Corresponsabilità (contributory infringement) nella violazione del copyright a carico dell’internet provider

L’appello del 5 Distretto 09.10.2024, No. 23-50162, UMG Recordings, Capitol Records ed altre majorts della musica c. Grande Communications Network, decide un caso di corrsponsabilità di tipo P2P, confermando la condanna di prim grado (nell’an, non nel quantum),

Nel caso specifico la correpopnsabilità non era contestabile, dato che l’ISP era stato notiziato della violazione e nulla ha fatto.

Ma cìè staa battaglia comunque su due dei quattro requisiti di legge (<< Plaintiffs had to show (1) that Plaintiffs own or have exclusive control over valid copyrights and (2) that those copyrights were directly infringed by Grande’s subscribers. See BWP Media USA, 852 F.3d at 439. To further prove that Grande was secondarily liable for its subscribers’ conduct, Plaintiffs had to demonstrate (3) that Grande had knowledge of its subscribers’ infringing activity and (4) that Grande induced, caused, or materially contributed to that activity>>): precisamente sul 2 e sul 4. Nessuna invece sul n. 3, implicitamente ammmettendosi la willful blindness.

Qui contano spt. le tattiche di forensics: (1) ad es col software Audible Magic: Plaintiffs’ trade association, the Recording Industry Association of America, Inc.
(“RIAA”), used an industry-standard software program called Audible
Magic—which forensically analyzes the contents of digital audio files to
determine if those files match the contents of files in a database that contains
authorized authentic copies of Plaintiffs’ sound recordings—to verify that
Rightscorp in fact downloaded each work at issue,.

(2) Oppure col soggetto terzo incaricato da esse di indagini, Rightscorp: .

“To crack down on copyright infringement, third-party companies
have developed technologies to infiltrate BitTorrent and identify infringing
users by their IP addresses. One such company is Rightscorp, Inc.
(“Rightscorp”). Rightscorp’s proprietary technology:
• Interacts with BitTorrent users and obtains their agree-
ment to distribute unauthorized copies of copyrighted
works
• Records the relevant available details of that agreement,
such as the user’s IP address and what the infringed
content is
• Cross-references the user’s IP address against publicly
available databases to identify which ISP is affiliated
with that IP address
• Generates and sends infringement notices to the rele-
vant ISPs so that they can identify their infringing sub-
scribers and take appropriate action; and
• Frequently reconnects with the identified infringing IP
addresses and downloads copies of the copyrighted
works at issue directly from those users
In other words, Rightscorp identifies infringing conduct on
BitTorrent by engaging with BitTorrent users, documents that conduct, and
uses the information available to it to notify ISPs of its findings so that the
ISP can take appropriate action”.

Sintesi finale:

<< The evidence at trial demonstrated that Grande provided its
subscribers with the tools necessary to infringe (i.e., high-speed internet
access) and that Grande’s subscribers used those tools to infringe Plaintiffs’
copyrights.14 See BMG, 881 F.3d at 306-08. Based on the consistency of the
trial evidence, the district court determined that there was “no question that
[Grande] intentionally continued to provide Internet service” to its
infringing subscribers.
Grande’s affirmative choice to continue providing its services to
known infringing subscribers—rather than taking simple measures to
prevent infringement—distinguishes this case from Cobbler Nevada, LLC v.
Gonzales, 901 F.3d 1142 (9th Cir. 2018), on which Grande relies. There, the
Ninth Circuit considered a claim alleging that a subscriber of internet
services who received infringement notices failed to “secure, police and protect” his account from third parties who used his internet access to
infringe. Cobbler, 901 F.3d at 1145-46. The direct infringers were never
identified. See id. at 1145 n.1. Because the pleading premised liability
exclusively on the subscriber’s failure to take action against unknown third-
party infringers, it was insufficient to state a claim. See id. at 1147-49. Here,
Plaintiffs proved at trial that Grande knew (or was willfully blind to) the
identities of its infringing subscribers based on Rightscorp’s notices, which
informed Grande of specific IP addresses of subscribers engaging in
infringing conduct. But Grande made the choice to continue providing
services to them anyway, rather than taking simple measures to prevent
infringement. Additionally, Cobbler addressed only inducement liability
under Grokster; it did not opine on the evidence required for establishing
material contribution. See id. The court in Cobbler rejected the plaintiff’s
invitation to create “an affirmative duty for private internet subscribers to
actively monitor their internet service for infringement,” id. at 1149; it did
not absolve ISPs like Grande that continue providing services to known
infringing subscribers.
The evidence at trial demonstrated that Grande had a simple measure
available to it to prevent further damages to copyrighted works (i.e.,
terminating repeat infringing subscribers), but that Grande never took it. On
appeal, Grande and its amici make a policy argument—that terminating
internet services is not a simple measure, but instead a “draconian
overreaction” that is a “drastic and overbroad remedy”—but a reasonable
jury could, and did, find that Grande had basic measures, including
termination, available to it. See Amazon.com, 508 F.3d at 1172. And because
Grande does not dispute any of the evidence on which Plaintiffs relied to
prove material contribution, there is no basis to conclude a reasonable jury
lacked sufficient evidence to reach that conclusion.

In sum, because (1) intentionally providing material contribution to
infringement is a valid basis for contributory liability; (2) an ISP’s continued
provision of internet services to known infringing subscribers, without taking
simple measures to prevent infringement, constitutes material contribution;
and (3) the evidence at trial was sufficient to show that Grande engaged in
precisely that conduct, there is no basis to reverse the jury’s verdict that
Grande is liable for contributory infringement >>.

Interessante infine è la riduzine del quantum, dovendosi determinare il danno statutory non per singolo brano ma per albums., Ma ciò dipende da specifica norma del 17 US Code § 504 (“for the purposes of this subsection, all the parts of a compilation or derivative work constitute one work”).

 

(Notizia e link dal blog di Eric Goldman)

Ancora sulla responsabilità degli internet provider per le violazioni copyright dei loro utenti (con un cenno a Twitter v. Taamneh della Corte Suprema USA, 2023)

Approfondita sentenza (segnalata e linkata da Eric Goldman, che va sempre ringraziato) US BANKRUPTCY COURT-SOUTHERN DISTRICT OF NEW YORK, In re: FRONTIER COMMUNICATIONS CORPORATION, et al., Reorganized Debtors, Case No. 20-22476 (MG), del 27 marzo 2024.

Si v. spt. :

-sub III.A, p. 13 ss, “Secondary Liability for Copyright Infringement Is a Well-Established Doctrine”;

– sub III.B “Purpose and Effect of DMCA § 512”, 24 ss.

– sub III.D “Twitter Did Not Silently Rewrite Well-Established Jurisprudence on Secondary Liability for Copyright Infringement” p. 31 ss sul rapporto tra la disciplina delle violazioni copyright e la importante sentenza della Corte Suprema Twitter, Inc. v. Taamneh, 598 U.S. 471 (2023).

Di quest’ultima riporto due passaggi dal Syllabus iniziale:

– la causa petendi degli attori contro Twitter (e Facebook e Google):

<< Plaintiffs allege that defendants aided and abetted ISIS in the
following ways: First, they provided social-media platforms, which are
generally available to the internet-using public; ISIS was able to up-
load content to those platforms and connect with third parties on them.
Second, defendants’ recommendation algorithms matched ISIS-re-
lated content to users most likely to be interested in that content. And,
third, defendants knew that ISIS was uploading this content but took
insufficient steps to ensure that its content was removed. Plaintiffs do
not allege that ISIS or Masharipov used defendants’ platforms to plan
or coordinate the Reina attack. Nor do plaintiffs allege that defend-
ants gave ISIS any special treatment or words of encouragement. Nor
is there reason to think that defendants carefully screened any content
before allowing users to upload it onto their platforms>>

– La risposta della SCOTUS:

<<None of plaintiffs’ allegations suggest that defendants culpably “associate[d themselves] with” the Reina attack, “participate[d] in it as
something that [they] wishe[d] to bring about,” or sought “by [their]
action to make it succeed.” Nye & Nissen, 336 U. S., at 619 (internal
quotation marks omitted). Defendants’ mere creation of their media
platforms is no more culpable than the creation of email, cell phones,
or the internet generally. And defendants’ recommendation algorithms are merely part of the infrastructure through which all the content on their platforms is filtered. Moreover, the algorithms have been presented as agnostic as to the nature of the content. At bottom, the allegations here rest less on affirmative misconduct and more on passive nonfeasance. To impose aiding-and-abetting liability for passive nonfeasance, plaintiffs must make a strong showing of assistance and scienter.     Plaintiffs fail to do so.
First, the relationship between defendants and the Reina attack is
highly attenuated. Plaintiffs make no allegations that defendants’ relationship with ISIS was significantly different from their arm’s
length, passive, and largely indifferent relationship with most users.
And their relationship with the Reina attack is even further removed,
given the lack of allegations connecting the Reina attack with ISIS’ use
of these platforms. Second, plaintiffs provide no reason to think that
defendants were consciously trying to help or otherwise participate in
the Reina attack, and they point to no actions that would normally
support an aiding-and-abetting claim.
Plaintiffs’ complaint rests heavily on defendants’ failure to act; yet
plaintiffs identify no duty that would require defendants or other communication-providing services to terminate customers after discovering that the customers were using the service for illicit ends. Even if
such a duty existed in this case, it would not transform defendants’
distant inaction into knowing and substantial assistance that could
establish aiding and abetting the Reina attack. And the expansive
scope of plaintiffs’ claims would necessarily hold defendants liable as
having aided and abetted each and every ISIS terrorist act committed
anywhere in the world. The allegations plaintiffs make here are not
the type of pervasive, systemic, and culpable assistance to a series of
terrorist activities that could be described as aiding and abetting each
terrorist act by ISIS.
In this case, the failure to allege that the platforms here do more
than transmit information by billions of people—most of whom use the
platforms for interactions that once took place via mail, on the phone,
or in public areas—is insufficient to state a claim that defendants
knowingly gave substantial assistance and thereby aided and abetted
ISIS’ acts. A contrary conclusion would effectively hold any sort of
communications provider liable for any sort of wrongdoing merely for
knowing that the wrongdoers were using its services and failing to stop
them. That would run roughshod over the typical limits on tort liability and unmoor aiding and abetting from culpability>>.

La norma asseritamente violata dalle piattaforme era il 18 U.S. Code § 2333 (d) (2), secondo cui : <<2) Liability.— In an action under subsection (a) for an injury arising from an act of international terrorism committed, planned, or authorized by an organization that had been designated as a foreign terrorist organization under section 219 of the Immigration and Nationality Act (8 U.S.C. 1189), as of the date on which such act of international terrorism was committed, planned, or authorized, liability may be asserted as to any person who aids and abets, by knowingly providing substantial assistance, or who conspires with the person who committed such an act of international terrorism>>.

Differenza tra non applicabilità dello safe harbour e affermazione di responsabilità

La corte distrettuale del Wisconsin -western dist.-  31.03.2023, caso No. 21-cv-320-wmc, Hopson + Bluetype c. Google + Does 1 e 2, ha ben chiara la differenza tra i due concetti: che non sia invocabile il  safe harbour non significa che ricorra in positivo responsabilità (anche se di fatto sarà probabile).

Non altrettanto chiara ce l’hanno alcuni nostri opininisti (dottrina e giurisprudenza).

Nel caso si trattava del safe harbour per il copyright in caso di procedura da notice and take down e in particolare da asserita vioalzione della procedura che avrebbe dovuto condurre google a “rimettere su” i materiali in precedenza “tirati giu” (§ 512.g) del DMCA).

<<Here, plaintiffs allege that defendant Google failed to comply with § 512(g)’s
strictures by: (1) redacting contact information from the original takedown notices; (2) failing to restore the disputed content within 10 to 14 business days of receiving plaintiffs’ counter notices; and (3) failing to forward plaintiffs’ counter notices to the senders of the takedown notices. As Google points out, however, its alleged failure to comply with  § 512(g) does not create direct liability for any violation of plaintiffs’ rights. It merely denies Google a safe harbor defense should plaintiffs bring some other claim against the ISP for removing allegedly infringing material, such as a state contract or tort law claim. Martin, 2017 WL 11665339, at *3-4 (§ 512(g) does not create any affirmative cause of action; it
creates a defense to liability); see also Alexander v. Sandoval, 532 U.S. 275, 286-87 (2001) (holding plaintiffs may sue under a federal statue only where there is an express or implied private right of action). So, even if Google did not follow the procedure entitling it to a safe harbor defense in this case, the effect is disqualifying it from that defense, not creating liability under § 512(g) of the DMCA for violating plaintiffs’ rights.>>

Ancora nulla circa tale procedura in UE: gli artt. 16-17 del DSA reg. UE 2022/2065 non ne parlano (pare lasciarla all’autonomia contrattuale) e nemmeno lo fa la dir. specifica sul copyright,  art. 17 dir. UE 790/2019.

(notizia e link dal sito del prof. Eric Goldman)

Youtube non è corresponsabile delle violazioni di copyright consistite in ripetuti upload sulla sua piattaforma

Youtube non è corresponsabile delle violazioni di copyright date da ripetuti upload sulla sua piattaforma. Così US distr. court southern district of Florida 16 maggio 2023, Case No. 21-21698-Civ-GAYLES/TORRES, Athos overseas ltc c. Youtube-Google.

domanda attorea:

According to Plaintiff, Defendants are liable under direct and secondary infringement theories for YouTube’s failure to prevent the systematic re-posting of Plaintiff’s copyrighted movies to its platform. Plaintiff contends that YouTube has turned a blind eye to rampant infringement of Athos’ copyrights by refusing to employ proprietary video-detection software to block or remove from its website potentially infringing clips, and not just clips specifically identified by URL in Plaintiff’s DMCA takedown notices. In essence, Plaintiff argues that evidence of YouTube’s advanced video detection software, in conjunction with the thousands of takedown notices Athos has tendered upon YouTube, give rise to genuine issues of fact as to whether Defendants have forfeited the DMCA’s safe harbor protections.

Domanda rigettata: il provider non pèerde il suo safe harbour ex 17 US code § 512 per assenbza dell’element soggettivo:

<<Indeed, in Viacom the Second Circuit rejected identical arguments to the ones asserted here by Athos, which were presented in a lawsuit brought by various television networks against YouTube for the unauthorized display of approximately 79,000 video clips that appeared on the website between 2005 and 2008. Viacom, 676 F.3d at 26. Among other things, the Viacom plaintiffs argued that the manner in which YouTube employed its automated video identification tools—including liming its access certain users—removed the ISP from the safe harbor. Id. at 40–41. Yet, the court unequivocally rejected plaintiffs’ arguments, holding that the invocation of YouTube’s technology as a source of disqualifying knowledge must be assessed in conjunction with the express mandate of § 512(m) that “provides that safe harbor protection cannot be conditioned on ‘a service provider monitoring its service or affirmatively seeking facts indicating infringing activity[.]’”9 Viacom, 676 F.3d at 41 (quoting 17 U.S.C. § 512(m)(1))>>

poi:

<<Plaintiff conflates two concepts that are separate and distinct in the context of YouTube’s copyright protection software: automated video matches and actual infringements. As explained by YouTube’s copyright management tools representative, software-identified video matches are not necessarily tantamount to  copyright infringements. [D.E. 137-7, 74:21–25]. Rather, the software detects code, audio, or visual cues that may match those of a copyrighted work, and presents those matches to the owner for inspection. Thus, while YouTube systems may be well equipped to detect video matches, the software does not necessarily have the capacity to detect copyright infringements. See id. Further, the accuracy of these automatically identified matches depends on a wide range of factors and variable. [Id. at 75:1–10, 108:2–110:17, 113:3–114:25]. That is why users, not YouTube, are required to make all determinations as to the infringing nature of software selected matches. [Id.].
Second, Plaintiff does not point to any evidence showing that YouTube, through its employees, ever came into contact, reviewed, or interacted in any way with any of the purportedly identified video matches for which Athos was allegedly required to send subsequent DMCA takedown notices (i.e., the clips-in-suit). As explained by YouTube’s product manager, the processes of uploading, fingerprinting, scanning, and identifying video matches is fully automated, involving minimal to no human interaction in the part of YouTube. [Id. at 68:22–69:18, 118:17–119]. The record shows that upon upload of a video to YouTube, a chain of algorithmic processes is triggered, including the automated scanning and matching of potentially overlapping content. If the software detects potential matches, that list of matches is automatically directed towards the copyright owner, by being displayed inside the user’s YouTube interface. [Id. at 68:22–70:25]. Therefore, the record only reflects that YouTube does not rely on human involvement during this specific phase of the scanning and matching detection process, and Plaintiff does not proffer any evidence showing otherwise>>.

sintesi:

<<As the relevant case law makes clear, evidence of the technologies that ISPs independently employ to enhance copyright enforcement within their system cannot form the basis for ascribing disqualifying knowledge of unreported infringing items to the ISP. Such a conception of knowledge would contradict the plain mandate of § 512(m), “would eviscerate the required specificity of notice[,] . . . and would put the provider to the factual search forbidden by § 512(m).” Viacom, 718 F. Supp. 2d at 528. Thus, we find that Athos’ theory that specific knowledge of non-noticed infringing clips can be ascribed to Defendants by virtue of YouTube’s copyright management tools fails as a matter of law>>.

Notizia e link alla sentenza dal blog del prof Eric Goldman

L’embedding non costituisce comunicazione al pubblico però non permette la difesa del safe harbour ex § 512DMCA

Il giudice Barlow della Utah District Court, 2 maggio 2023, caso 2:21-cv-00567-DBB-JCB, decide un’interessante lite sull’embedding.

Attore è il gestore dei diritti su alcune foto eseguite da Annie Leibovitz. Convenuti sono i gestori di un sito che le aveva “riprodotte” con la tecnica dell’embedding (cioè non con riproduzine stabile sul proprio server).

Il giudice applica il c.d server test del noto caso Perfect 10 Inc. v. Google  del 2006 così sintetizzato: <<Perfect 10, the Ninth Circuit addressed whether Google’s unauthorized display of thumbnail and full-sized images violated the copyright holder’s rights. The court first defined an image as a work “that is fixed in a tangible medium of expression . . . when embodied (i.e., stored) in a computer’s server (or hard disk, or other storage device).” The court defined “display” as an individual’s action “to show a copy . . ., either directly or by means of a film, slide, television image, or any other device or process ….”>>.

Quindi rigetta la domanda nel caso dell’embedding sottopostogli :

<<The court finds Trunk Archive’s policy arguments insufficient to put aside the “server” test. Contrary to Trunk Archive’s claims, “practically every court outside the Ninth Circuit” has not “expressed doubt that the use of embedding is a defense to infringement.” Perfect 10 supplies a broad test. The court did not limit its holding to search engines or the specific way that Google utilized inline links. Indeed, Trunk Archive does not elucidate an appreciable difference between embedding technology and inline linking. “While appearances can slightly vary, the technology is still an HTML code directing content outside of a webpage to appear seamlessly on the webpage itself.” The court in Perfect 10 did not find infringement even though Google had integrated full-size images on its search results. Here, CBM Defendants also integrated (embedded) the images onto their website.(…) Besides, embedding redirects a user to the source of the content-in this case, an image hosted by a third-party server. The copyright holder could still seek relief from that server. In no way has the holder “surrender[ed] control over how, when, and by whom their work is subsequently shown.” To guard against infringement, the holder could take down the image or employ restrictions such as paywalls. Similarly, the holder could utilize “metadata tagging or visible digital watermarks to provide better protection.” (…)( In sum, Trunk Archive has not persuaded the court to ignore the “server” test. Without more, the court cannot find that CBM Defendants are barred from asserting the “embedding” defense. The court denies in part Trunk Archive’s motion for partial judgment on the pleadings.>>

Inoltre, viene negato il safe harbour in oggetto, perchè non ricorre il caso del mero storage su server proprio di materiali altrui, previsto ex lege. Infatti l’embedding era stato creato dai convenuti , prendendo i materiali da server altrui: quindi non ricorreva la passività ma l’attività , detto in breve

(notizia e link alla sentenza dal blog del prof Eric Goldman)

L’azione di danno ex § 512.f Copyright Act concerne solo l’abuso di copyright, non di marchio

UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA, CV 22-4355-JFW(JEMx), del 21 aprile 2023,  Yuga Labs, Inc. -v- Ripps, et al., decide una lite su marchio  in causa promossa dal titolare del NFT “Bored Ape” contro un visual artist (Ripps) che lo critica: Ripps is a visual artist and creative designer who purports to create artwork that comments in the boundaries between art, the internet, and commerce. According to Defendants, Yuga has deliberately embedded racist, neo-Nazi, and alt-right dog whistles in the BAYC NFTs and associated projects.3 Beginning in approximately November 2021, Ripps began criticizing Yuga’s use of these purported racist, neo-Nazi, and alt-right dog whistles through his Twitter and Instagram profiles, podcasts, cooperation with investigative journalists, and by creating the website gordongoner.com.

Y. manda allora richieste di notice and take down (NATD) per marchio spt. ma anche per dir. di autrore.

R. reagisce azionando la disposizione nel  titolo.
Ma la corte -delle 25 richieste NATD- esamina solo quelle (quattro) che hanno portato al take down e solo quelli di copyrigjht (una), non quelle su marchio (tre). Del resto il tenore della norma è inequivoco.

E rigetta l’eccezione (o dom. riconvenzionale?): With respect to the only DMCA notice that resulted in the takedown of Defendants’ content,
Defendants have failed to demonstrate that the notice contains a material misrepresentation that
resulted in the takedown of Defendants’ content or that Yuga acted in bad faith in submitting the
takedown notice. Although Defendants argue that Yuga does not have a copyright registration for
the Ape Skull logo that was the subject of the DMCA takedown notice, a registration is not required
to own a copyright. Instead, a copyright exists at the moment copyrightable material is fixed in any
tangible medium of expression. Fourth Estate Public Benefit Corp. v. Wall-Street.com LLC, 139
S.Ct. 881, 887 (2019); see also Feist v. Publ’ns, Inc. v. Rural Tel. Serv. Co., 449 U.S. 340, 345
(1991) (holding that for a work to be copyrightable, it only needs to possess “some minimal degree
of creativity”). Moreover, courts in the Ninth Circuit have held that a logo can receive both
trademark and copyright protection. See, e.g., Vigil v. Walt Disney Co., 1995 WL 621832 (N.D.
Cal. Oct. 16, 1995).

La setnnza è itnerssante però anche -soprattutto.- per  il profili di mnarchio e concorrenza sleale circa l’uso dell’NFT.

(notizia e link alla sentenza dal blog del prof. Eric Goldman)

La denuncia di elusione dellle protezioni non èp coperta dal 17 U.S. Code § 512 (DMCA) Misrepresentations

La responsabilità del denunciante per aver dolosamente affermato la contraffazione altrui non riguarda il semplice dire che c’è stata elusione delle misure di protezione.

Così la district court of Connecticut 30 settembre 2022, Case 3:20-cv-01602-SRU  , Yout c. The Recording Industry Association of America, Inc. (the “RIAA”), in un azione di accertament negativo proposta da iun fornire di servizi che permettono il  downloading di audiovisivi su Youtube , nonostante questi siano offerti solo in streaming non downloadibile (con il YouTube’s Rolling Cypher).

<< Section 512(f) has is limited to misrepresentations of copyright infringement. See Twelve
Inches Around Corp. v. Cisco Sys.
, 2009 WL 928077, at *3 (S.D.N.Y. Mar. 12, 2009) (“While
Section 512(f) is not explicitly limited to misrepresentation of copyright infringement, it requires
that the misrepresentation be ‘under [Section 512],’ which deals exclusively with copyright
infringement, and sets forth in great detail when and how an internet service provider can be
liable for copyright infringement”);
Arista Records, Inc. v. MP3Board, Inc., 2002 WL 1997918,
at *15 (S.D.N.Y. Aug. 29, 2002) (“Section 512 only penalizes copyright holders for knowingly
materially misrepresenting ‘that material or activity is infringing.’ It does not provide a cause of
action for knowingly materially misrepresenting [other claims].”);
accord Rossi v. Motion
Picture Ass’n of Am., Inc.
, 391 F.3d 1000, 1004 (9th Cir. 2004) (setting forth that a section
512(f) cause of action is an “expressly limited cause of action for improper infringement
notifications”).
Here, Yout has failed to plead a plausible claim for relief under section 512(f) because it
has only alleged that the RIAA knowingly misrepresented that Yout’s software circumvents the
YouTube technological measures, not that Yout is infringing certain copyrighted works.
See
SAC, Doc. No. 45, at 28 ¶¶ 138-140. Although the circumvention notices sent by the RIAA
superficially resemble take down notices under section 512(c), the notices do not identify any
copyrighted works and accordingly are incapable of being misrepresentations under section 512.
See id. at 28 ¶¶ 136-137. Yout attempts to remedy this deficiency by alleging that the RIAA’s
circumvention notices amount to an allegation of secondary copyright infringement and that
Yout’s customers interpreted the notices as alleged copyright infringement.
See SAC, Doc. No.
45, at 27 ¶¶ 136-137. But Yout’s arguments are not persuasive, because the notices stated that
YouTube’s technological measure (therein, “rolling cipher”) “
protects [the RIAA’s] members’
works on YouTube from unauthorized copying/downloading,” not that Yout itself was infringing
the copyrighted works.
Id. at 28 ¶ 137.
Furthermore, even assuming that the RIAA’s notices constituted an allegation of
secondary copyright infringement, Yout has provided no case law that suggests that such an
allegation could result in a violation of section 512(f), nor have I found any caselaw suggesting
so. I decline to credit that claim.
Moreover, I agree with the RIAA that Yout alleges no facts suggesting that the RIAA
“knowingly” misrepresented the nature of Yout’s service. To do so, a defendant must have
actual knowledge that it is making a misrepresentation of fact.
Cabell v. Zimmerman, 2010 WL
996007, at *4 (S.D.N.Y. Mar. 12, 2010). But, again, Yout alleges no facts suggesting that the
RIAA “knowingly” misrepresented the nature of Yout’s service.
Ningbo Mizhihe I&E Co., Ltd.
v. Does 1-200
, 2020 WL 2086216, at *3-4 (S.D.N.Y. Apr. 30, 2020) (dismissing a Section 512(f)
claim where “there [wa]s insufficient material in the pleadings to support the inference that [the
p]laintiff knew their copyrights were not enforceable”);
Cabell, 2010 WL 996007, at *4
(dismissing a Section 512(f) claim where the complaint “allege[d] no facts from which a court
could find it facially plausible that Defendant knew it was misrepresenting the facts when it
wrote to YouTube”).
Because section 512(f) only covers knowing misrepresentations of copyright
infringement and not circumvention of a technological measure, I
grant the RIAA’s motion to
dismiss Yout’s 17 U.S.C. § 512(f) claim
>>

Interpretazione di assai dubbia esattezza.

La sentenza poi offre dettagli tecnici approfonditi sul se Youtube impedisca i download con misure di protezione in senso tecnico ai sensi del copyright e cioè ai sensi del 17 US Code § 1201 (v. § 2 2. The Yout Service,  p 2 segg.).

Stante la normativa italiana (tit. II ter l. autore, artt. 102 quater e quinquies), la motivaizone è di sicuro interesse anche per noi

(notizia e link alla sentenza dal blog del prof. Eric Goldman)

Conflitto tra diritto di parola e diritto di autore : una particolare ma interessante fattispecie decisa a favore del primo

Tizio , restando anonimo con l’account @CallMeMoneyBags , critica su Twitter un tale Brian Sheth, a private-equity billionaire, postando messaggi e foto di lui.

Una società di couinicazione , però , quale sedicente titolare dei diritti sulle foto , chiede a Twitter di dargli il nome ex 17 §512.h US CODE.

Il giudice rigetta accogliendo la difesa di Twitter e facendoo prevalere il diritto di parola (di critica, di satira etc.) , anche perchè l’attore non è riuscito a fugare il sospetto di essere veicolo soceitario a disposizione del medesimo sig. Seth.

Così Il distretto nord della California21 giugno 2022, Case 4:20-mc-80214-VC , IN RE DMCA § 512(H) SUBPOENA TO TWITTER, INC.

This is where the mystery surrounding Bayside makes a difference. If the Court were assured that Bayside had no connection to Brian Sheth, a limited disclosure subject to a protective order could perhaps be appropriate. But the circumstances of this subpoena are suspicious. As far as the Court can tell, Bayside was not formed until the month that the tweets about Sheth were posted on Twitter. It appears that Bayside had never registered any copyrights until the registration of these six photographs, which happened after the tweets were posted. And there appears to be no information publicly available about Bayside’s principals, staff, physical location, formation, or purposes.

Given all the unknowns, at oral argument the Court offered Bayside an opportunity to
supplement the record with an evidentiary hearing or additional documentation. Bayside
declined, stating that it preferred the motion to be adjudicated on the current record. There would
perhaps be some benefit in insisting on an evidentiary hearing to explore the circumstances
behind this subpoena—to explore whether Bayside and its counsel are abusing the judicial
process in an effort to discover MoneyBags’s identity for reasons having nothing to do with
copyright law. Perhaps that hearing could even result in an award of attorney’s fees for Twitter.

Il rapporto tra dirito di autore e diritti fondamentali antagonisti è ormai largamentit tratto anche da noi anzi in tutto il copyright europeo.

(notizia e link alla sentenza dal blog del prof. Eric Goldman)

Asserita violazione di copyright da parte di Pinterest rigettata per l’operatività del safe harbour ex 512.c DMCA

Un fotografo lamenta la riproduzione illecita di sue fotografie in Pinterest (P.).

Precisamente  lamenta non il fatto che altri utenti le carichino o le appuntino o lo faccia P. (verosimilmente ci sarà licenza concordata con/imposta da P. a proprio favore); bensì il fatto che P. le proponga nei feed altrui in abbinamento ad inserzioni pubblicitarie.

P. eccepisce il safe harbour ex § 512.c DMCA.

Il distretto nord della California decide la lite con provvedimento 3 maggio 2022, Davis c. PinterestCase 4:19-cv-07650-HSG , rigettando la domanda per l’esimente predetta.

la sentenza pare corretta, alla luce del tenore delle disposizoni di legge. L’attore aveva invece eccepito la mancanza tra gli altri del requisito dello storage dei materiali altrui .

La sentenza è ineressante perchè esamina il funzionamento di P.

Dice, poi,  che manca la prova per cui P. modifichierebbe il lavoro artistico inserendovi pubblicità: infatti i due newsfeed (pins degli utenti e inserzioni pubblicitarie) sono prodotti da due distinti algoritmi, pp.19-20 e 23/4.

Non c’è violazione di copyright: To the extent that Plaintiff suggests tracking user activity through algorithms or displaying  advertising on the platform is somehow copyright infringement, he offers no support for this novel theory.5 See, e.g., Dkt. No. 176 at 7 (“The undisputed evidence is that the users never asked to be  tracked using the Variants that Pinterest created from Plaintiff’s Works . . . .”). Copyright infringement requires Plaintiff to establish that Pinterest “violate[d] at least one exclusive right granted to copyright holders under 17 U.S.C. § 106.” Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146, 1159 (9th Cir. 2007). Neither tracking users’ activity nor displaying advertising near  Plaintiff’s works violates Plaintiff’s exclusive rights. But even if this did constitute infringing  activity, such conduct would still fall within § 512(c)’s protection., p. 23.

Esamina anhe il grado di dettaglio cui è tenuto l’attore nell’individuare le vioalzioni: tutte le 51 foto azionate o alcune solo, a titolo di esempio (III.A.i, p. 9)? Vecchia questione anche da noi in tema di responsabilità degli internet provider …

Infine manca pure il financial benefit, che deve essere provato relativamene alle vioalzioni specificamente azionate e non -in generale – relativametne al modello di business del convenuto  (altra vecchia questione nazionale  …). Si badi però che nel diritto usa il requisito è espressamente preevisto.

(notizia e link alla sentenza dal blog del prof. Eric Goldman)

(Cor)Responsabilità di Youtube per violazione di copyright commessa da un suo utente

Il consueto problema della qualificazione giuridica della piattaforma Youtube in caso di violazione di copyright è affrontato dalla Southern District Court di New TYork, 21.03.22, Buisiness Casual v. Youtube, caso 21-cv-3610 (JGK).

Tre le causae petendi azionate.

Il direct infringement è escluso per insufficiente allegazione/prova dell’elemento soggettivo richeisto dalla common law, p. 8 ss

Più interessante è che per la Corte , oltre a ciò, esso è escluso a causa della licenza pretesa da Youtube per chi carica materiali propri, come noto. Essa infatti impedirebbbe di ravvisare contraffazione in Y.

L’attore tenta di eludere tale esito  (<<Business Casual contends that the License does not cover the conduct at issue here because the License does not grant any rights “to an unrelated third party, like TV-Novosti, to do whatever it pleases with Business Casual’s content.”>>): ma per la Corte la licenza è sufficientemente ampia da coprire le condotte sub iudice di Y., p. 12.

Ancora, a fronte di una incomprensibile causa petendi dell’attore circa il non sufficientemente motivato ricorso di Y. al safe harbour ex § 512 DMCA, la Corte rigetta, precisando -in breve ma esattamente- la costruzione giuridica del safe harbour: <<The DMCA safe harbors provide potential defenses against copyright infringement claims where, but for the safe harbors, the plaintiff has a meritorious cause of action against the defendant for copyright infringement>>, p.  13

Infine son rigettate pure le causae petendi del concorso nell’illecito, contributory infringement, e della respooonsabilità vicaria, vicarious infringement, 14-15.

(notizia e link alla sentenza dal blog del prof. Eric Goldman)