`(e.g., data constituting the work) and readily accessible, users will be able to easily
`address questions over licensing and use of the work. For example, systems for
`electronic licensing may be developed based on the attribution or permitted use
`information associated with an information object.
`
`(Id. 191-192.)
`
`The White Paper understood “copyright management information” to be information
`
`about authorship, ownership, and permitted uses of a work that is included in digital versions of
`
`the work so as to implement “rights management functions” of “rights management systems.”
`
`Such systems are conceived of as electronic and automated within the environment of a computer
`
`network.
`
`As a model rights management system, the White Paper points to the Library of
`
`Congress’ Electronic Copyright Management System, as described in R.E. Kahn, Deposit,
`
`Registration and Recordation in an Electronic Copyright Management System, Proceedings of
`
`Technical Strategies for Protecting Intellectual Property in the Networked Multimedia
`
`Environment, Interactive Multimedia Assoc. (Jan. 1994). This paper describes the operation of
`
`an automated rights management system within a computer network environment. This system
`
`would automate the process of granting usage rights online, providing “automated rights
`
`clearance . . . which would accelerate permissions and royalty transfers between users and
`
`rightsholders.” Id. This could produce the “effect of creating an instant electronic marketplace
`
`for such information.” Id.
`
`The White Paper demonstrates that the Working Group on Intellectual Property Rights, in
`
`13
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 14 of 20 PageID: 1301
`
`drafting § 1202, understood this section to protect the integrity of automated copyright
`
`management systems functioning within a computer network environment. This interpretation is
`
`confirmed by contemporaneous commentary:
`
`The prerequisite to enforcement on the information superhighway is the ability to
`discover incidents of electronic infringement and identify the person(s)
`responsible. One step in this direction is the development of methods for the
`authentication and identification of copyrighted works transmitted over the
`information superhighway. . . The use of copyright identification information will
`be to no avail, however, if sophisticated infringers simply alter or destroy this
`information. Recognizing this problem, the Working Group recommends, as part
`of its proposal to add a new chapter 12 to the Copyright Act, a provision that
`would prohibit and impose criminal penalties for the fraudulent use, removal, or
`alteration of copyright management information.
`
`Jessica R. Friedman, A Lawyer’s Ramble Down the Information Superhighway: Copyright, 64
`
`Fordham L. Rev. 705, 719 (1995).
`
` The draft legislation presented in the White Paper was introduced in both houses of
`
`Congress immediately upon its release as the “The National Information Infrastructure Copyright
`
`Protection Act” (“NIICPA”). See Julie E. Cohen, A Right to Read Anonymously: A Closer Look
`
`at ‘Copyright Management’ in Cyberspace, 28 Conn. L. Rev. 981, 989 (1996). As Congress
`
`developed the DMCA, the NIICPA was incorporated into it. Sections 1201 and 1202 underwent
`
`no significant revision between drafting in 1995 and enactment in 1998 under section 103 of the
`
`DMCA, Public Law 105-304.
`
`The Congressional committees which considered the DMCA published a number of
`
`reports on the Act relevant to §§ 1201 and 1202. There is little discussion, however, of § 1202.
`
`The Senate Committee Report provides this commentary:
`
`Rights management information is ‘information which identifies the work, the
`author of the work, the owner of any right in the work, or information about the
`terms and conditions of use of the work . . . which is attached to a copy of a work
`
`14
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 15 of 20 PageID: 1302
`
`or appears in connection with communication of the work to the public.’ Art. 12.
`Rights management information is more commonly referred to in the U.S. as
`copyright management information (CMI). The purpose of CMI is to facilitate
`licensing of copyright for use on the Internet and to discourage piracy.
`
`Copyright Management Information (CMI) is an important element in establishing
`an efficient Internet marketplace in copyrighted works free from governmental
`regulation. Such information will assist in tracking and monitoring uses of
`copyrighted works, as well as licensing of rights and indicating attribution,
`creation and ownership.
`
`Under the bill, CMI includes such items as the title of the work, the author, the
`copyright owner, and in some instances, the writer, performer, and director. CMI
`need not be in digital form, but CMI in digital form is expressly included.
`
`S. Rep. No. 105-190 (1998) . Viewed alone, this gives only a vague idea as to what copyright
`
`management information is and how it functions. It is, however, consistent with the
`
`understanding established supra, as it emphasizes the role of such information in facilitating
`
`licensing on the Internet, discouraging piracy, and establishing an efficient Internet marketplace.
`
`There is nothing to suggest that the Senate Committee understood § 1202 differently from the
`
`Working Group, as protecting the integrity of automated copyright management systems
`
`functioning within a computer network environment.
`
`Similarly, the House Committee stated: “A new ‘Section 1202’ to the Copyright Act is
`
`required by both WIPO Treaties to ensure the integrity of the electronic marketplace by
`
`preventing fraud and misinformation.” H.R. Rep. No. 105-551 (1998). This committee report,
`
`in addressing a different DMCA section, states: “It may, in appropriate circumstances include the
`
`absence of customary indicia of ownership or authorization, such as a standard and accepted
`
`digital watermark or other copyright management information.” Id. This shows that Congress
`
`viewed a digital watermark as an example of copyright management information.
`
`One company that performs digital watermarking provides this definition: “digital
`
`15
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 16 of 20 PageID: 1303
`
`watermarking technologies allow users to embed into audio, images, video and printed
`
`documents a digital code that is imperceptible during normal use but readable by computers and
`
`software.” Digimarc, About Digital Watermarking, http://www.digimarc.com/watermark/about/
`
`(last visited Dec. 20, 2005). Again, these references show an understanding of § 1202 and
`
`copyright management information as involving automated copyright management systems
`
`functioning within a computer network environment.
`
`The legislative history is otherwise helpful in showing how Congress understood the
`
`DMCA as a whole. The committee reports show that Congress intended the DMCA to apply to
`
`“electronic commerce” and the “electronic marketplace” (H.R. Rep. No. 105-551 (1998)) and to
`
`“digital networks” (S. Rep. No. 105-190 (1998)). Furthermore, the reports show that Congress
`
`viewed §§ 1201 and 1202 together as preventing circumvention of the “technological measures”
`
`referred to in § 1201: “Subsection (a) of Section 103 thus amends title 17 to establish this new
`
`Chapter 12 to the Copyright Act to protect against certain acts of circumvention of technological
`
`measures employed by copyright owners to defend against unauthorized access to or copying of
`
`their works.” Staff of H. Comm. on the Judiciary, 105 Cong., Section-by-Section Analysis of
`th
`
`H.R. 2281 as Passed by the United States House of Representatives on August 4, 1998 (Comm.
`
`Print 1998).
`
`This interpretation of § 1202 makes sense additionally because it fits § 1201 with § 1202,
`
`and with chapter 12 as a whole. The language of § 1201 expressly states that it concerns the
`
`circumvention of a “technological measure” which either “effectively controls access to a work”
`
`or “effectively protects a right of a copyright owner.” These two provisions are sections within a
`
`common chapter (chapter 12, “Copyright Protection and Management Systems”) and are the two
`
`16
`
`

`
`Case 2:03-cv-05221-SDW-MCA Document 63 Filed 01/10/06 Page 17 of 20 PageID: 1304
`
`provisions covered by the remedies and penalty provisions of §§ 1203 and 1204. Chapter 12, as
`
`a whole, appears to protect automated systems which protect and manage copyrights. The
`
`systems themselves are protected by § 1201 and the copyright information used in the
`
`functioning of the systems is protected in § 1202.
`
`This interpretation fits well with statements in the legislative history about the historical
`
`context of the DMCA. Congress intended the DMCA to modernize copyright protection as a
`
`response to the development of new technologies which both enabled new forms of copyright
`
`protection as well as new forms of copyright infringement. As observed by Cohen and discussed
`
`supra, traditionally, the rights of authors have been managed by people, who have controlled
`
`access and reproduction. Throug

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket