C:\Files\Work Computer\Courses\Munich\Sunmer 2015\Materials\Law-Of-Software-Contracts-Materials-2015-FINAL.Wpd

Total Page:16

File Type:pdf, Size:1020Kb

C:\Files\Work Computer\Courses\Munich\Sunmer 2015\Materials\Law-Of-Software-Contracts-Materials-2015-FINAL.Wpd THE LAW OF SOFTWARE CONTRACTS : CASES AND MATERIALS Gregory E. Maggs Professor of Law The George Washington University Law School Prepared for the Munich Intellectual Property Law Summer Program First Session (June 29-July 10, 2015) ASSIGNMENT FOR FIRST CLASS: Please read the course syllabus (next page) and pages 1-19 of these materials. LAW OF SOFTWARE CONTRACTS COURSE SYLLABUS 1. Coverage of the Course . This course will cover seven important topics arising out of the sale of computer software. These topics are: (1) whether sales of software should be viewed as contracts for the sale of goods; (2) the extent to which contracts allowing the use of software also, or alternatively, should be viewed as merely copyright licenses; (3) the extent to which copyright law may restrict terms in software contracts; (4) the validity of forming software contracts using “shrink wrap” and “click wrap”; (5) the legal status of open source public licenses; (6) the enforceability of limitations on the buyer’s remedies in software contracts; and (7) the permissibility of self-help remedies against software buyers (e.g., remotely disabling computer programs). 2. Prerequisites . This course has no prerequisites. It also does not impermissibly overlap in coverage with any other course. Therefore, all students may take this course and any subsequent course, including Copyright Law. 3. Meeting Times. This course is offered during the first session of the Munich Intellectual Property Summer Program. The course will meet from 9:00 a.m. to 10:40 a.m. on Monday-Thursday during the first week (June 29-July 2) and Monday-Wednesday during the second week (July 6-8). 4. Office Hours and Contact Information . I will generally be available to answer questions both immediately before class and after class. In addition, you may contact me by email at [email protected]. 5. Reading Assignments . We will read these materials in order from start to finish. For the first class, please read pages 1-19. I will announce how far to read for each subsequent class. Please come to class prepared to discuss the reading. 6. Final Examination . On Friday, July 10, at 9:00 a.m. (unless the schedule changes) you will be given a 1-hour open-book final examination. You may consult any written materials when taking the examination. The examination will consist of short essay questions pertaining to the material covered in class. For practice, please see Appendix B, which contains two past final examinations and their grading guides. TOPICS 1. Viewing Software Contracts as Contracts for the Sale of Goods . 1 Neilson Business Equipment Center v. Monteleone . 2 Advent Systems v. Unisys Corp. ....................... 3 2. Viewing Software Contracts as Copyright Licenses ............ 7 A. Application of Copyright Law to Software . 7 B. Licenses to Use Copyrighted Software . 8 Microsoft Office End User License Agreement . 10 Geoscan, Inc. of Texas v. Geotrace Technologies, Inc. .... 12 MAI Systems Corp. v. Peak Computer, Inc. ............. 14 DSC Communications Corp. v. Pulse Communications, Inc. 19 C. Application of the First Sale Doctrine to Software ......... 26 Vernor v. Autodesk, Inc. ............................ 27 Action Tapes, Inc. v. Mattson ........................ 39 D. Fair Use Doctrine and Software Licenses . ........ 40 Wall Data Inc. v. Los Angeles County Sheriff’s Dept. ..... 41 3. How Copyright Law May Restrict Terms of Software Contracts . 50 A. Copyright Preemption of Contract Terms . .... 50 National Car Rental System v. Computer Associates Int’l. 52 Davidson & Associates v. Jung ...................... 58 B. Misuse of Copyright ............................ 64 Lasercomb America, Inc. v. Reynolds ................. 65 Atari Games Corp. v. Nintendo of America, Inc. ......... 73 Alcatel USA, Inc. v. DGI Technologies ................ 79 Apple Inc. v. Psystar Corp . ......................... 82 4. Shrink Wrap and Click Wrap Software Licenses . ........... 92 ProCD, Inc. v. Zeidenberg .......................... 92 Specht v. Netscape Communications Corp. ............ 104 People ex rel. Spitzer v. Direct Revenue, LLC .......... 110 5. Public Licenses and Open Source Software . ........ 118 Testimony of Carol A. Kunze on Behalf of Red Hat, Inc. ... 120 The GNU General Public License (GPL) . 122 Harald Welte v. *** Deutschland GmbH ................ 126 Wallace v. International Business Machines Corp. ........ 126 Computer Associates International v. Quest Software ...... 130 6. Limitations on the Buyer’s Remedies . .......... 132 Chatlos Systems v. National Cash Register .............. 132 RRX Industries, Inc. v. Lab-Con, Inc. ................... 135 Piper Jaffray & Co. v. SunGard Systems Intern. .......... 138 7. Self-Help Remedies in Software Contracts . .......... 143 Franks & Sons, Inc. v. Information Solutions, Inc. ......... 144 American Computer Trust Leasing v. Jack Farrell Imp. Co. 146 Clayton X-Ray Co. v. Professional Sys. Corp. ............ 149 APPENDICES A. Selected Provisions of the U.S. Copyright Law . ............ 152 B. Past Final Examinations and their Grading Guides ........... 159 TOPIC 1 VIEWING SOFTWARE CONTRACTS AS CONTRACTS FOR THE SALE OF GOODS When you buy software, like a word processing program or a computer game, you generally agree to contractual terms. These terms may limit your ability to copy, use, or resell the software, they may restrict your remedies if the software is defective, they may give the producer or vendor of the software various rights if you fail to pay, and so forth. If disagree- ments arise about the effect or enforceability of these terms, an immediate question is: What law governs the dispute? These materials address this question, covering many of the most important topics. Further information about the law of software contracts can be found in a variety of sources, some dealing with contract law and others dealing with copyright law. One of the most comprehensive reference works is a one- volume treatise by the American Law Institute (the organization which has produced the famous Restatements of the Law) called Principles of the Law of Software Contracts (2010). These materials cite the Principles on numerous topics. The complete text of the Principles is available through WestLaw and also through HeinOnline to which many university libraries subscribe. ___________________ ARTICLE 2 OF THE UNIFORM COMMERCIAL CODE In the United States, almost all courts now agree that article 2 of the Uniform Commercial Code is one of the laws that governs software contracts. Article 2 is a model law adopted in 49 states and various federal territories to govern contracts for the sale of goods. Article 2 defines goods as “things movable at the time of identification to the contract.” U.C.C. 2- 105(1). The following two cases show the reasoning that courts have used in deciding that software falls within this definition. The first case addresses a situation in which software is sold together with a computer. The second case concerns software sold by itself, a more difficult issue. —————————— 1 2 LAW OF SOFTWARE CONTRACTS NEILSON BUSINESS EQUIPMENT CENTER , INC . V. MONTELEONE 524 A.2d 1172 (Del. 1987) [Seller Neilson Business Equipment Center, Inc. (Neilson) agreed to supply a computer system to Dr. Italo V. Monteleone. Under the contract, the computer system would come with installed software that would automate Dr. Monteleone’s recordkeeping. When the software did not work as anticipated, Dr. Monteleone sued Neilson for breach of implied warranties under article 2 of the Uniform Commercial Code. Neilson argued that article 2 did not apply to the sale of software because a sale of software is not a sale of goods.] Neilson urges us to separate the contract into three distinct subparts- hardware, software and services. Defendant contends that only the hardware can be classified as “goods” under the Code, that there was nothing defective about the hardware, and thus plaintiff’s claims for breaches of implied warranties fail. Neilson further argues that software is an intangible, and that intangibles do not constitute “goods” subject to the Code. That argument is innovative, but unpersuasive. Neilson contracted to supply a turn-key computer system; that is, a system sold as a package which is ready to function immediately. The hardware and software elements are combined into a single unit—the computer system—prior to sale. The trial court’s factual conclusion that the computer system is predominantly “goods” is supported by substantial evidence. Dr. Monte- leone did not intend to contract separately for hardware and software. Rather, he bought a computer system to meet his information processing needs. Any consulting services rendered by Neilson were ancillary to the contract, and cannot reasonably be treated as standing separately to escape the implied warranties of the Uniform Commercial Code. Notes 1. Two Ways to Buy Software. This case involves a very common situation. Most new computers are sold with both an operating system and other programs already installed. But some software, like a computer game, is usually sold separately and installed by the user of the computer. 2. Problem. Suppose you buy a new laptop computer on sale for $595. The laptop comes with Microsoft Windows and Microsoft Office already installed. Buying these two software packages separately for installation onto a computer that you already own would cost more than $595. (The idea that buying the software separately is more expensive than buying a TOPIC 1 : SOFTWARE CONTRACTS AS SALES OF GOODS 3 computer already loaded with the software may seem odd, but it is not uncommon.) Would article 2 apply to your purchase of the computer under the rationale in Neilson ? —————————— ADVENT SYSTEMS LTD . V . UNISYS CORP . 925 F.2d 670 (3d Cir. 1991) WEIS, Circuit Judge. [Advent Systems Limited sued Unisys Corporation for breach of contract, claiming that Unisys promised to pay Advent System to develop document management software and then repudiated that promise. Unisys defended on grounds that the alleged promise to pay for the software was not enforceable because it was not evidenced by a sufficient signed writing, as required by the “statute of frauds” provision in U.C.C.
Recommended publications
  • The Need for Software Innovation Policy
    THE NEED FOR SOFTWARE INNOVATION POLICY CHRISTOPHER RILEY This paper examines the current legal treatment of software innovation. It argues that recent judicial standards for the regulation of software innovation do not adequately protect innovation. It presents an original standard for the regulation of software innovation, one intended to guide judicial decisions in contributory copyright liability, in interpretations of the Digital Millennium Copyright Act, and in every courtroom where a developer is on trial for the mere creation and distribution of software. The standard presented in this paper separates the questions of liability and remedy in order to produce an optimal dynamic balance of interests. Ph.D., Computer Science, Johns Hopkins University, 2004; J.D. expected, Yale Law School, 2007. I would like to thank Professor Jack Balkin, James Grimmelmann, Eddan Katz, and the attendees of the Yale/Harvard Cyberscholar Working Group for their helpful comments. 589 590 J. ON TELECOMM. & HIGH TECH. L. [Vol. 5 I. INTRODUCTION ............................................................................... 591 II. WHY MUST WE PROTECT SOFTWARE INNOVATION AND HOW IS IT AT RISK?........................................................................ 596 A. Why is Software Innovation Different from Other Forms of Innovation? ................................................................ 596 B. Why is Software Innovation Valuable?..................................... 598 C. What Will We Lose if We Do Not Protect Software Innovation Adequately?............................................................
    [Show full text]
  • BLIZZARD ENTERTAINMENT, INC. V. JUNG 422 F.3D 630 (8Th Cir. 2005)
    BLIZZARD ENTERTAINMENT, INC. v. JUNG 422 F.3d 630 (8th Cir. 2005) SMITH, Circuit Judge. Davidson & Associates, Inc. d/b/a Blizzard Entertainment ("Blizzard") and Vivendi Universal Games, Inc. ("Vivendi"), owner of copyrights in computer game software and online gaming ser- vice software sued Ross Combs ("Combs"), Rob Crittenden ("Crittenden"), Jim Jung ("Jung"), and Internet Gateway, Inc. ("Internet Gateway") (collectively referred to as "Appellants"), for breach of contract, circumvention of copyright protection system, and trafficking in circumvention technolo- gy. Both parties moved for summary judgment. The district court granted summary judgment in fa- vor of Blizzard and Vivendi, and determined that: (1) Blizzard's software end-user license and terms of usage agreements were enforceable contracts; (2) Appellants waived any "fair use" defense; (3) the agreements did not constitute misuse of copyright; and (4) Appellants violated the anti- circumvention and anti-trafficking provisions of the Digital Millennium Copyright Act ("DMCA"). We affirm. [*633] I. Background A. Factual Background Blizzard, a California corporation and subsidiary of Vivendi, creates and sells software games for personal computers. This appeal concerns the particular Blizzard games "StarCraft," "StarCraft: Brood War," "WarCraft II: Battle.net Edition," "Diablo," and "Diablo II: Lord of Destruction." Combs and Crittenden are computer programmers, Jung is a systems administrator, and Internet Gateway is an Internet service provider based in St. Peters, Missouri. Jung is also the president, co- owner, and day-to-day operator of Internet Gateway. In January 1997, Blizzard officially launched "Battle.net," a 24-hour online-gaming service available exclusively to purchasers of its computer games. The Battle.net service has nearly 12 mil- lion active users who spend more that 2.1 million hours online per day.
    [Show full text]
  • Rethinking Anticircumvention's Interoperability Policy
    Case Western Reserve University School of Law Scholarly Commons Faculty Publications 2009 Rethinking Anticircumvention's Interoperability Policy Aaron K. Perzanowski Case Western University School of Law, [email protected] Follow this and additional works at: https://scholarlycommons.law.case.edu/faculty_publications Part of the Intellectual Property Law Commons Repository Citation Perzanowski, Aaron K., "Rethinking Anticircumvention's Interoperability Policy" (2009). Faculty Publications. 44. https://scholarlycommons.law.case.edu/faculty_publications/44 This Article is brought to you for free and open access by Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. Rethinking Anticircumvention’s Interoperability Policy Aaron K. Perzanowski* Interoperability is widely touted for its ability to spur incremental innovation, increase competition and consumer choice, and decrease barriers to accessibility. In light of these attributes, intellectual property law generally permits follow-on innovators to create products that interoperate with existing systems, even without permission. The anticircumvention provisions of the Digital Millennium Copyright Act (“DMCA”) represent a troubling departure from this policy, resulting in patent-like rights to exclude technologies that interoperate with protected platforms. Although the DMCA contains internal safeguards to preserve interoperability, judicial misinterpretation and narrow statutory text render those safeguards largely ineffective. One approach to counteracting the DMCA’s restrictions on interoperability is to rely on antitrust scrutiny and the resulting mandatory disclosure of technical information. However, both doctrinal and policy considerations suggest that antitrust offers a less than ideal means of lessening the DMCA’s impact on interoperability.
    [Show full text]
  • I SUMMARY of the CASE and REQUEST for ORAL ARGUMENT
    SUMMARY OF THE CASE AND REQUEST FOR ORAL ARGUMENT Appellants Internet Gateway, Inc., Tim Jung, Ross Combs and Rob Crittenden (“Appellants”) seek to overturn the District Court’s entry of summary judgment in favor of Appellees Davidson & Associates, Inc., D.B.A. Blizzard Entertainment,1 and Vivendi Universal Games, Inc. (“Blizzard”), and denial of summary judgment for Appellants. There is no dispute between the parties concerning material facts, and the appeal concerns application of law to the facts. Application of the Digital Millennium Copyright Act (“DMCA”) to the facts of this case fully supports affirmance of Appellants’ violation of the DMCA’s anti- circumvention and anti-trafficking provisions, and Appellants’ ineligibility for any exemption thereto. Application of the well-established law of contracts and copyright preemption fully supports affirmance of the finding that Appellants breached their binding agreements with Blizzard not to reverse engineer or take other steps which they admittedly did in the development, use and distribution of their circumvention device. Blizzard requests thirty minutes for oral argument per side. 1 On December 3, 2004, Blizzard Entertainment was separately incorporated as Blizzard Entertainment, Inc., a Delaware corporation. i CORPORATE DISCLOSURE STATEMENT Appellees, Davidson & Associates, Inc., d/b/a Blizzard Entertainment, and Vivendi Universal Games, Inc., pursuant to Rule 26.1, F.R.A.P., and Eighth Circuit Rule 26.1A, disclose the following information: 1. All parent corporations: Vivendi Universal Publishing Acquisition Company, Vivendi Communications North America, Inc., Vivendi Universal S.A. 2. All publicly held companies owning 10% or more of Appellees’ stock: Vivendi Universal S.A. ii TABLE OF CONTENTS SUMMARY OF THE CASE AND REQUEST FOR ORAL ARGUMENT..……..i CORPORATE DISCLOSURE STATEMENT…………………………..…...…....ii TABLE OF CONTENTS..…………….……………………….…….……….…...iii TABLE OF AUTHORITIES..…………………………………………….…..…...vi STATEMENT OF THE ISSUES........................................................................
    [Show full text]
  • Davidson & Associates, Doing Business As Blizzard Entertainment
    Davidson & Associates, doing business as Blizzard Entertainment, Inc.; Vivendi Universal, Inc., Plaintiffs-Appellees, v. Tim Jung, an individual; Rob Crittenden, De- fendants - Appellants, Intellectual Property Law Professors, Amicus Curiae, Inter- net Gateway, Defendants - Appellants, Computer & Communications Industry As- sociation; Open Source & Industry Alliance; Consumers Union; Public Knowledge; Intellectual Property Law Professors; The Institute of Electrical and Electronics En- gineers, Inc., Amici on Behalf of Appellants, Entertainment Software Association; Recording Industry Association of America; Motion Picture Association of America, Incorporated; Data Tree, LLC; First American Real Estate Solutions, LLC; Reed Elsevier, Inc. Twenty-Second Century Foundation, Inc.; Software & Information Industry Association, Amici on Behalf of Appellees. No. 04-3654 UNITED STATES COURT OF APPEALS FOR THE EIGHTH CIRCUIT 422 F.3d 630; 2005 U.S. App. LEXIS 18973; 76 U.S.P.Q.2D (BNA) 1287; Copy. L. Rep. (CCH) P29,043 June 20, 2005, Submitted September 1, 2005, Filed SMITH, Circuit Judge. Davidson & Associates, Inc. d/b/a Blizzard Entertainment ("Blizzard") and Vivendi Universal Games, Inc. ("Vivendi"), owner of copyrights in computer game software and online gaming service software sued Ross Combs ("Combs"), Rob Crittenden ("Crittenden"), Jim Jung ("Jung"), and Internet Gateway, Inc. ("Internet Gateway") (collec- tively referred to as "Appellants"), for breach of contract, circumvention of copyright protection system, and trafficking in circumvention technology. Both parties moved for summary judgment. The district court granted summary judgment in favor of Blizzard and Vivendi, and determined that: (1) Blizzard's software end-user license and [**4] terms of usage agreements were enforceable contracts; (2) Appellants waived any "fair use" defense; (3) the agreements did not consti- tute misuse of copyright; and (4) Appellants violated the anti-circumvention and anti-trafficking provisions of the Digi- tal Millennium Copyright Act ("DMCA").
    [Show full text]
  • Diablo 2 Windows 7 Fog.Dll
    Diablo 2 windows 7 fog.dll click here to download Category: Diablo 2 Expansion Windows XP, Vista, 7 - C:\Windows\System32 version of Windows, you should also copy www.doorway.ru to C:\Windows\SysWOW64\. plz fix asap i have toons expiring soon that i cant afford to loose with d2 until finally the update downloaded every thing works fine now on windows 7. I think a The file "C:\Program Files\Diablo II\www.doorway.ru" could not be www.doorway.ru II a issue. Tried every compatibility mode Win7 has (I previously didn't have to use www.doorway.ru in the Diablo 2 directory, run the video detect, select Glide mode. When www.doorway.ru needed for Diablo 2 gets corrupted or www.doorway.ru is missing from The installation of the game Fifa 15 on a Windows 7 PC of a client. Windows 8 · Windows 7 Ultimate www.doorway.ru, Diablo II Developed www.doorway.ru, kb. www.doorway.ru ijldll, Intel® JPEG Library - Retail Version, , kb. Copying the www.doorway.ru library into the program's installation. And to be a bit more complete, www.doorway.ru is an even more general and saving save files which in the end requires specific calls to windows. Thus. every time i go to play diablo 2 it says "The ordinal could not be located in the dynamic link library www.doorway.ru" i don't know what this means. Diablo II is an action role-playing hack and slash video game developed by Blizzard North Windows NT® (3Dfx Interactive, Inc.
    [Show full text]
  • The Affects of Open Source Software Licenses on Business Software
    Project Number: 48-KJR-COP5 The Affects of Open Source Software Licenses on Business Software An Interactive Qualifying Report Submitted to the Faculty of the Worcester Polytechnic Institute in partial fulfillment of the requirements for the Degree of Bachelor Science by Devin Kelly Greg Holtorf Date: March 6, 2009 Professor Kent J. Rissmiller, Advisor 1 1 Abstract This project investigates open and closed source licenses and how each style of license changes the way business is done. We look at: license violations and consider techniques for reducing violations, why businesses use closed source and open source licenses, and the intellectual property rights businesses and individuals have in open source licenses. We show that open licenses are easier to enforce, but require a different business model and show how piracy can be effectively reduced. 2 Contents 1 Abstract 2 2 Introduction 4 3 Background 5 3.1 OpenSource ...................................... 12 4 Software License Enforceability 21 4.1 ClosedSource.................................... 24 4.2 OpenSource ...................................... 28 5 License Restrictiveness and Software Quality 30 5.1 ClosedSource.................................... 32 5.2 OpenSource ...................................... 34 6 Licenses and Software Usage 35 7 Source Code Ownership 39 7.1 ClosedSourceOwnership . ...... 39 7.2 OpenSourceOwnership ............................. ..... 40 7.3 Business Licenses and Open Source Ownership . ........... 41 8 Digital Rights Management as a Response to Piracy 42 8.1 The effects of Digital rights Management . ........... 42 8.2 SoftwareasaService.............................. ...... 45 8.3 ReducingPiracy .................................. 45 9 Software Piracy Rates 48 9.1 PiracyratesbycountryandIndustry. .......... 48 9.2 LicensingandPiracyRates . ....... 51 10 Open Source and Business 52 10.1 WhatBusinessesuseSoftware. ......... 52 10.2 WhereisOpenSourceSuccessful . ......... 53 10.3 CommissionedSoftware andOpenSource .
    [Show full text]
  • Blizzard End User Licence Agreement
    Blizzard End User Licence Agreement Sauncho is unfitly cryptogenic after dusty Hasheem psychologize his Brooke boundlessly. Potential and redivivus Wilmar still regrind his kimberlite disappointedly. Erasmus still integrated clinically while arilloid Bishop rosin that Elsan. Licensee agrees to eliminate or end user agreement Merchantability or a blizzard end user licence agreement on this article be based on their counterclaim should not dispute resolution is loaded onto battle for. It can blizzard end users via electronic equivalent of agreements can almost anything you signed by user license? Linden dollar is responsible for copyright already there is just like many of. User license to determine if they are governed by blizzard end user licence agreement allow others make money, inc products liability. Eula and all copies of title is a a blizzard end user licence agreement, the above copyright act preempts state that blizzard to gather gold spammer to. As activision and twitter account for cd key when you should have while the eula that the product including any blizzard end user licence agreement changes. Know whether blizzard won a licence usually makes within a game as blizzard end user licence agreement remains inconsistent in. Blizzard own machine, system has obtained permission to the informative and soul into my overwatch players has been executed and end agreement to the name, rather than a trademark. Even were they permissible considerations in this case, however, they would not persuade us to adopt an infringement nexus requirement. By end changes to a virtual game stores: basic caricature of end user agreement. There came also lost lot is people, like Jonathan, who and now without too move to justify owning a gaming PC.
    [Show full text]
  • Comment Submitted by Christopher Soghoian
    NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Fall 2007 VOL. 6, NO. 1 © 2007 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Electronic copy available at: http://ssrn.com/abstract=1032225 Copyright 2007 by Northwestern University School of Law Volume 6, Number 1 (Fall 2007) Northwestern Journal of Technology and Intellectual Property Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them By Christopher Soghoian* I. INTRODUCTION ¶1 This paper focuses on the subsidization of a technology-based durable good.1 It goes on to discuss the delicate dance between the producer trying to protect its profit, competitors trying to create and sell aftermarket goods,2 and those innovative customers who use the items in completely unplanned and unprofitable ways. ¶2 An age old, but increasingly popular business model involves the subsidization of a proprietary durable good by a manufacturer, such that the good is sold below cost.3 Due to careful design, technological, and legal restrictions, the producer creates a primary product that is only compatible with its own aftermarket goods. It is through the sale of these proprietary aftermarket products that the producer is able to recoup its initial investment. An example of this business model may be seen with the free inkjet printers that are included with the cost of a new computer but which require proprietary ink refill cartridges that are sold at a significant markup. This business model is typically referred to as the razor and blade model, although this term is a somewhat imperfect description.4 However, since this term is in common use, this paper will continue to use it to refer to this business model.
    [Show full text]
  • Summary Judgment Response.DOC
    IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF MISSOURI EASTERN DIVISION DAVIDSON & ASSOCIATES, INC., D.B.A. ) BLIZZARD ENTERTAINMENT, and ) VIVENDI UNIVERSAL GAMES, INC., ) ) Plaintiffs, ) ) v. ) Case No. 4:02CV498 CAS ) INTERNET GATEWAY, INC., TIM JUNG, ) an individual, ROSS COMBS, an individual, ) and ROB CRITTENDEN, an individual, ) ) Defendants. ) PLAINTIFFS’ MEMORANDUM IN OPPOSITION TO DEFENDANTS’ MOTION FOR SUMMARY JUDGMENT TABLE OF CONTENTS Page TABLE OF AUTHORITIES ........................................................................................................ i INTRODUCTION......................................................................................................................... 1 ARGUMENT................................................................................................................................. 2 I. The Fair Use Defense Does Not Excuse Defendants’ Copyright Violations................ 2 A. The Bnetd Emulator is Not Transformative............................................................ 2 B. Even if Applicable, the Limited Fair Use Defense Does Not Excuse Defendants’ Infringement in Their Finished Product.................................................................. 4 C. There is No Question that Defendants’ Final Product Contains Copyrighted Files Stolen From Blizzard. ............................................................................................. 5 1. The Bnetd emulator contains icons appropriated by defendants. ............... 5 2. Blizzard’s
    [Show full text]
  • DAVIDSON & ASSOCIATES, Doing Business As Blizzard Entertainment, Inc. V. Tim JUNG. 422 F.3D 630 United States Court of Appe
    DAVIDSON & ASSOCIATES, doing business as Blizzard Entertainment, Inc. v. Tim JUNG. 422 F.3d 630 United States Court of Appeals, Eighth Circuit. Filed: September 1, 2005. 7 SMITH, Circuit Judge. 8 Davidson & Associates, Inc. d/b/a Blizzard Entertainment ("Blizzard") and Vivendi Universal Games, Inc. ("Vivendi"), owner of copyrights in computer game software and online gaming service software sued Ross Combs ("Combs"), Rob Crittenden ("Crittenden"), Jim Jung ("Jung"), and Internet Gateway, Inc. ("Internet Gateway") (collectively referred to as "Appellants"), for breach of contract, circumvention of copyright protection system, and trafficking in circumvention technology. Both parties moved for summary judgment. The district court granted summary judgment in favor of Blizzard and Vivendi, and determined that: (1) Blizzard's software end-user license and terms of usage agreements were enforceable contracts; (2) Appellants waived any "fair use" defense; (3) the agreements did not constitute misuse of copyright; and (4) Appellants violated the anti-circumvention and anti-trafficking provisions of the Digital Millennium Copyright Act ("DMCA"). We affirm. I. Background A. Factual Background 11 Blizzard, a California corporation and subsidiary of Vivendi, creates and sells software games for personal computers. This appeal concerns the particular Blizzard games "StarCraft," "StarCraft: Brood War," "WarCraft II: Battle.net Edition," "Diablo," and "Diablo II: Lord of Destruction." Combs and Crittenden are computer programmers, Jung is a systems administrator, and Internet Gateway is an Internet service provider based in St. Peters, Missouri. Jung is also the president, co-owner, and day-to-day operator of Internet Gateway. 12 In January 1997, Blizzard officially launched "Battle.net," a 24-hour online-gaming service available exclusively to purchasers of its computer games.
    [Show full text]
  • Interpreting Chamberlain's Reasonable Relation Between Access and Infringement in the Digital Millennium Copyright Act 2008 B.C
    Boston College Intellectual Property & Technology Forum http://www.bciptf.org INTERPRETING CHAMBERLAIN'S “REASONABLE RELATION” BETWEEN ACCESS AND INFRINGEMENT IN THE DIGITAL MILL Zoe Argento I. INTRODUCTION Seven years have passed since Congress enacted the Digital Millennium Copyright Act (DMCA), the statute which makes circumventing technological barriers to copyrighted works illegal. [1] In the meantime, the DMCA has been widely criticized, and, within the last two years, undergone a major change in interpretation by the Federal Circuit in Chamberlain Group, Inc. v. Skylink Technologies, Inc. [2] In Chamberlain, concerned that the DMCA had created an entirely new property right, the Federal Circuit added a new limitation to the scope of the DMCA. Chamberlain held that a plaintiff must prove a “reasonable relation” between access to a copyrighted work and infringement. What this “reasonable relation” means however, has yet to be defined. The nature of the “reasonable relation” test goes to the heart of the DMCA and its impact on innovation. If the “reasonable relation” between access and infringement is too broad, the DMCA will stifle many ideas which build on protected works, because the public will be prevented from accessing works for the purpose of creating improved versions and interoperable products. Innovation depends in large measure upon building on the works of others. As Sir Isaac Newton famously said, “If I have seen farther than others, it is because I have stood upon the shoulders of giants.” [3] On the other hand, if the “reasonable relation” is too narrow, then the DMCA would prohibit too little access. Creative works in digital formats would be subject to massive piracy.
    [Show full text]