Professional Documents
Culture Documents
Cyber Law Ba0150032
Cyber Law Ba0150032
by
I certify that
a. The work contained in the project report is original and has been done by myself
under the general supervision of my faculty.
b. I have followed the guidelines provided by the faculty in writing the project report.
c. Whenever I have used materials (data, theoretical analysis, and text) from other
sources, I have given due credit to them by citing them in the text of the project report
and giving their details in the references.
d. Whenever I have quoted written materials from other sources, I have put them under
quotation marks and given due credit to the sources by citing them and giving
required details in the references.
immense help during moments of anxiety and torpidity while the project was
Shankar and the administrative staff of TNNLS who held the project in high
their precious time is unforgettable and highly solicited. Their valuable advice
and timely supervision paved the way for the successful completion of this
project.
Finally, I thank the Almighty who gave me the courage and stamina to
confront all hurdles during the making of this project. Words aren’t sufficient
and earnestly thank all the people who were involved directly or indirectly
during this project making which helped me to come out with flying colours.
A STUDY ON COPYRIGHT INFRINGEMENT IN CYBERSPACE WITH
SPECIAL REFERENCE TO THE LIABILITY OF THE INTERNET
SERVICE PROVIDER
INDEX
CHAPTER I…………………………………………………………..
INTRODUCTION
CHAPTER II ………………….
CHAPTER IV …………………
CHAPTER V ………………………………………………………………
.CONCLUSION
Research question:-
1. If the internet service provider can be held liable for copyright infringement under the
Information Technology Act 2000?
2. Whether the Indian cyber space is in need of a separate statute like the Digital
Millennium Copyright Act (DMCA) for protection of copyrights?
Research Objective:-
CHAPTER I
INTRODUCTION
The Internet is a mere global network of interconnected computer and the respective
networks. The significance of Information Technology is that it has grown more rapidly than
any other modes of communication provided that its influence on humankind is phenomenal.
The invention of the computer has made fax, television, and telephone and other former
technologies go out of a use. The reason being it’s immaculate and instantaneous access to
information that too from anywhere in the globe (ubiquity) with not much effort or
expenditure or costs. Expansion of the Internet from the mid-1990s onward resulted from the
combination of three main factors:
1. The technological discovery of the World Wide Web by Tim Berners-Lee and his
willingness to distribute the source code to improve it by the open-source contribution
of a global community of users, in continuity with the openness of the TCP/IP
Internet protocols. The web keeps running under the same principle of open source.
And two-thirds of web servers are operated by an open-source server program called
the Apache.
2. Making institutional change in the management of the Internet by keeping it under the
loose management of the global Internet community, privatizing it, and allowing both
commercial uses and cooperative uses.
3. Major changes in social structure, culture, and social behavior: networking as a
prevalent organizational form; individuation as the main orientation of social
behavior; and the culture of autonomy as the culture of the net-work society1.
The convergence of unceasing rapid innovation and the evolution of a number of vital
technologies and broadcast media, media and computer publishing have resulted in many
legal disputes. This also because of the unique and distinguished features of this specialised
medium.
Permanency: Almost everything that is uploaded on the internet is been archived and such
material will remain cached making it potentially available even after the removal of the
1
Richard Stallman, Free Software, Free Society, Free Software Foundation, Inc.; 2nd Edition (December 27,
2010)
original material. This may help in ease in search of that material but also facilitates
duplication of the material without breaking a sweat.
Ubiquity: Aforesaid, easily accessibility and dissemination of information from any nook or
corner of the globe.
CHAPTER II
2
https://blog.ipleaders.in/copyright-infringement-on-the-internet/
3
Sec 13 of the Copyright Act 1957
4
Sec 14 of the Copyright Act 1957
5
Microsoft Press Computer Dictionary, third edition, p 207
6
CV-97-6991 ABC
is a very good example of this case where the website developed by the plaintiff was
reproduced by the defendant in a separate frame amounting to infringement.
2. Linking: Linking was found to ease up the job of manually typing the URL of websites
rather by providing link for the linked in the original site. The phenomenon of linking is
of two kinds’ surface linking and deep linking. The first one doesn’t amount to
infringement as its purpose is fulfilled by just providing the location of the linked site.
But deep linking actually may amount infringement as the inner content is being exposed.
This because the deep linking allows access to inner pages that can be entered without
even entering the homepage of the linked website. Shetland Times Ltd v Dr Jonathan
Wills and Zet News Ltd7 hyperlinks created to link the user to articles of Shetland times
was considered infringement.
3. Inlining: Also a form or linking mostly dealing with images. The famous case of Kelly
vs. Arriba Soft Corp8 is an example where the image of plaintiff was used by an image
search engine without prior approval of Kelly but the court rule in favour of Arriba s there
was no commercial nature and relying upon fair use rule.
4. Caching which generally means a temporary storage in this context it refers to disk cache
and cache memory in computers. Firstly the document that is being displayed is copied
and secondly such copied material is retained along with documents reviewed by the user
and such material is uploaded to the Internet Service Provider enabling the material to be
available for a temporary period of time9.
5. Archiving. Archiving without permission of the owner amounts to infringement.
Incorporating particular material of another website that was either downloaded or stored
from another website. Downloading pirated movies, music, applications etc. fall under
this category.
6. Public Display of the Right by uploading on the Internet There is no unrestricted view
of a copyrighted article in the cyber space. Such public display of a copyrighted article
may amount to infringement.
Playboy enterprises Inc v Frena10 the defendant was held liable even though he
was unaware that the bulletin board service contained infringed materials
Playboy Enterprises Inc vs. Web World In11c vicarious copyright infringement if
defendant found to have financial interest in such infringement action.
7
(1997) FSR 604, 1997 SLT 669
8
(JW 1999) US District LEXIS 19304
9
http://www.mondaq.com/india/x/682548/Trademark/Cyber+Theft+of+Intellectual+Property
10
839 F Supp 1552 (MD Fla 1993)
Religious Tech Ctr vs. Netcom Online Communication Service Inc12 defendant
not liable as there was only passage or conduit of information and not control of
information13.14
In the case of copyright infringement in cyber space it is really a hard shell to crack as in the
process to determine the jurisdiction whether to consider the traits of the material such as
1. Place of origin
2. Place of storage
3. Place where being displayed
Choice of statute is also a considerable problem as different copyright statutes are different
from one and another, some contradicting each other.
CHAPTER III
LIABLITY OF ISP IN AN EVENT OF COPYRIGHT INFRINGMENT
The criteria to determine the liability in event of copyright infringement rests on three
theories-
Direct infringement when a person directly and expressively infringes the exclusive right
of the copyright owner. Intention doesn’t count in. Strictly liability.
Vicarious infringement failure to prevent the event of infringement even when such a
person has the capacity or right to do so but ending up benefitting from such event of
infringement. Intention doesn’t count in. Strictly liability.
Contributory infringement. Participating in the act of infringement having knowledge of
such activity15.
Indian scenario
11
986 F Supp 1171 (ND tax 1997)
12
907 F Supp 1361. 1372-73 (ND Cali 1995)
13
William J. Cook, Be Wary of Internet Casting Shadows on Copyright Holders, Chicago Law., Apr. 1996
14
https://www.plagiarismtoday.com/2015/04/23/6-current-copyright-cases-more-important-than-blurred-lines/
15
https://globalinitiative.net/10-biggest-cyber-crimes-and-data-breaches-till-date/
The liability of ISP in the event of copyright infringement is not expressly mentioned or
covered by the Copyright Act 1957. However in the Information Technology Act, 2000 there
is an exemption clause that exempts ISPs from liability in the event of copyright
infringement.
The possibility of determining the liability of ISPs is a tough job because of its
various forms occurring in different problems. The Information Technology Act, 2000 does
carry out a filtering procedure while determining the liability of ISPs in case of copyright
infringements. Basically the procedure is to first treat the act or omission under the respective
Act under which it occurs and if found liable then filtering it through the 79 sec of the
Information Technology Act 2000. Example, if a Service Provider is accused of illegally
allowing access to copyrighted music works, then the liability of the ISP is first determined
under Copyright Act, 195717 if found liable then hi liability again is tested under of section 79
of the IT Act, 200018.
To qualify for exemption, ISPs may neither initiate the transmission, select the
receiver nor have any editorial control by the selecting or modifying the material. Section 79
16
Explanation (a) to s. 79 of IT Act, 2000
17
section 51(a) (ii) and section 63
18
Dinwoodie, Graeme B, Secondary Liability of Internet Service Providers, Springer International
Publishing, Volume 25, 2017
of the IT Act also provides two circumstances under which an ISP can qualify for exemption
from liability:
a) Lack of knowledge: The ISP being unaware of the fact of the event of copyright
infringement or having no knowledge about it is a prerequisite and essential criterion for
determining the liability under section 79 of the IT Act, 2000. If it could be proved that the
ISP was unaware of the happening of the event of copyright infringement or all data that was
stored and conducting though his servers the ISP can escape liability. It is also necessary that
if the ISP is found to have knowledge about the presence of such infringed work in their
storage or passage, they have to carry out measures to removal or taking down of the same
immediately and in event of failure of such measures being taken the ISP is held to be liable.
The provision 79 of the IT Act 2000 lacks clarity in stating service providers their
liability limits. The provision raises questions like in case there is a request made by a person
regarding the purpose of claiming copyright of a particular material that is on the internet19.
Where does the swing sword of liability fall if the ISP fails to take action or measure
within reasonable and what if the service provider fails to prevent the event of infringement
of copyright and whether the plea of not having knowledge of the act is available to him?
And also in the case where the service provider removes the material because of the request
made by a person regarding the purpose of claiming copyright of a particular material that is
on the internet which is later proved to be false, at what quantum the ISPs are liable to the
actual owner of such material that has been removed?
19
James Boyle, The Public Domain, Yale University Press, edition 1 (December 9, 2008)
CHAPTER IV
It is an honest action taken by the United States to push the copyright laws of the
nations to the digital age making it the first state legislate a statue of such nature that too
specifically for copyright works. The Digital Millennium Act 1998 was a shrewd attempt by
the Congress of the United States with the view of establishing and enforcing treaty
obligations and rights associated with copyright.
Various publishers, scientists, civil right groups and laymen came together and made
a collaborative effort in such a significant statute. The DMCA has its background from the
famous Playboy Enterprises v. Frena case where the Court found Frena liable of infringing
the copyrighted work of playboy by uploading their copyrighted photographs. The defendant
pleaded that he had no intention or knowledge of indulging in such activity and also
contended that there was immediate removal of such photographs from The Bulletin Board
Service and had attempts to prevent further uploading of such photographs once it received
the complaint. The court rejected defendant’s argument and ruled in favour of the plaintiff
stating that
Online Copyright Infringement Liability Limitation Act was enacted as a part of the
DMCA after the Playboy Enterprises, Inc. v. Hardenbaugh, case where the defendant was
held liable for directly participating in the infringement by screening the copyrighted
photocopies in the upload file and thereby transferring them to the master file for users20.
20
Kumar Aakanksha, Internet Intermediary (ISP) Liability for Contributory Copyright Infringement in
USA and India: Lack of Uniformity as a Trade Barrier, Journal of Intellectual Property Rights Volume 19,
July 2014, pg.no 272-281.
The main pros of the DMCA is codifying the ruling in the case RTC v NETCOM
clarifying and prohibiting passive automated acts as a ground for raising copyright
infringement claims. Also the statute effectively established the criteria for determining
vicarious and contributory infringement issues raised against Internet Service Providers. Also
the removal of the copyrighted material that has been uploaded can be brought down from the
website in a relatively simple manner under DMCA. Also it is found to be cost efficient and
time saving method as there is no need to hire a lawyer rather the user can directly serve a
notice to the alleged violator to take down the content immediately. Also penalties
skyrocketing up till USD 150,000 per each violation according to DMCA the users are sure to
reconsider their attempt to infringe a copyrighted work21.
CHAPTER V
CONCLUSION
As said above the provision 79 of IT Act 2000 lacks clarity in various aspects leaving lot of
questions unanswered. Only vague elements are found in the statute making it difficult for the
users to raise copyright infringement claims. There must be parts in provisions or specific
provisions that are equipped enough to determine necessary elements like the relationship
between an ISP and a third party, financial aspect of the transaction, as these are vital in
determining the identity of the violator. It won’t make a bad idea if the American model of
contributory infringement is incorporated. I have postulated my suggestions as following to
condense the happening of events of copyright infringement22.
1. Enactment of separate legislation for protection and enforcement of rights of not just
copyright owners but also owners of IP situated in the cyber space with proper and
unambiguous clarification and addressing regarding concepts like limited liability
limits, due diligence of ISP etc.
2. Encouraging the development of technologies like MediaKey in order to curb
copyright infringement.
21
David Halbreich et al., Intellectual Property on the Internet: Surfing Through Liability and Coverage Issues,
Mealey's Litig. Rep.: Emerging Ins. Disputes, Nov. 14, 1996, at 20, 25-26.
22
Singh Devika, Blacklisting blacklists: The Information Technology Amendment Act, 2008 and ISP driven
content filtering, India Law Journal, 2(4) (2009).
3. Providing access authority only to valid legitimate users who are recognized as so by
the owner of such copyrighted article and barring others by methodology of digital
receipts or passcodes or memberships etc.:-
4. Addition of features like timed out and protected viewing, non- sharing only viewable
documents etc. to the copyrighted work.
5. There must be parts in provisions or specific provisions that are equipped enough to
determine necessary elements like the relationship between an ISP and a third party,
financial aspect of the transaction, as these are vital in determining the identity of the
violator. It won’t make a bad idea if the American model of contributory infringement
is incorporated.
BIBLIOGRAPHY
Books Referred
1. James Boyle, The Public Domain, Yale University Press, edition 1 (December 9,
2008)
2. Richard Stallman, Free Software, Free Society, Free Software Foundation, Inc.; 2nd
Edition (December 27, 2010)
3. Dinwoodie, Graeme B, Secondary Liability of Internet Service Providers, Springer
International Publishing, Volume 25, 2017
Articles referred
Websites Referred
https://blog.ipleaders.in/copyright-infringement-on-the-internet/
http://www.mondaq.com/india/x/682548/Trademark/Cyber+Theft+of+Intellectual+Pr
operty
https://www.plagiarismtoday.com/2015/04/23/6-current-copyright-cases-more-
important-than-blurred-lines/
https://globalinitiative.net/10-biggest-cyber-crimes-and-data-breaches-till-date/
https://cyber.harvard.edu/property99/liability/main.html