Statement of Marybeth Peters
The Register of Copyrights
before the
Committee on the Judiciary United States Senate
108th Congress, 1st Session September 9, 2003
Pornography, Technology, and Process: Problems and Solutions on Peer-to-Peer
Networks Mr. Chairman, Senator Leahy, Members of the Committee,
good afternoon. It is always a pleasure to appear before this Committee
and I thank you for inviting me to present the views of the Copyright Office
today at this very timely hearing. As you were among the leaders in drafting
and enacting the Digital Millennium Copyright Act (“DMCA”),
I know that these issues are important to you, as they are to me.
I. Background
In 1999, a young man named Shawn Fanning developed a use
of the Internet that allowed people to identify and copy music files from other
people's computers. As you know, this model popularized peer-to-peer technology
and a company called Napster tried to turn it into a profit-making business.
Napster became phenomenally popular in a remarkably short period of time, boasting
millions of registered users the very next year. But it quickly became clear
that Napster was being used extensively (by millions of users) for the purpose
of copying and distributing an unprecedented number of copyrighted works, primarily
sound recordings of musical works.
That was the scene when you held a hearing
on July 11, 2000, Mr. Chairman, entitled “Music on the Internet:
Is There an Upside to Downloading?” At that
hearing, Mr. Hank Barry, then the CEO of Napster, stated “It
is my firm belief that the consumers who use Napster are not committing
copyright violations.”
(1) We did not agree with that assessment, (2) and
we were heartened when the Ninth Circuit found that “Napster
users infringe at least two of the copyright holders' exclusive rights:
the rights of reproduction...and distribution.” (3) Napster
was unable to find a way to continue operations and faded away.
The void left by Napster's departure was filled by other businesses utilizing
peer-to-peer technology, such as Aimster, Grokster, and Kazaa. While some of
these applications can be differentiated from Napster in terms of their internal
technical operation, they still follow the same basic peer-to-peer model as
Napster and it is apparent that an overwhelming number of their customers are
using it for the same purpose as they and others had used Napster - copying
and distributing copyrighted works. By now it is well-settled that those users
are infringing copyright. Notwithstanding that, there are still some who contend
that such uses are not infringing. (4) Mr. Chairman, make no mistake. The law is unambiguous. Using peer-to-peer
networks to copy or distribute copyrighted works without permission is infringement
and copyright owners have every right to invoke the power of the courts to combat
such activity. Every court that has addressed the issue has agreed that this
activity is infringement. (5) It can also be
a crime and the perpetrators of such a crime are subject to fines and jail time.
Some have tried to rationalize or justify their illegal behavior by attacking
the victim with allegations of inflated profits or unfair dealings with recording
artists on the part of the recording industry. These diversionary tactics do
not alter the fundamental fact that they are trying to defend illegal activity
that takes place on peer-to-peer networks. For those who do not have sympathy
for the recording industry, there are other victims as well. Since Napster,
subsequent versions of peer-to-peer networks permit infringement of the works
of other copyright owners, large and small, from motion picture studios to independent
photographers and needlepoint designers. With broadband connections becoming
more and more widespread, it is increasingly more common that the larger files
containing full-length motion pictures are copied back and forth.
(6) This problem is not shrinking; it is not static; it is growing. There are some who argue that copyright infringement on peer-to-peer systems
is not truly harmful to copyright owners and may even help them generate new
interest in their products. The law leaves that judgment to the copyright owner
and it ought not be usurped by self-interested third parties who desire to use
the copyright owner's work.
II. Copyright Liability of Peer-to-Peer Proprietors
Copyright law has long recognized that those who aid and
abet copyright infringement are no less culpable than the direct infringers
themselves. (7) There are two types of
this secondary liability. Contributory infringement occurs when “[o]ne
who, with knowledge of the infringing activity, induces, causes, or materially
contributes to the infringing conduct of another.” (8) For
purposes of this test, knowledge can be either actual or constructive - that
is, having reason to know. (9) Vicarious
liability occurs when one “has the right and ability to supervise
the infringing activity and also has a direct financial interest in such
activities.”
(10) Both of these concepts were brought to bear in the case against Napster. The
Ninth Circuit agreed with the District Court that Napster had actual knowledge
of the infringements it was facilitating from, for example, notices from aggrieved
copyright owners. (11) There was little
question but that Napster provided a material contribution in the form
of “the site and
facilities” for infringement. (12) Thus, Napster
was determined to be a contributory infringer. The Ninth Circuit also considered whether Napster
was vicariously liable. It had no difficulty agreeing with the District
Court that the infringing material on its network was a “draw” for
customers, thus providing a direct financial benefit from the infringing
activity. (13) The
Ninth Circuit also agreed with the District Court that Napster had the ability
to police its system, and thus that it had the right and ability to supervise
its users' conduct. (14) Accordingly, Napster
was found to be vicariously liable as well. Thus it was that many felt reassured that the Ninth Circuit had confirmed
that copyright law provides an effective and efficient way in which to address
the massive infringements that can and do occur on peer-to-peer networks. Unfortunately,
the Napster decision was not the final word on the matter. Earlier this year, the Central District of California surprised many when
it held that Grokster and Kazaa are not liable as secondary copyright infringers.
(15) This decision departed from long-established precedent.
For example, the court held that in order to establish contributory liability,
it must be shown that “a defendant has actual - not merely constructive
- knowledge of the infringement at a time during which the defendant
materially contributes to that infringement.” (16) Were such
a standard to be adopted it would eviscerate the doctrine of contributory infringement
as it would be almost impossible to meet. It would encourage the kind of sophistry
we have seen from the proprietors of some peer-to-peer applications: a denial
of knowledge of infringements by their customers in the face of clear and uncontested
evidence that such infringement is occurring on a mind-boggling scale. Mr. Chairman,
these are people whose business plan is dependent upon massive copyright infringement
and any application of the law that allows them to escape liability for lack
of knowledge of those same infringements is inherently flawed. Not only was the Kazaa decision wrong on the law, it has serious
policy consequences as well. The historical doctrines of secondary liability
have served copyright owners, courts, and the public well - they provide copyright
owners with the ability to obtain relief against the root cause of a series
of infringements without costly, inefficient, and burdensome suits against numerous
individuals. (17) Without a viable doctrine
of contributory liability, this option is severely curtailed and may present
the copyright owner with the unenviable choice of either accepting unremedied
infringements or filing numerous suits against the individual direct infringers. If today's hearing leaves the Committee with the impression that the law is
in flux with regard to the liability of proprietors of peer-to-peer technology,
that is because it is. On one side is the Napster decision of the Ninth
Circuit and the Aimster decision of the Seventh Circuit, both finding
liability, albeit through different paths of analysis. On the other side is
the Kazaa decision of the Central District of California, finding no
liability for Kazaa and Grokster. Hanging over all of these cases is the Supreme
Court's decision in Sony. It is perhaps a commentary on that opinion
that almost twenty years later, we still have such uncertainty that three courts
seem to interpret and apply it in three different ways. I believe that the correct
application of the doctrines of secondary liability and the Sony case
should produce findings of liability for the proprietors of Kazaa and Grokster
as well as Napster and Aimster. If the case law evolves so as to compel the
opposite result, I believe that Sony should be revisited either by
the Supreme Court or by Congress.
III. Suits Against Individuals
Unless and until the Kazaa decision is overruled,
copyright owners are faced with the unenviable choice to which I referred earlier.
They can either resign themselves to unremedied infringements on a previously
unimaginable scale, or they can file infringement actions against individual
peer-to-peer users. The recording industry has chosen the latter route. While copyright owners have expressed regret that they have felt compelled
to take this step, they need offer no apologies. As I have already said, people
who use peer-to-peer technology for the unauthorized reproduction or distribution
of copyrighted works are breaking the law. Surprisingly, many people do not
appear to realize this. I have long advocated more public education about copyright.
In a perfect world, this could be done in classrooms and with billboards. But
ours is not a perfect world, and public education can also be accomplished through
enforcement of copyright. The threats of litigation and even the publicity
about the subpoenas obtained by the RIAA have made clear to everyone
that the so-called “file-sharing” of
copyrighted works is not an innocent activity without legal consequences.
As a result, it is becoming more and more difficult for people engaged
in such activity to claim that they did not know what they were doing
is against the law. Of course, for some users of peer-to-peer technology,
even knowledge that what they are doing is illegal will not be a sufficient
disincentive to engage in such conduct. But whether or not these infringers
know or care that it is against the law, the knowledge that such conduct
may lead to expensive and burdensome litigation and a potentially large
judgment should have a healthy deterrent effect. While we would like
to think that everyone obeys the law simply because it is the law and
out of a sense of obligation, we also know that laws without penalties
may be widely ignored. For many people, the best form of education about
copyright in the internet world is the threat of litigation. In short,
if you break the law, you should be prepared to accept the consequences.
Copyright owners have every right to enforce their rights in court, whether
they are taking action against providers of peer-to-peer services designed
to profit from copyright infringement or against the persons engaging
in individual acts of infringement using such services.
IV. Statutory History and Interpretation of Subsection 512(h)
It is common sense that in order to be able to take action
against the users of peer-to-peer networks, the copyright owner must know who
those users are. (18) Congress foresaw
this need and addressed it by including in the DMCA a process by which
copyright owners can learn basic identifying information about alleged
infringers from their internet service providers (“ISPs”).
(19) The DMCA began as an effort to implement the 1996 WIPO Internet treaties.
(20) Neither those treaties nor any other international instrument
directly address the potential secondary liability of ISPs. However, as the
treaty implementing legislation moved forward in Congress, representatives of
ISPs demanded that the legislation also limit their liability under such circumstances.
(21) Congress heeded this call and provided the ISPs with a
huge benefit - virtually no liability for qualifying ISPs. This was balanced
by a carefully developed set of obligations in the DMCA. Among those
balancing obligations was the requirement that ISPs “expeditiously” respond
to subpoenas to provide identifying information about subscribers accused
of copyright infringement so that the controversy could be settled in
court. At the time the DMCA was drafted, at least one
representative of ISPs assured this Committee that ISPs desired a solution
whereby “service providers and content
owners...work as a partnership....” (22) It
was asserted by that same representative that “[l]iability for
copyright infringement should fall where it belongs, on the Web site
operators, on those who create an infringing work or on those who reproduce
it or perform it with actual knowledge of the infringement....” (23) The ability of
copyright owners to utilize subsection 512(h) is a critical part of that partnership
as is copyright owners' ability to impose liability against those who infringe
copyright. It is regrettable that at least one major ISP now rejects the compromise
and the balance of the DMCA. Some now claim that the subpoena power of subsection 512(h) is inapplicable
to the activity described in subsection 512(a). As the United States District
Court for the District of Columbia recently held, the plain language of subsection
512(h) demonstrates that this interpretation is not correct.
(24) I agree with the court's analysis. Subsection 512(h) instructs service providers
to expeditiously respond to a subpoena. The definition of “service provider” in section 512(k) always includes
service providers which qualify for the safe harbor in section 512(a). The court
reasoned that this demonstrates Congress' intent to apply the subpoena power
to “all service providers, regardless of the functions a service
provider may perform under the four categories set out in subsections
(a) through (d).”
(25) It has also been argued that the subpoena power
applies only to subsection 512(c) because subsection 512(h)(2)(A) requires
a copyright owner to supply “a copy of a notification described in subsection (c)(3)(A)”. However, as the
District Court pointed out, subsection 512(h) “is written without
limitation or restriction as to its application.” (26)
It does not require that a notice be delivered. Had Congress wished to limit
the application of the subpoena power, it would have simply said so in the law.
It did not. (27) The statutory text confirms the policy of compromise behind subsection 512
-- that copyright owners and ISPs work together to remedy infringement. Limiting
the subsection 512(h) subpoena provisions as some have proposed would remove
an important tool that parties need to remedy infringement efficiently in the
peer-to-peer context. When it enacted the DMCA, Congress did not carve out an exception from subsection
512(h) for transitory digital network communications, the activity covered by
subsection 512(a). Service providers which engage in that activity received
the benefits and burdens of the same bargain that service providers engaged
in the other activity covered by section 512 received. In exchange for a powerful
limitation on liability, they undertook some obligations, including the obligation
to identify alleged infringers when served with a subsection 512(h) subpoena.
When you enacted section 512, you made the right choice. There is no reason
for the courts or Congress to have second thoughts about that decision. I understand that the majority if not all of the 512(h) subpoenas that have
been sought, have been sought in the United States District Court for the District
of Columbia. Apparently this has necessitated the clerk of that court assigning
additional staff to handle the workload. I do not take a position as to whether
it is appropriate for a copyright owner to go to a single district court for
subpoenas to service providers located outside that district. However, I am
sympathetic to concerns about efficiency of the courts and fairness to ISPs
located elsewhere in the country. There would certainly be advantages to the
filing of these subpoena requests in the districts in which the ISPs are located.
V. Constitutional Challenges to Subsection 512(h)
The United States has intervened in the Verizon-RIAA litigation
to defend the constitutionality of the DMCA. The Copyright Office has assisted
the Justice Department in this effort and we firmly believe that subsection
512(h) is appropriate and constitutional. Although I am not an expert on constitutional
law and I am not here to represent the Department of Justice, I will briefly
summarize the arguments the United States made in its brief to the District
Court. The claim that subsection 512(h) violates the case and controversy requirement
of the Constitution is belied by a review of other federal laws providing similar
procedures, at least one of which has a 150 year pedigree.
(28) The 512(h) procedure is also similar to discovery in advance
of federal litigation pursuant to Federal Rule of Procedure 27, which finds
its origins in the Judiciary Act of 1789. (29)
Further, the subpoena power provided in subsection 512(h) does relate to cognizable
Article III controversies, namely potential copyright infringement action as
well as a dispute between the copyright owner and the ISP over access to the
subscriber information. (30) The claim that subsection 512(h) violates the First Amendment does not withstand
scrutiny. Subsection 512(h) does not proscribe spoken words or expressive or
communicative conduct, (31) nor is there a realistic
danger that it will significantly compromise a recognized First Amendment protection.
(32) Section 512(h) merely requires a service provider to identify
a person who appears to be engaging in copyright infringement, a necessary step
before the copyright owner can initiate legal action. That action may range
from an email or letter demanding that the alleged infringer cease and desist
from the unlawful conduct to the filing of a lawsuit for copyright infringement.
Section 512(h) does not offend the First Amendment any more than the filing
of a lawsuit for copyright infringement. In fact, it is an essential tool for
a copyright owner who intends to file such a lawsuit. Moreover, indeed, section
512 imposes sanctions on those who misuse the subpoena power, which serve to
provide a safeguard. (33) Although not addressed in the Government's briefs in intervention, I think
it is important to put into context the privacy claims that some now put forward.
Users of peer-to-peer networks are, by definition, opening their computers up
to the world. There may be an illusion of anonymity to that activity, but we
have come to learn that such connections can also make available the user's
social security number, credit card numbers, and other vital information. By
contrast, the 512(h) subpoena process typically involves disclosure to the copyright
owner of no more than the subscriber's name, email address, phone number, and
perhaps street address. This hardly seems like an invasion of privacy.
VI. Conclusion
The DMCA represents a carefully crafted and balanced bargain
which utilizes the incentives created by pre-existing doctrines such as secondary
liability as well as enlightened self-interest to encourage all stakeholders
to work cooperatively to realize the potential of the Internet while respecting
legal rights. Some are now selectively challenging key components of that bargain,
particularly in the context of peer-to-peer technology. Taken together, the
positions of Kazaa and Grokster, along with the arguments now made by Verizon,
if they prevail, will leave copyright owners with little or no remedy against
the most widespread phenomena of infringement in the history of this country.
We know from past experience with Napster and current experience with Kazaa
and Grokster that without a judicial remedy, this infringement will not stop,
regardless of the availability of lawful alternatives. It is thus incumbent
upon this Committee and this Congress to see to it that if the judiciary fails
to enforce the DMCA and therefore fails to provide the protection to which copyrighted
works are entitled, the legislature does.
1. Submitted Testimony, Hank Barry, p.
7 (emphasis in original).
2. See Brief for the United States as
Amicus Curiae at 11, n.1, 18, A&M Records, Inc. v. Napster,
293 F.3d 1004 (9th Cir. 2001)(Nos. 00-16401 & 00-16403). 3. A&M Records v. Napster,
293 F.3d 1004, 1014 (9th Cir. 2001) (hereinafter “Napster”). 4. Los Angeles
Times, “Tone Deaf
to a Moral Dilemma?” (Sept. 2, 2003). 5. See Napster at 1014; In
re: Aimster Copyright Litigation, 334 F.3d 643, 645 (7th Cir.
2003)(hereinafter “Aimster”); Metro-Goldwyn-Mayer Studios,
Inc. v. Grokster, Ltd., 259 F.Supp. 2d 1029, 1034-35 (C.D. Cal.
2003) (hereinafter “Kazaa”). 6. See Gary
Gentile, “Online Movie
Service Quickens Downloads,” Associated Press, September 3, 2003. 7. See Kalem Co. v. Harper Bros.,
222 U.S. 55, 63 (1911).
8. Gershwin Publishing Corp. v. Columbia
Artists Management, Inc., 443 F.2d 1159, 1162 (2d Cir. 1971).
9. Id.
10. Id.
11. Napster at 1020-21.
12. Id. at 1022 (quoting
Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259, 264 (9th
Cir. 1996) (hereinafter “Fonovisa”)). 13. Id. at 1023 (quoting Fonovisa
at 263-64).
14. Id. at 1023-24.
15. Kazaa, 259 F.Supp. 2d 1029.
16. Id. at 1036.
17. See Sony Corp. v. Universal City
Studios, Inc., 464 U.S. 417, 437, n. 18 (hereinafter “Sony”)
(citing the “dance hall cases”); Fonovisa, 76 F.3d 259
(suit against the operator of a swap meet for infringing activity of third-party
vendors).
18. The existence of section 512(h) is
plain evidence that Congress did not view any existing procedures by which a
suit could be filed against an unknown defendant as acceptable alternatives
for copyright owners.
19. See 17
U.S.C. �512(h). 20. See Hearings on S. 1121 Before
the Senate Judiciary Committee, 105th Cong. 25 (statement
of George Vradenburg, III) (representing “over 1,400 Internet service
providers, content creators, telephone companies, among others...). 21. Id.
22. Id.
23. Id.
24. In re: Verizon Internet Services,
Inc., Subpoena Enforcement Matter, 240 F.Supp. 2d 24, 30 (D.D.C. 2003).
25. Id. at 31.
26. Id. at 33.
27. Id.
28. Brief for Intervenor United States
of America, p. 6, In re: Verizon Internet Services, Inc., Subpoena Enforcement
Matter, 257 F.Supp. 2d 244 (D.D.C. 2003) (No. 03-MS-0040 (JDB)).
29. Id. at 10-11.
30. Id. at 9, 13.
31. Id. at 15-16.
32. Id. at 16-18.
33. Id. at 17-18.
|