Infringement of Copyright in Cyberspace: A Critical Study

 

Shashirekha Malagi1,2*

1Asst. Prof. of Law, KUSSK Law College, Dharwad, Karnataka.580001

2Research Scholar, P.G. Dept. of Law, Karnata University, Dharwad, Karnataka.580001

*Corresponding Author E-mail: shashimalgi120@gmail.com

 

ABSTRACT:

One of the objectives of the copyright law is to promote individual interest. This involves providing incentives to the authors to encourage creation of new works. Recognition of the authorship of the work and ensuring economic returns through the copyright law is intended to achieve this. But technological changes always created challenges to the basic principles of copyright law. An application of copyright law to digital information has become critical. Infringement of copy rights over the Internet is one of them. As per Section 13 and 63 of Indian Copyright Act1957, literary works, pictures, sound recordings and other creative works are protected from being copied without the permission of the copyright holder. It is yet unclear how copyright law governs or will govern these materials as they appear on the internet. Though there are provisions in the I.T. Act 2000. But it is not possible on the internet to have policing at the national boundaries. Controlling and filtering information that flows through the internet has many practical difficulties. The purpose of my paper is to discuss the problem of copy rights infringement over Internet with reference to Indian Scenario.

 

KEYWORDS:

 


 

1. INTRODUCTION:

Extension of copyright protection to internet may create some problems like fixing, mixing and remixing of information in online is very easy .Each user can be a net publisher. Modification of data is also very easy and as cyber world is not limited by geographic boundaries, information can be easily communicated. As a result, internet merely represents an arena in which the infringement of copyright is rampant and just beginning to be policed. The following discussion vivaciously evinces the challenges of copyright in cyberspace.

 

2. Copyright

Exclusive right to do or authorize others to do certain acts in relation to:

§  Literary, dramatic or musical works;

§  Artistic works

§  Cinematograph films and

§  Sound recording.1

 

Sec 2(ffc) – “Computer Programme”-means a set of instructions expressed in words, codes, schemes or in any other form, including a machine readable medium, capable of causing a computer to perform a particular task or achieve a particular result. 2

 

3. Cyberspace

The word “cyberspace” was coined by the science fiction author William Gibson, When he sought a name to describe his vision of a global computer network, linking all people, machines and sources of information in the world, through which one could move or “navigate” as through a virtual space.3

 

4. Understanding copyright in the digital world 

In the digital world, every web page accessible or published in the World Wide Web is to be taken as a literary “copyrightable” work.In cyberspace, one can meet and talk to new people, read, publish, research, hear music, see video, look at art, purchase and sell things, access government documents, send e-mail, download software, and receive technical support. Cyberspace is a living organism, constantly changing, as more information is uploaded, downloaded, as more people join the pioneers of this brave new world. The relationship between the Internet and Copyright law is complicated. The internet is an international system for the transmission and reproduction of material, much of which is protected by Copyright. It therefore presents previously unimaginable possibilities for copyright infringement and many challenges for copyright law.4

 

5. Challenges for Copyright in Cyber Space

About a century ago, Justice Paterson, in University of London v. University of Tutorial Process Ltd., 1916 (2) Ch 601, observed:

 “What is worth Copying is prima facie worth protecting.”

This is the genesis of all Intellectual Property Rights (IPRs).These rights refer to the property that is a creation of the mind: inventions, literary and artistic works, symbols, names, images, and designs used in commerce. Among the other IPRs the Trade Marks and Copyright play an important role on the Internet.

 

The internet poses two basic challenges for copyright: What to administer and how to administer. The first challenge will be met only when a consensus is achieved over the copyright issues in the internet. The IPR administrator’s special challenge is how to balance the rights of different players on the Internet like content providers, service providers, and access providers and so on. This has to be done without jeopardizing the free flow of information and at the same time ensuring that the genuine economic interests of the creators of copyright are not adversely affected.5

 

The following features of the internet pose particular difficulties for copyright law:

i)  Information may be easily reproduced and distributed: Once the information is in digital form on a computer connected uploaded downloaded and distributed.

ii)  Internet users expect free access to copyright material: Much of copyright material published on the internet has been made available free of charge. This has created resistance among users to pay for the Internet material.

iii)  Internet users may act anonymously: It is difficult to identify an industrial Internet user. Users may therefore infringe copyright with little risk of detection, especially if the infringements are relatively small-scale and non-persistent.6

 

Taken together above features of the Internet have raised new kinds of internet cases.

a)      Linking and framing

b)      Uploading of copyright material

c)      Downloading of copyright material.

d)      RAM copying

e)      Digital formal licences

f)       Musical (Audio) Rights

g)      Mega tags

h)      Meta search

i)       Off line web reading software7

 

 

Linking and Framing:

The websites contain enormous amount of information much of it with varying degree of copyright protection. Almost everything on the web is protected by copyright law. Websites are compositions of materials often consisting of words, graphics, audio and video that are expressed to the consumer as information content.8

 

The owners and websites developers carefully select the content to sell the company’s product or service. The subject matter expressed in the site is an electronic publication of this content. Since designing, producing and maintaining a sophisticated web-site is very expensive. So protecting the content from infringement is extremely important. At present it is easy to violate a copyright owner’s exclusive right to copy the material. Everyone with a computer and an internet connection creates his own web pages and thus becomes a publisher.

 

Linking comes into two forms hypertext linking and inline linking. ‘Linking’ is the practice of allowing a user, to move from one web site to another by clicking on a “link”.9

 

Hypertext linking:

A hypertext reference link appears on screen as a highlighted citation or phrase that is differentiated from regular text by a special colour or format such as undertaking. When an Internet user activates the link by clicking on the highlighted text, the web browser software retrieves the corresponding document from external site and creates a copy, which is then displayed on screen.10

 

In line linking:

An inline link allows a website designer to inline a graphical image from an external site and incorporates it as part of the local on screen display. For e.g. If an external site contains a photograph it can be in lined into local website and shown as part of the current display. In contrast to a hypertext link where there is an immediate termination with the local site after connecting to the external site, the local site remains current when the inline image is displayed. The URL does not change and the user may not realize that the linked image actually comes from somewhere other than linked site.11

 

Framing:

Framing is another type of dynamic connection that is similar to inline linking. It allows the web-designer to incorporate or pull in an entire external site or portions thereof and surround it with frames of his own creation. The effect as with inline is that the external site appears to be part of the local site and the URL remains unchanged.12

 

One of the first cases over hypertext linking in the U.K. is that of Shetland times Ltd. v. Wills13. The claimant owned and published a news paper called the Shetland times (the Times) and made editions of news paper available on the Internet. The second defendant provided a news reporting service under the name of the Shetland News (the News). The first defendant was the managing director of the news. The defendants established a web site and included among the headlines on their front page a number of headlines appearing in issues of the Times. These headlines were verbatim reproductions of the claimant’s headlines; by clicking on one of these headlines the Internet user could gain access to the relative text in the Times. By-passing the front page the Times.

 

In LFG, LCC v. Zapata Corp14 the defendant registered domain name zapte.com for carrying on business over the internet. The plaintiff is providing financial service under the service mark Zap futures. The defendant’s web site is having three hyperlinks, which could connect users to other financial service website including that of plaintiff and his competitors. The plaintiff objected this hyperlink on the ground that wrong impression is created in the minds of the public because they may associate him with his competitors.

 

In Washington Post Co. v. Total News Inc. Total news15 operated a website providing links to web-sites of many news purveyors including the Washington Post, Time Cable News Network (CNN), Times Mirror, Dow Jones and Reuters. By clicking on the links, the web-sites of these news purveyors were displayed in the frame of Total News. The frame contained the ‘Total News’ logo Total News URL and advertisements managed by Total News. The claimants brought an action against the defendant alleging copyright infringement in which they succeeded.

 

Uploading of copyright material: 

As it is easy and common for copyright material to be transmitted over the Internet, many Internet users assume that the fact that a material is available electronically entitles them to upload it to their own web-sites16.

 

Downloading of Copyright material:

Once the unauthorized copyright material has been uploaded and made available, the next possible thing is that Internet users will download it from the internet. There is little doubt that users are liable for downloading such material without the authority of the copyright owners. However copyright owners are reluctant to bring actions against millions of individual infringers. Much of the attention has been paid to the possibility of holding liable those parties who provide the equipment or facilities used for infringing activities.17

 

 In A and M Record Inc. v. Napster Inc18 Napster facilitated the transmission of MP3 files among its users. The company distributed its file sharing software for free via its web site through the process called ‘peer to peer’ (P2P) file sharing. Its users could search and share MP3 music files that were catalogued on Napster’s central server. These files could be downloaded directly from user’s hard drivers over the Internet. A and M records and other record companies brought copyright infringement action against Napster in US. District Court and Court decided in favor of plaintiff. 

 

 

Software piracy: The illegal use or distribution of software is protected under intellectual property laws. Software piracy includes

i)       End user piracy- It is illegal to copy or possess software without licensing for each copy. Individual users and companies alike must acquire enough licenses to cover their software installations. Volume licensing applies only to windows Desktop upgrades not to the full windows operating system.

 

ii)      Manufacturer piracy- It is illegal for a computer manufacturer to copy software and pre-install it without permission on more than one computer.

 

iii)     Manufacturer piracy- It is illegal to offer unauthorized copies of software for download over the Internet. If software is available on the internet, make sure the software publisher has authorized this distribution.

 

iv)     Counterfeiting- It is illegal to manufacture unauthorized copies of software and distribute those copies in packaging that reproduces or resembles that of manufacturer. Counterfeit registration cards with unauthorized serial numbers are often included in these packages.

 

v)      Online auction- It is illegal to resell software in violation of the original terms of sale, to resell software marked not for resale.19

 

In Microsoft Corporation V. Yogesh Popat:20 The defendants were engaged in the business of assembly and sale of computers since 1996 and were selling computers loaded with pirated versions of Microsoft Software. Microsoft placed a trap order with the defendants through a Microsoft employee and the defendants sold to this employee a computer preloaded with Microsoft’s pirated software. Thereafter, Microsoft filed a suit against the defendants for permanent injunction and also damages. Defendants did not appear at all and the court granted the damages of Rs. 2 crore and injunction.

 

Ram copying:

In the context of digital technology chips, disks, CD ROMs, optical disks, digital tapes and other storage devices are plainly material objects on which information is fixed. All information passing through a computer will be stored temporarily in the RAM. This is erased whenever the computer is shutdown or rebooted .Such a common copying in the Computer is held as a copyright violation in MAI System Corp.V. Peak Computer Inc.21 .This decision will have serious implications. When browsing the Internet, copies of all web pages are made into the RAM. Applying this ratio, a person browsing can be held liable for copyright violation .But this decision was not followed in Religious Technology .v. Netcom22. In this case, the court held that the coping involved in browsing is the equivalent of reading. Still, regarding the copying in RAM the position is unsettled as the MAI System case is still widely quoted.

 

Digital formal licenses:

Another issue associated with copyright law that is frequently brought into play in the context of Internet is the digital copyright licences. The materials in digital format can be distributed by various methods including on –line distribution, CD-ROM, floppy etc. A blanket grant of a license for the use of copyrighted material in election media would permit the use in all digital formats .Hence, even the licensing culture has to be changed in the digital media.23

 

Music Rights:

Earlier it was a prestige to have a presence in the net. Now due to heavy loss, music right owners have to reduce the widespread net-audio use. Internet could be used as a vehicle to distribute both the counterfeit version of recorded material and bootleg copies, which were not intended for commercial distribution. Take for eg. The case of Rio, computer peripheral devices that can download digital audio files and play the audio which has nearly the same quality as CD. Music Bot another programme, automatically searches the web and detects sites, which contain music files. Advances in Internet audio software and technology by companies including Progressive Networks, Liquid Audio, Marcomedia, etc. have subsequently improved the quality of Internet audio. The famous Napster litigation explains the seriousness of this issue. A music album is a result of hardwork. If it can be copied and uploaded in the net within seconds, imagine the loss.24

 

Mega tags:

Mega tags are key words picked up by the search engine for making a list of web sites, relevant to search request. “passing off” is the common delinquency connected with this. Other person will include words relevant to competitor’s product in their own web site to ensure searchers view their site.25

 

Meta search:

Meta search software enables an individual to conduct a single key word search of online resources that will access different online search engines.26

 

Off –line web reading software:

This software searches the net on a regular basis and will download content of those sites for off –line review. Later, the viewer can review the site at his or her convenience, without being connected to the net. Leading producers of  off–line web readers are, travelling software www.travsoft.com, free loader www.freeeloader.com etc. Now web pages can be sent by e-mails and even broadcasting of web pages is common. Framing, Caching, Internet, Surfn’ print, posted messages, databases, distribution of software etc., all raise challenges to the traditional copyright regime in the internet.27

 

6. Liability for the Copyright Infringement

Liability for the Copyright Infringement on the Net can fall upon the infringer himself or upon the Internet Service Provider (ISP). The person who downloads or cathes from the Net copyrighted materials, without the consent of the owner of the copyright, is liable for the copyright infringement. Because of inherent difficulties of enforcing copyright against individual Internet Users worldwide, the copyright owners found the answer to this problem in placing legal liability for the copyright infringement on those who allow and enable Internet Pirates to exist namely, the ISPs.28

 

ISP can be brought under the provision of S.51 (a) (ii) of the Copyright Act, 1957 for the online copyright infringement. According to this section, if any person “permits for profit” another person to use “any place” to communicate any work to the public, when such communication constitutes infringement, or facilitates such infringement under certain conditions, such person may be held liable for such act.29

 

ISP allows their servers and telecommunication facilities for storing use material and for transmitting such material. The computer servers and other telecommunication facilities are actually located at their business premises and hence they would verily come under expression “any place’ used in the Statue.30

 

The provision relating to the ISPs are specifically enumerated in the Information Technology Act, 2000, where an Internet service provider is referred to as the “network service provider”. The Act specifically imposes liability on the ISPs, inter alia, for the copyright infringement. Accordingly, an ISP may be held liable for any third party information or data made available to him by any other person .He can escape from liability, if he proves the offence or contravention was committed without his knowledge or he had exercised all due diligence to prevent such violation of copyright.31 However it seems practically difficult for an ISP to filter and police every web pages he carries. Hence there is a fear of such provisions of law often remaining a ‘dead letter’ in the statue books.32

 

The real online copyright infringement is not immune from the liability .Section 43 (a) of the IT Act is designed to prevent such persons from infringing acts. According to this section , if any person accesses or secures access to a computer, computer system or computer network or downloads, copies, extracts any data , database or information from it, including information or data held or stored in any other medium, without the permission of the owner or any other person who is in charge of it, he shall be liable to pay damages by way of compensation not exceeding one corer Rupees to the person so affected which is deterrent enough to prevent copyright violation. However while determining the compensation, the amount of gain, and such other things must be taken into consideration.33

 

The liability under Copyright Act falls under two categories; Civil and Criminal .As for as the former is concerned, the remedies may be injunction, damages or account for profit. In the case of the latter, normally, imprisonment for a term between six months and three years can be imposed. In addition to this the fine amount from fifty thousand to two lakh rupees shall also be imposed upon the infringer.34

 

7. Problems which have no Solutions under the IT Act 2000 and Copyright Act 1957.

Challenges before the author of the online copyrighted materials are manifolds. Religious Technology center v. Netcom Online communication Services Inc.35 Internet is everywhere yet it is nowhere. Unlike the bookseller’s shop, now, through Internet, infringement is more a silent and private act. As Internet has reached the PCs and even Mobile Handsets, it has become very difficult to curb such infringing acts.

 

Issue of jurisdiction:

As internet cannot be confined to any geographical boundary, testing of an act, whether it amounts to infringement and if it does, how to bring him under the clutches of law, i.e., where should he be tried, becomes a tricky debatable question.36

 

However, this issue of jurisdiction is bravely addressed under the Section 62 of the Indian Copyright Act ,1957 do provides for jurisdiction to any court having a direct jurisdiction over the matter. It further goes on to explain the limits of jurisdiction of the courts. The Information Technology Act 2000 provides for extra-territorial jurisdiction in cyber crime cases. Section 74 provides that where any offence involves a computer or computer resource in India, it can be taken note of under Indian laws.37

 

Thus, if a person violates the copyright of a person by means of a computer, computer system located in India, he would be liable under the provisions of the Act. Despite of this type of provision, the IT Act does not lay down any concrete framework for dealing with specific copyright violations of the Internet. There are provisions that may be construed to be seeking to address some aspects of copyrights as is obvious from the Section 43 which relates to penalty for damage to computer, system.38 Similarly the provisions of the Copyright Act cannot be used to interpret the copyright implications in respect of hyper linking and deep linking. Similarly caching at the browser, proxy or the ISP levels also are issues that are not addressed by the Copyright Act.39

 

Copyright owners’ concerns about the threats posed by the digital revolution are legitimate. The technological protection systems have tilted the balance in favor of the right holders at the cost of public domain. It created a new and powerful "Access right" deployed to prevent infringing reproduction, reproduction that is permitted under existing copyright exceptions. Technical protection systems can be used to prevent infringing reproduction, reproduction permitted for educational and archival purposes or reproduction necessary for research permitted under fair dealing principles. Concerning Indian position, new provisions are to be added to the present copyright laws and IT law to provide legal protection for infringement of copyright.40

 

8. CONCLUSION:

The advent of the Internet is a serious concern in the field of intellectual property rights. The infringement of copyrights over internet is common now-a-days. The present Indian Legislation on cyber Law does not have sufficient provision to tackle many problems relating to IPR and cyberspace. So there is a need of specific provisions which regulate IP rights in Cyberspace. Non-profit organizations like NASSCOM (National Association of Software and Service Companies) have been actively working as a partner with the Government of India and State Governments in formulating IT policies and legislation in India. Its work is commendable as it launched the country's first 'anti-piracy' hotline and India's first anti-piracy toll-free hotline. State Governments are establishing special police cells for arresting the piracy of copyright works.

 

9. REFERENCE:

1.       See, sec .14 of the Copyright Act, 1957.

2.       See, sec .2(ffc) of the Copyright Act, 1957.

3.       Lawrence Gomes , “Cyber Crimes”, Criminal Law Journal, Vol.4, Oct-Dec 2001, p.185

4.       S.M Bhaskar and R.C. Tripathi. “The Electronic Transaction and Intellectual Property Rights: A need for Digital Time sampling” JILI Vol. 46:2, 2004.p.208.

5.       Justice Yatindra Singh, “Cyber Laws”4th edn., ,(New Delhi: Universal Publication,2012)p.98

6.       Muragendra B. T. “Copyright and Trademark in Cyberspace”  International Journal of Scientific and Engineering Research , Vol. 3, Issue 6, June-2012 1 ISSN 2229-5518

7.       Available at http://etheses.Nottingham.ac.uk/1197/1/initial submission 2 pdf. visited on 15th April 2011

8.       Ibid

9.       Ibid

10.     Available at http://fenwick.com/docstore/publications/ip/iprights on the internet.pdf ,  visited on 18th April 2011

11.     Ibid

12.     Ibid

13.     (1997) F.S.R. 604

14.     78 FS. Supp. 2d.731, 733

15.     No. 97 Civil 1190 (PKL).

16.     Supra note 3.p.186

17.     Ibid

18.     239 F. 3d. 1004 [9th Cir. 2001]

19.     Meena Amar, lectures on Cyber Laws, 1st edn. (Hyderabad: Asia Law House, 2011), pp.71 -72.

20.     CS (OS) no. 103 of 2003

21.     991 F2d 5111

22.     907 F Supp 1361.See also www.crwed. Htm.

23.     Kostyu, Jennifer L.  “Copyright infringement on the Internet: determining the liability of Internet service providers”(, Catholic University Law Review, 48,1999), p.1237.

24.     http://www.ibimapublishing.com/journals/CIBIMA/volume7/v7n8.pdf,visited on 31.7.2014

25.     Veer Singh and B.B.Parsoon, “Cyber Crime and the need for National and International legal control Regimes”, PULR, Vol.44 2002, p 37-39.

26.     Bains, Manavinder Singh “Software, Sovereignty and the Internet: Circumventing Chaos through Trips”, (The Columbia Science and Technology Law Review, 4, 2003, ) p.2.

27.     https://www.advisen.com/downloads/Intellectual_Property.pdf,visited on 31.7.2014

28.     Raman Mittal “On line Copyright Infringement Libility of ISPs”Vol.46:2, (Journal of Indian Law Institutes :2004). P.288.

29.     Nandan Kamath, “Law Relating to Computers, Internet and E-Commerce-A Guide to Cyber Laws” (Delhi: Universal Law Publishing Co .Ltd. 2000) , p.152.

30.     Ibid.

31.     See sec.79(1), Information Technology Act, 2000.

32.     Ibid.

33.     Nandan Kamath, Super note. 20, p.153

34.     See sec. 53-A, Copyright Act., 1957.

35.     907,F Supp.1361 (1995)

36.     Praveen Dalal, “The Long arm Jurisdiction of Courts regarding Copy Right Law in India”:Journal of Intellectual Property Rights : Vol.9,Nov.2004, p.561.

37.     Ian J.Lloyd, “Information Technology Law “ 3rd Edn,(Butterworth’s Landon )p.39

38.     Bushan Tilak Kaul, Copyright Protection : Some Hassels and Hurdles” Journal of Indian Law Institute, Vol.46:2, (2004).p.239

39.     Cryptography Technology and Policy Directions in the context of NII, , Gulshan Rai, R.K. Dubash and A.K. Chakravarti, Electronics- Information and Planning, Nov., 1997. Available at http://www.doe.gov.in/~doe/cyber.htm

40.     mr a.k. chakravarti, protecting proprietary and Security rights in cyberspace: initiatives in india.available at http://www.doe.gov.in/~doe/cyber.htm.visited on 4/6/2014

 

 

 

 

Received on 18.12.2014       Modified on 08.02.2015

Accepted on 28.02.2015      ©A&V Publications All right reserved

Research J.  Science and Tech. 7(1): Jan.-Mar. 2015; Page 23-28

DOI: 10.5958/2349-2988.2015.00005.4