Tech Law Journal Daily E-Mail Alert
January 22, 2003, 9:00 AM ET, Alert No. 588.
Home Page | Calendar | Subscribe | Back Issues | Reference
District Court Rules DMCA Subpoenas Available for P2P Infringers
1/21. The U.S. District Court (DC) issued its opinion in RIAA v. Verizon, ruling that copyright holders can obtain subpoenas pursuant to 17 U.S.C. § 512(h) that require Internet Service Providers (ISPs) to reveal the identities of their customers who infringe copyrights on peer to peer filing sharing systems. Verizon had argued that 512(h) subpoenas were only available with respect to infringers who stored infringing content on the servers of the ISP.

While the Recording Industry Association of America (RIAA) could obtain a subpoena by other means, this holding is significant because Section 512(h) provides a fast and efficient means of obtaining subpoenas for ISP's information that identifies infringers. In particular, it requires no notice to, or opportunity to be heard by, the alleged infringer.

Verizon stated that it will appeal.

Statute. § 512 provides ISPs a safe harbor from liability for infringement based on the activities of their users. There are four specific limitations on liability. § 512(a) pertains to "transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections". § 512(b) pertains to "the intermediate and temporary storage of material on a system or network". § 512(c) pertains to "material that resides on a system or network controlled or operated by or for the service provider". And, § 512(d) pertains to "referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link".

Subsection 512(h) then provides, in part, that "A copyright owner or a person authorized to act on the owner's behalf may request the clerk of any United States district court to issue a subpoena to a service provider for identification of an alleged infringer in accordance with this subsection." The statute then provides that the requester should also provide a copy of the 512(c)(3) notice, a proposed subpoena, and a sworn declaration. However, the statute does not expressly limit the availability of 512(h) subpoenas to 512(c) situations.

Subsection 512(h)(5) then provides, in part, that "Upon receipt of the issued subpoena, ... the service provider shall expeditiously disclose to the copyright owner or person authorized by the copyright owner the information required by the subpoena, notwithstanding any other provision of law and regardless of whether the service provider responds to the notification."

Background. The Recording Industry Association of America (RIAA) alleges that a Verizon user has used Verizon's network to download copyrighted songs with peer to peer file copying software provided by Kazaa. It obtained a 512(h) subpoena, and served it upon Verizon. Verizon refused to comply. It stated in an August 6, 2002 letter that 512(h) subpoena power applies only if the infringed material is stored or controlled on the service provider's system or network under 512(c). See also, TLJ story titled "Verizon and Privacy Groups Oppose RIAA Subpoena", August 30, 2002.

The RIAA possesses only Internet Protocol (IP) number information on infringers. Verizon possesses information that would associate subscriber information with IP number information. That is, obtaining Verizon's information would enable the RIAA, or its members, to file complaints alleging infringement against the individual infringers.

Holding. The District Court, Judge John Bates presiding, wrote a 39 page opinion in which it held, based upon both statutory construction, and the legislative history and purpose of the statute, that 512(h) subpoenas are available when the alleged infringer merely uses the ISP's network to transfer infringing content. The content need not be stored on the ISP's servers.

The Court concluded that "Based on the language and structure of the statute, as confirmed by the purpose and history of the legislation, the Court concludes that the subpoena power in 17 U.S.C. § 512(h) applies to all Internet service providers within the scope of the DMCA, not just to those service providers storing information on a system or network at the direction of a user. Therefore, the Court grants RIAA's motion to enforce, and orders Verizon to comply with the properly issued and supported subpoena from RIAA seeking the identity of the alleged infringer."

It added that "Here, the statutory language and structure lead to a single result – the section 512(h) subpoena authority applies to service providers within not only subsection (c) but also subsections (a), (b), and (d) of section 512."

The Court elaborated that "Because peer-to-peer users most often swap materials over the Internet that are stored on their own computers -- not on the service providers' networks -- such activity is within subsection (a), not subsection (c). Thus, under Verizon's reading of the Act, a significant amount of potential copyright infringement would be shielded from the subpoena authority of the DMCA. That would, in effect, give Internet copyright infringers shelter from the long arm of the DMCA subpoena power, and allow infringement to flourish. The Court can find nothing in the language or structure of the statute that suggests Congress intended the DMCA to protect only a very limited portion of copyrighted material on the Internet." (Footnote omitted.)

The Court also examined the legislative history and purpose of Section 512. It wrote that "Congress thus created tradeoffs within the DMCA: service providers would receive liability protections in exchange for assisting copyright owners in identifying and dealing with infringers who misuse the service providers' systems. At the same time, copyright owners would forgo pursuing service providers for the copyright infringement of their users, in exchange for assistance in identifying and acting against those infringers."

The Court continued that "Congress was concerned about the ability of copyright owners to protect their creative investments in light of rapid technological innovations on the Internet that make copyright theft easy, virtually instantaneous, and undetectable. Therefore, in exchange for the liability protections afforded to service providers in subsections (a) through (d) of the DMCA, Congress sought through subsection (h) to require service providers to assist copyright owners in identifying infringers using the service providers' systems. If, as Verizon contends, service providers only have such obligations when the infringing material is stored on their systems, then service providers falling within subsection (a) -- a large portion of those addressed by the DMCA -- would receive the liability protections of the Act without the corresponding obligation to assist copyright owners in identifying infringers. There is no logical connection between the line Verizon seeks to draw and the objectives Congress sought to achieve through the DMCA. Verizon's reading would thus undermine the balance Congress established in the DMCA, and does not comport with the Act's purpose and history."

Reaction. RIAA President Cary Sherman stated in a release that "We appreciate the court's decision, which validates our interpretation of the law. The illegal distribution of music on the Internet is a serious issue for musicians, songwriters and other copyright owners, and the record companies have made great strides in addressing this problem by educating consumers and providing them with legitimate alternatives. Now that the court has ordered Verizon to live up to its obligation under the law, we look forward to contacting the account holder whose identity we were seeking so we can let them know that what they are doing is illegal."

Verizon VP and Associate General Counsel Sarah Deutsch stated in a release that "The court's decision has troubling ramifications for consumers, service providers and the growth of the Internet. It opens the door for anyone who makes a mere allegation of copyright infringement to gain complete access to private subscriber information without the due process protections afforded by the courts. This case will have a chilling effect on private communications, such as e-mail, surfing the Internet or the sending of files between private parties."

Deutsch added that "Verizon is not attempting to shield customers who break copyright laws. We are, however, seeking to protect the fundamental privacy and due process rights that should be afforded to our customers and all Internet users. We will appeal the decision."

DARPA States FBI Is Involved in Total Information Awareness Program
1/21. The Department of Defense (DOD) stated that the Federal Bureau of Investigation (FBI) is involved the Defense Advanced Research Projects Agency's (DARPA) Total Information Awareness (TIA) project.

The DARPA web site states that this project "will imagine, develop, apply, integrate, demonstrate and transition information technologies, components and prototype, closed-loop, information systems that will counter asymmetric threats by achieving total information awareness useful for preemption; national security warning; and national security decision making." The DARPA is headed by Anthony Tether. John Poindexter is the head of the DARPA's TIA project.

The DOD made the statement regarding the FBI in its responses to a set of questions propounded by Sen. Charles Grassley (R-IA) in a November 22, 2002 letter. Sen. Grassley asked, among other things, "What coordination has the program had with Federal law enforcement officials?"

The DOD responded to Sen. Grassley on January 17 that "Dr. Tether has advised of contacts with the Federal Bureau of Investigation (FBI), Foreign Terrorist Tracking Task Force, Department of Justice, and components of the Department of Homeland Security, DARPA officials note it is their understanding that the FBI is working on an MOU with DARPA for possible experimentation with TIA technology in the future."

Sen. Grassley responded by writing a letter on January 21 to Attorney General John Ashcroft. Sen. Grassley noted that the Department of Justice (DOJ), of which the FBI is a part, had previously denied receiving information on TIA. Sen. Grassley then stated, "I am very concerned that DoJ and the FBI may have been less than forthright to the press and the American people about their involvement with TIA. Please provide a complete accounting, including timeline, of DoJ and FBI’s actions regarding TIA as well as the draft MOU."

Sen. Charles GrassleyOn January 17, Sen. Grassley (at right) offered an amendment (SA 53) to HJRes 2, the further appropriations for FY 2003 resolution, which the Senate is currently debating. His amendment would provide that no federal funds can be spent on the TIA project unless "(1) such technology or component is to be used, and is used, only for foreign intelligence purposes; and (2) such technology or component is not to be used, and is not used, for domestic intelligence or law enforcement purposes". This amendment would also require a detailed report.

In addition, also on January 17, Sen. Ron Wyden (D-OR), and others, offered a related amendment (SA 59). This amendment contains several provisions. One provides that it is the sense of the Congress that "the Total Information Awareness program should not be used to develop technologies for use in conducting intelligence activities or law enforcement activities against United States persons without appropriate consultation with Congress or without clear adherence to principles to protect civil liberties and privacy".

The amendment further provides that it is the sense of the Congress that "the primary purpose of the Defense Advanced Research Projects Agency is to support the lawful activities of the Department of Defense and the national security programs".

The Wyden amendment would also provide that no federal funds can be spent on TIA unless the DOD, DOJ and CIA submit a joint report within 60 days that "contains ... a detailed explanation of the actual and intended use of funds for each project and activity of the Total Information Awareness program ...", or "the President certifies to Congress in writing, that" such report is "not practicable" and "the cessation of research and development on the Total Information Awareness program would endanger the national security of the United States".

Also, on January 16, Sen. Russ Feingold (D-WI) introduced a stand alone bill, S 188, the Data Mining Moratorium Act of 2003. This bill, which is cosponsored by Sen. Wyden, would require the DOD and the Department of Homeland Security to suspend the development of data mining systems, including the TIA project. (See, story titled "Sen. Feingold Introduces Data Mining Moratorium Bill", in TLJ Daily E-Mail Alert No. 586, January 20, 2003.)

The bill provides that until "there is enacted a law specifically authorizing data-mining", "no officer or employee of the Department of Defense or the Department of Homeland Security may take any action to implement or carry out for data-mining purposes any part of (including any research or development under) (1) the Department of Defense component of the Total Information Awareness program or any other data-mining program of the Department of Defense; or (2) any data-mining program of the Department of Homeland Security that is similar or related to the Total Information Awareness program."

Sen. Grassley also asked the DOD in his November 22, 2002 letter, "What protections are in place to ensure civil liberties are not violated?" The DOD responded on January 17 that "Dr. Tether has advised that part of the TIA project will focus on the development of privacy protections that do not currently exist, along with other advanced security and system hardening characteristics as part of the TIA program. The IG, DoD, audit will ``assess whether the proper controls are being included in the developmental contracts to ensure that the technology is properly managed and controlled when placed in an operational environment.´´ The audit will also assess the adequacy of computer security protections and human access protections intended to protect civil liberties."

Wednesday, January 22
9:00 AM - 5:00 PM. The North American Numbering Council will hold a meeting. Location: FCC, 445 12th Street, SW.

11:00 AM. The Federal Trade Commission (FTC) will hold a press conference to announce its Consumer Sentinel State Trends Report, which includes the top ten fraud complaint categories and fraud and identity theft complaint trends. See, FTC notice. Location: FTC, 600 Pennsylvania Ave., NW, Room 432.

5:00 PM. The FCBA's Diversity Committee and Young Lawyers Committee will host a Law School Outreach Program at the University of Baltimore for law students interested in practicing communications law.

6:00 - 8:00 PM. The FCBA will host a CLE seminar titled "The Transition to Digital Television". The price to attend is $60 for FCBA members, $50 for government/law student members, and $80 for non-members. Registrations & cancellations are due by 5:00 PM on January 21. RSVP to Wendy Parish wendy@fcba.org. Location: Wiley Rein & Fielding Conference Center, 1750 K Street, NW, 10th Floor.

Thursday, January 23
9:00 AM - 12:30 PM. The American Enterprise Institute (AEI) will host a half day conference titled "Have We Overestimated the Importance of Audited Earnings?" The keynote speaker, at 9:15 AM, will be Peter Fisher, Under Secretary of the Treasury for Domestic Finance. There will be a panel at 9:45 AM titled "Cash versus Reported Earnings". The participants will be Richard Bassett (Risktoolz), Robert Eccles (Price Waterhouse Coopers), Alex Porter (Porter Felleman), James Glassman (AEI), and Peter Wallison (AEI). There will be a second panel at 11:15 AM titled "Policy Implications". The participants will be Kevin Hassett (AEI), Peter Wallison, Pippa Malmgren (Canonbury Group), and James Glassman. See, notice and registration page. Location: AEI, 12th Floor, 1150 17th Street, NW.
Friday, January 24
9:30 AM. The Senate Judiciary Committee will hold a hearing on hearings on the nomination of Gordon England to be Deputy Secretary of Homeland Security. Location: Room 226, Dirksen Building.

Deadline to submit comments to the Federal Communications Commission (FCC) regarding the Tier III Coalition's petition to forbear, up to December 31, 2005, from enforcing the E911 accuracy and reliability standards set forth in § 20.18(h) of the FCC’s Rules with respect to Commercial Mobile Radio Service (CMRS) provided by Tier III wireless carriers. See, FCC notice [PDF]. This is WT Docket No. 02-377.

Monday, January 27
2:00 PM. The House will return from a two week adjournment.

12:30 PM. Rep. Nancy Pelosi (D-CA) and Sen. Tom Daschle (D-SD) will speak at a luncheon. Location: National Press Club, 529 14th St. NW, 13th Floor.

The Supreme Court will be in recess from January 27 through February 23.

Day one of a two day conference titled "First International Conference on the Economic
and Social Implications of Information Technology
". The scheduled speakers include Secretary of Commerce Don Evans, John Marburger (President’s Science Advisor), Floyd Kvamme (Co-Chairman of the President’s Council of Advisors on Science and Technology, or PCAST), Sam Bodman (Deputy Secretary of Commerce), Nancy Victory (NTIA Directory), Phil Bond (Under Secretary for Technology), and Bruce Mehlman (Assistant Secretary for Technology Policy). See, notice and schedule. The price to attend is $100, and $60 for government, academic, and nonprofit personnel. Location: Main Auditorium, Department of Commerce, 14th St. and Constitution Ave.

Day one of three day COMNET Conference & Expo. See, conference web site. Location: Washington Convention Center.

Extended deadline to submit comments to the Federal Communications Commission's (FCC) regarding the Report [73 pages in PDF] of the FCC Spectrum Policy Task Force (SPTF). The report recommends that "spectrum policy must evolve towards more flexible and market oriented regulatory models." See, original notice [PDF] and notice of extension [PDF].

Deadline to submit comments to the Federal Communications Commission (FCC) in response to its Notice of Inquiry regarding competition in the Commercial Mobile Services (CMRS) industry. The FCC seeks data and information for its Eighth Annual Report and Analysis of Competitive Market Conditions with Respect to Commercial Mobile Services. This is WT Docket No. 02-379. See, notice in the Federal Register, January 7, 2003, Vol. 68, No. 4, at Pages 730 - 740. For more information, contact Chelsea Fallon at 202 418-7991.

Tuesday, January 28
Day two of a two day conference titled "First International Conference on the Economic
and Social Implications of Information Technology". The scheduled speakers include Secretary of Commerce Don Evans, John Marburger (President’s Science Advisor), Floyd Kvamme (Co-Chairman of the President’s Council of Advisors on Science and Technology, or PCAST), Sam Bodman (Deputy Secretary of Commerce), Nancy Victory (NTIA Directory), Phil Bond (Under Secretary for Technology), and Bruce Mehlman (Assistant Secretary for Technology Policy). See, notice and schedule. The price to attend is $100, and $60 for government, academic, and nonprofit personnel. Location: Main Auditorium, Department of Commerce, 14th St. and Constitution Ave.

Day two of three day COMNET Conference & Expo. See, conference web site. Location: Washington Convention Center.

9:30 AM. The Senate Judiciary Committee will hold a hearing on pending judicial nominations. Location: Room 226, Dirksen Building.

10:00 AM. Region 20 (District of Columbia, Maryland, and Northern Virginia) Public Safety Planning Committees (NPSPAC) on 800 MHz  and 700 MHz will meet. Location: Potomac Community Public Library, Woodbridge, VA.

1:15 - 2:15 PM. Panel discussion titled "The Low Down on High-Tech Communications Policy and Regulation" at the COMNET Conference & Expo. The panelists will be Richard Wiley (Wiley Rein & Fielding), Kevin Kayes (Democratic Staff Director, Senate Commerce Committee), Michael Gallagher (Deputy Director of the NTIA), James Ramsay (General Counsel of NARUC), and Bryan Tramont (Senior Legal Advisor to FCC Chairman Michael Powell). See, conference web site. Location: Washington Convention Center.

Wednesday, January 29
12:15 PM. The FCBA's Online Communications Committee will host a brown bag lunch. The topic will be "Digital Rights Management & Development". For more information, contact Aileen Pisciotta at apisciotta@kelleydrye.com. RSVP to bviera@kelleydrye.com. Location: Cole, Raywid & Braverman, 1919 Pennsylvania Ave., NW, Suite 200.

4:00 PM. The Cato Institute will host a book forum on Rethinking the Network Economy: The True Forces that Drive the Digital Marketplace, by Stan Liebowitz. John Lott (American Enterprise Institute) and Tom Lenard (Progress and Freedom Foundation) will comment. Webcast. A reception will follow. See, Cato notice. Location: Cato, 1000 Massachusetts Ave., NW.

Day three of three day COMNET Conference & Expo. See, conference web site. Location: Washington Convention Center.

Deadline to submit comments to the Federal Trade Commission (FTC) regarding the consent agreement that it entered into with Quicken Loans Inc. On December 30, 2002, the FTC filed an administrative Complaint [8 pages in PDF] against Quicken Loans, an online lender, alleging that it violated the Fair Credit Reporting Act (FCRA). The FTC and Quicken Loans also settled the matter. See, Agreement Containing Consent Order [7 pages in PDF]. See also, story titled "FTC Charges Quicken Loans with Violation of FCRA" in TLJ Daily E-Mail Alert No. 575, January 3, 2003. See, notice in the Federal Register, January 21, 2003, Vol. 68, No.  13, at Pages 2775-2776.

More News
1/21. The U.S. Court of Appeals (DCCir) issued its opinion in Sprint v. FCC. Sprint, AT&T and WorldCom filed petitions for review of the Federal Communications Commission's (FCC) order governing the means by which payphone service providers are compensated for certain calls made from their payphones. The FCC granted the petitions, and remanded, because the FCC failed to follow notice and comment requirements of the Administrative Procedure Act (APA).

1/21. The General Accounting Office (GAO) released a report [PDF] on the "Purchases of Degrees from Diploma Mills". It GAO found that a search of a government sponsored resume database identified over a thousand resumes with bogus degrees. It wrote that "A the time of our investigation, the Oregon State Office of Degree Authorization identified 43 institutions as diploma mills or unaccredited institutions. To determine the reason for which the degrees had been purchased, we requested that a government sponsored Internet résumé repository query its database to determine if any résumés it contained listed degrees from entities identified by the state of Oregon as diploma mills. We received a database of more than 1,200 résumés that included degrees from 14 of the 43 diploma mills."

People and Appointments
1/21. Kris Anne Monteith has been named Deputy Bureau Chief for Outreach and Intergovernmental Affairs in the Federal Communications Commission's (FCC) Consumer & Governmental Affairs Bureau (CGB). She has worked for the FCC since 1997. Before that she worked for the law firms of McDermott Will & Emery and Keller & Heckman. See, FCC release [MS Word].

1/21. Morgan Guenther resigned as President of TiVo. TiVo, which makes digital video recorders, has not named his replacement. See, TiVo release.

Notice

Tech Law Journal is instituting several new practices and procedures with the New Year. All of these changes have one central purpose -- protecting the rights of the author, David Carney.

The Tech Law Journal web site and the Tech Law Journal Daily E-Mail Alert (TLJ Alert) are both authored and published by David Carney. This is a business. The sole source of revenue for this business is subscription payments for the TLJ Alert. Yet, it is currently being widely infringed. This is undermining the financial viability of the business.

See, Letter from the Publisher, which summarizes the new practices and procedures.

See, Subscription Information page for price schedule, methods of payment, and related matters.

See, Memorandum regarding "E-Mail Monitoring".

See, Memorandum regarding "Disclosure of Information to Third Parties".

See, Memorandum to law students explaining why free subscriptions for law students will end after the January 17 issue.

See, Memorandum regarding "Termination of state officials' subscriptions" explaining why free subscriptions for state government officials will end after the January 17 issue.

See, Subscription Form and Contract (for firms, companies, groups, and other entities), or the shorter Subscription Form and Contract (for persons subscribing individually). These contracts are for new paying subscribers, and paying subscribers renewing their subscriptions. Persons receiving free subscriptions (journalists and government officials) should not sign a contract. Paying subscribers whose subscription term has not expired should not sign a contract, until their existing subscription term expires and they resubscribe.

And finally, see revised Privacy Policy.

About Tech Law Journal
Tech Law Journal publishes a free access web site and subscription e-mail alert. The basic rate for a subscription to the TLJ Daily E-Mail Alert is $250 per year. However, there are discounts for subscribers with multiple recipients. Free one month trial subscriptions are available. Also, free subscriptions are available for journalists, federal elected officials, and employees of the Congress, courts, and executive branch. The TLJ web site is free access. However, copies of the TLJ Daily E-Mail Alert are not published in the web site until one month after writing. See, subscription information page.

Contact: 202-364-8882; E-mail.
P.O. Box 4851, Washington DC, 20008.
Privacy Policy
Notices & Disclaimers
Copyright 1998 - 2003 David Carney, dba Tech Law Journal. All rights reserved.