Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Contributory Copyright Infringement and Peer-to-Peer Networks

By Rufus J. Pichler
August 26, 2003

The second labor of Hercules was to kill the monstrous nine-headed Hydra. When Hercules struck off one of the Hydra's heads, two new ones grew forth in its place. The entertainment industry's fight against its modern menace, peer-to-peer file sharing networks, presents no lesser task. The record companies successfully shut down Napster (see A&M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896 (N.D. Cal. 2000), aff'd in part, rev'd in part, 239 F.3d 1004 (9th Cir. 2001)) and Aimster (see In re Aimster Copyright Litig., 2002 U.S. Dist. LEXIS 17054 (N.D. Ill. 2002)) only to witness the instant emergence of Gnutella, Grokster, Kazaa, Morpheus, and similar services (as well as the re-emergence of Aimster, now known as Madster). We know, of course, that Hercules completed his second labor after figuring out that he could prevent growth of the new heads by burning the wound. However, unlike the Hydra, peer-to-peer file sharing technologies evolve quickly and swiftly adapt to changed circumstances. Thus, Hollywood's plaintiffs are likened more to Sisyphus (who was condemned to an eternity of pushing the rock up the mountain only to have it fall down again) than to Hercules. The most recent example is the decision in Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 2003 U.S. Dist. LEXIS 6994 (C.D. Cal. April 25, 2003).

The Decision in MGM v. Grokster

The plaintiffs in the two consolidated cases, the major motion picture studios and record companies (in the original MGM Studios, Inc. v. Grokster, Ltd. case) and a class of professional songwriters and music publishers (in the original Leiber v. Consumer Empowerment BV case), brought an action for contributory and vicarious copyright infringement in connection with the sharing of music, movies and other digital content in certain peer-to-peer networks. Peer-to-peer networks consist of certain network technology and a client software or 'node' that allows users to connect to each other. The defendants, Grokster, Ltd., StreamCast Networks, Inc., Kazaa BV, and Sharman Networks, each distribute peer-to-peer software. Initially, Grokster, StreamCast and Kazaa all used the proprietary FastTrack network technology (developed by the Dutch founders of Kazaa and licensed through another entity) and distributed a version of the Kazaa Media Desktop software. StreamCast subsequently developed its own client software called Morpheus and now utilizes the open source Gnutella network technology instead of FastTrack.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Legal Possession: What Does It Mean? Image

Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.

The Anti-Assignment Override Provisions Image

UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?