Computer Software Piracy and Copyright Infringement Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:


Computer Software Piracy and Copyright Infringement

This work completes my portion of the Blue Team's group project where we were each assigned a set of cases to review and summarize. This report is the summary for case number 3 called, Universal City Studios, Inc. V. Reimerdes. The purpose was to read and then assess each case. The objective of the paper is to provide a case summary and the rules of law that pertain to the case, the main case issues as they influence society, the Court's final conclusion and whether or not I concur and as mentioned a compare and contrast with the other cases assigned.

Case 3 summary

The Defendants were web page owners that provided a software over the internet called DeCSS, which had a sole purpose of decoding the scrambled signals off the plaintiffs' motion picture studios' digital versatile disks (DVDs). With the descrambling software, anyone could take the DVD's and reproduce an exact and flawless copy of the original movie content which was by law a violation of existing copyright statutes.

Under the Digital Millennium Copyright Act, Universal City Studios, Inc. therefore brought suit against the web site owners, Reimerdes, because of the fact that the defendants were knowingly providing the program over the Internet from their Web site.

The plaintiffs were not arguing the fact that the specialized software technology infringed their copyrights, but rather that because once used the software provided an opportunity to circumvent the copyright protection system and therefore promoting illegal activity and facilitating an infringement. The request by the plaintiffs was to have the distribution of the software stopped through a preliminary injunction as well as expected remedy for losses.

The defendants in their own defense were asserting that they were only implementing their First Amendment rights by posting the software on the web site. The implication was that the defendants were not promoting illegal activity but merely posting information for the sake of providing information t the general public.

Rules of law

There are two real questions here. What does a copyright do and who does the freedom of speech apply. For the copyright, they are owned by an individual or company who has the rights for a creation or work of expression. The exception to this in Copyright law would be if a work was created by an employee of a company, the employer owns the copyright; if an independent contractor signs a written agreements stating that any work performed is therefore the company that owns the contract and therefore the copyright; or if a company purchases another organization or if they sell their own operation, copyrights go to the buyer who would therefore become the copyright owner.

Copyright gives an owner the rights to: reproduction, distribution, performance or display and to create adaptations or derivatives. Copyrights would therefore give the movie producers in this case the ability to realize commercial gain from underlying work or they could license these rights. The bottom line is simple; from the perspective of the copyright the plaintiffs have a very good case if the court agrees that the circumvention software takes away the underlying rights. Thus, the actual law states:

The statute that pertained to this case was Section 1201(a) (2) of the Copyright Act, part of the DMCA, provides that:

No person shall... offer to the public, provide or otherwise traffic in any technology... that

A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under [the Copyright Act];

B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under [the Copyright Act]; or is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure that effectively controls access to a work protected under [the Copyright Act]." (Case Summary, 2000)

Circumvent a technological measure" is defined to mean descrambling a scrambled work, decrypting an encrypted work, or "otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner." n11 The statute explains further that "a technological measure 'effectively controls access to a work' [**11] if the measure, in the ordinary course of its operation, requires the application of information or a process or a treatment, with the authority of the copyright owner, to gain access to a work." (Case Summary, 2000)

Case issues

CSS (Content Scramble System) software is an encryption-based security and authentication system process that provides access control and copy protection for unauthorized reproduction and distribution of movies in the DVD format. DeCSS is a software utility developed to crack the CSS protection and therefore enables users to copy and distribute digital copies of DVD movies. The fact that the DeCSS process did in fact defeat CSS copyright efforts was assumed to be accurate.

The court decision was in the form of a preliminary injunction that would stop the distribution by the defendants of the DeCSS circumvention technology software and implied that the service providers or their Internet web site could not legally give out the decryption software. In so ruling, the court applied the anti-circumvention provisions of the Digital Millennium Copyright Act (DMCA) and dismissed each of the asserted defenses positions. The court determined that the service provider exemption only provides protection from liability for copyright infringement and does not apply to circumvention products and technologies prohibited by the DMCA.

The court ordered the preliminary injunction based on the court's decision that if the defendant's actions of distribution continued they were creating a situation of irreparable harm to the plaintiffs. The plaintiffs were well aware that their argument held merit based on the fact that the defense was only arguing free speech legislation and not defending the circumvention of copyright infringement.

Courts conclusion

The Court granted the plaintiffs' motion for the preliminary injunction. The court determined that the reverse engineering exception did not apply based on the fact that the rule only applied to computer programs and not circumvention of technological systems such as movies. The encryption research exception was also found inapplicable based on the fact that there was no suggestion that any defendant was engaged in good faith encryption research. Most importantly, the court determined that the fair use defense does not apply to Anticircumvention cases under the DMCA because Congress did not so provide in the DMCA.

The court ruled that enforcement of the DMCA Anticircumvention provisions did not violate the First Amendment, and the application of the DMCA Anticircumvention provisions to prohibit the production and distribution of the DeCSS circumvention technology does not violate the First Amendment. Furthermore, the court determined the prior restraint doctrine does not require denial of the preliminary injunction.

Opinion on decision believe in the copyright laws even though I love the concept of Napster and free movies songs and DVD's. The copyright laws provide the privileges of ownership. If I was to write a best selling book, song or software program, I would want to receive my fair share and thus would not want my work being exploited on the Internet simply because there was a software program available that could digitize and distribute my work. The problem may not even be in the copying of the work but what may be more important is the distribution possibilities.

Compare and contrast

One major contrast in each of these cases is the distinction between technology and software. The copyright laws seem to be better prepared to handle suits filed revolving around software disputes as opposed to physical technology such as DVD's. For example, the Real software position was a good demonstration of how software is easily protected.

The comparison is obviously that…[continue]

Some Sources Used in Document:


Cite This Term Paper:

"Computer Software Piracy And Copyright Infringement" (2004, November 13) Retrieved December 6, 2016, from

"Computer Software Piracy And Copyright Infringement" 13 November 2004. Web.6 December. 2016. <>

"Computer Software Piracy And Copyright Infringement", 13 November 2004, Accessed.6 December. 2016,

Other Documents Pertaining To This Topic

  • Ethics in Software and Copyright Infringements in the Balkans

    Ethics in Software and Copyright Infringements in the Balkans The first point one has to look at is the situation in these countries and their position in terms of development as also the size of the potential market. There are a total of eight countries and most of them have been in political turmoil till about ten years ago. These countries are all breakaway portions of other bigger countries, or the

  • Copyright Laws vs Peer To Peer File Transfer This

    Copyright Laws vs. Peer-to-Peer File Transfer This paper presents a detailed examination of copyright laws, with a comparison to peer-to-peer file transfer. The author will take the reader on an exploratory journey, in which the details and outcomes of several well-known cases will be scrutinized. The author will also discuss the importance of copyright laws, and the elements of various cases that caused the rulings to go the way they did.

  • Copyright Law

    Copyright Law: Music Downloads Music piracy is by no means a new phenomenon. At the beginning of the twentieth century, when music was sold in the form of printed "sheet music," pirates took advantage of a the-then newly developed technology called photolithography and sold duplicate copies of the 'legal music' at half the price -- causing great annoyance among the music publishing companies. (Johns, 2002, p. 68) Much later, the 1960s

  • Copyright and Public Interest in

    The very nature of the copyrighted material is also taken into account when determining 'fair use', and the amount of the copyrighted material being used in relation to the entire original work will also be considered. Another important aspect is the result or effect that the publication of the copied pieces would have on the copyrighted material in relation to the sale of or on the market value of the

  • Digital Millennium Copyright Act

    Digital Millennium Copyright Act It was in the year 1998, in the month of October that the Digital Millennium Copyright Act was passed by the U.S. Congress after much deliberations and controversy. It would be another two weeks, October 28th to be exact, that the Act became a Law. The law was signed by the then President, Bill Clinton. The law was approved and also supported by the entertainment industry as

  • Chinese Piracy of US Products

    Chinese Piracy of U.S. Products China, with a population of more than 1.3 billion, represents the largest consumer market in the world. Business interests in this market and the opening of China in the 1970s have lead to China's membership in the World Trade Organization as well as increased cooperation and interaction between the Chinese government, Chinese businesses and the international political and business community. This engagement has focused attention on

  • Digital Millennium Copyright Act Dmca

    DMCA is considered to be at its weakest point because it illegalizes free expression and leads to the detriment of various innocent victims (Wilbur, 2000). Moreover, other arguments have been raised against DCMA on the fair use of the state's intellectual property paid for by consumers. For instance, companies like Apple go to extremes of locking their devices. Significantly, third developers of software have an opportunity of developing ridiculous processes

Read Full Term Paper
Copyright 2016 . All Rights Reserved