Online Copyright Infringement: Search for Solutions Continues

After the failures of Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA), the Obama administration’s Internet Policy Task Force has recently put forward a new proposal to making it a felony to stream copyrighted works, along with a Green Paper and call for comments on the future of copyright law in the digital economy. Meanwhile, several studies have examined the impact of piracy on media industry with controversial results. This post reviews efforts to combat online copyright infringement in Europe and in the United States.

Norway’s  Copyright Act Amendment

An amendment to Norway’s copyright law has recently provided copyright holders the power to obtain access to the internet addresses of infringers and to monitor the Internet Service Providers (ISPs) that host infringing materials, prompting comparisons to reincarnated SOPA. The previous law allowed only a single licensed  company to have the permission to locate both website owners and end-users of unauthorized material online, but under the current law, copyright holders will be able to do so directly. When the website owner cannot be identified, the case may be decided without the presence of the defendant. Then, the ISP must follow the court order and block access to the website violating the copyright protection of the right-holder. Moreover, when a legal claim has been submitted, the amendment provides an exemption from the privacy protections of the Electronic Communication Act, which means that the ISP is not obligated to protect the confidentiality of the suspected user’s electronic account.  

Continue reading

Tagged , , , , Leave a comment

Google Books Litigation Update

The advent of mass digitization via Google Books has ignited a series of copyright-related actions filed by book publishers and authors. There are two issues: whether Google and the owners of affiliated digital libraries are entitled to a fair use defense for library use, including providing access to print-disabled individuals, and whether Google may display snippets of books in online searches. The resolution of the fair use questions debated in the two oral arguments this fall will have significant implications for library and online access to a wide range of works. There are three stories worth noting on this topic:

1. American Association of Publishers v. Google

In 2005, five publishers (Simon & Schuster, McGraw-Hill, John Wiley & Sons, Penguin Group, and Pearson Education) sued Google for copyright infringement, seeking injunctive relief. After 7 years of litigation, the publishers and Google settled privately in 2012. Because the settlement was between the named parties, the court was not required to approve its terms. The 2012 settlement allows publishers to choose whether or not to allow Google to digitize their books. If Google does digitize, it will also provide publishers with a digital copy for their own use. For books that have been scanned, Google allows users to access to 20 percent of the book online.  In order for users to access the entire book, they must purchase it from the Google Play store, and Google will then share the revenue with publisher of that book.

Continue reading

Tagged , , , , , 1 Comment

Vermont Takes A Leap: First State To Pass Law To Combat Patent Trolling

Patent trolls have been in the spotlight of national attention in the past year, as President Obama addressed the problem in his Fireside Hangout and a White House report attempted to quantify the impact of abusive litigation. Officially known as Patent Assertion Entities, or PAEs, these companies purchase patents and bring patent infringement claims as a business model. The Federal Trade Commission (FTC) has recently announced a proposal to obtain more data on approximately 25 PAEs in order to better understand their impact on innovation and the economy. Meanwhile, Vermont has become the first state to take matters into its own hands with a state law to combat patent trolls. While it is not clear whether Vermont has the legal authority to regulate patent activities, its innovative “threats action” approach may prove to be successful enough to be adopted more widely.

Background: National Efforts To Prevent Patent Trolling        

On September 16, 2011, President Obama signed into law the Leahy-Smith America Invents Act (AIA), a major amendment to the 1952 Patent Act that has governed patent law for nearly sixty years.  While the primary purpose of the AIA was to encourage innovation by modernizing the patent application and review process, several provisions in the Act were aimed at patent trolls. Following the AIA, additional measures to combat patent trolling have been introduced in Congress. Three of the most high profile proposals are: (1) the Saving High-tech Innovators from Egregious Legal Disputes (SHILED) Act “forces patent trolls to financial responsibility for frivolous lawsuits”; (2) the Patent Quality Improvement Act expands the AIA by allowing more businesses to be covered under the transitional program for business method patents; and (3) the End Anonymous Patent Act, which requires the owner of patents to register with the UPSTO. While these proposals are being debated in Congress, Vermont has become the first state in the nation to pass its own law to combat patent trolls.

Continue reading

Tagged , , , , Leave a comment

Internet Governance in the Age of Surveillance

If the Internet international archives will register 2013 as the year of Edward Snowden and the disclosure of National Security Agency (NSA) surveillance programs by the media, 2012 was all about the mobilization against a United Nations (U.N.) attempt to take over the Internet. This post recaps the legal and policy debate around the negotiation of the International Telecommunications Regulations (ITRs) by the World Conference on International Telecommunications 2012 (WCIT-12) and offers some prediction on the Internet Governance (IG) agenda of 2014.

International Telecommunication Union

Based in Geneva, Switzerland, the International Telecommunications Union (ITU) dates back to the first agreements on international telegraph interconnections in the mid-nineteenth century, making it the oldest body of the U.N. system. Its main functions today include allocation of global radio spectrum and satellite orbits, development of technical standards for networks and technologies interconnection, and improvement of access to telecommunications worldwide. These activities are primarily led by its broad membership, which encompasses 193 Member States and over 700 private-sector companies and academic institutions that engage in consensus-based negotiations at the technical Study Groups of its Radiocommunication, Standardization and Development Sectors.

The ITU legal framework encompasses four international treaty-level instruments: Constitution, Convention, Radio Regulations, and International Telecommunication Regulations. The Plenipotentiary Conference, the Council, the General Secretariat and other four world conferences are the top political bodies that ultimately supervise ITU’s organic structure. Each one of them holds specific mandates in determining ITU’s general policies, evaluating its global activities and eventually amending the treaties.

Continue reading

Tagged , , , , , , , , , , 6 Comments

The Copyright Alert System After Its Roll-Out: First (Non)Reactions

The Copyright Alert System (CAS) was rolled out in late February 2013. CAS constitutes the United States realization of the international concept of “graduated response programs:” frameworks for media owners to address alleged online copyright infringements with computer users through their Internet Service Providers (ISPs). Key features of CAS – and other graduated response programs – are the monitoring of peer-to-peer (P2P) file sharing systems followed by electronic notifications of supposed violations to the user of the computer as well as measures against her that increase in severity with every instance. CAS is a private “six strikes” program based on an agreement between major media corporations and ISPs setting up the so-called Center for Copyright Information (CCI). The consortium’s website describes CAS’ features and emphasizes its educational nature, noting especially that no mandatory termination is built into the agreement and that commercial accounts are not meant to be affected. The Electronic Frontier Foundation, EFF, launched a FAQ of their own when CAS was initiated, however, and pointed out that vast amounts of local businesses are small and reliant on residential-type online access so that in fact “CAS will chill open Wi-Fi.”

Now, two months after the introduction of CAS, how has public access to the Internet already been affected? Where did this scheme come from – and where is it going?

Continue reading

Tagged , , , , , , , , , , , , , Leave a comment

BTLJ Spring Patent Reform Roundup

With spring in the air, it is time to take another look at current news in the world of patent troll litigation. By now full-fledged media darlings, patent infringement lawsuits filed by non-practicing entities are everywhere you turn, garnering not just upvotes on Hackernews, retweets on Twitter, but time in the halls of Congress and the White House.

USPTO Hosts Silicon Valley Round Table

Patent trolls, otherwise known as non-practicing entities (“NPEs”) or patent-assertion entities (“PAEs”), are often vilified in legal scholarship and, lately, in the mainstream media as well. Without the USPTO granting slews of software patents, however, there would be fewer patents for these non-practicing entities to assert. Some of the current hand wringing over the epic rise in patent litigation of late focuses, as a result, on the USPTO. Accordingly, many were delighted when, last November, the USPTO announced its new director for the soon-to-open Silicon Valley satellite office. Michelle Lee, formerly a lawyer at Google, had scribed publically about the need for patent reform and specifically called out trolls. Consequently, her hire prompted much rejoicing.

Following this heralded move, the USPTO announced a “software partnership” roundtable session in Silicon Valley—ground zero for software innovation. At the meeting, held on February 12, stakeholders shared thoughts on software patents. The audio, for those inclined, is available here, here, and here. Colleen Chien, author of many groundbreaking studies on PAEs, explored the possibility of utilizing heightened application of 35 U.S.C. § 112(f) to construe patents as functional. Professor Chien analyzed several arguably functional patents including U.S. 5,930,474, which GeoTag asserted against 435 defendants in 115 lawsuits. The scope of patents like GeoTag’s would likely be “limited to the technology the patentee actually designed and equivalents known at the time the patent issued” in litigation should 112(f) be so constrained. According to proponents, such a limitation could profoundly affect many patents currently asserted in troll litigation.  Horacio Gutierrez, Corporate Vice President and Deputy General Counsel at Microsoft, also presented some thoughts about potentially limiting § 112(f). He noted that more rigorous enforcement of § 112(f) is “one part of the solution.” However, according to Mr. Gutierrez, this solution would not address issues such as inadequate notice and excessive breadth.

Continue reading

Tagged , , , , , , , , Leave a comment

Bitcoin: FBI and FinCEN Weigh In

Bitcoin, an anonymous currency imagined by a mysterious individual with a secret identity, is on everybody’s mind. The cryptographic digital currency, operating through a decentralized peer-to-peer network, is both an opportunity for criminals and entrepreneurial early adopters as well as a challenge for regulators. Since inception, bitcoin has captured headlines, gone on a roller coaster valuation ride, suffered security breaches and hacking attempts and, more recently, garnered interest from institutional investors. Last year, a leaked FBI report provided a snapshot into the government’s concern that bitcoin could become cybercriminals’ choice currency. In a surprise move this spring, the Financial Crimes Enforcement Network of the U.S. Department of the Treasury (“FinCEN”) provided interpretive guidance on how federal financial regulations implicate virtual currencies. Where will the bitcoin market, or its regulation, be in a year from now? Nobody knows, and that’s what makes it so exciting.

Bitcoin Genesis

Bitcoin’s origins are shrouded in mystery. Four years and twenty-five weeks ago, an entity named Satoshi Nakamoto posted a paper abstract to the Cryptogarphy Mailing List. Bitcoin: A Peer-to-Peer Electronic Cash System conceived of a currency that could be “sent directly from one party to another without going through a financial institution.” Instead of using a trusted third party to facilitate electronic transactions, Satoshi’s payment system would be based on the power of cryptography. Fraud would simply become “computationally impractical.” Through a process known as “mining,” anybody with a CPU powerful enough could generate, or discover, new bitcoins. Unlike centralized currencies where a central bank controlled the monetary base, bitcoin’s decentralized system algorithmically defined the number of bitcoins generated per block such that more than 21 million bitcoins would ever exist. On January 3rd, 2009 at 18:15 UTC, Satoshi Nakamoto—transforming his theoretical system into reality—created the first (genesis) block of bitcoins. Continue reading

Tagged , , , , , , 1 Comment

Design Patents in the Modern World

A recent conference at Stanford Law brought together intellectual property scholars, representatives from USPTO and WIPO, litigators, and in-house counsel for a rousing discussion of emerging issues in design patents.

EamesIn contrast to an ordinary utility patent, a design patent is granted to an inventor of a “new, original, and ornamental” design for an article of manufacture, and lasts for 14 years rather than 20.  35 U.S.C. 171, 173. A design patent contains only a single claim, and photographs or drawings that follow certain drafting conventions and PTO rules. 37 CFR 1.84, 37 CFR 1.152.

Recent cases affirm the “ordinary observer” standard – but application in context of prior art is inconsistent

Design patents began to get increasing attention in 2008, when the Federal Circuit issued a game-changing decision in Egyptian Goddess v. Swisa, 435 F.3d 665 (Fed. Cir. 2008), holding that the “ordinary observer” test is the sole test for design patent infringement. The court looked back to the standard first stated in Gorham Mfg. Co. v. White, 81 U.S. 511 (1871), but clarified that the test is to be conducted in the context of the prior art. The ruling did away with the “point of novelty” test, freed district courts from issuing detailed verbal descriptions of the design claims when verbal elaboration would not be helpful, and placed the burden of production of prior art for any affirmative defenses on the accused infringer. This has made it much easier to prove design patent infringement, and consequently made design patents much more valuable, as Paris Hilton recently discovered in launching her shoe line. Experts recommend that inventors obtain design patent protection for any product with novel and unique visual appearance.

Continue reading

Tagged , , , Permalink

Network Copyright Wars: “The Hopper,” Ad-Skipping DVR, In and Out of Court

The embittered battle between Dish Network and American Broadcasting Companies has given a public face to the struggle between the entertainment and technology industries over the role of copyright in media.

In this battle, however, theoretical copyright interests are secondary to networks’ central business concern: profit. The future of advertising in major network television could seriously impact the bottom line.  The ad-skipping and mobility features of Dish Network’s product “The Hopper” are a challenge to both advertising revenue as well as the revenue from services such as Hulu Plus, which, unlike The Hopper, provide the networks with licensing fees for mobile services.

The Hopper

In March 2012, Dish rolled out the hopper with a slate of entertaining (if not widely-played) ads.  It received largely positive reviews in the ensuing year.  Hopper users can record and watch their shows as played on live television, the critical difference from most digital recording devices being that the Hopper skips advertisements automatically.  The Sling feature, “Primetime Anytime”, enables customers to simply plug in the Sling device to view recorded content on iPads, iPhones, and the like: the service much easier to use than other versions of Sling which are not integrated into dvr devices, at least according to one review.

Continue reading

Tagged , , , , , , 1 Comment

Online Gambling in America

Three states have recently passed legislation authorizing online gambling within their borders.  Proponents of online gambling are drafting similar legislation in other states and even in Congress.  In addition to examining these recent legalization efforts, this post takes a look at the complicated history of online gambling in the United States and speculates as to its future.

The History

In 1999, there were over 250 websites accepting money bets from US players on card games, sporting events, and lottery tickets.  Was any of it legal?  There isn’t a clear answer to this question.  These websites frequently advised players to check the laws in their jurisdiction to ascertain the legality of participation.  As of 1999, only two states had statutes explicitly forbidding online gambling.  Roughly half of the remaining states had laws—usually passed sometime before the invention of the light bulb—making it a crime to place a bet.  The most pertinent federal legislation was the Federal Wire Act of 1961.  This act banned interstate and foreign wagering with the use of a wire device like the telephone.  It was passed primarily to prevent bookies from getting the results of horse races before bettors.  Many believed the government might use this act to punish online gambling operators.

Continue reading

Tagged , , , , Leave a comment