{"id":3348,"date":"2020-08-02T20:34:46","date_gmt":"2020-08-02T20:34:46","guid":{"rendered":"https:\/\/www.dekuzu.com\/en\/?p=3348"},"modified":"2020-08-02T20:34:48","modified_gmt":"2020-08-02T20:34:48","slug":"overview-of-section-512","status":"publish","type":"post","link":"https:\/\/www.dekuzu.com\/en\/2020\/08\/overview-of-section-512.html","title":{"rendered":"Section 512 report &#8211; general overview of section 512"},"content":{"rendered":"\n<h2 style=\"text-align: center;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\"><strong>Secondary Liability<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Secondary liability doctrines enable copyright owners to bring claims against third parties that have some relationship to persons who themselves commit infringement (i.e., \u201cdirect\u201d infringers). As the Supreme Court has noted, \u201calthough \u2018the Copyright Act does not expressly render anyone liable for infringement committed by another,\u2019 these doctrines of secondary liability emerged from common law principles and are well established in the law.\u201d<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\"><!--more--><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Generally, courts have relied upon three forms of secondary liability: contributory infringement, vicarious liability, and inducement of infringement. A person may be liable for contributory infringement if he or she has \u201cknowledge of the infringing activity, and induces, causes or materially contributes to the infringing conduct of another.\u201d A court may find a person vicariously liable if he or she \u201cprofits from direct infringement while declining to exercise a right to stop or limit it.\u201d<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">In Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., the Supreme Court imported the doctrine of inducement of infringement from patent law, holding that \u201cone who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties.\u201d<\/span><\/p>\n<h3 style=\"text-align: center;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\"><strong>OSPs and Safe Harbors<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">There are four distinct safe harbors, detailed in sections 512(a), (b), (c), and (d). These safe harbors are available when a \u201cservice provider\u201d engages in one or more of the following corresponding activities:<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">(a) serving as a conduit for the automatic online transmission of material as directed by third parties (\u201cmere conduit\u201d);<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">(b) temporarily storing material that is being transmitted automatically over the internet from one third party to another (\u201ccaching\u201d);<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">(c) storing material at the direction of a user on an OSP\u2019s system or network (\u201chosting\u201d); or<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">(d) referring or linking users to online sites using information location tools, such as a search engine (\u201clinking\u201d).<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">An OSP\u2019s eligibility for a given safe harbor depends on the activity. For example, a mere conduit ISP may be eligible for the section 512(a) safe harbor for its conduit activities and may separately be eligible for the section 512(c) safe harbor for hosting websites, but those limitations on liability would be distinct and carry with them separate statutory requirements.<\/span><\/p>\n<h4 style=\"text-align: center;\"><strong><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Limitations on Relief and Eligibility for Safe Harbors<\/span><\/strong><\/h4>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">An OSP that meets the relevant eligibility requirements for one or more of the safe harbors is not liable for monetary relief and is subject only to limited injunctive relief for infringing activities conducted on or through its system or network within the scope of the applicable safe harbor(s).<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">In the case of an OSP that qualifies for a safe harbor under sections 512(b), (c), or (d), this injunctive relief is limited to: (1) disabling access to infringing material; (2) terminating the infringer\u2019s account(s); and (3) providing such other relief as may be necessary to address infringement at a particular online location; provided, however, that the relief is \u201cthe least burdensome form of relief to the service provider.\u201d<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">For an ISP that qualifies for the section 512(a) safe harbor, the court may order only the termination of an infringer\u2019s account(s) or the blocking of access to a \u201cspecific, identified, online location outside the United States.\u201d<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">In order to qualify for the limitation on liability provided under sections 512(a), (b), (c), or (d), the OSP must comply with certain threshold requirements. Two of these requirements apply to all four safe harbors:<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">(1) the adoption and reasonable implementation of a policy to terminate \u201crepeat infringers;\u201d and<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">(2) the accommodation of and non-interference with \u201cstandard technical measures\u2019\u2019 that identify or protect copyrighted works and have been developed according to broad consensus between copyright owners and OSPs, to the extent any such measures exist.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">An ISP that acts as a mere conduit for online transmissions qualifies for the limitation on liability provided by section 512(a) if the provider satisfies these two threshold requirements, without having to participate in a notice-and-takedown process.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">The full report is available <a href=\"https:\/\/www.dekuzu.com\/en\/docs\/section-512-full-report.pdf\">here<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are four distinct safe harbors, detailed in sections 512(a), (b), (c), and (d). These safe harbors are available when a \u201cservice provider\u201d engages in one or more of the following corresponding activities<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/www.dekuzu.com\/en\/2020\/08\/overview-of-section-512.html\">Continue reading<span class=\"screen-reader-text\">Section 512 report &#8211; general overview of section 512<\/span><\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,5,43,6,4,39,21,36],"tags":[],"class_list":["post-3348","post","type-post","status-publish","format-standard","hentry","category-safe-harbor","category-copyright","category-digital-environment","category-intellectual-property","category-internet","category-interpretation","category-law-review","category-online-platforms","entry"],"_links":{"self":[{"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/posts\/3348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/comments?post=3348"}],"version-history":[{"count":2,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/posts\/3348\/revisions"}],"predecessor-version":[{"id":3350,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/posts\/3348\/revisions\/3350"}],"wp:attachment":[{"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/media?parent=3348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/categories?post=3348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/tags?post=3348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}