Page:Fair Circumvention.djvu/2

From Wikisource
Jump to: navigation, search
This page has been validated.
2
[Vol. 74:1
BROOKLYN LAW REVIEW

rights holders with an additional cause of action that they may elect to pursue instead of, or in addition to, the ordinary remedies for copyright infringement.[1]

In a number of recent cases, however, courts have permitted defendants to circumvent DRM measures or to traffic in circumvention devices, finding no violation of the DMCA.[2] The courts in these cases offered a number of reasons for rejecting the plaintiffs’ claims, including (1) that the technological subject matter of the parties’ dispute was not within the scope of the DMCA; (2) that plaintiffs were attempting to apply the DMCA in circumstances not contemplated by Congress at the time it passed the statute; (3) that the plaintiffs were abusing the DMCA as a means of gaining improper advantage over a competitor in the marketplace; and (4) that the plaintiffs should be required to demonstrate an underlying act of copyright infringement by the defendant as a necessary element of any DMCA claim. The first two of these arguments rest on inferences and suppositions about legislative intent in the face of minimally illuminating statutory text. The latter two are essentially policy arguments that, whatever their persuasive appeal, are even less readily grounded in the language of the DMCA as passed.

These recent decisions gain persuasive force, however, if contextualized within the long history of judge-made exceptions to the general provisions of federal copyright law. The common-law doctrine of fair use, for example, began—and, even after receiving express statutory recognition in the Copyright Act of 1976,[3] continues to evolve—as a judge-made exception to the statutory exclusive rights of copyright holders.[4] So viewed, recent decisions may be creating what amounts to a judge-made exception to the liability rules of the DMCA—what is in

  1. The causes of action are not, however, coextensive. To be sure, the DMCA’s anticircumvention rule applies only to copyrighted works. See 17 U.S.C. § 1201(a)(1)(A) (prohibiting circumvention of “a technological measure that effectively controls access to a work protected under this title,” that is, a copyrighted work); Id. § 1201(a)(2)(A), (B), (C) (employing similar language in terms prohibiting trafficking in circumvention devices); Id. § 1201(b)(1)(A), (B), (C) (employing similar language in terms prohibiting trafficking in devices that circumvent copyright protections). Thus, neither a copyright infringement claim nor a claim alleging violation of the DMCA may be premised upon a user’s accessing a work in the public domain. Cf. Assessment Techs. of WI, LLC v. WIREdata, Inc., 350 F.3d 640 (7th Cir. 2003) (embedding public domain data in copyrighted software program gave rise to no claim for copyright infringement against party who sought only to copy the raw data itself). Nevertheless, even actions that do not constitute copyright infringement may run afoul of the DMCA’s anti-circumvention and anti-trafficking provisions. To take only one obvious example, merely distributing a circumvention tool suffices on its face to violate § 1201(a)(2) irrespective of whether that tool is ever actually employed in a manner that results in copyright infringement.
  2. See, e.g., Storage Tech. Corp. v. Custom Hardware Eng’g & Consulting, Inc., 431 F.3d 1374 (Fed. Cir. 2005) (permission to copy plaintiff’s software was implicit in the licensing agreement); Chamberlain Group, Inc. v. Skylink Techs., Inc., 381 F.3d 1178 (Fed. Cir. 2004) (finding no proof of connection between the circumvention device and the protections afforded by copyright law); Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522 (6th Cir. 2004) (Copyright Act provided implied authorization for users to copy unencrypted program code). See infra Part II.B.2.
  3. See 17 U.S.C. § 107 (2006).
  4. See infra notes 230-244 and accompanying text.