Music Industry V. File-Sharing Why We Need a New Approach to Copyright Protection in the Digital Era

Total Page:16

File Type:pdf, Size:1020Kb

Music Industry V. File-Sharing Why We Need a New Approach to Copyright Protection in the Digital Era Music Industry v. File-Sharing Why We Need a New Approach to Copyright Protection In the Digital Era By Coralie Hélène Pasche A thesis submitted in conformity with the requirements for the degree of Master of Laws Graduate Department of the Faculty of Law University of Toronto © Copyright by Coralie Hélène Pasche 2009 Music Industry v. File-Sharing Why We Need a New Approach to Copyright Protection In the Digital Era Coralie Hélène Pasche Master of Laws 2009 Graduate Department of the Faculty of Law University of Toronto Abstract This thesis examines the evolution of digital copyright protection in response to the digital challenges, specifically unauthorized file-sharing, in the context of the music industry. It reviews the different strategies used to fight the peer-to-peer technology and its users so as to assess whether the direction which has been taken is in agreement with the ultimate goal of copyright and with other fundamental values of our modern society. It posits that the effort to strengthen the rights of copyright holders and thus maintain an old system of distribution in the face of new technology not only runs afoul the expectations of the public but also prevents the artists and the public from fully taking advantage of the new opportunities of the digital era. This thesis ultimately suggests that policy makers tackling the digital copyright reform should seriously consider legitimizing the use of file-sharing services as a possible way to better achieve the goals of copyright. ii Table of Contents Introduction……………………………………………………………………………………...1 Chapter 1 Internet and the Digital Threat to Copyright…………………………………8 Chapter 2 Copyright’s Purposes and Underpinning Theories………………………...11 2.1. Justifications for Copyright……………………………………………………......11 2.2. Necessary Distinction between the Different Interests………………………...16 Chapter 3 International Response to the Digital Threat: The WIPO Treaties……….21 3.1. Underlying Policies of WIPO Treaties……………………………………………21 3.2. New Legal Framework for Copyright in Digital Environment……………….....22 Chapter 4 American and European Implementations of the WCT TPMS and Anti-Circumvention Measures…………………………………..25 Chapter 5 Combat against File-Sharing…………………………………………………33 5.1. The Fight against P2P Services………………………………………………….33 5.2. The Fight against Individuals……………………………………………………..39 5.3. ISPs as Copyright Police………………………………………………………….42 Chapter 6 Challenges to the Copyright Paradigm……………………………………...47 Chapter 7 Framework for a New Approach……………………………………………..53 7.1. Networked Information Society, Decentralization and Missed Opportunities..53 7.2. Necessary Shift in the Approach towards Piracy……………………………….57 7.3. Cultural Trend towards Piracy: The Combination of Factors………………….59 7.4. Crucial Elements for a Better System……………………………………………65 Conclusion……………………………………………………………………………………..70 Bibliography iii 1 Introduction The music recording industry has spent a great deal of time in the past two decades attempting to educate its consumers about ‘piracy’ and the notion that copying and sharing copyrighted music files on the Internet is indeed ‘piracy’. Unauthorized file- sharing has been blamed as the primarily cause for the decline in the music sales and has been described as a major threat to creativity.1 Each year the International Federation of the Phonographic Industry (IFPI), which represents the music recording industry worldwide, publishes the annual results of each national music industry.2 In June 2008, The Times Newspaper ran the headline, “Music Sales Fall to their Lowest Level in over Twenty Years.”3 With an 8% annual loss, global music sales were thus reported to have declined to the tune of $19.4 billion despite the drastic increase in digital distribution.4 In fact, the presentation of annual results by the music recording 1 John Kennedy, Chairman& Ceo of the IFPI declared “[o]ur industry is fighting piracy to protect creativity in music”, see IFPI, Piracy Report 2006, online: IFPI <http://www.ifpi.org/content/library/piracy-report 2006.pdf> [IFPI, “Piracy Report 2006”]. 2IFPI, Recorded Music Reports, (2000-2008), online: IFPI <http://www.ifpi.org/content/ section_statistics/index.html> [IFPI, “Recorded Music Reports 2000-2008”]. 3 Sabbagh Dan, “Music Sales Fall to their Lowest Level in Over Twenty Years” The Times (18 June 2008), online: Times Online <http://business.timesonline.co.uk/tol/business/Industry_sectors /media/article4160 553.ece> [Sabbagh, “Music Sales Fall”]; the New York Times reports the same result. John Kennedy indicates that there were 30 billions illegal downloads in 2007, with 39% of teenagers in the US using file-sharing networks, see “CD sales falling faster than digital music sales rise” International Herald Tribune (18 June 2008), online: International Herald Tribune: <http://www.iht.com/articles/2008/06/18/ technology /music.php> 4 Ibid. From 2004 to 2007, the record company revenues from digital sales have increased from $US 380 to $US 2.9 billion, which represents about 15 per cent of the global market sales; in 2008, these revenues have increased to $US 3.7 billions representing 25 per cent of the global marker, see IFPI, Digital Music Report, (2006), online: IFPI <http://www.ifpi.org/content/library/digital-music-report- 2006.pdf> [IFPI, “Digital Music Report 2006”]; IFPI, Digital Music Report, (2007), online: IFPI <http://www.ifpi.org/content/library/digital-music-report-2007.pdf> [IFPI, “Digital Music Report 2007”]; IFPI, Digital Music Report, (2008), online: IFPI <http://www.ifpi.org/content/library/dmr2008.pdf> [IFPI, “Digital Music Report 2008”]; IFPI, Digital Music Report, (2009), online: IFPI <http://www.ifpi.org/content/library/DMR2009.pdf> [IFPI, “Digital Music Report 2009”]. 2 industry is misleading. The global trade value indicated by the IFPI amounted to $US 19’587 in 2006 and to $US 19’405 in 2007.5 This is actually a decline of less than 1%. The 8% decline indicated by the IFPI in its 2007 report represented the global average variation in the annual sales of the different countries.6 Given the varying size of different national markets, this percentage cannot simply be translated into the same percentage of global losses. Since the late 90s however the music industry has experienced a decline in sales and the industry has essentially attributed this loss to the 7 unauthorized sharing of music files on Peer-to-Peer (P2P) networks. This paper looks at the evolution of digital copyright protection in response to digital challenges, specifically unauthorized file-sharing, undertaken under the impetus of the entertainment industries -foremost the major music recording companies,8 and questions whether the direction which has been taken is in agreement with the ultimate goal of copyright and with other fundamental values of our modern society. Back in the early 90s, considering that the current legal framework was insufficient to fully protect copyright in the digital environment created by the advent of 5 IFPI, “Recorded Music Reports 2000-2008”, supra note 2. 6 Ibid. The figures published by the IFPI are challenged in many instances. I further discuss this aspect below, in Chapter 6. 7 Peer-to-peer technology is defined “… as a communication structure in which individuals interact directly, without necessarily going through a centralised system or hierarchy. Users can share information, make files available, contribute to shared projects or transfer files (OECD, 2002; Minar and Hedlund, 2001)”, OECD, Working Party on the Information Economy, Digital Broadband Content: Music, Doc. No. DSTI/ICCP/IE(2004)12/FINAL, (13 December 2005), online: OECD <http://www.oecd.org/ dataoecd/13/2/34995041.pdf> [OECD, “Music Report 2005”] at 72. P2P interactions are also defined as being “… initiated when one computer asks other personal computer whether they have a certain file. Each computer to which the search request is sent either responds or, more commonly, forwards the request on to other personal computers, each of which may pass the request onto other personal computers, and so forth.”, Akester Patricia, “Copyright and the P2P Challenge” (2005) 27(3) E.I.P.R. 106 [Akester]. 8 Waelde Charlotte & MacQueen Hector, “From Entertainment to Education: The Scope of Copyright” (2004) 3 I.P.Q. 259 [Waelde & MacQueen, “From Entertainment”] at 281, the authors argue that much of the reform of copyright law of the last 20 years has been driven by the interests of the “entertainment industry”, i.e. producers of recorded music, films and software games. 3 the Internet and the MP3 format, the entertainment industry, in particular the music recording industry, lobbied the government in an effort to extend the protection of copyright. At the international level these lobbying efforts have led to the adoption in 1996 of two Internet WIPO treaties; the WIPO Copyright Treaty (WCT) and the WIPO Performance and Phonograms Treaty (WPPT).9 The American and European implementation of these treaties, particularly their provisions regarding the protection of the technical measures, have been extensively criticized for having strengthened copyright’s protection beyond what the treaties required, pushing the copyright balance even more in favour of the owners while not reducing the level of infringements.10 These treaties and their implementations intended to respond to the lack of protection of copyright in the digital form, 11but were not particularly designed however to respond to the P2P threat which was soon going to shake the giant entertainment industry, hitting the music recording industry the hardest. Napster, the first P2P service, was launched exactly 10 years ago, in June 1999.12 Six months later more than 2 million people had downloaded the software.13 In 9WIPO Copyright Treaty of December 20, 1996, online: WIPO <http://www.wipo.int/treaties/en/ip/wct/> [WCT]; WIPO Performances and Phonograms Treaty of December 20, 1996, online: WIPO <http://www.wipo.int/treaties/en/ip/wppt/> [WPPT]. The WCT treaty has been now ratified by 70 countries, see WCT treaty, contracting parties, online: WIPO <http://www.wipo.int/treaties >. 10 I further discuss the main criticisms which have been formulated against these legislations below, in Chapter 4.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Grayzone Digest
    3rd QUARTER 2009 DIGEST The Digest Covering Anti-Piracy Operations and Related Topics Visit GrayZone online http://www.grayzone.com for late-breaking news!! HEADLINE NEWS RIAA DEFEATS USENET IN COURT The Recording Industry Association of America (RIAA) has prevailed in its copyright fight against Usenet.com, according to court documents. On June 30, 2009, in a decision that hands the RIAA an overwhelming victory, U.S. District Judge Harold Baer of the Southern District of New York ruled in favor of the music industry. Judge Baer agreed with the RIAA's claim that Usenet.com is guilty of direct, contributory, and vicarious infringement. In addition, Judge Baer said that Usenet.com could not claim protection under the famous Sony Betamax decision. The Betamax ruling set the precedent that companies cannot be held liable for contributory infringement if the device they create is "capable of significant non- infringing uses." Judge Baer noted that in citing the Sony Betamax case, Usenet.com failed to see one important difference between itself and Sony. Once Sony sold a Betamax, an early videotape recorder, the company's relationship with the buyer ended. Sony held no influence over what the buyer did with the device after that. Usenet.com, however, maintains an ongoing relationship with the customer and does have some say in how the customer uses the service. The two-decade-old Usenet network was one of the early ways to distribute conversations and binary files, long before today’s Internet and peer-to-peer networks existed. Usenet.com is a company that enabled users to access the Usenet network.
    [Show full text]
  • The Freedom to Copy: Copyright, Creation, and Context
    The Freedom to Copy: Copyright, Creation, and Context Olufunmilayo B. Arewa* Although much separates them musically, George Harrison and Michael Bolton share a common legal fate. Both have been held liable in copyright infringement cases in which a court articulated theories of liability based on subconscious infringement. This Article discusses how decisions in the Bolton, Harrison, and other copyright infringement cases reflect a common failing. Such decisions highlight the incomplete nature of the theories of creativity and creation processes in copyright doctrine. After discussing current approaches to questions of creation, this Article suggests ways in which copyright theory can better incorporate a contextualized understanding of creativity and creation processes. Creativity in copyright is frequently characterized as not involving copying, which is typically thought to be antithetical to both originality and creativity. This stigmatization of copying, however, means that copyright theory cannot adequately account for the reality of not infrequent similarities between works that are a result of copying both ideas and expression in the creation of new works. This missing theoretical link has significant implications for copyright in practice. The lack of legal analysis of the full range of creativity and processes of creation is also a major reason why copyright theory often has such difficulty delineating what constitutes appropriate and inappropriate copying of existing works. * Associate Professor, Northwestern University School of Law. A.B. Harvard College; M.A. Anthropology, Ph.D. Anthropology, University of California, Berkeley; A.M. Applied Economics, University of Michigan; J.D., Harvard Law School. For their helpful comments and suggestions on earlier drafts, I am indebted to Margaret Chon, Julie Cohen, Paul Heald, Kevin Jon Heller, Andrew Koppelman, Roberta Rosenthal Kwall, Jacqueline Lipton, Andrew P.
    [Show full text]
  • A Conceptual Framework for Copyright Philosophy and Ethics Jon M
    Cornell Law Review Volume 88 Article 2 Issue 5 July 2003 Normative Copyright: A Conceptual Framework for Copyright Philosophy and Ethics Jon M. Garon Follow this and additional works at: http://scholarship.law.cornell.edu/clr Part of the Law Commons Recommended Citation Jon M. Garon, Normative Copyright: A Conceptual Framework for Copyright Philosophy and Ethics, 88 Cornell L. Rev. 1278 (2003) Available at: http://scholarship.law.cornell.edu/clr/vol88/iss5/2 This Article is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Law Review by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. NORMATIVE COPYRIGHT: A CONCEPTUAL FRAMEWORK FOR COPYRIGHT PHILOSOPHY AND ETHICS Jon M. Garont This Article explores the theoretical underpinnings of copyright to deter- mine which theories provide an appropriate basis for copyright. The Article first critiques the leading conceptual underpinnings, including naturallaw, copyright's intangible nature, economic balancing and copyright's role in creatingincentives for new authorship. The Article then addresses each of the three core elements in normative justice-the social contract, the legal rules, and the mechanisms of enforcement-to develop a schema for reestablishing a normatively valid copyright policy. The research presented demonstrates that the intangible nature of copy- right does not govern the public's attitude toward copyright. Instead, norms associated with plagiarism illustrate society's ability to accept intangible property rules, while comparison with shoplifting indicates a strong corollary to piracy involving physical goods.
    [Show full text]
  • The Right "To Authorize" in Us Copyright Law: Questions of Contributory
    87 Copyright (c) 1996 PTC Research Foundation of Franklin Pierce Law Center IDEA: The Journal of Law and Technology 1996 37 IDEA 87 THE RIGHT "TO AUTHORIZE" IN U.S. COPYRIGHT LAW: QUESTIONS OF CONTRIBUTORY INFRINGEMENT AND EXTRATERRITORIALITY PHANESH KONERU * * Third Year Student, J.D. Program, University of San Diego School of Law; Ph.D., University of Southern California, 1992; admitted to practice before the United States Patent and Trademark Office. The author is grateful to Professors Paul Horton and Darrell Bratton of the University of San Diego Law School for their helpful discussions during preparation of this manuscript. Any errors, omissions or misstatements should be attributed to the author alone. This work is dedicated to the author's parents and wife. I. INTRODUCTION The U.S. Copyright Act of 1976 n1 (hereinafter "the Copyright Act") grants copyright owners exclusive rights "to do" and "to authorize" certain acts. n2 Since the addition of the phrase "to authorize" to the copyright statute in 1976, n3 courts have been divided over the scope of the authorization right. [*88] The question has been whether a violation of the authorization right results in direct n4 or third party infringement. n5 A direct infringer is always liable to the copyright owner, whereas a third party infringer is liable only if the authorized infringement actually takes place. n6 Substantial authority argues for the proposition that the right "to authorize" is no more than a mere codification of the common law doctrines of contributory infringement and vicarious liability, identified as the "codification theory." n7 Under this theory, for an authorizer n8 to be liable, [*89] conduct that amounts to authorization should be analyzed under third party liability theories which require that the authorized infringement has actually occurred.
    [Show full text]
  • INTELLECTUAL PRIVILEGE: Copyright, Common Law, and The
    INTELLECTUAL PRIVILEGE Copyright, Common Law, and the Common Good TOM W. BELL Arlington, Virginia Founders’ Copyright 2014 by Tom Bell. (See opposite for more information.) Second printing, April 2018 Printed in the United States of America Mercatus Center at George Mason University 3434 Washington Blvd., 4th Floor Arlington, VA 22201 www.mercatus.org 703-993-4930 Library of Congress Cataloging-in-Publication Data Bell, Tom W. Intellectual privilege : copyright, common law, and the common good / Tom W. Bell. pages cm ISBN 978-0-9892193-8-9 (pbk.) -- ISBN 978-0-9892193-9-6 (e-book (kindle)) 1. Copyright--United States. I. Title. KF2994.B45 2014 346.7304’82--dc23 2014005816 COPYRIGHT NOTE Not long ago, in “Five Reforms for Copyright” (chapter 7 of Copyright Unbalanced: From Incentive to Excess, published by the Mercatus Center at George Mason University in 2012), I suggested that the United States should return to the kind of copyright the Founders supported: the one they created in their 1790 Copyright Act. The Founders’ copyright had a term of only fourteen years with the option to renew for another fourteen. It conditioned copyright on the satisfaction of strict statutory formali- ties and covered only maps, charts, and books. The Founders’ copyright protected only against unauthorized reproductions and offered only com- paratively limited remedies. This book follows through on that policy advice. The Mercatus Center and I agreed to publish it under terms chosen to recreate the legal effect of the Founders’ 1790 Copyright Act. For example, the book’s copy- right will expire in 2042 (if not before), and you should feel free to make a movie or other derivative work at any time.
    [Show full text]
  • Claiming the Copyright Amanda Reid*
    Reid FINAL COPY.docx (Do Not Delete) 7/7/2016 3:29 PM YALE LAW & POLICY REVIEW Claiming the Copyright Amanda Reid* Introduction ..................................................................................................... 425 I. Why Claim ................................................................................................... 429 II. History of Claiming ................................................................................. 434 III. Claiming Today ..........................................................................................444 IV. A Modest Proposal: Claim the Copyright .......................................... 451 Conclusion .........................................................................................................469 Introduction Our modern world is filled with a dizzying number of copyrights.1 The texts, tweets, and selfies created each day are automatically copyrighted, as are home movies, diary entries, and Play-doh® sculptures. All original works of au- thorship fixed in a tangible medium of expression are protected for seventy * Associate Professor of Law, Florida Coastal School of Law. Ph.D., University of Florida, College of Journalism and Communications, 2004; J.D., University of Florida, Levin College of Law, 2004; M.A., Florida State University, Speech Communication, 1999; B.A., Florida State University, Communication and Philosophy, 1998. Participants at the 2015 Works-in-Progress Intellectual Property Colloquium (WIPIP) provided valuable insights for which I am grateful.
    [Show full text]
  • Enclosures of the Mind: Intellectual Property from a Global Perspective
    Enclosures of the Mind: Intellectual Property from a Global Perspective Wybo Wiersma University of Groningen [email protected] A Confrontation with the Subject determination who had to reject the authori- ties of distant, uninformed powers. We must “Governments of the Industrial World, you declare our virtual selves immune to your weary giants of flesh and steel, I come from sovereignty, even as we continue to consent Cyberspace, the new home of Mind. On be- to your rule over our bodies. We will spread half of the future, I ask you of the past to leave ourselves across the Planet so that no one can us alone. You are not welcome among us. You arrest our thoughts. have no sovereignty where we gather. We will create a civilization of the Mind in We have no elected government, nor are we Cyberspace. May it be more humane and fair likely to have one, so I address you with no than the world your governments have made greater authority than that with which liberty before.” itself always speaks. I declare the global so- - From the Declaration of the Independence cial space we are building to be naturally in- of Cyberspace, by John P. Barlow, co-founder dependent of the tyrannies you seek to impose of the Electronic Frontier Foundation.1 on us. You have no moral right to rule us nor do you possess any methods of enforcement 1 Introduction we have true reason to fear. As this almost unearthly quote of J. Barlow Governments derive their just powers from suggests, cyberspace — or for many of us just the consent of the governed.
    [Show full text]
  • The Philosophy Behind Fair Use: Another Step Towards Utilitarianism
    JICLT Journal of International Commercial Law and Technology Vol.9, No.3 (2014) The Philosophy behind Fair Use: Another Step towards Utilitarianism Giovanni Tamburrini Department of Law, SolBridge International School of Business, Daejeon, South Korea [email protected] Sergey Butakov Information Systems Security Concordia University College of Alberta, Edmonton, Canada [email protected] Abstract. iParadigms, a company involved in plagiarism detection, was hold not liable for the unauthorized use and archival of students’ papers. Both the District and Appellate Courts of Virginia, in fact, maintained that the exception of fair use applied to the copyright infringement action. As the relevant facts represent a novelty in case law, it might plausible the hypothesis that iParadigms precedent is not going to be followed in forthcoming cases. This investigation is an attempt to appreciate the possibilities that such an event could happen. In particular, the attention is focused on the special nature of the Copyright Act which is simultaneously backed by opposite theoretical backgrounds such as utilitarianism and moral desert as well as personhood theories, among others. The prevailing of one theory over another shall depend on how liberally or strictly the fair use doctrine shall be interpreted. Despite findings demonstrate judges have applied the fair use doctrine according to the correct conceptions of justice, the discussion ends up recommending a new system of plagiarism detection that drastically reduces the likelihood of copyright infringement actions. 1. Introduction . The problem of plagiarism is not something new that the digital revolution has brought to education1 and to many other human activities. Yet, one cannot deny that the digitalization of life has made plagiarism much simpler: the information is just few clicks away.
    [Show full text]
  • A Reconsideration of Copyright's Term
    2 GARCIAMCCRARY 351-406 (DO NOT DELETE) 12/4/2019 6:49 PM A RECONSIDERATION OF COPYRIGHT’S TERM Kristelia A. García & Justin McCrary INTRODUCTION ..................................................................................................... 353 I. COPYRIGHT’S TERM & ITS DISCONTENTS ............................................... 358 A. A History of Obsession with Term .......................................................... 358 B. A Single, Lengthy Term with Uniform Protection .................................... 361 1. Term ............................................................................................... 361 2. Protection & Exceptions ................................................................. 362 C. Critique .................................................................................................. 363 1. Economic ......................................................................................... 364 2. Intuitive ........................................................................................... 367 3. Empirical ........................................................................................ 368 D. Support .................................................................................................. 371 1. Economic ......................................................................................... 371 2. Moral .............................................................................................. 372 II. MUSIC: A CASE STUDY ...............................................................................
    [Show full text]
  • Open-Source Software and the Rationale for Copyright Protection of Computer Programs
    Open-source software and the rationale for copyright protection of computer programs by Sadulla Karjiker Dissertation presented for the degree of Doctor of Laws in the Faculty of Law at Stellenbosch University Promoter: Prof Owen Henry Dean March 2013 Stellenbosch University http://scholar.sun.ac.za Declaration By submitting this thesis electronically, I declare that the entirety of the work contained therein is my own, original work, that I am the authorship owner thereof (unless to the extent explicitly otherwise stated) and that I have not previously in its entirety or in part submitted it for obtaining any qualification. Date: 19 February 2013 Copyright © 2013 Stellenbosch University All rights reserved ii Stellenbosch University http://scholar.sun.ac.za Abstract The rationale for the legal protection of copyright works is based on the perceived need to encourage the creation of works which are considered to be socially beneficial. By awarding authors proprietary rights in their creations, copyright law allows authors the ability to earn direct financial returns from their efforts, and, thus, copyright law provides the required incentives for authors to create copyright works. Since the early days of commercial software development, copyright protection has been extended to computer programs; thus, by providing such protection it was assumed that their production should be encouraged, and that without such protection they will not be produced to the extent required by society. Comparatively recently, we have witnessed large-scale production of open-source software, which is licensed on generous terms, giving users the right to freely use, modify and redistribute such software. By adopting such licensing terms, the authors of open- source software are unable to charge licensees a fee for permission to use their software, which is the reward which copyright assumes authors seek to create such software.
    [Show full text]
  • Reinventing P2p
    Global Gaming Factory X AB org nr 556551-5938 Reinventing p2p Memorandum for investment in filesharing sites aGGF acquisition plans While GGF intends to acquire leading filesharing sites, GGF has not and will not enter into an agreement to acquire any of the leading filesharing sites mentioned in this memorandum, until the shares issued have been fully paid for and the concerned site agrees to an acquisition.1 aAll registered and unregistered trademarks shown above belong to their respective owners. 1 GGF entered into an agreement with the owner of The Pirate Bay in 2009. The Pirate Bay's founders and former operators' understanding is that the owner of The Pirate Bay regards the agreement to have lapsed in 2009. Contents Offer to subscribe to new shares 3 Short presentation of the rights issue 4 Presentation of the Company 4 Our Vision 4 Our mission 4 New investments 5 Financial information 6 Trading in shares 8 Risk Factors 8 The Company's board and management 9 Issue Terms and Conditions 13-15 ________________________________________________________________________________________________ Investment Memorandum This investment memorandum is for a pre-emptive issue of shares to raise capital for participation in the acquisition of filesharing sites. The memorandum has been drawn by the Board of Directors of GGF. Definitions In this memorandum, the following definitions are used: The term "Company" or "GGF" means a company registered in Sweden with the corporation number 556551-5938. ”Smartlaunch” means the Danish company Smartlaunch A/S with the corporation number 27 70 60 02. "Filesharing site" means one of the leading filessharing sites.
    [Show full text]