Intellectual Property and the Internet: Copyright Infringement Liability in the Digital Era
|
|
|
- Estella Gray
- 10 years ago
- Views:
Transcription
1 Intellectual Property and the Internet: Copyright Infringement Liability in the Digital Era An Advisen Special Report February, 2010 Executive summary In an era in which copyright-protected material can be replicated and transmitted across the globe with a few keystrokes, companies need to be vigilant about avoiding lawsuits, and perhaps even criminal prosecution, for inadvertent copyright law violations. Websites are particularly vulnerable to copyright issues because of their visibility and the ease with which copyright violations can occur in digital media. The borderless nature of the Internet can subject website owners and operators to liability under copyright laws not only in their home country, but throughout the world. Copyright infringement is only one of several closely related intellectual property exposures, including trademark, trade name and trade dress infringement, but it is the exposure that most readily can lead to mammoth claims. Risk management practices can reduce the exposure, and copyright infringement coverage is available through cyberliability insurance policies. Introduction: Copyright infringement in cyberspace Blatant infringement of copyrighted material is rampant on the Internet. Copy-and-paste functionality makes it simple to lift digitized information whether text, photographs, video, or music from a website or other digital source and copy it in-full to another location. Enforcement may be a problem from a practical standpoint, but the legal issues often are cut-and-dried. The Internet also raises a host of new legal issues. Do search engines make illegal copies when they index a web page? Is a hyperlink to copyrighted material copyright infringement? Do copyright laws apply to s? Are Internet service providers responsible for copyrighted material published online by subscribers? Is a message board or blog host responsible for copyrighted content posted by contributors? Copyright laws have evolved to address some of these issues, but others still are unsettled, and new issues arise as technology progresses. Adding a further layer of complexity, the Internet is oblivious to national borders. Activities that may be legal in one country may run afoul of copyright laws in another. Copyright infringement is one of a group of related intellectual property exposures that also includes trademark, trade name and trade dress infringement, but it is the exposure that most often triggers headline grabbing lawsuits and super-sized settlements. Many of the largest and most contentious copyright battles have been waged in the entertainment arena. In an early and highly publicized case, the file sharing service Napster was sued by several record companies for contributory and vicarious copyright infringement. Bertelsmann, a media company that was a Napster investor, paid around $400 million to settle the various suits. More recently, social network websites such as 1
2 MySpace and the video sharing networking site YouTube have been targeted in very large copyright infringement suits. The Universal Music Group (UMG) filed a copyright infringement suit against MySpace for allowing users to upload and download songs and music videos. UMG sought damages of $150,000 per song or video posted, claiming that millions of songs and videos on MySpace pages may infringe its copyrights. Media company Viacom filed a copyright infringement lawsuit against YouTube and its parent Google, seeking at least $1 billion in damages. Viacom charged that YouTube has harnessed technology to willfully infringe copyrights on a huge scale. The typical business website is unlikely to trigger billion dollar copyright infringement lawsuits, but companies nonetheless need to be aware of the many ways they can inadvertently run into copyright infringement trouble. Developers may unknowingly use copyright-protected images without permission when building a company s website. White papers, reports, PowerPoint presentations and other documents posted on a website may contain copyright-protected material used without permission. A company sponsored blog may be targeted by news organizations for reproducing even small excerpts of articles. Websites with message boards or similar applications may be accused of contributory copyright infringement for material posted by visitors to the site. The law continues to evolve in response to rapidly changing technology and new forms of digital publishing, networking and communication. The fluid and ever-changing nature of copyright exposures, and the fact that the law is reactive responding after the fact to changes means that legal ambiguities and gray areas are inevitable. Despite the complexity of copyright law and the constantly shifting risk landscape, basic risk management steps can effectively reduce exposure to copyright infringement liability. Additionally, insurance coverage is available for the exposure. Copyright laws Article I, Section 8, Clause 8 of the United States Constitution, often known as the Copyright Clause, empowers the United States Congress To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." Copyright was not a new idea when the Constitution was written; copyright protection had existed in England since 1710 with the passage of the Statute of Anne. The United States Congress enacted the first federal copyright law in May The 1886 Berne Convention established recognition of copyrights among sovereign nations. The 1976 Revision of the US Copyright Act acknowledged the impact of changing technology, specifically photocopying. It also contains an exception to the exclusive rights of owners to make and distribute copies of their works, codifying the so-called "fair use" doctrine that previously had existed in common law: the fair use of a copyrighted work for purposes such as criticism, comment, news reporting, teaching, scholarship, or research, is not an infringement of copyright. The type and amount of material covered by the fair use provision remains a contentious issue. US copyright law was thrust into the Internet era with the passage of the Digital Millennium Copyright Act of 1998 (DMCA). The Act criminalizes production and dissemination of devices intended to circumvent digital rights management tools that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright. Additionally, it 2
3 shields online service providers from copyright infringement liability for simply transmitting protected information over the Internet, and requires "webcasters" to pay licensing fees to record companies. Other provisions carve out exclusions and limitations of liability for nonprofit libraries, archives, and educational institutions. The DMCA provides safe harbors from copyright infringement liability for online service providers, but only if certain conditions are met. These conditions address issues such as the service provider's knowledge of the infringing material, the service provider s control over the infringing material, the financial benefit derived by the service provider from the infringing material and the service provider's response in removing or disabling access to infringing material when notified. The DMCA defines four categories of service providers. Organizations that may not consider themselves to be online service providers may in fact fall into one of these categories and be eligible for the safe harbor benefits provided by the Act. Issues and exposures Some copyright infringement issues posed by digital media and the Internet, such as fair use of news articles, are new variations on old problems. Others, such as dissemination of digital circumvention technologies, are products of the Internet era. Taken together, they comprise a bewildering and constantly shifting minefield of exposures for any company with an online presence. Fair use of news stories. The fair use provision of the 1976 Revision of the US Copyright Act permits limited use of copyrighted material for activities such as criticism, comment, news reporting, teaching, scholarship, and research. Many legal battles have been fought over the years as to what constitutes fair use of copyrighted material, and it has once again surfaced as a hot button issue. Newspaper publishers, with dissipating revenue due to Internet competition, in particular are concerned about the widespread use of their content under the guise of fair use. The concern is that even small excerpts of news articles republished elsewhere may dissuade readers from purchasing newspapers or online subscriptions to read the full article. In some cases, websites that publish excerpts of news stories are better optimized for search engines, meaning that, for example, an excerpt of a New York Times article on the Huffington Post website may appear in search results ahead of the original New York Times article. According to concerned publishers, in that case, the Huffington Post may benefit from increased ad revenue while the reader may never visit the New York Times site. Copyright infringement lawsuits naming bloggers and other online publishers are on the rise. The Associated Press (AP) has been particularly aggressive in trying to limit the scope of fair use. AP requires a license to use more than four words from an article, and has been vigorously enforcing its narrow definition of fair use. In one well publicized case the AP demanded a blog known as the Drudge Retort (a website offering a contrary view to the well-known conservative blog, the Drudge Report) remove seven quotes from AP articles ranging from 39 to 79 words. After a flurry of negative publicity, the AP backed off, and in a statement admitted its demand on the Drudge Retort was heavy handed, and that the news organization would rethink its position as concerns bloggers. However, it continued to pressure the Drudge Retort to remove the seven items. Subsequently, the AP issued a statement saying it would challenge blog postings 3
4 containing excerpts of AP articles "when we feel the use is more reproduction than reference, or when others are encouraged to cut and paste." Contributory copyright infringement. An issue for any website where visitors can post content is claims of contributory copyright infringement. Contributory copyright infringement is a common law theory that states that an individual or an organization is liable for copyright infringement if it knowingly induces, causes, or materially contributes to the infringing conduct of another. The contributory infringement theory has typically been applied in cases where the owner of an online discussion board or a peer-to-peer file sharing service permitted contributors to post copyrighted material. However, the concept potentially has much broader applicability. The explosive popularity of social network sites such as MySpace and Facebook opens new vistas of potential contributory copyright infringement liability. Hundreds of millions of people around the world have pages on social network sites that display their personal information. These pages also often contain copyrighted content that has been uploaded without the owner's consent. As noted earlier, MySpace was sued by Universal Music Group, which sought damages of $150,000 per song or video posted, and YouTube has been sued by Viacom, which is seeking more than $1 billion in damages. However, copyright infringement exposure is not limited to content from published authors, motion picture studios and music publishers. Since copyright exists from the moment of a work's creation, virtually everything that is lifted from another site, including such things as personal photographs and homemade videos are protected (though the copyright owner must register the copyright before pursuing an infringement suit in court). Operators of social network sites can benefit from the safe harbor provisions of the DMCA by complying with various conditions outlined in the Act. Nonetheless, the potential for litigation is significant. Peer-to-peer networks and the companies that make the software that power them have been targeted especially by record companies. Peer-to-peer software enables music and video files to be shared among a network of personal computers. The Napster case, discussed above, resulted in about $400 million in settlements paid by Bertelsmann, a media company that was a large investor in the file sharing service. The Supreme Court ruled on the issue of contingent copyright infringement and peer-to-peer services in 2005 in MGM v. Grokster. Grokster, a peer-to-peer service used to share recorded music, was sued by record companies for encouraging its users to violate copyrights. In the opinion, Justice David Souter wrote, "We hold that one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement." Major social networking and file sharing sites are not the only types of websites that are exposed to contingent copyright infringement liability. Building a community of members or customers a goal of many websites may involve discussion boards, chat rooms or other applications that enable participants to post copyrighted material. In some cases, these websites have protection under the safe harbor provisions of the DMCA, but in all cases website owners are well-advised to police posted content and to have procedures in place to respond to demands to remove copyright-protected materials. Vicarious copyright infringement. Like contributory copyright infringement, vicarious copyright infringement is a form of indirect copyright infringement. Vicarious copyright infringement occurs when a person or a business has a direct financial interest in 4
5 infringing actions being committed by another and has the ability to control it, even if they do not know that the infringement is taking place and do not directly take part in it. Vicarious copyright liability is a product of the common law doctrine of agency respondeat superior. Under this doctrine the superior (or "principal") is held responsible for the acts of its subordinate (or "agent"). A company (the principal in this case) can be held liable for the actions of its employees and others deemed agents of the company even if the agents are acting independently and, in some cases, without explicit authority of the principal. A recent, highly-publicized case, demonstrates the potential liability of a principal for the actions of an agent in a copyright infringement situation. A judge presiding over a copyright infringement case determined that a principal-agency relationship existed between presidential candidate John McCain and the Republican National Committee (RNC). US District Judge R. Gary Klausner refused to dismiss Senator McCain from a lawsuit concerning a campaign video produced by the RNC for Internet distribution that used a segment of Jackson Browne's song "Running on Empty" without permission. The Senator claimed he was not involved in any way in the creation of the video, and did not even know it existed until after the lawsuit was filed. The suit was settled in July 2009 for an undisclosed amount. Hyperlinks. A defining characteristic of the World Wide Web is the hypertext link, or hyperlink, a reference embedded in a web page that a reader can follow directly to another web page. A number of lawsuits have alleged that linking to copyright-protected material is an infringement, but a US District Judge ruled in March 2000 that hyperlinks do not constitute copyright infringement because no copy is actually created in the process of linking (Ticketmaster Corp v. Tickets.com, Inc). However, courts have found that operators of websites that knowingly link to other sites containing infringing content may be held liable for contributory infringement under some circumstances. In one case, Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc, after being ordered to remove a copyrighted handbook from its website, the defendant linked to other websites containing illegal copies of the same material. Judge Tena Campbell of the US District Court in Salt Lake City ruled that linking to the unauthorized copies of the handbook constituted contributory copyright infringement. Software. According to the House Report discussing the 1976 Copyright Act, computer programs are protected under copyright law to the extent that they incorporate authorship in a programmer s expression of original ideas, as distinguished from the ideas themselves. According to the Sixth Annual BSA-IDC Global Software Piracy Study, 41 percent of the software in use in 2008 was pirated. On an individual level, people may illegally share software with friends and family. Software also is shared over the Internet through peer-to-peer file sharing programs. Companies may violate software copyrights by running more copies of a software product than is permitted by their license. On a global scale, software piracy syndicates typically located in developing countries where enforcement is lax reproduce and sell large amounts of unlicensed software to the public. Violations of software copyrights can take the same forms discussed above, namely contributory copyright infringement and vicarious copyright infringement. For example, file sharing networks that knowingly permit unlicensed software to be distributed may be subject to legal action for contributory copyright infringement. Software also is subject to other copyright issues. Software, for example, can be cracked, disabling features that 5
6 limit or control its use. A common type of crack removes the expiration period from a time-limited trial of an application. Cracking is essentially the same as circumventing digital rights management features, and is illegal under the DMCA. Cross-border enforcement issues. Because the Internet is global in scope, individuals or companies may engage in activity that is legal in their own country, but violates copyright laws in other nations where material may be accessed. A case with potentially wide-reaching implications is United States v. ElcomSoft and Dmitry Sklyarov, a criminal case in which Dmitry Sklyarov and his employer ElcomSoft were charged with manufacturing and selling a software program that could circumvent technological protections on copyrighted material. Sklyarov, a Russian citizen employed by the Russian company ElcomSoft, was arrested while visiting the United States for allegedly violating the DMCA by writing ElcomSoft's Advanced ebook Processor software. The US government ultimately agreed to drop all charges against Sklyarov, provided he testify at the trial of his company. In December 2002 a federal jury found ElcomSoft not guilty of all charges under the DMCA. The case raised, but did not resolve, important issues about an individual being prosecuted for activities that are legal in the country where they occurred, but which run afoul of copyright laws elsewhere. Related intellectual property infringement. Copyright infringement is one of several related intellectual property exposures. Closely allied are trademark, trade name and trade dress infringement. The legal issues are similar, and lawsuits often allege copyright infringement along with other types of intellectual property infringement. In one closely watched case, The New York Times Co. was sued by GateHouse, a chain of local newspapers. Times Co. allegedly infringed both GateHouse s copyrights and its trademarks when a subsidiary company posted headlines and article snippets from GateHouse publications on its website. The interesting twist is that the alleged trademark infringements occurred as a result of the snippets being attributed to various GateHouse brands such as Newton Tab, Daily News Tribune, and Wicked Local. Risk management and insurance Common sense risk avoidance practices are always the first step in managing any type of risk, but the complexity of copyright law and the rapidly evolving nature of digital communication create risk scenarios that sometimes defy common sense. As a result, almost every company needs a copyright infringement risk management program. Elements of the program should include: A written statement from senior management prohibiting the use of copyrightprotected material without permission in any material produced on behalf of the company. A limited exception can be made for cautious use of material falling under the fair use provision of the law. Education in fair use for all employees who produce material to be published, whether in print or digital media, including content for a company s website. A written policy for responding to DMCA take-down notices and other demands for removing copyright-protected material from a website. Online service providers, as defined by the DMCA, must follow specific procedures defined by 6
7 the Act in order to avail themselves of the safe harbor provisions of the Act. Those procedures are defined in Title II of the Act, which can be found at Review of the company s website and its policies concerning fair use and removal of copyright-protected material by a lawyer knowledgeable in copyright law. Insurance for copyright infringement is available in various forms. Specialized Copyright Infringement insurance provides coverage for alleged infringement of someone else s copyright. Professional publishers and broadcasters can find protection under Media Liability policies. Copyright infringement is one of the covered "offenses" enumerated in the "advertising injury" portion of a typical Commercial General Liability ("CGL") policy. However, companies with a clear exposure to copyright infringement may not want to rely on the limited coverage in the CGL policy, which is tied to the (albeit broadly-construed by the courts) concept of advertisement. Additionally, CGL policies often exclude Internet service providers, website designers and advertising companies from advertising injury coverage, and most CGL policies now exclude coverage for electronic forums or bulletin boards hosted by the insured. Copyright infringement is one of the coverages provided by cyberliability insurance policies. Cyberliability policies provide a package of coverages relating to Internet communication, computer network activities and information assets, addressing both first-party and third-party risks. Since a great many companies now have a presence on the Internet or electronically transact some portions of their business, cyberliability insurance is increasingly viewed as a necessary part of an overall risk management and insurance strategy. One advantage of a cyberliability policy is that copyright infringement coverage, usually including plagiarism and misappropriation of ideas, typically is packaged with related intellectual property coverages such as coverage for infringement of trademark, trade name or trade dress. This is important since a copyright lawsuit also can embrace other claims, especially trademark and trade dress infringement allegations. Most companies do not regard themselves as being in the publishing business, but the moment they go online with a website they assume the exposures of a publisher. This includes, especially, exposure to copyright infringement liability. File-sharing and social networking websites pose obvious copyright infringement risks, but they also enjoy certain protections under the law. A typical business website may seem far less exposed to copyright infringement suits, but the ease with which protected material can be reproduced in digital media creates unanticipated risks. Every company with a website is well advised to develop and implement a copyright infringement risk management program, and should consider cyberliability insurance for protection against copyright infringement and related exposures. If you have any questions about copyright infringement risk management or insurance, you can ask the experts at Swett & Crawford at 7
8 For more information about cyberliability insurance products, visit the Swett & Crawford Professional Services Group website at This Advisen Special Report was written by David Bradford, Executive Vice President, Thanks to Jason White and Mark Smith of Swett &Crawford for their input. About Swett & Crawford Swett & Crawford, headquartered in Atlanta, Georgia, is owned by its employees and two private equity firms, HM Capital Partners and Banc of America Capital Investors. In its national network of offices, Swett & Crawford serves independent agents and brokers through specialized Property, Casualty, Oil & Gas/Energy, Professional Services, Transportation and Underwriting Practice Groups. These groups provide access to commercial insurance products and programs, including property and casualty coverages, products liability, directors & officers and professional liability including cyber/privacy/security, commercial and public auto liability as well as a host of customized binding authorities and exclusive programs tailored to specific industries, businesses and professionals. About Advisen Advisen integrates business information and market data for the commercial insurance industry and maintains critical risk analytics and time-saving workflow tools for over 530 industry leading firms. Through its work for the broadest customer base among information service providers, Advisen delivers actionable information and risk models at a fraction of the cost to have them built internally. Designed and evolved by risk and insurance experts, and used daily by more than 100,000 professionals, Advisen combines the industry s deepest data sets with proprietary analytics and offers insight into risk and insurance that is not available on any other system. Advisen is headquartered in New York. For more information, visit or call in New York or +44(0) in London. 8
The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service
The Role of Internet Service Providers in Stopping Internet Copyright Infringement Jennie Ness Regional IP Attaché U.S. Commercial Service New Means of Distribution Webcasting or Streaming Uploading and
CONCERNS WITH THE LEAKED INTERNET CHAPTER OF ACTA
CONCERNS WITH THE LEAKED INTERNET CHAPTER OF ACTA The U.S. proposal for an Internet chapter in the Anti-Counterfeiting Trade Agreement (ACTA) has been leaked to the press and widely disseminated on the
UCO Copyright Compliance Starting Point for Al Copyright Concerns: 1. Is the work Copyrighted? 2. Is the class traditional or Online?
UCO Copyright Compliance As members of the UCO community, all faculty and staff members are expected to comply with federal copyright law. Unauthorized use of copyrighted material is illegal and may result
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including
COPYRIGHT, FREE AND OPEN SOURCE SOFTWARE AND ASSORTED GRAND. Steven P. Tapia Senior Attorney Microsoft Corporation
COPYRIGHT, FREE AND OPEN SOURCE SOFTWARE AND ASSORTED GRAND CONSPIRACY THEORIES Steven P. Tapia Senior Attorney Microsoft Corporation 2 The sound of people thinking too hard. 3 Why Are We Here? To promote
What You Need to Know and What You Need to Do
South Central Wisconsin MLS Corporation 4801 Forest Run Road, Suite 101 Madison, WI 53704 Phone (608) 240-2800 Fax (608) 240-2801 What You Need to Know and What You Need to Do A Real Estate Broker s Risk
to Individuals and Small Businesses That Operate on the Internet
40 THE Online Copyright Infringement: Minimizing Exposure to Individuals and Small Businesses That Operate on the Internet by Lawrence A. Waks, JeffERy R. Johnson & Emilio B. Nicolas With the advent and
AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape
AVCC Australian Vice-Chancellors Committee the council of Australia s university presidents Peer-to-Peer File Sharing: the Legal Landscape November 2003 This work in copyright free to universities and
Analysis & Solution for Indirect Infringing Liability. of Developers of P2P File Sharing Software
Analysis & Solution for Indirect Infringing Liability Ⅰ. Introduction of Developers of P2P File Sharing Software Fan Wen* Philips IP Academy Fudan University Law School P2P software is increasingly becoming
Blogging and Other Social Media
Blogging and Other Social Media Exploiting the Technology and Protecting the Enterprise Alex Newson with Deryck Houghton and Justin Patten The Law of Social Media Chapter 18 This chapter provides an overview
Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8
Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Carl D. Crowell, OSB No. 982049 email: [email protected] Drew P. Taylor, OSB 135974 email: [email protected] CROWELL LAW P.O. Box 923 Salem,
The Digital Millennium Copyright Act: Basics and Issues
The Digital Millennium Copyright Act: Basics and Issues Lesley McCall Grossberg, BakerHostetler 2015 Lesley McCall Grossberg 2 Purpose & Overview Amends Copyright Act of 1976 Implements WIPO Copyright
Working Through the Internet: Intellectual Property, Privacy, and Other Issues for Non-Profits. September 28, 2010
Working Through the Internet: Intellectual Property, Privacy, and Other Issues for Non-Profits September 28, 2010 Presenters David L. Cavanaugh is co-vice chair of s Intellectual Property Department. Michael
IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.
Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full
Viacom sues Google over YouTube video clips
1 Viacom sues Google over YouTube video clips Google and Viacom headquarters. Viacom has feuded publicly with YouTube and its parent Google about the unauthorized posting of its programming online. 2 The
Internet: Copying & Downloading
INFORM ATION SHEET G056v 09 May 2015 Internet: Copying & Downloading This information sheet is for people who want to copy or download material from the Internet or swap and share files online. The purpose
Equipment Needed. Connecting to the Internet
All resident students are provided with access to a high-speed Internet connection. Connection to this network is done at the students own risk. The College is not responsible for material viewed or downloaded
8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.
1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors
How Is The Liability Of Internet Service Providers Limited Under The Digital Millennium Copyright Act?
2012 International Conference on Economics Marketing and Management IPEDR Vol.28 (2012) (2012) IACSIT Press, Singapore How Is The Liability Of Internet Service Providers Limited Under The Digital Millennium
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
Terms of Use The Human Face of Big Data Website
Terms of Use The Human Face of Big Data Website Effective Date: September 12 th, 2012 Welcome to The Human Face of Big Data, a project of Against All Odds Productions ( AAOP ). The Human Face of Big Data
STANFORD UNIVERSITY TO: John Etchemendy, Provost FROM: DATE: Fall 2005. Copyright Reminder SUBJECT:
STANFORD UNIVERSITY TO: FROM: Members of the Faculty, Hoover Institution Fellows, Senior Fellows, Department Administrators, Academic Staff (teaching and research), Library Directors, Students and Administrative
Protecting Your Ideas: An Introduction to Intellectual Property Rights. By Sasha G. Rao and Andrew J. Koning
Protecting Your Ideas: An Introduction to Intellectual Property Rights By Sasha G. Rao and Andrew J. Koning You have an idea. Something that s going to revolutionize the industry. You re excited, but before
1. General Rules & Regulations
cosmeticsurgerycounselling.com is owned and operated by Cosmeticsupport.com, operating as a private agency. This information archive and support site is therefore governed under the laws of UK, the EU.!
Covered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
Pennsylvania Law on Advertising Injury
Pennsylvania Law on Advertising Injury Summary of Cases Atlantic Mutual Insurance v. Brotech Corp., 857 F. Supp. 423 (E.D. Pa. 1994), aff'd, 60 F.3d 813, 1995 U.S. App. LEXIS 15297 (3d Cir. May 12, 1995)
INTERNET USAGE AND THE POTENTIAL EFFECT IN YOUR MANAGEMENT OF YOUR PATENT PROGRAM. Steven D. Hemminger. Lyon & Lyon, LLP
INTERNET USAGE AND THE POTENTIAL EFFECT IN YOUR MANAGEMENT OF YOUR PATENT PROGRAM Steven D. Hemminger Lyon & Lyon, LLP {1} Much has been written and said about the Internet and the benefits for a company
FAQ s on The Center for Copyright Information And Copyright Alert System
1. How significant is online content theft? FAQ s on The Center for Copyright Information And Copyright Alert System Content theft is estimated to cost the U.S. economy $58 billion, 373,000 American jobs
Discovery in Bad Faith Insurance Claims: State of the Law, Successful Strategies. Teleconference Program Wednesday, March 29, 2006
Discovery in Bad Faith Insurance Claims: State of the Law, Successful Strategies Teleconference Program Wednesday, March 29, 2006 Topic III A. Who is suing? Does it matter? 1. Whether suit is brought by
Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More
Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More By Lisa Guerin, J.D. Nolo, 2011, ISBN:1-4133-1326-0 Price $26.95, pp. 225 pages Reviewed by Nina T. Dow Journal of High Technology
Social Media Platform Agreements and Brand Risk
Social Media Platform Agreements and Brand Risk BRUCE GOLDNER AND NAOMI SOSNER, SKADDEN, ARPS, SLATE, MEAGHER & FLOM LLP, WITH PRACTICAL LAW INTELLECTUAL PROPERTY & TECHNOLOGY This Article summarizes key
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President
AGREEMENT BETWEEN USER AND DENTAL WARRANTY CORP
AGREEMENT BETWEEN USER AND DENTAL WARRANTY CORP The network of Web Sites (collectively, the "DWC Web Sites") operated by Dental Warranty Corp or its affiliates or subsidiaries ("DWC" or "Dental Warranty
The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University
The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University Immaculata University ( IU ) takes a strong stand against unlawful distribution of copyrighted music,
Copyright Notice: digital images, photographs and the internet
Copyright Notice: digital images, photographs and the internet Copyright Notice Number: 1/2014 Updated: March 2014 What is a Copyright Notice?... 1 Copyright in images and photographs... 1 The basics...
MEMORANDUM ON COPYRIGHT LAW AND COMPLIANCE
MEMORANDUM ON COPYRIGHT LAW AND COMPLIANCE As educators, authors and creators of copyrightable works, members of the University community have a duty to respect the copyright interests of third parties.
COPYRIGHT & FAIR USE BASICS FOR NONPROFITS
PUBLIC COUNSEL COMMUNITY DEVELOPMENT PROJECT COPYRIGHT & FAIR USE BASICS FOR NONPROFITS MAY 2010 COPYRIGHT & FAIR USE BASICS FOR NONPROFITS Like for-profit businesses, nonprofit organizations seek to market
RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES
RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES The following constitute the terms and conditions of access and use of the Services, as defined hereunder, which shall be deemed to have been read and
SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS
These terms of use govern your use of our site. Please read the whole of these terms in full before you use this Website. If you do not accept these terms, please do not use this Website. Your continued
PIRATES OF THE DIGITAL MILLENNIUM
PIRATES OF THE DIGITAL MILLENNIUM By John Gantz and Jack B. Rochester Upper Saddle River, NJ, Financial Times Prentice Hall, 2005, ISBN0-13-246315-2 (Price $25.95) pp. 294. Reviewed by Rachel S. Leeds
Government Contract. Andrews Litigation Reporter. Intellectual Property Rights In Government Contracting. Expert Analysis
Government Contract Andrews Litigation Reporter VOLUME 23 h ISSUE 6 h July 27, 2009 Expert Analysis Commentary Intellectual Property Rights In Government Contracting By William C. Bergmann, Esq., and Bukola
Data security: A growing liability threat
Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
TRADEMARK AND COPYRIGHT NOTICES
TRADEMARK AND COPYRIGHT NOTICES The Sites on which these Terms and Conditions are located ("Sites") contain many of the valuable trademarks and service marks owned and used by U.S. Taco Co. throughout
Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
purchased and is using the Products including the online classroom ("Customer" or "You") and the individuals accessing the Products ("End Users").
End User License Agreement 1. PARTIES This Agreement is by and between KM NETWORK SDN. BHD ( 719624 T), a registered company in Malaysia, Address: 20 1, JALAN 24/70A, DESA SRI HARTAMAS, KUALA LUMPUR, MALAYSIA,
COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS
1 of 6 8/16/2007 9:16 AM TOPIC: COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS INTRODUCTION: This past summer saw developments relating to peer-to-peer ( P2P ) music file sharing. Of most significance,
copyright reform Bill C - 11
intellectual property bulletin June 2012 copyright reform Bill C - 11 After several failed attempts, the federal government has finally passed copyright reform legislation, namely Bill C-11, the Copyright
The Society for Cinema and Media Studies Statement of Best Practices for Fair Use in Teaching for Film and Media Educators
The Society for Cinema and Media Studies Statement of Best Practices for Fair Use in Teaching for Film and Media Educators Introduction. The field of film and media studies in the United States was shaped
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic
Jozii LLC WEBSITE TERMS OF SERVICE
Jozii LLC WEBSITE TERMS OF SERVICE 1. Acceptance of Terms. Welcome to Jozii. By using our Internet website, you indicate your unconditional acceptance of the following Terms of Service. Please read them
How To Use The Blog Safely And Responsibly
BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
Terms of Use Gateway Clipper Website
Terms of Use Gateway Clipper Website General Information Regarding These Terms of Use Master terms: Unless otherwise noted on a particular site or service, these master terms of use ( Master Terms ) apply
Case 1:16-cv-05015-AT Document 1 Filed 06/27/16 Page 1 of 14 IN THE UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK
Case 1:16-cv-05015-AT Document 1 Filed 06/27/16 Page 1 of 14 IN THE UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK WINDSTREAM SERVICES, LLC, ) ) Plaintiff, ) ) vs. ) Case No.: 1:16-cv-5015
i2 Virtual Office T&Cs
i2 Virtual Office T&Cs Terms of Service This Agreement, which governs the terms and conditions of your use of i2 Virtual Office services ( hereinafter referred to as the "Service" or" Services") provided
Web Terms & Conditions
PART 1: OUR AGREEMENT WITH YOU 1. AGREEMENT 1.1 Parties This Agreement is made between Cheap Web Designers (ACN 126 117 619) of Suite 504, 365 Little Collins Street Melbourne VIC 3000 ("CWD") and YOU the
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
AGREEMENT BETWEEN USER AND International Network of Spinal Cord Injury Nurses
AGREEMENT BETWEEN USER AND International Network of Spinal Cord Injury Nurses The International Network of Spinal Cord Injury Nurses Web Site is comprised of various Web pages operated by International
Terms and Conditions
Below are the first 5 pages of our 11-page attorney-drafted WEBSITE AND BLOG TERMS AND CONDITIONS AGREEMENT (TERMS OF USE) Most terms of use agreements being offered on the Internet are only 3-5 pages
Keeping a Finger on the Pulse of Social Media in Healthcare: Understanding Evolving Roles and Risks
Keeping a Finger on the Pulse of Social Media in Healthcare: Understanding Evolving Roles and Risks Viviane Jesequel, RN, BS, HCRM Social media is simply a broad umbrella term that covers a wide range
Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment
Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment As requested by the Commerce Select Committee Contents Introduction
Art Institute Intellectual Property Policy (MAY 2013)
I. Purpose or Scope Art Institute Intellectual Property Policy (MAY 2013) The unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject students and
PARRY G. CAMERON, Senior Attorney
Phone: 310.557.2009 Fax: 310.551.0283 Email: [email protected] Parry Cameron has over twenty-three years experience in commercial and business litigation at both the trial and appellate levels. He
USE AND PROTECTION OF INTELLECTUAL PROPERTY GUIDELINES FOR CHAPTERS WITH NEWSLETTERS OR WEBSITES The Compassionate Friends, Inc.
USE AND PROTECTION OF INTELLECTUAL PROPERTY GUIDELINES FOR CHAPTERS WITH NEWSLETTERS OR WEBSITES The Compassionate Friends, Inc. Creating a website or publishing a newsletter can be an effective way to
Insuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Music and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
AGREEMENT BETWEEN USER AND Global Clinical Research Management, Inc.
AGREEMENT BETWEEN USER AND Global Clinical Research Management, Inc. The Global Clinical Research Management, Inc. Web Site is comprised of various Web pages operated by Global Clinical Research Management,
ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013
ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013 Welcome to the Army Learning Management Service (ALMS), which is provided by the United States Army. These Terms of Use / Terms of Service
PATENT LITIGATION IN MEXICO: OVERVIEW AND STRATEGY
PATENT LITIGATION IN MEXICO: OVERVIEW AND STRATEGY SUBSTANTIVE ISSUES IN PATENT LITIGATION IN MEXICO Global E-Commerce Law and Business Report. September, 2003. Patent infringement actions. The Mexican
Safe Harbor for Online Service Providers Under Section 512(c) of the Digital Millennium Copyright Act
Safe Harbor for Online Service Providers Under Section 512(c) of the Digital Millennium Copyright Act Brian T. Yeh Legislative Attorney March 26, 2014 Congressional Research Service 7-5700 www.crs.gov
Hearing on Domestic Minor Sex Trafficking
Written Submission of the Center for Democracy & Technology before the House Committee on the Judiciary, Subcommittee on Crime, Terrorism, and Homeland Security Hearing on Domestic Minor Sex Trafficking
Websites: Social Networks, Blogs & Usergenerated
INFORMATION SHEET G108v04 December 2014 Websites: Social Networks, Blogs & Usergenerated Media In this information sheet we give an overview of copyright issues that apply when people operating websites,
THE OTTAWA REGION CHARITY & NOT-FOR-PROFIT LAW SEMINAR
THE OTTAWA REGION CHARITY & NOT-FOR-PROFIT LAW SEMINAR Ottawa February 13, 2014 Copyright Issues for Charities and NPOs: What You Need to Know and Do By Colin J. Thurston, B.A. (Hons.), J.D., Trade-Mark
TERMS OF USE FOR DNBL portal
TERMS OF USE FOR DNBL portal User Terms of Use (UToU) Edition 1.0 Table of Contents 1. Introduction... 2 2. Acceptance of User Terms of Use (UToU)... 2 3. Definitions... 3 4. User Terms of Use (UToU)...
