SAfe harbour per una piattaforma di vendita/licenza di fotografie ?

L’appello del 2° circuito 10.02.2026, causa 23-7652, McGuchen v. Shutterstock, affronta il tema dell’applicabilita del porto sicuro ex § 512.(c). US Code title 17 in una lite azionat da un fotografo che vi aveva individuato molte sue fotografie.

I requisiti generali sono ravvisati .

La Corte invece propende per escludere i) quello per cui deve essere un trattamento sotto la direzione dell’utente (ivi, sub (1) IN GENERAL) e, ii) quello simile della assenza di beneficio economico se il “service provider has the right and ability to control such activity” (ivi, sub 1.B);

Sul primo , sub i) :

<<There is evidence in the record that suggests Shutterstock’s review of user images is neither cursory nor automatic. To begin, when a user submits an image to Shutterstock, the image does not immediately appear on the website; rather, the contributor must wait, sometimes for hours, until they receive an email from Shutterstock letting them know which of their images were accepted. See J. App’x at 1293, 1302, 1316. That fact is not dispositive, but it suggests some intervention by Shutterstock between a user upload and the appearance of material on the platform. Moreover, Shutterstock’s website states that it “has high standards and only accepts a portion of the images submitted to be included in [its] collection.” Id. at 1071. Indeed, Shutterstock maintains a page on its website that explains why an image might be rejected and provides advice for successful submissions. Id. at 1071–88. There are “30-odd” reasons that an image might be rejected by a Shutterstock reviewer, id. at 1294–95, which include focus, exposure, lighting, and noise, id. at 1071–75.
The record also contains evidence that Shutterstock’s reviewers exercise some subjective discretion even when applying seemingly rote and straightforward criteria. For instance, when considering an image’s focus, Shutterstock reviewers are “trained to know the difference between something that’s just out of focus and something that’s more intentional.” Id. at 1341–42. And according to Shutterstock, a reviewer may still accept an image that has focus issues if it is “a really unique shot” or a “hard shot to get.” Id. at 1297. That is because, as Shutterstock has explained, “there’s no way to predict what a customer is looking for,” so although “Shutterstock wants to have a high-quality library[,] . . . [t]here’s a lot of value in . . . shots that might not be perfect.” Id. at 1296–97; see also id. at 1366 (Shutterstock employee explaining that reviewers apply “a base guideline . . . but at the same time, it’s not a black-and-white standard”); id. at 1367 (“As our reviewers are humans, they obviously can think for [themselves]. We give them guidelines and we try to give them the best tools possible to review photos and to use their best judgment based on the guidelines we give them.”). In the end, as Shutterstock itself concedes, “photography is an art . . . you can’t just say, ‘This is yes, this is no.’” Id. at 1362. Together, these statements could lead a factfinder to conclude that Shutterstock’s reviewers exercise a considerable degree of case-by-case aesthetic or editorial judgment when determining which images to allow on the platform>>.

Ciò in applicazione del criterio astratto (importante ed espressamente enunciato) per cui <<if a service provider engages in manual, substantive, and discretionary review of user content—if, on a case-by-case basis, it imposes its own aesthetic, editorial, or marketing judgment on the content that appears on its platform—then its storage of infringing material is no longer “at the direction of a user.” In other words, “extensive, manual, and substantive” front-end screening of user content is not “accessibility-enhancing” and is not protected by the § 512(c) safe harbor. Mavrix, 873 F.3d at 1056. That is because, where service providers engage in their own discretionary screening of user content, they can no longer be said to be acting “solely to facilitate access by users.”>>

Sul secondo aspetto, sub ii):

<<There is evidence in the record suggesting “intrusions into user autonomy over their posts” that exceed the bounds set by Congress for the § 512(c) safe harbor. Vimeo II, 125 F.4th at 425. As an initial matter, Shutterstock screens every image before it appears on the platform—this screening determines whether an image ever gets on the platform. By way of contrast, in Vimeo II, “[c]alling attention to selected videos by giving them a sign of approval or displaying them on a Staff Picks channel . . . did not restrict the freedom of users to post whatever videos they wished.” Id. Also in contrast to Vimeo II, there is evidence here that Shutterstock’s image review goes beyond the limited purposes of restricting the site to “selected categories of consumer preferences” and excluding unlawful images. Id. Rather than engaging in categorical content screening—like accepting only holiday-themed images, or images that feature animals—Shutterstock appears to screen user images for their overall aesthetic quality. Curating a “collection,” J. App’x at 1071, of high-quality images is not the same as designing a website “that would be appealing to users with particular interests,” Vimeo II, 125 F.4th at 425.
Further, as McGucken has argued, there is some evidence in the record that Shutterstock extensively advises potential contributors on the types of images it is likely to accept. See J. App’x at 1071–88. That is unlike the service provider in Vimeo II, which “encouraged users to create certain types of content,” but did not condition their ability to post material on whether they created the provider’s preferred types of content. Vimeo II, 125 F.4th at 416. Indeed, in Vimeo II, we cited a website’s practice of giving “its users extensive advice on content” as one fact that can distinguish a service provider that has the right and ability to control infringing activity from one that does not. Id. at 423 (citing Cybernet, 213 F. Supp. 2d at 1173). Accordingly, on the current record, a reasonable factfinder might conclude that the advice and instruction Shutterstock provides its contributors, coupled with its image screening process, are sufficiently coercive to constitute substantial influence.

Finally, for the same reasons articulated above, the duration of Shutterstock’s image review and its 93 percent approval rate are relevant facts, but they are not dispositive. See supra Section II.B.3. Ultimately, it is the factfinder’s role to determine the degree and significance of Shutterstock’s solicitation and screening of user content.>>

Le funzioni di hash-matching dei video, usate da Youtube, producono sempre red flags nel caso di violazioni copyright, tali da far perdere a Youtube il safe harbour ex DMCA § 512(c)?

E’ negativa la risposta dell’ 11° circuito  07 gennaio 2026, caso n. 23-13156, Athos c. Youtube :

<<In sum, as to curation and moderation technologies, the rec-
ord reflects agreement between the parties that YouTube can algo-
rithmically suggest and auto-play videos, can remove users and vid-
eos from the site, and can set its own guidelines for users and up-
loaded content on the site.
With respect to the hashing technologies, the record does
not support Athos’ factual assertions. YouTube does not run Con-
tent ID (or any of its other copyright management tools) automat-
ically or universally for all videos uploaded to the YouTube website.
Athos, moreover, has offered no evidence that any of YouTube’s
video-hash-matching or other tools have any functionality to per-
form a legal analysis of whether an identified video-hash match
constitutes copyright infringement. In fact, YouTube has pre-
sented unrebutted evidence that all of its copyright management
tools were designed with user input and management in mind be-
cause it would be unfeasible for YouTube to operate the tools by
itself without such input. Athos simply has not identified any ma-
terial facts in dispute>>. p. 16.

Poi: <<So the simple accumulation of adequately-addressed DMCA
takedown requests alone cannot amount to red flag knowledge of
other infringing activity which precludes safe-harbor protection.
See id. And “the copyright owner cannot short-circuit the notifica-
tion procedure through a blanket notification;” the DMCA consid-
ers such an attempt a failed notification “and therefore counts it as
of no effect.” Id. at 12B-82–83. Because Athos bases its red flag
knowledge argument on the volume of DMCA takedown requests
it has submitted to YouTube, and on YouTube’s refusal to remove
additional content not noticed in those takedown requests, see Ap-
pellant’s Br. at 19–20, Nimmer’s criticism of Viacom and UMG has
no effect on our resolution of the red flag knowledge issue in this
case>>, p. 23.

Ancora: << The record reflects that the copyright management tools
could not have provided YouTube with actual knowledge because
they were never used in the manner Athos suggests. As discussed
earlier, Athos has not presented evidence that any of the video-
hash-matching tools it argues were designed to provide actual
knowledge are operated automatically or universally by YouTube.
Even if it had made such a showing, the video-hash matches gen-
erated by YouTube’s technologies, as we understand them from
this record, cannot give YouTube actual knowledge of infringing
material because the tools do not perform any analysis to deter-
mine whether the hash matches they generate are legally infringing
or not.
Without any kind of additional analysis being performed by
the copyright management tools or YouTube employees,
YouTube cannot have “actually or ‘subjectively’ [known] of spe-
cific infringement,” because the tools at most produce lists of possible infringement. See Viacom, 676 F.3d at 31. See also BWP Me-
dia USA, Inc. v. Clarity Digit. Grp., LLC, 820 F.3d 1175, 1181 (10th Cir.
2016) (explaining that “if the infringing content has merely gone
through a screening or automated process, the [internet service
provider] will generally benefit from the safe harbor’s protection”).
To require YouTube to not only run its copyright management
tools in the manner Athos suggests, but to then analyze the fruits
of those tools to locate other instances of infringement, would
amount to requiring YouTube to “affirmatively [seek] facts indicat-
ing infringing activity,” in direct contravention of the balance es-
tablished by Congress in the DMCA. See § 512(m)(1). Athos has
not shown that YouTube failed to expeditiously remove any in-
fringing material it had actual knowledge of>>, p. 24/5.

Sub B c’è una breve ma chiara spiegazione tecnica delle funzioni di hash-matching predisposte da Youtube.

La sentenza è utile anche per noi, dato che la disciplina posta (ora) dall’art. 6 del DSA reg. UE 2022/2065 non è così diversa.

Ancora sulla responsabilità delle piattaforme per violazione di copyright e sul safe harbour ex § 512 DMCA

Il 9 circuito 13.01.2025, 21-2949(L) Capitol Records v. Vimeo nega la resp. di Vimeo specificando la red flag data dalla competenza di un dipendente.

Ribadisce inoltre che serve la conoscenza della illiceità dei file contestati, non di una generica possibile/probabile illiceità all’interno di tutti i materiali ospitati.

<<However, we also acknowledged in Vimeo I that it is “entirely possible that an employee of the service provider who viewed a video did have expertise or knowledge with respect to the market for music and the laws of copyright.” Id. at 97 (emphasis added). Thus, as an alternative way to establish red flag knowledge, a plaintiff could produce evidence to demonstrate that an employee (1) was not an “ordinary person” unfamiliar with these fields, and (2) was aware of facts that would make infringement objectively obvious to a person possessing such specialized knowledge. See id.
We noted, though, that “[e]ven an employee who was a copyright expert cannot be expected to know when use of a copyrighted song has been licensed,” id., and, as discussed below, even a copyright expert may similarly struggle to identify instances of fair use.
Thus, in order to carry their burden of demonstrating that Vimeo had actual or red flag knowledge of the specific instances of infringement, Plaintiffs needed to show that Vimeo employees were aware of facts making it obvious to (a) a person who has no specialized knowledge or (b) a person that Plaintiffs have demonstrated does possess specialized knowledge that: (1) the videos contained copyrighted music; (2) the use of the music was not licensed; and (3) the use did not constitute fair use>>.

Poi

<<The fact that licensing music, as a general matter, can be challenging or confusing does not make it obvious that music accompanying a particular user-uploaded video was not licensed. Even if a person without specialized knowledge would have intuited a likelihood that many of the posted videos were not authorized, that would not make it obvious that a particular video lacked authorization to use the music.

This is all the more true in view of the uncontested fact that, since 2011, Vimeo had run a store from which users could purchase licenses to use music in videos. Accordingly, Vimeo employees were aware of the existence of simplified opportunities available to purchase licenses. Furthermore, because Plaintiffs have not proved that Vimeo employees had specialized knowledge of the music industry, those employees’ awareness that music found on their videos was under copyright did not show that they knew whether the music they heard on user videos came from EMI or another label. Plaintiffs’ evidence does not support it being apparent to Vimeo employees that the music they heard on any particular video came from a label that did not offer licenses through Vimeo’s store or otherwise.

Plaintiffs also rely on the contention that EMI’s cease-and-desist letter, sent to Vimeo in 2008, put Vimeo employees on notice that any EMI music used on the website was unauthorized. Plaintiffs cite EMI Christian Music Grp., Inc. v. MP3tunes, LLC, 844 F.3d 79, 93 (2d Cir. 2016), where we explained that the defendant’s subjective awareness that there had been no legal online distribution of Beatles songs could support red flag knowledge that any online electronic copies of Beatles songs on defendant’s servers were unlicensed. But the same logic does not necessarily apply here. As the district court pointed out, an awareness that EMI sent a letter in the past demanding removal of its music gave no assurance that EMI did not thereafter make contracts licensing the use of its music, especially in view of evidence that some users who posted the videos containing EMI music asserted that EMI had provided them with authorization to use the music. The DMCA does not require service providers to perform research on mere suspicion of a user’s infringement to determine the identity of the music in the user’s video, identify its source, and determine whether the user acquired a license. See Vimeo I, 826 F.3d at 98-99 (explaining, in the context of a contention of willful blindness, that requiring service providers “constantly to take stock of all information their employees may have acquired that might suggest the presence of infringements in user postings, and to undertake monitoring investigations whenever some level of suspicion was surpassed, . . . would largely undo the value of § 512(m)”).
Even if we concluded that Vimeo had red flag knowledge that EMI’s music in user videos was not authorized or licensed, that would be insufficient to satisfy Plaintiffs’ burden. Plaintiffs needed in addition to show that it would be apparent to a person without specialized knowledge of copyright law, or, alternatively, persons who have been demonstrated to possess specialized knowledge of copyright law, that the particular use of the music in the Videos-in-Suit was not fair use>>.

(segnalazione e link offerti dal blog di Eric Goldman)

Corresponsabilità (contributory infringement) nella violazione del copyright a carico dell’internet provider

L’appello del 5 Distretto 09.10.2024, No. 23-50162, UMG Recordings, Capitol Records ed altre majorts della musica c. Grande Communications Network, decide un caso di corrsponsabilità di tipo P2P, confermando la condanna di prim grado (nell’an, non nel quantum),

Nel caso specifico la correpopnsabilità non era contestabile, dato che l’ISP era stato notiziato della violazione e nulla ha fatto.

Ma cìè staa battaglia comunque su due dei quattro requisiti di legge (<< Plaintiffs had to show (1) that Plaintiffs own or have exclusive control over valid copyrights and (2) that those copyrights were directly infringed by Grande’s subscribers. See BWP Media USA, 852 F.3d at 439. To further prove that Grande was secondarily liable for its subscribers’ conduct, Plaintiffs had to demonstrate (3) that Grande had knowledge of its subscribers’ infringing activity and (4) that Grande induced, caused, or materially contributed to that activity>>): precisamente sul 2 e sul 4. Nessuna invece sul n. 3, implicitamente ammmettendosi la willful blindness.

Qui contano spt. le tattiche di forensics: (1) ad es col software Audible Magic: Plaintiffs’ trade association, the Recording Industry Association of America, Inc.
(“RIAA”), used an industry-standard software program called Audible
Magic—which forensically analyzes the contents of digital audio files to
determine if those files match the contents of files in a database that contains
authorized authentic copies of Plaintiffs’ sound recordings—to verify that
Rightscorp in fact downloaded each work at issue,.

(2) Oppure col soggetto terzo incaricato da esse di indagini, Rightscorp: .

“To crack down on copyright infringement, third-party companies
have developed technologies to infiltrate BitTorrent and identify infringing
users by their IP addresses. One such company is Rightscorp, Inc.
(“Rightscorp”). Rightscorp’s proprietary technology:
• Interacts with BitTorrent users and obtains their agree-
ment to distribute unauthorized copies of copyrighted
works
• Records the relevant available details of that agreement,
such as the user’s IP address and what the infringed
content is
• Cross-references the user’s IP address against publicly
available databases to identify which ISP is affiliated
with that IP address
• Generates and sends infringement notices to the rele-
vant ISPs so that they can identify their infringing sub-
scribers and take appropriate action; and
• Frequently reconnects with the identified infringing IP
addresses and downloads copies of the copyrighted
works at issue directly from those users
In other words, Rightscorp identifies infringing conduct on
BitTorrent by engaging with BitTorrent users, documents that conduct, and
uses the information available to it to notify ISPs of its findings so that the
ISP can take appropriate action”.

Sintesi finale:

<< The evidence at trial demonstrated that Grande provided its
subscribers with the tools necessary to infringe (i.e., high-speed internet
access) and that Grande’s subscribers used those tools to infringe Plaintiffs’
copyrights.14 See BMG, 881 F.3d at 306-08. Based on the consistency of the
trial evidence, the district court determined that there was “no question that
[Grande] intentionally continued to provide Internet service” to its
infringing subscribers.
Grande’s affirmative choice to continue providing its services to
known infringing subscribers—rather than taking simple measures to
prevent infringement—distinguishes this case from Cobbler Nevada, LLC v.
Gonzales, 901 F.3d 1142 (9th Cir. 2018), on which Grande relies. There, the
Ninth Circuit considered a claim alleging that a subscriber of internet
services who received infringement notices failed to “secure, police and protect” his account from third parties who used his internet access to
infringe. Cobbler, 901 F.3d at 1145-46. The direct infringers were never
identified. See id. at 1145 n.1. Because the pleading premised liability
exclusively on the subscriber’s failure to take action against unknown third-
party infringers, it was insufficient to state a claim. See id. at 1147-49. Here,
Plaintiffs proved at trial that Grande knew (or was willfully blind to) the
identities of its infringing subscribers based on Rightscorp’s notices, which
informed Grande of specific IP addresses of subscribers engaging in
infringing conduct. But Grande made the choice to continue providing
services to them anyway, rather than taking simple measures to prevent
infringement. Additionally, Cobbler addressed only inducement liability
under Grokster; it did not opine on the evidence required for establishing
material contribution. See id. The court in Cobbler rejected the plaintiff’s
invitation to create “an affirmative duty for private internet subscribers to
actively monitor their internet service for infringement,” id. at 1149; it did
not absolve ISPs like Grande that continue providing services to known
infringing subscribers.
The evidence at trial demonstrated that Grande had a simple measure
available to it to prevent further damages to copyrighted works (i.e.,
terminating repeat infringing subscribers), but that Grande never took it. On
appeal, Grande and its amici make a policy argument—that terminating
internet services is not a simple measure, but instead a “draconian
overreaction” that is a “drastic and overbroad remedy”—but a reasonable
jury could, and did, find that Grande had basic measures, including
termination, available to it. See Amazon.com, 508 F.3d at 1172. And because
Grande does not dispute any of the evidence on which Plaintiffs relied to
prove material contribution, there is no basis to conclude a reasonable jury
lacked sufficient evidence to reach that conclusion.

In sum, because (1) intentionally providing material contribution to
infringement is a valid basis for contributory liability; (2) an ISP’s continued
provision of internet services to known infringing subscribers, without taking
simple measures to prevent infringement, constitutes material contribution;
and (3) the evidence at trial was sufficient to show that Grande engaged in
precisely that conduct, there is no basis to reverse the jury’s verdict that
Grande is liable for contributory infringement >>.

Interessante infine è la riduzine del quantum, dovendosi determinare il danno statutory non per singolo brano ma per albums., Ma ciò dipende da specifica norma del 17 US Code § 504 (“for the purposes of this subsection, all the parts of a compilation or derivative work constitute one work”).

 

(Notizia e link dal blog di Eric Goldman)

Ancora sulla responsabilità degli internet provider per le violazioni copyright dei loro utenti (con un cenno a Twitter v. Taamneh della Corte Suprema USA, 2023)

Approfondita sentenza (segnalata e linkata da Eric Goldman, che va sempre ringraziato) US BANKRUPTCY COURT-SOUTHERN DISTRICT OF NEW YORK, In re: FRONTIER COMMUNICATIONS CORPORATION, et al., Reorganized Debtors, Case No. 20-22476 (MG), del 27 marzo 2024.

Si v. spt. :

-sub III.A, p. 13 ss, “Secondary Liability for Copyright Infringement Is a Well-Established Doctrine”;

– sub III.B “Purpose and Effect of DMCA § 512”, 24 ss.

– sub III.D “Twitter Did Not Silently Rewrite Well-Established Jurisprudence on Secondary Liability for Copyright Infringement” p. 31 ss sul rapporto tra la disciplina delle violazioni copyright e la importante sentenza della Corte Suprema Twitter, Inc. v. Taamneh, 598 U.S. 471 (2023).

Di quest’ultima riporto due passaggi dal Syllabus iniziale:

– la causa petendi degli attori contro Twitter (e Facebook e Google):

<< Plaintiffs allege that defendants aided and abetted ISIS in the
following ways: First, they provided social-media platforms, which are
generally available to the internet-using public; ISIS was able to up-
load content to those platforms and connect with third parties on them.
Second, defendants’ recommendation algorithms matched ISIS-re-
lated content to users most likely to be interested in that content. And,
third, defendants knew that ISIS was uploading this content but took
insufficient steps to ensure that its content was removed. Plaintiffs do
not allege that ISIS or Masharipov used defendants’ platforms to plan
or coordinate the Reina attack. Nor do plaintiffs allege that defend-
ants gave ISIS any special treatment or words of encouragement. Nor
is there reason to think that defendants carefully screened any content
before allowing users to upload it onto their platforms>>

– La risposta della SCOTUS:

<<None of plaintiffs’ allegations suggest that defendants culpably “associate[d themselves] with” the Reina attack, “participate[d] in it as
something that [they] wishe[d] to bring about,” or sought “by [their]
action to make it succeed.” Nye & Nissen, 336 U. S., at 619 (internal
quotation marks omitted). Defendants’ mere creation of their media
platforms is no more culpable than the creation of email, cell phones,
or the internet generally. And defendants’ recommendation algorithms are merely part of the infrastructure through which all the content on their platforms is filtered. Moreover, the algorithms have been presented as agnostic as to the nature of the content. At bottom, the allegations here rest less on affirmative misconduct and more on passive nonfeasance. To impose aiding-and-abetting liability for passive nonfeasance, plaintiffs must make a strong showing of assistance and scienter.     Plaintiffs fail to do so.
First, the relationship between defendants and the Reina attack is
highly attenuated. Plaintiffs make no allegations that defendants’ relationship with ISIS was significantly different from their arm’s
length, passive, and largely indifferent relationship with most users.
And their relationship with the Reina attack is even further removed,
given the lack of allegations connecting the Reina attack with ISIS’ use
of these platforms. Second, plaintiffs provide no reason to think that
defendants were consciously trying to help or otherwise participate in
the Reina attack, and they point to no actions that would normally
support an aiding-and-abetting claim.
Plaintiffs’ complaint rests heavily on defendants’ failure to act; yet
plaintiffs identify no duty that would require defendants or other communication-providing services to terminate customers after discovering that the customers were using the service for illicit ends. Even if
such a duty existed in this case, it would not transform defendants’
distant inaction into knowing and substantial assistance that could
establish aiding and abetting the Reina attack. And the expansive
scope of plaintiffs’ claims would necessarily hold defendants liable as
having aided and abetted each and every ISIS terrorist act committed
anywhere in the world. The allegations plaintiffs make here are not
the type of pervasive, systemic, and culpable assistance to a series of
terrorist activities that could be described as aiding and abetting each
terrorist act by ISIS.
In this case, the failure to allege that the platforms here do more
than transmit information by billions of people—most of whom use the
platforms for interactions that once took place via mail, on the phone,
or in public areas—is insufficient to state a claim that defendants
knowingly gave substantial assistance and thereby aided and abetted
ISIS’ acts. A contrary conclusion would effectively hold any sort of
communications provider liable for any sort of wrongdoing merely for
knowing that the wrongdoers were using its services and failing to stop
them. That would run roughshod over the typical limits on tort liability and unmoor aiding and abetting from culpability>>.

La norma asseritamente violata dalle piattaforme era il 18 U.S. Code § 2333 (d) (2), secondo cui : <<2) Liability.— In an action under subsection (a) for an injury arising from an act of international terrorism committed, planned, or authorized by an organization that had been designated as a foreign terrorist organization under section 219 of the Immigration and Nationality Act (8 U.S.C. 1189), as of the date on which such act of international terrorism was committed, planned, or authorized, liability may be asserted as to any person who aids and abets, by knowingly providing substantial assistance, or who conspires with the person who committed such an act of international terrorism>>.

Differenza tra non applicabilità dello safe harbour e affermazione di responsabilità

La corte distrettuale del Wisconsin -western dist.-  31.03.2023, caso No. 21-cv-320-wmc, Hopson + Bluetype c. Google + Does 1 e 2, ha ben chiara la differenza tra i due concetti: che non sia invocabile il  safe harbour non significa che ricorra in positivo responsabilità (anche se di fatto sarà probabile).

Non altrettanto chiara ce l’hanno alcuni nostri opininisti (dottrina e giurisprudenza).

Nel caso si trattava del safe harbour per il copyright in caso di procedura da notice and take down e in particolare da asserita vioalzione della procedura che avrebbe dovuto condurre google a “rimettere su” i materiali in precedenza “tirati giu” (§ 512.g) del DMCA).

<<Here, plaintiffs allege that defendant Google failed to comply with § 512(g)’s
strictures by: (1) redacting contact information from the original takedown notices; (2) failing to restore the disputed content within 10 to 14 business days of receiving plaintiffs’ counter notices; and (3) failing to forward plaintiffs’ counter notices to the senders of the takedown notices. As Google points out, however, its alleged failure to comply with  § 512(g) does not create direct liability for any violation of plaintiffs’ rights. It merely denies Google a safe harbor defense should plaintiffs bring some other claim against the ISP for removing allegedly infringing material, such as a state contract or tort law claim. Martin, 2017 WL 11665339, at *3-4 (§ 512(g) does not create any affirmative cause of action; it
creates a defense to liability); see also Alexander v. Sandoval, 532 U.S. 275, 286-87 (2001) (holding plaintiffs may sue under a federal statue only where there is an express or implied private right of action). So, even if Google did not follow the procedure entitling it to a safe harbor defense in this case, the effect is disqualifying it from that defense, not creating liability under § 512(g) of the DMCA for violating plaintiffs’ rights.>>

Ancora nulla circa tale procedura in UE: gli artt. 16-17 del DSA reg. UE 2022/2065 non ne parlano (pare lasciarla all’autonomia contrattuale) e nemmeno lo fa la dir. specifica sul copyright,  art. 17 dir. UE 790/2019.

(notizia e link dal sito del prof. Eric Goldman)

Youtube non è corresponsabile delle violazioni di copyright consistite in ripetuti upload sulla sua piattaforma

Youtube non è corresponsabile delle violazioni di copyright date da ripetuti upload sulla sua piattaforma. Così US distr. court southern district of Florida 16 maggio 2023, Case No. 21-21698-Civ-GAYLES/TORRES, Athos overseas ltc c. Youtube-Google.

domanda attorea:

According to Plaintiff, Defendants are liable under direct and secondary infringement theories for YouTube’s failure to prevent the systematic re-posting of Plaintiff’s copyrighted movies to its platform. Plaintiff contends that YouTube has turned a blind eye to rampant infringement of Athos’ copyrights by refusing to employ proprietary video-detection software to block or remove from its website potentially infringing clips, and not just clips specifically identified by URL in Plaintiff’s DMCA takedown notices. In essence, Plaintiff argues that evidence of YouTube’s advanced video detection software, in conjunction with the thousands of takedown notices Athos has tendered upon YouTube, give rise to genuine issues of fact as to whether Defendants have forfeited the DMCA’s safe harbor protections.

Domanda rigettata: il provider non pèerde il suo safe harbour ex 17 US code § 512 per assenbza dell’element soggettivo:

<<Indeed, in Viacom the Second Circuit rejected identical arguments to the ones asserted here by Athos, which were presented in a lawsuit brought by various television networks against YouTube for the unauthorized display of approximately 79,000 video clips that appeared on the website between 2005 and 2008. Viacom, 676 F.3d at 26. Among other things, the Viacom plaintiffs argued that the manner in which YouTube employed its automated video identification tools—including liming its access certain users—removed the ISP from the safe harbor. Id. at 40–41. Yet, the court unequivocally rejected plaintiffs’ arguments, holding that the invocation of YouTube’s technology as a source of disqualifying knowledge must be assessed in conjunction with the express mandate of § 512(m) that “provides that safe harbor protection cannot be conditioned on ‘a service provider monitoring its service or affirmatively seeking facts indicating infringing activity[.]’”9 Viacom, 676 F.3d at 41 (quoting 17 U.S.C. § 512(m)(1))>>

poi:

<<Plaintiff conflates two concepts that are separate and distinct in the context of YouTube’s copyright protection software: automated video matches and actual infringements. As explained by YouTube’s copyright management tools representative, software-identified video matches are not necessarily tantamount to  copyright infringements. [D.E. 137-7, 74:21–25]. Rather, the software detects code, audio, or visual cues that may match those of a copyrighted work, and presents those matches to the owner for inspection. Thus, while YouTube systems may be well equipped to detect video matches, the software does not necessarily have the capacity to detect copyright infringements. See id. Further, the accuracy of these automatically identified matches depends on a wide range of factors and variable. [Id. at 75:1–10, 108:2–110:17, 113:3–114:25]. That is why users, not YouTube, are required to make all determinations as to the infringing nature of software selected matches. [Id.].
Second, Plaintiff does not point to any evidence showing that YouTube, through its employees, ever came into contact, reviewed, or interacted in any way with any of the purportedly identified video matches for which Athos was allegedly required to send subsequent DMCA takedown notices (i.e., the clips-in-suit). As explained by YouTube’s product manager, the processes of uploading, fingerprinting, scanning, and identifying video matches is fully automated, involving minimal to no human interaction in the part of YouTube. [Id. at 68:22–69:18, 118:17–119]. The record shows that upon upload of a video to YouTube, a chain of algorithmic processes is triggered, including the automated scanning and matching of potentially overlapping content. If the software detects potential matches, that list of matches is automatically directed towards the copyright owner, by being displayed inside the user’s YouTube interface. [Id. at 68:22–70:25]. Therefore, the record only reflects that YouTube does not rely on human involvement during this specific phase of the scanning and matching detection process, and Plaintiff does not proffer any evidence showing otherwise>>.

sintesi:

<<As the relevant case law makes clear, evidence of the technologies that ISPs independently employ to enhance copyright enforcement within their system cannot form the basis for ascribing disqualifying knowledge of unreported infringing items to the ISP. Such a conception of knowledge would contradict the plain mandate of § 512(m), “would eviscerate the required specificity of notice[,] . . . and would put the provider to the factual search forbidden by § 512(m).” Viacom, 718 F. Supp. 2d at 528. Thus, we find that Athos’ theory that specific knowledge of non-noticed infringing clips can be ascribed to Defendants by virtue of YouTube’s copyright management tools fails as a matter of law>>.

Notizia e link alla sentenza dal blog del prof Eric Goldman

L’embedding non costituisce comunicazione al pubblico però non permette la difesa del safe harbour ex § 512DMCA

Il giudice Barlow della Utah District Court, 2 maggio 2023, caso 2:21-cv-00567-DBB-JCB, decide un’interessante lite sull’embedding.

Attore è il gestore dei diritti su alcune foto eseguite da Annie Leibovitz. Convenuti sono i gestori di un sito che le aveva “riprodotte” con la tecnica dell’embedding (cioè non con riproduzine stabile sul proprio server).

Il giudice applica il c.d server test del noto caso Perfect 10 Inc. v. Google  del 2006 così sintetizzato: <<Perfect 10, the Ninth Circuit addressed whether Google’s unauthorized display of thumbnail and full-sized images violated the copyright holder’s rights. The court first defined an image as a work “that is fixed in a tangible medium of expression . . . when embodied (i.e., stored) in a computer’s server (or hard disk, or other storage device).” The court defined “display” as an individual’s action “to show a copy . . ., either directly or by means of a film, slide, television image, or any other device or process ….”>>.

Quindi rigetta la domanda nel caso dell’embedding sottopostogli :

<<The court finds Trunk Archive’s policy arguments insufficient to put aside the “server” test. Contrary to Trunk Archive’s claims, “practically every court outside the Ninth Circuit” has not “expressed doubt that the use of embedding is a defense to infringement.” Perfect 10 supplies a broad test. The court did not limit its holding to search engines or the specific way that Google utilized inline links. Indeed, Trunk Archive does not elucidate an appreciable difference between embedding technology and inline linking. “While appearances can slightly vary, the technology is still an HTML code directing content outside of a webpage to appear seamlessly on the webpage itself.” The court in Perfect 10 did not find infringement even though Google had integrated full-size images on its search results. Here, CBM Defendants also integrated (embedded) the images onto their website.(…) Besides, embedding redirects a user to the source of the content-in this case, an image hosted by a third-party server. The copyright holder could still seek relief from that server. In no way has the holder “surrender[ed] control over how, when, and by whom their work is subsequently shown.” To guard against infringement, the holder could take down the image or employ restrictions such as paywalls. Similarly, the holder could utilize “metadata tagging or visible digital watermarks to provide better protection.” (…)( In sum, Trunk Archive has not persuaded the court to ignore the “server” test. Without more, the court cannot find that CBM Defendants are barred from asserting the “embedding” defense. The court denies in part Trunk Archive’s motion for partial judgment on the pleadings.>>

Inoltre, viene negato il safe harbour in oggetto, perchè non ricorre il caso del mero storage su server proprio di materiali altrui, previsto ex lege. Infatti l’embedding era stato creato dai convenuti , prendendo i materiali da server altrui: quindi non ricorreva la passività ma l’attività , detto in breve

(notizia e link alla sentenza dal blog del prof Eric Goldman)

L’azione di danno ex § 512.f Copyright Act concerne solo l’abuso di copyright, non di marchio

UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA, CV 22-4355-JFW(JEMx), del 21 aprile 2023,  Yuga Labs, Inc. -v- Ripps, et al., decide una lite su marchio  in causa promossa dal titolare del NFT “Bored Ape” contro un visual artist (Ripps) che lo critica: Ripps is a visual artist and creative designer who purports to create artwork that comments in the boundaries between art, the internet, and commerce. According to Defendants, Yuga has deliberately embedded racist, neo-Nazi, and alt-right dog whistles in the BAYC NFTs and associated projects.3 Beginning in approximately November 2021, Ripps began criticizing Yuga’s use of these purported racist, neo-Nazi, and alt-right dog whistles through his Twitter and Instagram profiles, podcasts, cooperation with investigative journalists, and by creating the website gordongoner.com.

Y. manda allora richieste di notice and take down (NATD) per marchio spt. ma anche per dir. di autrore.

R. reagisce azionando la disposizione nel  titolo.
Ma la corte -delle 25 richieste NATD- esamina solo quelle (quattro) che hanno portato al take down e solo quelli di copyrigjht (una), non quelle su marchio (tre). Del resto il tenore della norma è inequivoco.

E rigetta l’eccezione (o dom. riconvenzionale?): With respect to the only DMCA notice that resulted in the takedown of Defendants’ content,
Defendants have failed to demonstrate that the notice contains a material misrepresentation that
resulted in the takedown of Defendants’ content or that Yuga acted in bad faith in submitting the
takedown notice. Although Defendants argue that Yuga does not have a copyright registration for
the Ape Skull logo that was the subject of the DMCA takedown notice, a registration is not required
to own a copyright. Instead, a copyright exists at the moment copyrightable material is fixed in any
tangible medium of expression. Fourth Estate Public Benefit Corp. v. Wall-Street.com LLC, 139
S.Ct. 881, 887 (2019); see also Feist v. Publ’ns, Inc. v. Rural Tel. Serv. Co., 449 U.S. 340, 345
(1991) (holding that for a work to be copyrightable, it only needs to possess “some minimal degree
of creativity”). Moreover, courts in the Ninth Circuit have held that a logo can receive both
trademark and copyright protection. See, e.g., Vigil v. Walt Disney Co., 1995 WL 621832 (N.D.
Cal. Oct. 16, 1995).

La setnnza è itnerssante però anche -soprattutto.- per  il profili di mnarchio e concorrenza sleale circa l’uso dell’NFT.

(notizia e link alla sentenza dal blog del prof. Eric Goldman)

La denuncia di elusione dellle protezioni non èp coperta dal 17 U.S. Code § 512 (DMCA) Misrepresentations

La responsabilità del denunciante per aver dolosamente affermato la contraffazione altrui non riguarda il semplice dire che c’è stata elusione delle misure di protezione.

Così la district court of Connecticut 30 settembre 2022, Case 3:20-cv-01602-SRU  , Yout c. The Recording Industry Association of America, Inc. (the “RIAA”), in un azione di accertament negativo proposta da iun fornire di servizi che permettono il  downloading di audiovisivi su Youtube , nonostante questi siano offerti solo in streaming non downloadibile (con il YouTube’s Rolling Cypher).

<< Section 512(f) has is limited to misrepresentations of copyright infringement. See Twelve
Inches Around Corp. v. Cisco Sys.
, 2009 WL 928077, at *3 (S.D.N.Y. Mar. 12, 2009) (“While
Section 512(f) is not explicitly limited to misrepresentation of copyright infringement, it requires
that the misrepresentation be ‘under [Section 512],’ which deals exclusively with copyright
infringement, and sets forth in great detail when and how an internet service provider can be
liable for copyright infringement”);
Arista Records, Inc. v. MP3Board, Inc., 2002 WL 1997918,
at *15 (S.D.N.Y. Aug. 29, 2002) (“Section 512 only penalizes copyright holders for knowingly
materially misrepresenting ‘that material or activity is infringing.’ It does not provide a cause of
action for knowingly materially misrepresenting [other claims].”);
accord Rossi v. Motion
Picture Ass’n of Am., Inc.
, 391 F.3d 1000, 1004 (9th Cir. 2004) (setting forth that a section
512(f) cause of action is an “expressly limited cause of action for improper infringement
notifications”).
Here, Yout has failed to plead a plausible claim for relief under section 512(f) because it
has only alleged that the RIAA knowingly misrepresented that Yout’s software circumvents the
YouTube technological measures, not that Yout is infringing certain copyrighted works.
See
SAC, Doc. No. 45, at 28 ¶¶ 138-140. Although the circumvention notices sent by the RIAA
superficially resemble take down notices under section 512(c), the notices do not identify any
copyrighted works and accordingly are incapable of being misrepresentations under section 512.
See id. at 28 ¶¶ 136-137. Yout attempts to remedy this deficiency by alleging that the RIAA’s
circumvention notices amount to an allegation of secondary copyright infringement and that
Yout’s customers interpreted the notices as alleged copyright infringement.
See SAC, Doc. No.
45, at 27 ¶¶ 136-137. But Yout’s arguments are not persuasive, because the notices stated that
YouTube’s technological measure (therein, “rolling cipher”) “
protects [the RIAA’s] members’
works on YouTube from unauthorized copying/downloading,” not that Yout itself was infringing
the copyrighted works.
Id. at 28 ¶ 137.
Furthermore, even assuming that the RIAA’s notices constituted an allegation of
secondary copyright infringement, Yout has provided no case law that suggests that such an
allegation could result in a violation of section 512(f), nor have I found any caselaw suggesting
so. I decline to credit that claim.
Moreover, I agree with the RIAA that Yout alleges no facts suggesting that the RIAA
“knowingly” misrepresented the nature of Yout’s service. To do so, a defendant must have
actual knowledge that it is making a misrepresentation of fact.
Cabell v. Zimmerman, 2010 WL
996007, at *4 (S.D.N.Y. Mar. 12, 2010). But, again, Yout alleges no facts suggesting that the
RIAA “knowingly” misrepresented the nature of Yout’s service.
Ningbo Mizhihe I&E Co., Ltd.
v. Does 1-200
, 2020 WL 2086216, at *3-4 (S.D.N.Y. Apr. 30, 2020) (dismissing a Section 512(f)
claim where “there [wa]s insufficient material in the pleadings to support the inference that [the
p]laintiff knew their copyrights were not enforceable”);
Cabell, 2010 WL 996007, at *4
(dismissing a Section 512(f) claim where the complaint “allege[d] no facts from which a court
could find it facially plausible that Defendant knew it was misrepresenting the facts when it
wrote to YouTube”).
Because section 512(f) only covers knowing misrepresentations of copyright
infringement and not circumvention of a technological measure, I
grant the RIAA’s motion to
dismiss Yout’s 17 U.S.C. § 512(f) claim
>>

Interpretazione di assai dubbia esattezza.

La sentenza poi offre dettagli tecnici approfonditi sul se Youtube impedisca i download con misure di protezione in senso tecnico ai sensi del copyright e cioè ai sensi del 17 US Code § 1201 (v. § 2 2. The Yout Service,  p 2 segg.).

Stante la normativa italiana (tit. II ter l. autore, artt. 102 quater e quinquies), la motivaizone è di sicuro interesse anche per noi

(notizia e link alla sentenza dal blog del prof. Eric Goldman)