Copyright Trolls and the Common Law

Total Page:16

File Type:pdf, Size:1020Kb

Copyright Trolls and the Common Law GREENBERG_PP_FIXEDQUOTE.DOCX (DO NOT DELETE) 4/6/15 4:19 PM Copyright Trolls and the Common Law Brad A. Greenberg∗ I. INTRODUCTION ................................................................................................................... 77 II. DEFINING THE COPYRIGHT TROLL .................................................................................. 79 III. TROLLS AND THEIR TOLLS ............................................................................................... 82 IV. SEARCHING FOR A SOLUTION: CONGRESS OR COURTS? ............................................... 83 I. INTRODUCTION Copyright trolls have been treated as a kind of IP boogeyMan—an apoc- ryphal Malevolent occupying the realM of legal nightmares. But Matthew Sag’s important new work, Copyright Trolling, An Empirical Study,1 helps bring cop- yright trolls out of the dark. In a way that only sharp data can, Sag’s research serves as a wakeup call to anyone who thinks that litigation trolling reMains a rare and inconsequential burden on the U.S. copyright regiMe and federal courts. It also strikes Me as further support for resolving the copyright troll probleM judicially rather than legislatively. Sag’s research draws from his database of all federal district court copy- right lawsuits filed between January 1, 2001 and March 31, 2014.2 Within that tiMe period, Sag focused on a form of trolling that has come to dominate the federal copyright docket—the Multi-Defendant John Doe (“MDJD”) lawsuit— and discovered a seisMic shift in the nature of copyright lawsuits. Though al- most unheard of in 2001 and rare before 2010, 43% of copyright lawsuits filed in 2013 were against John Does; Most of those were related to pornogra- phy.3 Moreover, MDJD lawsuits constituted the majority of copyright cases in ∗ Intellectual Property Fellow, kernochan Center for Law, Media and the Arts, ColuMbia Law School; Visiting Fellow, InforMation Society Project, Yale Law School. Thanks to Tejas Narechania for helpful feedback and to the Iowa Law Review staff for thoughtful edits. 1. Matthew Sag, Copyright Trolling, An Empirical Study, 100 IOWA L. REV. 1105 (2015). 2. The raw data is available at Mathew Sag, Data Sets, MATTHEW SAG: COPYRIGHT L., FAIR USE & TECH., http://www.matthewsag.com/?page_id=19 (last visited Apr. 3, 2015). 3. See Sag, supra note 1, at 1127 (“Cat videos do not feature proMinently in MDJD lawsuits. Pornography is another story.”). 77 GREENBERG_PP_FIXEDQUOTE.DOCX (DO NOT DELETE) 4/6/15 4:19 PM 78 IOWA LAW REVIEW BULLETIN [Vol. 100:77 “19 of the 92 federal district courts” and “in the Third, Fourth, Sixth, Seventh, Tenth, Eleventh, and D.C. Circuits in 2013.”4 MDJD lawsuits target John Does who shared a copyrighted work— overwhelMingly pornographic filMs—in a BitTorrent swarM. By filing a single action in federal court against hundreds, even thousands, of John Does, the copyright owner is able to coMpel Internet service providers to reveal the naMe and physical address associated with the Internet Protocol address in- volved in the BitTorrent swarM. The copyright owner then often sends these individuals a letter accusing theM of copyright infringeMent and indicating the owner’s desire to pursue statutory daMages of up to $150,000. The letter includes, or is followed with, an offer to settle the dispute for soMewhere be- tween $1,000 and $5,000, with a frequently used $4,000 figure “calculated to be just below the cost of a bare-bones defense.”5 Sag works nicely through the economic asymMetries for plaintiffs and de- fendants in MDJD litigation.6 It is enough to say that considering the costs of defending an infringement claiM—not to Mention the tiMe, uncertainty, and potential eMbarrassMent of being publicly naMed for downloading porn— defendants are wise to settle, guilt or innocence notwithstanding. As one dis- trict court judge observed, pornography owners who file MDJD lawsuits have “discovered the nexus of antiquated copyright laws, paralyzing social stigma, and unaffordable defense costs.”7 Moreover, unlike other copyright troll targets, who might be able to claim at least colorably de minimis or fair uses, Sag notes that John Does are unlikely to find haven in traditional copyright defenses.8 There is nothing de minimis or fair about the unauthorized downloading of a pornographic film. However, “[t]he possibility of hacking, open Wi-Fi networks, Internet accounts accessed by Multiple users, and Mistakes by ISPs open the door to nuMerous highly fact-specific ‘it wasn’t Me’ defense[s].”9 But, as noted, the defendants’ incen- tives push toward settleMent. The MDJD plaintiff’s success hinges on the effective use of statutory dam- ages and quirks of litigation practice. As Sag explains, “[t]he econoMic viability of MDJD litigation depends on suing as Many defendants as possible in a single action to keep costs low and leveraging the threat of statutory damages in or- der to MaxiMize the flow of settleMent dollars.”10 Statutory daMages are low- 4. Id. at 1117. 5. Ingenuity 13 LLC v. John Doe, No. 2:12-cv-8333-ODW (JCx), 2013 WL 1898633, at *1 (C.D. Cal. May 6, 2013). 6. See Sag, supra note 1, at 1134–35. 7. Ingenuity 13 LLC, 2013 WL 1898633, at *1. 8. Sag, supra note 1, at 1113. 9. Id. at 1121 (quoting Third Degree FilMs, Inc. v. Does 1–72, No. 12-cv-14106, 2013 WL 1164024, at *6 n.7 (E.D. Mich. Mar. 18, 2013)) (internal quotation Marks oMitted). 10. Id. at 1109. GREENBERG_PP_FIXEDQUOTE.DOCX (DO NOT DELETE) 4/6/15 4:19 PM 2015] COPYRIGHT TROLLS AND THE COMMON LAW 79 hanging fruit—a “pot of gold at the end of the litigation rainbow”11—and, more significantly, a cudgel for extracting settlements.12 PerMissive joinder standards, on the other hand, help keep costs down and MaxiMize profit Mar- gins. After elucidating the MDJD problem and laying the norMative foundation for reforM, Sag proposes reigning in the availability of statutory daMages and tightening lax joinder standards.13 Indirectly, Sag also sheds light on the question of who should redress copyright trolling: Congress or courts? By placing copyright trolls within the tradition of opportunistic plaintiffs and helping quantify the MDJD form, Sag reMinds us that copyright trolls have a transient nature. As I discuss below, amorphous trolling forMs are best addressed through ad hoc deterMinations rather than per se classifications. This understanding urges a judicial ap- proach over a legislative one. II. DEFINING THE COPYRIGHT TROLL The scope of the copyright troll probleM reMains unclear because trolls do not fit neatly into any definition. Trolls take a variety of forMs, and focusing on MDJDs, of course, is an iMperfect way to approxiMate the copyright trolling probleM.14 Sag acknowledges this with a Section titled “When Do Multi- Defendant John Doe Lawsuits AMount to Copyright Trolling?”15 The short an- swer: when Multi-Defendant John Doe lawsuits amount to copyright trolling. More generally, Sag cautions that we identify trolls in practice rather than craft a categorical rule of trolling in the abstract.16 In practice, Sag argues the MDJD copyright troll does at least one of three things systematically: “asserts rights it does not have, Makes poorly substantiated claiMs, or seeks dispro- portionate reMedies.”17 Sag claiMs that these cluster features fit within tradi- tional understandings of litigation trolling generally—the troll is an opportun- istic plaintiff that seeks to exploit litigation for profit.18 But deterMining the proxies for identifying when a copyright owner is us- ing litigation as an independent revenue streaM proves too Much. AtteMpting to use one definition ends up sweeping in Many plaintiffs who systeMatically seek statutory daMages that are disproportionate to the injury, Much like trolls, even when turning litigation into an independent revenue streaM is not 11. Id. at 1121. 12. See Brad A. Greenberg, Copyright Trolls and Presumptively Fair Uses, 85 U. COLO. L. REV. 53, 109 (2014) (noting that “trolls use copyright law as a stick for extracting profits via settle- ments”). 13. See Sag, supra note 1, at 1135–45. 14. It is both over-inclusive, in that not all MDJDs are exaMples of copyright trolling, and under-inclusive in that many instances of copyright trolling occur outside of MDJD litigation. 15. Sag, supra note 1, at 1114. 16. Id. at 1113–14. 17. Id. at 1114. 18. Id. at 1113–14. GREENBERG_PP_FIXEDQUOTE.DOCX (DO NOT DELETE) 4/6/15 4:19 PM 80 IOWA LAW REVIEW BULLETIN [Vol. 100:77 among the plaintiff’s goals. Consider the record companies that sought statu- tory daMages against peer-to-peer sharers of copyrighted Music.19 Sony BMG and other Music studio plaintiffs, for example, enforced copyrights against file-sharer Joel TenenbauM.20 With a strong legal claiM for infringeMent, Sony BMG elected for statutory daMages, and the court awarded $675,000 for thir- ty infringing downloads—$22,500 per song.21 This award was clearly dispro- portionate to the actual injury Tenenbaum caused.22 There was never any in- dication that Sony BMG sought the disproportionate award as an alternative revenue streaM. In fact, TenenbauM claiMed that the record coMpanies “in- tend to teach the public a lesson” and thus were “trying to Make an exaMple of [hiM].”23 But, for Sag, is the lack of a litigation-revenue purpose enough to overcome systeMatically seeking a disproportionate reward? Does it spare Sony BMG from the copyright troll label? If so, it is unclear what work the presence of a systeMatic cluster feature actually does.24 But, if not, the defin- ing characteristics seeM overbroad.
Recommended publications
  • How Open Source Is Changing IP Risk in the Soft Ware Supply Chain
    A New Wave of IP Risks: How Open Source is Changing IP Risk in the Software Supply Chain Table of Contents Introduction . 3 Brief Overview of Open Source and Where It Stands Today . 3 The Interplay Between Open Source and IP Risk: . 5 Understanding the Challenges Specific IP Risks in the Open Source Software Supply Chain . 7 Copyright Infringement . 7 Reputation . 9 Exposing IP Secrets . 10 Impacts on the Partner/Customer Relationship . 11 Patent Infringement . 12 Looking Ahead: The Future of Open Source Litigation . 13 Conclusion . 14 I. Introduction Open source software has been integrated into nearly is a testament to the success of open source, it also gives every industry and sector today . According to a 2016 rise to unique challenges for businesses, particularly in survey, approximately 90% of today’s organizations report the area of intellectual property . If a company cannot using open source software .1 That percentage has almost even find all of its open source code or identify its open certainly grown since . One likely reason for open source’s source dependencies, they are also likely unable to boom in popularity is the distinct cost savings it gives ensure that they are remaining compliant with open companies who use it .2 The use of open source software is source licenses and protecting themselves from business now so widespread that many companies are unaware of or reputational risk . how and where it is used, and would be unable to identify all their open source code if asked to do so . In this paper, we will examine the most common IP risks that arise from the use of open source software today, As Mark Radcliffe, a partner in the Silicon Valley office of including copyright infringement, patent infringement, DLA Piper specializing in IP and open source, explains, reputational risk, exposure of IP secrets, and the impact on “virtually all software now has a large number of open the partner/customer relationship .
    [Show full text]
  • Volume 30 Spring 2014
    SYRACUSE JOURNAL OF SCIENCE & TECHNOLOGY LAW VOLUME 30 SPRING 2014 TABLE OF CONTENTS Mass Copyright Infringement Litigation: Of Trolls, Pornography, Settlement and Joinder Christopher Civil………………………………………………………………………………...2 Notice and Manifestation of Assent to Browse-Wrap Agreements in the Age of Evolving Crawlers, Bots, Spiders and Scrapers: How Courts Are Tethered to Their Application of Register and Cairo and Why Congress Should Mandate Use of the Robots Exclusion Standard to Prevent Circumvention of Responsibility Michael Laven…………………………………………………………………………………..56 Seeing Red: Christian Louboutin’s Protection of His Trademark Through His Battle with Yves St. Laurent Sachpreet Bains…………………………………………………………………………………73 I Need a Lawyer: Establishing Statewide New York Communication Access Fund to Secure Legal Accessibility to Deaf and Hard of Hearing Clients Through Video Remote Interpreting Services in Compliance with the Americans with Disabilities Act YooNa Lim………………………………………………………………………………………99 Can You Hear Me Now? Spectrum is Shaping the Telecommunication Industry in an Increasingly Connected America James Zino……………………………………………………………………………………..131 Review of “I Know What You’re Thinking: Brain Imaging and Mental Privacy” Edited by: Sarah Richmond, Geraint Rees, and Sarah J.L. Edwards Jenna Furman…………………………………………………………………………………160 SYRACUSE JOURNAL OF SCIENCE & TECHNOLOGY LAW VOLUME 30 SPRING 2014 2013-2014 EDITORIAL STAFF EDITOR-IN-CHIEF Brittany Jones MANAGING EDITOR Tanjeev Thandi LEAD ARTICLE EDITORS FORM & ACCURACY EDITORS Alessandra
    [Show full text]
  • Circular 1 Copyright Basics
    CIRCULAR 1 Copyright Basics Copyright is a form of protection Copyright is a form of protection provided by the laws of the provided by U.S. law to authors of United States to the authors of “original works of authorship” that are fixed in a tangible form of expression. An original “original works of authorship” from work of authorship is a work that is independently created by the time the works are created in a a human author and possesses at least some minimal degree of creativity. A work is “fixed” when it is captured (either fixed form. This circular provides an by or under the authority of an author) in a sufficiently overview of basic facts about copyright permanent medium such that the work can be perceived, and copyright registration with the reproduced, or communicated for more than a short time. Copyright protection in the United States exists automatically U.S. Copyright Office. It covers from the moment the original work of authorship is fixed.1 • Works eligible for protection • Rights of copyright owners What Works Are Protected? • Who can claim copyright • Duration of copyright Examples of copyrightable works include • Literary works • Musical works, including any accompanying words • Dramatic works, including any accompanying music • Pantomimes and choreographic works • Pictorial, graphic, and sculptural works • Motion pictures and other audiovisual works • Sound recordings, which are works that result from the fixation of a series of musical, spoken, or other sounds • Architectural works These categories should be viewed broadly for the purpose of registering your work. For example, computer programs and certain “compilations” can be registered as “literary works”; maps and technical drawings can be registered as “pictorial, graphic, and sculptural works.” w copyright.gov note: Before 1978, federal copyright was generally secured by publishing a work with an appro- priate copyright notice.
    [Show full text]
  • No. 11-16358 United States Court of Appeals for The
    Case: 11-16358 01/13/2012 ID: 8031869 DktEntry: 20 Page: 1 of 40 NO. 11-16358 UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT RIGHTHAVEN LLC, APPELLANT, V. CENTER FOR INTERCULTURAL ORGANIZING, and KAYSE JAMA, APPELLEES. On Appeal From The United States District Court For The District of Nevada Case No. 2:10-cv-01322-JCM-LRL Honorable James C. Mahan, District Judge BRIEF AMICI CURIAE OF ELECTRONIC FRONTIER FOUNDATION, DIGITAL MEDIA LAW PROJECT, PUBLIC KNOWLEDGE AND PROFESSORS IN SUPPORT OF AFFIRMANCE Kurt Opsahl (SBN 191303) Corynne McSherry (SBN 221504) ELECTRONIC FRONTIER FOUNDATION 454 Shotwell Street San Francisco, CA 94110 Telephone: (415) 436-9333 Facsimile: (415) 436-9993 [email protected] Attorneys for Amici Curiae Case: 11-16358 01/13/2012 ID: 8031869 DktEntry: 20 Page: 2 of 40 DISCLOSURE OF CORPORATE AFFILIATIONS AND OTHER ENTITIES WITH A DIRECT FINANCIAL INTEREST IN LITIGATION Pursuant to Rule 26.1 of the Federal Rules of Appellate Procedure, Amici Curiae the Electronic Frontier Foundation, the Digital Media Law Project, Public Knowledge, and the professor amici (collectively, “Amici”) state that none of the Amici have any parent corporation, and that no publicly held corporation owns 10% or more of the stock of any of the Amici. Dated: January 13, 2012 By: /s/ Kurt Opsahl Kurt Opsahl Corynne McSherry ELECTRONIC FRONTIER FOUNDATION 454 Shotwell Street San Francisco, CA 94110 Telephone: (415) 436-9333 Facsimile: (415) 436-9993 [email protected] Attorneys for Amici Curiae i Case: 11-16358 01/13/2012 ID: 8031869 DktEntry: 20 Page: 3 of 40 TABLE OF CONTENTS STATEMENTS OF INTEREST AND CONSENT TO FILE ................................
    [Show full text]
  • Audiences, Gender and Community in Fan Vidding Katharina M
    University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2011 "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding Katharina M. Freund University of Wollongong, [email protected] Recommended Citation Freund, Katharina M., "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding, Doctor of Philosophy thesis, School of Social Sciences, Media and Communications, Faculty of Arts, University of Wollongong, 2011. http://ro.uow.edu.au/theses/3447 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] “Veni, Vidi, Vids!”: Audiences, Gender and Community in Fan Vidding A thesis submitted in fulfilment of the requirements for the award of the degree Doctor of Philosophy From University of Wollongong by Katharina Freund (BA Hons) School of Social Sciences, Media and Communications 2011 CERTIFICATION I, Katharina Freund, declare that this thesis, submitted in fulfilment of the requirements for the award of Doctor of Philosophy, in the Arts Faculty, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Katharina Freund 30 September, 2011 i ABSTRACT This thesis documents and analyses the contemporary community of (mostly) female fan video editors, known as vidders, through a triangulated, ethnographic study. It provides historical and contextual background for the development of the vidding community, and explores the role of agency among this specialised audience community. Utilising semiotic theory, it offers a theoretical language for understanding the structure and function of remix videos.
    [Show full text]
  • Digital Rights Management and the Process of Fair Use Timothy K
    University of Cincinnati College of Law University of Cincinnati College of Law Scholarship and Publications Faculty Articles and Other Publications Faculty Scholarship 1-1-2006 Digital Rights Management and the Process of Fair Use Timothy K. Armstrong University of Cincinnati College of Law Follow this and additional works at: http://scholarship.law.uc.edu/fac_pubs Part of the Intellectual Property Commons Recommended Citation Armstrong, Timothy K., "Digital Rights Management and the Process of Fair Use" (2006). Faculty Articles and Other Publications. Paper 146. http://scholarship.law.uc.edu/fac_pubs/146 This Article is brought to you for free and open access by the Faculty Scholarship at University of Cincinnati College of Law Scholarship and Publications. It has been accepted for inclusion in Faculty Articles and Other Publications by an authorized administrator of University of Cincinnati College of Law Scholarship and Publications. For more information, please contact [email protected]. Harvard Journal ofLaw & Technology Volume 20, Number 1 Fall 2006 DIGITAL RIGHTS MANAGEMENT AND THE PROCESS OF FAIR USE Timothy K. Armstrong* TABLE OF CONTENTS I. INTRODUCTION: LEGAL AND TECHNOLOGICAL PROTECTIONS FOR FAIR USE OF COPYRIGHTED WORKS ........................................ 50 II. COPYRIGHT LAW AND/OR DIGITAL RIGHTS MANAGEMENT .......... 56 A. Traditional Copyright: The Normative Baseline ........................ 56 B. Contemporary Copyright: DRM as a "Speedbump" to Slow Mass Infringement ..........................................................
    [Show full text]
  • Copyright Online Education
    Roadmap Copyright online education April 2018 Education and Student Affairs 1 | Roadmap for Copyright April 2018 Table of content Table of content ....................................................................................2 Introduction .........................................................................................3 Open Education and Licenses ...................................................................4 What you further have to know about Creative Commons .............................6 What is… .............................................................................................7 Flow chart for the use of footage in ..........................................................9 Searching for images, audio or video via CC Search ................................... 10 More websites with new CC footage ........................................................ 11 Attributing works ................................................................................. 12 Copyright and Brightspace .................................................................... 14 Contact .............................................................................................. 16 2 | Roadmap for Copyright April 2018 1. Introduction Education is based on a foundation of sharing. In our education we share knowledge with our students and our fellow teachers. Sharing educational resources openly and offering open and online courses gives others a chance to benefit from the knowledge we teach. In return others can contribute back
    [Show full text]
  • Fair Use FAQ for Students
    Fair Use FAQ for Students What is copyright? How is it different from using proper attribution and avoiding plagiarism? Copyright is actually a limited bundle of rights that the government grants to authors of original works such as novels, plays, essays, and movies. For a limited time (currently the life of the author plus 70 years, in most cases), copyright gives the author control over who can copy, distribute, publicly perform or display, or create derivative works (such as sequels or translations) based on their work. The purpose of copyright is to encourage the creation and dissemination of new works for the benefit of the public. Copyright is therefore much broader than the norms against plagiarism. Plagiarism is the presentation of someone else’s work as one’s own; copyright infringement can take place even where the user is honest about the work’s true author. As long as you use proper attribution, plagiarism should not be a worry for you. Copyright is somewhat more complex: unless your use satisfies one of the exceptions or limitations described in the Copyright Act, you cannot use copyright protected material without permission. Fair use is one of the most important limitations to copyright. What is fair use? Fair use is a part of copyright law that allows certain uses of copyrighted works, such as making and distributing copies of protected material, without permission. It evolved over time as judges made case-by-case exceptions to copyright to accommodate uses that seemed legitimate and justifiable regardless of the copyright holder’s apparent rights. Typical early fair uses involved criticism, commentary, and uses in an educational or scholarly context.
    [Show full text]
  • Digital Rights Management, Copyright, and Napster†
    Digital Rights Management, Copyright, and Napster† Nic Garnett* Digital Rights Management technologies in the field of copyright protection should meet four objectives: • give consumers new freedom to enjoy music and other forms of content; • give copyright owners and other value chain participants the means to manage and protect their rights in published works; • implement elements of law, such as copyright exceptions, that ensure that rights are managed in accordance with the public interest; • provide users with the means to manage their legitimate personal rights and interests. We sketch how these goals can be achieved with current technology for peer-to-peer Digital Rights Management (DRM). This technology can ensure the neutrality, security, commercial reliability, and trusted interoperability of applications and services used to protect and manage rights in all forms of information, including creative works protected by copyright. The rapidly evolving area of digital commerce in information requires a framework of commercial trust comparable in scope, and at least as reliable, as the systems of trust that underpin commerce in the physical world. 1. INTRODUCTION Great creators are normally great communicators, their individual voices collectively embodying and expressing the values and passions of their culture. Using digital technology expedites the accurate communication of creators’ works. When employed in the proper context, digital technology can also support the universe of rights associated with most creative works – the rights of creators, value chain members, users, and societal organizations. Although digital technology can greatly enhance the communication of creators’ works, it can also create severe problems. Improperly used digital technology can deny content creators and their successors a commercial return on their labor and the ability to manage and exploit their own property.
    [Show full text]
  • Monetizing Infringement
    University of Colorado Law School Colorado Law Scholarly Commons Articles Colorado Law Faculty Scholarship 2020 Monetizing Infringement Kristelia García University of Colorado Law School Follow this and additional works at: https://scholar.law.colorado.edu/articles Part of the Entertainment, Arts, and Sports Law Commons, Intellectual Property Law Commons, Law and Economics Commons, and the Legislation Commons Citation Information Kristelia García, Monetizing Infringement, 54 U.C. DAVIS L. REV. 265 (2020), available at https://scholar.law.colorado.edu/articles/1308. Copyright Statement Copyright protected. Use of materials from this collection beyond the exceptions provided for in the Fair Use and Educational Use clauses of the U.S. Copyright Law may violate federal law. Permission to publish or reproduce is required. This Article is brought to you for free and open access by the Colorado Law Faculty Scholarship at Colorado Law Scholarly Commons. It has been accepted for inclusion in Articles by an authorized administrator of Colorado Law Scholarly Commons. For more information, please contact [email protected]. Monetizing Infringement Kristelia García* The deterrence of copyright infringement and the evils of piracy have long been an axiomatic focus of both legislators and scholars. The conventional view is that infringement must be curbed and/or punished in order for copyright to fulfill its purported goals of incentivizing creation and ensuring access to works. This Essay proves this view false by demonstrating that some rightsholders don’t merely tolerate, but actually encourage infringement, both explicitly and implicitly, in a variety of different situations and for one common reason: they benefit from it.
    [Show full text]
  • The (Unfinished) Ballad of Gunslinger/ ©Troll Richard Liebowitz by Steven D
    For exclusive use of MLRC members and other parties specifically authorized by MLRC. © 2019 Media Law Resource Center, Inc. Page 8 August 2019 MLRC MediaLawLetter The (Unfinished) Ballad of Gunslinger/ ©Troll Richard Liebowitz By Steven D. Zansberg You are probably already far more familiar than you wish you were with Richard Liebowitz, the notorious copyright plaintiff’s attorney based in Valley Stream, New York. Mr. Liebowitz has gained notoriety (some might say ignominy) for having filed over 1,500 copyright infringement actions across the nation (some 1,100 in S.D.N.Y.), and having been featured in Slate, The Hollywood Reporter, and even has his own Wikipedia page (do you?). For those fortunate few unfamiliar with Mr. Liebowitz, his entrepreneurial spirit follows a well-developed business model: (1) represent photographers who have registered (or soon will register) their original works (now a requirement for instituting copyright infringement actions, and for recovery of statutory damages of up to $150K/violation plus attorneys’ fees); (2) find infringing (non-licensed) uses of those photos online by using a reverse-image search engine like Google Images, Tin Eye, Pixsy, or Berify; (3) demand an exorbitant amount to settle such cases (typically $25K per photo, most of which would command license fees of, at best, in the tens or hundreds of dollars) and then agree to a settlement figure that is a fraction (often less than half) of the initial extortionate demand. You are probably already far more Because it inevitably would cost more than the insurance familiar than you wish you were deductible to defend such a case, the defendants – many of with Richard Liebowitz, the whom are large media companies – make the rational business notorious copyright plaintiff’s attorney.
    [Show full text]
  • Survey of Additional Ip and Technology Law Developments
    SURVEY OF ADDITIONAL IP AND TECHNOLOGY LAW DEVELOPMENTS I. PATENT DEVELOPMENTS A. HELSINN HEALTHCARE S.A. V. TEVA PHARMS. USA, INC., 855 F.3 D 1356 (FED. CIR. 2017) The United States Court of Appeals for the Federal Circuit held (1) that the asserted claims of the patents-in-suit were subject to an invalidating contract for sale prior to the critical date, (2) that the Leahy-Smith America Invents Act (AIA) did not change the statutory meaning of “on-sale” of the on-sale bar provision of 35 U.S.C. § 102 of the Patent Act, and (3) that public disclosure of the existence of the sale of a patented item may suffice to invalidate a patent under the on-sale bar, even if “the details of the invention” are not “publicly disclosed in the terms of sale.”1 In 2011, Teva Pharmaceuticals USA, Inc. and Teva Pharmaceutical Industries, Ltd. (collectively, “Teva”) filed an Abbreviated New Drug Application (ANDA) seeking FDA approval to market a generic 0.25 mg palonosetron product. Teva’s ANDA filing included a Paragraph IV certification that the claims of the patents-in-suit were invalid and/or not infringed. Helsinn Healthcare S.A. (“Helsinn”) then brought suit under the Hatch-Waxman Act, 35 U.S.C. § 271(e)(2)(A), alleging infringement of the patents-in-suit by the ANDA filing. The four patents-in-suit are directed to intravenous formulations of palonosetron for reducing or reducing the likelihood of chemotherapy-induced nausea and vomiting (CINV), a serious side effect of chemotherapy treatment.2 At trial, Teva argued, inter alia, that the asserted claims were invalid under the on-sale bar provision of 35 U.S.C.
    [Show full text]