CFP Tutorial

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 38

TUTORIAL ON INTELLECTUAL PROPERTY LAW

Pamela Samuelson & David Post Computers Freedom & Privacy April 4, 2000
1

OVERVIEW
Samuelson will do:
Overview on intellectual property & its purposes Basics of copyright, emphasizing digital copyright issues Basics of trade secrecy and DeCSS case

Post will do:


Trademark & domain name disputes Patents for software & business methods

WHAT IS IP?
Intangible rights in commercially valuable information permitting owner to control market for products embodying the information Copyrights for artistic & literary works Patents for technological inventions Trade secrets for commercially valuable secrets (e.g., source code, Coke formula) Trademarks (e.g., Coke) to protect consumers against confusion
3

ELEMENTS OF IP LAW
Subject matter to be protected Qualifications for protection
Who can claim Procedure for claiming Substantive criteria

Set of exclusive rights Limitations on exclusive rights Infringement standard Set of remedies
4

DIFFERENT THEORIES
Utilitarian: grant rights to create incentives for beneficial investments Natural rights: persons have natural rights in their creations if valuable Personality-based: my creation is an extension of myself Unjust enrichment: appropriating someone elses work may be unfair
5

ELEMENTS OF COPYRIGHT
Subject matter: works of authorship
(e.g., literary works, musical works, pictorial works; NB: software is a literary work)

Qualifications:
Who: the author (but in US, work for hire rule) Procedure: rights attach automatically (but US authors must register to sue; remedies depend on regis.) Criteria: originality (some creativity); in US, works must also be fixed in some tangible medium
6

COPYRIGHT ELEMENTS (2)


Set of exclusive rights (right to exclude others)
to reproduce work in copies, to prepare derivative works, to distribute copies to the public, to publicly perform or display the work, or communicate it to the public moral rights of integrity & attribution (US visual art) some rights to control acts of those who facilitate or contribute to others infringement (e.g., ISPs, agents)
7

COPYRIGHT ELEMENTS (3)


Limitations on exclusive rights:
Fair use (e.g., Sony Betamax, Acuff-Rose) in US Fair dealing in UK and Canada First sale (e.g., libraries, bookstores) Library-archival copying (e.g., ILL, course reserves) Classroom performances Special inter-industry compulsory licenses (e.g., cablenetwork TV) Other (e.g., playing radio in fast food joint)
8

COPYRIGHT ELEMENTS (4)


Limitations on exclusive rights: duration
Berne standard: life + 50 years EU & US: life + 70 years; 95 yrs from publication

Infringement standard: violating exclusive right (often copying of expression from protected work based on substantial similarity) Remedies: injunctions, lost profits, infringers profits, statutory damages, costs, & sometimes attorney fees
9

UNCOPYRIGHTABLE STUFF
Ledger sheets and blank forms Rules and recipes (merger) White pages listings of telephone directories Facts and theories Ideas and principles Methods of operation/processes Bicycles and bicycle racks (too functional)
10

COMPILATIONS AND DERIVATIVE WORKS


Creativity in selection and arrangement of data or other elements = protectable compilation Original expression added to preexisting work = protectable d/w (e.g., novel based on movie) Compilation or derivative work copyright doesnt extend to preexisting material (e.g., data or public domain play) Use of infringing materials may invalidate copyright in compilation or derivative work
11

INTERNATIONAL TREATIES
Berne Convention for Protection of Literary & Artistic Works Basic rule: national treatment (treat foreign nationals no worse than do own) Berne has some minimum standards (duration, exclusive rights, no formalities) WIPO administers treaties, hosts meetings to update, revise, or adopt new treaties
12

INTERNATIONAL TREATIES (2)


TRIPS (Trade-Related Aspects of Intellectual Property Rights) Agreement Sets minimum standards for seven classes of IPR, including copyright, that binds WTO members Must have substantively adequate laws, as well as adequate remedies and procedures and must enforce effectively Dispute resolution process now available (e.g., EU challenge to US music licensing exception)
13

DIGITAL COMPLICATIONS
Digitized photographs of public domain works (e.g., Microsoft claims ownership in some) Very easy to reselect and rearrange the data in databases; uncreative databases may be very valuable; EU has created a new form of IP right in contents of databases to deal with this New ways to appropriate information (e.g., NBA sued Motorola for stealing data from NBA games for sports pager device) Digital environment lacks geographic boundaries
14

DIGITAL COMPLICATIONS (2)


Cant access or use digital information without making copies Very cheap and easy to make multiple copies and disseminate via networks Very easy to digitally manipulate w/o detection People expect digital information to be free or nearly so Many people think that private copying doesnt infringe copyright; much of industry disagrees
15

DIGITAL COPYRIGHT CONTROVERSIES


Linking, framing, & filtering iCraveTV case Cyberpatrol case RIAA v. Diamond (Rio player case) UMG Recordings v. MP3.com Napster case DeCSS cases
16

US WHITE PAPER ON IP & THE NII (1995)


Full potential of NII wont be realized unless IP/copyright owners are adequately protected Many are withholding works from the net because of threat of piracy Copyright can be adapted to digital environment, need a few changes
17

WHITE PAPER POSITIONS


Authors have right to control temporary copies in RAM (reading or browsing as infringement?) Fair use should recede (if work can be licensed, it must be licensed) No more first sale/sharing rights (first sale only permits redistributing same copy, not making new ones) ISPs should be held strictly liable for user infringements
18

WHITE PAPER POSITIONS


Need for new rules to make it illegal to remove or alter copyright management information (CMI) Need to outlaw technologies useful for bypassing technical protection systems Get international treaty to universalize these new norms
19

WIPO COPYRIGHT TREATY (1996)


Reproduction right applies to digital works (but no agreement on temporary copies) Exclusive right to communicate digital works to the public by interactive service Fair use and other exceptions can apply as appropriate; new exceptions OK Merely providing facilities for communication not basis for liability
20

WIPO TREATY (2)


Tampering with copyright management information to enable or conceal infringement should be illegal Need for adequate protection and effective remedies for circumvention of technical protection systems Treaty not yet in effect, but US has ratified; EU in process of implementing; Canada has signed
21

DMCA
Digital Millennium Copyright Act (1998) Safe harbor provisions for ISPs
Transitory network communication System caching User-stored information Information location tools

Section 1201: anti-circumvention rules Section 1202: false CMI/removal of CMI


22

DMCA ANTICIRCUMVENTION RULES


Treaty very vague; unclear whats required Campbell-Boucher bill in US: proposed to outlaw circumvention of TPS to enable copyright infringement MPAA: wanted all circumvention outlawed Compromise in DMCA: illegal to circumvent an access control, 17 U.S.C. s. 1201(a)(1) But 2 year moratorium; LOC study; 7 exceptions
23

EXCEPTIONS TO CIRCUMVENTION RULE


Legitimate law enforcement & national security purposes Reverse engineering for interoperability Encryption research and computer security testing Privacy protection & parental control Nonprofit shopping privilege
24

ANTI-DEVICE PROVISIONS
Illegal to manufacture, import, offer to public, provide or otherwise traffic in Any technology, product, service, device, [or] component If primarily designed or produced to circumvent TPS, if only limited commercial purpose other than to circumvent TPS, or if marketed for circumvention uses
25

MORE ON DEVICE RULES


1201(a)(2)--devices to circumvent effective access controls 1201(b)(1)--devices to circumvent effective controls protecting right of cop. owners Actual & statutory damages + injunctions Felony provisions if willful & for profit MPAA v. Reimerdes 1st civil case
26

CURIOUS THINGS ABOUT 1201


Only 3 exceptions to 1201(a)(1) explicitly allow building tools Only interoperability exception limits both anti-device rules Did Congress mean to allow circumvention to make fair use, yet make it illegal to make tools needed to accomplish? (Ha! Ha!) LOC to study only act, not device rules
27

PROBLEMS WITH A/C REGS


Legitimate purpose circumventions
existing exceptions overly narrow need for general purpose exception clarify that fair use circumvention is OK

Dual use technologies


tools to enable legitimate uses how device rules could be narrowed

Copyright-centric regulations
28

EXCEPTIONS TOO NARROW


Interoperability: not just programs; other reverse engineering may be legitimate Encryption and computer security research:
no authorization and expert requirements OK to make tools less onerous rules on disseminating results

Privacy exception: Windows 2000 hypothetical


29

A GENERAL PURPOSE EXCEPTION?


Need for or other legitimate purpose exception to access control rule Examples of other legitimate acts:
if reasonable grounds to believe infringing copy or computer virus inside TPS illegitimate invocation of technical self-help

Courts able to tell difference between legitimate & illegitimate acts


30

DUAL USE TECHNOLOGIES


Circumvention tools are not burglars tools Ways to narrow rules:
substantial noninfringing use standard intent/knowledge/injury/infringement requirement commercially significant cf. apparent legitimate purpose (freeware should not be vulnerable) technology-specific (e.g., circumvention of SCMS)

Think through relation between range of legitimate circumventions and availability of tools (if X is lawful, tool to do X should be OK)
31

COPYRIGHT-CENTRICITY
Encryption protects more than commercial copyrighted products (e.g., private personal communications, trade secret/confidential business information, e-cash) Circumvention of encrypted information is a more general problem (sometimes legitimate, sometimes not) So is the availability of circumvention technology Would suggest the need for a general law
32

UNINTENDED CONSEQUENCES?
X makes software that circumvents Ys encryption system Z is a copyright owner who decides to use Ys encryption system to protect digital pictures Does Xs tool then become illegal? Can Y sue X? Can Z sue X? What harm has Xs software done to Y or Z? 1201 (a)(2) and (b)(1) does not require any underlying infringement; mere potential is enough
33

MPAA v. REIMERDES
Injunction vs. posting of DeCSS on websites or otherwise making it available CSS is effective access control for DVDs DeCSS circumvents it & has no other commercially significant purpose Lack of evidence for Linux compatibility argument Besides, 1201(f) only protects interoperation with programs, not data on DVD
34

ELEMENTS OF TRADE SECRECY


Information that can be used in business that is sufficiently valuable & secret as to afford an economic advantage to the holder Outgrowth of unfair competition law No exclusive rights as such, but protected vs. use of improper means & breach of confidence Independent development & reverse engineering are legitimate ways to acquire a trade secret Relief generally limited to period in which independent development would have occurred
35

DVD-CCA v. McLAUGHLIN
Trade secret misappropriation case CSS = proprietary information; DVD-CCA took reasonable steps to maintain secret Inference: someone must have violated clickwrap license forbidding reverse engineering Breach of agreement was improper means Even though DeCSS on web for 4 months, not to enjoin would encourage posting TS on Web Judge upset by boasting about disrespect for law
36

IMPLICATIONS OF DVD-CCA
Anti-reverse engineering clauses are common in software licenses; enforceability much debated Judges willingness to enforce and treat information obtained through reverse engineering as trade secret worrisome Judges willingness to enjoin information that had been public for several months may be error Fruit of poisonous tree rationale (judge knows Johansen didnt reverse engineer, nor did many posters, yet held as trade secret misappropriators)
37

CONCLUSION TO PART I
Digital technology has posed many difficult questions and problems for copyright law Much remains in controversy; how current cases are resolved matters a lot Possible to build balance into law, but US selling broad anti-circumvention rules Gap in perception about law as between copyright industry and the public; enforceability & respect for law contribute to difficulties Easier to see the risks than the opportunities
38

You might also like