§1201. Circumvention of copyright protection systems

17 U.S.C.
United States Code, 2011 Edition
Title 17 - COPYRIGHTS
CHAPTER 12 - COPYRIGHT PROTECTION AND MANAGEMENT SYSTEMS
§1201. Circumvention of copyright protection systems
(a) Violations Regarding Circumvention of Technological Measures.
(1)
(A) No person shall circumvent a technological measure that effectively
controls access to a work protected under this title. The prohibition contained in
the preceding sentence shall take effect at the end of the 2-year period beginning
on the date of the enactment of this chapter.
(B) The prohibition contained in subparagraph (A) shall not apply to persons
who are users of a copyrighted work which is in a particular class of works, if such
persons are, or are likely to be in the succeeding 3-year period, adversely affected
by virtue of such prohibition in their ability to make noninfringing uses of that
particular class of works under this title, as determined under subparagraph (C).
(C) During the 2-year period described in subparagraph (A), and during each
succeeding 3-year period, the Librarian of Congress, upon the recommendation of
the Register of Copyrights, who shall consult with the Assistant Secretary for
Communications and Information of the Department of Commerce and report and
comment on his or her views in making such recommendation, shall make the
determination in a rulemaking proceeding for purposes of subparagraph (B) of
whether persons who are users of a copyrighted work are, or are likely to be in the
succeeding 3-year period, adversely affected by the prohibition under
subparagraph (A) in their ability to make noninfringing uses under this title of a
particular class of copyrighted works. In conducting such rulemaking, the
Librarian shall examine—
(i) the availability for use of copyrighted works;
(ii) the availability for use of works for nonprofit archival, preservation, and
educational purposes;
(iii) the impact that the prohibition on the circumvention of technological
measures applied to copyrighted works has on criticism, comment, news
reporting, teaching, scholarship, or research;
(iv) the effect of circumvention of technological measures on the market for
or value of copyrighted works; and
(v) such other factors as the Librarian considers appropriate.
(D) The Librarian shall publish any class of copyrighted works for which the
Librarian has determined, pursuant to the rulemaking conducted under
1
subparagraph (C), that noninfringing uses by persons who are users of a
copyrighted work are, or are likely to be, adversely affected, and the prohibition
contained in subparagraph (A) shall not apply to such users with respect to such
class of works for the ensuing 3-year period.
(E) Neither the exception under subparagraph (B) from the applicability of the
prohibition contained in subparagraph (A), nor any determination made in a
rulemaking conducted under subparagraph (C), may be used as a defense in any
action to enforce any provision of this title other than this paragraph.
(2) No person shall manufacture, import, offer to the public, provide, or
otherwise traffic in any technology, product, service, device, component, or part
thereof, that—
(A) is primarily designed or produced for the purpose of circumventing a
technological measure that effectively controls access to a work protected under
this title;
(B) has only limited commercially significant purpose or use other than to
circumvent a technological measure that effectively controls access to a work
protected under this title; or
(C) is marketed by that person or another acting in concert with that person
with that person's knowledge for use in circumventing a technological measure
that effectively controls access to a work protected under this title.
(3) As used in this subsection—
(A) to “circumvent a technological measure” means to descramble a
scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass,
remove, deactivate, or impair a technological measure, without the authority of
the copyright owner; and
(B) a technological measure “effectively controls access to a work” if the
measure, in the ordinary course of its operation, requires the application of
information, or a process or a treatment, with the authority of the copyright
owner, to gain access to the work.
(b) Additional Violations.—(1) No person shall manufacture, import, offer to
the public, provide, or otherwise traffic in any technology, product, service,
device, component, or part thereof, that—
(A) is primarily designed or produced for the purpose of circumventing
protection afforded by a technological measure that effectively protects a right
of a copyright owner under this title in a work or a portion thereof;
(B) has only limited commercially significant purpose or use other than to
circumvent protection afforded by a technological measure that effectively
protects a right of a copyright owner under this title in a work or a portion
thereof; or
2
(C) is marketed by that person or another acting in concert with that person
with that person's knowledge for use in circumventing protection afforded by a
technological measure that effectively protects a right of a copyright owner
under this title in a work or a portion thereof.
(2) As used in this subsection—
(A) to “circumvent protection afforded by a technological measure” means
avoiding, bypassing, removing, deactivating, or otherwise impairing a
technological measure; and
(B) a technological measure “effectively protects a right of a copyright owner
under this title” if the measure, in the ordinary course of its operation, prevents,
restricts, or otherwise limits the exercise of a right of a copyright owner under
this title.
(c) Other Rights, Etc., Not Affected.
***
(3) Nothing in this section shall require that the design of, or design and
selection of parts and components for, a consumer electronics,
telecommunications, or computing product provide for a response to any particular
technological measure, so long as such part or component, or the product in which
such part or component is integrated, does not otherwise fall within the
prohibitions of subsection (a)(2) or (b)(1).
***
(d) Exemption for Nonprofit Libraries, Archives, and Educational Institutions.
***
(e) Law Enforcement, Intelligence, and Other Government Activities.—This
section does not prohibit any lawfully authorized investigative, protective,
information security, or intelligence activity of an officer, agent, or employee of
the United States, a State, or a political subdivision of a State, or a person acting
pursuant to a contract with the United States, a State, or a political subdivision of a
State. For purposes of this subsection, the term “information security” means
activities carried out in order to identify and address the vulnerabilities of a
government computer, computer system, or computer network.
(f) Reverse Engineering.—(1) Notwithstanding the provisions of subsection
(a)(1)(A), a person who has lawfully obtained the right to use a copy of a
computer program may circumvent a technological measure that effectively
controls access to a particular portion of that program for the sole purpose of
identifying and analyzing those elements of the program that are necessary to
3
achieve interoperability of an independently created computer program with other
programs, and that have not previously been readily available to the person
engaging in the circumvention, to the extent any such acts of identification and
analysis do not constitute infringement under this title.
(2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may
develop and employ technological means to circumvent a technological measure,
or to circumvent protection afforded by a technological measure, in order to
enable the identification and analysis under paragraph (1), or for the purpose of
enabling interoperability of an independently created computer program with other
programs, if such means are necessary to achieve such interoperability, to the
extent that doing so does not constitute infringement under this title.
(3) The information acquired through the acts permitted under paragraph (1),
and the means permitted under paragraph (2), may be made available to others if
the person referred to in paragraph (1) or (2), as the case may be, provides such
information or means solely for the purpose of enabling interoperability of an
independently created computer program with other programs, and to the extent
that doing so does not constitute infringement under this title or violate applicable
law other than this section.
(4) For purposes of this subsection, the term “interoperability” means the ability
of computer programs to exchange information, and of such programs mutually to
use the information which has been exchanged.
(g) Encryption Research.—
(1) Definitions.—For purposes of this subsection—
(A) the term “encryption research” means activities necessary to identify
and analyze flaws and vulnerabilities of encryption technologies applied to
copyrighted works, if these activities are conducted to advance the state of
knowledge in the field of encryption technology or to assist in the
development of encryption products; and
(B) the term “encryption technology” means the scrambling and
descrambling of information using mathematical formulas or algorithms.
(2) Permissible acts of encryption research.—Notwithstanding the provisions
of subsection (a)(1)(A), it is not a violation of that subsection for a person to
circumvent a technological measure as applied to a copy, phonorecord,
performance, or display of a published work in the course of an act of good faith
encryption research if—
(A) the person lawfully obtained the encrypted copy, phonorecord,
performance, or display of the published work;
(B) such act is necessary to conduct such encryption research;
4
(C) the person made a good faith effort to obtain authorization before the
circumvention; and
(D) such act does not constitute infringement under this title or a violation
of applicable law other than this section, including section 1030 of title 18 and
those provisions of title 18 amended by the Computer Fraud and Abuse Act of
1986.
(3) Factors in determining exemption.—In determining whether a person
qualifies for the exemption under paragraph (2), the factors to be considered
shall include—
(A) whether the information derived from the encryption research was
disseminated, and if so, whether it was disseminated in a manner reasonably
calculated to advance the state of knowledge or development of encryption
technology, versus whether it was disseminated in a manner that facilitates
infringement under this title or a violation of applicable law other than this
section, including a violation of privacy or breach of security;
(B) whether the person is engaged in a legitimate course of study, is
employed, or is appropriately trained or experienced, in the field of
encryption technology; and
(C) whether the person provides the copyright owner of the work to which
the technological measure is applied with notice of the findings and
documentation of the research, and the time when such notice is provided.
(4) Use of technological means for research activities.—Notwithstanding the
provisions of subsection (a)(2), it is not a violation of that subsection for a
person to—
(A) develop and employ technological means to circumvent a technological
measure for the sole purpose of that person performing the acts of good faith
encryption research described in paragraph (2); and
(B) provide the technological means to another person with whom he or she
is working collaboratively for the purpose of conducting the acts of good faith
encryption research described in paragraph (2) or for the purpose of having
that other person verify his or her acts of good faith encryption research
described in paragraph (2).
(5) Report to congress.—[Omitted.]
(h) Exceptions Regarding Minors.—[Omitted.]
5
(i) Protection of Personally Identifying Information.—
(1) Circumvention permitted.—Notwithstanding the provisions of subsection
(a)(1)(A), it is not a violation of that subsection for a person to circumvent a
technological measure that effectively controls access to a work protected under
this title, if—
(A) the technological measure, or the work it protects, contains the
capability of collecting or disseminating personally identifying information
reflecting the online activities of a natural person who seeks to gain access to
the work protected;
(B) in the normal course of its operation, the technological measure, or the
work it protects, collects or disseminates personally identifying information
about the person who seeks to gain access to the work protected, without
providing conspicuous notice of such collection or dissemination to such
person, and without providing such person with the capability to prevent or
restrict such collection or dissemination;
(C) the act of circumvention has the sole effect of identifying and disabling
the capability described in subparagraph (A), and has no other effect on the
ability of any person to gain access to any work; and
(D) the act of circumvention is carried out solely for the purpose of
preventing the collection or dissemination of personally identifying
information about a natural person who seeks to gain access to the work
protected, and is not in violation of any other law.
(2) Inapplicability to certain technological measures.—This subsection does
not apply to a technological measure, or a work it protects, that does not collect
or disseminate personally identifying information and that is disclosed to a user
as not having or using such capability.
(j) Security Testing.—
(1) Definition.—For purposes of this subsection, the term “security testing”
means accessing a computer, computer system, or computer network, solely for
the purpose of good faith testing, investigating, or correcting, a security flaw or
vulnerability, with the authorization of the owner or operator of such computer,
computer system, or computer network.
(2) Permissible acts of security testing.—Notwithstanding the provisions of
subsection (a)(1)(A), it is not a violation of that subsection for a person to
engage in an act of security testing, if such act does not constitute infringement
under this title or a violation of applicable law other than this section, including
6
section 1030 of title 18 and those provisions of title 18 amended by the
Computer Fraud and Abuse Act of 1986.
(3) Factors in determining exemption.—In determining whether a person
qualifies for the exemption under paragraph (2), the factors to be considered
shall include—
(A) whether the information derived from the security testing was used
solely to promote the security of the owner or operator of such computer,
computer system or computer network, or shared directly with the developer
of such computer, computer system, or computer network; and
(B) whether the information derived from the security testing was used or
maintained in a manner that does not facilitate infringement under this title or
a violation of applicable law other than this section, including a violation of
privacy or breach of security.
(4) Use of technological means for security testing.—Notwithstanding the
provisions of subsection (a)(2), it is not a violation of that subsection for a
person to develop, produce, distribute or employ technological means for the
sole purpose of performing the acts of security testing described in subsection
(2), provided such technological means does not otherwise violate section
(a)(2).
***
7
!
17 U.S.C.
United States Code, 2011 Edition
Title 17 - COPYRIGHTS
CHAPTER 12 - COPYRIGHT PROTECTION AND MANAGEMENT SYSTEMS
§1203. Civil remedies
(a) Civil Actions.—Any person injured by a violation of section 1201 or 1202 may
bring a civil action in an appropriate United States district court for such violation.
(b) Powers of the Court.—In an action brought under subsection (a), the court—
(1) may grant temporary and permanent injunctions on such terms as it deems
reasonable to prevent or restrain a violation, but in no event shall impose a prior
restraint on free speech or the press protected under the 1st amendment to the
Constitution;
(2) at any time while an action is pending, may order the impounding, on such terms
as it deems reasonable, of any device or product that is in the custody or control of the
alleged violator and that the court has reasonable cause to believe was involved in a
violation;
(3) may award damages under subsection (c);
(4) in its discretion may allow the recovery of costs by or against any party other
than the United States or an officer thereof;
(5) in its discretion may award reasonable attorney's fees to the prevailing party; and
(6) may, as part of a final judgment or decree finding a violation, order the remedial
modification or the destruction of any device or product involved in the violation that
is in the custody or control of the violator or has been impounded under paragraph (2).
(c) Award of Damages.—
(1) In general.—Except as otherwise provided in this title, a person committing a
violation of section 1201 or 1202 is liable for either—
(A) the actual damages and any additional profits of the violator, as provided in
paragraph (2), or
(B) statutory damages, as provided in paragraph (3).
(2) Actual damages.—The court shall award to the complaining party the actual
damages suffered by the party as a result of the violation, and any profits of the violator
that are attributable to the violation and are not taken into account in computing the
actual damages, if the complaining party elects such damages at any time before final
judgment is entered.
1
!
(3) Statutory damages.—(A) At any time before final judgment is entered, a
complaining party may elect to recover an award of statutory damages for each
violation of section 1201 in the sum of not less than $200 or more than $2,500 per act
of circumvention, device, product, component, offer, or performance of service, as the
court considers just.
(B) At any time before final judgment is entered, a complaining party may elect to
recover an award of statutory damages for each violation of section 1202 in the sum of
not less than $2,500 or more than $25,000.
(4) Repeated violations.—In any case in which the injured party sustains the burden
of proving, and the court finds, that a person has violated section 1201 or 1202 within 3
years after a final judgment was entered against the person for another such violation,
the court may increase the award of damages up to triple the amount that would
otherwise be awarded, as the court considers just.
(5) Innocent violations.—
(A) In general.—The court in its discretion may reduce or remit the total award of
damages in any case in which the violator sustains the burden of proving, and the
court finds, that the violator was not aware and had no reason to believe that its acts
constituted a violation.
(B) Nonprofit library, archives, educational institutions, or public broadcasting
entities.—
(i) Definition.—In this subparagraph, the term “public broadcasting entity” has
the meaning given such term under section 118(f).
(ii) In general.—In the case of a nonprofit library, archives, educational
institution, or public broadcasting entity, the court shall remit damages in any case
in which the library, archives, educational institution, or public broadcasting entity
sustains the burden of proving, and the court finds, that the library, archives,
educational institution, or public broadcasting entity was not aware and had no
reason to believe that its acts constituted a violation.
2
!
17 U.S.C.
United States Code, 2011 Edition
Title 17 - COPYRIGHTS
CHAPTER 12 - COPYRIGHT PROTECTION AND MANAGEMENT SYSTEMS
§1204. Criminal offenses and penalties
(a) In General.—Any person who violates section 1201 or 1202 willfully and for
purposes of commercial advantage or private financial gain—
(1) shall be fined not more than $500,000 or imprisoned for not more than 5
years, or both, for the first offense; and
(2) shall be fined not more than $1,000,000 or imprisoned for not more than 10
years, or both, for any subsequent offense.
(b) Limitation for Nonprofit Library, Archives, Educational Institution, or Public
Broadcasting Entity.—Subsection (a) shall not apply to a nonprofit library, archives,
educational institution, or public broadcasting entity (as defined under section 118(f)).
(c) Statute of Limitations.—No criminal proceeding shall be brought under this
section unless such proceeding is commenced within 5 years after the cause of action
arose.
3
2000 WL 127311
Only the Westlaw citation is currently available.
United States District Court, W.D. Washington.
REALNETWORKS, INC., Plaintiff,
v.
STREAMBOX, INC., Defendant.
No. 2:99CV02070. | Jan. 18, 2000.
Opinion
ORDER ON PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION
PECHMAN, J.
INTRODUCTION
*1 Plaintiff RealNetworks, Inc. (“RealNetworks”) filed this action on December 21,
1999. RealNetworks claims that Defendant Streambox has violated provisions of the
Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. § 1201 et seq., by distributing
and marketing [a] product[] known as the Streambox VCR . . . .
***
FINDINGS OF FACT
[RealNetworks sold an A/V streaming solution to content owners. An end user would
install RealPlayer software, which would connect to the content owner’s RealServer. The
two components used a “secret handshake” to prevent interoperability and a “copy
switch” to indicate when the user was prohibited from saving a copy. Streambox sold
software that would mimic the secret handshake and ignore the copy switch, allowing
users to save copies of streamed media.]
***
CONCLUSIONS OF LAW
***
Parts of the VCR Are Likely to Violate Sections 1201(a)(2) and 1201(b)
1
7. Under the DMCA, the Secret Handshake that must take place between a RealServer
and a RealPlayer before the RealServer will begin streaming content to an end-user
appears to constitute a “technological measure” that “effectively controls access” to
copyrighted works. See 17 U.S.C. § 1201(a)(3)(B) (measure “effectively controls access”
if it “requires the application of information or a process or a treatment, with the authority
of the copyright holder, to gain access to the work”). To gain access to a work protected
by the Secret Handshake, a user must employ a RealPlayer, which will supply the
requisite information to the RealServer in a proprietary authentication sequence.
8. In conjunction with the Secret Handshake, the Copy Switch is a “technological
measure” that effectively protects the right of a copyright owner to control the
unauthorized copying of its work. See 17 U.S.C. § 1201(b)(2)(B) (measure “effectively
protects” right of copyright holder if it “prevents, restricts or otherwise limits the exercise
of a right of a copyright owner”); 17 U.S.C. § 106(a) (granting copyright holder exclusive
right to make copies of its work). To access a RealMedia file distributed by a RealServer,
a user must use a RealPlayer. The RealPlayer reads the Copy Switch in the file. If the
Copy Switch in the file is turned off, the RealPlayer will not permit the user to record a
copy as the file is streamed. Thus, the Copy Switch may restrict others from exercising a
copyright holder’s exclusive right to copy its work.
9. Under the DMCA, a product or part thereof “circumvents” protections afforded a
technological measure by “avoiding, bypassing, removing, deactivating or otherwise
impairing” the operation of that technological measure. 17 U.S.C. §§ 1201(b)(2)(A),
1201(a)(2)(A). Under that definition, at least a part of the Streambox VCR circumvents
the technological measures RealNetworks affords to copyright owners. Where a
RealMedia file is stored on a RealServer, the VCR “bypasses” the Secret Handshake to
gain access to the file. The VCR then circumvents the Copy Switch, enabling a user to
make a copy of a file that the copyright owner has sought to protect.
10. Given the circumvention capabilities of the Streambox VCR, Streambox violates the
DMCA if the product or a part thereof: (i) is primarily designed to serve this function; (ii)
has only limited commercially significant purposes beyond the circumvention; or (iii) is
marketed as a means of circumvention. 17 U.S.C. §§ 1201(a)(2)(A-C), 1201(b)(b)(A-C).
These three tests are disjunctive. Id. A product that meets only one of the three
independent bases for liability is still prohibited. Here, the VCR meets at least the first
two.
*8 11. The Streambox VCR meets the first test for liability under the DMCA because at
least a part of the Streambox VCR is primarily, if not exclusively, designed to circumvent
the access control and copy protection measures that RealNetworks affords to copyright
owners. 17 U.S.C. §§ 1201(a)(2)(A), 1201(b)(c)(A).
12. The second basis for liability is met because portion of the VCR that circumvents the
2
Secret Handshake so as to avoid the Copy Switch has no significant commercial purpose
other than to enable users to access and record protected content. 17 U.S.C. §
1201(a)(2)(B), 1201(b)(d)(B). There does not appear to be any other commercial value
that this capability affords.
***
*9 18. Streambox also argues that the VCR does not violate the DMCA because the Copy
Switch that it avoids does not “effectively protect” against the unauthorized copying of
copyrighted works as required by § 1201(a)(3)(B). Streambox claims this “effective”
protection is lacking because an enterprising end-user could potentially use other means
to record streaming audio content as it is played by the end-user’s computer speakers.
This argument fails because the Copy Switch, in the ordinary course of its operation
when it is on, restricts and limits the ability of people to make perfect digital copies of a
copyrighted work. The Copy Switch therefore constitutes a technological measure that
effectively protects a copyright owner’s rights under section. 1201(a)(3)(B).
***
CONCLUSION
Consistent with the findings of fact and conclusions of law above, the Court hereby
ORDERS that:
During the pendency of this action, Defendant Streambox, Inc. and its officers, agents,
servants, employees and attorneys, and those persons in active concert and participation
with Streambox, Inc. who receive actual notice of this Preliminary Injunction, are
restrained and enjoined from manufacturing, importing, licensing, offering to the public,
or offering for sale . . . versions of the Streambox VCR or similar products that
circumvent or attempt to circumvent RealNetworks’ technological security measures, and
from participating or assisting in any such activity . . . .
***
3
111 F.Supp.2d 294
United States District Court,
S.D. New York.
UNIVERSAL CITY STUDIOS, INC., et al., Plaintiffs,
v.
Shawn C. REIMERDES, et al., Defendants.
No. 00 Civ. 0277 (LAK). | Aug. 17, 2000. | As Amended Sept. 6, 2000.
***
OPINION
KAPLAN, District Judge.
***
*303 Plaintiffs, eight major United States motion picture studios, distribute many of their
copyrighted motion pictures for home use on digital versatile disks (“DVDs”), which
contain copies of the motion pictures in digital form. They protect those motion pictures
from copying by using an encryption system called CSS. CSS-protected motion pictures
on DVDs may be viewed only on players and computer drives equipped with licensed
technology that permits the devices to decrypt and play—but not to copy—the films.
Late last year, computer hackers devised a computer program called DeCSS that
circumvents the CSS protection system and allows CSS-protected motion pictures to be
copied and played on devices that lack the licensed decryption technology. Defendants
quickly posted DeCSS on their Internet web site, thus making it readily available to much
of the world. Plaintiffs promptly brought this action under the Digital Millennium
Copyright Act (the “DMCA”) to enjoin defendants from posting DeCSS and to prevent
them from electronically “linking” their site to others that post DeCSS. Defendants
responded with what they termed “electronic civil disobedience”—increasing their efforts
to link their web site to a large number of *304 others that continue to make DeCSS
available.
Defendants contend that their actions do not violate the DMCA and, in any case, that the
DMCA, as applied to computer programs, or code, violates the First Amendment. This is
the Court’s decision after trial, and the decision may be summarized in a nutshell.
Defendants argue first that the DMCA should not be construed to reach their conduct,
principally because the DMCA, so applied, could prevent those who wish to gain access
to technologically protected copyrighted works in order to make fair—that is, noninfringing—use of them from doing so. They argue that those who would make fair use
1
of technologically protected copyrighted works need means, such as DeCSS, of
circumventing access control measures not for piracy, but to make lawful use of those
works.
Technological access control measures have the capacity to prevent fair uses of
copyrighted works as well as foul. Hence, there is a potential tension between the use of
such access control measures and fair use. Defendants are not the first to recognize that
possibility. As the DMCA made its way through the legislative process, Congress was
preoccupied with precisely this issue. Proponents of strong restrictions on circumvention
of access control measures argued that they were essential if copyright holders were to
make their works available in digital form because digital works otherwise could be
pirated too easily. Opponents contended that strong anti-circumvention measures would
extend the copyright monopoly inappropriately and prevent many fair uses of
copyrighted material.
Congress struck a balance. The compromise it reached, depending upon future
technological and commercial developments, may or may not prove ideal. But the
solution it enacted is clear. The potential tension to which defendants point does not
absolve them of liability under the statute. There is no serious question that defendants’
posting of DeCSS violates the DMCA.
Defendants’ constitutional argument ultimately rests on two propositions—that computer
code, regardless of its function, is “speech” entitled to maximum constitutional protection
and that computer code therefore essentially is exempt from regulation by government.
But their argument is baseless.
Computer code is expressive. To that extent, it is a matter of First Amendment concern.
But computer code is not purely expressive any more than the assassination of a political
figure is purely a political statement. Code causes computers to perform desired
functions. Its expressive element no more immunizes its functional aspects from
regulation than the expressive motives of an assassin immunize the assassin’s action.
In an era in which the transmission of computer viruses—which, like DeCSS, are simply
computer code and thus to some degree expressive—can disable systems upon which the
nation depends and in which other computer code also is capable of inflicting other harm,
society must be able to regulate the use and dissemination *305 of code in appropriate
circumstances. The Constitution, after all, is a framework for building a just and
democratic society. It is not a suicide pact.
***
II. The Digital Millennium Copyright Act
2
***
B. Posting of DeCSS
1. Violation of Anti–Trafficking Provision
***
a. Section 1201(a)(2)(A)
(1) CSS Effectively Controls Access to Copyrighted Works
During pretrial proceedings and at trial, defendants attacked plaintiffs’ Section
1201(a)(2)(A) claim, arguing that CSS, which is based on a 40–bit encryption key, is a
weak cipher that does not “effectively control” access to plaintiffs’ copyrighted works.
They reasoned from this premise that CSS is not protected under this branch of the statute
at all. Their post-trial memorandum appears to have abandoned this argument. In any
case, however, the contention is indefensible as a matter of law.
First, the statute expressly provides that “a technological measure ‘effectively controls
access to a work’ if the measure, in the ordinary course of its operation, requires the
application of information or a process or a treatment, with the authority of the copyright
owner, to gain access to a work.”138 One cannot gain access to a CSS-protected work on a
DVD without application of the three keys that are required by the software. One cannot
lawfully gain access to the keys except by entering into a license with the DVD CCA
*318 under authority granted by the copyright owners or by purchasing a DVD player or
drive containing the keys pursuant to such a license. In consequence, under the express
terms of the statute, CSS “effectively controls access” to copyrighted DVD movies. It
does so, within the meaning of the statute, whether or not it is a strong means of
protection.139
This view is confirmed by the legislative history, which deals with precisely this point.
The House Judiciary Committee section-by-section analysis of the House bill, which in
this respect was enacted into law, makes clear that a technological measure “effectively
controls access” to a copyrighted work if its function is to control access:
“The bill does define the functions of the technological measures that are covered—that
is, what it means for a technological measure to ‘effectively control access to a work’ ...
and to ‘effectively protect a right of a copyright owner under this title’ .... The practical,
common-sense approach taken by H.R.2281 is that if, in the ordinary course of its
operation, a technology actually works in the defined ways to control access to a work
... then the ‘effectiveness’ test is met, and the prohibitions of the statute are applicable.
This test, which focuses on the function performed by the technology, provides a
sufficient basis for clear interpretation.”140
3
Further, the House Commerce Committee made clear that measures based on encryption
or scrambling “effectively control” access to copyrighted works,141 although it is well
known that what may be encrypted or scrambled often may be decrypted or unscrambled.
As CSS, in the ordinary course of its operation—that is, when DeCSS or some other
decryption program is not employed—“actually works” to prevent access to the protected
work, it “effectively controls access” within the contemplation of the statute.
Finally, the interpretation of the phrase “effectively controls access” offered by
defendants at trial—viz., that the use of the word “effectively” means that the statute
protects only successful or efficacious technological means of controlling access—would
gut the statute if it were adopted. If a technological means of access control is
circumvented, it is, in common parlance, ineffective. Yet defendants’ construction, if
adopted, would limit the application of the statute to access control measures that thwart
circumvention, but withhold protection for those measures that can be circumvented. In
other words, defendants would have the Court construe the statute to offer protection
where none is needed but to withhold protection precisely where protection is essential.
The Court declines to do so. Accordingly, the Court holds that CSS effectively controls
access to plaintiffs’ copyrighted works.142
***
2. Statutory Exceptions
[The court rejects defenses under the DMCA’s reverse engineering, encryption research,
and security testing exceptions. It also declines to fashion a fair use exception.]
***
III. The First Amendment
[The defendants raise First Amendment arguments against DMCA’s prohibition on
dissemination of computer code (i.e. speech). While the court acknowledges some
legitimacy to the defendants’ concerns, it sustains the DMCA’s anti-trafficking
provisions and even allows (narrow) injunctive relief against linking to circumvention
tools.]
***
VI. Conclusion
In the final analysis, the dispute between these parties is simply put if not necessarily
simply resolved.
4
*346 Plaintiffs have invested huge sums over the years in producing motion pictures in
reliance upon a legal framework that, through the law of copyright, has ensured that they
will have the exclusive right to copy and distribute those motion pictures for economic
gain. They contend that the advent of new technology should not alter this long
established structure.
Defendants, on the other hand, are adherents of a movement that believes that
information should be available without charge to anyone clever enough to break into the
computer systems or data storage media in which it is located. Less radically, they have
raised a legitimate concern about the possible impact on traditional fair use of access
control measures in the digital era.
Each side is entitled to its views. In our society, however, clashes of competing interests
like this are resolved by Congress. For now, at least, Congress has resolved this clash in
the DMCA and in plaintiffs’ favor. Given the peculiar characteristics of computer
programs for circumventing encryption and other access control measures, the DMCA as
applied to posting and linking here does not contravene the First Amendment.
Accordingly, plaintiffs are entitled to appropriate injunctive and declaratory relief.
SO ORDERED.
Footnotes
139
RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311, *9
(W.D.Wash. Jan.18, 2000).
140
HOUSE COMM. ON JUDICIARY, SECTION–BY–SECTION ANALYSIS OF H.R.2281
AS PASSED BY THE UNITED STATES HOUSE OF REPRESENTATIVES ON
AUGUST 4, 1998 (“SECTION–BY–SECTION ANALYSIS”), at 10 (Comm.Print 1998)
(emphasis in original).
141
H.R.REP. NO. 105–551(II), 105th Cong., 2d Sess. (“COMMERCE COMM.REP. ”), at 39
(1998).
142
Defendants, in a reprise of their argument that DeCSS is not a circumvention device, argue
also that CSS does not effectively control access to copyrighted works within the meaning
of the statute because plaintiffs authorize avoidance of CSS by selling their DVDs. Def.
Post–Trial Mem. 10–13. The argument is specious in this context as well. See supra note
137.
5
387 F.3d 522
United States Court of Appeals,
Sixth Circuit.
LEXMARK INTERNATIONAL, INC., Plaintiff–Appellee,
v.
STATIC CONTROL COMPONENTS, INC., Defendant–Appellant.
No. 03–5400. | Argued: Jan. 30, 2004. | Decided and Filed: Oct. 26, 2004. | Rehearing
Denied Dec. 29, 2004. | Rehearing En Banc Denied February 15, 2005.
***
SUTTON, Circuit Judge.
This copyright dispute involves two computer programs, two federal statutes and three
theories of liability. The first computer program, known as the “Toner Loading
Program,” calculates toner level in printers manufactured by Lexmark International. The
second computer program, known as the “Printer Engine Program,” controls various
printer functions on Lexmark printers.
The first statute, the general copyright statute, 17 U.S.C. § 101 et seq., has been with us
in one form or another since 1790 and grants copyright protection to “original works of
authorship fixed in any tangible medium of expression,” id. § 102(a), but does not
“extend to any idea, procedure, process, system, method of operation, concept, principle,
or discovery,” id. § 102(b). The second federal statute, the Digital Millenium Copyright
Act (DMCA), 17 U.S.C. § 1201 et seq., was enacted in 1998 and proscribes the sale of
products that may be used to “circumvent a technological measure that effectively
controls access to a work” protected by the copyright statute.
*529 These statutes became relevant to these computer programs when Lexmark began
selling discount toner cartridges for its printers that only Lexmark could re-fill and that
contained a microchip designed to prevent Lexmark printers from functioning with toner
cartridges that Lexmark had not re-filled. In an effort to support the market for competing
toner cartridges, Static Control Components (SCC) mimicked Lexmark’s computer chip
and sold it to companies interested in selling remanufactured toner cartridges.
Lexmark brought this action to enjoin the sale of SCC’s computer chips . . . . It claimed
that SCC’s chip violated the DMCA by circumventing a technological measure designed
to control access to the Toner Loading Program. And it claimed that SCC’s chip violated
the DMCA by circumventing a technological measure designed to control access to the
Printer Engine Program.
After an evidentiary hearing, the district court decided that Lexmark had shown a
likelihood of success on each claim and entered a preliminary injunction against SCC. As
1
we view Lexmark’s prospects for success on each of these claims differently, we vacate
the preliminary injunction and remand the case for further proceedings.
I.
A.
***
The Two Computer Programs. The first program at issue is Lexmark’s “Toner Loading
Program,” which measures the amount of toner remaining in the cartridge based on the
amount of torque (rotational force) sensed on the toner cartridge wheel. Maggs Aff. ¶ 24,
JA 709. * * * The Toner Loading Program is located on a microchip contained in
Lexmark’s toner cartridges.
The second program is Lexmark’s “Printer Engine Program.” * * * The program controls
a variety of functions on each printer—e.g., paper feed and movement, and printer motor
control. D. Ct. Op. ¶ 24, at 5. Unlike the Toner Loading Program, the Printer Engine
Program is located within Lexmark’s printers.
***
Lexmark’s Prebate and Non–Prebate Cartridges. Lexmark markets two types of toner
cartridges for its laser printers: “Prebate” and “Non–Prebate.” Prebate cartridges are sold
to business consumers at an up-front discount. In exchange, consumers agree to use the
cartridge just once, then return the empty unit to Lexmark; a “shrink-wrap” agreement on
the top of each cartridge box spells out these restrictions and confirms that using the
cartridge constitutes acceptance of these terms. Id. ¶¶ 13–14, at 3. Non–Prebate cartridges
are sold without any discount, are not subject to any restrictive agreements and may be
re-filled with toner and reused by the consumer or a third-party remanufacturer. Id. ¶¶
15–18, at 3–4.
To ensure that consumers adhere to the Prebate agreement, Lexmark uses an
“authentication sequence” that performs a “secret handshake” between each Lexmark
printer and a microchip on each Lexmark toner cartridge. Both the printer and the chip
employ a publicly available encryption algorithm known as “Secure Hash Algorithm–1”
or “SHA–1,” which calculates a “Message Authentication Code” based on data in the
microchip’s memory. If the code calculated by the microchip matches the code calculated
by the printer, the printer functions normally. If the two values do not match, the printer
returns an error message and will not operate, blocking consumers from using toner
cartridges that Lexmark has not authorized. Yaro Decl. ¶ 7, JA 82 (“To prevent
unauthorized toner cartridges from being used with Lexmark’s T520/522 and T620/622
laser printers, Lexmark utilizes an authentication sequence.”).
2
SCC’s Competing Microchip. SCC sells its own microchip—the “SMARTEK” chip—
that permits consumers to satisfy Lexmark’s authentication sequence each time it would
otherwise be performed, i.e., when the printer is turned on or the printer door is opened
and shut. SCC’s advertising boasts that its chip breaks Lexmark’s “secret code” (the
authentication sequence), which “even on the fastest computer available today ... would
take Years to run through all of the possible 8–byte combinations to break.” D. Ct. Op. ¶
103, at 19. SCC sells these chips to third-party cartridge remanufacturers, permitting
them to replace Lexmark’s chip with the SMARTEK chip on refurbished Prebate
cartridges. These recycled cartridges are in turn sold to consumers as a low-cost
alternative to new Lexmark toner cartridges.
Each of SCC’s SMARTEK chips also contains a copy of Lexmark’s Toner Loading
Program, which SCC claims is necessary to make its product compatible with Lexmark’s
printers. The SMARTEK chips thus contain an identical copy of the Toner Loading
Program that is appropriate *531 for each Lexmark printer, and SCC acknowledges that it
“slavishly copied” the Toner Loading Program “in the exact format and order” found on
Lexmark’s cartridge chip. Id. ¶¶ 92, 96, at 18. A side-by-side comparison of the two data
sequences reveals no differences between them. Able Decl. ¶¶ 10–15, JA 502–05.
The parties agree that Lexmark’s printers perform a second calculation independent of
the authentication sequence. After the authentication sequence concludes, the Printer
Engine Program downloads a copy of the Toner Loading Program from the toner
cartridge chip onto the printer in order to measure toner levels. Before the printer runs the
Toner Loading Program, it performs a “checksum operation,” a “commonly used
technique” to ensure the “integrity” of the data downloaded from the toner cartridge
microchip. D. Ct. Op. ¶ 77, at 14. Under this operation, the printer compares the result of
a calculation performed on the data bytes of the transferred copy of the Toner Loading
Program with the “checksum value” located elsewhere on the toner cartridge microchip.
If the two values do not match, the printer assumes that the data was corrupted in the
program download, displays an error message and ceases functioning. If the two values
do match, the printer continues to operate.
***
IV.
***
In filing its complaint and in its motion for a preliminary injunction, Lexmark invoked
the [DMCA] ban on distributing devices that circumvent access-control measures placed
on copyrighted works. See id. § 1201(a)(2). According to Lexmark, SCC’s SMARTEK
3
chip is a “device” marketed and sold by SCC that “circumvents” Lexmark’s
“technological measure” (the SHA–1 authentication sequence, not the checksum
operation), which “effectively controls access” to its copyrighted works (the Toner
Loading Program and Printer Engine Program). Lexmark claims that the SMARTEK chip
meets all three tests for liability under § 1201(a)(2): (1) the chip “is primarily designed or
produced for the purpose of circumventing” Lexmark’s authentication sequence, 17
U.S.C. § 1201(a)(2)(A); (2) the chip “has only limited commercially significant purpose
or use other than to circumvent” the authentication sequence, id. § 1201(a)(2)(B); and (3)
SCC “market[s]” the chip “for use in circumventing” the authentication sequence, id. §
1201(a)(2)(C). The district court agreed and concluded that Lexmark had shown a
likelihood of success under all three provisions.
B.
We initially consider Lexmark’s DMCA claim concerning the Printer Engine Program,
which (the parties agree) is protected by the general copyright statute. In deciding that
Lexmark’s authentication sequence “effectively controls access to a work protected under
[the copyright provisions],” the district court relied on a definition in the DMCA saying
that a measure “effectively controls access to a work” if, “in the ordinary course of
operation,” it “requires the application of information, or a process or treatment, with the
authority of the copyright owner, to gain access to the work.” 17 U.S.C. § 1201(a)(3).
Because Congress did not explain what it means to “gain access to the work,” the district
court relied on the “ordinary, customary meaning” of “access”: “the ability to enter, to
obtain, or to make use of,” D. Ct. Op. at 41 (quoting Merriam–Webster’s Collegiate
Dictionary 6 (10th ed.1999)). Based on this definition, the court concluded that
“Lexmark’s authentication sequence effectively ‘controls access’ to the Printer Engine
Program because it controls the consumer’s ability to make use of these programs.” D. Ct.
Op. at 41 (emphasis added).
We disagree. It is not Lexmark’s authentication sequence that “controls access” to the
Printer Engine Program. See 17 U.S.C. § 1201(a)(2). It is the purchase of a Lexmark
printer that allows “access” to the program. Anyone who buys a Lexmark printer may
read the literal code of the Printer Engine Program directly from the printer memory, with
or without the benefit of the authentication sequence, and the data from the program may
be translated into readable source code after which copies may be freely distributed.
Maggs *547 Hr’g Test., JA 928. No security device, in other words, protects access to the
Printer Engine Program Code and no security device accordingly must be circumvented
to obtain access to that program code.
The authentication sequence, it is true, may well block one form of “access”—the “ability
to ... make use of” the Printer Engine Program by preventing the printer from functioning.
But it does not block another relevant form of “access”—the “ability to [ ] obtain” a copy
of the work or to “make use of” the literal elements of the program (its code). Because
4
the statute refers to “control[ling] access to a work protected under this title,” it does not
naturally apply when the “work protected under this title” is otherwise accessible. Just as
one would not say that a lock on the back door of a house “controls access” to a house
whose front door does not contain a lock and just as one would not say that a lock on any
door of a house “controls access” to the house after its purchaser receives the key to the
lock, it does not make sense to say that this provision of the DMCA applies to otherwisereadily-accessible copyrighted works. Add to this the fact that the DMCA not only
requires the technological measure to “control[ ] access” but also requires the measure to
control that access “effectively,” 17 U.S.C. § 1201(a)(2), and it seems clear that this
provision does not naturally extend to a technological measure that restricts one form of
access but leaves another route wide open. See also id. § 1201(a)(3) (technological
measure must “require [ ] the application of information, or a process or a treatment ... to
gain access to the work”) (emphasis added). See The Chamberlain Group, Inc. v. Skylink
Techs., Inc., 381 F.3d 1178, at *1183, 2004 U.S.App. LEXIS 18513, at *52 (Fed.Cir.
Aug. 31, 2004) (“Chamberlain’s proposed construction of the DMCA ignores the
significant differences between defendants whose accused products enable copying and
those, like Skylink, whose accused products enable only legitimate uses of copyrighted
software.”).
Nor are we aware of any cases that have applied this provision of the DMCA to a
situation where the access-control measure left the literal code or text of the computer
program or data freely readable. And several cases apply the provision in what seems to
us its most natural sense. See, e.g., 321 Studios v. Metro Goldwyn Mayer Studios, Inc.,
307 F.Supp.2d 1085, 1095 (N.D.Cal.2004) (deciding that the “CSS” encryption program,
which prevents viewing of DVD movies and copying of the data encoded on the DVD,
effectively controls access to copyrighted DVD movies); Universal City Studios, Inc. v.
Reimerdes, 111 F.Supp.2d 294, 318 (S.D.N.Y.2000), aff’d sub nom., Corley, 273 F.3d
429; Sony Computer Entm’t Am. Inc. v. Gamemasters, 87 F.Supp.2d 976, 987
(N.D.Cal.1999) (deciding that technological measure on PlayStation game console,
which prevented unauthorized games from being played, effectively controlled access to
copyrighted CD–ROM video games, which the facts of the case do not describe as either
encrypted or unencrypted); see also RealNetworks, 2000 WL 127311, at *3 (noting that
the technological measure at issue was a “successful means of protecting against
unauthorized duplication and distribution” of copyrighted digital works); Pearl
Investments, LLC v. Standard I/O, Inc., 257 F.Supp.2d 326, 349–50 (D.Me.2003)
(determining that plaintiff’s “encrypted, password-protected virtual private network,”
which blocked access to data including plaintiff’s copyrighted computer software, was a
technological measure that effectively controlled access to that work).
***
Lexmark counters that several cases have embraced a “to make use of” definition of
“access” in applying the DMCA. While Lexmark is partially correct, these cases (and
5
others as well) ultimately illustrate the liability line that the statute draws and in the end
explain why access to the Printer Engine Program is not covered.
In the essential setting where the DMCA applies, the copyright protection operates on
two planes: in the literal code governing the work and in the visual or audio manifestation
generated by the code’s execution. For example, the encoded data on CDs translates into
music and on DVDs into motion pictures, while the program commands in software for
video games or computers translate into some other visual and audio manifestation. In the
cases upon which Lexmark relies, restricting “use” of the work means restricting
consumers from making use of the copyrightable expression in the work. See 321
Studios, 307 F.Supp.2d at 1095 (movies contained on DVDs protected by an encryption
algorithm cannot be watched without a player that contains an access key); Reimerdes,
111 F.Supp.2d at 303 (same); Gamemasters, 87 F.Supp.2d at 981 (Sony’s game console
prevented operation of unauthorized video games). As shown above, the DMCA applies
in these settings when the product manufacturer prevents all access to the copyrightable
material and the alleged infringer responds by marketing a device that circumvents the
technological measure designed to guard access to the copyrightable material.
The copyrightable expression in the Printer Engine Program, by contrast, operates on
only one plane: in the literal elements of the program, its source and object code. Unlike
the code underlying video games or DVDs, “using” or executing the Printer Engine
Program does not in turn create any protected expression. Instead, the program’s output is
purely functional: the Printer Engine Program “controls a number of operations” in the
Lexmark printer such as “paper feed[,] paper movement[,][and] motor control.” Lexmark
Br. at 9; cf. Lotus Dev., 49 F.3d at 815 (determining that menu command hierarchy is an
“uncopyrightable method of operation”). And unlike the code underlying video games or
DVDs, no encryption or other technological measure prevents access to the Printer
Engine Program. Presumably, it is precisely because the Printer Engine Program is not a
conduit to protectable expression that explains why Lexmark (or any other printer
company) would not block access to the computer software that makes the printer work.
Because Lexmark’s authentication sequence does not restrict access to this literal code,
the DMCA does not apply.
Lexmark next argues that access-control measures may “effectively control access” to a
copyrighted work within the meaning of the DMCA even though the measure may be
evaded by an “ ‘enterprising *549 end-user.’ ” Lexmark Br. at 46 (quoting RealNetworks,
2000 WL 127311, at *9). Doubtless, Lexmark is correct that a precondition for DMCA
liability is not the creation of an impervious shield to the copyrighted work. See
RealNetworks, 2000 WL 127311, at *9; Reimerdes, 111 F.Supp.2d at 317–18 (rejecting
argument that an encryption measure does not “effectively control access” because it is
only a “weak cipher”); see also 17 U.S.C. § 1201(a)(3). Otherwise, the DMCA would
apply only when it is not needed.
6
But our reasoning does not turn on the degree to which a measure controls access to a
work. It turns on the textual requirement that the challenged circumvention device must
indeed circumvent something, which did not happen with the Printer Engine Program.
Because Lexmark has not directed any of its security efforts, through its authentication
sequence or otherwise, to ensuring that its copyrighted work (the Printer Engine
Program) cannot be read and copied, it cannot lay claim to having put in place a
“technological measure that effectively controls access to a work protected under [the
copyright statute].” 17 U.S.C. § 1201(a)(2)(B).
Nor can Lexmark tenably claim that this reading of the statute fails to respect Congress’s
purpose in enacting it. Congress enacted the DMCA to implement the Copyright Treaty
of the World Intellectual Property Organization, and in doing so expressed concerns
about the threat of “massive piracy” of digital works due to “the ease with which [they]
can be copied and distributed worldwide virtually instantaneously.” S.Rep. No. 105–190,
at 8 (1998). As Congress saw it, “copyrighted works will most likely be encrypted and
made available to consumers once payment is made for access to a copy of the work.
[People] will try to profit from the works of others by decoding the encrypted codes
protecting copyrighted works, or engaging in the business of providing devices or
services to enable others to do so.” H.R.Rep. No. 105–551, pt. 1, at 10. Backing with
legal sanctions “the efforts of copyright owners to protect their works from piracy behind
digital walls such as encryption codes or password protections,” Corley, 273 F.3d at 435,
Congress noted, would encourage copyright owners to make digital works more readily
available, see S.Rep. No. 105–190, at 8. See also Nimmer § 12A.02[B][1].
Nowhere in its deliberations over the DMCA did Congress express an interest in creating
liability for the circumvention of technological measures designed to prevent consumers
from using consumer goods while leaving the copyrightable content of a work
unprotected. In fact, Congress added the interoperability provision in part to ensure that
the DMCA would not diminish the benefit to consumers of interoperable devices “in the
consumer electronics environment.” 144 Cong. Rec. E2136 (daily ed. Oct. 13, 1998)
(remarks of Rep. Bliley). See generally Anti–Circumvention Rulemaking Hearing, at 44–
56, at http://www.copyright.gov/1201/2003/hearings/transcript-may9.pdf (testimony of
Professor Jane Ginsburg) (Section 1201(a) does not “cover[ ] the circumvention of a
technological measure that controls access to a work not protected under [the Copyright]
title. And if we’re talking about ball point pen cartridges, printer cartridges, garage doors
and so forth, we’re talking about works not protected under this title.”).
C.
In view of our conclusion regarding the Printer Engine Program, we can dispose quickly
of Lexmark’s DMCA claim regarding the Toner Loading Program. The SCC chip does
not provide *550 “access” to the Toner Loading Program but replaces the program. And
to the extent a copy of the Toner Loading Program appears on the Printer Engine
7
Program, Lexmark fails to overcome the same problem that undermines its DMCA claim
with respect to the Printer Engine Program: Namely, it is not the SCC chip that permits
access to the Printer Engine Program but the consumer’s purchase of the printer. One
other point deserves mention. All three liability provisions of this section of the DMCA
require the claimant to show that the “technological measure” at issue “controls access to
a work protected under this title,” see 17 U.S.C. § 1201(a)(2)(A)-(C), which is to say a
work protected under the general copyright statute, id. § 102(a). To the extent the Toner
Loading Program is not a “work protected under [the copyright statute],” which the
district court will consider on remand, the DMCA necessarily would not protect it.
D.
[The panel finds that SCC may also have a valid reverse engineering defense under
1201(f).]
V.
Because Lexmark failed to establish a likelihood of success on any of its claims, whether
under the general copyright statute or under the DMCA, we vacate the district court’s
preliminary injunction and remand the case for further proceedings consistent with this
opinion.
8
404 F.Supp.2d 1030
United States District Court,
N.D. Illinois,
Eastern Division.
AGFA MONOTYPE CORP., and International Typeface Corp., Plaintiffs,
v.
ADOBE SYSTEMS, INC., Defendant.
No. 02 C 6320. | Jan. 13, 2005.
MEMORANDUM OPINION AND ORDER
LEINENWEBER, District Judge.
Plaintiffs Agfa Monotype Corporation and International Typeface Corp. (hereinafter, the
“Plaintiffs”) are the owners and distributors of approximately 3,300 copyrighted fonts in
TrueType format typefaces (the “TrueType Fonts”). Defendant *1031 Adobe Systems,
Inc. (hereinafter, “Adobe”) is the owner and developer of Adobe Acrobat (“Acrobat”).
In essence, this case boils down to Plaintiffs’ contention that Acrobat 5.0 allows users to
complete forms and change text annotations using Plaintiffs’ TrueType Fonts when such
users have not obtained a license from Plaintiffs to edit documents using their fonts.
Specifically, Plaintiffs argue that two specialized features of Version 5.0 of Adobe
Acrobat (“Acrobat 5.0”) violate Section 1201 of the Digital Millennium Copyright Act
(the “DMCA”) by permitting the circumvention of their TrueType Fonts’ embedding bits.
Before the Court are Plaintiffs’ and Defendant’s Motions for Summary Judgment, and
Defendant’s Motion to Strike.
I. BACKGROUND
The following facts are material and undisputed. Defendant designed and produced
Acrobat 5.0, as well as prior and subsequent versions of Adobe Acrobat, to create
portable electronic documents in the Portable Document Format (“PDF”). Adobe Acrobat
enables a computer user (the “Creator”) to create and send PDF documents to another
computer user (the “Recipient”) who receives the electronic document so that the
Recipient can view and print the PDF documents in the same format that the Creator sent
them in. To accomplish this task, Adobe Acrobat stores a copy of the font data in the
electronic document transmitted, a process that is called “font embedding.” The font is
embedded temporarily on the computer system on which it is downloaded.
A. Font Embedding and TrueType Specifications
A font is copied when it is embedded. (Pl. ASOF ¶ 53). Fonts are embedded through
1
embedding bits. Embedding bits indicate to other programs capable of reading them, such
as Adobe Acrobat, the font embedding licensing rights that the font vendor granted with
respect to the particular font. (Def. SOF ¶ 32). The software application decides whether
or not to embed the font based upon the embedding bit. See id. ¶ 36. An embedding bit
cannot be read by a computer program until that program has already accessed the font
data file. See id. ¶ 121. TrueType Fonts are not encrypted, scrambled, or authenticated.
See id. ¶ 137. A TrueType Font data file can be accessed regardless of the font’s
embedding permissions. See id. ¶ 122. A program seeking to access a TrueType Font
need not submit a password or complete an authorization sequence to access, use or copy
TrueType Fonts. See id. ¶¶ 96–97.
The specifications for TrueType Fonts have been available for free download from
Microsoft’s website since 1995, and are some 360 pages in length. One subject addressed
very briefly in the specifications are embedding bits. The TrueType specification
provides four levels of embedding bit restrictions: (1) Restricted, (2) Print & Preview, (3)
Editable, and (4) Installable. * * *
B. Adobe Acrobat
* * * Defendant released Acrobat 5.0 in or around March 2001. At issue in this case are
two specialized features of Acrobat 5.0, the FreeText tool and the Form tool as modified
from prior versions of Adobe Acrobat, which Plaintiffs contend violate the DMCA. (Def.
SOF ¶ 44). In particular, Plaintiffs allege that Acrobat 5.0 made it possible for the first
time to embed in a form field or a free text annotation any TrueType Font whose
embedding bit is not set to “Restricted,” including fonts whose embedding bit is set to
“Print and Preview” (sometimes referred to herein as the “Any Font Feature”). Although
the FreeText Tool and Forms Tool also existed in Adobe Acrobat 4.0, the tools have
increased functionality in Acrobat 5.0. Unlike Adobe Acrobat 4.0, through Acrobat 5.0, a
Recipient of PDF could theoretically embed and use Plaintiffs’ TrueType Fonts to edit a
form field or free text annotation even if the embedding bit was not set to “Editable.”
Defendant modified the pre-existing contested features to create the Any Font Feature in
Acrobat 5.0 by adding only two lines of code that instructed the existing font embedding
software to embed the fonts in form fields and text annotations. See id. ¶¶ 156–157.
Defendant was aware that the changes made in Acrobat 5.0 would permit its users to
embed TrueType Fonts in a Form field or Free Text annotation even if the embedding bit
were set to “Preview and Print” only. Defendant removed the Any Font Feature with the
release of Adobe Acrobat 5.05.
[The court notes that the purpose of the new feature was to enable users to fill out forms
with their preferred fonts.]
C. Circumvention Evidence
2
Defendant released Acrobat 5.0 in or around March 2001. Defendant terminated its
production and distribution of Acrobat 5.0 on or about December 2001 with the release of
Adobe Acrobat 5.05. Plaintiffs do not allege that Adobe Acrobat 5.05, or any previous or
subsequent version of Adobe Acrobat, violates the DMCA. Plaintiffs have not submitted
any evidence establishing actual unauthorized use of their fonts by any Acrobat 5.0 user.
Neither Plaintiffs nor Defendant are aware of any person other than Plaintiffs who has
used an embedded Plaintiffs’ TrueType Font to complete a form or change an annotation
without a license. In fact, Defendant submitted contrary undisputed evidence obtained
from a random sample of one million PDF files on the World Wide Web. Of these files,
only 1,096 files (.11%) contained form fields or free text annotations which had
embedded fonts. Of the 1,096 files, only 21 PDF files had Plaintiffs’ TrueType Fonts
embedded in a form field or free text annotation. Each of the 21 PDF files containing
Plaintiffs’ TrueType Fonts had an “Editable” embedding bit meaning that Plaintiffs had
specifically authorized embedding for editing purposes.
***
III. DISCUSSION
Plaintiffs contend that Acrobat 5.0 violates the DMCA because two of its specialized
features, the FreeText Tool and Forms Tool, allow certain of Plaintiffs’ TrueType Fonts
to be embedded in “form fields” and “free text annotations.” Plaintiffs contend that such
embedding constitutes “editable embedding,” because a Recipient of an electric
document can use the embedded fonts to change the contents of a form field or free text
annotation. Plaintiffs further contend that such “editable embedding” is only possible
because Acrobat 5.0 allows the embedding bits set by Plaintiffs to be “circumvented” in
violation of the DMCA. Section 1201 of the DMCA addresses liability for circumventing
systems that protect copyrights, and is divided into two sections: access measures under
Section 1201(a) and rights measures under Section 1201(b). See 17 U.S.C. § 1201.
Although Plaintiffs contend that they are entitled to summary judgment under both
Sections 1201(a)(2) and 1201(b)(1) of the DMCA, Plaintiffs concede that Defendant’s
“liability under Section 1201(b)(1) is clear, while liability under Section 1201(a)(2) is
less obvious.” (Pl. Supp. Mem. at 22). Defendants contend that Acrobat 5.0 does not
violate Section 1201(a)(2) or Section 1201(b)(1) of the DMCA and it is entitled to
summary judgment.
A. 17 U.S.C. § 1201(a)(2) Liability
***
Citing RealNetworks, Inc. v. Streambox, Inc., 2000 WL 127311 (W.D.Wash.2000),
Plaintiffs contend that a 2–bit embedding bit, which is similar to a Copy Switch that
contains the content owner’s copying preferences regarding streaming to end-users, is an
3
technological measure that effectively controls access. RealNetworks, however, also
involved the “Secret Handshake” technological measure, a secret authentication sequence
that “by design” prevents streaming “unless this authentication sequence takes place.” Id.
at *2. Defendant distinguishes RealNetworks from the instant case because the
RealNetworks court held that “in conjunction with the Secret Handshake, the Copy
Switch is a ‘technological measure that effectively protects the rights of a copyright
owner.’ ” Id. at *7 (emphasis added). Here, embedding bits, which are not secret and
require no password or authorization, are the only alleged “technological measure,” and
there is nothing to work in conjunction with the embedding bits to control access.
The Court concludes that the undisputed facts establish that Plaintiffs’ embedding bits,
without more, do not “effectively control access to a work protected under th[e
Copyright] title.” 17 U.S.C. § 1201(a)(2)(A). An embedding bit is a passive entity that
does nothing by itself. The embedding bit must be downloaded and accessed in order for
a software system to interpret its embedding permissions. Since the specifications for the
TrueType Font have been available for free download from the Internet since 1995, it is
clearly not secret or undisclosed. Embedding bits are not encrypted, scrambled or
authenticated, and software applications, such as Acrobat 5.0, need not enter a password
or authorization sequence to obtain access to the embedding bits or the specification for
the TrueType font.
For the foregoing reasons, the embedding bits used in connection with Plaintiffs’
TrueType Fonts do not “in the ordinary course of [their] operation, require[ ] the
application of information, or a process or a treatment, with the authority of the copyright
owner, to gain access” to Plaintiffs’ TrueType Fonts. Id. § 1201(a)(3)(B). Plaintiff has
failed to prove that its copyrighted TrueType Fonts are “effectively controlled by a
technological measure, *1037 which has been circumvented.” Chamberlain, 381 F.3d at
1203.
***
B. 17 U.S.C. § 1201(b)(1) Liability
***
To prove liability in this case under Section 1201(b)(1)(a), Plaintiffs must establish that
Acrobat 5.0, or the parts thereof, are “primarily designed or produced for the purpose of
circumventing a protection afforded by a technological measure that effectively protects a
right of copyright owner” as such terms are defined under the DMCA. Here, even if the
operation of Acrobat 5.0 implicated Plaintiffs’ reproduction right of copyright as
Plaintiffs contend, a conclusion that is not entirely clear to the Court based upon the
particular facts of this case, the Court finds that Plaintiffs have failed to establish
Defendant’s liability under Section 1201(b) of the DMCA.
4
First, based on the evidence presented, the Court agrees with the Defendant that the
embedding bits, without more, do not “prevent[ ], restrict[ ], or otherwise limit[ ] the
exercise of a right of copyright,” Id. § 1201(b)(2)(B), and consequently do not
“effectively protect[ ] the right of copyright owner.” Id. Second, the Court’s extensive
review of the record does not reveal evidence to establish that Defendant designed or
produced the FreeText Tool, Forms Tools, Any Font Feature, or Acrobat 5.0 “primarily ”
to circumvent Plaintiffs’ embedding bits. To the contrary, as discussed more thoroughly
Sections I and III(A) of this Memorandum, Acrobat 5.0 as a whole and the parts thereof
were not primarily designed or promoted for font embedding purposes and has many
other commercially significant purposes. Finally, Defendant did not market the Any
Fonts Feature, embedding bits, or circumvention of embedding bits in connection with
the extensive marketing materials for Acrobat 5.0. Additionally, Acrobat 5.0 as a whole,
as well as the parts thereof, clearly have more than a limited commercially significant
purpose or use other than circumventing the embedding bits associated with Plaintiffs’
TrueType Fonts.
Accordingly. Plaintiffs have failed to establish Defendant’s potential liability under
Section 1201(b) of the DMCA, and accordingly, Plaintiffs’ Motion with respect to
Section 1201(b) is denied, and Defendant’s Motion for Summary Judgment with respect
to such section is granted. Due to its disposition of the Summary Judgment Motions, the
Court need not address Defendant’s Motion to Strike, and accordingly, such motion is
denied as moot.
IV. CONCLUSION
For the foregoing reasons, Plaintiffs’ Motion for Summary Judgment is DENIED and
Defendant’s Motion for Summary Judgment is GRANTED. Defendant’s Motion to
Strike is DENIED AS MOOT.
IT IS SO ORDERED.
5
2006 WL 3500868
United States District Court,
E.D. Michigan,
Southern Division.
AUTO INSPECTION SERVICES, INC., Plaintiff,
v.
FLINT AUTO AUCTION, INC., Priority Inspection, Inc., Inviso, Inc., John Luce,
William Williams, Jr., Angie Compton, Lawrence Cubit, Kenneth J. Moffitt, Scott
Braley, and John Does 1-10, Defendants.
No. 06-15100. | Dec. 4, 2006.
***
OPINION AND ORDER
LAWRENCE P. ZATKOFF, District Judge.
I. INTRODUCTION
*1 This matter is presently before the Court upon Plaintiff’s Motion for a Preliminary
Injunction. The preliminary injunction hearing was held on November 30, 2006. For the
reasons set forth below, Plaintiff’s motion will be DENIED.
II. BACKGROUND
A. The Parties and Events Leading to the Present Dispute
Plaintiff Auto Inspection Services, Inc. (“AIS”), developed automotive inspection
software (“the Program”) that is utilized as a uniform method of inspecting vehicles after
the term of lease or use has expired. In March 2004, AIS registered the Program with the
United States Copyright Office, and currently owns the copyright for the Program. In
order to protect against unauthorized use of the Program, AIS included a quality control
feature as part of the software, which allowed it to monitor all information collected
using the Program. For example, when an vehicle inspector collected data of a vehicle
and entered it into the Program, the data had to be sent to AIS for quality control
inspection before the information could be forwarded to the owner of the vehicle. In this
way, AIS could monitor who was using the Program to protect against unauthorized use.
Defendants Flint Auto Auction, Inc., Inviso, Inc., and Priority Inspections, Inc.
(collectively “FAA”) are also in the auto inspection business. FAA began designing and
programming its own automotive software in 1990, including three separate inspection
programs, using both an in-house computer staff and outside firms such as Technical
Edge. Prior to the 1990s, FAA’s primary clients consisted of automotive dealers who
1
participated in dealer auctions at FAA’s facility in Flint. Eventually, FAA attracted larger
clients such as General Motors and GMAC.
GMAC, as part of its business of reselling cars at the end of their leases, began using the
internet to conduct sales, making inspections a critical element in the business. GMAC
approached FAA to conduct these inspections in the summer of 2003, and suggested that
FAA use AIS’s inspection software. GMAC had previously approved AIS’s software,
which it required to contain uniform elements and provided detailed instructions for
writing the software. Such instructions were necessary for uniformity in GMAC’s
inspections. Consequently, the inspectors GMAC dealt with, such as FAA and AIS, used
software that was substantially similar. Further, GMAC requires that the inspection
software be continuously updated in order to continue conducting inspections for GMAC.
The next update is December 1, 2006, the day after the hearing.
On October 27, 2003, FAA and AIS entered into a non-exclusive licensing agreement in
which AIS permitted FAA to make use of the Program while performing inspections for
GMAC. AIS loaded the software directly on to Panasonic Toughbook computers and
provided the computers to FAA. AIS reserved the right to terminate the agreement and
require the return or destruction of all copies of the Program if FAA failed to abide by its
terms.
*2 In May 2004, AIS, through its quality control process, learned that an unauthorized
user, Columbus Fair Auto Auction (“CFAA”), had made use of the Program using FAA’s
license. However, CFAA had previously contacted AIS with regard to possibly using the
software and there is some suggestion that AIS authorized the use it now complains of.
Nevertheless, AIS immediately issued a cease and desist letter pursuant to the license
agreement, requiring FAA to stop use of the Program and return all copies to AIS. FAA
agreed that it would be in the parties’ best interest to terminate the agreement and
complied with AIS’s requests.
Following the end of the business relationship, AIS alleges that FAA continued to make
use of the Program in violation of its copyrights. AIS has submitted an affidavit of a
former FAA employee, Jacob Kniss. Mr. Kniss worked for FAA from 2001 to 2006 as an
auto inspector, during which time he became familiar with the inspection software. Mr.
Kniss stated that FAA’s software is the same or substantially similar to the Program, and
that FAA is still currently using a substantially similar program. See Kniss Aff. ¶¶ 2, 10.
FAA states that following the end of the business relationship with AIS, it set forth to
develop its own inspection program to take the place of AIS’s Program. FAA hired
Technical Edge to develop the software and provided the programmers with GMAC’s
program requirements, and a description of FAA’s needs. Technical Edge’s designer,
Randall Phillips, used the GMAC requirements, FAA’s needs, and their own in-house
libraries as the basis for the software.
2
***
IV. ANALYSIS
A. Likelihood of Success on the Merits
***
2. Digital Millennium Copyright Act
*8 AIS asserts that it has a substantial likelihood of success on the merits of its claim
under the Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. § 1201 et seq.
Section 1201(a)(1) of the DMCA states that “no person shall circumvent a technological
measure that effectively controls access to a work protected under this title.”
Circumventing a technological measure means “to descramble a scrambled work, to
decrypt an encrypted work, or otherwise bypass, remove, deactivate, or impair a
technological measure, without authority of the copyright owner.” 17 U.S.C. §
1201(a)(3)(A). A technological measure effectively controls access to the work “if the
measure in the ordinary process of its operation, requires the application of information
or a process or a treatment, with the authority of the copyright owner, to gain access to
the work.” 17 U.S.C. § 1201(a)(3)(B). The effectiveness test is met if the technological
measure actually works to control access. See Universal City Studios v. Reimerdes, 111
F.Supp.2d 294, 318 (S.D.N.Y.2000).
As an initial matter, it is questionable that AIS’s user detection feature constitutes a
technological measure that controls access to a protected work. The protected work in
this case is the source code of the Program. The user detection feature is a part of the
program itself and in no way controls access to the source code; rather, it merely alerts
AIS as to who is using the Program. Consequently, the user detection feature would not
prevent anyone from gaining access to the source code and copying it verbatim. See, e.g.,
Lexmark, 387 F.3d at 549 (“Because Lexmark has not directed any of its security efforts,
through its authentication sequence or otherwise, to ensuring that its copyrighted work
(the Printer Engine Program) cannot be read and copied, it cannot lay claim to having put
in place a ‘technological’ measure that effectively controls access to a work protected
under [the copyright statute].”). Moreover, this feature only comes into play after a user
has conducted an inspection, and does not prevent unauthorized users from accessing the
Program.
***
V. CONCLUSION
The record does not demonstrate that AIS has a strong likelihood of success on the
3
merits. Further, AIS, without the benefit of a presumption, has not demonstrated that it
will be irreparably harmed if an injunction is not issued. On the other hand, issuing an
injunction could seriously harm FAA’s business. Consequently, FAA has shown good
cause as to why the Court should not grant a preliminary injunction. * * *
4
307 F.Supp.2d 521
United States District Court,
S.D. New York.
I.M.S. INQUIRY MANAGEMENT SYSTEMS, LTD., Plaintiff,
v.
BERKSHIRE INFORMATION SYSTEMS, INC., Defendant.
No. 03 Civ. 2183(NRB). | Feb. 23, 2004.
***
MEMORANDUM AND ORDER
BUCHWALD, District Judge.
Plaintiff I.M.S. Inquiry Management Systems, Ltd., (“plaintiff” or “I.M.S.”) commenced
this action on March 28, 2003, against defendant Berkshire Information Systems, Inc.,
(“defendant” or “Berkshire”) seeking damages and injunctive relief for defendant’s
alleged unauthorized use of plaintiff’s computer system and the content thereof. In
Plaintiff’s First *523 Amended Complaint (“Amended Complaint” or “Am. Compl.”),
filed on May 6, 2003, plaintiff claims that [defendant violated the Computer Fraud and
Abuse Act and the Digital Millennium Copyright Act.]
Pursuant to Fed.R.Civ.P. 12(b)(6), defendant moves to dismiss these claims, asserting
that plaintiff fails to state a claim under which relief may be granted. * * *
For the following reasons, defendant’s motion is denied in part and granted in part.
I. BACKGROUND
The following factual background and allegations are derived from plaintiff’s amended
complaint and are taken as true for purposes of this motion.
I.M.S., a Canadian Corporation, is engaged in the service of providing advertising
tracking information to publishers, advertisers, and others. I.M.S. operates a web-based
service known as “e-Basket”, which is used by I.M.S.’s clients to track magazine
advertising. e-Basket is available exclusively to I.M.S. clients. Each I.M.S. client is
issued a unique user identification and password which allows the client to access the eBasket service and information in I.M.S.’s computers through an I.M.S. website. The eBasket content is selected by I.M.S. and arranged into categories and sub-categories, a
process which involves substantial creativity, time and effort. According to I.M.S., the eBasket service contains copyrightable subject matter.
1
Berkshire has introduced and operates a competing tracking service called
“Marketshareinfo.com”. I.M.S. alleges that in or around March of 2002, Berkshire, or an
agent thereof, intentionally and without authorization accessed I.M.S.’s e-Basket service,
and gathered and copied content therefrom for use in Marketshareinfo.com. Specifically,
Berkshire’s unauthorized access spanned eight different webpages of e-Basket content,
including that which would ordinarily be used by I.M.S. clients. Through its unauthorized
access, I.M.S. contends that Berkshire copied roughly eighty-five percent of I.M.S.’s
report formats. Marketshareinfo.com was launched after Berkshire accessed e-Basket,
and I.M.S. alleges that Marketshareinfo.com incorporates original copyrightable elements
of e-Basket, including the selection and arrangement of informational category headings
and I.M.S.-compiled market data.
To gain access to e-Basket, I.M.S. alleges that Berkshire obtained a user identification
and password issued to a third party, thereby knowingly inducing that third party to
breach an agreement it had with I.M.S.
According to I.M.S., Berkshire’s unauthorized access of I.M.S.’s computers is causing
I.M.S. irreparable harm, has impaired the integrity and availability of I.M.S.’s data, and
has caused I.M.S. to *524 incur costs of more than $5,000 in damage assessment and
remedial measures.
***
III. THE COMPUTER FRAUD AND ABUSE ACT
[The court concludes that IMS has stated a claim under 1030(a)(2)(C).]
***
V. DIGITAL MILLENNIUM COPYRIGHT ACT
Congress enacted the Digital Millennium Copyright Act (“DMCA”) in 1998 to
“strengthen copyright protection in the digital age.” Universal City Studios, *531 Inc. v.
Corley, 273 F.3d 429, 435 (2d Cir.2001). Plaintiff claims that defendant, by accessing
I.M.S.’s computer system through the unauthorized use of a password issued to a party
other than defendant, violated the DMCA’s bar on circumventing a technological
measure that effectively controls access to protected work.
***
Defendant challenges whether the facts as alleged manifest a “circumvention” as that
term is defined in the subsection. According to defendant, the DMCA was passed to
combat unauthorized disabling of digital walls which otherwise safeguard copyrighted
2
materials available on the Internet and the decryption of encrypted content, such as that
found on a DVD. See Mem. at 13 (citing Universal City Studios, Inc., 273 F.3d 429).
Defendant argues that it is not accused of having “hacked” into plaintiff’s website, and
that “[t]he disconnect between the harm the statute is designed to address and the acts of
which [p]laintiff complains” warrants dismissal of this claim. Mem. at 13.
Whether accessing copyrighted work by unauthorized use of an otherwise legitimate,
owner-issued password qualifies as circumvention under the DMCA appears to be a
question of first impression in this Circuit and in all others.
A. Was An Effective Technological Measure In Place?
An action under the DMCA requires “circumvent[ion of] a technological measure that
effectively controls access to a work protected under this title.” 17 U.S.C. § 1201(a). A
“technological measure that effectively controls access” is defined as one that “in the
ordinary course of its operation ... requires the application of information, or a process or
a treatment, with the authority of the copyright owner, to gain access to the work.” Id., at
§ 1201(a)(3).
I.M.S.’s password protection fits within this definition. In order to gain access to the eBasket service, a user in the ordinary course of operation needs to enter a password,
which is the application of information. Indeed, the Second Circuit in Universal Studios
confirmed that “[t]he DMCA ... backed with legal sanctions the efforts of copyright
owners to protect their *532 works from piracy behind digital walls such as encryption
codes or password protections.” Universal Studios, 273 F.3d at 435 (emphasis added).
B. Was The Technological Measure Circumvented?
It is of course the case, as defendant propounds, that the DMCA addresses activity such
as decryption, descrambling, deactivation and impairment, and that these are all forms of
circumvention under the subsection commonly involving technologically-sophisticated
maneuvers. One might associate these activities with the breaking and entering (or
hacking) into computer systems.
On the other hand, other actions proscribed by the DMCA, connote broader application
of the anti-circumvention prohibition, such as the terms “avoid” and “bypass”. These
actions are far more open-ended and mundane, and do not necessarily involve some kind
of tech-based execution. Notwithstanding this, defendant argues that it has not even
committed any act of avoidance or bypass, as it is accused of confronting IMS’s
password-controlled access in the way precisely intended: “[A]ll [I.M.S.] accuses
Berkshire of doing is using IMS’s own customer’s valid password and user
[identification] to view IMS’s e-Basket system exactly as the customer itself might have
done.” Rep. Mem. at 10.
3
We agree that plaintiff’s allegations do not evince circumvention as that term is used in
the DMCA. Circumvention requires either descrambling, decrypting, avoiding,
bypassing, removing, deactivating or impairing a technological measure qua
technological measure. In the instant matter, defendant is not said to have avoided or
bypassed the deployed technological measure in the measure’s gatekeeping capacity. The
Amended Complaint never accuses defendant of accessing the e-Basket system without
first entering a plaintiff-generated password.
More precisely and accurately, what defendant avoided and bypassed was permission to
engage and move through the technological measure from the measure’s author. Unlike
the CFAA, a cause of action under the DMCA does not accrue upon unauthorized and
injurious access alone; rather, the DMCA “targets the circumvention of digital walls
guarding copyrighted material.” Universal Studios, 273 F.3d 429, 443 (emphasis in
original).
Although whether an activity qualified as circumvention was not the question posed to
the court, Universal Studios is instructive as a matter of reference. There, the offending
circumvention was a DVD decryption program, DeCSS, which enabled the viewing of
movies without using a DVD player. See Universal Studios, 273 F.3d at 452. The security
device that prevented access to DVD movies without a DVD player, CSS, was described
“[i]n its basic function ... [as] a lock on a homeowner’s door, a combination of a safe, or a
security device attached to a store’s products.” Id., at 452–53. Likewise, “[i]n its basic
function, [DeCSS, the decryption program] is like a skeleton key that can open a locked
door, a combination that can open a safe, or a device that can neutralize the security
device attached to a store’s products. DeCSS enables anyone to gain access to a DVD
movie without using a DVD player.” Universal Studios, 273 F.3d at 453.
Defendant is alleged to have accessed plaintiff’s protected website without plaintiff’s
authorization. Defendant did not surmount or puncture or evade any technological
measure to do so; instead, it used a password intentionally issued by *533 plaintiff to
another entity. As an analogy to Universal Studios, the password defendant used to enter
plaintiff’s webservice was the DVD player, not the DeCSS decryption code, or some
alternate avenue of access not sponsored by the copyright owner (like a skeleton key, or
neutralizing device). Plaintiff, however, did not authorize defendant to utilize the DVD
player. Plaintiff authorized someone else to use the DVD player, and defendant borrowed
it without plaintiff’s permission. Whatever the impropriety of defendant’s conduct, the
DMCA and the anti-circumvention provision at issue do not target this sort of activity.
***
CONCLUSION
For the foregoing reasons, defendant’s motion is denied with respect to plaintiff’s CFAA
4
claims, and granted for plaintiff’s copyright infringement and DMCA claims. * * *
IT IS SO ORDERED.
5
381 F.3d 1178
United States Court of Appeals,
Federal Circuit.
The CHAMBERLAIN GROUP, INC., Plaintiff–Appellant,
v.
SKYLINK TECHNOLOGIES, INC., Defendant–Appellee.
No. 04–1118. | DECIDED: Aug. 31, 2004. | Rehearing and Rehearing En Banc Denied
Oct. 22, 2004.
***
GAJARSA, Circuit Judge.
The Chamberlain Group, Inc. (“Chamberlain”) appeals the November 13, 2003 summary
judgment of the United States District Court for the Northern District of Illinois (“District
Court”) in favor of Skylink Technologies, Inc. (“Skylink”), finding that Skylink is not
violating the anti-trafficking provisions of the Digital Millennium Copyright Act
(“DMCA”), 17 U.S.C. § 1201 et seq., and dismissing all other claims, including claims of
patent infringement. Chamberlain Group, Inc. v. Skylink Techs., Inc., 292 F.Supp.2d
1040 (N.D.Ill.2003) (“Chamberlain II ”). * * *
Chamberlain’s claims at issue stem from its allegation that the District Court incorrectly
construed the DMCA as placing a burden upon Chamberlain to prove that the
circumvention of its technological measures enabled unauthorized access to its
copyrighted software. But Skylink’s accused device enables only uses that copyright law
explicitly authorizes, and is therefore presumptively legal. Chamberlain has neither
proved nor alleged a connection between Skylink’s accused circumvention device and the
protections that the copyright laws afford Chamberlain capable of overcoming that
presumption. Chamberlain’s failure to meet this burden alone compels a legal ruling in
Skylink’s favor. We therefore affirm the District Court’s summary judgment in favor of
Skylink.
BACKGROUND
A. The Applicable Statute
* * * The matter on appeal involves only Chamberlain’s allegation that Skylink is
violating the DMCA, specifically the anti-trafficking provision of § 1201(a)(2).
***
1
B. The Dispute
***
The technology at issue involves Garage Door Openers (GDOs). A GDO typically
consists of a hand-held portable transmitter and a garage door opening device mounted in
a homeowner’s garage. The opening device, in turn, includes both a receiver with
associated signal processing software and a motor to open or close the garage door. In
order to open or close the garage door, a user must activate the transmitter, which sends a
radio frequency (RF) signal to the receiver located on the opening device. Once the
opener receives a recognized signal, the signal processing software directs the motor to
open or close the garage door.
When a homeowner purchases a GDO system, the manufacturer provides both an opener
and a transmitter. Homeowners who desire replacement or spare transmitters can
purchase them in the aftermarket. Aftermarket consumers have long been able to
purchase “universal transmitters” that they can program to interoperate with their GDO
system regardless of make or model. Skylink and Chamberlain are the only significant
distributors of universal GDO transmitters.1 Chamberlain places no explicit restrictions
on the types of transmitter that the homeowner may use with its system at the time of
purchase. Chamberlain’s customers therefore assume that they enjoy all of the rights
associated with the use of their GDOs and any software embedded therein that the
copyright laws and other laws of commerce provide.
This dispute involves Chamberlain’s Security+ line of GDOs and Skylink’s Model 39
universal transmitter. Chamberlain’s Security+ GDOs incorporate a copyrighted “rolling
code” computer program that constantly changes the transmitter signal needed to open
the garage door. Skylink’s Model 39 transmitter, which does not incorporate rolling code,
nevertheless allows users to operate Security+ openers. Chamberlain alleges that
Skylink’s transmitter renders the Security+ insecure by allowing unauthorized users to
circumvent the security inherent in rolling codes. Of greater legal significance, however,
Chamberlain contends that because of this property of the Model 39, Skylink is in
violation of the anti-trafficking clause of the DMCA’s anticircumvention provisions,
specifically § 1201(a)(2).
The code in a standard (i.e., non-rolling code) GDO transmitter is unique but fixed. Thus,
according to Chamberlain, the typical GDO is vulnerable to attack by burglars who can
open the garage door using a “code grabber.” According to Chamberlain, code grabbers
allow burglars in close proximity to a homeowner operating her garage door to record the
signal sent from the transmitter to the opener, and to return later, replay the recorded
signal, and open the garage door. Chamberlain concedes, however, that code grabbers are
more theoretical than practical burgling devices; none of its witnesses had either firsthand
knowledge of a single code grabbing problem or familiarity with data demonstrating
2
*1184 the existence of a problem. Nevertheless, Chamberlain claims to have developed
its rolling code system specifically to prevent code grabbing.2
The essence of the rolling code system is that the transmitted signals are broken into
fixed and variable (or “rolling”) components. The entire transmitted signal is a bit string.
The fixed component serves to identify the transmitter. The rolling component cycles
through a lengthy cycle of bit strings only some of which are capable of opening the door
at any given time, ostensibly so that a burglar replaying a grabbed code is unlikely to
send a valid signal—and therefore unlikely to open the garage door.
A user wishing to set up a new transmitter for use with her Security+ GDO must switch
the opener to “program mode” and send a signal from the transmitter to the opener. The
opener stores both the fixed and rolling components of the transmitted signal. When the
user switches the opener back to “operate mode,” the system is set and the user may
operate the opener with the newly programmed transmitter. In Chamberlain’s transmitter,
a computer program increases the rolling code by a factor of three each time the user
activates the transmitter. When the transmitted signal reaches the receiver, a program in
the opener checks to see whether the rolling code received was identical to one of the
most recently received 1,024 rolling codes (the “rear window”). If so, it will not activate
the motor. If, on the other hand, the rolling code received is among the next 4,096 binary
signals (the “forward window”), the receiver will activate the motor.
Not all recognized binary rolling signals are in either the forward or rear windows. If the
transmitter sends a single signal outside of either window, the receiver will ignore it. If,
however, the transmitter sends two signals outside either window in rapid succession, the
opener will again access its programming, this time to determine whether the two signals
together comprise a “resynchronization” sequence. If the signals differ by three, the
receiver will reset the windows and activate the motor. According to Chamberlain,
resynchronization accommodates the possibility that homeowners using the same
transmitter for multiple residences may transmit so many signals while out of range of the
opener that they exhaust the entire forward window.
Skylink began marketing and selling universal transmitters in 1992. Skylink designed its
Model 39, launched in August 2002, to interoperate with common GDOs, including both
rolling code and non-rolling code GDOs.3 Although Chamberlain concedes that the
Model 39 transmitter is capable of operating many different GDOs, it nevertheless asserts
that Skylink markets the Model 39 transmitter for use in circumventing its copyrighted
rolling code computer program. Chamberlain supports this allegation by pointing to the
Model 39’s setting that operates only Chamberlain’s rolling code GDOs.
Skylink’s Model 39 does not use rolling code technology. Like Chamberlain’s products,
however, the Model 39’s binary signal contains two components. The first corresponds to
the Chamberlain’s fixed *1185 component identifying the transmitter, and the second
3
simulates the effect of the Chamberlain’s rolling code. Like the Chamberlain fixed
component, the primary role of the Model 39’s identifying component is in
programming; a homeowner wishing to use a Model 39 in conjunction with a
Chamberlain GDO must program the opener to recognize his newly purchased
transmitter. When the homeowner actually uses the transmitter, it broadcasts three fixed
codes in rapid succession. The first binary signal combines the identifying component
with an arbitrary binary sequence. The second binary signal subtracts 1800 from the first
signal. The third signal adds three to the second signal. The combination of these three
codes transmitted with every press of the Model 39 transmitter button will either cause
the Chamberlain GDO to operate in response to the first fixed code or cause the GDO to
resynchronize and operate in response to the second and third fixed codes. Chamberlain
characterizes this procedure as a circumvention of an important security measure; a code
grabber that recorded the Model 39’s three codes could later play them back and activate
a Chamberlain rolling code GDO without authorization.
These facts frame the dispute now before us on appeal. Though only Chamberlain’s
DMCA claim is before us, and though the parties dispute whether or not Skylink
developed the Model 39 independent of Chamberlain’s copyrighted products,4 it is
nevertheless noteworthy that Chamberlain has not alleged either that Skylink infringed its
copyright or that Skylink is liable for contributory copyright infringement. What
Chamberlain has alleged is that because its opener and transmitter both incorporate
computer programs “protected by copyright” and because rolling codes are a
“technological measure” that “controls access” to those programs, Skylink is prima facie
liable for violating § 1201(a)(2). In the District Court’s words, “Chamberlain claims that
the rolling code computer program has a protective measure that protects itself. Thus,
only one computer program is at work here, but it has two functions: (1) to verify the
rolling code; and (2) once the rolling code is verified, to activate the GDO motor, by
sending instructions to a microprocessor in the GDO.” Chamberlain I, 292 F.Supp.2d at
1028.
***
DISCUSSION
***
D. The Statute and Liability under the DMCA
The essence of the DMCA’s anticircumvention provisions is that §§ 1201(a),(b) establish
causes of action for liability. They do not establish a new property right. The DMCA’s
text indicates that circumvention is not infringement, 17 U.S.C. § 1201(c)(1) (“Nothing in
this section shall affect rights, remedies, limitations, or defenses to copyright
4
infringement, including fair use, under this title.”), and the statute’s structure makes the
point even clearer. This distinction between property and liability is critical. Whereas
copyrights, like patents, are property, liability protection from unauthorized *1193
circumvention merely creates a new cause of action under which a defendant may be
liable. The distinction between property and liability goes straight to the issue of
authorization, the issue upon which the District Court both denied Chamberlain’s and
granted Skylink’s motion for summary judgment.
A plaintiff alleging copyright infringement need prove only “(1) ownership of a valid
copyright, and (2) copying of constituent elements of the work that are original.” Feist
Pub., Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361, 111 S.Ct. 1282, 113 L.Ed.2d 358
(1991); see also Harris Custom Builders, Inc. v. Hoffmeyer, 92 F.3d 517, 519 (7th
Cir.1996). “[T]he existence of a license, exclusive or nonexclusive, creates an affirmative
defense to a claim of copyright infringement.” I.A.E., Inc. v. Shaver, 74 F.3d 768, 775
(7th Cir.1996). In other words, under Seventh Circuit copyright law, a plaintiff only
needs to show that the defendant has used her property; the burden of proving that the use
was authorized falls squarely on the defendant. Id. The DMCA, however, defines
circumvention as an activity undertaken “without the authority of the copyright owner.”
17 U.S.C. § 1201(a)(3)(A). The plain language of the statute therefore requires a plaintiff
alleging circumvention (or trafficking) to prove that the defendant’s access was
unauthorized—a significant burden where, as here, the copyright laws authorize
consumers to use the copy of Chamberlain’s software embedded in the GDOs that they
purchased. The premise underlying this initial assignment of burden is that the copyright
laws authorize members of the public to access a work, but not to copy it. The law
therefore places the burden of proof on the party attempting to establish that the
circumstances of its case deviate from these normal expectations; defendants must prove
authorized copying and plaintiffs must prove unauthorized access.
The distinction between property and liability also addresses an important policy issue
that Chamberlain puts into stark focus.10 According to Chamberlain, the 1998 enactment
of the DMCA “renders the pre-DMCA history in the GDO industry irrelevant. By
prohibiting the trafficking and use of circumvention technology, the DMCA
fundamentally altered the legal landscape.... Any analysis of practices within the GDO
industry must now be undertaken in light of the DMCA.” Chamberlain reiterated and
strengthened this assertion at oral argument, claiming that the DMCA overrode all preexisting consumer expectations about the legitimate uses of products containing
copyrighted embedded software. Chamberlain contends that Congress empowered
manufacturers to prohibit consumers from using embedded software products in
conjunction with competing products when it passed § 1201(a)(1). According to
Chamberlain, all such uses of products containing copyrighted software to which a
technological measure controlled access are now per se illegal under the DMCA unless
the manufacturer provided consumers with explicit authorization. Chamberlain’s
interpretation of the DMCA would therefore grant manufacturers broad exemptions from
5
both the antitrust laws and the doctrine of copyright misuse.
Such an exemption, however, is only plausible if the anticircumvention provisions
established a new property right capable of conflicting with the copyright owner’s other
legal responsibilities—which as we have already explained, they do not. The
anticircumvention provisions convey no additional property rights in and *1194 of
themselves; they simply provide property owners with new ways to secure their property.
Like all property owners taking legitimate steps to protect their property, however,
copyright owners relying on the anticircumvention provisions remain bound by all other
relevant bodies of law. Contrary to Chamberlain’s assertion, the DMCA emphatically did
not “fundamentally alter” the legal landscape governing the reasonable expectations of
consumers or competitors; did not “fundamentally alter” the ways that courts analyze
industry practices; and did not render the pre-DMCA history of the GDO industry
irrelevant.
What the DMCA did was introduce new grounds for liability in the context of the
unauthorized access of copyrighted material. The statute’s plain language requires
plaintiffs to prove that those circumventing their technological measures controlling
access did so “without the authority of the copyright owner.” 17 U.S.C. § 1201(3)(A).
Our inquiry ends with that clear language. We note, however, that the statute’s structure,
legislative history, and context within the Copyright Act all support our construction.
They also help to explain why Chamberlain’s warranty conditions and website postings
cannot render users of Skylink’s Model 39 “unauthorized” users for the purposes of
establishing trafficking liability under the DMCA.
E. Statutory Structure and Legislative History
***
Because the DMCA is a complex statute creating several new causes of action, each
subject to numerous exceptions, we must also ensure that our construction makes sense
given the statute’s entirety. We must therefore consider briefly the relationship among the
liabilities created under §§ 1201(a)(1), (a)(2), and (b). Statutory structure and legislative
history both make it clear that § 1201 applies only to circumventions reasonably related
to protected rights. Defendants who traffic in devices that circumvent access controls in
ways that facilitate infringement may be subject to liability under § 1201(a)(2).
Defendants who use such devices may be subject to liability under § 1201(a)(1) whether
they infringe or not. Because all defendants who traffic in devices that circumvent rights
controls necessarily facilitate infringement, they may be subject to liability under §
1201(b). Defendants who use such devices may be subject to liability for copyright
infringement. And finally, defendants whose circumvention devices do not facilitate
6
infringement are not subject to § 1201 liability.
The key to understanding this relationship lies in § 1201(b),12 which prohibits trafficking
in devices that circumvent technological measures tailored narrowly to protect an
individual right of the copyright owner while nevertheless allowing access to the
protected work. Though § 1201(b) parallels the anti-trafficking ban of § 1201(a)(2), there
is no narrowly tailored ban on direct circumvention to parallel § 1201(a)(1). This
omission was intentional.
The prohibition in 1201(a)(1) [was] necessary because prior to [the DMCA], the
conduct of circumvention was never before made unlawful. The device limitation in
1201(a)(2) enforces this new prohibition in conduct. The copyright law has long
forbidden copyright infringements, so no new prohibition was necessary. The device
limitation in 1201(b) enforces the longstanding prohibitions on infringements.
S.Rep. No. 105–90 at 12 (1998).
Prior to the DMCA, a copyright owner would have had no cause of action against *1196
anyone who circumvented any sort of technological control, but did not infringe. The
DMCA rebalanced these interests to favor the copyright owner; the DMCA created
circumvention liability for “digital trespass” under § 1201(a)(1). It also created
trafficking liability under § 1201(a)(2) for facilitating such circumvention and under §
1201(b) for facilitating infringement (both subject to the numerous limitations and
exceptions outlined throughout the DMCA).13
The importance of “rebalancing” interests in light of recent technological advances is
manifest in the DMCA’s legislative history. Though the Supreme Court has recognized
that interim industrial developments may erode the “persuasive effect of legislative
history,” New York v. FERC, 535 U.S. 1, 23, 122 S.Ct. 1012, 152 L.Ed.2d 47 (2002),
Congressional intent evident in relatively recent legislation like the DMCA may provide
useful context in interpreting the statutory language. Though “we do not resort to
legislative history to cloud a statutory text that is clear,” Ratzlaf v. United States, 510
U.S. 135, 147–48, 114 S.Ct. 655, 126 L.Ed.2d 615 (1994), we nevertheless recognize that
“words are inexact tools at best, and hence it is essential that we place the words of a
statute in their proper context by resort to the legislative history.” Tidewater Oil Co. v.
United States, 409 U.S. 151, 157, 93 S.Ct. 408, 34 L.Ed.2d 375 (1972).
The most significant and consistent theme running through the entire legislative history
of the anticircumvention and anti-trafficking provisions of the DMCA, §§ 1201(a)(1),(2),
is that Congress attempted to balance competing interests, and “endeavored to specify,
with as much clarity as possible, how the right against anti-circumvention would be
qualified to maintain balance between the interests of content creators and information
users.” H.R.Rep. No. 105–551, at 26 (1998). The Report of the House Commerce
Committee concluded that § 1201 “fully respects and extends into the digital environment
7
the bedrock principle of ‘balance’ in American intellectual property law for the benefit of
both copyright owners and users.” Id.
The crux of the present dispute over statutory construction therefore stems from a dispute
over the precise balance between copyright owners and users that Congress captured in
the DMCA’s language.
Defendants argue ... that the DMCA should not be construed to reach
their conduct [or product] ... because the DMCA, so applied, could
prevent those who wish to gain access to technologically protected
copyrighted works in order to make ... non-infringing use of them from
doing so.... Technological access control measures have the capacity to
prevent fair uses of copyrighted works as well as foul. Hence, there is a
potential tension between the use of such access control measures and
fair use, [as well as the much broader range of explicitly noninfringing
use].... As the DMCA made its way through the legislative process,
Congress was preoccupied with precisely this issue. Proponents of
strong restrictions on circumvention of access control measures argued
that they were *1197 essential if copyright holders were to make their
works available in digital form because digital works otherwise could be
pirated too easily. Opponents contended that strong anticircumvention
measures would extend the copyright monopoly inappropriately and
prevent many fair uses of copyrighted material. Congress struck a
balance....
Reimerdes, 111 F.Supp.2d at 304 (citations omitted). We must understand that balance to
resolve this dispute.
F. Access and Protection
Congress crafted the new anticircumvention and anti-trafficking provisions here at issue
to help bring copyright law into the information age. Advances in digital technology over
the past few decades have stripped copyright owners of much of the technological and
economic protection to which they had grown accustomed. Whereas large-scale copying
and distribution of copyrighted material used to be difficult and expensive, it is now easy
and inexpensive. The Reimerdes court correctly noted both the economic impact of these
advances and their consequent potential impact on innovation. Congress therefore crafted
legislation restricting some, but not all, technological measures designed either to access
a work protected by copyright, § 1201(a), or to infringe a right of a copyright owner, §
1201(b).
Though as noted, circumvention is not a new form of infringement but rather a new
8
violation prohibiting actions or products that facilitate infringement, it is significant that
virtually every clause of § 1201 that mentions “access” links “access” to “protection.”
The import of that linkage may be less than obvious. Perhaps the best way to appreciate
the necessity of this linkage—and the disposition of this case—is to consider three
interrelated questions inherent in the DMCA’s structure: What does § 1201(a)(2) prohibit
above and beyond the prohibitions of § 1201(b)? What is the relationship between the
sorts of “access” prohibited under § 1201(a) and the rights “protected” under the
Copyright Act? and What is the relationship between anticircumvention liability under §
1201(a)(1) and anti-trafficking liability under § 1201(a)(2)? The relationships among the
new liabilities that these three provisions, §§ 1201(a)(1),(a)(2),(b), create circumscribe
the DMCA’s scope—and therefore allow us to determine whether or not Chamberlain’s
claim falls within its purview. And the key to disentangling these relationships lies in
understanding the linkage between access and protection.
Chamberlain urges us to read the DMCA as if Congress simply created a new protection
for copyrighted works without any reference at all either to the protections that copyright
owners already possess or to the rights that the Copyright Act grants to the public.
Chamberlain has not alleged that Skylink’s Model 39 infringes its copyrights, nor has it
alleged that the Model 39 contributes to third-party infringement of its copyrights.
Chamberlain’s allegation is considerably more straightforward: The only way for the
Model 39 to interoperate with a Security+ GDO is by “accessing” copyrighted software.
Skylink has therefore committed a per se violation of the DMCA. Chamberlain urges us
to conclude that no necessary connection exists between access and copyrights. Congress
could not have intended such a broad reading of the DMCA. Accord Corley, 273 F.3d at
435 (explaining that Congress passed the DMCA’s anti-trafficking provisions to help
copyright owners protect their works from piracy behind a digital wall).
Chamberlain derives its strongest claimed support for its proposed construction *1198
from the trial court’s opinion in Reimerdes, a case involving the same statutory provision.
See Reimerdes, 111 F.Supp.2d at 304. Though Chamberlain is correct in considering
some of the Reimerdes language supportive, it is the differences between the cases, rather
than their similarities, that is most instructive in demonstrating precisely what the DMCA
permits and what it prohibits.
The facts here differ greatly from those in Reimerdes. There, a group of movie studios
sought an injunction under the DMCA to prohibit illegal copying of digital versatile discs
(DVDs). Reimerdes, 111 F.Supp.2d at 308. The plaintiffs presented evidence that each
motion picture DVD includes a content scrambling system (CSS) that permits the film to
be played, but not copied, using DVD players that incorporate the plaintiffs’ licensed
decryption technology. Id. The defendant provided a link on his website that allowed an
individual to download DeCSS, a program that allows the user to circumvent the CSS
protective system and to view or to copy a motion picture from a DVD, whether or not
the user has a DVD player with the licensed technology. Id. The defendant proudly
9
trumpeted his actions as “electronic civil disobedience.” Id. at 303, 312. The court found
that the defendant had violated 17 U.S.C. § 1201(a)(2)(A) because DeCSS had only one
purpose: to decrypt CSS. Id. at 319, 346.
Chamberlain’s proposed construction of the DMCA ignores the significant differences
between defendants whose accused products enable copying and those, like Skylink,
whose accused products enable only legitimate uses of copyrighted software.
Chamberlain’s repeated reliance on language targeted at defendants trumpeting their
“electronic civil disobedience,” id. at 303, 312, apparently led it to misconstrue
significant portions of the DMCA. Many of Chamberlain’s assertions in its brief to this
court conflate the property right of copyright with the liability that the anticircumvention
provisions impose.
Chamberlain relies upon the DMCA’s prohibition of “fair uses ... as well as foul,”
Reimerdes, 111 F.Supp.2d at 304, to argue that the enactment of the DMCA eliminated
all existing consumer expectations about the public’s rights to use purchased products
because those products might include technological measures controlling access to a
copyrighted work. But Chamberlain appears to have overlooked the obvious. The
possibility that § 1201 might prohibit some otherwise noninfringing public uses of
copyrighted material, see, e.g. RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070,
2000 WL 127311, at *8, 2000 U.S. Dist. LEXIS 1889, at *23, (W.D.Wash., Jan.18,
2000); Reimerdes, 111 F.Supp.2d at 323, arises simply because the Congressional
decision to create liability and consequent damages for making, using, or selling a “key”
that essentially enables a trespass upon intellectual property need not be identical in
scope to the liabilities and compensable damages for infringing that property; it is,
instead, a rebalancing of interests that “attempt[s] to deal with special problems created
by the so-called digital revolution.” Aimster, 334 F.3d at 655.
[The panel lists prior instances of DMCA liability in the lower courts, and notes that
those cases all had some connection to copyright issues.]
Furthermore, though the severance of access from protection appears plausible taken out
of context, it would also introduce a number of irreconcilable problems in statutory
construction. The seeming plausibility arises because the statute’s structure could be seen
to suggest that § 1201(b) strengthens a copyright owner’s abilities to protect its
recognized rights, while § 1201(a) strengthens a copyright owner’s abilities to protect
access to its work without regard to the legitimacy (or illegitimacy) of the actions that the
accused access enables. Such an interpretation is consistent with the Second Circuit’s
description: “[T]he focus of subsection 1201(a)(2) is circumvention of technologies
designed to prevent access to a work, and the focus of subsection 1201(b)(1) is
circumvention of technologies designed to permit access to a work but prevent copying
of the work or some other act that infringes a copyright.” Corley, 273 F.3d at 440–41
(emphasis in original).
10
It is unlikely, however, that the Second Circuit meant to imply anything as drastic as
wresting the concept of “access” from its context within the Copyright Act, as
Chamberlain would now have us do. Were § 1201(a) to allow copyright owners to use
technological measures to block all access to their copyrighted works, it would
effectively create two distinct copyright regimes. In the first regime, the owners of a
typical work protected by copyright would possess only the rights enumerated in 17
U.S.C. § 106, subject to the additions, exceptions, and limitations outlined throughout the
rest of the Copyright Act—notably but not solely the fair use provisions of § 107.14
Owners who feel that technology has put those rights at risk, and who incorporate
technological measures to protect those rights from technological encroachment, gain the
additional ability to hold traffickers in circumvention devices liable under § 1201(b) for
putting *1200 their rights back at risk by enabling circumventors who use these devices
to infringe.
Under the second regime that Chamberlain’s proposed construction implies, the owners
of a work protected by both copyright and a technological measure that effectively
controls access to that work per § 1201(a) would possess unlimited rights to hold
circumventors liable under § 1201(a) merely for accessing that work, even if that access
enabled only rights that the Copyright Act grants to the public. This second implied
regime would be problematic for a number of reasons. First, as the Supreme Court
recently explained, “Congress’ exercise of its Copyright Clause authority must be
rational.” Eldred v. Ashcroft, 537 U.S. 186, 205 n. 10, 123 S.Ct. 769, 154 L.Ed.2d 683
(2003). In determining whether a particular aspect of the Copyright Act “is a rational
exercise of the legislative authority conferred by the Copyright Clause ... we defer
substantially to Congress. It is Congress that has been assigned the task of defining the
scope of the limited monopoly that should be granted to authors ... in order to give the
public appropriate access to their work product.” Id. at 204–05, 123 S.Ct. 769 (citation
omitted) (emphasis added). Chamberlain’s proposed construction of § 1201(a) implies
that in enacting the DMCA, Congress attempted to “give the public appropriate access”
to copyrighted works by allowing copyright owners to deny all access to the public. Even
under the substantial deference due Congress, such a redefinition borders on the
irrational.
That apparent irrationality, however, is not the most significant problem that this second
regime implies. Such a regime would be hard to reconcile with the DMCA’s statutory
prescription that “[n]othing in this section shall affect rights, remedies, limitations, or
defenses to copyright infringement, including fair use, under this title.” 17 U.S.C. §
1201(c)(1). A provision that prohibited access without regard to the rest of the Copyright
Act would clearly affect rights and limitations, if not remedies and defenses. Justice
Souter has remarked that “[n]o canon of statutory construction familiar to me specifically
addresses the situation in which two simultaneously enacted provisions of the same
statute flatly contradict one another. We are, of course, bound to avoid such a dilemma if
11
we can, by glimpsing some uncontradicted meaning for each provision.” Reno v.
American–Arab Anti–Discrimination Comm., 525 U.S. 471, 509, 119 S.Ct. 936, 142
L.Ed.2d 940 (1999) (Souter, J., dissenting). Chamberlain’s proposed construction of §
1201(a) would flatly contradict § 1201(c)(1)—a simultaneously enacted provision of the
same statute. We are therefore bound, if we can, to obtain an alternative construction that
leads to no such contradiction.
Chamberlain’s proposed severance of “access” from “protection” in § 1201(a) creates
numerous other problems. Beyond suggesting that Congress enacted by implication a
new, highly protective alternative regime for copyrighted works; contradicting other
provisions of the same statute including § 1201(c)(1); and ignoring the explicit
immunization of interoperability from anticircumvention liability under § 1201(f);15 the
broad policy *1201 implications of considering “access” in a vacuum devoid of
“protection” are both absurd and disastrous. Under Chamberlain’s proposed construction,
explicated at oral argument, disabling a burglar alarm to gain “access” to a home
containing copyrighted books, music, art, and periodicals would violate the DMCA;
anyone who did so would unquestionably have “circumvent[ed] a technological measure
that effectively controls access to a work protected under [the Copyright Act].” §
1201(a)(1). The appropriate deterrents to this type of behavior lie in tort law and criminal
law, not in copyright law. Yet, were we to read the statute’s “plain language” as
Chamberlain urges, disabling a burglar alarm would be a per se violation of the DMCA.
In a similar vein, Chamberlain’s proposed construction would allow any manufacturer of
any product to add a single copyrighted sentence or software fragment to its product,
wrap the copyrighted material in a trivial “encryption” scheme, and thereby gain the right
to restrict consumers’ rights to use its products in conjunction with competing products.16
In other words, Chamberlain’s construction of the DMCA would allow virtually any
company to attempt to leverage its sales into aftermarket monopolies—a practice that
both the antitrust laws, see Eastman Kodak Co. v. Image Tech. Servs., 504 U.S. 451, 455,
112 S.Ct. 2072, 119 L.Ed.2d 265 (1992), and the doctrine of copyright misuse,
Assessment Techs. of WI, LLC v. WIREdata, Inc., 350 F.3d 640, 647 (7th Cir.2003),
normally prohibit.
***
Finally, the requisite “authorization,” on which the District Court granted Skylink
summary judgment, points to yet another inconsistency in Chamberlain’s proposed
construction. The notion of authorization is central to understanding § 1201(a). See, e.g.,
S. Rep. 105–90 at 28 (1998) ( “Subsection (a) applies when a person has not obtained
authorized access to a copy or a phonorecord that is protected under the Copyright Act
and for which the copyright owner has put in place a technological measure that
effectively controls access to his or her work.”). Underlying Chamberlain’s argument on
12
appeal that it has not granted such authorization lies the necessary assumption that
Chamberlain is entitled to prohibit legitimate purchasers of its embedded software from
“accessing” the software by using it. Such an entitlement, however, would go far beyond
the idea that the DMCA allows copyright owner to prohibit “fair uses ... as well as foul.”
Reimerdes, 111 F.Supp.2d at 304. Chamberlain’s proposed construction would allow
copyright owners to prohibit exclusively fair uses even in the absence of any feared foul
use. It would therefore allow any copyright owner, through a combination of contractual
terms and technological measures, to repeal the fair use doctrine with respect to an
individual copyrighted work—or even selected copies of that copyrighted work. Again,
this implication contradicts § 1201(c)(1) directly. Copyright law itself authorizes the
public to make certain uses of copyrighted materials. Consumers who purchase a product
containing a copy of embedded software have the inherent legal right to use that copy of
the software. What the law authorizes, Chamberlain cannot revoke.17
Chamberlain’s proposed severance of “access” from “protection” is entirely inconsistent
with the context defined by the total statutory structure of the Copyright Act, other
simultaneously enacted provisions of the DMCA, and clear Congressional intent. See
Tidewater Oil, 409 U.S. at 157, 93 S.Ct. 408. It “would lead to a result so bizarre that
Congress could not have intended it.” Central Bank, 511 U.S. at 188, 114 S.Ct. 1439. The
statutory structure and the legislative history both make it clear that the DMCA granted
copyright holders additional legal protections, but neither rescinded the basic bargain
granting the public noninfringing and fair uses of copyrighted materials, § 1201(c), nor
prohibited various beneficial uses of circumvention technology, such as those exempted
under §§ 1201(d),(f), (g), (j). See Reimerdes, 111 F.Supp.2d at 323.
We therefore reject Chamberlain’s proposed construction in its entirety. We conclude that
17 U.S.C. § 1201 prohibits only forms of access that bear a reasonable relationship to the
protections that the Copyright Act otherwise affords copyright owners. While such a rule
of reason *1203 may create some uncertainty and consume some judicial resources, it is
the only meaningful reading of the statute. Congress attempted to balance the legitimate
interests of copyright owners with those of consumers of copyrighted products. See
H.R.Rep. No. 105–551, at 26 (1998). The courts must adhere to the language that
Congress enacted to determine how it attempted to achieve that balance. See Gwaltney,
484 U.S. at 56, 108 S.Ct. 376.
As we have seen, Congress chose to create new causes of action for circumvention and
for trafficking in circumvention devices. Congress did not choose to create new property
rights. That is the choice that we have identified. “It is not for us to resolve the issues of
public policy implicated by the choice we have identified. Those issues are for
Congress.” Corley, 273 F.3d at 458. Were we to interpret Congress’s words in a way that
eliminated all balance and granted copyright owners carte blanche authority to preclude
all use, Congressional intent would remain unrealized.
13
Congress chose words consistent with its stated intent to balance two sets of concerns
pushing in opposite directions. See H.R.Rep. No. 105–551, at 26 (1998).18 The statute
lays out broad categories of liability and broad exemptions from liability. It also instructs
the courts explicitly not to construe the anticircumvention provisions in ways that would
effectively repeal longstanding principles of copyright law. See § 1201(c).19 The courts
must decide where the balance between the rights of copyright owners and those of the
broad public tilts subject to a fact-specific rule of reason. Here, Chamberlain can point to
no protected property right that Skylink imperils. The DMCA cannot allow Chamberlain
to retract the most fundamental right that the Copyright Act grants consumers: the right to
use the copy of Chamberlain’s embedded software that they purchased.
G. Chamberlain’s DMCA Claim
[29]
The proper construction of § 1201(a)(2) therefore makes it clear that Chamberlain
cannot prevail. A plaintiff alleging a violation of § 1201(a)(2) must prove: (1) ownership
of a valid copyright on a work, (2) effectively controlled by a technological measure,
which has been circumvented, (3) that third parties can now access (4) without
authorization, in a manner that (5) infringes or facilitates infringing a right protected by
the Copyright Act, because of a product that (6) the defendant either (i) designed or
produced primarily for circumvention; (ii) made available despite only limited
commercial significance other than circumvention; or (iii) marketed for use in
circumvention of the controlling technological measure. A plaintiff incapable of
establishing any one of elements (1) through (5) will have failed to prove a prima facie
case. A plaintiff capable of proving elements (1) through (5) need prove only one of
(6)(i), (ii), or (iii) to shift the burden back to the defendant. At that point, the various
affirmative defenses enumerated throughout § 1201 become relevant.
The District Court analyzed Chamberlain’s allegations in precisely the appropriate
manner—a narrow focus on Skylink’s behavior, intent, and product within the broader
context of longstanding expectations throughout the industry. The District Court assumed
that Chamberlain met the first element, copyright *1204 ownership, and for the purposes
of its summary judgment motions accepted Chamberlain’s evidence of the second
element, technological access control. The District Court granted Skylink’s motion for
summary judgment because Chamberlain failed to meet its burden on the fourth element,
the lack of authorization. Chamberlain emphatically contests this conclusion on appeal,
though mostly by reiterating arguments that the District Court correctly rejected.
Chamberlain, however, has failed to show not only the requisite lack of authorization, but
also the necessary fifth element of its claim, the critical nexus between access and
protection. Chamberlain neither alleged copyright infringement nor explained how the
access provided by the Model 39 transmitter facilitates the infringement of any right that
the Copyright Act protects. There can therefore be no reasonable relationship between the
14
access that homeowners gain to Chamberlain’s copyrighted software when using
Skylink’s Model 39 transmitter and the protections that the Copyright Act grants to
Chamberlain. The Copyright Act authorized Chamberlain’s customers to use the copy of
Chamberlain’s copyrighted software embedded in the GDOs that they purchased.
Chamberlain’s customers are therefore immune from § 1201(a)(1) circumvention
liability. In the absence of allegations of either copyright infringement or § 1201(a)(1)
circumvention, Skylink cannot be liable for § 1201(a)(2) trafficking. The District Court’s
grant of summary judgment in Skylink’s favor was correct. Chamberlain failed to allege a
claim under 17 U.S.C. § 1201.
CONCLUSION
The DMCA does not create a new property right for copyright owners. Nor, for that
matter, does it divest the public of the property rights that the Copyright Act has long
granted to the public. The anticircumvention and anti-trafficking provisions of the
DMCA create new grounds of liability. A copyright owner seeking to impose liability on
an accused circumventor must demonstrate a reasonable relationship between the
circumvention at issue and a use relating to a property right for which the Copyright Act
permits the copyright owner to withhold authorization—as well as notice that
authorization was withheld. A copyright owner seeking to impose liability on an accused
trafficker must demonstrate that the trafficker’s device enables either copyright
infringement or a prohibited circumvention. Here, the District Court correctly ruled that
Chamberlain pled no connection between unauthorized use of its copyrighted software
and Skylink’s accused transmitter. This connection is critical to sustaining a cause of
action under the DMCA. We therefore affirm the District Court’s summary judgment in
favor of Skylink.
AFFIRM
***
Footnotes
8
Two amici urging us to affirm raised additional arguments that warrant mention. Amicus
Computer and Communications Industry Association (CCIA) urges us to consider the
import of 1201(f), which explicitly allows circumvention for the purposes of achieving
interoperability. Amicus Consumers Union (CU) urges us to consider the policy
implications of Chamberlains proposed construction to consumers and to aftermarket
competitors. According to CU, Chamberlains proposed construction of the DMCA would
15
enable copyright owners to engage in a number of practices that would otherwise be
considered copyright misuse, an antitrust violation, or a violation of state unfair
competition laws. At oral argument, Chamberlain conceded that its proposed construction
would, indeed, alter virtually all existing consumer expectations concerning the publics
rights to use purchased products containing copyrighted software protected by a
technological measure—effectively confirming CUs fears.
17
It is not clear whether a consumer who circumvents a technological measure controlling
access to a copyrighted work in a manner that enables uses permitted under the Copyright
Act but prohibited by contract can be subject to liability under the DMCA. Because
Chamberlain did not attempt to limit its customers use of its product by contract, however,
we do not reach this issue.
16