CS 306 - Synthesis of Ethics & Law for the Computing Professional George Mason University
 9781506655017

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Cases and Materials CS 306 -- Synthesis of Ethics & Law for the Computing Professional George Mason University

Fall 2019 Tamara A. Maddox

Michael W. Tompkins Michael P. Maddox

Copyright 2005, 2008 -- Maddox, Tompkins, Maddox. All rights reserved.

Table of Contents

II

Introduction — The American Legal System ..........cccccccccssssscsscsseessesscesseseesacesesssesscessceasens 1 A Note on Research Papers...........ccsccsccsscssseeseeseeeceesseeceeeeaeseaeeseeseeeseesesseeeseesseeseceeeneceneesees 4

Ul.

Free Speech... ccececscecssesscsecsseseesceseseeececcesesceseeseesesaessecsesaeeaeaeeeseeseeseeseeseeseesecseesseseeaees 6 Brandenburg V. ONI0 o..ceeccescceccescsssessessccseceseesececeeaecuncsesseseceesesaeceseeseeeseeaecseseseseeeneeeaeetees 6

18 U.S.C. § 1460.

IV.

eee cece cceeceeeceeeeeeseeseesecseesesseeaeeseeeesecseenecseeseeseesessesaeesenseeseeeteeesssaeees 10

Ashcroft v. The Free Speech Coalition .......cccccecccceecessesesseeseessesseseessesessessessesseeesecssensenes United States v. Willi .......cccccccccesscsscessessesssesscsseeseesecsecesecacenecseseneeseeeaeeaeteaseaeeeeneeeats New York Times Co. v. United States ......cccccccceccessseseesesesteseeseesseeseeseesseeseessceaecnssessesseees PYUVACY oo... ceeeeececeseeeseesceeeseenseceseceseececeseceaeessacesuecscecaeesecaeceeecesseeseeeseeceseceueessecesseeseceaeecsass The Health Insurance Portability and Accountability Act .........ccccccccecscsesteceeseeeeees

11 17 27 4l 4]

The Gramm-Leach-Bliley Act .........cccccccecsececessessesseseesseseeseaeseesecseesecseceesacsessecseeseesseas 51 The European Union Data Protection Directive ..............ccccecceceseeeeeeeeeceeeesteeneeeeeeseeseesees 65

Tn re Bodil Lindqvist .....0.....cccccccccccecececevseeseeseeseesenecaeeeeaceseeseeseeseeseeseeseeeseseueseeeneeeeseesees 65

VI.

Intellectual Property .............:cceccesseseeseeeseesecseeeeeesecceeseeseceeeeaeeseeeaeeaeceeeeseceseeseceeesseeeseeseseaees 78 The Statute of Anne (1710) oo... ec cccceseceecesceeeceseeeseeesecesecsseccseeeseeeseesseeeseensseeeeesaees 78 Sony Corporation of America v. Universal City Studios, INC. .........00cccccccccceeveeteeereees 80 Campbell v. Acuff-Rose Music, INC........ccccceccccceecceceeseesenseesesesececseeasesesaecaeeueceeneeeeaeens 90 A & M Records v. NAPSter .......ccccsccseceesccssseesseesseeeseeeseceseceneceaeesaecesceceeseaeeeseeeaeenaeeseeseas 98 MGM v, Grokster o..ccccsecseccesessessessesessesseeseceuceseescensesceaeesecsesssesesecesaseceeseesenseeaseaseeseasens 111 Code Of Virginia ..........ccccccccccesesseeesceececeescesecsecesecseeaeeeaeeaeesaeeaeeaeenseceeeaeseseeaeeeeeeseeseeas 122 Computer Crimes ..........:cccesecsceessseseeeeececessseeesecneeeseceseesseceseeeseceseceeecueceaeceaeeeeseeeseesstenses 129 The Virginia Computer Crimes Act... cece eccscseessesecseeseeseeeeaseeeaeeneeeeeseeseeeeeaeea® 129 Jeremy Jaynes v. Commonwealth of Virginia ....c..ccccccccscseescseessssecssesseneseesteeneeeeenetaees 134

The Computer Fraud and Abuse Act o.......eccceecesescecceccesceceeeesecseesecaecaecatenetseeeeeeeaeenes 153 EF Cultural Travel BV v. Exploricd, INC. ......cc.ccccccccccccccetc eee c ence tte t tes eteecenettusetesenseees 156

I.

Introduction — The American Legal System

In any given place in America, there are two sovereign governments: the federal government and the state government. For example, a person standing in the George Mason University Fairfax campus is within the sovereign jurisdiction of the United States of America and the Commonwealth of Virginia. There may be other relevant governments (e.g., the County of Fairfax, the City of Fairfax, and to some extent George Mason University itself), but they are all branches of one of the two sovereign governments named above. So, what is a sovereign? Simply put, it is a government that answers to no one but its own citizens (and to anyone else to whom it agrees to answer). In the U.S., the ultimate sovereign authority is the state government. In 1789, however, the then-existing states adopted a constitution under which they voluntarily gave up some of their sovereignty to a new, higher government named the United States of America. But the federal government is a limited one; it only has authority in specific areas (e.g., national defense, interstate commerce, etc.). If the U.S. Constitution fails to provide authority over a given area to the national government, then the federal government cannot regulate that area. A.

Federal Courts versus State Courts

Every sovereign has its own court system. That is why court cases can be brought in federal court or in state court. Neither is superior to the other per se; rather, each is superior in its own area. For example, if Jeff (a Maryland citizen) and Mary (a Virginia citizen) are involved in an automobile accident in Georgia, Jeff may sue Mary in Georgia (because that is where the accident happened) or in Virginia (because that is where the Mary lives). Georgia and Virginia both have state “courts of general jurisdiction” (courts that can hear any case) that are competent to decide this case. In addition, because the parties are citizens of different states (and if the amount in controversy exceeds a certain amount), Jeff may sue Mary in a federal court if he prefers. This means that Jeff has a number of choices: he may sue Mary in a Georgia state court, a Georgia federal court, a Virginia state court, or a Virginia federal court. But, no matter which court he chooses, Georgia substantive law will apply, because that’s the law that determined who had the right-of-way at the time. (Whichever court hears the case will follow its own procedural rules, such as what dates are available for hearings, when various motions have

to be filed, and so forth, but the substantive law, such as “Is making a left turn at a red light legal from a one-way street to a one-way street?”, will be determined by the location of the alleged injury).

So, assuming that Jeff sues Mary in federal court in Virginia, the federal judge will be bound by Georgia law when deciding who had the right-of-way — even if the judge doesn’t like what Georgia law says, and even if Georgia law is the exact opposite of Virginia law. And there are plenty of court opinions in which a federal court (even the United States Supreme Court) has

said something to the effect of “We are bound in this case by the law of Georgia as set forth in decisions of the Georgia Supreme Court.” On the other hand, the federal courts are supreme on questions of federal law (including federal constitutional law). The U.S. Constitution specifically provides that:

This Constitution, and the Laws of the United States which shall be made in Pursuance thereof, and all Treaties made, or which shall be made, under the Authority of the United States,

shall be the supreme Law of the Land, and the Judges in every State shall be bound thereby, any Thing in the Constitution or Laws of any state to the Contrary notwithstanding. U.S. Const., art. VI, cl. 2. B.

Civil Cases versus Criminal Cases

In addition to the location of the court, any case in America is likely either a civil case or

a criminal case. A criminal case is one in which the government (the sovereign) is alleging that the defendant(s) committed a crime and must be punished, either by being placed in jail or by

being fined.

Only the government can choose whether to bring a criminal case — the victim has

no say in the matter (though some states by law, and most prosecutors by personal preference, permit the victim to be heard before the prosecutor makes the decision). Criminal cases are subject to a difficult standard of proof: the government must prove its case beyond a reasonable doubt. In other words, if the trier of fact (usually a jury) has any doubt about the defendant’s guilt, and if that doubt is reasonable, the government loses. Civil cases, on the other hand, are private lawsuits in which one person (the plaintiff) is asking the court to order the other person (the defendant) either (A) to pay money to the plaintiff; and/or (B) to do (or not do) something. Sometimes a plaintiff wants both (A) and (B). For example, a homeowner whose neighbor keeps driving on his lawn might sue the neighbor asking for money (to repair the lawn) and an injunction (a court order to stay off the homeowner’s property). Each state’s court system is structured by that state. This includes how and where each type of suit is brought, as well as methods of appeal when applicable.

A simplified’ chart of the different court systems in place in Virginia

Virginia Supreme Court

(Federal Questions Only)

4

U.S. Supreme Court 4

Virginia Court of Appeals

USS. Circuit Court of Appeals

Virginia Circuit Court

U.S. District Court

Virginia General District Court

Virginia Juvenile & Domestic Relations District Court

U.S. Bankruptcy Court

*

This chart is very simplified: for example, on the Virginia side, this chart omits small claims court; most criminal cases are appealed from the Circuit Court to the Court of Appeals, except that death penalty cases go directly to the Supreme Court; while most civil cases are appealed directly from the Circuit Court to the Supreme Court, except that divorce cases go to the Court of Appeals even though they’re civil cases. In addition, many but not all cases begin in the Circuit Court, not in either of the District Courts, and some cases (such as appeals of some administrative agencies’ decisions) start in the Court of Appeals. Some (rare) cases can even begin in the Supreme

Court.

The purpose of this chart is merely to give you a general idea of

how the system works, not to cover all the finer legal points of appellate procedure.

II.

A Note on Research Papers

As you know, this is a 300-level college course, one that has been designated as a “writing-intensive” course by the University. We thought it appropriate, therefore, to include a note about research papers. The key word in “research paper” is “research.” paper; you must perform the necessary research first. Format. 1.

It is not enough to write a research

A research paper will include the following parts: Title page:

This will be an otherwise blank page that contains the title of the

paper and the author’s name, prominently placed.

In a less prominent place you

should include the professor’s name, course, semester, and date of submission. The body of the paper: This will consist of three main parts: The introduction: This will introduce the paper’s topic, any necessary A. background (such as the facts relevant to the issue you’re researching), and the issues you intend to address. The body: This is the largest portion of the paper by far. It contains the substance of the information you intend to convey. Depending on the intent of the assignment, it may simply be informative, or it may attempt to persuade the reader to adopt a particular point of view. This section must be adequately supported by the various sources you found during your research. The usual method for doing this is to use footnotes that cite to a source. Another method is to use parenthetical references, while a third (the method used in legal writing) is to use citation sentences. These are demonstrated below. The conclusion: This part of the paper presents your personal conclusions regarding the assignment. Depending on the type of assignment, this may be a series of responses to questions you were asked; or it may be a final explanation of why the reader should agree with you. The bibliography (or “sources cited”): This will be a list of al] sources you cited in your paper, in alphabetical order by author, with each entry conveying enough information for the average reader to find your source with ease. If in doubt, follow Turabian’s format. If any of your sources are electronic, you must also include the date on which you last accessed the source (because electronic sources are ephemeral and might not be there when your reader tries to check them). Research. It’s a research paper. This means that you must perform research in order to earn a decent grade. This is not the time to prove that you read the course textbook, or that you know how to answer questions based on your own logical analysis. You need to demonstrate an

actual grasp of the available source material. On that note, you should remember that the available source material does not mean that you cite someone else’s summary of a third person’s conclusions regarding what a fourth person

meant. In such a situation, go to that fourth person’s material and find out what s/he has to say -directly. Do not rely on others’ interpretations of the material. Conclude. Conversely, it isn’t enough merely to research — or even to tell us the results of your research. You must also analyze what you find and tell us your conclusions. If you don’t explain what you’ve learned and why, there’s something wrong with your paper: it doesn’t say anything. Hints. 1. If your bibliography for a 300-level course research paper has only five sources in

NM

ad

2.

it, you probably didn’t do a good job researching. There is no such thing as good writing. There is only good rewriting. So start early to give yourself enough time to edit your paper before turning it in. Yes, we deduct for poor spelling and grammar. Learn to live with it. Cite, cite, cite. “It is well-known that courts enforce the First Amendment right of free speech.” Really? Give a citation to a source that says so. Don’t cite the course textbook. Really. Don’t cite the course textbook. Don’t cite the professor, either. A newspaper (even, or maybe especially, an on-line version) is not a reliable source. Neither is a newsmagazine, a blog, a television news program, or a radio program. Why? Because they’re all rushed into print (or its equivalent) under deadline, with pressure to “scoop” the competition — and many of them don’t even do their own research, preferring to rely on others for their facts (“sources said that....”). Furthermore, the author is seldom an expert on the subject him- or herself, and may not even know enough to distinguish appropriate source material without doing significant research. You need to use better sources than that. Just because it’s on the web doesn’t mean it’s reliable. (In fact, web sources are easier to prepare, post, change, and delete than printed sources, and therefore are often less reliable. Being on the web does not even guarantee that it’s current! The ease of grabbing chunks of previously posted information and inserting it into a “new” website can make online sources particularly suspect.) Check out your source before you go quoting it; is it reliable? What makes you think so? Just because your source comes from a publication or database that tends to be reliable, such as a university library database, doesn’t automatically make it a suitable reference for your research. A database focused on educational materials may be an excellent resource, but it does not guarantee that every source is reliable for every purpose. You still must investigate each source for yourself.

III.

Free Speech

Free speech is the concept that individuals have the right to express themselves without fear of government censorship, interference, or punishment. In the United States, freedom of

speech is protected by the First Amendment to the United States Constitution: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances. U.S. Const., amend. I (emphasis added). One issue that frequently arises in the free speech arena is the concept of “hate speech” or “inciteful” (not to be confused with “insightful”) speech: speech that attacks a person or group based on prejudice or hatred. Such speech is often said to be dangerous, on the ground that it risks inciting attacks on members of the group under discussion.

Brandenburg v. Ohio

No. 492 SUPREME COURT OF THE UNITED STATES 395 U.S. 444, 89 S. Ct. 1827, 23 L. Ed. 2d 430 June 9, 1969 PER CURIAM: The appellant, a leader of a Ku Klux Klan group, was convicted under the Ohio Criminal Syndicalism statute for “advocat[ing] .. . the duty, necessity, or propriety of crime, sabotage, violence, or unlawful methods of terrorism as a means of accomplishing industrial or political reform” and for “voluntarily assembl[ing] with any society, group, or assemblage of persons formed to teach or advocate the doctrines of criminal syndicalism.” Ohio Rev. Code Ann. § 2923.13. He was fined $ 1,000 and sentenced to one to 10 years’ imprisonment. The appellant challenged the constitutionality of the criminal syndicalism statute under the First and Fourteenth Amendments to the United States Constitution, but the intermediate appellate court of Ohio affirmed his conviction without opinion. The Supreme Court of Ohio

dismissed his appeal, sua sponte, “for the reason that no substantial constitutional question exists herein.”

It did not file an opinion or explain its conclusions. Appeal was taken to this Court, and we noted probable

reverse.

jurisdiction.

393

U.S.

948

(1968).

We

The record shows that a man, identified at trial as the appellant, telephoned an announcerreporter on the staff of a Cincinnati television station and invited him to come to a Ku Klux Klan “rally” to be held at a farm in Hamilton County. With the cooperation of the organizers, the reporter and a cameraman attended the meeting and filmed the events. Portions of the films were later broadcast on the local station and on a national network. The prosecution’s case rested on the films and on testimony identifying the appellant as the person who communicated with the reporter and who spoke at the rally. The State also introduced into evidence several articles appearing in the film, including a

Bible, films.

pistol, a rifle, a shotgun,

and a red hood worn

ammunition,

a

by the speaker in the

One film showed 12 hooded figures, some of whom carried firearms. They were gathered around a large wooden cross, which they burned. No one was present other than the participants and the

newsmen

who

made the film. Most of the words

uttered during the scene were incomprehensible when the film was projected, but scattered phrases could be understood that were derogatory of Negroes and, in one instance, of Jews.' Another scene on the same

'

The significant portions that could

be understood were:

film showed the appellant, in Klan regalia, making a speech. The speech, in full, was as follows: “This is an organizers’ meeting. We have had quite a few members here today which are -- we have hundreds,

hundreds of members throughout the State of Ohio.

I can

quote

from

a newspaper

clipping from the Columbus, Ohio Dispatch, five weeks ago Sunday morning. The Klan has more members in the State of Ohio than does any other organization. We’re not a revengent organization, but if our President, our Congress, our Supreme Court, continues to suppress the white, Caucasian race, it’s

possible that there might have to be some revengeance taken. “We are marching on Congress July the Fourth, four hundred thousand strong. From there we are dividing into two

groups,

one

group

to

march

on

St.

Augustine, Florida, the other group to march into Mississippi. Thank you.”

the text of which is quite similar to that of the laws of Ohio. *** The Court upheld the statute on the ground that, without more, “advocating” violent means to effect political and economic change involves such danger to the security of the State that the State may outlaw it. * * * But Whitney has been thoroughly discredited by later decisions. * * * These later decisions have fashioned the principle

that the constitutional guarantees of free speech and free press do not permit a State to forbid or proscribe advocacy of the use of force or of law violation except where such advocacy is directed to inciting or producing imminent lawless action and is likely to incite or produce such action. As we said in Noto v.

United States, 367 U.S. 290, 297-298 (1961), “the mere abstract teaching . . . of the moral propriety or even moral necessity for a resort to force and violence, is not the same as preparing a group for violent action and steeling it to such action.” * * * A statute which fails to draw this distinction impermissibly intrudes upon the freedoms guaranteed by the First and Fourteenth Amendments. It sweeps within its condemnation speech which our Constitution has immunized from governmental

control.* * * The second film showed six hooded figures one of whom, later identified as the appellant, repeated a speech very similar to that recorded on the was

Measured by this test, Ohio’s Criminal Syndicalism Act cannot be sustained. The Act punishes persons who “advocate or teach the duty, necessity, or propriety” of violence “as a means of

added: “Personally, I believe the nigger should be

accomplishing industrial or political reform”; or who

returned to Africa, the Jew Though some of the figures weapons, the speaker did not.

publish or circulate or display any book or paper containing such advocacy; or who “justify” the

first

film.

The

“revengeance”

reference was

to

omitted,

the

possibility

and one sentence

of

returned to Israel.” in the films carried

commission of violent acts “with intent to exemplify,

The Ohio Criminal Syndicalism Statute was enacted in 1919. From 1917 to 1920, identical or quite similar laws were adopted by 20 States and two territories.

* * *

constitutionality Syndicalism

Act,

In

1927,

this

of

California’s

Cal.

Penal

Court

Code

§§

sustained

the

Criminal 11400-11402,

“How far is the nigger going to -- yeah.” “This is what we are going to do to the niggers.” “A dirty nigger.” “Send the Jews back to Israel.” “Let’s give them back to the dark garden.” “Save America.”

spread or advocate the propriety of the doctrines of criminal syndicalism”; or who “voluntarily assemble” with a group formed “to teach or advocate the doctrines of criminal syndicalism.” Neither the indictment nor the trial judge’s instructions to the jury in any way refined the statute’s bald definition of the crime in terms of mere advocacy not distinguished from incitement to imminent lawless action. Accordingly, we are here confronted with a

statute which,

by its own

words

and as applied,

purports to punish mere advocacy and to forbid, on pain of criminal punishment, assembly with others merely to advocate the described type of action.*

“Let’s go back to constitutional betterment.” “Bury the niggers.”

“We intend to do our part.” “Give us our state rights.” “Freedom for the whites.” “Nigger will have to fight for every inch he gets from now on.”



Statutes

affecting

the

right

of

assembly, like those touching on freedom of speech, must observe the established distinctions between mere advocacy and incitement to imminent lawless action, for as Chief Justice Hughes wrote in De Jonge v. Oregon, supra, at 364:

Such a statute falls within the condemnation of the

his “opposition was so expressed that its natural and

First and Fourteenth Amendments. The contrary teaching of Whitney v. California, supra, cannot be supported, and that decision is therefore overruled.

intended effect would be to obstruct recruiting.” * * * “If that was

intended and if, in all

the circumstances, that would be its probable effect, it would not be protected by reason of its being part of a general program

Reversed.

and expressions of a conscientious belief.” bid.

general

and

MR. JUSTICE DOUGLAS, concurring.

In the While

I join the opinion of the Court, |

desire to enter a caveat.

The

“clear and present danger”

test was

adumbrated by Mr. Justice Holmes in a case arising during World War I -- a war “declared” by the Congress, not by the Chief Executive. The case was Schenck v. United States, 249 U.S. 47, 52, where the

defendant

was

charged

with

attempts

to

cause

“It is only the present danger of immediate evil or an intent to bring it about that warrants Congress in setting a limit to the expression of opinion where private rights are not concerned. Congress certainly cannot forbid all effort to change the mind of the country.” * * *

insubordination in the military and obstruction of enlistment. The pamphlets that were distributed urged resistance to the draft, denounced conscription, and impugned the motives of those backing the war effort. The First Amendment was tendered as a defense. Mr. Justice Holmes in rejecting that defense said:

Another “The

question

in

every

case

is

whether the words used are used in such circumstances and are of such a nature as to

create a clear and present danger that they will bring about the substantive evils that Congress has a right to prevent. question of proximity and degree.” Frohwerk

also

authored

prosecution

vy.

by

and

United States,

Mr.

Justice

punishment

249

Holmes,

for

Those, U.S.

204,

involved

publication

of

because “the circulation of the paper was in quarters

third

breath would

be enough to kindle a

Debs v. United States, 249 U.S. 211, was the of the trilogy of the 1918 Term. Debs was

convicted of speaking in opposition to the war where

“The right of peaceable assembly is a right cognate to those of free speech and free press and is * * *

was Schaefer v. United

then,

were

the

World

War

I cases

that put the gloss of “clear and present danger” on the First Amendment. Whether the war power -- the

greatest leveler of them all -- is adequate to sustain that doctrine is debatable. The dissents in Abrams, Schaefer, and Pierce show how easily “clear and present danger’ is manipulated to crush what Brandeis called “the fundamental right of free men to strive for better conditions through new legislation and new institutions” by argument and discourse (Pierce v. United States, supra, at 273) even in time of war. Though I doubt if the “clear and present danger” test is congenial to the First Amendment in time of a declared war, I am certain it is not reconcilable with the First Amendment in days of

peace. *

equally fundamental.”

instance

States, 251 U.S. 466, in which Mr. Justice Brandeis, joined by Mr. Justice Holmes, dissented. A third was Pierce v. United States, 252 U.S. 239, in which again Mr. Justice Brandeis, joined by Mr. Justice Holmes, dissented.

It is a

articles very critical of the war effort in World War I. Schenck was referred to as a conviction for obstructing security “by words of persuasion.” * * * And the conviction in Frohwerk was sustained where a little flame.” * * *

1919 Term, the Court applied the

Schenck doctrine to affirm the convictions of other dissidents in World War I. Abrams v. United States, 250 U.S. 616, was one instance. Mr. Justice Holmes, with whom Mr. Justice Brandeis concurred, dissented. While adhering to Schenck, he did not think that on the facts a case for overriding the First Amendment had been made out:

*

OK

Mr. Justice Holmes, though never formally abandoning the “clear and present danger” test, moved closer to the First Amendment ideal when he

said in dissent in Gitlow v. New York, 268 U.S. 652, 673: “Every idea is an incitement. It offers itself for belief and if believed it is acted on unless some other belief outweighs it or some failure of energy stifles the movement at its birth. The only difference

forcible

overthrow

of government

as an

abstract

principle is immune from prosecution. * * * But an “active” member, who has a guilty knowledge and intent of the aim to overthrow the Government by

violence, * * * may be prosecuted. *** power to investigate, backed by the

And the powerful

sanction of contempt, includes the power determine which of the two categories fits

between the expression of an opinion and an

particular witness.

incitement in the narrower sense is the speaker’s enthusiasm for the — result. Eloquence may set fire to reason. But whatever may be thought of the redundant discourse before us it had no chance of starting a present conflagration. If in the long run the beliefs expressed in proletarian dictatorship are destined to be accepted by

roams at will through all of the beliefs of the witness, ransacking his conscience and his innermost thoughts.

the dominant

Hand preferred over the “clear and present danger” test. Indeed, in his book, The Bill of Rights 59 (1958), in referring to Holmes’ creation of the “clear and present danger” test, he said, “I cannot help thinking that for once Homer nodded.”

forces of the community,

the

only meaning of free speech is that they should be given their chance and have their

way.” We have never philosophy of that dissent.

been

faithful

to

** *

And

to the

so the investigator

Judge Learned Hand, who wrote for the Court of Appeals in affirming the judgment in Dennis, coined the “not improbable” test, 183 F.2d 201, 214, which this Court adopted and which Judge

the

My own view is quite different. I see no place in the regime of the First Amendment for any

242,

The Court in Herndon v. Lowry, 301 U.S. overturned a conviction for exercising First

Amendment rights to incite insurrection because of lack of evidence of incitement. * * * In Bridges v. California, 314 U.S. 252, 261-263, we approved the “clear and present danger” test in an elaborate dictum that tightened it and confined it to a narrow category. But in Dennis v. United States, 341 U.S. 494, we

opened

wide

the door,

distorting

the “clear

present danger” test beyond recognition.

and

* * *

In that case the prosecution dubbed an agreement to teach the Marxist creed a “conspiracy.” The case was submitted to a jury on a charge that the jury could not convict unless it found that the defendants “intended to overthrow the Government ‘as speedily as circumstances would permit.’” /d., at 509-511. The Court sustained convictions under that charge, construing it to mean a determination of “‘whether the gravity of the “evil,” discounted by its

improbability, justifies such invasion of free speech as is necessary to avoid the danger.””” * * *

came

Out of the “clear and present danger” test other offspring. Advocacy and teaching of

“clear and present danger” test, whether strict and tight as some would make it, or free-wheeling as the Court in Dennis rephrased it. When one reads the opinions closely and sees when and how the “clear and present danger”

test has been applied, great misgivings are aroused. First, the threats were often loud but always puny and made serious only by judges so wedded to the status quo that critical analysis made them nervous. Second, the test was so twisted and perverted in Dennis as to make the trial of those teachers of Marxism an all-out political trial which was part and parcel of the cold war that has eroded substantial parts of the First Amendment.

Action is often a method of expression and within the protection of the First Amendment. Suppose one tears up his own copy of the Constitution in eloquent protest to a decision of this Court. May he be indicted?

celebrate

Suppose one rips his own Bible to shreds to his departure from one “faith” and his

embrace of atheism. May he be indicted? 2

See Feiner v. New

York, 340 U.S.

315, where a speaker was arrested for arousing an audience when the only “clear and present danger” was that the hecklers in the audience would break up the meeting.

Last Term the Court held in United States v. O’Brien, 391 U.S. 367, 382, that a registrant under Selective Service who burned his draft card in protest of the war in Vietnam could be prosecuted. The First

Amendment was tendered as a defense and rejected,

Court between the criminal act of being an “active”

the Court saying:

Communist and the innocent act of being a nominal or inactive Communist mark the difference only between deep and abiding belief and casual or uncertain belief. But I think that all matters of belief are beyond the reach of subpoenas or the probings of investigators. That is why the invasions of privacy

“The indicating the

issuance of certificates registration and eligibility

classification of individuals is a legitimate and substantial administrative aid in the functioning of this system. And legislation to insure the continuing issued certificates serves a substantial purpose in administration.” 391 U.S., at

availability of legitimate and the system’s 377-378.

But O’Brien was not prosecuted for not having his draft card available when asked for by a federal agent. He was indicted, tried, and convicted

made by investigating committees were notoriously unconstitutional. That is the deep-seated fault in the infamous loyalty-security hearings which, since 1947 when President Truman launched them, have processed 20,000,000 men and women. Those hearings were primarily concerned with one’s thoughts, ideas, beliefs, and convictions. They were the most blatant violations of the First Amendment we have ever known.

for burning the card. And this Court’s affirmance of that conviction was not, with all respect, consistent with the First Amendment.

posture

The act of praying often involves body and movement as well as utterances. It is

nonetheless protected by the Free Exercise Clause. Picketing, as we have said on numerous occasions, is “free speech plus.” * * * That means that it can be regulated when it comes to the “plus” or “action” side

of the protest. It can be regulated as to the number of pickets and the place and hours * * *, because traffic

and

other

community

problems

would

otherwise

The line between what is permissible and not subject to control and what may be made impermissible and subject to regulation is the line between ideas and overt acts.

The example usually given by those who would punish speech is the case of one who falsely shouts fire in a crowded theatre. This is, however, a classic case where speech is brigaded with action. * * * They are indeed

inseparable and a prosecution can be launched for the overt acts actually caused. Apart from rare instances of that kind, speech is, I think, immune from

suffer. are

prosecution. Certainly there is no constitutional line

implicated in the symbolic protest of the Vietnam

between advocacy of abstract ideas as in Yates and advocacy of political action as in Scales. The quality of advocacy turns on the depth of the conviction; and government has no power to invade that sanctuary of

But

none

of

these

considerations

war in the burning of a draft card. One’s beliefs have long sanctuaries which government Barenblatt is one example of the sanctuary can be violated. The

been thought to be could not invade. ease with which that lines drawn by the

belief and conscience.

Free speech also involves the issue of speech that some find offensive or disgusting, such as pornography. It is in this area that the Internet is finding itself the subject of many attempts to regulate speech, especially in the area of child pornography. 18 U.S.C. § 1460. Possession with intent to sell, and sale, of obscene matter on Federal property. (a) Whoever, either— (1) in the special maritime and territorial jurisdiction of the United States, or on any land or building owned by, leased to, or otherwise used by or under the control of the Government of the United States; or

(2) in the Indian country as defined in section 1151 of this title,

knowingly sells or possesses with intent to sell an obscene visual depiction shall be punished by a fine in accordance with the provisions of this title or imprisoned for not more than 2 years, or both.

(b) For the purposes of this section, the term “visual depiction” includes undeveloped film and videotape but does not include mere words.

through

Ashcroft v. The Free Speech Coalition

a separate

statute.

* **

Like

the

law

in

No. 00-795

Ferber, the CPPA seeks to reach beyond obscenity, and it makes no attempt to conform to the Miller

SUPREME COURT OF THE UNITED STATES

standard. For instance, the statute would reach visual depictions, such as movies, even if they have

redeeming social value. 535 U.S. 234, 122 S. Ct. 1389, 152 L. Ed. 2d 403 The principal question to be resolved, then, is whether the CPPA is constitutional where it proscribes a significant universe of speech that is neither obscene under Miller nor child pornography under Ferber.

April 16, 2002 whether

KENNEDY, J.: We consider in this case the Child Pornography Prevention Act of

1996 (CPPA), 18 U.S.C. § 2251 et seq., abridges the freedom of speech. The CPPA extends the federal prohibition against child pornography to sexually

I

explicit images that appear to depict minors but were

Before 1996, Congress defined child pornography as the type of depictions at issue in Ferber, images made using actual minors. * * * The CPPA retains that prohibition at 18 U.S.C. § 2256(8)(A) and adds three other prohibited categories of speech, of which the first, § 2256(8)(B), and the third, § 2256(8)(D), are at issue in this case. Section 2256(8)(B) prohibits “any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture” that “is, or appears to be, of a minor engaging in sexually explicit conduct.” The prohibition on “any visual depiction” does not depend at all on how the

produced without using any real children. The statute prohibits, in specific circumstances, possessing or distributing these images, which may be created by using adults who look like minors or by using computer imaging. The new technology, according to

Congress, makes it possible to create realistic images of children who do not exist. * * * By prohibiting child pornography that does not depict an actual child, the statute goes beyond New York v. Ferber, 458 U.S. 747, 73 L. Ed. 2d

1113, 102 S. Ct. 3348 (1982), which distinguished child pornography from other sexually explicit

image is produced. The section captures a range of depictions, sometimes called “virtual child

speech because of the State’s interest in protecting the children exploited by the production process. *** As a general rule, pornography can be banned only if obscene, but under Ferber, pornography showing minors can be proscribed whether or not the

pornography,” which images, as well as

include computer-generated images produced by more

traditional means. For instance, the literal terms of

images are obscene under the definition set forth in

the statute embrace a Renaissance painting depicting a scene from classical mythology, a “picture” that

Miller v. California, 413 U.S.

“appears

to

93 S. Ct. 2607 (1973). Ferber recognized that “the Miller standard, like all general definitions of what

explicit

conduct.”

may

if a jury believes an actor “appears to be” a minor engaging in “actual or simulated . sexual intercourse.” § 2256(2).

be

banned

as

obscene,

15, 37 L. Ed. 2d 419,

does

not

reflect

Hollywood

the

State’s particular and more compelling interest in prosecuting those who promote the — sexual exploitation of children.” * * *

be,

of

movies,

a

minor

The

engaging

statute

also

in

sexually

prohibits

filmed without any child actors,

These images do not involve, let alone harm,

While we have not had occasion to consider the question, we may assume that the apparent age of

decided the materials threaten children in other, less

persons

to

direct, ways. Pedophiles might use the materials to

standards.

encourage children to participate in sexual activity. “{A] child who is reluctant to engage in sexual

engaged

in sexual

conduct

is relevant

whether a depiction offends community

any children in the production process; but Congress

Pictures of young children engaged in certain acts might be obscene where similar depictions of adults,

activity with an adult, or to pose for sexually explicit

or perhaps even older adolescents, would not. The CPPA,

obscene;

however,

Congress

is not directed

has proscribed

at speech

that

those

materials

photographs, can sometimes be convinced by viewing depictions of other children ‘having fun’ participating in such activity.” * * * Furthermore,

is

11

pedophiles might “whet their own sexual appetites”

granted summary judgment to the Government. The

with the pornographic

court dismissed the overbreadth claim because it was “highly unlikely” that any “adaptations of sexual

images, “thereby increasing

the creation and distribution of child pornography and the sexual abuse and exploitation of actual children.” * * * Under these rationales, harm flows from the content of the images, not from the means of

their production. another problem images: prosecute *** As found, it particular

To

works

In addition, Congress identified created by computer-generated

that

defendants

possessing

‘Romeo

and

Juliet,’

will

be

treated

as

The Court of Appeals for the Ninth Circuit reversed. *** The court reasoned that the Government could not prohibit speech because of its tendency to persuade viewers to commit illegal acts. The court held the CPPA to be substantially overbroad because it bans materials that are neither obscene nor produced by the exploitation of real

Their existence can make it harder to pornographers who do use real minors. imaging technology improves, Congress becomes more difficult to prove that a picture was produced using actual children.

ensure

like

‘criminal contraband.’” * * *

children as in New York v. Ferber. * * *

child

pomography using real minors cannot evade prosecution, Congress extended the ban to virtual child pornography.

While the Ninth Circuit found the CPPA invalid on its face, four other Courts of Appeals have sustained it. * * * We granted certiorari. * * *

* OK OK

iu Respondents do challenge § 2256(8)(D). Like the text of the “appears to be” provision, the

sweep

of this

provision

is quite

broad.

The

Section

First

Amendment

commands,

“Congress shall make no law . . . abridging the freedom of speech.” The government may violate this mandate in many ways, * * * but a law imposing

2256(8)(D) defines child pornography to include any sexually explicit image that was “advertised, promoted, presented, described, or distributed in such a manner that conveys the impression” it depicts “a minor engaging in sexually explicit conduct.” One

criminal

penalties on protected

speech

is a stark

example of speech suppression. The CPPA’s penalties are indeed severe. A first offender may be imprisoned for 15 years. § 2252A(b)(1). A repeat

Committee Report identified the provision as directed

offender faces a prison sentence of not less than 5

at sexually explicit images pandered as child pornography. * * * The statute is not so limited in its reach, however, as it punishes even those possessors who took no part in pandering. Once a work has been

years and not more than 30 years in prison. Ibid. While even minor punishments can chill protected speech, * * * this case provides a textbook example of why we permit facial challenges to statutes that burden expression. With these severe penalties in force, few legitimate movie producers or book

described as child pornography, the taint remains on the speech in the hands of subsequent possessors, making possession unlawful even though the content otherwise would not be objectionable.

publishers, or few other speakers in any capacity, would risk distributing images in or near the uncertain reach of this law. The Constitution gives

Fearing that the CPPA threatened the activities of its members, respondent Free Speech Coalition and others challenged the statute in the United States District Court for the Northern District of California. The Coalition, a California trade association for the adult-entertainment industry, alleged that its members did not use minors in their sexually explicit works, but they believed some of these materials might fall within the CPPA’s expanded definition of child pornography. The other

significant protection from overbroad laws that chill speech within the First Amendment’s vast and privileged sphere. Under this principle, the CPPA is unconstitutional on its face if it prohibits a substantial amount of protected expression. * * * The sexual abuse of a child is a most serious crime and an act repugnant to the moral instincts of a

decent people. In its legislative findings, Congress

respondents are Bold Type, Inc., the publisher of a book advocating the nudist lifestyle; Jim Gingerich, a

recognized that there are subcultures of persons who harbor illicit desires for children and commit criminal

painter of nudes; and Ron Raffaelli, a photographer specializing in erotic images. Respondents alleged that the “appears to be” and “conveys the impression” provisions are overbroad and vague, chilling them from producing works protected by the

acts to gratify the impulses. * * * Congress also found that surrounding the serious offenders are those who flirt with these impulses and trade pictures and written accounts of sexual activity with young children.

First Amendment.

The District Court disagreed and

12

Congress may pass valid laws to protect children from abuse, and it has. * * * The prospect of crime, however, by itself does not justify laws suppressing protected speech. See Kingsley Int'l Pictures Corp. v. Regents of Univ. of N. Y., 360 US.

art and literature throughout the ages. Under the CPPA, images are prohibited so long as the persons appear to be under 18 years of age. * * * This is higher than the legal age for marriage in many States, as well as the age at which persons may consent to sexual relations. * * * It is, of course, undeniable that some youths engage in sexual activity before the legal age, either on their own inclination or because they are victims of sexual abuse.

684, 689, 3 L. Ed. 2d 1512, 79 S. Ct. 1362 (1959) (“Among

applied

free men,

to

the deterrents ordinarily to be

prevent

crime

are

education

and

punishment for violations of the law, not abridgment

of the rights of free speech” * * *). It is also well established

that

speech

because it concerns sensibilities. * * *

may

not

subjects

be

prohibited

offending

Both themes -- teenage sexual activity and

our

the

sexual

abuse

of

children

--

have

inspired

countless literary works. William Shakespeare created the most famous pair of teenage lovers, one of whom is just 13 years of age. See Romeo and Juliet, act I, sc. 2, 1. 9 (“She hath not seen the change of fourteen years”). In the drama, Shakespeare portrays the relationship as something splendid and innocent, but not juvenile. The work has inspired no less than 40 motion pictures, some of which suggest

As a general principle, the First Amendment bars the government from dictating what we see or read or speak or hear. The freedom of speech has its limits; it does not embrace certain categories of speech, including defamation, incitement, obscenity, and pornography produced with real children. * * *

While these categories may be prohibited without violating the First Amendment, none of them includes the speech prohibited by the CPPA. In his dissent from the opinion of the Court of Appeals,

that the teenagers consummated

Judge Ferguson recognized this to be the law and proposed that virtual child pornography should be

approach, that fact alone would not conclusion that the work was obscene.

** * Shakespeare explicit

scenes

for

may the

not

their relationship.

have

written

Elizabethean

sexually

audience,

but

were modern directors to adopt a less conventional compel

the

regarded as an additional category of unprotected speech. * * * It would be necessary for us to take this step to uphold the statute.

Contemporary movies pursue — similar themes. Last year’s Academy Awards featured the movie, Traffic, which was nominated for Best Picture. * * * The film portrays a teenager, identified as a 16-year-old, who becomes addicted to drugs. The viewer sees the degradation of her addiction, which in the end leads her to a filthy room to trade sex for drugs. The year before, American Beauty won the Academy Award for Best Picture. * * * In the

As we have noted, the CPPA is much more than a supplement to the existing federal prohibition on obscenity. Under Miller v. California, 413 U.S.

15, 37 L. Ed. 2d 419, 93 S. Ct. 2607 (1973), the Government

must prove that the work,

taken as a

whole, appeals to the prurient interest, is patently offensive in light of community standards, and lacks

course of the movie, a teenage girl engages in sexual relations with her teenage boyfriend, and another yields herself to the gratification of a middle-aged man. The film also contains a scene where, although the movie audience understands the act is not taking place, one character believes he is watching a teenage boy performing a sexual act on an older man.

serious literary, artistic, political, or scientific value. *** The CPPA, however, extends to images that appear to depict a minor engaging in sexually explicit

activity without regard to the Miller requirements. The materials need not appeal to the prurient interest. Any depiction of sexually explicit activity, no matter how it is presented, is proscribed. The CPPA applies to a picture in a psychology manual, as well as a movie depicting the horrors of sexual abuse. It is not necessary, moreover, that the image be patently offensive. Pictures of what appear to be 17-year-olds engaging in sexually explicit activity do not in every

Our society, like other cultures, has empathy and enduring fascination with the lives and destinies of the young. Art and literature express the vital interest we all have in the formative years we ourselves once knew, when wounds can be so

case contravene community standards.

grievous, disappointment so profound, and mistaken choices so tragic, but when moral acts and self-

The CPPA prohibits speech despite its serious literary, artistic, political, or scientific value. The statute proscribes the visual depiction of an idea -- that of teenagers engaging in sexual activity -- that is a fact of modern society and has been a theme in

fulfillment are still in reach. Whether we mention violate the CPPA, they within the wide sweep of the statute’s these films, or hundreds of others of explore those subjects, contain a

13

or not the films explore themes prohibitions. If lesser note that single graphic

depiction

of sexual

activity within the statutory

definition, the possessor of the film would be subject to severe punishment without inquiry into the work’s redeeming value. This is inconsistent with an essential First Amendment rule: The artistic merit of a work does not depend on the presence of a single explicit scene. *** Under Miller, the First Amendment requires that redeeming value be judged by considering the work as a whole. Where the scene is part of the narrative, the work itself does not for this reason become obscene, even though the scene in

Later,

have noted,

read

obscenity,

to

prohibit

the CPPA

because

it

cannot

be

lacks

the

Government

seeks

to

address

this

produced

by

using

** * It did not suggest that, other

governmental

interests

actual instances of child abuse, * * * the causal link is contingent and indirect. The harm does not necessarily follow from the speech, but depends upon some unquantified potential for subsequent criminal

acts. The Government says these indirect are sufficient because, as Ferber acknowledged, pornography rarely can be valuable speech. This argument, however, suffers from two

sexual exploitation.” * * *

on

103,

the Government asserts that the images can lead to

scope of legislation aimed at protecting children from prohibition

U.S.

In contrast to the speech in Ferber, speech that itself is the record of sexual abuse, the CPPA prohibits speech that records no crime and creates no victims by its production. Virtual child pornography is not “intrinsically related” to the sexual abuse of children, as were the materials in Ferber. * * * While

interest in stamping it out without regard to any judgment about its content. * * * The production of the work, not its content, was the target of the statute. The fact that a work contained serious literary, artistic, or other value did not excuse the harm it caused to its child participants. It was simply “unrealistic to equate a community’s toleration for sexually oriented materials with the permissible

a_

pornography

absent this concern, would suffice. * * *

whether it depicts works of value. * * * Where the images are themselves the product of child sexual abuse, Ferber recognized that the State had an

upheld

of

child pornography.”

deficiency by arguing that speech prohibited by the CPPA is virtually indistinguishable from child pornography, which may be banned without regard to

Ferber

495

children. “Given the importance of the State’s interest in protecting the victims of child pornography,” the State was justified in “attempting to stamp out this vice at all levels in the distribution chain.” * * * Osborne also noted the State’s interest in preventing child pornography from being used as an aid in the solicitation of minors. * * * The Court, however, anchored its holding in the concern for the participants, those whom it called the “victims of

required link between its prohibitions and the affront to community standards prohibited by the definition of obscenity. The

v. Ohio,

ruled that these same interests justified a ban on the

possession

isolation might be offensive. * * * For this reason, and the others we

in Osborne

109 L. Ed. 2d 98, 110 S. Ct. 1691 (1990), the Court

harms child * * * flaws.

First, Ferber’s judgment about child pornography was based upon how it was made, not on what it

the

distribution and sale of child pornography, as well as

communicated.

its production, because these acts were “intrinsically

speech is neither obscene nor the product of sexual

The case reaffirmed that where

the

related” to the sexual abuse of children in two ways. * * * First, as a permanent record of a child’s abuse, the continued circulation itself would harm the child who had participated. Like a defamatory statement, each new publication of the speech would cause new injury to the child’s reputation and emotional wellbeing. ** * Second, because the traffic in child pornography was an economic motive for its

abuse, it does not fall outside the protection of the First Amendment. * * * The second flaw in the Government’s position is that Ferber did not hold that child pomography is by definition without value. On the contrary, the Court recognized some works in this category might have significant value, * * * but

production, the State had an interest in closing the distribution network. “The most expeditious if not the only practical method of law enforcement may be to dry up the market for this material by imposing

relied on virtual images -- the very images prohibited by the CPPA -- as an alternative and permissible means of expression: “If it were necessary for literary

severe criminal penalties on persons selling, advertising, or otherwise promoting the product.”

perhaps looked younger could be utilized. Simulation outside of the prohibition of the statute could provide

* * * Under either rationale, the speech had what the Court in effect held was a proximate link to the crime from which it came.

another

or artistic value, a person over the statutory age who

alternative.”

***

Ferber,

then,

not

only

referred to the distinction between actual and virtual child pornography, it relied on it as a reason

14

supporting its holding. Ferber provides no support for a statute that eliminates the distinction and makes the alternative mode criminal as well.

seeks to control thought or to justify its laws for that impermissible end. The right to think is the beginning

Ul The CPPA, for reasons we have explored, is inconsistent with Miller and finds no support in Ferber. The Government seeks to justify its

of freedom,

and speech

government thought.

because

must

speech

be protected

is

the

from

the

beginning

of

prohibitions in other ways. It argues that the CPPA is

To preserve these freedoms, and to protect speech for its own sake, the Court’s First Amendment cases draw vital distinctions between words and deeds, between ideas and conduct. *** The

necessary because pedophiles may use virtual child pornography to seduce children. There are many

government may not increases the chance

things

committed “at some indefinite future time.” * * * The government may suppress speech for advocating the use of force or a violation of law only if “such advocacy is directed to inciting or producing imminent lawless action and is likely to incite or produce such action.” * * * There is here no attempt, incitement, solicitation, or conspiracy. The Government has shown no more than a remote connection between speech that might encourage

innocent

in

themselves,

however,

such

cartoons, video games, and candy, that might be for immoral purposes, yet we would not expect to be prohibited because they can be misused. Government, of course, may punish adults

as

used those The who

provide unsuitable materials to children, * * * and it may enforce criminal penalties for unlawful solicitation. The precedents establish, however, that

speech within the rights of adults to hear may not be silenced completely in an attempt to shield children

thoughts or impulses and any resulting child abuse. Without a significantly stronger, more direct connection, the Government may not prohibit speech on the ground that it may encourage pedophiles to engage in illegal conduct.

from it. * * * In Butler v. Michigan, 352 U.S. 380,

381, 1 L. Ed. 2d 412, 77 S. Ct. 524 (1957), the Court invalidated a statute prohibiting distribution of an indecent publication because of its tendency to “incite minors to violent or depraved or immoral

acts.” A unanimous Court agreed upon the important First Amendment principle that the State could not

The

to protect them from those who would commit other crimes. The principle, however, remains the same: The Government cannot ban speech fit for adults simply because it may fall into the hands of children. The evil in question depends upon the actor’s unlawful conduct, conduct defined as criminal quite apart from any link to the speech in question. This establishes that the speech ban is not narrowly drawn. The objective is to prohibit illegal conduct, but this restriction goes well beyond that interest by restricting the speech available to law-abiding adults.

somewhat

the

of

controlling

that

its

implausible.

If

virtual

images

were

In the case of the material covered by Ferber, the creation of the speech is itself the crime of child abuse; the prohibition deters the crime by removing the profit motive. * * * Even where there is

submits further that virtual the appetites of pedophiles engage in illegal conduct. sustain the provision in

desirability

argues

identical to illegal child pornography, the illegal images would be driven from the market by the indistinguishable substitutes. Few pornographers would risk prosecution by abusing real children if fictional, computerized images would suffice.

an underlying crime, however, the Court has not allowed the suppression of speech in all cases. * * * We need not consider where to strike the balance in

question. The mere tendency of speech to encourage unlawful acts is not a sufficient reason for banning it. The government “cannot constitutionally premise

on

next

produced using real children necessitates a prohibition on virtual images as well. Virtual images, the Government contends, are indistinguishable from real ones; they are part of the same market and are often exchanged. In this way, it is said, virtual images promote the trafficking in works produced through the exploitation of real children. The hypothesis is

Here, the Government wants to keep speech from children not to protect them from its content but

legislation

Government

objective of eliminating the market for pornography

“reduce the adult population . . . to reading only what is fit for children.” * * *

The Government child pornography whets and encourages them to This rationale cannot

prohibit speech because it an unlawful act will be

this case, because here, there is no underlying crime at all. Even if the Government’s market deterrence theory were persuasive in some contexts, it would not justify this statute.

a

person’s private thoughts.” * * * First Amendment freedoms are most in danger when the government

15

Finally, the Government says that the possibility of producing images by using computer

We disagree with this view. The CPPA prohibits sexually explicit materials that “convey the impression” they depict minors. While that phrase may sound like the “appears to be” prohibition in § 2256(8)(B), it requires little judgment about the content of the image. Under § 2256(8)(D), the work must be sexually explicit, but otherwise the content is irrelevant. Even if a film contains no sexually explicit scenes involving minors, it could be treated as child pornography if the title and trailers convey the

imaging makes it very difficult for it to prosecute those who produce pornography by using real children. Experts, we are told, may have difficulty in saying whether the pictures were made by using real children or by using computer imaging. The necessary solution, the argument runs, is to prohibit both kinds of images. The argument, in essence, is that protected speech may be banned as a means to

ban unprotected speech. This analysis turns the First

impression that the scenes would be found in the

Amendment upside down.

speech

The Government may not suppress lawful as the means to suppress unlawful speech.

Protected merely

movie. The determination turns on how the speech is presented, not on what is depicted. While the legislative findings address at length the problems

speech because

does it

not

become

resembles

the

unprotected latter.

posed by materials that look like child pornography, they are silent on the evils posed by images simply

The

Constitution requires the reverse. “The possible harm

pandered that way.

to society in permitting some unprotected speech to

go unpunished is outweighed by the possibility that

The

Government

does

not offer a serious

protected speech of others may be muted... .” * * *

defense of this provision, and the other arguments it

The overbreadth doctrine prohibits the Government from banning unprotected speech if a substantial

makes in support of the CPPA do not bear on § 2256(8)(D). The materials, for instance, are not likely

amount of protected speech is prohibited or chilled in the process.

to be confused for child pornography in a criminal trial. The Court has recognized that pandering may be relevant, as an evidentiary matter, to the question whether particular materials are obscene. * * * Where

* KOR

a defendant engages in the “commercial exploitation In sum, § 2256(8)(B) covers materials beyond the categories recognized in Ferber and Miller, and the reasons the Government offers in support of limiting the freedom of speech have no

of erotica solely for the sake of their prurient appeal,” id. at 466, the context he or she creates may itself be relevant to the evaluation of the materials.

justification in our precedents or in the law of the

Section 2256(8)(D), however, prohibits a substantial amount of speech that falls outside Ginzburg’s rationale. Materials falling within the proscription are tainted and unlawful in the hands of all who receive it, though they bear no responsibility

First Amendment. The provision abridges the freedom to engage in a substantial amount of lawful speech. For this reason, it is overbroad and unconstitutional.

for

IV

how

it was

marketed,

sold,

or

described.

The

statute, furthermore, does not require that the context be part of an effort at “commercial exploitation.”

Respondents challenge § 2256(8)(D) as well. This provision bans depictions of sexually explicit conduct that are “advertised, promoted,

***

As

a consequence,

the CPPA

does

more

than

that conveys the impression that the material is or contains a visual depiction of a minor engaging in sexually explicit conduct.” The parties treat the

prohibit pandering. It prohibits possession of materia! described, or pandered, as child pornography by someone earlier in the distribution chain. The provision prohibits a sexually explicit film containing no youthful actors, just because it is placed in a box suggesting a prohibited movie. Possession is a crime

section as nearly identical to the provision prohibiting materials that appear to be child pornography. In the

even when the possessor knows the movie was mislabeled. The First Amendment requires a more

Government’s view, the difference between the two is that “the ‘conveys the impression’ provision requires the jury to assess the material at issue in

precise restriction. For this reason, § 2256(8)(D) is substantially overbroad and in violation of the First Amendment.

presented, described, or distributed in such a manner

light of the manner in which it is promoted.” * * * The Government’s assumption, however,

is that the

determination would still depend principally upon the content of the prohibited work.

16

Vv

contention that the provisions are unconstitutional because of vague statutory language.

For the reasons we have set forth, prohibitions of §§ 2256(8)(B) and 2256(8)(D)

the are

overbroad and unconstitutional. Having reached this

The judgment

of the Court

of Appeals

is

affirmed.

conclusion, we need not address respondents’ further It is so ordered.

A recent update to the line of cases dealing with regulation of speech on the internet is United States v Williams Section 2252A(a)(3)(B) of Title 18, United States

UNITED STATES v. WILLIAMS

Code, criminalizes, in certain specified certiorari to the united states court of appeals for the eleventh circuit Argued October 30, 2007--Decided May 19, 2008 After this Court found facially overbroad a federal statutory provision criminalizing the possession and distribution of material pandered as child

circumstances, the pandering or solicitation of child pornography. This case presents the question whether that statute is overbroad under the First Amendment or impermissibly vague under the Due Process Clause of the Fifth Amendment. 1

pornography, regardless of whether it actually was

A

that, Ashcroft v. Free Speech Coalition, 535 U.S.

234, Congress passed the pandering and solicitation provision at issue, 18 U.S. C. §2252A(a)(3)(B). Respondent Williams pleaded guilty to this offense

and others, but reserved the right to challenge his pandering conviction's constitutionality. The District

Court rejected his challenge, but the Eleventh Circuit reversed, finding the statute both overbroad under the First Amendment and impermissibly vague under the Due Process Clause. 28K

444 F. 3d 1286, reversed. Scalia, J., delivered the opinion of the Court, in which Roberts, C. J., and Stevens, Kennedy,

Thomas,

Breyer, and Alito, JJ., joined. Stevens, J., filed a concurring opinion, in which Breyer, J., joined. Souter, J., filed a dissenting opinion, in which Ginsburg, J., joined.

UNITED STATES, PETITIONER v. MICHAEL WILLIAMS on writ of certiorari to the united states court of

appeals for the eleventh circuit

[May 19, 2008] Justice Scalia delivered the opinion of the Court.

We have long held that obscene speech--sexually explicit material that violates fundamental notions of

decency--is not protected by the First Amendment. See Roth v. United States, 354 U.S. 476, 484-485 (1957). But to protect explicit material that has social value, we have limited the scope of the obscenity exception, and have overturned convictions for the distribution of sexually graphic but nonobscene material. See Miller v. California, 413 U.S. 15, 2324 (1973); see also, e.g., Jenkins v. Georgia, 418 U.S. 153, 161 (1974). Over the last 25 years, we have confronted a related and overlapping category of proscribable speech: child pornography. See Ashcroft v. Free Speech Coalition, 535 U.S. 234 (2002); Osborne v. Ohio, 495 U.S. 103 (1990); New York v. Ferber, 458 U.S. 747 (1982). This consists of sexually explicit visual portrayals that feature children. We have held that a statute which proscribes the distribution of all child pornography, even material that does not qualify as obscenity, does not on its face violate the First Amendment. See id., at 751-753, 756-764. Moreover, we have held that the government may criminalize the possession of child pornography, even though it may not criminalize the mere possession of

obscene material involving adults. Compare Osborne, supra, at 111, with Stanley v. Georgia, 394 U.S. 557

568 (1969).

The broad authority to proscribe child

a visual depiction of an actual minor engaging in

pornography is not, however, unlimited. Four Terms ago, we held facially overbroad two provisions of the federal Child Pornography Protection Act of 1996 (CPPA). Free Speech Coalition, 535 U.S., at 258. The first of these banned the possession and distribution of " ‘any visual depiction' " that " ‘is, or appears to be, of a minor engaging in sexually explicit conduct,' " even if it contained only youthfullooking adult actors or virtual images of children

sexually explicit "(ii) conduct,

"shall be punished as provided in subsection (b)." §2252A(a)(3)(B) (2000 ed., Supp. V). Section 2256(2)(A) defines "sexually explicit conduct" as

generated by a computer. Jd., at 239-241 (quoting 18

"actual or simulated--

U. S. C. §2256(8)(B)). This was invalid, we

explained, because the child-protection rationale for

sexual intercourse, including genital-genital, oralgenital, "(i) anal-genital, or oral-anal, whether

speech restriction does not apply to materials produced without children. See 535 U. S., at 249-251,

between persons of the same or opposite sex;

254. The second provision at issue in Free Speech Coalition criminalized the possession and distribution

bestiality; "(ii)

of material that had been pandered as child pornography, regardless of whether it actually was

masturbation;

"(iii)

that. See id., at 257 (citing 18 U.S. C. §2256(8)(D)). sadistic or masochistic abuse; or "(iv)

A person could thus face prosecution for possessing unobjectionable material that someone else had

pandered. 535 U. S., at 258. We held that this

lascivious exhibition of the genitals or pubic area of

prohibition, which did "more than prohibit pandering," was also facially overbroad. Ibid.

any "(v) person." Violation of §2252A(a)(3)(B) incurs a minimum sentence of 5 years imprisonment and a maximum of

After our decision in Free Speech Coalition, Congress went back to the drawing board and

20 years. 18 U.S. C. §2252A(b)(1).

produced legislation with the unlikely title of the Prosecutorial Remedies and Other Tools to end the

The Act's express findings indicate that Congress was concermed that limiting the child-pornography prohibition to material that could be proved to feature actual children, as our decision in Free Speech Coalition required, would enable many child pornographers to evade conviction. See §501(9), (10), 117 Stat. 677. The emergence of new technology and the repeated retransmission of picture files over the Internet could make it nearly impossible to prove that a particular image was produced using real children--even though "[t]here is no substantial evidence that any of the child pornography images being trafficked today were made other than by the abuse of real children," virtual imaging being prohibitively expensive.

Exploitation of Children Today Act of 2003, 117 Stat. 650. We shall refer to it as the Act. Section 503 of the Act amended 18 U. S. C. §2252A to add a new

pandering and solicitation provision, relevant portions of which now read as follows: Any person who--

knowingly--

"(a)

"(3)

advertises, promotes, presents, distributes, or solicits

B

through the "(B) mails, or in interstate or foreign commerce by any means, including by computer, any

The following facts appear in the opinion of the Eleventh Circuit, 444 F. 3d 1286, 1288 (2006). On April 26, 2004, respondent Michael Williams, using a sexually explicit screen name, signed in to a public Internet chat room. A Secret Service agent had also

material or purported material in a manner that reflects the belief, or that is intended to cause another to believe, that the material or purported material is, or contains--

signed in to the chat room under the moniker "Lisa n Miami." The agent noticed that Williams had posted

an obscene visual depiction of a minor engaging in sexually explicit "(i) conduct; or

a message that read: "Dad of toddler has 'good' pics of her an [sic] me for swap of your toddler pics, or live cam." The agent struck up a conversation with

18

Williams, leading to an electronic exchange of

relative to the statute's plainly legitimate sweep. See Board of Trustees of State Univ. of N. Y. v. Fox, 492

nonpornographic pictures of children. (The agent's picture was in fact a doctored photograph of an adult.) Soon thereafter, Williams messaged that he had photographs of men molesting his 4-year-old daughter. Suspicious that "Lisa n Miami" was a lawenforcement agent, before proceeding further Williams demanded that the agent produce additional

U.S. 469, 485 (1989); Broadrick v. Oklahoma, 413 U. S. 601, 615 (1973). Invalidation for overbreadth is "' "strong medicine" '" that is not to be "casually employed." Los Angeles Police Dept. v. United Reporting Publishing Corp., 528 U.S. 32, 39 (1999) (quoting Ferber, 458 U. S., at 769).

pictures. When he did not, Williams posted the following public message in the chat room: "HERE ROOM; I CAN PUT UPLINK CUZ IM FOR REAL-

The first step in overbreadth analysis is to construe the challenged statute; it is impossible to determine whether a statute reaches too far without first knowing what the statute covers. Generally speaking, §2252A(a)(3)(B) prohibits offers to provide and requests to obtain child pornography. The statute does not require the actual existence of child pornography. In this respect, it differs from the statutes in Ferber, Osborne, and Free Speech Coalition, which prohibited the possession or

-SHE CANT." Appended to this declaration was a

hyperlink that, when clicked, led to seven pictures of actual children, aged approximately 5 to 15, engaging in sexually explicit conduct and displaying their genitals. The Secret Service then obtained a search warrant for Williams's home, where agents seized two hard drives containing at least 22 images of real children engaged in sexually explicit conduct, some of it sadomasochistic.

distribution of child pornography. Rather than targeting the underlying material, this statute bans the

collateral speech that introduces such material into

Williams was charged with one count of pandering child pornography under §2252A(a)(3)(B) and one count of possessing child pornography under §2252A(a)(5)(B). He pleaded guilty to both counts

the child-pornography distribution network. Thus, an Internet user who solicits child pornography from an undercover agent violates the statute, even if the officer possesses no child pornography. Likewise, a person who advertises virtual child pornography as

but reserved the right to challenge the constitutionality of the pandering conviction. The District Court rejected his challenge, and sentenced him to concurrent 60-month sentences on the two

depicting actual children also falls within the reach of the statute.

counts. No. 04-20299-CR-MIDDLEBROOKS (SD The statute's definition of the material or

Fla., Aug. 20, 2004), App. B to Pet. for Cert. 46a69a. The United States Court of Appeals for the Eleventh Circuit reversed the pandering conviction, holding that the statute was both overbroad and impermissibly vague. 444 F. 3d, at 1308-1309.

purported material that may not be pandered or solicited precisely tracks the material held constitutionally proscribable in Ferber and Miller: obscene material depicting (actual or virtual) children engaged in sexually explicit conduct, and any other material depicting actual children engaged in sexually explicit conduct. See Free Speech Coalition, 535 U. S., at 245-246 (stating that the First Amendment does not protect obscenity or pornography produced with actual children); id., at 256 (holding invalid the challenged provision of the CPPA because it "cover[ed] materials beyond the categories recognized in Ferber and Miller").

Il A According to our First Amendment overbreadth doctrine, a statute is facially invalid if it prohibits a substantial amount of protected speech. The doctrine seeks to strike a balance between competing social costs. Virginia v. Hicks, 539 U.S. 113, 119-120 (2003). On the one hand, the threat of enforcement of an overbroad law deters people from engaging in constitutionally protected speech, inhibiting the free exchange of ideas. On the other hand, invalidating a law that in some of its applications is perfectly constitutional--particularly a law directed at conduct

First, the statute includes a scienter requirement. The first word of §2252A(a)(3)--"knowingly"-applies to both of the immediately following

so antisocial that it has been made criminal--has

subdivisions, both the previously existing

A number of features of the statute are important to our analysis:

obvious harmful effects. In order to maintain an

§2252A(a)(3)(A)* and the new §2252A(a)

appropriate balance, we have vigorously enforced the

(3)(B) at issue here. We think that the best reading of the term in context is that it applies to every element of the two provisions. This is not a case where

requirement that a statute's overbreadth be substantial, not only in an absolute sense, but also

19

grammar or structure enables the challenged

Pornography on the [Internet 9. To run afoul of the

provision or some of its parts to be read apart from the "knowingly" requirement. Here "knowingly" introduces the challenged provision itself, making clear that it applies to that provision in its entirety;

statute, the speech need only accompany or seek to induce the transfer of child pornography from one person to another. Third, the phrase "in a manner that reflects the

and there is no grammatical barrier to reading it that way.

belief" includes both subjective and objective components. "[A] manner that reflects the belief" is quite different from "a manner that would give one cause to believe." The first formulation suggests that

Second, the statute's string of operative verbs-"advertises, promotes, presents, distributes, or solicits"--is reasonably read to have a transactional connotation. That is to say, the statute penalizes

the defendant must actually have held the subjective "belief" that the material or purported material was

speech that accompanies or seeks to induce a transfer

child pornography. Thus, a misdescription that leads the listener to believe the defendant is offering child pornography, when the defendant in fact does not believe the material is child pornography, does not violate this prong of the statute. (It may, however, violate the "manner ... that is intended to cause another to believe” prong if the misdescription is

of child pornography--via reproduction or physical

delivery--from one person to another. For three of the verbs, this is obvious: advertising, distributing, and

soliciting are steps taken in the course of an actual or proposed transfer of a product, typically but not exclusively in a commercial market. When taken in isolation, the two remaining verbs--"promotes" and

intentional.) There is also an objective component to

"presents"--are susceptible of multiple and wideranging meanings. In context, however, those meanings are narrowed by the commonsense canon

Searle & Co., 367 U.S. 303, 307 (1961); 2A N.

the phrase "manner that reflects the belief." The statement or action must objectively manifest a belief that the material is child pornography; a mere belief, without an accompanying statement or action that would lead a reasonable person to understand that the defendant holds that belief, is insufficient.

Singer & J. Singer, Sutherland Statutes and Statutory Construction §47.16 (7th ed. 2007). "Promotes," in a list that includes "solicits," "distributes," and "advertises," is most sensibly read to mean the act of

Fourth, the other key phrase, "in a manner . . . that is intended to cause another to believe," contains only a subjective element: The defendant must "intend"

of noscitur a sociis--which counsels that a word is given more precise content by the neighboring words with which it is associated. See Jarecki v. G. D.

that the listener believe the material to be child

recommending purported child pornography to another person for his acquisition. See American

pornography, and must select a manner of “advertising, promoting, presenting, distributing, or soliciting" the material that he thinks will engender that belief--whether or not a reasonable person would think the same. (Of course in the ordinary case the proof of the defendant's intent will be the fact that, as an objective matter, the manner of "advertising, promoting, presenting, distributing, or soliciting" plainly sought to convey that the material was child pornography.)

Heritage Dictionary 1403 (4th ed. 2000) (def. 4: "To attempt to sell or popularize by advertising or publicity"). Similarly, "presents," in the context of the other verbs with which it is associated, means

showing or offering the child pornography to another person with a view to his acquisition. See id., at 1388 (def. 3a: "To make a gift or award of"). (The envisioned acquisition, of course, could be an electronic one, for example reproduction of the image on the recipient's computer screen.)

Fifth, the definition of "sexually explicit conduct" (the visual depiction of which, engaged in by an actual minor, is covered by the Act's pandering and soliciting prohibition even when it is not obscene) is

To be clear, our conclusion that all the words in this list relate to transactions is not to say that they relate to commercial transactions. One could

very similar to the definition of "sexual conduct" in the New York statute we upheld against an overbreadth challenge in Ferber. That defined

certainly "distribute" child pornography without expecting payment in return. Indeed, in much Internet

file sharing of child pornography each participant

"sexual conduct" as " ‘actual or simulated sexual intercourse, deviate sexual intercourse, sexual bestiality, masturbation, sado-masochistic abuse, or lewd exhibition of the genitals.'" 458 U.S., at 751.

makes his files available for free to other

participants--as Williams did in this case. "Distribution may involve sophisticated pedophile rings or organized crime groups that operate for profit, but in many cases, is carried out by individual amateurs who seek no financial reward." Child

2 2k

20

To be sure, there remains an important distinction between a proposal to engage in illegal activity and the abstract advocacy of illegality. See Brandenburg v. Ohio, 395 U.S. 444, 447-448 (1969) (per curiam); see also NAACP v. Claiborne Hardware Co., 458

Amici contend that some advertisements for mainstream Hollywood movies that depict underage characters having sex violate the statute. Brief for Free Speech Coalition et al. as Amici Curiae 9-18.

We think it implausible that a reputable distributor of

U.S. 886, 928-929 (1982). The Act before us does not prohibit advocacy of child pornography, but only offers to provide or requests to obtain it. There is no doubt that this prohibition falls well within constitutional bounds. The constitutional defect we

Hollywood movies, such as Amazon.com, believes

that one of these films contains actual children engaging in actual or simulated sex on camera; and even more implausible that Amazon.com would intend to make its customers believe such a thing. The average person understands that sex scenes in mainstream movies use nonchild actors, depict sexual activity in a way that would not rise to the explicit level necessary under the statute, or, in most cases,

found in the pandering provision at issue in Free

Speech Coalition was that it went beyond pandering to prohibit possession of material that could not otherwise be proscribed. 535 U. S., at 258.

both. In sum, we hold that offers to provide or requests ek

to obtain child pornography are categorically

excluded from the First Amendment. Since the Eleventh Circuit erroneously concluded otherwise, it

Finally, the dissent accuses us of silently overruling our prior decisions in Ferber and Free Speech Coalition. See post, at 12. According to the dissent, Congress has made an end-run around the First Amendment's protection of virtual child pornography by prohibiting proposals to transact in such images rather than prohibiting the images themselves. But an offer to provide or request to

applied strict scrutiny to §2252A(a)(3)(B), lodging three fatal objections. We address these objections because they could be recast as arguments that Congress has gone beyond the categorical exception. The Eleventh Circuit believed it a constitutional difficulty that no child pornography need exist to trigger the statute. In its view, the fact that the statute

receive virtual child pornography is not prohibited by the statute. A crime is committed only when the

could punish a "braggart, exaggerator, or outright liar" rendered it unconstitutional. 444 F. 3d, at 1298. That seems to us a strange constitutional calculus. Although we have held that the government can ban both fraudulent offers, see, e.g., [/inois ex rel. Madigan v. Telemarketing Associates, Inc., 538 U.S. 600, 611-612 (2003), and offers to provide illegal products, the Eleventh Circuit would forbid the government from punishing fraudulent offers to provide illegal products. We see no logic in that position; if anything, such statements are doubly excluded from the First Amendment.

speaker believes or intends the listener to believe that the subject of the proposed transaction depicts real children. It is simply not true that this means "a protected category of expression [will] inevitably be suppressed," post, at 13. Simulated child pornography will be as available as ever, so long as it is offered and sought as such, and not as real child pornography. The dissent would require an exception from the statute's prohibition when, unbeknownst to one or both of the parties to the proposal, the completed transaction would not have been unlawful because it is (we have said) protected by the First Amendment. We fail to see what First Amendment interest would be served by drawing a distinction between two defendants who attempt to acquire contraband, one of whom happens to be mistaken about the contraband nature of what he would acquire. Is Congress forbidden from punishing those who attempt to acquire what they believe to be national-security documents, but which are actually fakes? To ask is to answer. There is no First

The Eleventh Circuit held that under Brandenburg, the "non-commercial, non-inciteful

promotion of illegal child pornography" is protected, and §2252A(a)(3)(B) therefore overreaches by criminalizing the promotion of child pornography. 444 F. 3d, at 1298. As we have discussed earlier, however, the term "promotes" does not refer to abstract advocacy, such as the statement "I believe

that child pornography should be legal" or even "I encourage you to obtain child pornography." It refers

Amendment exception from the general principle of

to the recommendation of a particular piece of

criminal law that a person attempting to commit a

purported child pornography with the intent of initiating a transfer.

crime need not be exonerated because he has a mistaken view of the facts.

28 KK

2K

21

Child pornography harms and debases the most defenseless of our citizens. Both the State and

manifestly believes or would induce belief in a

Federal Governments have sought to suppress it for many years, only to find it proliferating through the new medium of the Internet. This Court held unconstitutional Congress's previous attempt to meet

exhibition is or will be an actual child, not an impersonated, simulated or "Virtual" one, or the

prospective party that the subject of an exchange or

subject of a composite created from lawful photos

spliced together. The Act specifically prohibits three types of those proposals. It outlaws solicitation of

this new threat, and Congress responded with a carefully crafted attempt to eliminate the First Amendment problems we identified. As far as the

child pornography, as well as two distinct kinds of offers: those "advertis[ing]" or "promot[ing]" prosecutable child pornography, which recommend

provision at issue in this case is concerned, that effort was successful.

the material with the implication that the speaker can make it available, and those "present[ing]" or "distribut[ing]" such child pornography, which make the material available to anyone who chooses to take

The judgment of the Eleventh Circuit is reversed. It is so ordered.

it. 18 U.S. C. §2252A(a)(3)(B) (2000 ed., Supp. V).

UNITED STATES, PETITIONER y. MICHAEL WILLIAMS

The Court holds it is constitutional to prohibit these proposals, and up to a point I do not disagree.

In particular, I accept the Court's explanation that Congress may criminalize proposals unrelated to any

on writ of certiorari to the united states court of

appeals for the eleventh circuit

extant image. I part ways from the Court, however, on the regulation of proposals made with regard to specific, existing representations. Under the new law,

[May 19, 2008]

mnrwmuthe, clements.of the pandering. offense are. the same, whether or not the images are of real children. As to those that do not show real children, of course, a transaction in the material could not be prosecuted consistently with the First Amendment, and I believe that maintaining the First Amendment protection of

Justice Souter, with whom Justice Ginsburg joins, dissenting.

Dealing in obscenity is penalized without violating the First Amendment, but as a general matter pornography lacks the harm to justify prohibiting it. If, however, a photograph (to take the kind of image in this case) shows an actual minor child as a pornographic subject, its transfer and even

expression we have previously held to cover fake child pornography requires a limit to the law's criminalization of pandering proposals. In failing to confront the tension between ostensibly protecting

the material pandered while approving prosecution of

its possession may be made criminal. New York v.

the pandering of that same material, and in allowing the new pandering prohibition to suppress otherwise protected speech, the Court undermines Ferber and Free Speech Coalition in both reasoning and result. This is the significant element of today's holding, and

Ferber, 458 U.S. 747, 765-766 (1982); Osborne v.

Ohio, 495 U. S. 103, 110-111 (1990). The exception to the general rule rests not on the content of the picture but on the need to foil the exploitation of child subjects, Ferber, 458 U.S., at 759-760, and the justification limits the exception: only pornographic photographs of actual children may be prohibited, see id., at 763, 764; Ashcroft v. Free Speech Coalition, 535 U.S. 234, 249-251 (2002). Thus, just six years ago the Court struck down a statute outlawing particular material merely represented to be child pornography, but not necessarily depicting actual

I respectfully dissent from it.

I The easy case for applying the Act would be a proposal to obtain or supply child pornography supposedly showing a real child, when the solicitation or offer is unrelated to any image (that is,

children. /d., at 257-258.

when the existence of pornographic "material" was merely "purported"). ***

The Prosecutorial Remedies and Other Tools to

end the Exploitation of Children Today Act of 2003 (Act), 117 Stat. 650, was enacted in the wake of Free Speech Coalition. The Act responds by avoiding any

Congress did not pass the Act to catch unsuccessful solicitors or fraudulent offerors with no photos to sell; rather, it feared that "[t]he mere prospect that the technology exists to create composite or computer-generated depictions that are

direct prohibition of transactions in child pornography" when no actual minors may be

pictured; instead, it prohibits proposals for transactions in pornography when a defendant

indistinguishable from depictions of real children will

22

allow defendants who possess images of real children to escape prosecution ... . This threatens to render child pornography laws that protect real children unenforceable." /d., §501(13).

at 255 ("The Government raises serious constitutional difficulties by seeking to impose on the defendant the

A person who "knowingly" proposes a transaction in an extant image incorporates into the proposal an understanding that the subject of the proposal is or includes that image. Cf. ante, at 14 ("['Promotes']

established by the prosecution, as well as images that show no real children at all; and this, despite the fact that, under Free Speech Coalition, the first proposed

refers to the recommendation of a particular piece of purported child pornography ..."). Congress

understood that underlying most proposals there will be an image that shows a child, and the proposal referring to an actual child's picture will thus amount to a proposal to commit an independent crime such as a transfer of child pornography, see 18 U. S. C. §§2252A(a)(1), (2). But even when actual pictures thus occasion proposals, the Act requires no finding that an actual child be shown in the pornographic

burden of proving his speech is not unlawful"). The Act, however, punishes proposals regarding images when the inclusion of actual children is not

transfer could not be punished without the very proof the Act is meant to dispense with, and the second could not be made criminal at all. Il

What justification can there be for making independent crimes of proposals to engage in transactions that may include protected materials? The Court gives three answers, none of which comes

to grips with the difficulty raised by the question. The

will be fake, with the picture showing only a

first, ante, at 17-18, says it is simply wrong to say that the Act makes it criminal to propose a lawful transaction, since an element of the forbidden proposal must express a belief or inducement to

simulation of a child, for example, or a very younglooking adult convincingly passed off as a child; in those cases the proposal is for a transaction that could not itself be made criminal, because the absence of a

shows actual children. But this does not go to the point. The objection is not that the Act criminalizes a proposal for a transaction described as being in

setting in order to prove a violation. And the fair assumption (apparently made by Congress) is that in some instances, the child pornography in question

child model means that the image is constitutionally protected. See Free Speech Coalition, 535 U. S., at 246. But under the Act, that is irrelevant. What

matters is not the inclusion of an actual child in the image, or the validity of forbidding the transaction proposed; what counts is simply the manifest belief or intent to cause a belief that a true minor is shown in the pornographic depiction referred to. The tension with existing constitutional law is obvious. Free Speech Coalition reaffirmed that nonobscene virtual pornographic images are protected, because they fail to trigger the concern for child safety that disentitles child pornography to First Amendment protection. See id., at 249-251. The case thus held that pictures without real minors (but only simulations, or young-looking adults) may not be the subject of a non-obscenity pornography crime, id., at 246, 251, and it has reasonably been taken to mean

that transactions in pornographic pictures featuring children may not be punished without proof of real children, see, ¢.g., United States v. Salcido, 506 F. 3d

729, 733 (CA9 2007) (per curiam) ("In [Free Speech Coalition], the Supreme Court held that possession of ‘virtual’ child pornography cannot constitute a criminal offense. ... As a result, the government has the burden of proving beyond a reasonable doubt that the images were of actual children, not computergenerated images"); cf. Free Speech Coalition, supra,

believe that the subject of the proposed transaction

virtual (that is, protected) child pornography. The point is that some proposals made criminal, because they express a belief that they refer to real child pornography, will relate to extant material that does not, or cannot be, demonstrated to show real children

and so may not be prohibited. When a proposal covers existing photographs, the Act does not require that the requisite belief (manifested or encouraged) in the reality of the subjects be a correct belief. Prohibited proposals may relate to transactions in

lawful, as well as unlawful, pornography. Much the same may be said about the Court's second answer, that a proposal to commit a crime enjoys no speech protection. Ante, at 11. For the

reason just given, that answer does not face up to the source of the difficulty: the action actually contemplated in the proposal, the transfer of the particular image, is not criminal if it turns out that an actual child is not shown in the photograph. If Ferber and Free Speech Coalition are good law, the facts

sufficient for conviction under the Act do not suffice to show that the image (perhaps merely simulated), and thus a transfer of that image, are outside the bounds of constitutional protection. For this reason, it is not enough just to say that the First Amendment does not protect proposals to commit crimes. For that rule rests on the assumption that the proposal is

actually to commit a crime, not to do an act that may

turn out to be no crime at all. Why should the general

completion of the crime. This is not so, however, in

rule of unprotected criminal proposals cover a case like the proposal to transfer what may turn out to be fake child pornography?

the proposed transaction in an identified pornographic image without the showing of a real child; no matter what the parties believe, and no

matter how exactly a defendant's actions conform to his intended course of conduct in completing the

The Court's third answer analogizes the proposal to an attempt to commit a crime, and relies on the rule of criminal law that an attempt is criminal even when some impediment makes it impossible to

transaction he has in mind, if there turns out to be reasonable doubt that a real child was used to make the photos, or none was, there could be, respectively, no conviction and no crime. Thus, in the classic

complete the criminal act (the possible impediment here being the advanced age, say, or simulated

impossibility example, there is attempt liability when

character of the child-figure). See ante, at 14-15.

the course of conduct intended cannot be completed owing to some fact which the defendant was

Although the actual transfer the speaker has in mind may not turn out to be criminal, the argument goes, the transfer intended by the speaker is criminal, because the speaker believes” that the contemplated

mistaken about, and which precludes completing the intended physical acts. But on the Court's reasoning there would be attempt liability even when the

transfer will be of real child pornography, and transfer of real child pornography is criminal. The fact that the circumstances are not as he believes

contemplated acts had been completed exactly as intended, but no crime had been committed. Why should attempt liability be recognized here (thus making way for "proposal" liability, under the Court's analogy)?

them to be, because the material does not depict actual minors, is no defense to his attempt to engage in an unlawful transaction.

The Court's first response is to demur, with its

But invoking attempt doctrine to dispense with Free Speech Coalition's real-child requirement in the

example of the drug dealer who sells something else. Ante, at 14. (A package of baking powder, powder cocaine, would be an example.) No doubts the dealer may validly be convicted attempted drug sale even if he didn't know

circumstances of this case is incoherent with the Act, and it fails to fit the paradigm of factual impossibility or qualify for an extended version of that rule. The incoherence of the Court's answer with the scheme of the Act appears from §2252A(b)(1) (2000 ed., Supp. V), which criminalizes attempting or conspiring to

not one of an it was

baking powder he was selling. Yet selling baking powder is no more criminal than selling virtual child pornography.

violate the Act's substantive prohibitions, including the pandering provision of §2252A(a)(3)(B). Treating pandering itself as a species of attempt would thus

This response does not suffice, however, because it overlooks a difference between the lawfulness of selling baking powder and the lawful character of virtual child pornography. Powder sales are lawful but not constitutionally privileged. Any justification within the bounds of rationality would suffice for limiting baking powder transactions, just as it would for regulating the discharge of blanks from a pistol. Virtual pornography, however, has been held to fall within the First Amendment speech privilege, and thus is affirmatively protected, not merely allowed as

mean that there is a statutory, inchoate offense of attempting to attempt to commit a substantive child pornography crime. A metaphysician could imagine a system like this, but the universe of inchoate crimes is not expandable indefinitely under the actual principles of criminal law, let alone when First Amendment protection is threatened. See 2 W. LaFave, Substantive Criminal Law §11.2(a), p. 208 (2d ed. 2003) ("[W]here a certain crime is actually

defined in terms of either doing or attempting a

a matter of course. The question stands: why should a proposal that may turn out to cover privileged

certain crime, then the argument that there is no crime of attempting this attempt is persuasive").

expression be subject to standard attempt liability?

The more serious failure of the attempt analogy, however, is its unjustifiable extension of the classic

The Court's next response deals with the privileged character of the underlying material. It

factual frustration rule, under which the action

gives another example of attempt that presumably could be made criminal, in the case of the mistaken

specifically intended would be a criminal act if completed. The intending killer who mistakenly grabs the pistol loaded with blanks would have committed homicide if bullets had been in the gun; it

spy, who passes national security documents thinking they are classified and secret, when in fact they have

was only the impossibility of completing the very

been declassified and made subject to public inspection. Ante, at 18. Publishing unclassified

intended act of shooting bullets that prevented the

documents is subject to the First Amendment

24

privilege and can claim a value that fake child

2k OK

pornography cannot. The Court assumes that the document publication may be punished as an attempt to violate state-secret restrictions (and I assume so too); then why not attempt-proposals based on a

Finally, if the Act stands when applied to identifiable, extant pornographic photographs, then in

practical terms Ferber and Free Speech Coalition

mistaken belief that the underlying material is real

fall. They are left as empty as if the Court overruled

child pornography? As the Court looks at it, the deterrent value that justifies prosecuting the mistaken

them formally, and when a case as well considered and as recently decided as Free Speech Coalition is put aside (after a mere six years) there ought to be a very good reason. Another pair of First Amendment cases come to mind, compare Minersville School

spy (like the mistaken drug dealer and the intending killer) would presumably validate prosecuting those who make proposals about fake child pornography. But it would not, for there are significant differences between the cases of security documents and pornography without real children.

Dist. v. Gobitis, 310 U.S. 586 (1940), with West Virginia Bd. of Ed. v. Barnette, 319 U.S. 624 (1943). In Barnette, the Court set out the reason for its abrupt turn in overruling Gobitis after three years, 319 U.S.

at 635-642, but here nothing is explained. Attempts Where Government documents, blank cartridges, and baking powder are involved, deterrence can be promoted without compromising any other important policy, which is not true of criminalizing mistaken child pornography proposals. There are three dispositive differences. As for the first, if the law can criminalize proposals for transactions in fake as well as true child pornography as if they were like

with baking powder and unclassified documents can be punished without damage to confidence in precedent; suppressing protected pornography cannot be. ***We should hold that a transaction in what turns out to be fake pornography is better understood, not as an incomplete attempt to commit a crime, but as a completed series of intended acts that simply do not add up to a crime, owing to the privileged character of the material the parties were in fact about to deal

attempts to sell cocaine that turned out to be baking powder, constitutional law will lose something

sufficiently important to have made it into multiple

in.

holdings of this Court, and that is the line between child pornography that may be suppressed and fake child pornography that falls within First Amendment protection. No one can seriously assume that after today's decision the Government will go on prosecuting defendants for selling child pornography (requiring a showing that a real child is pictured, under Free Speech Coalition, 535 U. S., at 249-251); it will prosecute for merely proposing a pornography transaction manifesting or inducing the belief that a photo is real child pornography, free of any need to demonstrate that any extant underlying photo does show a

Til Untethering the power to suppress proposals about extant pornography from any assessment of the likely effects the proposals might have has an unsettling

significance well beyond the subject of child pornography. For the Court is going against the grain of pervasive First Amendment doctrine that tolerates speech restriction not on mere general tendencies of expression, or the private understandings of speakers or listeners, but only after a critical assessment of practical consequences. Thus, one of the milestones

real child. If the Act can be enforced, it will

function just as it was meant to do, by merging the whole subject of child pornography into the offense of proposing a transaction, dispensing with the realchild element in the underlying subject. And eliminating the need to prove a real child will be a loss of some consequence. This is so not because there will possibly be less pornography available owing to the greater ease of prosecuting, but simply

of American political liberty is Brandenburg v. Ohio, 395 U.S. 444 (1969) (per curiam), which is seen as the culmination of a half century's development that began with Justice Holmes's dissent in Abrams v. United States, 250 U.S. 616 (1919). In place of the rule that dominated the First World War sedition and espionage cases, allowing suppression of speech for its tendency and the intent behind it, see Schenck v. United States, 249 U.S. 47, 52 (1919), Brandenburg

because there must be a line between what the Government may suppress and what it may not, and a segment of that line will be gone. This Court went to great pains to draw it in Ferber and Free Speech

insisted that “the constitutional guarantees of free speech and free

Coalition; it was worth drawing and it is worth

press do not permit a State to forbid or proscribe

respecting now in facing the attempt to end-run that

advocacy of the use of force or of law violation except where such advocacy is directed to inciting or

line through the provisions of the Act.

25

producing imminent lawless action and is likely to

The claim needs to be taken with a grain of salt.

incite or produce such action." 395 U. S., at 447.

There has never been a time when some such concern could not be raised. Long before the Act was passed, for example, pornographic photos could be taken of

See also G. Stone, Perilous Times: Free Speech in

Wartime 522 (2004) ("[E]xactly fifty years after Schenck, the Supreme Court finally and unambiguously embraced the Holmes-Brandeis

models one day into adulthood, and yet there is no indication that prosecution has ever been crippled by the need to prove young-looking models were underage.

version of clear and present danger"). Brandenburg unmistakably insists that any limit

Still, if ] were convinced there was a real reason

on speech be grounded in a realistic, factual

for the Government's fear stemming from computer

assessment of harm. This is a far cry from the Act before us now, which rests criminal prosecution for proposing transactions in expressive material on nothing more than a speaker's statement about the

simulation, I would be willing to reexamine Ferber.

Conditions can change, and if today's technology left no other effective way to stop professional and amateur pornographers from exploiting children there would be a fair claim that some degree of expressive protection had to yield to protect the children.

material itself, a statement that may disclose no more

than his own belief about the subjects represented or his desire to foster belief in another. This should

weigh heavily in the overbreadth balance, because

But the Government does not get a free pass

"First Amendment freedoms are most in danger when the government seeks to control thought or to justify

whenever it claims a worthy objective for curtailing

its laws for that impermissible end. The right to think

claimed here. Although Congress found that child pornography defendants "almost universally rais[e]"

speech, and I have further doubts about the need

is the beginning of freedom, and speech must be

the defense that the alleged child pornography could be simulated or virtual, §501(10), 117 Stat. 677, neither Congress nor this Court has been given the citation to a single case in which a defendant's

protected from the government because speech is the beginning of thought." Free Speech Coalition, 535 U. S., at 253. See also Hurley v. Irish-American Gay,

Lesbian and Bisexual Group of Boston, Inc., 515 U.

acquittal is reasonably attributable to that defense.

S. 557, 579 (1995) ("The very idea that a noncommercial speech restriction be used to produce thoughts and statements acceptable to some groups or, indeed, all people, grates on the First Amendment, for it amounts to nothing less than a proposal to limit

Without some convincing evidence to the

contrary, experience tells us to have faith in the capacity of the jury system, which I would have expected to operate in much the following way, if the Act were not on the books. If the Government sought to prosecute proposals about extant images as

speech in the service of orthodox expression. The Speech Clause has no more certain antithesis").

attempts, it would seek to carry its burden of showing

IV

that real children were depicted in the image subject to the proposal simply by introducing the image into evidence; if the figures in the picture looked like real children, the Government would have made its prima facie demonstration on that element.* The defense might well offer expert testimony to the effect that

I said that I would not pay the price enacted by the Act without a substantial justification, which I am at a loss to find here. | have to assume that the Court sees some grounding for the Act that I do not, however, and I suppose the holding can only be explained as an uncritical acceptance of a claim made both to Congress and to this Court. In each forum the Government argued that a jury's appreciation of the mere possibility of simulated or virtual child pornography will prevent convictions for the real

if this was the extent of the testimony that came in, the cross-examination would ask whether the witness could say that this particular, seemingly authentic representation was merely simulated. If the witness

thing, by inevitably raising reasonable doubt about

could say that (or said so on direct), and survived

whether actual children are shown. The Government

further questioning about the basis for the opinion and its truth, acquittal would have been proper; the defendant would have raised reasonable doubt about whether a child had been victimized (the same standard that would govern if the defendant were on

technology can produce convincing simulations, but

voices the fear that skeptical jurors will place traffic in child pornography beyond effective prosecution unless it can find some way to avoid the Ferber limitation, skirt Free Speech Coalition, and allow

prosecution whether pornography shows actual

trial for abusing a child personally). But if the defense had no specific evidence that the particular image failed to show actual children, I am skeptical

children or not.

26

that a jury would have been likely to entertain reasonable doubt that the image showed a real child.

exploitation of children unpunishable, there is no

excuse for cutting back on the First Amendment and

no alternative to finding overbreadth in this Act. | Perhaps I am wrong, but without some

would hold it unconstitutional on the authority of

demonstration that juries have been rendering

Ferber and Free Speech Coalition.

One issue that comes up from time to time in the free speech context is “prior restraint” — the government’s ability, not to punish speech once it is made (e.g., imprisoning those who have made illegal threats), but to prevent speech before it is made. Prior restraint, a common tactic of totalitarian governments, is constitutionally suspect in the United States because of the First Amendment. York. The stays entered June 25, 1971, by the Court

New York Times Co. v. United States

are vacated. The judgments shall issue forthwith. (The “Pentagon Papers” Case) So ordered.

No. 1873 MR. SUPREME COURT OF THE UNITED STATES

the view 403 U.S. 713, 91 S. Ct. 2140, 29 L. Ed. 2d 822

JUSTICE

BLACK,

with whom

MR.

JUSTICE DOUGLAS joins, concurring: I adhere to

that the Government’s

case against the

Washington Post should have been dismissed and that the injunction against the New York Times should have been vacated without oral argument when the cases were first presented to this Court. I believe that every moment’s continuance of the injunctions against these newspapers amounts to a

June 30, 1971* * Together with No. 1885, United States v.

Washington Post Co.

flagrant, indefensible, and continuing violation of the PER CURIAM: We granted certiorari in these cases in which the United States seeks to enjoin the New York Times and the Washington Post from publishing the contents of a classified study entitled “History of U.S. Decision-Making Process on Viet Nam Policy.” * * * “Any system of prior restraints of expression

comes to this Court bearing a heavy presumption against its constitutional validity.” *** The Government “thus carries a heavy burden of showing justification for the imposition of such a restraint.” ** * The District Court for the Southern District of New York in the New York Times case and the District Court for the District of Columbia and the Court of Appeals for the District of Columbia Circuit

in

the

Washington

Post

case

held

that

the

Government had not met that burden. We agree.

The judgment of the Court of Appeals for

First Amendment.

Furthermore, after oral argument, |

agree completely that we must affirm the judgment of the Court of Appeals for the District of Columbia Circuit and reverse the judgment of the Court of

Appeals for the Second Circuit for the reasons stated by my Brothers DOUGLAS and BRENNAN. In my view it is unfortunate that some of my Brethren are apparently willing to hold that the publication of news may sometimes be enjoined. Such a holding would make a shambles of the First Amendment. Our Government was launched in 1789 with the adoption of the Constitution. The Bill of Rights, including the First Amendment, followed in 1791. Now, for the first time in the 182 years since the founding of the Republic, the federal courts are asked to hold that the First Amendment does not mean what

it says, but rather means that the Government can halt the publication of current news of vital importance to the people of this country.

the District of Columbia Circuit is therefore affirmed.

The order of the Court of Appeals for the Second Circuit is reversed and the case is remanded with directions to enter a judgment affirming the judgment of the District Court for the Southern District of New

In

seeking

injunctions

against

these

newspapers and in its presentation to the Court, the Executive essential

Branch purpose

seems and

to have forgotten the history of the First

Amendment.

When the Constitution was adopted,

and

shell.

In

my

view,

far

from

deserving

many people strongly opposed it because the document contained no Bill of Rights to safeguard certain basic freedom * * * They especially feared

condemnation for their courageous reporting, the New York Times, the Washington Post, and other newspapers should be commended for serving the

that the new powers granted to a central government might be interpreted to permit the government to curtail freedom of religion, press, assembly, and speech. In response to an overwhelming public

purpose that the Founding Fathers saw so clearly. In

clamor,

James

Madison

offered

a _ series

revealing the workings of government that led to the

Vietnam war, the newspapers nobly did precisely that which the Founders hoped and trusted they would do.

of

amendments to satisfy citizens that these great liberties would remain safe and beyond the power of

The Government’s case here is based on premises entirely different from those that guided the

government to abridge. Madison proposed what later became the First Amendment in three parts, two of which are set out below, and one of which

Framers of the First Amendment. The Solicitor General has carefully and emphatically stated:

proclaimed: “The people shall not be deprived or abridged of their right to speak, to write, or to publish

“Now, Mr. Justice construction of . . . [the First well known, and I certainly say that no law means no should be obvious. I can

their sentiments; and the freedom of the press, as one

of the great bulwarks of liberty, shall be inviolable.” ***

(Emphasis

added.)

The

amendments

were

Justice, that to me it is equally obvious that

offered to curtail and restrict the general powers granted to the Executive, Legislative, and Judicial Branches two years before in the original

‘no

Constitution

into

a new

of government

charter

under

which

law’

does

not

mean

‘no

law’,

and

I

would seek to persuade the Court that that is true. . . . There are other parts of the

Constitution. The Bill of Rights changed the original branch

[BLACK], your Amendment] is respect it. You law, and that only say, Mr.

Constitution that grant powers and responsibilities to the Executive, and . . . the First Amendment was not intended to make it impossible for the Executive to function or to protect the security of the United States.”

no

could abridge the people’s

freedoms of press, speech, religion, and assembly. Yet the Solicitor General argues and some members

of the Court appear to agree that the general powers of the Government adopted in the original

*

KOK

Constitution should be interpreted to limit and restrict

the specific and emphatic guarantees of the Bill of Rights adopted later. I can imagine no greater perversion of history. Madison and the other Framers of the

First Amendment,

able

men

that they

And the Government argues in its brief that

in spite of the First Amendment, “the authority of the Executive Department

to protect the nation against

publication of information whose disclosure would endanger the national security stems from two

were,

wrote in language they earnestly believed could never be misunderstood: “Congress shall make no law... . abridging the freedom . . . of the press .. . .” Both the history and language of the First Amendment support

interrelated sources: the constitutional power of the President over the conduct of foreign affairs and his authority as Commander-in-Chief * * *

the view that the press must be left free to publish news,

whatever

the

source,

without

censorship,

In other

words,

we

are

asked

to hold

that

despite the First Amendment’s emphatic command, the Executive Branch, the Congress, and the Judiciary can make laws enjoining publication of current news and abridging freedom of the press in the name of “national security.” The Government does not even attempt to rely on any act of Congress. Instead it makes the bold and dangerously far-

injunctions, or prior restraints. In the First Amendment the Founding Fathers gave the free press the protection it must have to fulfill its essential role in our democracy. The press was to serve the governed, not the governors. The Government’s power to censor the press was

abolished so that the press would remain forever free

reaching contention that the courts should take it upon themselves to “make” a law abridging freedom

to censure the Government. The press was protected so that it could bare the secrets of government and inform the people. Only a free and unrestrained press

of the press in the name of equity, presidential power and national security, even when the representatives

can effectively expose deception in government. And is the duty to prevent any part of the government from deceiving the people and sending them off to

of the people in Congress have adhered to command of the First Amendment and refused make such a law. * * * To find that the President “inherent power” to halt the publication of news

distant lands to die of foreign fevers and foreign shot

resort

paramount among the responsibilities of a free press

28

to

the

courts

would

wipe

out

the

the to has by

First

Amendment and destroy the fundamental liberty and security of the very people the Government hopes to

make “secure.” No one can read the history of the adoption of the First Amendment without being convinced beyond any doubt that it was injunctions like those sought here that Madison and _ his collaborators intended to outlaw in this Nation for all time. The word “security” is a broad, vague generality whose contours should not be invoked to abrogate the fundamental law embodied in the First Amendment. The guarding of military and diplomatic secrets at the expense of informed representative government provides no real security for our Republic. The Framers of the First Amendment, fully aware of both the need to defend a new nation and

the abuses of the English and Colonial governments, sought to give this new society strength and security by providing that freedom of speech, press, religion, and assembly should not be abridged. This thought was eloquently expressed in 1937 by Mr. Chief

Justice Hughes -- great man and great Chief Justice that he was -- when the Court held a man could not be punished for attending a meeting run by

national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates . . . the same to any

person not entitled to receive it . . . shall be fined not more than $ 10,000 or imprisoned not more than ten years, or both.”

The Government suggests “communicates” is broad enough publication.

that the word to encompass

There are eight sections in the chapter on espionage and censorship, §§ 792-799. In three of those eight “publish” is specifically mentioned: § 794 (b) applies to “Whoever, in time of war, with intent that the same shall be communicated to the enemy, collects, records, publishes, or communicates . . . [the disposition of armed forces].” Section 797 applies to whoever “reproduces, publishes, sells, or gives away” photographs of defense installations. Section 798 relating to cryptography applies to whoever: “communicates, furnishes, transmits, or otherwise makes available . . . or publishes” the described material. * * * (Emphasis added.)

Communists. “The greater the importance of safeguarding

the community from incitements to the overthrow of our institutions by force and violence, the more imperative is the need to preserve inviolate the constitutional rights of free speech, free press and free assembly in order to maintain the opportunity for

Thus it is apparent that Congress was capable of and did distinguish between publishing and communication in the various sections of the Espionage Act.

free political discussion, to the end that government may be responsive to the will of the people and that

changes,

if desired, may

* KOK

be obtained by peaceful

means. Therein lies the security of the Republic, the very foundation of constitutional government.” * * * MR. MR.

JUSTICE

JUSTICE BLACK

DOUGLAS, joins,

with

concurring:

Judge Gurfein’s holding in the Times case that this Act does not apply to this case was therefore preeminently sound. Moreover, the Act of September

whom While

23, 1950, in amending I

join the opinion of the Court I believe it necessary to express my views more fully. It should be noted at the outset that the First Amendment provides that “Congress shall make no law .. . abridging the freedom of speech, or of the press.” That leaves, in my view, no room for

governmental restraint on the press. * * *

18 U. S. C. § 793 states in § 1

(b) that: “Nothing in this Act shall be construed to authorize, require, or establish military or civilian censorship or in any way to limit or infringe upon freedom of the press or of speech as guaranteed by the

Constitution of the United States and no regulation shall be promulgated hereunder having that effect.” 64 Stat. 987.

There

is, moreover,

no

statute

barring

the

publication by the press of the material which the Times and the Post seek to use. Title 18 U. S.C. § 793 (e) provides that “whoever having unauthorized possession of, access to, or control over any

document, writing . . . or information relating to the

Thus

Congress

has

been

faithful

to the

command of the First Amendment in this area. So any power that the Government possesses must come from its “inherent power.”

judgments in the present cases may not be taken to * Ok O*

indicate the propriety, in the future, of issuing temporary stays and restraining orders to block the publication of material sought to be suppressed by the Government. So far as I can determine, never before has the United States sought to enjoin a newspaper from publishing information in_ its possession. The relative novelty of the questions

These disclosures * * * may have a serious

impact. But that is no basis for sanctioning a previous restraint on the press. * * * As we stated only the other day in Organization for a Better Austin v. Keefe, 402 US. 415, 419, “any prior restraint on expression comes to

this Court with a ‘heavy presumption’

presented, the necessary haste with which decisions were reached, the magnitude of the interests asserted, and the fact that all the parties have concentrated their arguments upon the question whether permanent restraints were proper may have justified at least some of the restraints heretofore imposed in these cases. Certainly it is difficult to fault the several courts below for seeking to assure that the issues here involved were preserved for ultimate review by this

against its

constitutional validity.” The

Government

says

that it has

inherent

powers to go into court and obtain an injunction to protect the national interest, which alleged to be national security.

in this case

is

Court. But even if it be assumed that some of the interim restraints were proper in the two cases before

Near v. Minnesota, 283 U.S. 697, repudiated

that expansive doctrine in no uncertain terms.

us, that assumption has no bearing upon the propriety

of similar judicial action in the future. To begin with, there has now

The dominant purpose of the First Amendment was to prohibit the widespread practice of governmental suppression of embarrassing information. It is common knowledge that the First Amendment was adopted against the widespread use

judgment;

been

ample

whatever

values

time

there

for reflection and

may

be

in the

preservation of novel questions for appellate review may not support any restraints in the future. More important, the First Amendment stands as an absolute bar to the imposition of judicial restraints in circumstances of the kind presented by these cases.

of the common law of seditious libel to punish the dissemination of material that is embarrassing to the

powers-that-be. * * * The present cases will, I think, go down in history as the most dramatic illustration of that principle. A debate of large proportions goes on in the Nation over our posture in Vietnam. That

U The error that has pervaded these cases from the outset was the granting of any injunctive relief whatsoever, interim or otherwise. The entire thrust of the Government’s claim throughout these cases has

debate antedated the disclosure of the contents of the present documents. The latter are highly relevant to the debate in progress.

been that publication of the material sought to be Secrecy anti-democratic,

in government is fundamentally perpetuating bureaucratic errors.

enjoined “could,” or “might,” or “may” prejudice the national interest in various ways. But the First Amendment tolerates absolutely no prior judicial restraints of the press predicated upon surmise or conjecture that untoward consequences may result.”

Open debate and discussion of public issues are vital to our

national

should

be

health.

On

“uninhibited,

public robust,

questions and

there

wide-open”

debate. * * * *

* Ok

Freedman v. Maryland, 380 U.S. 51 (1965), and similar cases regarding temporary restraints of allegedly obscene materials are not in point. For those cases rest upon the proposition that “obscenity is not protected by the freedoms of speech

*

The stays in these cases that have been in effect for more than a week constitute a flouting of

the principles of the First Amendment as interpreted

and press.” * * * Here there is no question but that

in Near v. Minnesota.

the material

sought to be suppressed

is within the

protection of the First Amendment; the only question is whether, notwithstanding that fact, its publication may be enjoined for a time because of the presence of an overwhelming national interest. Similarly, copyright cases have no pertinence here: the Government is not asserting an interest in the particular form of words chosen in the documents,

MR. JUSTICE BRENNAN, concurring:

I I write separately in these cases only to emphasize what should be apparent: that our

30

Our cases, it is true, have indicated that there is a single, extremely narrow class of cases in which the First Amendment’s ban on prior judicial restraint may be overridden. Our cases have thus far indicated that such cases may arise only when the Nation “is at war,” *** during which times “no one would question but that a government might prevent actual

prime minister of a country form of government.

and

chief

guaranty

purpose [is]

to

of

[the

prevent

First

successful and _ the

both confidentiality and secrecy.

Other nations can

hardly deal with this Nation in an atmosphere of mutual

trust unless they can be assured

confidences

will

be

kept.

And

within

that their

our

own

executive departments, the development of considered and intelligent international policies would be impossible if those charged with their formulation could not communicate with each other freely, frankly, and in confidence. In the area of basic national defense the frequent need for absolute secrecy is, of course, self-evident. * OK OK

as necessary to afford the courts an opportunity to its case,

and

enlightened

maintenance of an effective national defense require

previous

This is not to say that Congress and the courts have no role to play. Undoubtedly Congress has the power to enact specific and appropriate

examine the claim more thoroughly. Unless and until out

defense

an

Yet it is elementary that the of international diplomacy

conduct

publication, it must inevitably submit the basis upon which that aid is sought to scrutiny by the judiciary. And therefore, every restraint issued in this case, whatever its form, has violated the First Amendment -- and not less so because that restraint was justified

made

in

enlightened people.

event may mere conclusions be sufficient: for if the Executive Branch seeks judicial aid in preventing

clearly

lie

press that is alert, aware, and free most vitally serves the basic purpose of the First Amendment. For without an informed and free press there cannot be an

safety of a transport already at sea can support even the issuance of an interim restraining order. In no

has

of national

may

government. For this reason, it is perhaps here that a

restraints upon publication.” *** Thus, only governmental allegation and proof that publication must inevitably, directly, and immediately cause the occurrence of an event kindred to imperiling the

the Government

affairs

citizenry -- in an informed and critical public opinion

information that would set in motion a_ nuclear holocaust, in neither of these actions has the Government presented or even alleged that publication of items from or based upon the material at issue would cause the happening of an event of

“The

in the areas

which alone can here protect the values of democratic

would justify even in peacetime the suppression of

nature.

power

international

situation were assumed to be tantamount to a time of war, or if the power of presently available armaments

Amendment’s}]

a parliamentary

In the absence of the governmental checks and balances present in other areas of our national life, the only effective restraint upon executive policy

obstruction to its recruiting service or the publication of the sailing dates of transports or the number and location of troops.” * * * Even if the present world

that

with

the

First Amendment commands that no injunction may issue.

criminal laws to protect government property and preserve

government

secrets.

Congress

has

passed

such laws, and several of them are of very colorable MR.

JUSTICE

STEWART,

with

whom

relevance

MR. JUSTICE WHITE joins, concurring: In the governmental structure created by our Constitution, the Executive is endowed with enormous power in the two related areas of national defense and international relations. This power, largely unchecked by the Legislative * * * and Judicial * * * branches, has been pressed to the very hilt since the advent of the nuclear missile age. For better or for worse, the

cases.

to

And

the

apparent

if a criminal

circumstances

prosecution

of these

is instituted,

it

will be the responsibility of the courts to decide the applicability of the criminal law under which the charge is brought. Moreover, if Congress should pass a specific law authorizing civil proceedings in this field, the courts would likewise have the duty to decide the constitutionality of such a law as well as

its applicability to the facts proved.

simple fact is that a President of the United States possesses vastly greater constitutional independence

But in the cases before us we are asked neither to construe specific regulations nor to apply

in these two vital areas of power than does, say, a

specific function not the prevent material

but is seeking to suppress the ideas expressed therein. And the copyright laws, of course, protect only the

form of expression and not the ideas expressed.

31

laws. We are asked, instead, to perform a that the Constitution gave to the Executive, Judiciary. We are asked, quite simply, to the publication by two newspapers of that the Executive Branch insists should not,

in the national interest, be published. I am convinced

material at issue here would not be available from the

that the Executive is correct with respect to some of the documents involved. But I cannot say that disclosure of any of them will surely result in direct, immediate, and irreparable damage to our Nation or

Court’s opinion or from public records, nor would it be published by the press. Indeed, even today where we hold that the United States has not met its burden,

the material remains sealed in court records and it is

its people. That being so, there can under the First Amendment

be but one judicial

resolution

properly not discussed in today’s opinions. Moreover, because the material poses substantial dangers to national interests and because of the hazards of criminal sanctions, a responsible press may choose never to publish the more sensitive materials. To sustain the Government in these cases would start the courts down a long and hazardous road that | am not willing to travel, at least without congressional guidance and direction.

of the

issues before us. I join the judgments of the Court. MR.

JUSTICE

WHITE,

with whom

MR.

JUSTICE STEWART joins, concurring: [ concur in today’s judgments, but only because of the concededly extraordinary protection against prior

restraints

enjoyed

constitutional

by

system.

the I

do

press not

say

under that

our in

no

circumstances would the First Amendment permit an

It is not easy to reject the proposition urged by the United States and to deny relief on its goodfaith claims in these cases that publication will work

injunction against publishing information about government plans or operations. * * * Nor, after examining the materials the | Government characterizes as the most sensitive and destructive, can I deny that revelation of these documents will do substantial damage to public interests. Indeed, I am confident that their disclosure will have that result. But I nevertheless agree that the United States has not satisfied the very heavy burden that it must meet to

serious damage to the country. But that discomfiture is considerably dispelled by the infrequency of prior-

restraint cases. Normally, publication will occur and the damage be done before the either opportunity or grounds for here, publication has already begun part of the threatened damage has

The

warrant an injunction against publication in these cases, at least in the absence of express and

fact of a massive

Government has suppression. So and a substantial already occurred.

breakdown

in security

is

known, access to the documents by many unauthorized people is undeniable, and the efficacy of equitable relief against these or other newspapers

appropriately limited congressional authorization for prior restraints in circumstances such as these.

to avert anticipated damage is doubtful at best. The Government’s position is simply stated: The responsibility of the Executive for the conduct of

What

more,

terminating

the

ban

on

the Government now seeks to suppress does not mean that the law either requires or invites newspapers or others to publish them or that they will be immune from criminal action if they do. Prior restraints require an unusually heavy justification under the First Amendment; but failure by the Govemment to justify prior restraints does not measure its constitutional entitlement to a conviction for criminal publication. That the Government mistakenly chose to proceed by injunction does not mean that it could not successfully proceed in another

injunction against publication of a newspaper story whenever he can convince a court that information to be revealed threatens “grave

is

publication of the relatively few sensitive documents

the foreign affairs and for the security of the Nation is so basic that the President is entitled to an the and

irreparable” injury to the public interest; * * * and the injunction should issue whether or not the material to be published is classified, whether or not publication would be lawful under relevant criminal statutes enacted by Congress, and regardless of the circumstances by which the newspaper came into possession of the information.

way. At Congress,

least based

in the on

its

absence own

of legislation investigations

by * ROK

and

findings, I am quite unable to agree that the inherent powers of the Executive and the courts reach so far as to authorize remedies having such sweeping potential

The Criminal Code contains numerous provisions potentially relevant to these cases. Section

for inhibiting publications by the press. Much of the difficulty inheres in the “grave and_ irreparable

797 *** makes it a crime to publish certain photographs or drawings of military installations. Section 798, *** also in precise language,

danger” standard suggested by the United States. If the United States were to have judgment under such a standard in these cases, our decision would be of little guidance to other courts in other cases, for the

proscribes knowing and willful publication of any classified information concerning the cryptographic systems or communication intelligence activities of

32

the United States as well as any information obtained from communication intelligence operations. * * * If any of the material here at issue is of this nature, the newspapers are presumably now on full notice of the

would pose a ‘grave and immediate danger to the security of the United States.’” * * * With all due respect, I believe the ultimate issue in these cases is even more basic than the one posed by the Solicitor

position of the United States and must face the consequences if they publish. I would have no

Congress has the power to make law.

difficulty in sustaining convictions under these sections on facts that would not justify the intervention of equity and the imposition of a prior

In concerning

General.

restraint.

The

issue

is whether this Court

these cases there is the President’s power

no to

or the

problem classify

information as “secret” or “top secret.” Congress has specifically recognized Presidential authority, which has been formally exercised in Exec. Order 10501 (1953), to classify documents and information. * * * Nor is there any issue here regarding the President’s power as Chief Executive and Commander in Chief to protect national security by disciplining employees who disclose information and by taking precautions to prevent leaks.

The same would be true under those sections

of the Criminal Code casting a wider net to protect the national defense. Section 793(e) * * * makes it a

criminal

act for any unauthorized

possessor

of a

document “relating to the national defense” either (1) willfully to communicate or cause to be

communicated

that document

to any

person

not

entitled to receive it or (2) willfully to retain the document and fail to deliver it to an officer of the United States entitled to receive it. *** “The

The

problem

here

is

whether

in

these

dangers surrounding the unauthorized possession of

particular cases the Executive Branch has authority to invoke the equity jurisdiction of the courts to protect

such

deemed

what it believes to be the national interest. * * * The

a case,

their

Government argues that in addition to the inherent power of any government to protect itself, the

to the

President’s power to conduct foreign affairs and his

authorities who would otherwise make the demand.” *** Of course, in the cases before us, the unpublished documents have been demanded by the United States and their import has been made known at least to counsel for the newspapers involved. * * *

position as Commander in Chief give him authority to impose censorship on the press to protect his ability to deal effectively with foreign nations and to conduct the military affairs of the country. Of course,

items

advisable

are

self-evident,

to require

regardless

unauthorized

of

and

it

their surrender

demand,

possession

especially

may

is

in such

since

be unknown

it is beyond cavil that the President has broad powers by virtue of his primary responsibility for the conduct of our foreign affairs and his position as Commander

It is thus clear that Congress has addressed

itself to the problems of protecting the security of the

in Chief. * * * And in some situations it may be that

country and the national defense from unauthorized

under whatever inherent powers the Government may have, as well as the implicit authority derived from the President’s mandate to conduct foreign affairs and to act as Commander in Chief, there is a basis for

disclosure of potentially damaging information. * * * It has not, however, authorized the injunctive remedy against threatened publication. It has apparently been satisfied to rely on criminal sanctions and _ their deterrent effect on the responsible as well as the irresponsible press. | am not, of course, saying that either of these newspapers has yet committed a crime or that either would commit a crime if it published all the material now in its possession. That matter must await resolution in the context of a criminal

the invocation of the equity jurisdiction of this Court as an aid to prevent the publication of material damaging to “national security,” however that term may be defined.

that event, the issue of guilt or innocence would be

It would, however, be utterly inconsistent with the concept of separation of powers for this Court to use its power of contempt to prevent behavior that Congress has specifically declined to

determined

prohibit. * * *

proceeding if one is instituted by the United States. In by

procedures

and

standards

quite

different from those that have purported to govern

these injunctive proceedings.

In these cases we are not faced with a situation where Congress has failed to provide the

MR. JUSTICE The Government contends cases is whether in a suit First Amendment bars a

Executive with broad power to protect the Nation from disclosure of damaging state secrets. Congress

MARSHALL, concurring: that the only issue in these by the United States, “the court from prohibiting a

has

on

several

occasions

given

extensive

consideration to the problem of protecting the military and strategic secrets of the United States.

newspaper from publishing material whose disclosure

33

This consideration has resulted in the enactment of

threat

statutes

proclamation the publication of information relating to national defense that might be useful to the enemy.

making

it

a

crime

to

receive,

disclose,

communicate, withhold, and publish certain documents, photographs, instruments, appliances, and information. The bulk of these statutes is found in chapter 37 of U. S. C., Title 18, entitled Espionage and Censorship. * * * In that chapter, Congress has

*

of war

authority

to directly

prohibit

by

KOK

Congress rejected this proposal after war against Germany had been declared even though many believed that there was a grave national emergency and that the threat of security leaks and espionage was serious. The Executive Branch has not gone to Congress and requested that the decision to provide such power be reconsidered. Instead, the Executive Branch comes to this Court and asks that it be granted the power Congress refused to give.

provided penalties ranging from a $ 10,000 fine to death for violating the various statutes. Thus it would seem that in order for this Court to issue an injunction it would require a showing that such an injunction would enhance the already existing power of the Government to act.

* * * It is a traditional axiom of equity that a court of In 1957 the United States Commission on Government Security found that “airplane journals, scientific periodicals, and even the daily newspaper

equity will not do a useless thing just as it is a traditional axiom that equity will not enjoin the commission of a crime. * * * Here there has been no attempt to make such a showing. The Solicitor General does not even mention in his brief whether the Government considers that there is probable cause to believe a crime has been committed or whether there is a conspiracy to commit future crimes.

have featured articles containing information and other data which should have been deleted in whole or in part for security reasons.” In response to this problem the Commission proposed that “Congress enact legislation making it a crime for any person

willfully to disclose without proper authorization, for any purpose whatever, information classified ‘secret’

If the Government had attempted to show that there was no effective remedy under traditional criminal law, it would have had to show that there is no arguably applicable statute. Of course, at this stage this Court could not and cannot determine whether there has been a violation of a particular statute or decide the constitutionality of any statute. Whether a good-faith prosecution could have been instituted under any statute could, however, be determined.

or ‘top secret,’ knowing, or having reasonable grounds to believe, such information to have been so

classified.” * * * After substantial floor discussion on the proposal, it was rejected. * * * If the proposal that

Sen.

Cotton

championed

on the

floor had

been

enacted, the publication of the documents involved here would certainly have been a crime. Congress refused, however, to make it a crime. The Government is here asking this Court to remake that decision. This Court has no such power.

MR.

* OK OK

CHIEF

JUSTICE

BURGER,

dissenting: So clear are the constitutional limitations on prior restraint against expression, that from the

Even if it is determined that the Government could not in good faith bring criminal prosecutions against the New York Times and the Washington Post, it is clear that Congress has specifically rejected passing legislation that would have clearly given the President the power he seeks here and made the

time

of Near

v.

Minnesota,

283

U.S.

697

(1931),

until recently in Organization for a Better Austin v. Keefe, 402 U.S. 415 (1971), we have had little occasion to be concerned with cases involving prior restraints against news reporting on matters of public interest. There is, therefore, little variation among the members of the Court in terms of resistance to prior restraints against publication. Adherence to this basic constitutional principle, however, does not make

current activity of the newspapers unlawful. When Congress specifically declines to make conduct unlawful it is not for this Court to redecide those issues -- to overrule Congress. * * *

these cases simple. In these cases, the imperative of a free and unfettered press comes into collision with

On at least two occasions Congress has refused to enact legislation that would have made the conduct engaged in here unlawful and given the

another

imperative,

complex

modern

the

effective

government

and

functioning

of a

specifically the

President the power that he seeks in this case. In 1917

effective exercise of certain constitutional powers of

during the debate over the original Espionage Act, still the basic provisions of § 793, Congress rejected a proposal to give the President in time of war or

the Executive. Only those who view the First Amendment as an absolute in all circumstances -- a

34

view I respect, but reject -- can find such cases as these to be simple or easy.

period the Times, publication. * * *

These cases are not simple for another and more immediate reason. We do not know the facts of the cases. No District Judge knew all the facts. No

It is not disputed that the Times has had unauthorized possession of the documents for three to four months, during which it has had its expert analysts studying them, presumably digesting them and preparing the material for publication. During all of this time, the Times, presumably in its capacity as

Court

of Appeals judge

knew

all the

facts. No

member of this Court knows all the facts.

Why are we in this posture, in which only those judges to whom the First Amendment is absolute and permits of no restraint in any circumstances or for any reason, are really in a position to act?

demonstrating

the

hectic

pressures

The

prompt

reflects our universal

setting of these

abhorrence

own

choice,

deferred

publication for purposes it considered proper and thus

public knowledge was delayed. No doubt this was for a good reason; the analysis of 7,000 pages of complex material drawn from a vastly greater volume of material would inevitably take time and the writing of good news stories takes time. But why should the United States Government, from whom this information was illegally acquired by someone, along with all the counsel, trial judges, and appellate judges be placed under needless pressure? After these months of deferral, the alleged “right to know” has somehow and suddenly become a right that must be

under

which these cases have been processed and I need not

restate them.

its

trustee of the public’s “right to know,” has held up

I suggest we are in this posture because these cases have been conducted in unseemly haste. MR. JUSTICE HARLAN covers the chronology of

events

by

cases

of prior restraint.

But prompt judicial action does not mean unjudicial haste.

vindicated instanter. Would it have been unreasonable, since the newspaper could anticipate the Government’s objections to release of secret material, to give the Government an opportunity to review the entire collection and determine whether agreement could be

Here, moreover, the frenetic haste is due in large part to the manner in which the Times proceeded from the date it obtained the purloined documents. It seems reasonably clear now that the haste precluded reasonable and deliberate judicial treatment of these cases and was not warranted. The precipitate action of this Court aborting trials not yet completed is not the kind of judicial conduct that

reached on publication? Stolen or not, if security was

not in fact jeopardized, much of the material could no doubt have been declassified, since it spans a period ending in 1968. With such an approach -- one that great newspapers have in the past practiced and stated editorially to be the duty of an honorable press

ought to attend the disposition of a great issue.

-- the newspapers and Government might well narrowed the area of disagreement as to what and was not publishable, leaving the remainder resolved in orderly litigation, if necessary. To

The newspapers make a derivative claim under the First Amendment; they denominate this right as the public “right to know”; by implication, the Times asserts a sole trusteeship of that right by virtue of its journalistic “scoop.” The right is asserted as an absolute. Of course, the First Amendment right itself is not an absolute, as Justice Holmes so long ago pointed out in his aphorism concerning the right

is hardly

believable that a newspaper

have was to be me it

long regarded

as a great institution in American life would fail to perform one of the basic and simple duties of every citizen with respect to the discovery or possession of stolen property or secret government documents. That duty, I had thought -- perhaps naively -- was to report forthwith, to responsible public officers. This

to shout “fire” in a crowded theater if there was no fire. There are other exceptions, some of which Chief Justice Hughes mentioned by way of example in Near v. Minnesota. There are no doubt other exceptions no one has had occasion to describe or

duty rests on taxi drivers, Justices, and the New York

discuss. Conceivably such exceptions may be lurking in these cases and would have been flushed had they

Times. The course followed by the Times, whether so calculated or not, removed any possibility of orderly litigation of the issues. If the action of the judges up

been properly considered in the trial courts, free from unwarranted deadlines and frenetic pressures. An

to now has been happenstance. * * *

correct,

that

result

is

sheer

issue of this importance should be tried and heard in a judicial atmosphere conducive to thoughtful, reflective deliberation, especially when haste, in terms of hours, is unwarranted in light of the long

Our grant of the writ of certiorari before final judgment in the Times case aborted the trial in the District Court before it had made a complete

35

record pursuant to the mandate of the Court of Appeals for the Second Circuit.

With

The consequence of all this melancholy series of events is that we literally do not know what

we are acting on. As I see it, we have been forced to deal

with

litigation

concerning

rights

of

magnitude without an adequate record, and surely

were

frequently

unable

to respond

I consider

that the

Court

Both the Court of Appeals for the Second Circuit and the Court of Appeals for the District of

great

Columbia Circuit rendered judgment on June 23. The New York Times’ petition for certiorari, its motion for accelerated consideration thereof, and_ its application for interim relief were filed in this Court

without time for adequate treatment either in the prior proceedings or in this Court. It is interesting to note that counsel on both sides, in oral argument before

this Court,

all respect,

has been almost irresponsibly feverish in dealing with these cases.

on June 24 at about 11 a.m. The application of the United States for interim relief in the Post case was

to

questions on factual points. Not surprisingly they pointed out that they had been working literally “around the clock” and simply were unable to review the documents that give rise to these cases and were not familiar with them. This Court is in no better

also filed here on June 24 at about 7:15 p.m. This Court’s order setting a hearing before us on June 26 at 11 a.m., a course which I joined only to avoid the possibility of even more peremptory action by the Court, was issued less than 24 hours before. The

posture. I agree generally with MR. JUSTICE HARLAN and MR. JUSTICE BLACKMUN but I

record in the Post case was

filed with the Clerk

am not prepared to reach the merits. * * *

shortly before 1 p.m. on June 25; the record in the Times case did not arrive until 7 or 8 o’clock that

I would affirm the Court of Appeals for the Second Circuit and allow the District Court to complete the trial aborted by our grant of certiorari,

same night. The briefs of the parties were received less than two hours before argument on June 26.

meanwhile preserving the status quo in the Post case.

This frenzied train of events took place in the name of the presumption against prior restraints created by the First Amendment. Due regard for the extraordinarily important and difficult questions involved in these litigations should have led the Court to shun such a precipitate timetable. In order to decide the merits of these cases properly, some or all of the following questions should have been faced:

I would direct that the District Court on remand give priority to the Times case to the exclusion of all other

business of that court but I would not set arbitrary deadlines. I should add that I am in general agreement with

much

of what

MR.

JUSTICE

WHITE

has

expressed with respect to penal sanctions concerning communication or retention of documents information relating to the national defense.

or

1. Whether the Attorney General is authorized to bring these suits in the name of the United States. * * * This question involves as well the construction and validity of a singularly opaque

We all crave speedier judicial processes but

statute -- the Espionage Act, 18 U.S. C. § 793 (e).

when judges are pressured as in these cases the result

is a parody of the judicial function. 2. Whether the First Amendment permits the federal courts to enjoin publication of stories which would present a serious threat to national security.

MR. JUSTICE HARLAN, with whom THE CHIEF JUSTICE and MR. JUSTICE BLACKMUN join, dissenting: These cases forcefully call to mind the wise admonition of Mr. Justice Holmes, dissenting in Northern Securities Co. v. United States, 193 U.S. 197, 400-401 (1904):

* OK *

3. Whether the threat to publish highly secret documents is of itself a sufficient implication of national security to justify an injunction on the

“Great cases like hard cases make bad law. For great cases are called great, not by reason of their real importance in shaping the law of the future, but

theory that regardless of the contents of documents harm enough results simply from demonstration of such a breach of secrecy.

because of some accident of immediate overwhelming interest which appeals to the feelings and distorts the judgment. These immediate interests exercise a kind of hydraulic pressure which makes what previously was clear seem doubtful, and before

4. Whether the unauthorized disclosure of any of these particular documents would seriously impair the national security.

which even well settled principles of law will bend.”

36

the the

5. What

weight

should

be given

to the

have felt constrained

to deal with the cases

in the

fuller sweep indicated above.

opinion of high officers in the Executive Branch of

the Government with respect to questions 3 and 4. It is a sufficient basis for affirming the Court

of Appeals

6. Whether the newspapers are entitled to retain and use the documents notwithstanding the seemingly uncontested facts that the documents, or

the originals

of which

they

are duplicates,

for the Second

Circuit

in the

Times

litigation to observe that its order must rest on the conclusion that because of the time elements the Government had not been given an adequate opportunity to present its case to the District Court. At the least this conclusion was not an abuse of discretion.

were

purloined from the Government’s possession and that

the newspapers received them with knowledge that they had been feloniously acquired. * * * 7. Whether the threatened harm to the national security or the Government’s possessory interest in the documents justifies the issuance of an

In the Post litigation the Government had more time to prepare; this was apparently the basis for the refusal of the Court of Appeals for the District of Columbia Circuit on rehearing to conform its

injunction against publication in light of — a. The strong First Amendment policy against prior restraints on publication;

judgment to that of the Second Circuit. But I think

b. The doctrine against enjoining

this judgment cannot stand -- a reason which also

conduct in violation of criminal statutes; and c. The extent to which the materials at issue have apparently already been

judgment of the District Court in the Times litigation, set aside by the Court of Appeals. It is plain to me

there is another and more

fundamental

reason why

furnishes an additional ground for not reinstating the

otherwise disseminated.

that the scope of the judicial function in passing upon

the

activities

of

the

Executive

Branch

of

the

Government in the field of foreign affairs is very narrowly restricted. This view is, I think, dictated by the concept of separation of powers upon which our constitutional system rests.

These are difficult questions of fact, of law, and of judgment; the potential consequences of erroneous decision are enormous. The time which has been available to us, to the lower courts,” and to the

parties has been wholly inadequate for giving these

cases the kind of consideration they deserve. It is a

In a speech on the floor of the House of

reflection on the stability of the judicial process that these great issues -- as important as any that have arisen during my time on the Court -- should have been decided under the pressures engendered by the

Representatives, Chief Justice John Marshall, then a member of that body, stated:

“The

President

is the sole organ

of the

torrent of publicity that has attended these litigations from their inception.

nation in its external relations, and representative with foreign nations.” * * *

Forced as I am to reach the merits of these cases, I dissent from the opinion and judgments of the Court. Within the severe limitations imposed by the time constraints under which I have been required to operate, I can only state my reasons in telescoped form, even though in different circumstances I would

From that time, shortly after the founding of the Nation, to this, there has been no substantial challenge to this description of the scope of executive power. * * *

its

sole

From this constitutional primacy in the field of foreign affairs, it seems to me that certain conclusions necessarily follow. Some of these were stated concisely by President Washington, declining the request of the House of Representatives for the

*

The hearing in the Post case before Judge Gesell began at 8 a.m. on June 21, and his decision was rendered, under the hammer of a

papers leading up to the negotiation of the Jay Treaty:

deadline imposed by the Court of Appeals, shortly before 5 p.m. on the same day. The hearing in the Times case before Judge Gurfein was held on June 18

“The nature of foreign negotiations requires caution, and their success must often depend on secrecy; and even when brought to a conclusion a full disclosure of all the measures, demands, or eventual concessions which may have been proposed or contemplated would be extremely impolitic; for this might have a pernicious influence on future

and his decision was rendered on June 19. The Government’s appeals in the two cases were heard by the Courts of Appeals for the District of Columbia and Second Circuits, each court sitting en banc, on June 22. Each court rendered its decision on the following afternoon.

37

Accordingly, I would vacate the judgment of

negotiations, or produce immediate inconveniences, perhaps danger powers.” * * *

The

and

mischief,

power

to

in relation

evaluate

the

to other

the Court of Appeals for the District of Columbia Circuit on this ground and remand the case for further proceedings in the District Court. Before the

commencement

“pernicious

influence” of premature disclosure is not, however, lodged in the Executive alone. | agree that, in performance of its duty to protect the values of the First Amendment against political pressures, the

judiciary

must

review

the

initial

Executive

determination to the point of satisfying itself that the

stated above

subject matter of the dispute does lie within the proper compass of the President’s foreign relations power. Constitutional considerations forbid “a complete

abandonment

of judicial

control.”

of such

further

proceedings,

due

opportunity should be afforded the Government for procuring from the Secretary of State or the Secretary of Defense or both an expression of their views on the issue of national security. The ensuing review by the District Court should be in accordance with the views expressed in this opinion. And for the reasons

I would

affirm the judgment

of the

Court of Appeals for the Second Circuit.

* * *

Pending

Moreover, the judiciary may properly insist that the determination that disclosure of the subject matter would irreparably impair the national security be made by the head of the Executive Department

further

hearings

in

each

case

conducted under the appropriate ground rules, I would continue the restraints on publication. I cannot believe that the doctrine prohibiting prior restraints reaches to the point of preventing courts from maintaining the status quo long enough to act responsibly in matters of such national importance as those involved here.

concerned -- here the Secretary of State or the Secretary of Defense -- after actual personal consideration by that officer. This safeguard is

required in the analogous area of executive claims of privilege for secrets of state. * * *

MR. JUSTICE BLACKMUN,

join MR. JUSTICE HARLAN But in my judgment the judiciary may not properly go beyond these two inquiries and redetermine for itself the probable impact of

dissenting:

I

in his dissent. I also

am in substantial accord with much that MR. JUSTICE WHITE says, by way of admonition, in the

latter part of his opinion.

disclosure on the national security.

At

this

point

the

focus

is on

only

the

“The very nature of executive decisions as foreign policy is political, not judicial. Such

comparatively few documents specified by the Government as critical. So far as the other material --

decisions are wholly confided by our Constitution to

vast in amount -- is concerned, let it be published and published forthwith if the newspapers, once the strain

to the

political

Executive

and

departments

Legislative.

of

the

They

government,

are

delicate,

is gone and the sensationalism is eased, still feel the urge so to do.

complex, and involve large elements of prophecy. They are and should be undertaken only by those

directly responsible to the people whose welfare they

But we are concerned here with the few documents specified from the 47 volumes. Almost 70 years ago Mr. Justice Holmes, dissenting in a celebrated case, observed:

advance or imperil. They are decisions of a kind for which the Judiciary has neither aptitude, facilities nor responsibility and which has long been held to belong in the domain of political power not subject to judicial intrusion or inquiry.” * * *

“Great cases like hard cases make

bad law. For great cases are called great, not Even if there is some room for the judiciary to override the executive determination, it is plain that the scope of review must be exceedingly narrow.

by reason of their real importance in shaping the law of the future,

accident

I can see no indication in the opinions of either the District Court or the Court of Appeals in the Post litigation that the conclusions of the Executive were

but because

immediate

of some

overwhelming

interest which appeals to the feelings and distorts

interests

given even the deference owing to an administrative agency, much less that owing to a co-equal branch of

the Government operating constitutional prerogative.

of the

judgment.

exercise

a

These

kind

of

immediate

hydraulic

pressure .. . .” Northern Securities Co. v.

United (1904).

within the field of its

States,

193

U.S.

197,

400-401

The present cases, if not great, are at least

unusual in their posture and implications, and the

38

Holmes observation application.

certainly

has

pertinent

months to formulate

its plan of procedure and, thus,

deprived its public for that period.

The New York Times clandestinely devoted

The First Amendment, after all, is only one

a period of three months to examining the 47 volumes that came into its unauthorized possession. Once it had begun publication of material from those volumes, the New York case now before us emerged.

part of an entire Constitution. Article II of the great

It

immediately

assumed,

and

ever

since

document

has

maintained, a frenetic pace and character. Seemingly, made public fast enough. Seemingly, from then on, every deferral or delay, by restraint or otherwise, was

But even the newspapers concede that there are situations where restraint is in order and is constitutional. Mr. Justice Holmes gave us a suggestion when he said in Schenck,

same. Two federal district courts, two United States courts of appeals, and this Court -- within a

“It is a question of proximity and degree. When a nation is at war many things that might be said in time of peace are such a hindrance to its effort that their utterance will not be endured so long as men fight and that no Court could regard them as protected by any constitutional right.” 249 U.S., at 52.

period of less than three weeks from inception until today -- have been pressed into hurried decision of profound constitutional issues on inadequately that,

one

facts without the

would

hope,

should

characterize the American judicial process. There has been much writing about the law and little knowledge and less digestion of the facts. In the New York case the judges, both trial and appellate, had not yet examined the basic material when the case was brought here. In the District of Columbia case, little

I therefore would remand these cases to be developed expeditiously, of course, but on a schedule permitting the orderly presentation of evidence from both sides, with the use of discovery, if necessary, as authorized by the rules, and with the preparation of briefs, oral argument, and court opinions of a quality better than has been seen to this point. In making this last statement, I criticize no lawyer or judge. I know

more was done, and what was accomplished in this respect was only on required remand, with the Washington Post, on the excuse that it was trying to protect its source of information, initially refusing to reveal what material it actually possessed, and with the District Court forced to make assumptions as to that possession.

from past personal experience the agony pressure cases

a

lawsuit

importance.

of

this

magnitude

It is not the way

and

in the preparation

and

the

issues

including this one, produced thus far.

With such respect as may be due to the contrary view, this, in my opinion, is not the way to

try

primary

standards are not yet developed. The parties here are in disagreement as to what those standards should be.

The District of Columbia case is much the

and largely assumed

Branch

broad right of the press to print and of the very narrow right of the Government to prevent. Such

telegram following the initial Sunday publication.

deliberation

Executive

majority of this Court. * * * What is needed here is a weighing, upon properly developed standards, of the

abhorrent and was to be deemed violative of the First Amendment and of the public’s “right immediately to know.” Yet that newspaper stood before us at oral argument and professed criticism of the Government for not lodging its protest earlier than by a Monday

careful

in the

important, and I cannot subscribe to a doctrine of unlimited absolutism for the First Amendment at the cost of downgrading other provisions. First Amendment absolutism has never commanded a

once publication started, the material could not be

developed

vests

power over the conduct of foreign affairs and places in that branch the responsibility for the Nation’s safety. Each provision of the Constitution is

asserted

involved

deserve

of time

of litigation. But these better

and

than

the

courts,

has

been

* KOK

for federal courts to

adjudicate, and to be required to adjudicate, issues

The Court, however, decides the cases today the other way. I therefore add one final comment.

that allegedly concern the Nation’s vital welfare. The country would be none the worse off were the cases tried quickly, to be sure, but in the customary and

properly deliberative manner. The most recent of the

these two ultimate America. Columbia

material, it is said, dates no later than 1968, already about three years ago, and the Times itself took three

39

I strongly urge, and sincerely hope, that newspapers will be fully aware of their responsibilities to the United States of Judge Wilkey, dissenting in the District of case, after a review of only the affidavits

before his court (the basic papers had not then been

foundation. | therefore share his concern. | hope that

made available by either party), concluded that there were a number of examples of documents that, if in the possession of the Post, and if published, “could

damage

clearly result in great harm to the nation,” and he defined “harm” to mean “the death of soldiers, the destruction

difficulty

of

of

alliances,

negotiation

the

with

greatly

our

increased

enemies,

the

inability of our diplomats to negotiate... .” I, for one, have now been able to give at least some cursory

study not only to the affidavits, but to the material itself. I regret to say that from this examination I fear that Judge Wilkey’s statements have possible

has

not

already

been

done.

If, however,

damage has been done, and if, with the Court’s action

today,

these

newspapers

proceed

to

publish

the

critical documents and there results therefrom “the death of soldiers, the destruction of alliances, the greatly increased difficulty of negotiation with our enemies, the inability of our diplomats to negotiate,”

to which list I might add the factors of prolongation of the war and of further delay in the freeing of United States prisoners, then the Nation’s people will know where the responsibility for these sad consequences rests.

IV.

Privacy

The word “privacy” means a lot of things — and many of those meanings are mutually exclusive. To some people, privacy is a mere concept; to others, a value; and to still others, an

inviolable right. It is important to distinguish between the concept of privacy and the right to privacy. Most criminals try to commit their crimes in private — but that doesn’t mean that they necessarily have a legal right to the level of privacy they want. In fact, you will see that privacy and security are often at odds with each other ... while at the same time they are essentially two sides of the

same coin. In the United States, most of our essential rights are protected by the United States Constitution. Interestingly, the word “privacy” never appears in the U.S. Constitution. Despite this, the Supreme Court has looked at various situations and declared that several of the constitutional amendments, taken together, create a “penumbral” right to privacy upheld by the United States Constitution. While there is much debate concerning the basis and extent of this penumbral right, the United States Supreme Court seems unlikely to back away from the basic premise that some level of individual privacy is guaranteed by our constitution and its amendments. While a full discussion of the evolution of the right to privacy is beyond the scope of this course, the most appropriate starting place in understanding why the Constitution has been determined to support a right to privacy is to consider the text of the Fourth Amendment to the U.S. Constitution: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, Shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. U.S. Const., amend. IV.

The idea of being “secure ... against unreasonable searches and seizures” definitely has a flavor of upholding individual privacy. At the same time, connection made between “security” and “privacy” demonstrates the close tie between these two concepts. In addition to Constitutional support for privacy, Congress has enacted various pieces of legislation designed to protect individual privacy under certain circumstances. Some significant examples of such legislation are as follows:

A. — The Health Insurance Portability and Accountability Act The

Health

Insurance

Portability and Accountability Act of 1996

(HIPAA)

is an

extremely complex statute that governs many subjects. As relevant to this course, HIPAA mandates certain things for “covered entities” to protect consumers’ privacy. Here are some excerpts from the relevant federal statutes and regulations.

41

1,

The Enabling Statutes:

42 U.S.C. § 1320d-2. Standards for information transactions and data elements (a) Standards to enable electronic exchange (1) In general The Secretary shall adopt standards for transactions, and data elements for such transactions, to enable health information to be exchanged electronically, that are appropriate for— (A) the financial and administrative transactions described in paragraph (2); and (B) other financial and administrative transactions determined appropriate by the Secretary, consistent with the goals of improving the operation of the health care system and reducing

administrative costs. (2) Transactions The transactions referred to in paragraph (1)(A) are transactions with respect to the following:

(A) Health claims or equivalent encounter information. (B) Health claims attachments. (C) Enrollment and disenrollment in a health plan. (D) Eligibility for a health plan. (E) Health care payment and remittance advice. (F) Health plan premium payments. (G) First report of injury. (H) Health claim status. (1) Referral certification and authorization.

(3) Accommodation of specific providers The standards adopted by the Secretary under paragraph (1) shall accommodate the needs of different types of health care providers. (b) Unique health identifiers (1) In general

The Secretary shall adopt standards providing for a standard unique health identifier for each individual, employer, health plan, and health care provider for use in the health care system. In carrying out the preceding sentence for each health plan and health care provider, the Secretary shall take into account

multiple uses for identifiers and multiple locations and specialty classifications for health care providers. (2) Use of identifiers The standards adopted under paragraph (1) shall specify the purposes for which a unique health identifier may be used. (c) Code sets (1) In general The Secretary shall adopt standards that—

(A) select code sets for appropriate data elements for the transactions referred to in subsection (a)(1) of this section from among the code sets that have been developed by private and public entities; or (B) establish code sets for such data elements if no code sets for the data elements have been developed. (2) Distribution The Secretary shall establish efficient and low-cost procedures for distribution (including electronic distribution) of code sets and modifications made to such code sets under section 1320d-—3 (b) of this title. (d) Security standards for health information (1) Security standards The Secretary shall adopt security standards that— (A) take into account— (i) the technical capabilities of record systems used to maintain health information; (ii) the costs of security measures;

(iii) the need for training persons who have access to health information; (iv) the value of audit trails in computerized record systems; and (v) the needs and capabilities of small health care providers and rural health care providers (as such providers are defined by the Secretary); and

42

(B) ensure that a health care clearinghouse, if it is part of a larger organization, has policies and security procedures which isolate the activities of the health care clearinghouse with respect to

processing information in a manner that prevents unauthorized access to such information by such larger organization.

(2) Safeguards Each person described in section 1320d—1 (a) of this title who maintains or transmits health information shall maintain reasonable and appropriate administrative, technical, and physical safeguards— (A) to ensure the integrity and confidentiality of the information; (B) to protect against any reasonably anticipated— (i) threats or hazards to the security or integrity of the information; and (ii) unauthorized uses or disclosures of the information; and (C) otherwise to ensure compliance with this part by the officers and employees of such person. (e) Electronic signature (1) Standards

The Secretary, in coordination with the Secretary of Commerce, shall adopt standards specifying procedures for the electronic transmission and authentication of signatures with respect to the transactions referred to in subsection (a)(1) of this section. (2) Effect of compliance Compliance with the standards adopted under paragraph (1) shall be deemed to satisfy Federal and State statutory requirements for written signatures with respect to the transactions referred to in subsection (a)(1) of this section. (f) Transfer of information among health plans The Secretary shall adopt standards for transferring among health plans appropriate standard data elements needed for the coordination of benefits, the sequential processing of claims, and other data elements for individuals who have more than one health plan. 42 U.S.C. § 1320d—5. General penalty for failure to comply with requirements and standards (a) General penalty (1) In general Except as provided in subsection (b) of this section, the Secretary shall impose on any person who

violates a provision of this part a penalty of not more than $100 for each such violation, except that the total amount imposed on the person for all violations of an identical requirement or prohibition during a calendar year may not exceed $25,000. (2) Procedures The provisions of section 1320a—7a of this title (other than subsections (a) and (b) and the second sentence of subsection (f)) shall apply to the imposition of a civil money penalty under this subsection in the same manner as such provisions apply to the imposition of a penalty under such section 1320a—7a of

this title. (b) Limitations (1) Offenses otherwise punishable

A penalty may not be imposed under subsection (a) of this section with respect to an act if the act constitutes an offense punishable under section 1320d—6 of this title. (2) Noncompliance not discovered A penalty may not be imposed under subsection (a) of this section with respect to a provision of this part if it is established to the satisfaction of the Secretary that the person liable for the penalty did not know, and by exercising reasonable diligence would not have known, that such person violated the provision. (3) Failures due to reasonable cause

(A) In general Except as provided in subparagraph (B), a penalty may not be imposed under subsection (a) of this section if— (i) the failure to comply was due to reasonable cause and not to willful neglect; and (ii) the failure to comply is corrected during the 30-day period beginning on the first date the person liable for the penalty knew, or by exercising reasonable diligence would have known,

that the failure to comply occurred.

43

(B) Extension of period (i) No penalty The period referred to in subparagraph (A)(ii) may be extended as determined appropriate by the Secretary based on the nature and extent of the failure to comply. (ii) Assistance If the Secretary determines that a person failed to comply because the person was unable to comply, the Secretary may provide technical assistance to the person during the period described in subparagraph (A)(ii). Such assistance shall be provided in any manner determined appropriate by the Secretary. (4) Reduction In the case of a failure to comply which is due to reasonable cause and not to willful neglect, any penalty under subsection (a) of this section that is not entirely waived under paragraph (3) may be waived to the extent that the payment of such penalty would be excessive relative to the compliance failure involved. 42 U.S.C. § 1320d-6. Wrongful disclosure of individually identifiable health information. (a) Offense

A person who knowingly and in violation of this part-— (1) uses or causes to be used a unique health identifier; (2) obtains individually identifiable health information relating to an individual; or (3) discloses individually identifiable health information to another person,

shall be punished as provided in subsection (b) of this section. (b) Penalties A person described in subsection (a) of this section shall— (1) be fined not more than $50,000, imprisoned not more than 1 year, or both; (2) if the offense is committed under false pretenses, be fined not more than $100,000, imprisoned not more than 5 years, or both; and (3) if the offense is committed with intent to sell, transfer, or use individually identifiable health

information for commercial advantage, personal gain, or malicious harm, $250,000, imprisoned not more than 10 years, or both.

2.

be fined not more than

The Implementing Regulations: Note: when the federal regulations refer to a “section” or a “part,” they are referring to a

specific portion of the regulations.

For example,

the first regulation reprinted below

is

section 103, in subpart A, in part 160, in subtitle A, of title 45 of the Code of Federal Regulations. For convenience, it is commonly referred to as 45 C.F.R. § 160.103 (a lawyer citing it in court would say “forty-five C F R section 160 point 103”). The reason for organizing the regulations this way is to allow convenient definitions that apply to some related regulations but not to others (for example, an anti-counterfeiting regulation could say “for purposes of this subpart, ‘cash’ means United States currency but does not include checks,” while an anti-fraud regulation might say “for purposes of this part, ‘cash’ includes United States or foreign currency or coin, negotiable instruments, and government bonds”). 45 C.F.R. § 160.103 Definitions. Except as otherwise provided, the following definitions apply to this subchapter:

Individually identifiable health information is information that is a subset of health information, demographic information collected from an individual, and:

including

(1) Is created or received by a health care provider, health plan, employer, or health care clearinghouse; and

(2) Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual; and (i) That identifies the individual; or

(ii) With respect to which there is a reasonable basis to believe the information can be used to identify the individual.

44

Protected health information means individually identifiable health information: (1) Except as provided in paragraph (2) of this definition, that is: (i) Transmitted by electronic media;

(ii) Maintained in electronic media; or (iii) Transmitted or maintained in any other form or medium. (2) Protected health information excludes individually identifiable health information in: (i) Education records covered by the Family Educational Rights and Privacy Act, as amended, 20 U.S.C. § 1232g; (ii) Records described at 20 U.S.C. § 1232g(a)(4)(B)(iv); and (iii) Employment records held by a covered entity in its role as employer.

45 C.F.R. § 164.104 Applicability. (a) Except as otherwise provided, the standards, requirements, and implementation specifications adopted under this

part apply to the following entities: (1) A health plan. (2) A health care clearinghouse. (3) A health care provider who transmits any health information

in electronic form in connection with a

transaction covered by this subchapter. (b) When a health care clearinghouse creates or receives protected health information as a business associate of another covered entity, or other than as a business associate of a covered entity, the clearinghouse must comply with

Sec. 164.105 relating to organizational requirements for covered entities, including the designation of health care components of a covered entity. 45 C.F.R. § 164.306 Security Standards: General rules. (a) General requirements. Covered entities must do the following:

(1) Ensure the confidentiality, integrity, and availability of all electronic protected health information the covered entity creates, receives, maintains, or transmits.

(2) Protect against any reasonably anticipated threats or hazards to the security or integrity of such information. (3) Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required under subpart E of this part. (4) Ensure compliance with this subpart by its workforce. (b) Flexibility of approach. (1) Covered entities may use any security measures that allow the covered entity to

reasonably and appropriately implement the standards and implementation specifications as specified in this subpart. (2) In deciding which security measures to use, a covered entity must take into account the following factors: (i) The size, complexity, and capabilities of the covered entity. (ii) The covered entity’s technical infrastructure, hardware, and software security capabilities. (iii) The costs of security measures. (iv) The probability and criticality of potential risks to electronic protected health information. (c) Standards. A covered entity must comply with the standards as provided in this section and in Sec. 164.308, Sec. 164.310,

Sec.

164.312,

Sec.

164.314,

and

Sec.

164.316

with

respect

to

all

electronic

protected

health

information. (d) Implementation specifications. In this subpart: (1) Implementation specifications are required or addressable. If an implementation specification is required, the word “Required” appears in parentheses after the title of the implementation specification. [f an implementation specification is addressable, the word “Addressable” appears in parentheses after the title of the implementation specification. (2) When a standard adopted in Sec. 164.308, Sec. 164.310, Sec. 164.312, Sec. 164.314, or Sec. 164.316 includes required implementation specifications, a covered entity must implement the implementation

specifications. (3) When a standard adopted in Sec. 164.308, Sec. 164.310, Sec. 164.312, Sec. includes addressable implementation specifications, a covered entity must--

164.314, or Sec.

164.316

(i) Assess whether each implementation specification is a reasonable and appropriate safeguard in its environment, when analyzed with reference to the likely contribution to protecting the entity’s electronic protected health information; and

45

(ii) As applicable to the entity-(A) Implement the implementation specification if reasonable and appropriate; or (B) If implementing the implementation specification is not reasonable and appropriate-(1) Document why it would not be reasonable and appropriate to implement implementation specification; and

(e) Maintenance.

the

(2) Implement an equivalent alternative measure if reasonable and appropriate. Security measures implemented to comply with standards and implementation specifications

adopted under Sec. 164.105 and this subpart must be reviewed and modified as needed to continue provision of reasonable and appropriate protection of electronic protected health information as described at Sec. 164.316. 45 C.F.R. § 164.308 Administrative Safeguards. (a) A covered entity must, in accordance with Sec. 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to prevent, detect, contain, and correct security violations.

(ii) Implementation specifications: (A) Risk analysis (Required). Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity.

(B) Risk management

(Required). Implement security measures sufficient to reduce risks and

vulnerabilities to a reasonable and appropriate level to comply with Sec. 164.306(a). (C) Sanction policy (Required). Apply appropriate sanctions against workforce members who fail to comply with the security policies and procedures of the covered entity. (D) Information system activity review (Required). Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. (2) Standard: Assigned security responsibility. Identify the security official who is responsible for the development and implementation of the policies and procedures required by this subpart for the entity. (3)(i) Standard: Workforce security. Implement policies and procedures to ensure that all members of its

workforce

have

appropriate

access

to

electronic

protected

health

information,

as

provided

under

paragraph (a)(4) of this section, and to prevent those workforce members who do not have access under paragraph (a)(4) of this section from obtaining access to electronic protected health information.

(ii) Implementation specifications: (A) Authorization and/or supervision (Addressable).

Implement

procedures for the authorization

and/or supervision of workforce members who work with electronic protected health information or in locations where it might be accessed. (B) Workforce clearance procedure (Addressable). Implement procedures to determine access of a workforce member to electronic protected health information is appropriate.

that the

(C) Termination procedures (Addressable). Implement procedures for terminating access to electronic protected health information when the employment of a workforce member ends or as required by determinations made as specified in paragraph (a)(3)(ii)(B) of this section.

(4)(i) Standard: Information access management. Implement policies and procedures for authorizing access to electronic protected health information that are consistent with the applicable requirements of subpart E of this

part. (ii) Implementation specifications: (A) Isolating health care clearinghouse functions (Required). If a health care clearinghouse is part of a larger organization, the clearinghouse must implement policies and procedures that protect the

electronic protected health information of the clearinghouse from unauthorized access by the larger organization. (B) Access authorization (Addressable). Implement policies and procedures for granting access to electronic protected health information, for example, through access to a workstation, transaction, program, process, or other mechanism. (C) Access establishment and modification (Addressable). Implement policies and procedures that, based upon the entity’s access authorization policies, establish, document, review, and modify a

user’s right of access to a workstation, transaction, program, or process. (5)(i) Standard: Security awareness and training. Implement a security awareness and training program for all members of its workforce (including management).

46

(ii) Implementation specifications. Implement: (A) Security reminders (Addressable). Periodic security updates. (B) Protection from malicious software (Addressable). Procedures for guarding against, detecting, and reporting malicious software.

(C) Log-in monitoring (Addressable). Procedures for monitoring log-in attempts and reporting discrepancies. (D) Password management (Addressable). Procedures for creating, changing, and safeguarding passwords. (6)(i) Standard: Security incident procedures. Implement policies and procedures to address security incidents.

(ii) Implementation specification: Response and Reporting (Required). Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that

are known to the covered entity; and document security incidents and their outcomes. (7)(i) Standard: Contingency plan. Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that

damages systems that contain electronic protected health information. (ii) Implementation specifications: (A) Data backup plan (Required). Establish and implement procedures to create and maintain retrievable exact copies of electronic protected health information. (B) Disaster recovery plan (Required). Establish (and implement as needed) procedures to restore any loss of data. (C) Emergency mode operation plan (Required). Establish (and implement as needed) procedures to enable continuation of critical business processes for protection of the security of electronic protected health information while operating in emergency mode. (D) Testing and revision procedures (Addressable). Implement procedures for periodic testing and revision of contingency plans.

(E) Applications and data criticality analysis (Addressable). Assess the relative criticality of specific applications and data in support of other contingency plan components. (8) Standard: Evaluation. Perform a periodic technical and nontechnical evaluation, based initially upon the standards implemented under this rule and subsequently, in response to environmental or operational changes

affecting the security of electronic protected health information, that establishes the extent to which an entity’s security policies and procedures meet the requirements of this subpart. (b)(1) Standard: Business associate contracts and other arrangements. A covered entity, in accordance with Sec. 164.306, may permit a business associate to create, receive, maintain, or transmit electronic protected health information on the covered entity’s behalf only if the covered entity obtains satisfactory assurances, in accordance with Sec. 164.314(a) that the business associate will appropriately safeguard the information. (2) This standard does not apply with respect to-(i) The transmission by a covered entity of electronic protected health information to a health care provider concerning the treatment of an individual. (ii) The transmission of electronic protected health information by a group health plan or an HMO or health insurance issuer on behalf of a group health plan to a plan sponsor, to the extent that the requirements of Sec. 164.314(b) and Sec. 164.504(f) apply and are met; or

(iii) The transmission of electronic protected health information from or to other agencies providing the services at Sec. 164.502(e)(1)(ii)(C), when the covered entity is a health plan that is a government program providing public benefits, if the requirements of Sec. 164.502(e)(1)(ii)(C) are met. (3) A covered entity that violates the satisfactory assurances it provided as a business associate of another covered entity will be in noncompliance with the standards, implementation specifications, and requirements of this paragraph and Sec. 164.314(a). (4) Implementation specifications: Written contract or other arrangement (Required). Document the satisfactory assurances required by paragraph (b)(1) of this section through a written contract or other arrangement with the business associate that meets the applicable requirements of Sec. 164.314(a). 45 C.F.R. § 164.310 Physical Safeguards. A covered entity must, in accordance with Sec. 164.306: (a)(1) Standard: Facility access controls. Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that

properly authorized access is allowed.

47

(2) Implementation specifications: (1) Contingency operations (Addressable). Establish (and implement as needed) procedures that allow facility access in support of restoration of lost data under the disaster recovery plan and emergency mode operations plan in the event of an emergency. (ii) Facility security plan (Addressable). Implement policies and procedures to safeguard the facility

and the equipment therein from unauthorized physical access, tampering, and theft. (iii) Access control and validation procedures (Addressable). Implement procedures to control and validate a person’s access to facilities based on their role or function, including visitor control, and control of access to software programs for testing and revision. (iv) Maintenance records (Addressable). Implement policies and procedures to document repairs

and modifications to the physical components

of a facility which are related to security (for

example, hardware, walls, doors, and locks).

(b) Standard: Workstation use. Implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access electronic protected health information. (c) Standard: Workstation security. Implement physical safeguards for all workstations that access electronic protected health information, to restrict access to authorized users. (d)(1) Standard: Device and media controls. Implement policies and procedures that govern the receipt and

removal of hardware and electronic media that contain electronic protected health information into and out of a facility, and the movement of these items within the facility. (2) Implementation specifications:

(i) Disposal (Required). Implement policies and procedures to address the final disposition of electronic protected health information, and/or the hardware or electronic media on which it is stored. (ii) Media re-use (Required). Implement procedures for removal of electronic protected health information from electronic media before the media are made available for re-use. (iii) Accountability (Addressable). Maintain a record of the movements of hardware and electronic media and any person responsible therefor. (iv) Data backup and storage (Addressable). Create a retrievable, exact copy of electronic protected health information, when needed, before movement of equipment. 45 C.F.R. § 164.312 Technical Safeguards. A covered entity must, in accordance with Sec. 164.306: (a)(1) Standard: Access control. Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in Sec. 164.308(a)(4). (2) Implementation specifications: (i) Unique user identification (Required). Assign a unique name and/or number for identifying and tracking user identity. (ii) Emergency access procedure (Required). Establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency. (iii) Automatic logoff (Addressable). Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity. (iv) Encryption and decryption (Addressable). Implement a mechanism to encrypt and decrypt electronic protected health information. (b) Standard: Audit controls. Implement hardware, software, and/or procedural mechanisms that record and

examine activity in information systems that contain or use electronic protected health information. (c)(1) Standard: Integrity. Implement policies and procedures to protect electronic protected health information from improper alteration or destruction.

(2) Implementation specification: Mechanism

to authenticate electronic protected health information

(Addressable). Implement electronic mechanisms to corroborate that electronic protected health information has not been altered or destroyed in an unauthorized manner. (d) Standard: Person or entity authentication. Implement procedures to verify that a person or entity seeking

access to electronic protected health information is the one claimed.

48

(e)(1) Standard: Transmission security. Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network. (2) Implementation specifications:

(i) Integrity controls (Addressable). Implement security measures to ensure that electronically transmitted electronic protected health information isnot improperly modified without detection until disposed of. (ii) Encryption

(Addressable).

Implement

a

mechanism

to encrypt

electronic

protected

health information whenever deemed appropriate. 45 C.F-.R. § 164.502

Uses and Disclosures of Protected Health Information:

General Rules.

(a) Standard. A covered entity may not use or disclose protected health information, except as permitted or required by this subpart or by subpart C of part 160 of this subchapter.

(1) Permitted uses and disclosures. A covered entity is permitted to use or disclose protected health information as follows: (i) To the individual; (ii) For treatment, payment,

or health care operations, as permitted by and in compliance

with Sec.

164.506; (iii) Incident to a use or disclosure otherwise permitted or required by this subpart, provided that the

covered entity has complied with the applicable requirements of Sec. 164.502(b), Sec. 164.514(d), and Sec. 164.530(c) with respect to such otherwise permitted or required use or disclosure; (iv) Pursuant to and in compliance with a valid authorization under Sec. 164.508;

(v) Pursuant to an agreement under, or as otherwise permitted by, Sec. 164.510; and (vi) As permitted by and in compliance with this section, Sec. 164.512, or Sec. 164.514(e), (f), or (g). (2) Required disclosures. A covered entity is required to disclose protected health information: (i) To an individual, when requested under, and required by Sec. 164.524 or Sec. 164.528; and (ii) When required by the Secretary under subpart C of part 160 of this subchapter to investigate or determine the covered entity’s compliance with this subpart. (b) Standard: Minimum necessary. (1) Minimum necessary applies. When using or disclosing protected health

information or when requesting protected health information from another covered entity, a covered entity must make reasonable efforts to limit protected health information to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request. (2) Minimum necessary does not apply. This requirement does not apply to: (i) Disclosures to or requests by a health care provider for treatment; (ii) Uses or disclosures made to the individual, as permitted under paragraph (a)(1)(i) of this section or as required by paragraph (a)(2)(i) of this section; (iti) Uses or disclosures made pursuant to an authorization under Sec. 164.508; (iv) Disclosures made to the Secretary in accordance with subpart C of part 160 of this subchapter; (v) Uses or disclosures that are required by law, as described by Sec. 164.512(a); and

(vi) Uses or disclosures that are required for (c) Standard: Uses and disclosures of protected health entity that has agreed to a restriction pursuant to Sec. information covered by the restriction in violation

164.522(a).

compliance with applicable requirements of this subchapter. information subject to an agreed upon restriction. A covered 164.522(a)(1) may not use or disclose the protected health of such restriction, except as otherwise provided in Sec.

(d) Standard: Uses and disclosures of de-identified protected health information.(1) Uses and disclosures to create de-identified information. A covered entity may use protected health information to create information that is not

individually identifiable health information or disclose protected health information only to a business associate for such purpose, whether or not the de-identified information is to be used by the covered entity. (2) Uses and disclosures of de-identified information. Health information that meets the standard and implementation

specifications

for de-identification under

Sec.

164.514(a) and (b) is considered

not to be

individually identifiable health information, i.e., de-identified. The requirements of this subpart do not apply to information

that has been de-identified

in accordance

with the applicable requirements

of Sec.

164.514,

provided that: (i) Disclosure of a code or other means of record identification designed to enable coded or otherwise de-

identified information to be re-identified constitutes disclosure of protected health information; and

49

(it) If de-identified information is re-identified, a covered entity may use or disclose such re-identified information only as permitted or required by this subpart. (e)(1) Standard: Disclosures to business associates. (i) A covered entity may disclose protected health information to a business associate and may allow a business associate to create or receive protected health information on its

behalf, if the covered entity obtains satisfactory assurance that the business associate will appropriately safeguard the information. (ii) This standard does not apply: (A) With respect to disclosures by a covered entity to a health care provider concerning the treatment of the individual; (B) With respect to disclosures by a group health plan or a health insurance issuer or HMO with respect to a group health plan to the plan sponsor, to the extent that the requirements of Sec. 164.504(f) apply and are met; or (C) With respect to uses or disclosures by a health plan that is a government program providing public benefits, if eligibility for, or enrollment in, the health plan is determined by an agency other than the agency administering the health plan, or if the protected health information used to determine enrollment or eligibility in the health plan is collected by an agency other than the agency administering the health plan, and such activity is authorized by law, with respect to the collection and sharing of individually identifiable health information for the performance of such functions by

the health plan and the agency other than the agency administering the health plan. (iii) A covered entity that violates the satisfactory assurances it provided as a business associate of another covered entity will be in noncompliance with the standards, implementation specifications, and requirements of this paragraph and Sec. 164.504(e). (2) Implementation specification: documentation. A covered entity must document the satisfactory assurances required by paragraph (e)(1) of this section through a written contract or other written agreement or arrangement with the business associate that meets the applicable requirements of Sec. 164.504(e). 45 C.F.R. § 164.506 Uses and Disclosures to Carry out Treatment, Payment, or Health Care Operations. (a) Standard: Permitted uses and disclosures. Except with respect to uses or disclosures that require an authorization under Sec. 164.508(a)(2) and (3), a covered entity may use or disclose protected health information for treatment, payment, or health care operations as set forth in paragraph (c) of this section, provided that such use or disclosure is

consistent with other applicable requirements of this subpart. (b) Standard: Consent for uses and disclosures permitted. (1) A covered entity may obtain consent of the individual to use or disclose protected health information to carry out treatment, payment, or health care operations. (2) Consent, under paragraph (b) of this section, shall not be effective to permit a use or disclosure of protected health information when an authorization, under Sec. 164.508, is required or when another condition must be

met for such use or disclosure to be permissible under this subpart. (c) Implementation specifications: Treatment, payment, or health care operations. (1) A covered entity may use or disclose protected health information for its own treatment, payment, or health

care operations. (2) A covered entity may disclose protected health information for treatment activities of a health care provider. (3) A covered entity may disclose protected health information to another covered entity or a health care provider for the payment activities of the entity that receives the information. (4) A covered entity may disclose protected health information to another covered entity for health care operations activities of the entity that receives the information, if each entity either has or had a relationship with the individual who is the subject of the protected health information being requested, the protected health information pertains to such relationship, and the disclosure is:

(i) For a purpose listed in paragraph (1) or (2) of the definition of health care operations; or (ii) For the purpose of health care fraud and abuse detection or compliance. (5) A covered entity that participates in an organized health care arrangement may disclose protected health

information about an individual to another covered entity that participates in the organized health care arrangement for any health care operations activities of the organized health care arrangement.

50

B.

The Gramm-Leach-Bliley Act

United States Code, Title 15, Chapter 94, Subchapter I: 15 U.S.C. § 6801. Protection of nonpublic personal information (a) Privacy obligation policy It is the policy of the Congress that each financial institution has an affirmative and continuing obligation to respect the privacy of its customers and to protect the security and confidentiality of those customers’

nonpublic personal information. (b) Financial institutions safeguards

In furtherance of the policy in subsection

(a) of this section,

each

agency

or authority described

in

section 6805(a) of this title shall establish appropriate standards for the financial institutions subject to their jurisdiction relating to administrative, technical, and physical safeguards— (1) to insure the security and confidentiality of customer records and information; (2) to protect against any anticipated threats or hazards to the security or integrity of such records; and

(3) to protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any customer. 15 U.S.C. § 6802. Obligations with respect to disclosures of personal information (a) Notice requirements Except as otherwise provided in this subchapter, a financial institution may not, directly or through any affiliate, disclose to a nonaffiliated third party any nonpublic personal information, unless such financial

institution provides or has provided to the consumer a notice that complies with section 6803 of this title. (b) Opt out (1) In general

A financial institution may not disclose nonpublic personal information to a nonaffiliated third party unless— (A) such financial institution clearly and conspicuously discloses to the consumer, in writing or in electronic form or other form permitted by the regulations prescribed under section 6804 of this

title, that such information may be disclosed to such third party; (B) the consumer

is given

the opportunity,

before

the time

that such

information

is initially

disclosed, to direct that such information not be disclosed to such third party; and (C) the consumer option. (2) Exception

is given an explanation of how the consumer can exercise that nondisclosure

This subsection shall not prevent a financial institution from providing nonpublic personal information to a nonaffiliated third party to perform services for or functions on behalf of the financial institution, including marketing of the financial institution’s own products or services, or financial products or services offered pursuant to joint agreements between two or more financial institutions that comply with the requirements imposed by the regulations prescribed under section 6804 of this title, if the financial

institution fully discloses the providing of such information and enters into a contractual agreement with the third party that requires the third party to maintain the confidentiality of such information. (c) Limits on reuse of information Except as otherwise provided in this subchapter, a nonaffiliated third party that receives from a financial institution nonpublic personal information under this section shall not, directly or through an affiliate of such

receiving third party, disclose such information to any other person that is a nonaffiliated third party of both the financial institution and such receiving third party, unless such disclosure would be lawful if made directly to

such other person by the financial institution. (d) Limitations on the sharing of account number information for marketing purposes A financial institution shall not disclose, other than to a consumer reporting agency, an account number or similar form of access number or access code for a credit card account, deposit account, or transaction account of a consumer to any nonaffiliated third party for use in telemarketing, direct mail marketing, or other marketing through electronic mail to the consumer. (e) General exceptions \ Subsections (a) and (b) of this section shall not prohibit the disclosure of nonpublic personal information—

51

(1) as necessary to effect, administer, or enforce a transaction requested or authorized by the consumer, or in connection with— (A) servicing or processing a financial product or service requested or authorized by the consumer; (B) maintaining or servicing the consumer’s account with the financial institution, or with another

entity as part of a private label credit card program or other extension of credit on behalf of such entity; or (C) a proposed or actual securitization, secondary market sale (including sales of servicing rights), or similar transaction related to a transaction of the consumer;

(2) with the consent or at the direction of the consumer;

(3) (A) to protect the confidentiality or security of the financial institution’s records pertaining to the consumer, the service or product, or the transaction therein;

(B) to protect against or prevent actual or potential fraud, unauthorized transactions, claims, or other liability;

(C) for required institutional risk control, or for resolving customer disputes or inquiries; (D) to persons holding a legal or beneficial interest relating to the consumer; or (E) to persons acting in a fiduciary or representative capacity on behalf of the consumer;

(4) to provide information to insurance rate advisory organizations, guaranty funds or agencies, applicable rating agencies of the financial institution, persons assessing the institution’s compliance with industry standards, and the institution’s attorneys, accountants, and auditors; (5) to the extent specifically permitted or required under other provisions of law and in accordance with the Right to Financial Privacy Act of 1978 [12 U.S.C. 3401 et seq.], to law enforcement agencies (including a Federal functional regulator, the Secretary of the Treasury with respect to subchapter II of chapter 53 of title 31, and chapter 2 of title | of Public Law 91-508 (12 U.S.C. 1951-1959), a State insurance authority, or the Federal Trade Commission), self-regulatory organizations, or for an investigation on a matter related to public safety;

(6) (A) to a consumer reporting agency in accordance with the Fair Credit Reporting Act [15 U.S.C.

1681 et seq.], or (B) from a consumer report reported by a consumer reporting agency; (7) in connection with a proposed or actual sale, merger, transfer, or exchange of all or a portion of a business or operating unit if the disclosure of nonpublic personal information concerns solely consumers of such business or unit; or (8) to comply with Federal, State, or local laws, rules, and other applicable legal requirements; to comply

with a properly authorized civil, criminal, or regulatory investigation or subpoena or summons

by

Federal, State, or local authorities; or to respond to judicial process or government regulatory authorities having jurisdiction over the financial institution for examination, compliance, or other purposes as authorized by law. 15 U.S.C. § 6803. Disclosure of institution privacy policy (a) Disclosure required At the time of establishing a customer relationship with a consumer and not less than annually during the continuation of such relationship, a financial institution shall provide a clear and conspicuous disclosure to

such consumer, in writing or in electronic form or other form permitted by the regulations prescribed under section 6804 of this title, of such financial institution’s policies and practices with respect to— (1) disclosing nonpublic personal information to affiliates and nonaffiliated third parties, consistent with section 6802 of this title, including the categories of information that may be disclosed;

(2) disclosing nonpublic personal information of persons who have ceased to be customers of the financial institution; and (3) protecting the nonpublic personal information of consumers. Such disclosures shall be made in accordance with the regulations prescribed under section 6804 of this title. (b) Information to be included The disclosure required by subsection (a) of this section shall include—

(1) the policies and practices of the institution with respect to disclosing nonpublic personal information to nonaffiliated third parties, other than agents of the institution, consistent with section 6802 of this title, and including—

52

(A) the categories of persons to whom the information is or may be disclosed, other than the persons to whom the information may be provided pursuant to section 6802 (e) of this title; and

(B) the policies and practices of the institution with respect to disclosing of nonpublic personal information of persons who have ceased to be customers of the financial institution;

(2) the categories of nonpublic personal information that are collected by the financial institution; (3) the policies that the institution maintains to protect the confidentiality and security of nonpublic personal information in accordance with section 6801 of this title; and (4) the disclosures required, if any, under section 168 1a (d)(2)(A)(iii) of this title. 15 U.S.C. § 6809. Definitions

As used in this subchapter: (1) Federal banking agency The term “Federal banking agency” has the same meaning as given in section 1813 of title 12. (2) Federal functional regulator The term “Federal functional regulator’ means— (A) the Board of Governors of the Federal Reserve System; (B) the Office of the Comptroller of the Currency; (C) the Board of Directors of the Federal Deposit Insurance Corporation; (D) the Director of the Office of Thrift Supervision; (E) the National Credit Union Administration Board; and

(F) the Securities and Exchange Commission. (3) Financial institution (A) In general

The term “financial institution” means any institution the business of which is engaging in financial activities as described in section 1843 (k) of title 12.

(B) Persons subject to CFTC regulation Notwithstanding subparagraph (A), the term “financial institution” does not include any person or entity with respect to any financial activity that is subject to the jurisdiction of the Commodity Futures Trading Commission under the Commodity Exchange Act [7 U.S.C. 1 et seq.]. (C) Farm credit institutions Notwithstanding subparagraph (A), the term “financial institution” does not include the Federal Agricultural Mortgage Corporation or any entity chartered and operating under the Farm Credit Act

of 1971 [12 U.S.C. 2001 et seq.]. (D) Other secondary market institutions Notwithstanding subparagraph (A), the term “financial institution” does not include institutions chartered by Congress specifically to engage in transactions described in section 6802 (e)(1)(C) of this title, as long as such institutions do not sell or transfer nonpublic personal information to a nonaffiliated third party. (4) Nonpublic personal information (A) The term “nonpublic personal information” means personally identifiable financial information— (i) provided by a consumer to a financial institution; (ii) resulting from any transaction with the consumer or any service performed for the consumer; or (iii) otherwise obtained by the financial institution. (B) Such term does not include publicly available information, as such term is defined by the regulations prescribed under section 6804 of this title. (C) Notwithstanding subparagraph (B), such term— (i) shall include any list, description, or other grouping of consumers (and publicly available

information pertaining to them) that is derived using any nonpublic personal information other than publicly available information; but (ii) shall not include any list, description, or other grouping of consumers (and publicly available

information pertaining to them) that is derived without using any nonpublic personal information. (5) Nonaffiliated third party The term “nonaffiliated third party” means any entity that is not an affiliate of, or related by common

ownership or affiliated by corporate control with, the financial institution, but does not include a joint employee of such institution.

53

(6) Affiliate The term “affiliate” means any company that controls, is controlled by, or is under common control with another company. (7) Necessary to effect, administer, or enforce

The term “as necessary to effect, administer, or enforce the transaction” means— (A) the disclosure is required, or is a usual, appropriate, or acceptable method, to carry out the transaction or the product or service business of which the transaction is a part, and record or service or maintain the consumer’s account in the ordinary course of providing the financial service or

financial product, or to administer or service benefits or claims relating to the transaction or the product or service business of which it is a part, and includes— (i) providing the consumer or the consumer’s agent or broker with a confirmation, statement, or other record of the transaction, or information on the status or value of the financial service or financial product; and (ii) the accrual or recognition of incentives or bonuses associated with the transaction that are provided by the financial institution or any other party; (B) the disclosure is required, or is one of the lawful or appropriate methods, to enforce the rights of the financial institution or of other persons engaged in carrying out the financial transaction, or

providing the product or service; (C) the disclosure is required, or is a usual, appropriate, or acceptable method, for insurance underwriting at the consumer’s request or for reinsurance purposes, or for any of the following purposes as they relate to a consumer’s insurance: Account administration, reporting, investigating, or preventing fraud or material misrepresentation, processing premium payments, processing

insurance

claims,

administering

insurance

benefits

(including

utilization

review

activities),

participating in research projects, or as otherwise required or specifically permitted by Federal or State law; or (D) the disclosure is required, or is a usual, appropriate or acceptable method, in connection with—

(i) the authorization, settlement, billing, processing, clearing, transferring, reconciling, or collection of amounts charged, debited, or otherwise paid using a debit, credit or other payment card, check, or account number, or by other payment means; (ii) the transfer of receivables, accounts or interests therein; or (iti) the audit of debit, credit or other payment information. (8) State insurance authority The term “State insurance authority” means, in the case of any person engaged in providing insurance,

the State insurance authority of the State in which the person is domiciled. (9) Consumer The term “consumer” means an individual who obtains, from a financial institution, financial products or services which are to be used primarily for personal, family, or household purposes, and also means the

legal representative of such an individual. (10) Joint agreement The term “joint agreement” means a formal written contract pursuant to which two or more financial institutions jointly offer, endorse, or sponsor a financial product or service, and as may be further defined in the regulations prescribed under section 6804 of this title. (11) Customer relationship The term “time of establishing a customer relationship” shall be defined by the regulations prescribed under section 6804 of this title, and shall, in the case of a financial institution engaged in extending credit directly to consumers to finance purchases of goods or services, mean the time of establishing the credit relationship with the consumer.

United States Code, Title 15, Chapter 94, Subchapter II: 15 U.S.C. § 6821. Privacy protection for customer information of financial institutions

(a) Prohibition on obtaining customer information by false pretenses It shall be a violation of this subchapter for any person to obtain or attempt to obtain, or cause to be disclosed

or attempt to cause to be disclosed to any person, customer information of a financial institution relating to another person—

54

(1) by making a false, fictitious, or fraudulent statement or representation to an officer, employee, or agent of a financial institution; (2) by making a

false, fictitious, or fraudulent statement or representation to a customer of a financial

institution; or

(3) by providing any document to an officer, employee, or agent of a financial institution, knowing that the document is forged, counterfeit, lost, or stolen, was fraudulently obtained, or contains a false, fictitious, or fraudulent statement or representation. (b) Prohibition on solicitation of a person to obtain customer information from financial institution under false

pretenses It shall be a violation of this subchapter to request a person to obtain customer information of a financial institution, knowing that the person will obtain, or attempt to obtain, the information from the institution in any manner described in subsection (a) of this section. *

KOK

15 U.S.C. § 6823. Criminal penalty (a) In general Whoever knowingly and intentionally violates, or knowingly and intentionally attempts to violate, section 6821 of this title shall be fined in accordance with title 18 or imprisoned for not more than 5 years, or both. (b) Enhanced penalty for aggravated cases Whoever violates, or attempts to violate, section 6821 of this title while violating another law of the United States or as part of a pattern of any illegal activity involving more than $100,000 in a 12-month period shall be fined twice the amount provided in subsection (b)(3) or (c)(3) (as the case may be) of section 3571 of title 18, imprisoned for not more than 10 years, or both. 15 U.S.C. § 6824. Relation to State laws (a) In general This subchapter shall not be construed as superseding, altering, or affecting the statutes, regulations, orders, or interpretations in effect in any State, except to the extent that such statutes, regulations, orders, or interpretations are inconsistent with the provisions of this subchapter, and then only to the extent of the inconsistency. (b) Greater protection under State law For purposes of this section, a State statute, regulation, order, or interpretation is not inconsistent with the

provisions of this subchapter if the protection such statute, regulation, order, or interpretation affords any person is greater than the protection provided under this subchapter as determined by the Federal Trade Commission, after consultation with the agency or authority with jurisdiction under section 6822 of this title of either the person that initiated the complaint or that is the subject of the complaint, on its own motion or upon the petition of any interested party. 15 U.S.C. § 6827. Definitions For purposes of this subchapter, the following definitions shall apply: (1) Customer The term “customer” means, with respect to a financial institution, any person (or authorized representative of a person) to whom the financial institution provides a product or service, including that of acting as a fiduciary. (2) Customer information of a financial institution The term “customer information of a financial institution” means any information maintained by or for a financial institution which is derived from the relationship between the financial institution and a

customer of the financial institution and is identified with the customer. (3) Document The term “document” means any information in any form.

(4) Financial institution (A) In general

The term “financial institution” means any institution engaged in the business of providing financial services to customers who maintain a credit, deposit, trust, or other financial account or relationship with the institution.

55

(B) Certain financial institutions specifically included The term “financial institution” includes any depository institution (as defined in section 461 (b)(1)(A) of title 12), any broker or dealer, any investment adviser or investment company, any insurance company, any loan or finance company, any credit card issuer or operator of a credit card

system, and any consumer reporting agency that compiles and maintains files on consumers on a nationwide basis (as defined in section 1681a(p) of this title). (C) Securities institutions For purposes of subparagraph (B)}— (i) the terms “broker” and “dealer” have the same meanings as given in section 78c of this title; (ii) the term “investment adviser” has the same meaning as given in section 80b—2(a)(11) of this title; and (iii) the term “investment company” has the same meaning as given in section 80a-—3 of this title.

(D) Certain persons and entities specifically excluded The term “financial institution” does not include any person or entity with respect to any financial

activity that is subject to the jurisdiction of the Commodity Futures Trading Commission under the Commodity Exchange Act [7 U.S.C. 1 et seq.] and does not include the Federal Agricultural Mortgage Corporation or any entity chartered and operating under the Farm Credit Act of 1971 [12 U.S.C. 2001 et seq.]. (E) Further definition by regulation

The Federal Trade Commission, after consultation with Federal banking agencies and the Securities and

Exchange

Commission,

may

prescribe

regulations

clarifying

or

describing

the

types

of

institutions which shall be treated as financial institutions for purposes of this subchapter.

Implementing Regulations (from Subchapter C, Parts 313-14):

the Code

of Federal

Regulations,

Title 16, Chapter I,

16 C.F.R. § 313.1 Purpose and scope. (a) Purpose. This part governs the treatment of nonpublic personal information about consumers by the financial institutions listed in paragraph (b) of this section. This part: (1) Requires a financial institution in specified circumstances to provide notice to customers about its privacy policies and practices;

(2) Describes the conditions under which a financial institution may disclose nonpublic personal information about consumers to nonaffiliated third parties; and (3) Provides a method for consumers to prevent a financial institution from disclosing that information to most nonaffiliated third parties by “opting out” of that disclosure, subject to the exceptions in §§ 313.13, 313.14, and 313.15. (b) Scope. This part applies only to nonpublic personal information about individuals who obtain financial products or services primarily for personal, family or household purposes from the institutions listed below. This part does

not apply to information about companies or about individuals who obtain financial products or services for business, commercial, or agricultural purposes. This part applies to those “financial institutions” and “other persons” over which the Federal Trade Commission (“Commission”) has enforcement authority pursuant to Section 505(a)(7) of the Gramm-Leach-Bliley Act. An entity is a “financial institution” if its business is engaging in a financial activity as described in Section 4(k) of the Bank Holding Company Act of 1956, 12 U.S.C. 1843(k), which incorporates by reference activities enumerated by the Federal Reserve Board in 12 CFR 211.5(d) and 12

CFR 225.28. The “financial institutions” subject to the Commission’s enforcement authority are those that are not otherwise subject to the enforcement authority of another regulator under Section 505 of the Gramm-Leach-Bliley Act. More specifically, those entities include, but are not limited to, mortgage lenders, “pay day” lenders, finance

companies,

mortgage

connection

with

brokers, account servicers, check cashers, wire transferors, travel agencies operated

financial

services,

collection

agencies,

credit

counselors

and

other

financial

advisors,

in tax

preparation firms, non-federally insured credit unions, and investment advisors that are not required to register with the Securities and Exchange Commission. They are referred to in this part as “You.” The “other persons” to whom this part applies are third parties that are not financial institutions, but that receive nonpublic personal information from financial institutions with whom they are not affiliated. Nothing in this part modifies, limits, or supersedes the

56

standards governing individually identifiable health information promulgated by the Secretary of Health and Human Services under the authority of sections 262 and 264 of the Health Insurance Portability and Accountability Act of 1996, 42 U.S.C. 1320d-1320d-8. Any institution of higher education that complies with the Federal Educational Rights and Privacy Act (“FERPA”), 20 U.S.C. 1232g, and its implementing regulations, 34 CFR part 99, and that is

also a financial institution subject to the requirements of this part, shall be deemed to be in compliance with this part if it is in compliance with FERPA. 16 C.F.R. § 313.3 Definitions.

As used in this part, unless the context requires otherwise: (a) Affiliate means any company that controls, is controlled by, or is under common

control with another

company. (b)(1) Clear and conspicuous means that a notice is reasonably understandable and designed to call attention to

the nature and significance of the information in the notice. (2) Examples -- (i) Reasonably understandable. You make your notice reasonably understandable if you:

(A) Present the information in the notice in clear, concise sentences, paragraphs, and sections; (B) Use short explanatory sentences or bullet lists whenever possible; (C) Use definite, concrete, everyday words and active voice whenever possible; (D) Avoid multiple negatives; (E) Avoid legal and highly technical business termmology whenever possible; and (F) Avoid explanations that are imprecise and readily subject to different interpretations. (ii) Designed to call attention. You design your notice to call attention to the nature and significance of the information in it if you: (A) Use a plain-language heading to call attention to the notice; (B) Use a typeface and type size that are easy to read; (C) Provide wide margins and ample line spacing; (D) Use boldface or italics for key words; and (E) In a form that combines your notice with other information, use distinctive type size, style, and graphic devices, such as shading or sidebars, when you combine your notice with other information. (iii) Notices on web sites. If you provide a notice on a web page, you design your notice to call attention to the nature and significance of the information in it if you use text or visual cues to encourage scrolling down the page if necessary to view the entire notice and ensure that other elements on the web site (such as text, graphics, hyperlinks, or sound) do not distract attention from the notice, and you either: (A) Place the notice on a screen that consumers frequently access, such as a page on which transactions are conducted; or (B) Place a link on a screen that consumers frequently access, such as a page on which transactions are conducted, that connects directly to the notice and is labeled appropriately to convey the importance, nature and relevance of the notice. (c) Collect means to obtain information that you organize or can retrieve by the name of an individual or by identifying number, symbol, or other identifying particular assigned to the individual, irrespective of the source of the underlying information. (d) Company means any corporation, limited liability company, business trust, general or limited partnership, association, or similar organization. (e)(1) Consumer means an individual who obtains or has obtained a financial product or service from you that is to be used primarily for personal, family, or household purposes, or that individual’s legal representative. (2) Examples -- (i) An individual who applies to you for credit for personal, family, or household

purposes is a consumer of a financial service, regardless of whether the credit is extended. (ii) An individual who provides nonpublic personal information to you in order to obtain a determination about whether he or she may qualify for a loan to be used primarily for personal,

family, or household purposes is a consumer of a financial service, regardless of whether the loan is extended. (iii) An individual who provides nonpublic personal information to you in connection with obtaining or seeking to obtain financial, investment, or economic advisory services is a consumer, regardless of whether you establish a continuing advisory relationship.

57

(iv) If you hold ownership or servicing rights to an individual’s loan that is used primarily for personal, family, or household purposes, the individual is your consumer, even if you hold those rights in conjunction with one or more other institutions. (The individual is also a consumer with respect to the other financial institutions involved.) An individual who has a loan in which you have ownership or servicing rights is your consumer, even if you, or another institution with those rights,

hire an agent to collect on the loan. (v) An individual who is a consumer of another financial institution is not your consumer solely because you act as agent for, or provide processing or other services to, that financial institution. (vi) An individual is not your consumer solely because he or she has designated you as trustee for a trust.

(vii) An individual is not your consumer solely because he or she is a beneficiary of a trust for which you are a trustee. (viii) An individual is not your consumer solely because he or she is a participant or a beneficiary of an employee benefit plan that you sponsor or for which you act as a trustee or fiduciary.

(f) Consumer reporting agency has the same meaning as in section 603(f) of the Fair Credit Reporting Act (15 U.S.C. 168 1a(f)). (g) Control of a company means: (1) Ownership, control, or power to vote 25 percent or more of the outstanding shares of any class of voting security of the company, directly or indirectly, or acting through one or more other persons;

(2) Control in any manner over the election of a majority of the directors, trustees, or general partners (or individuals exercising similar functions) of the company; or (3) The power to exercise, directly or indirectly, a controlling influence over the management or policies

of the company. (h) Customer means a consumer who has a customer relationship with you. (i)(1) Customer relationship means a continuing relationship between a consumer and you under which you

provide one or more financial products or services to the consumer that are to be used primarily for personal, family, or household purposes. (2) Examples -- (i) Continuing relationship. A consumer has a continuing relationship with you if the consumer: (A) Has a credit or investment account with you; (B) Obtains a loan from you; (C) Purchases an insurance product from you; (D) Holds an investment product through you, such as when you act as a custodian for securities or for assets in an Individual Retirement Arrangement; (E) Enters into an agreement or understanding with you whereby you undertake to arrange or broker a home mortgage loan, or credit to purchase a vehicle, for the consumer; (F) Enters into a lease of personal property on a non-operating basis with you;

(G) Obtains financial, investment, or economic advisory services from you for a fee; (H) Becomes your client for the purpose of obtaining tax preparation or credit counseling services from you; (1) Obtains career counseling while seeking employment with a financial institution or the finance, accounting, or audit department of any company (or while employed by such a financial institution or department of any company); (J) Is obligated on an account that you purchase from another financial institution, regardless of whether the account is in default when purchased, unless you do not locate the consumer or attempt to collect any amount from the consumer on the account; (K) Obtains real estate settlement services from you; or

(L) Has a loan for which you own the servicing rights. (ii) No continuing relationship. A consumer does not, however, have a continuing relationship with you if: (A) The consumer obtains a financial product or service from you only in isolated transactions, such as using your ATM to withdraw cash from an account at another financial institution;

purchasing a money order from you; cashing a check with you; or making a wire transfer through you; (B) You sell the consumer’s loan and do not retain the rights to service that loan;

58

(C) You sell the consumer airline tickets, travel insurance, or traveler’s checks in isolated transactions;

(D) The consumer obtains one-time personal or real property appraisal services from you; or (E) The consumer purchases checks for a personal checking account from you.

(j) Federal functional regulator means: (1) The Board of Governors of the Federal Reserve System; (2) The Office of the Comptroller of the Currency;

(3) The Board of Directors of the Federal Deposit Insurance Corporation; (4) The Director of the Office of Thrift Supervision; (5) The National Credit Union Administration Board; and (6) The Securities and Exchange Commission. (k)(1) Financial institution means any institution the business of which is engaging in financial activities as described in section 4(k) of the Bank Holding Company Act of 1956 (12 U.S.C. 1843(k)). An institution that is significantly engaged in financial activities is a financial institution.

(2) Examples of financial institution. (i) A retailer that extends credit by issuing its own credit card directly to consumers is a financial institution because extending credit is a financial activity listed in 12 CFR 225.28(b)(1) and referenced in section 4(k)(4)(F) of the Bank Holding Company Act and issuing that extension of credit through a proprietary credit card demonstrates that a retailer is significantly engaged in extending credit. (ii) A personal property or real estate appraiser is a financial institution because real and personal property appraisal is a financial activity listed in 12 CFR 225.28(b)(2)(i) and referenced in section 4(k)(4)(F) of the Bank Holding Company Act. (iii) An automobile dealership that, as a usual part of its business, leases automobiles on a

nonoperating basis for longer than 90 days is a financial institution with respect to its leasing business because leasing personal property on a nonoperating basis where the initial term of the lease is at least 90 days is a financial activity listed in 12 CFR 225.28(b)(3) and referenced in section 4(k)(4)(F) of the Bank Holding Company Act. (iv) A career counselor that specializes in providing career counseling services to individuals currently employed by or recently displaced from a financial organization, individuals who are

seeking employment with a financial organization, or individuals who are currently employed by or seeking placement with the finance, accounting or audit departments of any company is a financial institution because such career counseling activities are financial activities listed in 12 CFR 225.28(b)(9)(iii) and referenced in section 4(k)(4)(F) of the Bank Holding Company Act. (v) A business that prints and sells checks for consumers, either as its sole business or as one of its product lines, is a financial institution because printing and selling checks is a financial activity that is listed in 12 CFR 225.28(b)(10)(ii) and referenced in section 4(k)(4)(F) of the Bank Holding Company Act. (vi) A business that regularly wires money to and from consumers is a financial institution because transferring money is a financial activity referenced in section 4(k)(4)(A) of the Bank Holding Company Act and regularly providing that service demonstrates that the business is significantly engaged in that activity. (vii) A check cashing business is a financial institution because cashing a check is exchanging money, which is a financial activity listed in section 4(k)(4)(A) of the Bank Holding Company Act. (viii) An accountant or other tax preparation service that is in the business of completing income tax returns is a financial institution because tax preparation services is a financial activity listed in 12 CFR 225.28(b)(6)(vi) and referenced in section 4(k)(4)(G) of the Bank Holding Company Act. (ix) A business that operates a travel agency in connection with financial services is a financial institution because operating a travel agency in connection with financial services is a financial activity listed in 12 CFR 211.5(d)(15) and referenced in section 4(k)(4)(G) of the Bank Holding Company Act.

(x) An entity that provides real estate settlement services is a financial institution because providing real estate settlement services is a financial activity listed in 12 CFR 225.28(b)(2)(viii) and referenced in section 4(k)(4)(F) of the Bank Holding Company Act. (xi) A mortgage broker is a financial institution because brokering loans is a financial activity listed in 12 CFR 225.28(b)(1) and referenced in section 4(k)(4)(F) of the Bank Holding Company Act.

59

(xii) An investment advisory company and a credit counseling service are each financial institutions because providing financial and investment advisory services are financial activities referenced in section 4(k)(4)(C) of the Bank Holding Company Act. (3) Financial institution does not include:

(i) Any person or entity with respect to any financial activity that is subject to the jurisdiction of the Commodity Futures Trading Commission under the Commodity Exchange Act (7 U.S.C. 1 et seq.); (ii) The Federal Agricultural Mortgage Corporation or any entity chartered and operating under the Farm Credit Act of 1971 (12 U.S.C. 2001 et seq.); or (iii) Institutions chartered by Congress specifically to engage in securitizations, secondary market sales (including sales of servicing rights) or similar transactions related to a transaction of a

consumer, as long as such institutions do not sell or transfer nonpublic personal information to a nonaffiliated third party other than as permitted by §§ 313.14 and 313.15 of this part. (iv) Entities that engage in financial activities but that are not significantly engaged in those financial activities. (4) Examples of entities that are not significantly engaged in financial activities. (i) A retailer is not a financial institution if its only means of extending credit are occasional “lay away” and deferred payment plans or accepting payment by means of credit cards issued by others.

(ii) A retailer is not a financial institution merely because it accepts payment in the form of cash, checks, or credit cards that it did not issue. (iii) A merchant is not a financial institution merely because it allows an individual to “run a tab.” (iv) A grocery store is not a financial institution merely because it allows individuals to whom it sells groceries to cash a check, or write a check for a higher amount than the grocery purchase and obtain cash in return. (1)(1) Financial product or service means any product or service that a financial holding company could offer by engaging in a financial activity under section 4(k) of the Bank Holding Company Act of 1956 (12 U.S.C.

1843(k)). (2) Financial service includes your evaluation or brokerage of information that you collect in connection with a request or an application from a consumer for a financial product or service. (m)(1) Nonaffiliated third party means any person except: (i) Your affiliate; or (ii) A person employed jointly by you and any company that is not your affiliate (but nonaffiliated

third party includes the other company that jointly employs the person). (2) Nonaffiliated third party includes any company that is an affiliate by virtue of your or your affiliate’s direct or indirect ownership or control of the company in conducting merchant banking or investment banking activities of the type described in section 4(k)(4)(H) or insurance company investment activities of the type described in section 4(k)(4)(1) of the Bank Holding Company Act (12 U.S.C. 1843(k)(4)(H) and (I)). (n)(1) Nonpublic personal information means: (i) Personally identifiable financial information; and (ii) Any list, description, or other grouping of consumers (and publicly available information pertaining to them) that is derived using any personally identifiable financial information that is not publicly available.

(2) Nonpublic personal information does not include: (i) Publicly available information, except as included on a list described in paragraph (n)(1)(ii) of this section; or (ii) Any list, description, or other grouping of consumers (and publicly available information pertaining to them) that is derived without using any personally identifiable financial information that is not publicly available.

(3) Examples of lists -- (1) Nonpublic personal information includes any list of individuals’ names and street addresses that is derived in whole or in part using personally identifiable financial information (that is not publicly available), such as account numbers.

(ii) Nonpublic personal information does not include any list of individuals’ names and addresses that contains

only

publicly

available

information,

is not derived,

in whole

or in part,

using

personally identifiable financial information that is not publicly available, and is not disclosed in a manner that indicates that any of the individuals on the list is a consumer of a financial institution. (0)(1) Personally identifiable financial information means any information:

60

(i) A consumer provides to you to obtain a financial product or service from you; (ii) About a consumer resulting from any transaction involving a financial product or service between you and a consumer; or (iii) You otherwise obtain about a consumer in connection with providing a financial product or

service to that consumer. (2) Examples -- (i) Information included. Personally identifiable financial information includes: (A) Information a consumer provides to you on an application to obtain a loan, credit card, or

other financial product or service; (B) Account balance information, payment history, overdraft history, and credit or debit card purchase information; (C) The fact that an individual is or has been one of your customers or has obtained a financial product or service from you;

(D) Any information about your consumer if it is disclosed in a manner that indicates that the individual is or has been your consumer; (E) Any information that a consumer provides to you or that you or your agent otherwise obtain in connection with collecting on, or servicing, a credit account; (F) Any information you collect through an Internet “cookie” (an information collecting device from a web server); and (G) Information from a consumer report. (ii) Information not included. Personally identifiable financial information does not include: (A) A list of names and addresses of customers of an entity that is not a financial institution; and (B) Information that does not identify a consumer, such as aggregate information or blind data that does not contain persona! identifiers such as account numbers, names, or addresses. (p)(1) Publicly available information means any information that you have a reasonable basis to believe is lawfully made available to the general public from: (i) Federal, State, or local government records; (ii) Widely distributed media; or (iii) Disclosures to the general public that are required to be made by Federal, State, or local law. (2) Reasonable basis. You have a reasonable basis to believe that information is lawfully made available to the general public if you have taken steps to determine: (i) That the information is of the type that is available to the general public; and

(ii) Whether an individual can direct that the information not be made available to the general public and, if so, that your consumer has not done so. (3) Examples -- (i) Government records. Publicly available information in government records includes information in government real estate records and security interest filings. (ii) Widely distributed media. Publicly available information from widely distributed media includes information from a telephone book, a television or radio program, a newspaper, or a web site that is available to the general public on an unrestricted basis. A web site is not restricted merely because an Internet service provider or a site operator requires a fee or a password, so long as access is available to the general public. (iii) Reasonable basis -- (A) You have a reasonable basis to believe that mortgage information is lawfully made available to the general public if you have determined that the information is of the type included on the public record in the jurisdiction where the mortgage would be recorded. (B) You have a reasonable basis to believe that an individual’s telephone number is lawfully made available to the general public if you have located the telephone number in the telephone book or the consumer has informed you that the telephone number is not unlisted.

(q) You includes each “financial institution” (but excludes any “other person”) over which the Commission has enforcement jurisdiction pursuant to section 505(a)(7) of the Gramm-Leach-Bliley Act. 16 C.F.R. § 313.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out notices, including short-form initial

notices, that this part requires so that each consumer can reasonably be expected to receive actual notice in writing or, if the consumer agrees, electronically. (b)(1) Examples of reasonable expectation of actual notice. You may reasonably expect that a consumer will receive

actual notice if you:

61

(i) Hand-deliver a printed copy of the notice to the consumer; (ii) Mail a printed copy of the notice to the last known address of the consumer; (iii) For the consumer who conducts transactions electronically, clearly and conspicuously post the notice on the electronic site and require the consumer to acknowledge receipt of the notice as a necessary step to

obtaining a particular financial product or service; (iv) For an isolated transaction with the consumer, such as an ATM transaction, post the notice on the ATM screen and require the consumer to acknowledge receipt of the notice as a necessary step to

obtaining the particular financial product or service. (2) Examples of unreasonable expectation of actual notice. You may not, however, reasonably expect that a consumer will receive actual notice of your privacy policies and practices if you:

(i) Only post a sign in your branch or office or generally publish advertisements of your privacy policies and practices;

(ii) Send the notice via electronic mail to a consumer who does not obtain a financial product or service from you electronically. (c) Annual notices only. You may reasonably expect that a customer will receive actual notice of your annual privacy notice if: (1) The customer uses your web site to access financial products and services electronically and agrees to receive notices at the web site and you post your current privacy notice continuously in a clear and conspicuous manner on the web site; or

(2) The customer has requested that you refrain from sending any information regarding the customer relationship, and your current privacy notice remains available to the customer upon request. (d) Oral description of notice insufficient. You may not provide any notice required by this part solely by orally explaining the notice, either in person or over the telephone.

(e) Retention or accessibility of notices for customers -- (1) For customers only, you must provide the initial notice required by § 313.4(a)(1), the annual notice required by § 313.5(a), and the revised notice required by § 313.8 so

that the customer can retain them or obtain them later in writing or, if the customer agrees, electronically. (2) Examples of retention or accessibility. You provide a privacy notice to the customer so that the customer can retain it or obtain it later if you:

(i) Hand-deliver a printed copy of the notice to the customer; (ii) Mail a printed copy of the notice to the last known address of the customer; or (iii) Make your current privacy notice available on a web site (or a link to another web site) for the customer who obtains a financial product or service electronically and agrees to receive the notice at the web site. (f) Joint notice with other financial institutions. You may provide a joint notice from you and one or more of your affiliates or other financial institutions, as identified in the notice, as long as the notice is accurate with respect to you and the other institutions. (g) Joint relationships. If two or more consumers jointly obtain a financial product or service from you, you may satisfy the initial, annual, and revised notice requirements of §§ 313.4(a), 313.5(a), and 313.8(a) by providing one notice to those consumers jointly, unless one or more of those consumers requests separate notices. 16 C.F.R. § 313.10 Limits on disclosure of non-public personal information to nonaffiliated third parties. (a)(1) Conditions for disclosure. Except as otherwise authorized in this part, you may not, directly or through any affiliate, disclose any nonpublic personal information about a consumer to a nonaffiliated third party unless: (i) You have provided to the consumer an initial notice as required under § 313.4; (ii) You have provided to the consumer an opt out notice as required in § 313.7; (ili) You have given the consumer a reasonable opportunity, before you disclose the information to the nonaffiliated third party, to opt out of the disclosure; and (iv) The consumer does not opt out.

(2) Opt out definition. Opt out means a direction by the consumer that you not disclose nonpublic personal information about that consumer to a nonaffiliated third party, other than as permitted by §§ 313.13, 313.14,

and 313.15. (3) Examples of reasonable opportunity to opt out. You provide a consumer with a reasonable opportunity to

opt out if: (i) By mail. You mail the notices required in paragraph (a)(1) of this section to the consumer and allow

the consumer to opt out by mailing a form, calling a toll-free telephone number, or any other reasonable means within 30 days from the date you mailed the notices.

62

(ii) By electronic means. A customer opens an on-line account with you and agrees to receive the notices required in paragraph (a)(1) of this section electronically, and you allow the customer to opt out by any reasonable means within 30 days after the date that the customer acknowledges receipt of the notices in conjunction with opening the account.

(iii) Isolated transaction with consumer. For an isolated transaction, such as the purchase of a money order by a consumer, you provide the consumer with a reasonable opportunity to opt out if you provide the notices required in paragraph (a)(1) of this section at the time of the transaction and request that the consumer decide, as a necessary part of the transaction, whether to opt out before completing the transaction. (b) Application of opt out to all consumers and all nonpublic personal information -- (1) You must comply with this

section, regardless of whether you and the consumer have established a customer relationship. (2) Unless you comply with this section, you may not, directly or through any affiliate, disclose any nonpublic personal information about a consumer that you have collected, regardless of whether you collected it before or after receiving the direction to opt out from the consumer. (c) Partial opt out. You may allow a consumer to select certain nonpublic personal information or certain nonaffiliated third parties with respect to which the consumer wishes to opt out. 16 C.F.R. § 313.11 Limits on redisclosure and reuse of information.

(a)(1) Information

you receive

under an exception.

If you

receive

nonpublic

personal

information

from

a

nonaffiliated financial institution under an exception in § 313.14 or 313.15 of this part, your disclosure and use of

that information is limited as follows: (i) You may disclose the information to the affiliates of the financial institution from which you received the information; (ii) You may disclose the information to your affiliates, but your affiliates may, in turn, disclose and use the information only to the extent that you may disclose and use the information; and (iii) You may disclose and use the information pursuant to an exception in § 313.14 or 313.15 in the ordinary course of business to carry out the activity covered by the exception under which you received the information.

(2) Example. If you receive a customer list from a nonaffiliated financial institution in order to provide account processing services under the exception in § 313.14(a), you may disclose that information under any exception

in § 313.14 or 313.15 in the ordinary course of business in order to provide those services. You could also disclose that information in response to a properly authorized subpoena. You could not disclose that information to a third party for marketing purposes or use that information for your own marketing purposes. (b)(1) Information you receive outside of an exception. If you receive nonpublic personal information from a

nonaffiliated financial institution other than under an exception in § 313.14 or 313.15 of this part, you may disclose the information only: (i) To the affiliates of the financial institution from which you received the information; (ii) To your affiliates, but your affiliates may, in turn, disclose the information only to the extent that you can disclose the information; and (iii) To any other person, if the disclosure would be lawful if made directly to that person by the financial institution from which you received the information. (2) Example. If you obtain a customer list from a nonaffiliated financial institution outside of the exceptions in

§ 313.14 and 313.15: (i) You may use that list for your own purposes; and (ii) You may disclose that list to another nonaffiliated third party only if the financial institution from which you purchased the list could have lawfully disclosed the list to that third party. That is, you may disclose the list in accordance with the privacy policy of the financial institution from which you received

the list, as limited by the opt out direction of each consumer whose nonpublic personal information you intend to disclose, and you may disclose the list in accordance with an exception in § 313.14 or 313.15,

such as to your attorneys or accountants. (c) Information you disclose under an exception. If you disclose nonpublic personal information to a nonaffiliated third party under an exception in § 313.14 or 313.15 of this part, the third party may disclose and use that information only as follows:

(1) The third party may disclose the information to your affiliates; (2) The third party may disclose the information to its affiliates, but its affiliates may, in turn, disclose and use the information only to the extent that the third party may disclose and use the information; and

63

(3) The third party may disclose and use the information pursuant to an exception in § 313.14 or 313.15 in the (d)

ordinary course of business to carry out the activity covered by the exception under which it received the information. Information you disclose outside of an exception. If you disclose nonpublic personal information to a

nonaffiliated third party other than under an exception in § 313.14 or 313.15 of this part, the third party may disclose the information only: (1) To your affiliates; (2) To its affiliates, but its affiliates, in turn, may disclose the information only to the extent the third party can disclose the information; and (3) To any other person, if the disclosure would be lawful if you made it directly to that person. 16 C.F.R. § 313.16 Protection of Fair Credit Reporting Act.

Nothing in this part shall be construed to modify, limit, or supersede the operation of the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.), and no inference shall be drawn on the basis of the provisions of this part regarding whether information is transaction or experience information under section 603 of that Act. 16 C.F.R. § 314.1 Purpose and scope.

(a) Purpose. This part, which implements sections 501 and 505(b)(2) of the Gramm-Leach-Bliley Act, sets forth standards for developing, implementing, and maintaining reasonable administrative, technical, and physical safeguards to protect the security, confidentiality, and integrity of customer information. (b) Scope. This part applies to the handling of customer information by all financial institutions over which the Federal Trade Commission (“FTC” or “Commission”) has jurisdiction. This part refers to such entities as “you.”

This part applies to all customer information in your possession, regardless of whether such information pertains to individuals with whom you have a customer relationship, or pertains to the customers of other financial institutions that have provided such information to you. 16 C.F.R. § 314.2 Definitions.

(a) In general. Except as modified by this part or unless the context otherwise requires, the terms used in this part have the same meaning as set forth in the Commission’s rule governing the Privacy of Consumer Financial Information, 16 CFR part 313. (b) Customer information means any record containing nonpublic personal information as defined in 16 CFR 313.3(n), about a customer of a financial institution, whether in paper, electronic, or other form, that is handled or

maintained by or on behalf of you or your affiliates. (c) Information security program means the administrative, technical, or physical safeguards collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle customer (d) Service provider means any person or entity that receives, maintains, processes, or otherwise to customer information through its provision of services directly to a financial institution that is 16 C.F.R. § 314.3 Standards for safeguarding (a) Information security program. You shall security program that is written in one or more physical safeguards that are appropriate to your

you use to access, information. is permitted access subject to this part.

customer information. develop, implement, and maintain a comprehensive information readily accessible parts and contains administrative, technical, and size and complexity, the nature and scope of your activities, and the

sensitivity of any customer information at issue. Such safeguards shall include the elements set forth in § 314.4 and shall be reasonably designed to achieve the objectives of this part, as set forth in paragraph (b) of this section. (b) Objectives. The objectives of section 501(b) of the Act, and of this part, are to: (1) Insure the security and confidentiality of customer information; (2) Protect against any anticipated threats or hazards to the security or integrity of such information; and

(3) Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer. 16 C.F.R. § 314.4 Elements. In order to develop, implement, and maintain your information security program, you shall:

(a) Designate an employee or employees to coordinate your information security program. (b) Identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of

customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks. At

64

a minimum, such a risk assessment should include consideration of risks in each relevant area of your operations, including: (1) Employee training and management; (2) Information systems, including network and software design, as well as information processing, storage, transmission and disposal; and

(3) Detecting, preventing and responding to attacks, intrusions, or other systems failures. (c) Design and implement information safeguards to control the risks you identify through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures. (d) Oversee service providers, by:

(1) Taking reasonable steps to select and retain service providers that are capable of maintaining appropriate safeguards for the customer information at issue; and (2) Requiring your service providers by contract to implement and maintain such safeguards. (e) Evaluate and adjust your information security program in light of the results of the testing and monitoring required by paragraph (c) of this section; any material changes to your operations or business arrangements; or

any other circumstances that you know

or have reason to know

may have a material impact on your

information security program. 16 C.F.R. § 314.5 Effective date. (a) Each financial institution subject to the Commission’s jurisdiction must implement an information security program pursuant to this part no later than May 23, 2003. (b) Two-year grandfathering of service contracts. Until May 24, 2004, a contract you have entered into with a nonaffiliated third party to perform services for you or functions on your behalf satisfies the provisions of § 314.4(d), even if the contract does not include a requirement that the service provider maintain appropriate safeguards, as long as you entered into the contract not later than June 24, 2002.

C.

The European Union Data Protection Directive

The U.S. is not the only jurisdiction with concern about privacy protection. European Union also protects its citizens’ privacy, as do its member nations.

The

Occasionally, a private citizen can find herself the subject of a wide-ranging debate about issues of public

concern, even without ever meaning to do so. Consider here the “Swedish Church Lady Case”:

In re Bodil Lindqvist

personal data and on the free movement of such data (OJ 1995 L 281, p. 31).

Case C-101/01

2. Those questions were raised in criminal proceedings before that court against Mrs Lindqvist, who was charged with breach of the Swedish legislation on the protection of personal data for publishing on her internet site personal data on a number of people working with her on a voluntary basis in a parish of the Swedish Protestant Church.

EUROPEAN COURT OF JUSTICE 6 November 2003 Judgment 1, By order of 23 February 2001, received at the Court on | March 2001, the Géta hovratt (Géta

Court

of

preliminary

Appeal) ruling

referred under

to

the

Article

Court 234

EC

for

Legal background

a

Community legislation

seven

questions concerning inter alia the interpretation of Directive 95/46/EC of the European Parliament and

3. Directive 95/46 is intended, according to the terms of Article 1(1), to protect the fundamental

of the Council of 24 October 1995 on the protection

rights

of individuals

particular their right to privacy, with respect to the

with

regard

to the

processing

of

and

freedoms

of

processing of personal data.

65

natural

persons,

and

in

subject or of another person where Article 3 of Directive 95/46 provides, 4. regarding the scope of the directive: I. This Directive shall apply to the

the data subject is physically or legally incapable of giving his

processing of personal data wholly or partly

part of a

(d) processing is carried out in the course of its legitimate activities with appropriate guarantees by a foundation, association or any other non-profit-seeking body with a

This Directive shall not apply to the

political, philosophical, religious or trade-union aim and on condition

processing of personal data: - in the course of an activity which

that the processing relates solely to the members of the body or to

consent; or

by automatic means, and to the processing otherwise than by automatic means of

personal data which form part of a filing system or are intended to form filing system.

2.

persons who have regular contact

falls outside the scope of Community law, such as_ those provided for by Titles V and VI of

with it in connection with its purposes and that the data are not disclosed to a third party without the consent of the data subjects; or (e) the processing relates to data which are manifestly made public by the data subject or is necessary for the establishment, exercise or

the Treaty on European Union and in any case to _ processing operations concerning _ public security, defence, State security (including the economic well-being of the State when the processing operation relates to State security matters) and the activities of the State in areas of criminal law,

3.

defence of legal claims. Paragraph 1 shall not apply where

processing of the data purposes of preventive diagnosis, the provision or the management of and where those data

- by a natural person in the course of a purely personal or household activity.

health professional

5.

Article 8 of Directive 95/46, entitled The processing of special categories of data, provides: 1, Member States shall prohibit the processing of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, _ trade-union membership, and the processing of data concerning health or sex life. 2. Paragraph 1 shall not apply where: (a) the data subject has given his explicit consent to the processing

is required for the medicine, medical of care or treatment health-care services, are processed by a

subject under

national

law or rules established by national competent bodies to the obligation of professional secrecy or by another person also subject to an equivalent obligation of

secrecy.

(b) processing is necessary for the purposes of carrying out the obligations and specific rights of

4. Subject to the provision of suitable safeguards, Member States may, for reasons of substantial public interest, lay down exemptions in addition to those laid down in paragraph 2 either by national law or by decision of the supervisory authority. 5. Processing of data relating to offences, criminal convictions or security measures may be carried out only under the control of official authority, or if suitable specific safeguards are provided under national law, subject to derogations which may be granted by the Member State under national provisions providing suitable

the controller in the field of employment law in so far as it is authorised by national law

specific safeguards. However, a complete register of criminal convictions may be kept only under the control of official authority.

providing for adequate safeguards;

Member States may provide that data relating to administrative sanctions or

of those

data, except

where

the

laws of the Member State provide that the prohibition referred to in paragraph 1 may not be lifted by the data subject's giving his consent; or

or (c)

processing

is

necessary

judgements

to

protect the vital interests of the data

66

in

civil

cases

shall

also

be

processed under the control of official authority. 6. Derogations from paragraph 1 provided for in paragraphs 4 and 5 shall be

of the proposed processing operation or operations, the country of origin and country of final destination, the rules of law, both general and sectoral, in force in the third

notified to the Commission.

country

7.

rules

Member

States shall determine the

conditions under which a national identification number or any other identifier of general application may be processed.

if they are necessary to reconcile the right to

Directive

95/46,

entitled

Exemptions and restrictions, provides that Member States may adopt measures restricting the scope of

some of the obligations imposed by the directive on the controller of the data, inter alia as regards information given to the persons concerned, where such a restriction is necessary to safeguard, for example, national security, defence, public security, an important economic or financial interest of a Member State or of the European Union, or the investigation and prosecution of criminal offences or

accordance with the procedure referred to in

Article 25 of Directive 95/46, which is part

of Chapter IV entitled Transfer of personal data to third countries, reads as follows: 1. The Member States shall provide that the transfer to a third country of personal data which are undergoing processing or are intended for processing after transfer may take place only if, without prejudice to compliance with the national provisions adopted pursuant to the other provisions of this Directive, the third country in question ensures an adequate level of protection.

2.

The

adequacy

of

the

level

necessary to comply

with the Commission's

decision. 9. At the time of the adoption of Directive 95/46, the Kingdom of Sweden made the following statement on the subject of Article 9, which was entered in the Council minutes (document No 4649/95 of the Council, of 2 February 1995):

The

Kingdom

of Sweden

considers

that

artistic and literary expression refers to the means of expression rather than to the contents of the communication or its quality.

of

protection afforded by a third country shall be assessed in the light of all the circumstances surrounding a data transfer operation

are

Article 31(2), that a third country ensures an adequate level of protection within the meaning of paragraph 2 of this Article, by reason of its domestic Jaw or of the international commitments it has entered into, particularly upon conclusion of the negotiations referred to in paragraph 5, for the protection of the private lives and basic freedoms and rights of individuals. Member States shall take the measures

of breaches of ethics for regulated professions. 8.

which

2.

privacy with the rules governing freedom of expression. of

the professional

4, Where the Commission _ finds, under the procedure provided for in Article 31(2), that a third country does not ensure an adequate level of protection within the meaning of paragraph 2 of this Article, Member States shall take the measures necessary to prevent any transfer of data of the same type to the third country in question. 5. At the appropriate time, the Commission shall enter into negotiations with a view to remedying the situation resulting from the finding made pursuant to paragraph 4. 6. The Commission may find, in

processing of personal data carried out solely for journalistic purposes or the purpose of artistic or literary expression only

13

and

measures

where they consider that a third country does not ensure an adequate level of protection within the meaning of paragraph

or derogations from the provisions of this Chapter, Chapter IV and Chapter V1 for the

Article

security

complied with in that country. 3. The Member States and the Commission shall inform each other of cases

6. Article 9 of Directive 95/46, entitled Processing of personal data and freedom of expression, provides: Member States shall provide for exemptions

7.

in question and

10. The European Convention for the Protection of Human Rights and Fundamental Freedoms signed at Rome on 4 November 1950 (the ECHR), provides, in Article 8, for a right to respect for private and

or set of data transfer operations;

particular consideration shall be given to the nature of the data, the purpose and duration

67

family life and, in Article

- transferred processed personal data to a

10, contains provisions

third country without (Paragraph 33 of the PUL).

concerning freedom of expression.

authorisation

The national legislation 11.

Directive

Swedish

law

95/46

by

was

the

implemented

Personuppgiftslag

16. Mrs Lindqvist accepted the facts but disputed that she was guilty of an offence. Mrs Lindqvist was fined by the Eksj6 tingsratt (District Court) (Sweden) and appealed against that sentence to the referring court.

in

(SFS

1998:204) (Swedish law on personal data, the PUL). The main proceedings and the questions referred

17. The amount of the fine was SEK 4 000, which was arrived at by multiplying the sum of SEK 100, representing Mrs Lindqvist's financial position, by a factor of 40, reflecting the severity of the offence. Mrs Lindqvist was also sentenced to pay SEK 300 to a Swedish fund to assist victims of crimes.

12. In addition to her job as a maintenance worker, Mrs Lindqvist worked as a catechist in the parish of Alseda (Sweden). She followed a data

processing course on which she had inter alia to set up a home page on the internet. At the end of 1998, Mrs Lindqvist set up internet pages at home on her personal computer in order to allow parishioners preparing for their confirmation to obtain information

18.

the Swedish Church's website set up a link between those pages and that site. 13. The pages in question contained information about Mrs Lindqvist and 18 colleagues in the parish, sometimes including their full names and in other

cases

only their first names.

Mrs

Lindqvist

As it had doubts as to the interpretation of

the Community law applicable in this area, inter alia Directive 95/46, the Géta hovratt decided to stay proceedings and refer the following questions to the Court for a preliminary ruling: (1) Is the mention of a person - by name or with name and telephone number - on an internet home page an action which falls within the scope of [Directive 95/46]? Does it constitute the processing of personal data

they might need. At her request, the administrator of

also

described, in a mildly humorous manner, the jobs held by her colleagues and their hobbies. In many cases family circumstances and telephone numbers and other matters were mentioned. She also stated

wholly or partly by automatic means to list on a self-made internet home page a number of persons with comments and statements

that one colleague had injured her foot and was on

about their jobs and hobbies etc.? (2) If the answer to the first question is no,

half-time on medical grounds.

can the act of setting up on an internet home 14,

Mrs

Lindqvist

had

not

informed

page separate pages for about 15 people with links between the pages which make it possible to search by first name be considered to constitute the processing otherwise than by automatic means of personal data which form part of a filing system or are intended to form part of a filing system within the meaning of Article

her

colleagues of the existence of those pages or obtained their consent, nor did she notify the Datainspektionen (supervisory authority for the protection of electronically transmitted data) of her activity. She removed the pages in question as soon as she became aware that they were not appreciated by some of her colleagues.

3(1)? If the answer to either of those questions is yes, the hovratt also asks the following questions: (3) Can the act of loading information of the

15. The public prosecutor brought a prosecution against Mrs Lindqvist charging her with breach of the PUL on the grounds that she had:

- processed personal data by automatic means without giving prior written notification

to

the

type described about work colleagues onto a private home page which is none the less accessible to anyone who knows its address

Datainspektionen

(Paragraph 36 of the PUL); - processed sensitive personal data (injured foot

and

half-time

on

medical

be regarded as outside the scope of [Directive 95/46] on the ground that it is

grounds)

covered by one of the exceptions in Article

without authorisation (Paragraph 13 of the PUL);

3(2)? (4) Is information on a home

page stating

that a named colleague has injured her foot

68

and is on half-time on medical grounds personal data concerning health which, according to Article 8(1), may not be processed? (5) [Directive 95/46] prohibits the transfer of personal data to third countries in certain cases. If a person in Sweden uses a

21. The Swedish Government submits that the term the processing of personal data wholly or partly by automatic means in Article 3(1) of Directive 95/46, covers all processing in computer format, in

computer to load personal data onto a home

other words, in binary format. Consequently, as soon

page stored on a server in Sweden - with the

as personal data are processed by computer, whether using a word processing programme or in order to put them on an internet page, they have been the subject of processing within the meaning of Directive 95/46.

an index and find that page using a search engine, might constitute such processing.

result that personal data become accessible to people constitute

in third countries - does that a transfer of data to a third

country within the meaning of the directive? Would the answer be the same even if, as far

22. The Netherlands Government submits that personal data are loaded onto an internet page using a computer and a server, which are essential elements of automation, so that it must be considered that such data are subject to automatic processing.

as known, no one from the third country had

in fact accessed the data or if the server in question was actually physically in a third country? : (6) Can the provisions of [Directive 95/46], in a case such as the above, be regarded as bringing about a restriction which conflicts

23. 95/46

The Commission submits that Directive applies to all processing of personal data

with the general principles of freedom of expression or other freedoms and rights,

referred to in Article 3 thereof, regardless of the technical means used. Accordingly, making personal

which are applicable within the EU and are enshrined in inter alia Article 10 of the European Convention on the Protection of Human Rights and Fundamental Freedoms?

data available on the internet constitutes processing wholly or partly by automatic means, provided that

Finally,

the

hovratt

asks

the

there are no technical limitations which restrict the processing to a purely manual operation. Thus, by its

following

very nature, an internet page falls within the scope of Directive 95/46.

question: (7) Can a Member State, as regards the issues raised in the above questions, provide

Reply of the Court

more extensive protection for personal data or give it a wider scope than the directive,

24.

The term personal data used in Article 3(1)

of Directive 95/46 covers, according to the definition

even if none of the circumstances described in Article 13 exists?

in Article 2(a) thereof, any information relating to an

identified or identifiable natural person. The term undoubtedly covers the name of a person in

The first question

conjunction with his telephone coordinates or information about his working conditions or hobbies.

19. By its first question, the referring court asks whether the act of referring, on an internet page, to

various persons and identifying them by name or by

25. According to the definition in Article 2(b) of Directive 95/46, the term processing of such data used in Article 3(1) covers any operation or set of operations which is performed upon personal data, whether or not by automatic means. That provision gives several examples of such operations, including disclosure by transmission, dissemination or otherwise making data available. It follows that the

other means, for instance by giving their telephone number or information regarding their working conditions and hobbies, constitutes the processing of personal data wholly or partly by automatic means within the meaning of Article 3(1) of Directive 95/46. Observations submitted to the Court

operation of loading personal data on an internet page must be considered to be such processing.

20. Mrs Lindqvist submits that it is unreasonable to take the view that the mere mention by name of a person or of personal data in a

26.

document contained on an internet page constitutes

It remains to be determined whether such

processing is wholly or partly by automatic means. In that connection, placing information on an internet page entails, under current technical and computer procedures, the operation of loading that page onto a

automatic processing of data. On the other hand, reference to such data in a keyword in the meta tags of an internet page, which makes it possible to create

69

server and the operations necessary to make that page

household activity within the meaning of the second

accessible to people who are connected to the internet. Such operations are performed, at least in part, automatically.

indent of Article 3(2) of Directive 95/46. However, that Government does not rule out that the exception provided for in the first indent of that paragraph might cover cases in which a natural person publishes personal data on an internet page solely in the exercise of his freedom of expression and without any connection with a professional or commercial activity.

27. therefore page, to name or

The answer to the first question must be that the act of referring, on an internet various persons and identifying them by by other means, for instance by giving their

telephone

number

working

or information

conditions

and

hobbies,

regarding constitutes

their 32.

the

the main proceedings does not fall within any of the exceptions in Article 3(2) of Directive 95/46. As regards the exception in the second indent of that paragraph in particular, it observes that the creator of an internet page brings the data placed on it to the knowledge of a generally indeterminate group of people.

of Directive 95/46. The second question 28.

As the first question has been answered in

the affirmative, there is no need to reply to the second question, which arises only in the event that the first question is answered in the negative.

33. The Commission submits that an internet page such as that at issue in the main proceedings cannot be considered to fall outside the scope of Directive 95/46 by virtue of Article 3(2) thereof, but constitutes, given the purpose of the internet page at

The third question

29. By its third question, the national court essentially seeks to know whether processing of

issue in the main proceedings, an artistic and literary creation within Directive.

personal data such as that described in the first question is covered by one of the exceptions in Article 3(2) of Directive 95/46.

out an economic activity and are thus not subject to Community law. If the Court were to hold otherwise, the question of the validity of Directive 95/46 would arise, as, in adopting it, the Community legislature would have exceeded the powers conferred on it by Article 100a of the EC Treaty (now, after amendment, Article 95 EC). The approximation of laws, which concerns the establishment and

35. The Commission argues that Community law is not limited to economic activities connected with the four fundamental freedoms. Referring to the legal basis of Directive 95/46, to its objective, to Article 6 EU, to the Charter of fundamental rights of the European Union proclaimed in Nice on 18 December 2000 (OJ 2000 C 364, p. 1), and to the

market, cannot serve as a

Council of Europe Convention of 28 January 1981 for the protection of individuals with regard to

on the internet. Swedish

Government

submits

Directive 95/46 was implemented

automatic processing that that directive is movement of personal an economic activity,

that,

in national

law, the Swedish legislature took the view that processing of personal data by a natural person which consisted in publishing those data to an indeterminate number of people, for example through the internet, could

not

be

9 of that

covered by Community law.

legal basis for Community measures regulating the tight of private individuals to freedom of expression

The

of Article

examples, in other words, to activities which essentially fall within what are generally called the second and third pillars. The other interpretation consists in excluding from the scope of Directive 95/46 the exercise of any activity which is not

expression to create internet pages in the course of a non-profit-making or leisure activity are not carrying

31.

meaning

the scope of that provision to the areas cited as

30. Mrs Lindqvist submits that private individuals who make use of their freedom of

when

the

34. It takes the view that the first indent of Article 3(2) of Directive 95/46 lends itself to two different interpretations. The first consists in limiting

Observations submitted to the Court

functioning of the common

According to the Netherlands Government,

automatic processing of data such as that at issue in

processing of personal data wholly or partly by automatic means within the meaning of Article 3(1)

described

as

a purely

personal

course

of the

integration

common market.

or

70

of personal data, it concludes intended to regulate the free data in the exercise not only of but also of social activity in the

and

functioning

of the

36. It adds that to exclude generally from the scope of Directive 95/46 internet pages which contain no element of commerce or of provision of services might entail serious problems of demarcation. A large number of internet pages containing personal data intended to disparage certain persons with a particular end in view might then be excluded from

42. Against that background, it would not be appropriate to interpret the expression activity which falls outside the scope of Community law as having a scope which would require it to be determined in

each individual case whether the specific activity at issue directly affected freedom of movement between Member States.

the scope of that directive. 43. The activities mentioned by way of example in the first indent of Article 3(2) of Directive 95/46 (in other words, the activities provided for by Titles V and VI of the Treaty on European Union and processing operations concerning public security, defence, State security and activities in areas of criminal law) are, in any event, activities of the State or of State authorities and unrelated to the fields of activity of individuals.

Reply of the Court 37. Article 3(2) of Directive 95/46 provides for two exceptions to its scope.

38.

The first exception concerns the processing

of personal data in the course of an activity which falls outside the scope of Community law, such as those provided for by Titles V and VI of the Treaty

on

European

Union,

and

in any case

44.

processing

It must

therefore

be considered

that the

activities mentioned by way of example in the first indent of Article 3(2) of Directive 95/46 are intended to define the scope of the exception provided for there, with the result that that exception applies only to the activities which are expressly listed there or which can be classified in the same category (ejusdem generis).

operations concerning public security, defence, State security (including the economic well-being of the State when the processing operation relates to State security matters) and the activities of the State in areas of criminal law. 39. As the activities of Mrs Lindqvist which are at issue in the main proceedings are essentially not economic but charitable and religious, it is necessary to consider whether they constitute the processing of personal data in the course of an activity which falls outside the scope of Community law within the meaning of the first indent of Article 3(2) of Directive 95/46.

45.

those

Charitable

carried

out

or

religious

by

Mrs

activities

Lindqvist

such

as

cannot

be

considered equivalent to the activities listed in the first indent of Article 3(2) of Directive 95/46 and are thus not covered by that exception. 46. As regards the exception provided for in the second indent of Article 3(2) of Directive 95/46, the 12th recital in the preamble to that directive, which

40. The Court has held, on the subject of Directive 95/46, which is based on Article 100a of the Treaty, that recourse to that legal basis does not

concerns

presuppose the existence of an actual link with free movement between Member States in every situation referred to by the measure founded on that basis (see Joined Cases C-465/00, C-138/01 and C-139/01 Osterreichischer Rundfunk and Others [2003] ECR I0000, paragraph 41, and the case-law cited therein).

processing of data carried out by a natural person in the exercise of activities which are exclusively personal or domestic, correspondence and the holding of records of addresses.

41. limits

unsure

and

uncertain,

which

would

exception,

cites,

as

examples

of the

47. That exception must therefore be interpreted as relating only to activities which are carried out in the course of private or family life of individuals, which is clearly not the case with the processing of personal data consisting in publication on the internet so that those data are made accessible to an indefinite

A contrary interpretation could make the of the field of application of the directive

particularly

that

be

contrary to its essential objective of approximating.

the laws, regulations and administrative provisions of the Member States in order to eliminate obstacles to

number of people.

the functioning of the internal market precisely from _ disparities between

48.

deriving national

The

answer

to

the

third

question

must

therefore be that processing of personal data such as

legislations (Osterreichischer Rundfunk and Others, cited above, paragraph 42).

that described in the reply to the first question is not covered by any of the exceptions in Article 3(2) of

Directive 95/46.

71

The fourth question

understood

to refer to the

transferring

personal

data

act of intentionally

from

the

territory

of a

49. By its fourth question, the referring court seeks to know whether reference to the fact that an individual has injured her foot and is on half-time on

distinction can be made between the different ways in which data are made accessible to third parties. It

medical grounds constitutes personal data concerning

concludes that loading personal data onto an internet

health within the meaning of Article 8(1) of Directive

page using a computer cannot be considered to be a

95/46.

transfer of personal data to a third country within the meaning of Article 25 of Directive 95/46.

50.

Member

State to a third country and, second, that no

In the light of the purpose of the directive,

the expression data concerning health used in Article

55. The United Kingdom Government submits that Article 25 of Directive 95/46 concerns the transfer of data to third countries and not their accessibility from third countries. The term transfer

8(1) thereof must be given a wide interpretation so as to include information concerning all aspects, both physical and mental, of the health of an individual.

connotes the transmission of personal data from one place and person to another place and person. It only in the event of such a transfer that Article 25 Directive 95/46 requires Member States to ensure adequate level of protection of personal data in third country.

51. The answer to the fourth question must therefore be that reference to the fact that an individual has injured her foot and is on half-time on medical grounds constitutes personal data concerning health within the meaning of Article 8(1) of Directive

is of an a

95/46. Reply of the Court The fifth question 52.

56. Directive 95/46 does not define the expression transfer to a third country in Article 25 or any other provision, including Article 2.

By its fifth question the referring court seeks

essentially to know whether there is any transfer [of data] to a third country within the meaning of Article 25 of Directive 95/46 where an individual in a Member State loads personal data onto an internet

57. In order to determine whether loading personal data onto an internet page constitutes a transfer of those data to a third country within the

page which is stored on an internet site on which the page

can

be

consulted

and

which

is hosted

meaning of Article 25 of Directive 95/46 merely because it makes them accessible to people in a third country, it is necessary to take account both of the technical nature of the operations thus carried out and

by a

natural or legal person (the hosting provider) who is established in that State or in another Member State, thereby making those data accessible to anyone who connects to the internet, including people in a third country. The referring court also asks whether the

of the purpose and structure of Chapter IV of that directive where Article 25 appears.

reply to that question would be the same if no one 58. Information on the internet can be by an indefinite number of people living places at almost any time. The ubiquitous that information is a result inter alia of the the technical means used in connection internet are relatively simple and becoming less expensive.

from the third country had in fact accessed the data or if the server where the page was stored was physically in a third country. Observations submitted to the Court

53. The Commission and the Swedish Government consider that the loading, using a computer, of personal data onto an internet page, so that they become accessible to nationals of third countries, constitutes a transfer of data to third countries within the meaning of Directive 95/46. The

59. Under the procedures for use of the internet available to individuals like Mrs Lindqvist during the

1990s, the author of a page intended for publication on the internet transmits the data making up that page

answer would be the same if no one from the third country had in fact accessed the data or if the server where it was stored was physically in a third country.

to his hosting provider.

the

view,

first,

that

that

term

must

That provider manages

the

computer infrastructure needed to store those data and connect the server hosting the site to the internet. That allows the subsequent transmission of those data to anyone who connects to the internet and seeks

54. The Netherlands Government points out that the term transfer is not defined by Directive 95/46. It takes

consulted in many nature of fact that with the less and

access to it. The computers

which

constitute that

infrastructure may be located, and indeed often are

be

72

located, in one or more countries other than that where the hosting provider is established, without its clients being aware or being in a position to be aware

protection the transfer of personal data to that country must be prohibited.

of it.

65. For its part, Article 25 of Directive 95/46 imposes a series of obligations on Member States and

60. obtain pages

It appears from the court file that, in order to the on

information appearing on the internet which Mrs Lindqvist had _ included

information

about her colleagues, an internet user

on the Commission for the purposes of monitoring transfers of personal data to third countries in the light of the level of protection afforded to such data in each of those countries.

would not only have to connect to the internet but also personally carry out the necessary actions to consult those pages. In other words, Mrs Lindqvist's internet pages did not contain the technical means to

66. In particular, Article 25(4) of Directive 95/46 provides that, where the Commission finds that a third country does not ensure an adequate level of protection, Member States are to take the measures necessary to prevent any transfer of personal data to

send that information automatically to people who did not intentionally seek access to those pages.

the third country in question. 6l. It follows that, in circumstances such as those in the case in the main proceedings, personal

67. Chapter IV of Directive 95/46 contains no provision concerning use of the internet. In particular, it does not lay down criteria for deciding whether operations carried out by hosting providers should be deemed to occur in the place of establishment of the service or at its business address or in the place where the computer or computers constituting the

data which appear on the computer of a person in a third country, coming from a person who has loaded them onto an internet site, were not directly

transferred between those two people but through the computer infrastructure of the hosting provider where the page is stored.

service's infrastructure are located. 62. It is in that light that it must be examined whether the Community legislature intended, for the purposes

Directive transfer

of

the

95/46, [of data]

application

of

Chapter

IV

68. Given, first, the state of development of the internet at the time Directive 95/46 was drawn up and, second, the absence, in Chapter IV, of criteria applicable to use of the internet, one cannot presume that the Community legislature intended the

of

to include within the expression to

a third

country

within

the

meaning of Article 25 of that directive activities such as those carried out by Mrs Lindqvist. It must be

expression transfer [of data] to a third country to

stressed that the fifth question asked by the referring court concerns only those activities and not those carried out by the hosting providers.

63.

Chapter

IV of Directive 95/46,

cover the loading, by an individual in Mrs Lindqvist's position, of data onto an internet page, even if those data are thereby made accessible to persons in third countries with the technical means to access them.

in which

Article 25 appears, sets up a special regime, with specific rules, intended to allow the Member States to monitor transfers of personal data to third countries. That Chapter sets up a complementary regime to the

69. If Article 25 of Directive 95/46 were interpreted to mean that there is transfer [of data] to a third country every time that personal data are loaded onto an internet page, that transfer would necessarily be a transfer to all the third countries where there are the technical means needed to access the internet. The special regime provided for by Chapter IV of the directive would thus necessarily become a regime of general application, as regards operations on the

general regime set up by Chapter II of that directive concerning the lawfulness of processing of personal data. 64. The objective of Chapter IV is defined in the 56th to 60th recitals in the preamble to Directive 95/46, which state inter alia that, although the

protection

of

individuals

guaranteed

in

internet. Thus, if the Commission

found, pursuant to

Article 25(4) of Directive 95/46, that even one third country did not ensure adequate protection, the Member States would be obliged to prevent any

the

Community by that Directive does not stand in the way of transfers of personal data to third countries which ensure an adequate level of protection, the

personal data being placed on the internet.

adequacy of such protection must be assessed in the

70.

light of all the circumstances surrounding the transfer operation or set of transfer operations. Where a third country does not ensure an adequate level of

Article 25 of Directive 95/46 is to be interpreted as meaning that operations such as those carried out by

Accordingly,

it must

be

concluded

that

Mrs Lindqvist do not as such constitute a transfer [of

73

data] to a third country. It is thus unnecessary to

75.

The

Swedish

Government

considers

that

investigate whether an individual from a_ third country has accessed the internet page concerned or whether the server of that hosting service is

Directive 95/46 allows the interests at stake to be weighed against each other and freedom of expression and protection of private life to be thereby

physically in a third country.

safeguarded. It adds that only the national court can

71.

The

reply

to

the

fifth

question

assess, in the light of the facts of each individual case, whether the restriction on the exercise of the right to freedom of expression entailed by the

must

therefore be that there is no transfer [of data] to a

third country within the meaning of Article 25 of

application of the rules on the protection of the rights

Directive 95/46 where an individual in a Member State loads personal data onto an internet page which is stored with his hosting provider which is

of others is proportionate. 76. The Netherlands Government points out that both freedom of expression and the right to respect

established in that State or in another Member State, thereby making those data accessible to anyone who

for private life are among the general principles of

connects to the internet, including people in a third

law for which the Court ensures respect and that the ECHR does not establish any hierarchy between the

country.

various fundamental rights. It therefore considers that the national court must endeavour to balance the various fundamental rights at issue by taking account

The sixth question

72.

By

its sixth

question

the referring court

of the circumstances of the individual case.

seeks to know whether the provisions of Directive 95/46, in a case such as that in the main proceedings, bring about a restriction which conflicts with the

77. The United Kingdom Government points out that its proposed reply to the fifth question, set

out in paragraph 55 of this judgment, is wholly in accordance with fundamental rights and avoids any

general principles of freedom of expression or other freedoms and rights, which are applicable within the European Union and are enshrined in inter alia

disproportionate restriction on freedom of expression.

It adds that it is difficult to justify an interpretation which would mean that the publication of personal

Article 10 of the ECHR.

data in a particular form, that is to say, on an internet

Observations submitted to the Court

page, is subject to far greater restrictions than those 73.

Citing inter alia Case C-274/99 P Connolly v

applicable to publication in other forms, such as on

paper.

Commission [2001] ECR I-1611, Mrs Lindqvist submits that Directive 95/46 and the PUL, in so far as they lay down requirements of prior consent and prior notification of a supervisory authority and a principle of prohibiting processing of personal data of a sensitive nature, are contrary to the general

78. The Commission also submits that Directive 95/46 does not entail any restriction contrary to the general principle of freedom of expression or other tights and freedoms applicable in the European Union corresponding inter alia to the right provided

principle of freedom of expression enshrined in Community law. More particularly, she argues that

for in Article 10 of the ECHR.

the definition of processing of personal data wholly or partly by automatic means does not fulfil the criteria of predictability and accuracy.

Reply of the Court 79. According to the seventh recital in the preamble to Directive 95/46, the establishment and functioning of the common market are liable to be seriously affected by differences in national rules applicable to the processing of personal data.

74. She argues further that merely mentioning a natural person by name, revealing their telephone details and working conditions and_ giving information about their state of health and hobbies,

information

which

is in the public domain,

well-

breach of the right to respect for private life. Mrs

According to the third recital of that directive the harmonisation of those national rules must seek to ensure not only the free flow of such data between

Lindqvist considers that, in any event, the constraints

Member

imposed by Directive 95/46 are disproportionate to the objective of protecting the reputation and private life of others.

fundamental rights of individuals. Those objectives may of course be inconsistent with one another.

known

or trivial, does

not constitute

a significant

80.

States

also

the

safeguarding

On the one hand, the economic

integration

74

but

resulting

from

the

of the

and social

establishment

and

functioning of the internal market will necessarily

life of the individuals about whom Mrs Lindqvist has placed data on her internet site.

lead to a substantial increase in cross-border flows of personal data between all those involved in a private or public capacity in economic and social activity in

the Member

States, whether

businesses

87.

or public

Consequently,

it is for the authorities and

courts of the Member States not only to interpret their national law in a manner consistent with Directive

authorities of the Member States. Those so involved will, to a certain extent, need to have access to personal data to perform their transactions or carry out their tasks within the area without internal

95/46 but also to make sure they do not rely on an interpretation of it which would be in conflict with the fundamental rights protected by the Community

legal order or with the other general principles of Community law, such as inter alia the principle of

frontiers which the internal market constitutes. 81. On the other hand, those affected by the processing of personal data understandably require those data to be effectively protected.

proportionality. 88.

Whilst it is true that the protection of private

life requires the application of effective sanctions 82. The mechanisms allowing those different rights and interests to be balanced are contained, first, in Directive 95/46 itself, in that it provides for rules which determine in what circumstances and to what

against people processing personal data in ways inconsistent with Directive 95/46, such sanctions must always respect the principle of proportionality. That is so a fortiori since the scope of Directive

extent the processing of personal data is lawful and

95/46 is very wide and the obligations of those who

what safeguards must be provided for. Second, they result from the adoption, by the Member States, of national provisions implementing that directive and their application by the national authorities.

process personal data are many and significant.

89.

all the circumstances of the case before it, in particular the duration of the breach of the rules

83. As regards Directive 95/46 itself, its provisions are necessarily relatively general since it has to be applied to a large number of very different situations. Contrary to Mrs Lindqvist's contentions,

the directive quite properly

implementing Directive 95/46 and the importance, for the persons concerned, of the protection of the

data disclosed.

includes rules with a 90.

degree of flexibility and, in many instances, leaves to the Member States the task of deciding the details or choosing between options.

not,

Directive 95/46. However, there is nothing to suggest

the

sixth

question

must

in themselves,

bring

about

a restriction

which

applying the national legislation implementing Directive 95/46 to ensure a fair balance between the rights and interests in question, including the fundamental rights protected by the Community legal order. The seventh question 91,

interests involved.

By its seventh question, the referring court

essentially seeks to know whether it is permissible for the Member States to provide for greater protection for personal data or a wider scope than are required under Directive 95/46.

86. In that context, fundamental rights have a particular importance, as demonstrated by the case in

in essence,

to

for the national authorities and courts responsible for

85. Thus, it is, rather, at the stage of the application at national level of the legislation implementing Directive 95/46 in individual cases that a balance must be found between the rights and

in which,

answer

conflicts with the general principles of freedom of expression or other freedoms and rights, which are applicable within the European Union and are enshrined inter alia in Article 10 of the ECHR. It is

that the regime it provides for lacks predictability or that its provisions are, as such, contrary to the general principles of Community law and, in particular, to the fundamental rights protected by the Community legal order.

proceedings,

The

therefore be that the provisions of Directive 95/46 do

84. It is true that, in many respects, the Member States have a margin for manoeuvre in implementing

the main

It is for the referring court to take account,

in accordance with the principle of proportionality, of

Mrs

Lindqvist's freedom of expression in her work preparing people for Communion and her freedom to carry out activities contributing to religious life have

Observations submitted to the Court 92. The Swedish Government states that Directive 95/46 is not confined to fixing minimum

to be weighed against the protection of the private

75

conditions

for the

protection

of personal

data.

97.

Member States are obliged, in the course of implementing that directive, to attain the level of protection dictated by it and are not empowered to provide for greater or less protection. However, account must be taken of the discretion which the Member States have in implementing the directive to lay down in their domestic law the general conditions for the lawfulness of the processing of personal data. 93. The Netherlands Directive 95/46 does not from providing for greater It is clear, for example,

11(1), subparagraph

provided for by Directive 95/46 and in accordance with its objective of maintaining a balance between

the free movement of protection of private life.

Government submits that preclude Member States protection in certain areas. from Article 10, Article

(a) of the first paragraph

It is true that Directive 95/46 allows the

Member States a margin for manoeuvre in certain areas and authorises them to maintain or introduce particular rules for specific situations as a large number of its provisions demonstrate. However, such possibilities must be made use of in the manner

personal

data

and

the

98. On the other hand, nothing prevents a Member State from extending the scope of the national legislation implementing the provisions of Directive 95/46 to areas not included within the

of

scope thereof, provided that no other provision of

Article 14, Article 17(3), Article 18(5) and Article 19(1) of that directive that the Member States may

Community law precludes it.

make provision for wider protection. Moreover, the Member States are free to apply the principles of Directive 95/46 also to activities which do not fall within its scope.

99. In the light of those considerations, the answer to the seventh question must be that measures taken by the Member States to ensure the protection of personal data must be consistent both with the

94. The Commission submits that Directive 95/46 is based on Article 100a of the Treaty and that,

provisions of Directive 95/46 and with its objective of maintaining a balance between freedom of movement of personal data and the protection of

if a Member State wishes to maintain or introduce legislation which derogates from such a harmonising directive, it is obliged to notify the Commission pursuant to Article 95(4) or 95(5) EC. The

private

life. However,

nothing

prevents

a Member

State from extending the scope of the national legislation implementing the provisions of Directive

Commission therefore submits that a Member State

95/46 to areas not included in the scope thereof provided that no other provision of Community law precludes it.

cannot make provision for more extensive protection for personal data or a wider scope than are required

under the directive. Costs

Reply of the Court 95.

100. The costs incurred by the Swedish, Netherlands and United Kingdom Governments and

Directive 95/46 is intended, as appears from

the eighth recital in the preamble thereto, to ensure

by

that the level of protection of the rights and freedoms of individuals with regard to the processing of personal data is equivalent in all Member States. The

Authority, which have submitted observations to the

tenth

the action pending

recital

adds

that the

approximation

Commission

and

the

EFTA

Surveillance

Court, are not recoverable. Since these proceedings are, for the parties to the main proceedings, a step in

of the

national laws applicable in this area must not result in any lessening of the protection they afford but must, on the contrary, seek to ensure a high level of protection in the Community.

before the national

court, the

decision on costs is a matter for that court. On those grounds,

THE COURT,

96. The harmonisation of those national laws is therefore not limited to minimal harmonisation but amounts to harmonisation which is generally complete. It is upon that view that Directive 95/46 is intended to ensure free movement

the

in answer to the questions referred to it by the Géta hovratt by order of 23 February 2001, hereby rules:

of personal data

1. The act of referring, on an internet page, to various persons and identifying them by name or by other means, for instance by giving their telephone number or information regarding their working conditions and hobbies, constitutes the processing of personal data wholly

while guaranteeing a high level of protection for the rights and interests of the individuals to whom such data relate.

76

or partly by automatic means within the meaning of Article 3(1) of Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. 2. Such processing of personal data is not covered by any of the exceptions in Article 3(2) of Directive 95/46. 3. Reference to the fact that an individual has injured her foot and is on half-time on medical grounds constitutes personal data concerning health within the meaning of Article 8(1) of Directive 95/46. 4, There is no transfer [of data] to a third country within the meaning of Article 25 of Directive 95/46 where an individual in a Member State loads personal data onto an internet page which is stored on an internet site on which the page can be consulted and which is hosted by a natural or legal person who is established in that State or in another Member State, thereby making those data accessible to anyone who connects to the internet, including people in a third country. 5. The provisions of Directive 95/46 do not, in themselves, bring about a restriction which conflicts with the general principles of freedom of expression or other freedoms and rights, which are applicable within the European Union and are enshrined inter alia in Article 10 of

the European Convention for the Protection of Human Rights and Fundamental Freedoms signed at Rome on 4 November 1950. It is for the national authorities and courts responsible for applying the national legislation implementing Directive 95/46

to ensure a fair balance between the rights and interests in question, including the fundamental rights protected by the Community legal order. 6. Measures taken by the Member States to ensure the protection of personal data must be consistent both with the provisions of Directive 95/46 and with its objective of maintaining a balance between freedom of movement of personal data and the protection of private life. However, nothing prevents a Member State from extending the scope of the national legislation implementing the provisions of Directive 95/46 to areas not included in the scope thereof provided that no other provision of Community law precludes it. Jann Timmermans Gulmann

Cunha Rodrigues Rosas Edward Puissochet Macken von Bahr

Delivered in open court in Luxembourg on 6 November 2003. R. Grass Registrar

V. Skouris President

V.

Intellectual Property

Intellectual property is the name we give to the various intangible rights we have to control the reproduction of our creative works. Copyright is perhaps the oldest of those rights. April, One thousand seven hundred

The Statute of Anne (1710)

the

times

Granted

and

Limited

and ten, within by

this

Act,

as

Anno Octavo Anne Regine.

aforesaid, shall Print, Reprint, or Import, or cause to be Printed, Reprinted, or Imported any such Book or Books, without the Consent of the Proprietor or

An Act for the Encouragement of Learning, by Vesting the Copies of Printed Books in the Authors or Purchasers of such Copies, during the Times therein mentioned.

Proprietors thereof first had and obtained in Writing, Signed in the Presence of Two or more Credible Witnesses; or knowing the same to be so Printed or Reprinted, without the Consent of the Proprietors, shall Sell, Publish, or Expose to Sale, or cause to be Sold, Published, or Exposed to Sale, any such Book or Books, without such Consent first had and obtained, as aforesaid, Then such Offender or Offenders shall Forfeit such Book or Books, and all and every Sheet or Sheets, being part of such Book or Books, to the Proprietor or Proprietors of the Copy thereof, who shall forthwith Damask and make Waste-Paper of them: And further, That every such Offender or Offenders, shall Forfeit One Peny [sic]

Whereas Printers, Booksellers, and other Persons, have of late frequently taken the Liberty of Printing, Reprinting, and Publishing, or causing to be Printed, Reprinted, and Published Books, and other Writings, without the Consent of the Authors or Proprietors of

such

Books

and

Writings,

to

their

very

great

Detriment, and too often to the Ruin of them and their Families: For Preventing therefore such

Practices for the future, and for the Encouragement of Learned Men to Compose and Write useful Books; May it please Your Majesty, that it may be Enacted, and be it Enacted by the Queens most Excellent Majesty, by and with the Advice and Consent of the

for every sheet which shall be found in his, her, or their Custody, either Printed or Printing, Published or

Exposed

Lords Spiritual and Temporal, and Commons in this present of the April, Author

Parliament Assembled, and by same, That from and after the One thousand seven hundred of any Book or Books already

to Sale, contrary to the true intent and

meaning of this Act, the one Moiety thereof to the Queens [sic] most Excellent Majesty, Her Heirs and Successors, and the other Moiety thereof to any Person or Persons that shall Sue for the same, to be Recovered in any of Her Majesties [sic] Courts of Record at Westminster, by Action of Debt, Bill, Plaint, or Information, in which no Wager of Law, Essoign, Privilege, or Protection, or more than one

the Authority Tenth Day of and ten, the Printed, who

hath not Transferred to any other the Copy or Copies of such Book or Books, Share or Shares thereof, or the Bookseller or Book-sellers, Printer or Printers, or

Imparlance, shall be allowed.

other Person or Persons, who hath or have Purchased

or Acquired the Copy or Copies of any Book or Books, in order to Print or Reprint the same, shall have the sole Right and Liberty of Printing such Book and Books for the Term of One and twenty Years, to Commence from the said Tenth Day of

And whereas many Persons may through Ignorance

April, and no longer; and that the Author of any Book

likewise the Consent of such Proprietor or Proprietors

or Books

already

Composed

and

not

Printed

Offend against this Act, unless some Provision be made whereby the Property in every such Book, as is

intended by this Act to be Secured to the proprietor or

Proprietors

thereof,

may

be

ascertained,

as

and

for the Printing or Reprinting of such Book or Books

Published, or that shall hereafter be Composed, and his Assignee, or Assigns, shall have the sole Liberty

may from time to time be known; Be it therefore further Enacted by the Authority aforesaid, That

of Printing and Reprinting such Book and Books for the Term of fourteen Years, to Commence from the

nothing extend Person therein

Day of the First Publishing the same, and no longer; And that if any other Bookseller, Printer, or other Person whatsoever, from and after the Tenth Day of

in this Act contained shall be construed to to subject any Bookseller, Printer, or other whatsoever, to the Forfeitures or Penalties mentioned, for or by reason of the Printing or

Reprinting

78

of any

Book

or Books

without

such

Consent, as aforesaid, unless the Title to the Copy of such Book or Books hereafter Published shall, before such Publication be Entred [sic], in the RegisterBook of the Company of Stationers, in such manner

said said Company of at the Hall of the Publication made, for the Libraries of the

as hath been usual, which Register-Book shall at all

Cambridge, the Libraries of the Four Universities in Scotland, the Library of Sion College in London, and the Library commonly called the Library belonging

times be kept at the Hall of the said Company, and unless such Consent of the Proprietor or Proprietors be in like manner Entred [sic], as aforesaid,

for

every

of which

several

Entries,

to the Faculty of Advocates at Edinburgh respectively; which said Warehouse-Keeper, is hereby required, within Ten Days after Demand by

Six

Pence shall be Paid, and no more; which said Register-Book may, at all Seasonable [sic; should be: Reasonable] and Convenient times, be Resorted to, and Inspected by any Book-seller, Printer, or other Person, for the Purposes before mentioned, without any Fee or Reward; and the Clerk of the said Company of Stationers, shall, when and as often as

the Keepers of the respective Libraries, or any Person or Persons by them or any of them Authorised to Demand the said Copy, to Deliver the same, for the Use of the aforesaid Libraries; and if any Proprietor, Bookseller or Printer, or the said Warehouse-Keeper of the said Company of Stationers, shall not observe the Direction of this Act therein, That then he and they, so making Default in not Delivering the said Printed Copies, as aforesaid, shall Forfeit, besides the value of the said Printed Copies, the sum of Five Pounds for every Copy not so Delivered, as also the value of the said Printed Copy not so Delivered, the same to be Recovered by the Queens [sic] Majesty, Her Heirs and Successors, and by the Chancellor, Masters, and Scholars of any of the said Universities, and by the President and Fellows of

thereunto required, give a Certificate under his Hand of

such

Entry

or

Entries,

and

for

every

such

Certificate, may take a Fee not exceeding Six Pence. Provided nevertheless, That if the Clerk of the said Company of Stationers, for the time being shall Refuse or Neglect to Register, or make such Entry or Entries, or to give such Certificate, being thereunto Required by the Author or Proprietor of such Copy or Copies, in the Presence of Two or more Credible Witnesses, That then such Person and Persons so refusing, Notice being first duly given of such Refusal, by an Advertisement in the Gazette, shall have

the

like

Benefit,

as

if such

Entry

or

Sion College, and the said Faculty of Advocates at Edinburgh, with their full Costs respectively. * OK OK

Entries,

Certificate or Certificates had been duly made and gven; and that the Clerks so refusing, shall, for any such Offence, Forfeit to the Proprietor of such Copy or Copies the Sum of Twenty Pounds, to be Recovered in any of Her Majesties [sic] Courts of

Record

at Westminster,

by Action of Debt,

Stationers for the time being, said Company, before such the Use of the Royal Library, Universities of Oxford and

Provided, That nothing in this Act contained shall extend, or be construed to extend, either to Prejudice or Confirm any Right that the said Universities, or any of them, or any Person or Persons have, or claim to have, to the Printing or Reprinting any Book or Copy already Printed, or hereafter to be Printed.

Bill,

Plaint, or Information, in which no Wager of Law, Essoign, Privilege or Protection, or more than one

Imparlance shall be allowed.

OK ok

Provided always, That after the Expiration of the said

* KOK

Term of Fourteen Years, the sole Right of Printing or Disposing of Copies shall return to the Authors thereof, if they are then Living, for another Term of Fourteen Years.

Provided always, and it is hereby Enacted, That Nine

Copies of each Book or Books, upon the best Paper, that from and after the said Tenth Day of April, One thousand seven hundred and ten, shall be Printed and Published, as aforesaid, or Reprinted and Published

with Additions,

FINIS.

shall, by the Printer and Printers

thereof, be Delivered to the Warehouse-Keeper of the

Of course, not all copyright infringements are the same. Sometimes people can be guilty of infringement even when they weren’t the ones who actually did the copying.

79

An

Sony Corporation of America v. Universal City

No. 81-1687

at a later time.

17, 1984, Decided

copyrights on some of the television programs that are broadcast on the public airwaves. Some members of the general public use video tape recorders sold by petitioners to record some of these broadcasts, as well as a large number of other broadcasts. The question presented is whether the sale of petitioners’ copying equipment to the general public violates any of the rights conferred upon respondents by the Copyright Act.

for the

Central

District

individuals

had

Respondents

thereby

infringed further

This

practice,

petitioners

liable

for

distributing

VTR’s,

to

collect

royalties

equipment, or to obtain would enlarge the scope monopolies to encompass

of

commerce

that

is not

VTR’s

to

the

on

the

sale

of

such

other relief, if affirmed, of respondents’ statutory control over an article of

the

subject

of copyright

I

that

petitioners were liable for the copyright infringement

The

two

respondents

in

this

action,

Universal City Studios, Inc., and Walt Disney Productions, produce and hold the copyrights on a substantial number of motion pictures and other

audiovisual works. In the current marketplace, they can exploit their rights in these works in a number of ways: by authorizing theatrical exhibitions, by licensing limited showings on cable and network television, by selling syndication rights for repeated airings on local television stations, and by marketing programs on prerecorded videotapes or videodiscs. Some works are suitable for exploitation through all

After a lengthy trial, the District Court denied respondents all the relief they sought and entered judgment for petitioners. 480 F.Supp. 429 (1979). The United States Court of Appeals for the

of these avenues, while the market for other works is

Ninth Circuit reversed the District Court’s judgment on respondents’ copyright claim, holding petitioners

more limited.

liable for contributory infringement and ordering the District Court to fashion appropriate relief. 659 F.2d 963 (1981). We granted certiorari, 457 U.S. 1116

Petitioner Betamax

video

Sony

tape

manufactures

recorders

and

millions markets

of

these

devices through numerous retail establishments, some of which are also petitioners in this action.

(1982); since we had not completed our study of the 463

“time-

protection. Such an expansion of the copyright privilege is beyond the limits of the grants authorized by Congress.

allegedly committed by Betamax consumers because of petitioners’ marketing of the Betamax VTR’s. *** Respondents sought no relief against any Betamax consumer. Instead, they sought money damages and an equitable accounting of profits from petitioners, as well as an injunction against the manufacture and marketing of Betamax VTR’s.

case last Term, we ordered reargument, 1226 (1983). We now reverse.

as

general public. The Court of Appeals’ holding that respondents are entitled to enjoin the distribution of

respondents’

maintained

known

that the practice has impaired the commercial value of their copyrights or has created any likelihood of future harm. Given these findings, there is no basis in the Copyright Act upon which respondents can hold

California in 1976. Respondents alleged that some individuals had used Betamax video tape recorders (VTR’s) to record some of respondents’ copyrighted works which had been exhibited on commercially sponsored television and contended that these copyrights.

of

time-shifting in this litigation, were unable to prove

Respondents commenced this copyright infringement action against petitioners in the United

Court

rejection

shifting,” enlarges the television viewing audience. For that reason, a significant amount of television programming may be used in this manner without objection from the owners of the copyrights on the programs. For the same reason, even the two respondents in this case, who do assert objections to

STEVENS, J.: Petitioners manufacture and sell home video tape recorders. Respondents own the

District

our

uses a VTR principally to record a program he cannot view as it is being televised and then to watch it once

464 US. 417, 104 S. Ct. 774, 78 L. Ed. 2d 574

States

of

findings reveal that the average member of the public

SUPREME COURT OF THE UNITED STATES

January

explanation

respondents’ unprecedented attempt to impose copyright liability upon the distributors of copying equipment requires a quite detailed recitation of the findings of the District Court. In summary, those

Studios, Inc.

U.S.

***

Sony’s

Betamax

VTR

is

a_

consisting of three basic components: which

80

receives

electromagnetic

signals

mechanism

(1) a tuner, transmitted

over the television band of the public airwaves and separates them into audio and visual signals; (2) a recorder, which records such signals on a magnetic tape; and (3) an adapter, which converts the audio and visual signals on the tape into a composite signal that can be received by a television set.

Several noteworthy.

capabilities

The

separate

of the tuner

in

machine the

indicated that over 80% of the interviewees watched at least as much regular television as they had before owning a Betamax.* Respondents offered no

When

intended not only to time-shift (record, playback and then erase) but also to build a library of cassettes. Maintaining a library, however, proved too expensive, and he is now erasing some earlier tapes and reusing them.

are

Betamax

enables it to record a broadcast off one station while the television set is tuned to another channel, permitting the viewer, for example, to watch two simultaneous news broadcasts by watching one “live” and recording the other for later viewing. Tapes may

“Griffiths copied about 20 minutes

be reused, and programs that have been recorded may be erased either before or after viewing. A timer in the Betamax can be used to activate and deactivate

of a Universal motion picture called ‘Never Give An Inch,’ and two episodes from Universal television series entitled ‘Baa Baa Black Sheep’ and ‘Holmes and Yo Yo.’ He would have erased each of these but for the request of plaintiffs’ counsel that it be kept. Griffiths also testified that he had copied but already erased Universal films called ‘Alpha Caper’ (erased before anyone saw it) and ‘Amelia Earhart.’ At the time of his deposition Griffiths did not intend to keep any Universal film in his library.

the equipment at predetermined times, enabling an intended viewer to record programs that are

transmitted when he or she is not at home. Thus a person may watch a program at home in the evening even though it was broadcast while the viewer was at

work

during the afternoon.

The

Betamax

is also

equipped with a pause button and a fast-forward control. The pause button, when depressed, deactivates the recorder until it is released, thus enabling a viewer to omit a commercial

advertisement

from

the

recording,

provided,

of

“Griffiths has also recorded documentaries, news broadcasts, sporting events and political programs such as a rerun of the Nixon/Kennedy debate.” * * *

course, that the viewer is present when the program is recorded. The fast-forward control enables the viewer of a previously recorded program to run the tape

rapidly when a segment he or she does not desire to see is being played back on the television screen.

Four

1978. Although there were some differences in the

3

of

tapes.’

Sony’s

“According to plaintiffs’ survey, 75.4% of the VTR owners use their machines to record for time-shifting purposes half or most of the time. Defendants’ survey showed that 96% of the Betamax owners had used the machine to record programs they otherwise would have missed. “When plaintiffs asked interviewees how many cassettes were in their library, 55.8% said there were 10 or

survey

fewer. In defendants’

As evidence of how a VTR may be

used, respondents offered the testimony of William Griffiths. Griffiths, although

named

testified to

‘ The District Court summarized some of the findings in these surveys as follows:

surveys, they both showed that the primary use of the machine for most owners was “time-shifting” -- the practice of recording a program to view it once at a later time, and thereafter erasing it. Time-shifting enables viewers to see programs they otherwise would miss because they are not at home, are occupied with other tasks, or are viewing a program on another station at the time of a broadcast that they desire to watch. Both surveys also showed, however, that a substantial number of interviewees had

libraries

other witnesses

having engaged in similar activity.

The respondents and Sony both conducted surveys of the way the Betamax machine was used by several hundred owners during a sample period in

accumulated

“He owns approximately 100 tapes. Griffiths bought his Betamax, he

survey, of the total

programs viewed by interviewees in the past month, 70.4% had been viewed only that

as an individual

defendant, was a client of plaintiffs’ law firm. The District Court summarized his testimony as follows:

one time and for 57.9%, there were no plans

for further viewing.” * * *

81

copying

evidence of decreased television viewing by Betamax

as

fair

use

“because

there

is

no

accompanying reduction in the market for ‘plaintiff's original work.’” * * *

owners.°

Sony introduced considerable evidence describing television programs that could be copied without objection from any copyright holder, with

As an independent ground of decision, the District Court also concluded that Sony could not be

special emphasis on sports, religious, and educational programming.

For example,

that 7.3% of all Betamax

their survey

held liable as a contributory infringer even if the home use of a VTR was considered an infringing use. The District Court noted that Sony had no direct

indicated

use is to record sports

events, and representatives of professional baseball, football, basketball, and hockey testified that they

involvement with any Betamax purchasers who recorded copyrighted works off the air. Sony’s advertising was silent on the subject of possible copyright infringement, but its instruction booklet contained the following statement:

had no objection to the recording of their televised events for home use. * * * Respondents offered opinion evidence concerning the future impact of the unrestricted sale of VTR’s on the commercial value of their copyrights. The District Court found, however, that they had failed to prove any likelihood of future harm from the use of VTR’s for time-shifting. * * *

“Television programs, films, videotapes and other

materials

Unauthorized

The

District Court assumed

constructive knowledge The lengthy trial of the case in the District Court concerned the private, home use of VTR’s for recording programs broadcast on the public airwaves without charge to the viewer. *** No_ issue

The

District

home

Court

use

of

material of the

that Sony

had

of the probability that the

them allegedly infringing.” * * * It reasoned: “Selling

a

staple

article

of

commerce -- e. g., a typewriter, a recorder, a

on pay or

concluded

recording

copyrighted.

Betamax machine would be used to record copyrighted programs, but found that Sony merely sold a “product capable of a variety of uses, some of

concerning the transfer of tapes to other persons, the use of home-recorded tapes for public performances,

noncommercial

be _

of such

may be contrary to the provisions United States copyright laws.” * * *

The District Court’s Decision

or the copying of programs transmitted cable television systems was raised. * * *

may

recording

camera, a photocopying machine -technically contributes to any infringing use subsequently made thereof, but this kind of ‘contribution,’ if deemed sufficient as a basis for liability, would expand the theory beyond precedent and arguably beyond judicial management.

that

material

broadcast over the public airwaves was a fair use of copyrighted works and did not constitute copyright infringement. It emphasized the fact that the material

was broadcast free to the public at large, the noncommercial character of the use, and the private character of the activity conducted entirely within the home. Moreover, the court found that the purpose of this use served the public interest in increasing access to television programming, an interest that “is providing the fullest possible access to information through the public airwaves. Columbia Broadcasting System, Inc. v. Democratic National Committee, 412

“", . Commerce would indeed be hampered if manufacturers of staple items were held liable as contributory infringers whenever they ‘constructively’ knew that some purchasers on some occasions would use their product for a purpose which a court later deemed, as a matter of first impression,

U.S. 94, 102.” * * * Even when an entire copyrighted

to be an infringement.” * * *

consistent

with

the

First

Amendment

policy

of

work was recorded, the District Court regarded the Finally,

°

“81.9%

of

the

the

District

Court

discussed

the

respondents’ prayer for injunctive relief, noting that they had asked for an injunction either preventing the

defendants’

interviewees watched the same amount or more of regular television as they did before owning a Betamax. 83.2% reported their frequency of movie

future sale of Betamax machines, or requiring that the

machines

be

rendered

incapable

of

recording

copyrighted works off the air. The court stated that it had “found no case in which the manufacturers,

going was unaffected by Betamax.” * * *

82

distributors, retailers and advertisers of the instrument enabling the infringement were sued by the copyright holders,” and that the request for relief in this case “is unique.” * * *

On the matter of relief, the Court of Appeals concluded that “statutory damages may be appropriate” and that the District Court should

reconsider its determination that an injunction would It concluded that an injunction was wholly inappropriate because any possible harm to respondents was outweighed by the fact that “the

Betamax

could

still

legally

be

used

to

not be an appropriate remedy; and, referring to “the analogous photocopying area,” suggested that a continuing royalty pursuant to a judicially created compulsory license may very well be an acceptable

record

resolution of the relief issue. * * *

noncopyrighted material or material whose owners consented to the copying. An injunction would deprive the public of the ability to use the Betamax for this noninfringing off-the-air recording.” * * *

II Article I, § 8, of the Constitution provides:

The Court of Appeals’ Decision

The Court of Appeals reversed the District

“The Congress shall have Power ... To Promote the Progress of Science and

Court’s judgment on respondents’ copyright claim. It did not set aside any of the District Court’s findings

Authors and Inventors the exclusive Right to

of fact. Rather, it concluded the home use of a VTR was was not a “productive use.” that it was unnecessary for

useful Arts, by securing for limited Times to

as a matter of law that not a fair use because it * * * It therefore held plaintiffs to prove any

their respective Writings and Discoveries.” The monopoly privileges that Congress may authorize

are

neither

unlimited

nor

primarily

harm to the potential market for the copyrighted works, but then observed that it seemed clear that the

designed to provide a special private benefit. Rather, the limited grant is a means by which an important

cumulative

public purpose may be achieved. It is intended to motivate the creative activity of authors and inventors

possible

effect by

VTR’s

of

mass

would

reproduction tend

to

diminish

made the

potential market for respondents’ works. * * *

by the provision of a special reward, and to allow the public access to the products of their genius after the limited period of exclusive control has expired.

On the issue of contributory infringement, the Court of Appeals first rejected the analogy to staple articles of commerce such as tape recorders or photocopying machines. It noted that such machines “may have substantial benefit for some purposes” and do not “even remotely raise copyright problems.” * * * VTR’s, however, are sold “for the primary purpose of reproducing television programming” and “{virtually] all such programming is copyrighted

material.

* * * The

Court

of Appeals

“The copyright law, like the patent statutes, makes reward to the owner a secondary consideration. In Fox Film Corp. v. Doyal,

286

U.S.

123,

127, Chief Justice

Hughes spoke as follows respecting the copyright monopoly granted by Congress, ‘The sole interest of the United States and

concluded,

the

therefore, that VTR’s were not suitable for any substantial noninfringing use even if some copyright owners elect not to enforce their rights.

primary

object

in

conferring

the

monopoly lie in the general benefits derived by the public from the labors of authors.’ It is said that reward to the author or artist serves to induce release to the public of the products of his creative genius.” United

The Court of Appeals also rejected the District Court’s reliance on Sony’s lack of knowledge that home use constituted infringement. Assuming that the statutory provisions defining the remedies for

States v. Paramount Pictures, Inc., 334 U.S.

131, 158 (1948).

infringement applied also to the nonstatutory tort of contributory infringement, the court stated that a defendant’s good faith would merely reduce his

defining

damages liability but would not excuse the infringing conduct. It held that Sony was chargeable with

should be granted to authors or to inventors in order to give the public appropriate access to their work

knowledge

product. Because this task involves a difficult balance between the interests of authors and inventors in the control and exploitation of their writings and discoveries on the one hand, and society’s competing

of the homeowner’s

As the text of the Constitution makes plain,

it is Congress that has been assigned the task of

infringing activity

because the reproduction of copyrighted materials was either “the most conspicuous use” or “the major

use” of the Betamax product. * * *

83

the

scope

of the

limited

monopoly

that

interest in the free flow of ideas, information, and

the five ways set forth in the statute, “is an infringer

commerce

of the copyright.” is authorized by copyrighted work who makes a fair

on

copyright

the

statutes

other

have

hand,

been

our

patent

amended

and

repeatedly.

* KOK

§ 501(a). Conversely, anyone who the copyright owner to use the in a way specified in the statute or use of the work is not an infringer

From its beginning, the law of copyright has developed in response to significant changes in

of the copyright with respect to such use.

technology. * * * Indeed, it was the invention of a new form of copying equipment -- the printing press - that gave rise to the original need for copyright protection. * * * Repeatedly, as new developments have occurred in this country, it has been the Congress that has fashioned the new rules that new technology made necessary. * * * The remedies for infringement “are only those prescribed by Congress.” Thompson v. Hubbard, 131 U.S. 123, 151

The Copyright Act provides the owner of a copyright with a potent arsenal of remedies against

an infringer of his work, including an injunction to restrain the infringer from violating his rights, the impoundment and destruction of all reproductions of his work made in violation of his rights, a recovery of his actual damages and any additional profits realized

by the infringer or a recovery of statutory damages,

and attorney’s fees. §§ 502-505.'°

(1889).

legislative guidance is a recurring theme. * * * Sound policy, as well as history, supports our consistent deference to Congress when major technological

The two respondents in this case do not seek relief against the Betamax users who have allegedly infringed their copyrights. Moreover, this is not a class action‘on behalf of all copyright owners who license their works for television broadcast, and respondents have no right to invoke whatever rights

innovations

other

The judiciary’s reluctance to expand the protections afforded by the copyright without explicit

alter

the

market

for

copyrighted

copyright

holders

may

have

to

bring

materials. Congress has the constitutional authority and the institutional ability to accommodate fully the

infringement actions based on Betamax copying of their works. * * * As was made clear by their own

varied permutations of competing interests that are inevitably implicated by such new technology.

evidence, the copying of the respondents’ programs represents a small portion of the total use of VTR’s. It is, however, the taping of respondents’ own copyrighted programs standing to charge

In a case like this, in which Congress has not

plainly marked our course, we must be circumspect in construing the scope of rights created by a legislative enactment which never contemplated such

protection

“subsists

...

infringement. To prevail, they have the burden of

Ill

medium of expression.” 17 U. S. C. § 102(a) (1982 ed.). This protection has never accorded the copyright owner complete control over all possible uses of his work. * * * Rather, the Copyright Act grants the copyright holder “exclusive” rights to use and to

The Copyright Act does not expressly render anyone liable for infringement committed by another. In contrast, the Patent Act expressly brands anyone who “actively induces infringement of a patent” as an infringer, 35 U. S. C. § 271(b), and further imposes liability on certain individuals labeled “contributory” infringers, § 271(c). The absence of such express language in the copyright statute does not preclude the imposition of liability for copyright infringements

in five qualified ways,

including reproduction of the copyrighted work in copies. § 106. * * * All reproductions of the work, however,

are not within the exclusive domain

infringed be held

in

original works of authorship fixed in any tangible

authorize the use of his work

them with contributory

proving that users of the Betamax have their copyrights and that Sony should responsible for that infringement.

a calculus of interests. * * * Copyright

that provides Sony with

of the

copyright owner; some are in the public domain. Any individual may reproduce a copyrighted work for a

on certain parties who have not themselves engaged

“fair use”; the copyright owner does not possess the exclusive right to such a use. Compare

§ 106 with

‘5

§ 107,

Moreover,

anyone who willfully

infringes the copyright to reproduce a motion picture for purposes of commercial advantage or private financial gain is subject to substantial criminal penalties, 17 U.S.C. § 506(a) (1982 ed.), and the fruits and instrumentalities of the crime are forfeited

“Anyone who violates any of the exclusive rights of the copyright owner,” that is, anyone who trespasses into his exclusive domain by using or authorizing the use of the copyrighted work in one of

upon conviction, § 506(b).

84

in the infringing activity. * * * For vicarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying the

respondents’ works; respondents do. Sony supplies a piece of equipment that is generally capable of copying the entire range of programs that may be televised: those that are uncopyrighted, those that are copyrighted but may be copied without objection from the copyright holder, and those that the

circumstances in which it is just to hold one individual accountable for the actions of another.

copyright holder would prefer not to have copied. The Betamax can be used to make authorized or unauthorized uses of copyrighted works, but the

Such circumstances were plainly present in Kalem Co. v. Harper Brothers, 222 U.S. 55 (1911),

the

copyright

decision

of this

Court

on

which

range of its potential use is much broader than the particular infringing use of the film Ben Hur involved

respondents place their principal reliance. In Kalem,

the Court held that the producer of an unauthorized

in Kalem. Kalem does not support respondents’ novel theory of liability.

film dramatization of the copyrighted book Ben Hur

was

liable for his sale of the motion

picture

to Justice Holmes stated that the producer had

jobbers, who in turn arranged for the commercial exhibition of the film. Justice Holmes, writing for the

“contributed” to the infringement

Court, explained:

and the label “contributory infringement” has been

of the copyright,

applied in a number of lower court copyright cases

“The defendant not only expected

involving an ongoing relationship between the direct

but invoked by advertisement the use of its

infringer and the contributory infringer at the time the

films for dramatic reproduction of the story.

infringing conduct occurred.

That was the most conspicuous purpose for

other situations in which the imposition of vicarious

which they could be used, and the one for

liability is manifestly just, the “contributory” infringer was in a position to control the use of

which

especially

they

were

made.

If the

In such cases, as in

defendant did not contribute to the infringement it is impossible to do so except

copyrighted works by others and had authorized the

by taking part in the final act. It is liable on

* * * This case, however, plainly does not fall in that category. The only contact between Sony and the users of the Betamax that is disclosed by this record

use without permission from the copyright owner.

principles recognized in every part of the law.” Id., at 62-63.

occurred at the moment of sale. The District Court The use for which the item sold in Kalem

expressly found that “no employee of Sony, Sonam or DDBI had either direct involvement with the allegedly infringing activity or direct contact with purchasers of Betamax who recorded copyrighted works off-the-air.” * * * And it further found that “there was no evidence that any of the copies made by Griffiths or the other individual witnesses in this suit were influenced or encouraged by [Sony’s] advertisements.” * * *

had been “especially” made was, of course, to display

the performance that had already been recorded upon it. The producer had personally appropriated the copyright owner’s protected work and, as the owner

of the tangible medium of expression upon which the protected work was recorded, authorized that use by his sale of the film to jobbers. But that use of the film was not his to authorize: the copyright owner possessed the exclusive right to authorize public performances of his work. Further, the producer personally advertised the unauthorized public performances, dispelling any possible doubt as to the use of the film which he had authorized.

If vicarious liability is to be imposed on Sony in this case, it must rest on the fact that it has sold equipment with constructive knowledge of the fact that its customers may use that equipment to make unauthorized copies of copyrighted material. There is no precedent in the law of copyright for the imposition of vicarious liability on such a theory. The

Respondents argue that Kalem stands for the proposition that supplying the “means” to accomplish an infringing activity and encouraging that activity

closest analogy is provided by the patent law cases to which it is appropriate to refer because of the historic kinship between patent law and copyright law. * * *

through advertisement are sufficient to establish liability for copyright infringement. This argument rests on a gross generalization that cannot withstand scrutiny.

The

producer

in Kalem

did

not

[I]n contributory infringement cases arising

merely

under

provide the “means” to accomplish an infringing activity; the producer supplied the work itself, albeit does

not

supply

Betamax

consumers

patent

laws

the

Court

has

always

recognized the critical importance of not allowing the patentee to extend his monopoly beyond the limits of his specific grant. These cases deny the patentee any

in a new medium of expression. Sony in the instant

case

the

with

85

right to control the distribution of unpatented articles

A. Authorized Time-Shifting

unless they are “unsuited for any commercial noninfringing use.” * * * Unless a commodity “has no use except through practice of the patented

Each of the respondents owns a_ large inventory of valuable copyrights, but in the total spectrum of television programming their combined market share is small. The exact percentage is not

method,” * * *, the patentee has no right to claim that its distribution constitutes contributory infringement. “To form the basis for contributory infringement the item must almost be uniquely suited as a component of the

patented

invention.”

* **

“[A]

sale

specified, but it is well below 10%. * * * If they were to prevail, the outcome of this litigation would have a significant impact on both the producers and the

of an

article which though adapted to an infringing use is

viewers of the remaining 90% of the programming in

also adapted to other and lawful uses, is not enough to make the seller a contributory infringer. Such a

the Nation.

No

doubt,

many

other producers

rule would block the wheels of commerce.” * * *

the findings of the District Court make We

recognize

there

are

time-shifting to continue, at least for an experimental

time period. * * * The District Court found:

publication to the products or activities that make such duplication possible. The staple article of commerce doctrine must strike a balance between a copyright holder’s legitimate demand for effective -not merely symbolic -- protection of the statutory monopoly, and the rights of others freely to engage in

“Even if it were deemed that home-

use

used Indeed,

for

legitimate,

it need

merely

if the product

unobjectionable be

capable

Owners

consented

to

the

copying.

An this

purposes. “Defendants introduced considerable testimony at trial about the potential for such copying of sports,

of substantial

religious,

educational

and

other

programming. This included testimony from representatives of the Offices of the

significant noninfringing

Commissioners of the National Football, Basketball, Baseball and Hockey Leagues

uses. In order to resolve that question, we need not explore ail the different potential uses of the machine and determine whether or not they would constitute infringement. Rather, we need only consider whether on the basis of the facts as found by the District Court a significant number of them would be noninfringing. in order to resolve this case we

material

ability to use the Betamax for noninfringing off-the-air recording.

is widely

The question is thus whether the Betamax is

Moreover,

copyrighted

injunction would deprive the public of the

IV

of commercially

of

noncopyrighted material or material whose

noninfringing uses.

capable

recording

constituted infringement, the Betamax could still legally be used to _ record

substantially unrelated areas of commerce. Accordingly, the sale of copying equipment, like the sale of other articles of commerce, does not constitute infringement

it clear that

time-shifting may enlarge the total viewing audience and that many producers are willing to allow private

substantial

differences between the patent and copyright laws. But in both areas the contributory infringement doctrine is grounded on the recognition that adequate protection of a monopoly may require the courts to look beyond actual duplication of a device or

contributory

share

respondents’ concern about the possible consequences of unrestricted copying. Nevertheless

and Associations,

the Executive

Director of

National Religious Broadcasters and various educational communications agencies. Plaintiffs attack the weight of the testimony offered and also contend that an injunction is warranted because infringing uses outweigh noninfringing uses.

need not

give precise content to the question of how much use is commercially significant. For one potential use of it is understood: private, noncommercial timeshifting in the home. It does so both (A) because

legal

“Whatever the future percentage of versus illegal home-use recording

might

be,

respondents have no right to prevent other copyright

deprive the public of the very tool or article

the Betamax plainly satisfies this standard, however

an

injunction

which

seeks

to

holders from authorizing it for their programs, and

of commerce capable of some noninfringing

(B) because the District Court’s factual findings reveal that even the unauthorized home time-shifting of respondents’ programs is legitimate fair use.

use would be an extremely harsh remedy, as well as one unprecedented in copyright law.” * * *

86

Although the District Court made these statements in the context of considering the propriety of injunctive relief, the statements constitute a finding that the evidence concerning “sports,

If there are millions of owners of VTR’s who make copies of televised sports events, religious broadcasts, and educational programs such as Mister

religious, educational and other programming” was sufficient to establish a significant quantity of broadcasting whose copying is now authorized, and a significant potential for future authorized copying. That finding is amply supported by the record. In addition to the religious and sports officials identified explicitly by the District Court, * * * two items in the record deserve specific mention.

Rogers’ Neighborhood, and if the proprietors of those programs welcome the practice, the business of supplying the equipment that makes such copying feasible should not be stifled simply because the equipment is used by some individuals to make unauthorized reproductions of respondents’ works.

The respondents do not represent a class composed of all copyright holders. Yet a finding of contributory infringement would inevitably frustrate the interests of broadcasters in reaching the portion of their audience that is available only through time-shifting.

First is the testimony of John Kenaston, the station manager of Channel 58, an educational station

in Los Angeles affiliated Broadcasting Service. He

with the Public explained and holders

authenticated the station’s published guide to its programs. * * * For each program, the guide tells whether unlimited home taping is authorized, home

taping is authorized

does not mean that respondents should be deemed to have granted a license to copy their programs. Thirdparty conduct would be wholly irrelevant in an action for direct infringement of respondents’ copyrights. But in an action for contributory infringement against

subject to certain restrictions

(such as erasure within seven days), or home taping is not authorized at all. The Spring 1978 edition of

the guide described 107 programs. Sixty-two of those programs or 58% authorize some home taping. Twenty-one of them or almost unrestricted home taping. * * *

Second

20%

the seller of copying equipment, the copyright holder may not prevail unless the relief that he seeks affects only his programs, or unless he speaks for virtually all copyright holders with an interest in the outcome. In this case, the record makes it perfectly clear that there are many important producers of national and local television programs who find nothing

authorize

is the testimony of Fred Rogers,

president of the corporation that produces and owns

objectionable about the enlargement in the size of the television audience that results from the practice of time-shifting for private home use. * * * The seller of

the copyright on Mister Rogers’ Neighborhood. The program is carried by more public television stations than any other program. Its audience numbers over 3,000,000 families a day. He testified that he had absolutely no objection to home taping for

the equipment that expands those producers’ audiences cannot be a contributory infringer if, as is true in this case, it has had no direct involvement with any infringing activity.

noncommercial use and expressed the opinion that it is a real service to families to be able to record children’s programs and to show them at appropriate times.”’

B. Unauthorized Time-Shifting Even unauthorized uses of a copyrighted work are not necessarily infringing. An unlicensed use of the copyright is not an infringement unless it

27 “Some public stations, as well as commercial stations, program the ‘Neighborhood’ at hours when some children cannot use it. | think that it’s a real service to families to be able to record such programs and show them at appropriate times. I have always felt that with the advent of all of this new technology that allows people to tape the

conflicts with one of the specific exclusive rights conferred by the copyright statute. * * * Moreover, the definition of exclusive rights in § 106 of the present Act is prefaced by the words “subject to

sections 107 through 118.” Those sections describe a variety of uses of copyrighted material that “are not

‘Neighborhood’ off-the-air, and I’m speaking for the ‘Neighborhood’

they

then

because that’s what I produce, that

become

much

programming of their frankly, I am opposed by others. My whole always been ‘You are

way Maybe

you

are.

You

more

active

in

infringements of copyright” “notwithstanding the provisions of section 106.” The most pertinent in this

the

family’s television life. Very to people being programmed approach in broadcasting has an important person just the

can

make

Of course, the fact that other copyright may welcome the practice of time-shifting

anything that allows a person to be more active in the

healthy decisions.’

control

of his or her

important.” * * *

I’m going on too long, but I just feel that

87

life, in a healthy way,

is

case is § 107, the legislative endorsement of the

have. But a use that has no demonstrable effect upon

doctrine of “fair use.” * * *

the potential market for, or the value of, the copyrighted work need not be prohibited in order to protect the author’s incentive to create. The

That section identifies various factors*® that

prohibition of such noncommercial uses would merely inhibit access to ideas without any

enable a court to apply an “equitable rule of reason” analysis to particular claims of infringement. * * * Although not conclusive, the first factor requires that

countervailing benefit. * * *

“the commercial or nonprofit character of an activity” be weighed in any fair use decision. * * * If the Betamax were used to make copies for a commercial or profit-making purpose, such use would

Thus, although every commercial use of copyrighted material is presumptively an unfair

exploitation of the monopoly privilege that belongs to the owner of the copyright, noncommercial uses are a

presumptively be unfair. The contrary presumption is appropriate here, however, because the District Court’s findings plainly establish that time-shifting

different matter. A challenge to a noncommercial use

of a copyrighted work requires proof either that the particular use is harmful, or that if it should become widespread, it would adversely affect the potential

for private home use must be characterized as a noncommercial, nonprofit activity. Moreover, when one considers the nature of a televised copyrighted

This is not, however, the end of the inquiry

market for the copyrighted work. Actual present harm need not be shown; such a requirement would leave the copyright holder with no defense against predictable damage. Nor is it necessary to show with certainty that future harm will result. What is necessary is a showing by a preponderance of the evidence that some meaningful likelihood of future harm exists. If the intended use is for commercial gain, that likelihood may be presumed. But if it is for

Congress

a noncommercial

audiovisual work * * *, and that time-shifting merely enables a viewer to see such a work which he had been invited to witness in its entirety free of charge, the fact that the entire work is reproduced, see § 107(3), does not have its ordinary effect of

militating against a finding of fair use. * * *

because

has also directed

us to consider

“the effect of the use upon the potential market for or value of the copyrighted work.” § 107(4). The purpose of copyright is to create incentives for creative effort. Even copying for noncommercial

In this case, respondents failed to carry their

burden with regard to District Court described follows:

purposes may impair the copyright holder’s ability to obtain

the rewards

that Congress

intended

him

purpose, the likelihood must be

demonstrated.

to

home time-shifting. The respondents’ evidence as

“Plaintiffs’

Section 107 provides:

several

points

in the

experts

admitted

trial that

the

at

time-

shifting without librarying would result in ‘not a great deal of harm.’ Plaintiffs’

“Notwithstanding the provisions of section 106, the fair use of a copyrighted work, including

greatest concern about time-shifting is with ‘a point of important philosophy that transcends even commercial judgment.’ They fear that with any Betamax usage,

such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include — “(1) the purpose and character of the use,

‘invisible

boundaries’

copyright owner program.’” * * * Later

in

its

has

opinion,

are

passed:

lost control

the

‘the

over

District

his

Court

observed:

including whether such use is of a commercial nature or is for nonprofit educational purposes; “(2) the nature of the copyrighted work; “(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and “(4) the effect of the use upon the potential

“Most of plaintiffs’ predictions of harm hinge on speculation about audience viewing patterns and ratings, a measurement

system which Sidney Sheinberg, MCA’s president, calls a ‘black art’ because of the significant level of imprecision involved in the calculations.” * * *

market for or value of the copyrighted work.” * * *

88

There was no need for the District Court to say much about past harm. “Plaintiffs have admitted that no actual harm to their copyrights has occurred

he may condemn a private act of time-shifting as a violation of federal law.

to date.” * * *

When these factors are all weighed in the “equitable rule of reason” balance, we must conclude

On the question of potential future harm from time-shifting, the District Court offered a more

that this record amply supports the District Court’s

detailed

analysis

of

the

evidence.

It

conclusion that home time-shifting is fair use. In light of the findings of the District Court regarding the

rejected

original telecast of a program will not be measured in

state of the empirical data, it is clear that the Court of Appeals erred in holding that the statute as presently

the live audience and the ratings and revenues will

written bars such conduct. * * *

respondents’

“fear

that

persons

‘watching’

the

decrease,” by observing that current measurement In summary, the record and findings of the District Court lead us to two conclusions. First, Sony demonstrated a significant likelihood that substantial numbers of copyright holders who license their works

technology allows the Betamax audience to be reflected. * * * It rejected respondents’ prediction “that live television or movie audiences will decrease

as

more

people

watch

Betamax

tapes

as

an

for broadcast on free television would not object to having their broadcasts time-shifted by private

alternative,” with the observation that “[there] is no

factual basis for [the underlying] assumption.” * * * It rejected respondents’ “fear that time-shifting will reduce audiences for telecast reruns,” and concluded

instead should And it “theater suffer

that “given current market practices, aid plaintiffs rather than harm them.” declared that respondents’ suggestion or film rental exhibition of a program because of time-shift recording of

viewers. And second, respondents failed to demonstrate that time-shifting would cause any likelihood of nonminimal harm to the potential market for, or the value of, their copyrighted works. The Betamax is, therefore, capable of substantial noninfringing uses. Sony’s sale of such equipment to the general public does not constitute contributory infringement of respondents’ copyrights.

this * * * that will that

program” “lacks merit.” * * *

Vv

After completing that review, the District Court restated its overall conclusion several times, in several different ways. “Harm from time-shifting is speculative and, at best, minimal.” *** “The audience benefits from the time-shifting capability

“The direction of Art. I is that Congress shall have the power to promote the progress of science and the useful arts. When, as here, the Constitution is permissive, the sign of how far Congress has chosen to go can come only from Congress.” Deepsouth Packing Co. v. Laitram Corp.,

have already been discussed. It is not implausible that benefits could also accrue to plaintiffs, broadcasters, and advertisers, as the Betamax makes it possible for more persons to view their broadcasts.” * * * “Testimony at trial suggested that Betamax may require adjustments in marketing strategy, but it did

not

establish

even

a likelihood

of harm.”

406 U.S. 518, 530 (1972). One may search the Copyright Act in vain for any sign that the elected representatives of the millions of people who watch television every day have made it unlawful to copy a program for later

* * *

“Television production by plaintiffs today is more profitable than it has ever been, and, in five weeks of trial, there was no concrete evidence to suggest that the Betamax will change the studios’ financial picture.” * * *

against the sale of machines that make such copying possible.

The District Court’s conclusions are buttressed by the fact that to the extent time-shifting

It may well be that Congress will take a fresh look at this new technology, just as it so often

expands public access to freely broadcast television programs, it yields societal benefits. In Community

has examined other innovations in the past. But it is

viewing at home, or have enacted a flat prohibition

not our written. reads, to case, the reversed.

Television of Southern California v. Gottfried, 459 U.S. 498, 508, n. 12 (1983), we acknowledged the

public interest in making television broadcasting more available. Concededly, that interest is not unlimited. But it supports an interpretation of the concept of “fair use” that requires the copyright

job to apply laws that have not yet been Applying the copyright statute, as it now the facts as they have been developed in this judgment of the Court of Appeals must be

It is so ordered.

holder to demonstrate some likelihood of harm before

89

Even when one infringes on another’s copyright, there are sometimes valid reasons for doing so. The law provides legal recognition for some of these reasons, calling them “fair use.” Fair Use is a doctrine that permits copying of another person’s copyrighted work without

permission under certain circumstances that have been determined to be “fair.” that 2 Live Crew had written a parody of “Oh, Pretty Woman,” that they would afford all credit for

Campbell v. Acuff-Rose Music, Inc.

ownership

No. 92-1292

Acuff-Rose, SUPREME

and authorship

of the original song to

Dees, and Orbison, and that they were

willing to pay a fee for the use they wished to make

COURT OF THE United States

of it. Enclosed

510 U.S. 569; 114 S. Ct. 1164; 127 L. Ed. 2d 500; 1994 U.S. LEXIS 2052; 62 U.S.L.W. 4169; 29 U.S.P.Q.2D (BNA) 1961; Copy. L. Rep. (CCH) P27,222; 22 Media L. Rep. 1353; 94 Cal. Daily Op. Service 1662; 94 Daily Journal DAR 2958; 7 Fla. L. Weekly Fed. S 800

with the letter were

a copy

of the

lyrics and a recording of 2 Live Crew’s song. * * * Acuff-Rose’s agent refused permission, stating that “I am aware of the success enjoyed by ‘The 2 Live Crews’, but I must inform you that we cannot permit the use of a parody of ‘Oh, Pretty Woman.“ * * * Nonetheless, in June or July 1989, * * * 2 Live Crew released records, cassette tapes, and compact discs of “Pretty Woman” in a collection of songs entitled “As Clean As They Wanna Be.” The albums and compact discs identify the authors of “Pretty Woman” as Orbison and Dees and its publisher as Acuff-Rose.

March 7, 1994, Decided

SOUTER, J.: We are called upon to decide whether 2 Live Crew’s commercial parody of Roy Orbison’s song, “Oh, Pretty Woman,” may be a fair use within the meaning of the Copyright Act of 1976, 17 U.S.C. § 107 (1988 ed. and Supp. IV). Although the District Court granted summary judgment for 2 Live Crew, the Court of Appeals reversed, holding the defense of

Almost a year later, after nearly a quarter of

a million copies of the recording

had been

sold,

fair use barred by the song’s commercial character

Acuff-Rose sued 2Live Crew and its record company, Luke Skyywalker Records, for copyright infringement. The District Court granted summary

and excessive borrowing. Because we hold that a parody’s commercial character is only one element to

judgment for 2 Live Crew, * * * reasoning that the commercial purpose of 2 Live Crew’s song was no

be weighed in a fair use enquiry, and that insufficient

bar to fair use; that 2 Live Crew’s version was a parody, which “quickly degenerates into a play on words, substituting predictable lyrics with shocking

consideration was given to the nature of parody in weighing the degree of copying, we reverse and remand.

ones” to show “how bland and banal the Orbison song” is; that 2 Live Crew had taken no more than was necessary to “conjure up” the original in order to

I

parody it; and that it was “extremely unlikely that 2 Live Crew’s song could adversely affect the market for the original.” * * * The District Court weighed these factors and held that 2 Live Crew’s song made fair use of Orbison’s original. * * *

In 1964, Roy Orbison and William Dees wrote a rock ballad called “Oh, Pretty Woman” and assigned their rights in it to respondent Acuff-Rose Music, Inc. * * * Acuff-Rose registered the song for copyright protection.

The Court of Appeals for the Sixth Circuit reversed and remanded. * * * Although it assumed for the purpose of its opinion that 2 Live Crew’s song was a parody of the Orbison original, the Court of Appeals thought the District Court had put too little emphasis on the fact that “every commercial use... is presumptively ... unfair,” Sony Corp. of America

Petitioners Luther R. Campbell, Christopher Wongwon, Mark Ross, and David Hobbs are collectively known as 2 Live Crew, a popular rap music group. * * * In 1989, Campbell wrote a song

entitled “Pretty Woman,” which he later described in an affidavit as intended, “through comical lyrics, to satirize the original work... .” * * * On July 5,

v. Universal City Studios, Inc., 464 U.S. 417, 451, 78

1989, 2 Live Crew’s

L. Ed. 2d 574, 104 S. Ct. 774 (1984), and it held that

manager

informed Acuff-Rose

90

“the admittedly commercial nature” of “requires the conclusion” that the first of relevant under the statute weighs against fair use. * * * Next, the Court of Appeals

the parody four factors a finding of determined

came to be known, * * * the doctrine was recognized by the American courts nonetheless. In Folsom v. Marsh, 9 F. Cas. 342 (No. 4,901) (CCD Mass. 1841), Justice Story distilled the essence of law and methodology from the earlier cases: “look to the nature and objects of the

that, by “taking the heart of the original and making it the heart of a new work,” qualitatively, taken too much.

2 Live Crew * * * Finally,

had, after

noting that the effect on the potential market for the

selections

original (and the market for derivative works) is “undoubtedly the single most important element of fair use,” Harper & Row, Publishers, Inc. v. Nation

materials used, and the degree in which the use may

Enterprises,

471

U.S.

539,

566,

85

L. Ed.

2d

588,

348.

analysis has been established by the presumption attaching to commercial uses.” * ** In sum, the purpose... use.” * * *

that

its

“blatantly

prevents this parody

It is uncontested here that 2 Live Crew’s song would be an infringement of Acuff-Rose’s rights in “Oh, Pretty Woman,” under the Copyright Act of 1976, 17 U.S.C. § 106 (1988 ed. and Supp. TV), but for a finding of fair use through parody.

it when

under the Statute of Anne courts held that in some

fair use remained

exclusively

nature

or

is

for

nonprofit

educational purposes; “(2) the nature of the copyrighted work; “(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and “(4) the effect of the use upon the potential market for or value of the copyrighted work. “The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors.” * * *

he wrote,

to secure every

of 1710, instances

expressed,

commercial

man in the enjoyment of his copy-right, one must not put manacles upon science.” * * * In copyright cases brought English

Thus

“(1) the purpose and character of the use, including whether such use is of a

* * * From the infancy of copyright protection, some opportunity for fair use of copyrighted materials has been thought necessary to fulfill copyright’s very purpose, “to promote the Progress of Science and useful Arts... .” U.S. Const., Art. I, § 8, cl. 8. * * * For as Justice Story explained, “in truth, in literature, in science and in art, there are, and can be, few, if any, things, which in an abstract sense, are strictly new and original throughout. Every book in literature, science and art, borrows, and must necessarily borrow, and use much which was well known and used before.” *** Similarly, Lord Ellenborough expressed the inherent tension in the need simultaneously to protect copyrighted material I shall think myself bound

of the

“Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include—

II

and to allow others to build upon

value

fair

We granted certiorari, 507 U.S. 1003 (1993), to determine whether 2 Live Crew’s commercial parody could be a fair use.

“while

and

Ҥ 107. Limitations on exclusive rights: Fair use

commercial

from being a

quantity

judge-made doctrine until the passage of the 1976 Copyright Act, in which Justice Story’s summary is discernible: * * *

presumption” that “harm for purposes of the fair use concluded

the

prejudice the sale, or diminish the profits, or supersede the objects, of the original work.” /d., at

105 S. Ct. 2218 (1985), the Court of Appeals faulted the District Court for “refusing to indulge the

court

made,

Congress meant § 107 “to restate the present judicial doctrine of fair use, not to change, narrow, or

* ** “fair

enlarge it in any way” and intended that courts continue the common-law tradition of fair use adjudication. *** The fair use doctrine thus

abridgements” would not infringe an author’s rights, and although the First Congress enacted our initial copyright statute, Act of May 31, 1790, 1 Stat. 124,

“permits [and application of

without any explicit reference to “fair use,” as it later

91

requires] courts to avoid rigid the copyright statute when, on

occasion, it would stifle the very creativity which that

division. * * * Suffice it to say now that parody has

law is designed to foster.” * * *

an obvious claim to transformative value, as AcuffRose itself does not deny. Like less ostensibly humorous forms of criticism, it can provide social benefit, by shedding light on an earlier work, and, in the process, creating a new one. We thus line up with the courts that have held that parody, like other comment or criticism, may claim fair use under §

The task is not to be simplified with brightline rules, for the statute, like the doctrine it recognizes, calls for case-by-case analysis. * * * The text employs the terms “including” and “such as” in the preamble paragraph to indicate the “illustrative and not limitative” function of the examples given, § 101, *** which thus provide only general

107. See, e. g., Fisher v. Dees, 794 F.2d 432 (CA9 1986) (“When “When Sunny

guidance about the sorts of copying that courts and Congress * * * Nor isolation, and the purposes

most commonly had found to may the four statutory factors one from another. All are to results weighed together, in of copyright. * * *

be fair uses. be treated in be explored, light of the

Music,

Inc.

Sonny Sniffs Glue,” a parody of Gets Blue,” is fair use); Elsmere

vy. National

Broadcasting

Co.,

482

F.

Supp. 741 (SDNY), aff'd, 623 F.2d 252 (CA2 1980) (“I Love Sodom,” a “Saturday Night Live” television

parody of “I Love New York,” is fair use); see also

A

House Report, p. 65; Senate Report, p. 61 (“Use in a parody of some of the content of the work parodied” may be fair use).

The first factor in a fair use enquiry is “the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit

The germ of parody lies in the definition of the Greek parodeia, quoted in Judge Nelson’s Court of Appeals dissent, as “a song sung alongside

educational purposes.” § 107(1). This factor draws on Justice Story’s formulation, “the nature and objects

another.” *** Modern dictionaries accordingly describe a parody as a “literary or artistic work that

of the selections made.” * * * The enquiry here may

imitates the characteristic style of an author or a work for comic effect or ridicule,’ *** or as a

be guided by the examples given in the preamble to

“composition

§ 107, looking to whether the use is for criticism, or comment, or news reporting, and the like, see § 107.

The central purpose of this investigation is to see, in Justice Story’s words, whether the new work

merely

less

will

be

Court

has

only

once

before

the

something fresh, the claim to fairness in borrowing from another’s work diminishes accordingly (if it does not vanish), and other factors, like the extent of

its commerciality, loom larger.'* Parody needs to

the

‘4 A parody that more loosely targets an original than the parody presented here may still be sufficiently aimed at an original work to come within our analysis of parody. If a parody whose wide dissemination in the market runs the risk of

significance of other factors, like commercialism, that may weigh against a finding of fair use. This

which

attention or to avoid the drudgery in working up

use is not absolutely necessary for a finding of fair use,'! * * * the goal of copyright, to promote science and the arts, is generally furthered by the creation of transformative works. Such works thus lie at the heart of the fair use doctrine’s guarantee of breathing space within the confines of copyright, * * * and the more the

in

in part, comments on that author’s works. * * * If, on the contrary, the commentary has no critical bearing on the substance or style of the original composition, which the alleged infringer merely uses to get

“transformative.” * * * Although such transformative

work,

verse

material, is the use of some elements of a prior author’s composition to create a new one that, at least

or different character, altering the first with new expression, meaning, or message; it asks, in other words, whether and to what extent the new work is

new

or

heart of any parodist’s claim to quote from existing

instead adds something new, with a further purpose

the

prose

of copyright law, the nub of the definitions, and the

“supersede[s] the objects” of the original creation, Folsom v. Marsh, supra, at 348; accord, Harper & Row, supra, at 562 (“supplanting” the original), or

transformative

in

characteristic turns of thought and phrase in an author or class of authors are imitated in such a way as to make them appear ridiculous.” * * * For the purposes

even

considered whether parody may be fair use, and that

serving as a substitute for the original or licensed

time issued no opinion because of the Court’s equal

derivatives (see infra, at 590-594, discussing factor four), it is more incumbent on one claiming fair use to establish the extent of transformation and the

" The obvious statutory exception to this focus on transformative uses is the straight reproduction of multiple copies for classroom

parody’s

critical

relationship

to the

original.

By

contrast, when there is little or no risk of market substitution, whether because of the large extent of

distribution.

92

mimic an original to make

Crew’s song, it assumed for purposes of its opinion that there was some. /d., at 1435-1436, and n.8.

its point, and so has some

claim to use the creation of its victim’s (or collective victims’) imagination, whereas satire can stand on its own two feet and so requires justification for the very

We

have

fess

difficulty

in

finding

that

act of borrowing. * * *

critical element in 2 Live Crew’s song than the Court of Appeals did, although having found it we will not

The fact that parody can claim legitimacy for some appropriation does not, of course, tell either

take the further step of evaluating its quality. The threshold question when fair use is raised in defense

parodist or judge much about where to draw the line.

of parody

Like a book review quoting the copyrighted material

reasonably be perceived.'® Whether, going beyond that, parody is in good taste or bad does not and should not matter to fair use. As Justice Holmes explained, “it would be a dangerous undertaking for

criticized, parody may or may not be fair use, and petitioners’

suggestion

that

any

parodic

use

is

presumptively fair has no more justification in law or fact than the equally hopeful claim that any use for news reporting should be presumed

Act has no hint of an evidentiary preference parodists

over

their

victims,

and

persons

fair * * *. The no

for

workable

Woman”

contains

that 2 Live

parody,

Crew’s

commenting

the

law

to

constitute

While we might not assign a high rank to the

and

commenting on the original or criticizing it, to some degree. 2 Live Crew juxtaposes the romantic musings of a man whose fantasy comes true, with degrading

say about society at large. As the District Court remarked, the words of 2 Live Crew’s song copy the original’s first line, but then “quickly degenerate into a play on words, substituting predictable lyrics with

taunts, a bawdy demand

for sex, and a sigh of relief

from paternal responsibility. The later words can be taken as a comment on the naivete of the original of

shocking ones... [that] derisively demonstrate how

an earlier day, as a rejection of its sentiment that ignores the ugliness of street life and the debasement

bland and banal the Orbison song seems to them.” ** * Judge Nelson, dissenting below, came to the same conclusion, that the 2 Live Crew song “was clearly intended to ridicule the white-bread original” and “reminds us that sexual congress with nameless streetwalkers is not necessarily the stuff of romance and is not necessarily without its consequences. The singers (there are several) have the same thing on their minds as did the lonely man with the nasal but here there is no hint of wine

to

may

parodic element here, we think it fair to say that 2 Live Crew’s song reasonably could be perceived as

criticizing the original work, whatever it may have to

voice,

only

character

Inc., 809 F. Supp. 267, 280 (SDNY 1992) (Leval, J.)

“Pretty on

trained

a parodic

(“First Amendment protections do not apply only to those who speak clearly, whose jokes are funny, and whose parodies succeed”) (trademark case).

Here, the District Court held, and the Court

assumed,

whether

themselves final judges of the worth of [a work], outside of the narrowest and most obvious limits. At the one extreme some works of genius would be sure to miss appreciation. Their very novelty would make them repulsive until the. public had learned the new language in which their author spoke.” * * * cf. Yankee Publishing Inc. v. News America Publishing,

presumption for parody could take account of the fact that parody often shades into satire when society is lampooned through its creative artifacts, or that a work may contain both parodic and nonparodic elements. Accordingly, parody, like any other use, has to work its way through the relevant factors, and be judged case by case, in light of the ends of the copyright law.

of Appeals

is

that it signifies. It is this joinder of reference and ridicule that marks off the author’s choice of parody from the other types of comment and criticism that traditionally have had a claim to fair use protection as transformative works. * * * The Court of Appeals, however, immediately cut short the enquiry into 2 Live Crew’s fair use claim by confining its treatment of the first factor essentially to one relevant fact, the commercial

and roses.”

*** Although the majority below had difficulty discerning any criticism of the original in 2 Live transformation of the earlier work, the new work’s minimal distribution in the market, the small extent to which it borrows from an original, or other factors, taking parodic aim at an original is a less critical factor in the analysis, and looser forms of parody may be found to be fair use, as may satire with lesser justification for the borrowing than would otherwise be required.

'6

that a court assessment of or great, and relation to the

The only further judgment, indeed,

may pass on a work goes to an whether the parodic element is slight the copying small or extensive in parodic element, for a work with slight

parodic element and extensive copying will be more likely to merely “supersede the objects” of the original. * * *

93

inflated the

even the force of that tendency will vary with the

significance of this fact by applying a presumption ostensibly culled from Sony, that “every commercial use of copyrighted material is presumptively... unfair... .” Sony, 464 U.S. at 451. In giving virtually

context is a further reason against elevating commerciality to hard presumptive significance. The use, for example, of a copyrighted work to advertise a product, even in a parody, will be entitled to less

dispositive weight to the commercial nature of the parody, the Court of Appeals erred.

indulgence

nature

of the use. The

court then

under

the first factor of the fair use

enquiry than the sale of a parody for its own sake, let

alone one performed a single time by students in school. * * *

The language of the statute makes clear that the commercial or nonprofit educational purpose of a work is only one element of the first factor enquiry

B

into its purpose and character. Section 107(1) uses the term “including” to begin the dependent clause referring to commercial

use,

and

the main

The second statutory factor, “the nature of the copyrighted work,” § 107(2), draws on Justice

clause

speaks of a broader investigation into “purpose and character.”

As

we

explained

in Harper

&

Story’s expression, the “value of the materials used.” *** This factor calls for recognition that some

Row,

Congress resisted attempts to narrow the ambit of this

works are closer to the core of intended copyright

traditional enquiry by adopting categories of presumptively fair use, and it urged courts to preserve the breadth of their traditionally ample view of the universe of relevant evidence. * * * Accordingly, the mere fact that a use is educational and not for profit does not insulate it from a finding of infringement,

protection than others, with the consequence that fair use is more difficult to establish when the former works are copied. *** We agree with both the District Court and the Court of Appeals that the Orbison original’s creative expression for public

dissemination falls within the core of the copyright’s

any more than the commercial character of a use bars

protective purposes. * * * This fact, however, is not

a

much help in this case, or ever likely to help much in separating the fair use sheep from the infringing

finding

of

fairness.

If,

indeed,

commerciality

carried presumptive force against a finding of fairness, the presumption would swallow nearly all of

goats in a parody case, since parodies almost invariably copy publicly known, expressive works.

the illustrative uses listed in the preamble paragraph

of

§

107,

including

news

reporting,

comment,

criticism, teaching, scholarship, and research, since these activities “are generally conducted for profit in

Cc

this country.” * * * Congress could not have intended

The third factor asks whether “the amount and substantiality of the portion used in relation to

such a rule, which certainly is not inferable from the common-law cases, arising as they did from the world of letters in which Samuel Johnson could pronounce that “no man but a blockhead ever wrote, except for money.” * * *

the copyrighted work as a whole,” § 107(3) (or, in Justice Story’s words, “the quantity and value of the materials used,” * * * are reasonable in relation to the purpose of the copying. Here, attention turns to the

persuasiveness Sony itself called for no hard evidentiary presumption. There, we emphasized the need for a “sensitive balancing of interests,” 464 U.S. at 455, n.40, noted that Congress had “eschewed a rigid, bright-line approach to fair use,” id. at [*585] 449, n.31, and stated that the commercial or nonprofit

back

with other[s] in fair use decisions,” id, at 449, n.32.

The

Court

of

Appeals’

elevation

to the

first of the statutory

factors,

for,

as

in

prior cases, we recognize that the extent of permissible copying varies with the purpose and character of the use. * * * The facts bearing on this factor will also tend to address the fourth, by revealing the degree to which the parody may serve as a market substitute for the original or potentially licensed derivatives. * * *

educational character of a work is “not conclusive,” id., at 448-449, but rather a fact to be “weighed along

***

of a parodist’s justification for the

particular copying done, and the enquiry will harken

of one

sentence from Sony to a per se rule thus runs as much

The

counter to Sony itself as to the long common-law

District

Court

considered

the

song’s

parodic purpose in finding that 2 Live Crew had not helped themselves overmuch. *** The Court of Appeals disagreed, stating that “while it may not be

tradition of fair use adjudication. Rather, as we explained in Harper & Row, Sony stands for the proposition that the “fact that a publication was commercial as opposed to nonprofit is a separate factor that tends to weigh against a finding of fair use.” 471 U.S. at 562. But that is all, and the fact that

inappropriate to find that no more was taken than necessary, the copying was qualitatively substantial. ... We conclude that taking the heart of the original and making it the heart of a new work

94

was to purloin a substantial portion of the essence of the original.” 972 F.2d at 1438.

which parody takes aim. Copying does not become excessive in relation to parodic purpose merely because the portion taken was the original’s heart. If 2 Live Crew had copied a significantly less

The Court of Appeals is of course correct that this factor calls for thought not only about the

memorable part of the original, it is difficult to see how its parodic character would have come through.

quantity of the materials used, but about their quality and importance, too. In Harper & Row, for example,

* Ok OK

the Nation had taken only some 300 words out of President Ford’s memoirs, but we signaled the significance of the quotations in finding them to amount to “the heart of the book,” the part most likely to be news-worthy and important in licensing

This is not, of course, to say that anyone

who calls himself a parodist can skim the cream and get away scot free. In parody, as in news reporting, *** context is everything, and the question of

serialization. * * * We also agree with the Court of Appeals that whether “a substantial portion of the infringing work was copied verbatim” from the

fairness asks what else the parodist did besides go to the heart of the original. It is significant that 2 Live Crew not only copied the first line of the original, but thereafter departed markedly from the Orbison lyrics for its own ends. 2 Live Crew not only copied the

copyrighted work is a relevant question, * * * for it may reveal a dearth of transformative character or

purpose under the first factor, or a greater likelihood

bass riff and repeated it, * * * but also produced otherwise distinctive sounds, interposing “scraper”

of market harm under the fourth; a work composed primarily of an original, particularly its heart, with little added or changed, is more likely to be a merely superseding use, fulfilling demand for the original.

noise, overlaying the music with solos in different keys, and altering the drum beat. * * * This is not a case,

then,

where

“a

substantial

portion”

of

the

parody itself is composed of a “verbatim” copying of Where

we

part

company

with

the

court

the original. It is not, that is, a case where the parody

below is in applying these guides to parody, and in

is so insubstantial, as compared to the copying, that

particular to parody in the song before us. Parody presents a difficult case. Parody’s humor, or in any

the third factor must be resolved as a matter of law against the parodists.

event its comment, necessarily springs from recognizable allusion to its object through distorted imitation. Its art lies in the tension between a known original and its parodic twin. When parody takes aim at a particular original work, the parody must be able to “conjure up” at least enough of that original to make the object of its critical wit recognizable. * * * What makes for this recognition is quotation of the

Suffice it to say here that, as to the lyrics, we

think the Court of Appeals correctly suggested that “no more was taken than necessary,”

music, we express no opinion whether repetition of the bass riff is excessive copying, and we remand to permit evaluation of the amount taken, in light of the song’s parodic purpose and _ character, its transformative elements, and considerations of the potential for market substitution sketched more fully below.

original’s most distinctive or memorable features, which the parodist can be sure the audience will know. Once enough has been taken to assure identification, how much more is reasonable will depend,

say,

on

the

extent

to

which

the

* * * but just

for that reason, we fail to see how the copying can be excessive in relation to its parodic purpose, even if the portion taken is the original’s “heart.” As to the

song’s

overriding purpose and character is to parody the original or, in contrast, the likelihood that the parody may serve as a market substitute for the original. But using some characteristic features cannot be avoided.

D

insufficiently appreciative of parody’s need for the recognizable sight or sound when it ruled 2 Live

The fourth fair use factor is “the effect of the use upon the potential market for or value of the copyrighted work.” § 107(4). It requires courts to consider not only the extent of market harm caused

Crew’s use unreasonable as a matter of law. It is true, of course, that 2 Live Crew copied the characteristic opening bass riff (or musical phrase) of the original,

also “whether unrestricted and widespread conduct of the sort engaged in by the defendant . . . would result

and true that the words of the first line copy the Orbison lyrics. But if quotation of the opening riff

in a substantially adverse impact on the potential market” for the original. * * * The enquiry “must

and the first line may be said to go to the “heart” of the original, the heart is also what most readily conjures up the song for parody, and it is the heart at

take account not only of harm to the original but also of harm to the market for derivative works.” Harper

We

think

the

Court

of

Appeals

was

by the particular actions of the alleged infringer, but

& Row, supra, at 568.

95

for

the

original,

it does

not

produce

a

harm

cognizable under the Copyright Act. Because “parody may quite legitimately aim at garroting the original, destroying it commercially as well as artistically,” *** the role of the courts is to distinguish between “biting criticism [that merely]

Since fair use is an affirmative defense, * * * its proponent would have difficulty carrying the burden of demonstrating fair use without favorable

evidence about relevant markets. * * * In moving for summary judgment, 2 Live Crew left themselves at just such a disadvantage when they failed to address

the effect on the market for rap derivatives, and

suppresses demand [and] which] usurps it.” * * *

copyright

confined themselves to uncontroverted submissions that there was no likely effect on the market for the original. They did not, however, thereby subject

This remediable

themselves to the evidentiary presumption applied by

disparagement is reflected in the rule that there is no

the Court of Appeals. In assessing the likelihood of

protectible

significant market harm, the Court of Appeals quoted

market for potential derivative uses includes only

from language in Sony that ““‘if the intended use is for commercial gain, that likelihood may be presumed. But if it is for a noncommercial purpose, the

those that creators of original works would in general develop or license others to develop. Yet the unlikelihood that creators of imaginative works will

distinction displacement derivative

market

infringement[,

between potentially and — unremediable for

criticism.

The

likelihood must be demonstrated.’ * * * The court

license critical reviews or lampoons of their own

reasoned that because “the use of the copyrighted work is wholly commercial, . . . we presume that a likelihood of future harm to Acuff-Rose exists.” * * * In so doing, the court resolved the fourth factor

productions removes such uses from the of a potential licensing market. “People criticism, but they only want praise.” * the extent that the opinion below may be

against 2 Live Crew, just as it had the first, by applying a presumption about the effect of

considered harm to the market for parodies of “Oh, Pretty Woman,” * * * the court erred. * * *

commercial use, a presumption which as applied here we hold to be error.

In explaining why the law recognizes no derivative market for critical works, including parody, we have, of course, been speaking of the later work as if it had nothing but a critical aspect (i.e., “parody pure and simple,” supra, at 591). But the later work may have a more complex character, with effects not only in the arena of criticism but also in protectible markets for derivative works, too. In that sort of case, the law looks beyond the criticism to the other elements of the work, as it does here. 2 Live Crew’s song comprises not only parody but also rap

No “presumption” or inference of market harm that might find support in Sony is applicable to a case involving something beyond mere duplication

for commercial

purposes.

Sony’s

discussion

of a

presumption contrasts a context of verbatim copying of the original in its entirety for commercial purposes, with the noncommercial context of Sony

itself (home copying of television programming). In the former circumstances, what Sony said simply makes common sense: when a commercial use amounts to mere duplication of the entirety of an original, it clearly “supersede[s] the objects,” * * * of the original and serves as a market replacement for it, making it likely that cognizable market harm to the original will occur. * * * But when, on the contrary, the second use is transformative, market substitution is at least less certain, and market harm may not be so readily inferred. Indeed, as to parody pure and simple, it is more likely that the new work will not affect the market for the original in a way cognizable

music, and the derivative market for rap music is a proper focus of enquiry * * *. Evidence of substantial

harm to it would weigh against a finding of fair use, *** because the licensing of derivatives is an important economic incentive to the creation of originals. See 17 U.S.C. § 106(2) (copyright owner has rights to derivative works). Of course, the only harm to derivatives that need concern us, as discussed above, is the harm of market substitution. The fact that a parody may impair the market for derivative uses by the very effectiveness of its critical

under this factor, that is, by acting as a substitute for it (“superseding

[its]

objects”).

***

This

commentary is no more relevant under copyright than the like threat to the original market. * * *

is so

because the parody and the original usually serve different market functions. Bisceglia, ASCAP,

Although 2Live Crew submitted uncontroverted affidavits on the question of market harm to the original, neither they, nor Acuff-Rose, introduced evidence or affidavits addressing the likely effect of 2 Live Crew’s parodic rap song on the

Copyright Law Symposium, No. 34, at 23.

We do not, of course, suggest that a parody may not harm the market at all, but when

very notion ask . . . for * * Thus, to read to have

a lethal

parody, like a scathing theater review, kills demand

market for a nonparody, rap version of “Oh, Pretty

96

Woman.” And while Acuff-Rose would have us find evidence of a rap market in the very facts that 2 Live Crew recorded a rap parody of “Oh, Pretty Woman” and another rap group sought a license to record a rap

Pretty Woman, that you look lovely as can be Are you lonely just like me?

derivative, there was no evidence that a potential rap

Pretty Woman, stop a while, Pretty Woman, talk a while,

market

was

harmed

in any way

by 2 Live Crew’s

parody, rap version. The fact that 2 Live Crew’s parody sold as part of a collection of rap songs says very little about the parody’s effect on a market for a rap version of the original, either of the music alone or of the music with its lyrics. The District Court

Pretty Woman give your smile to me Pretty Pretty Pretty “Cause

Woman, yeah, yeah, yeah Woman, look my way, Woman, say you’ll stay with me I need you, Ill treat you right

essentially passed on this issue, observing that AcuffRose is free to record “whatever version of the

Come to me baby, Be mine tonight

original it desires,” * * *; the Court of Appeals went the other way by erroneous presumption. Contrary to each treatment, it is impossible to deal with the fourth

Pretty Woman, don’t walk on by, Pretty Woman, don’t make me cry, Pretty Woman, don’t walk away,

factor except by recognizing that a silent record on an

Hey, O. K.

important factor bearing on fair use disentitled the proponent of the defense, 2 Live Crew, to summary judgment. The evidentiary hole will doubtless be

If that’s the way it must be, O. K. I guess I'll go on home, it’s late There’Il be tomorrow night, but wait!

plugged on remand. Il

conclude

It was error for the Court of Appeals to that the commercial nature of 2 Live

Crew’s parody of “Oh, Pretty Woman” rendered it presumptively unfair. No such _ evidentiary presumption is available to address either the first factor, the character and

fourth,

market

harm,

purpose

in

What do I see Is she walking back to me? Yeah, she’s walking back to me! Oh, Pretty Woman.

APPENDIX B TO OPINION OF THE COURT “Pretty Woman” as Recorded by 2 Live Crew

of the use, or the

determining

whether

a

transformative use, such as parody, is a fair one. The

court also erred in holding that 2 Live Crew had necessarily copied excessively from the Orbison

original, considering the parodic purpose of the use. We therefore reverse the judgment of the Court of Appeals and remand the case for further proceedings

consistent with this opinion.

Pretty woman walkin’ down Pretty woman girl you look Pretty woman you bring me Pretty woman you make me Oh, pretty woman

the street so sweet down to that knee wanna beg please

Big hairy woman you need to shave that stuff Big hairy woman you know I bet it’s tough

Big hairy woman all that hair it ain’t legit It is so ordered.

“Cause you look like ‘Cousin It’

Big hairy woman APPENDIX A TO OPINION OF THE COURT “Oh, Pretty Woman” Dees

by Roy Orbison and William

Bald headed woman girl your hair won’t grow Bald headed woman you got a teeny weeny afro Bald headed woman you know your hair could Jook

nice Pretty Woman, walking down the street, Pretty Woman, the kind I like to meet, Pretty Woman, I don’t believe you, you’re not the truth,

No one could look as good as you

Bald headed woman first you got to roll it with rice Bald headed woman here, let me get this hunk of biz

for ya Ya know what I’m saying you look better than rice a roni Oh bald headed woman

Mercy Pretty Woman, won’t you pardon me, Pretty Woman, I couldn’t help but see,

Big hairy woman come on in And don’t forget your bald headed friend Hey pretty woman let the boys

Two timin’ woman that takes a load off my mind

Jump in

Two timin’ woman now I know the baby ain’t mine Two timin’ woman girl you know you ain’t right Two timin’ woman you’s out with my boy last night

Oh, two timin’ woman

Oh pretty woman

More recently, the Internet has become the new copyright battleground, as copyrighted music and videos are posted online, frequently without the permission of the copyright holder.

With the development of formats such as MP3, individuals obtained the ability to download and swap music files with ease. Not surprisingly, this type of music "sharing" became quite popular, eventually spawning the development of large databases packed with easily accessible music files. The music industry responded with a number of lawsuits, two of which follow here.

These

cases revisit significant copyright issues such as fair use in the context of new technology, particularly with regard to the Internet. enables users to download MP3 music files without payment. On January 7, 2000, plaintiffs Jerry Leiber,

A & M RECORDS v. NAPSTER

Mike

Stoller,

complaint

and

Frank

for vicarious

Music

Corporation

and contributory

filed a

copyright

infringement on behalf of a putative class of similarly-situated music publishers ("music publisher

No. C 99-5183 MHP, No. C 00-0074 MHP

plaintiffs")

against Napster,

Eileen Richardson.

UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA

The

Inc.

music

and

former

CEO

publisher plaintiffs

filed a first amended complaint on April 6, 2000, and on May 24, 2000, the court entered a stipulation of dismissal of all claims against Richardson. Now before this court is the record company and music publisher plaintiffs' joint motion to preliminarily

enjoin Napster, Inc. from engaging in or assisting others in transmitting,

114 F. Supp. 2d 896

without the express permission of the rights owner. In opposition to this motion, defendant seeks to expand the "fair use" doctrine articulated in Sony

August 10, 2000

Corp. of America vy. Universal City Studios, Inc., 464

The matter before the court concerns the boundary between sharing and theft, personal use and the unauthorized worldwide distribution of copyrighted music and sound recordings.’ On December

6,

1999,

A&M

Records

and

US. 417, 78 L. Ed. 2d 574, 104 S. Ct. 774 (1984), to encompass the massive downloading of MP3 files by Napster users. Alternatively, defendant contends that, even if this third-party activity constitutes direct copyright infringement, plaintiffs have not shown probable success on the merits of their contributory and vicarious infringement claims. Defendant also asks the court to find that copyright holders are not

seventeen

other record companies ("record company plaintiffs") filed a complaint for contributory and vicarious copyright infringement, violations of the California Civil Code section 980(a)(2), and unfair competition

against Napster,

copying, downloading, uploading, or distributing copyrighted music

injured by a service created and promoted to facilitate

Inc.,’ an Internet start-up that

' Hereafter, the court will use the term "music" to encompass both musical compositions and

its software, servers, search functions, and indexing

sound recordings, unless otherwise specifically noted.

functions. Where "Napster" appears as an adjective, the aspect of the service to which the adjective refers

? For the sake of clarity, the court will refer to the defendant Internet company as "Napster, Inc." The term "Napster" will be used to denote Napster,

should be clear from the context. The term "Napster

Inc.'s integrated service, including but not limited to

software to download and/or upload files.

user"

98

refers to any

individual

who

uses Napster

the free downloading of music files, the vast majority of which are copyrighted.

Inc., 2000 WL 573136, at *1 (N.D. Cal. May 2000) (citing Def.'s Mot. for Summ. Adjud.) at 4.

Having considered the parties' arguments, the court grants plaintiffs' motion for a preliminary injunction against Napster, Inc. The court makes the

2. Although Napster was the brainchild of a college

student who wanted to facilitate music-swapping by his roommate, see 1 Frackman Dec., Exh. B (Fanning

following Findings of Fact and Conclusions of Law

Dep.) at 31:10-35:1, it is far from a simple tool of

to support the preliminary injunction under Federal Rules of Civil Procedure 65(d).

distribution among friends and family. According to defendant's internal documents, there will be 75 million Napster users by the end of 2000. See 1 Frackman Dec., Exh. A (Richardson Dep.) at 318:19319:1, Exh. 166 at 002725. At one point, defendant estimated that even without marketing, its "viral service" was growing by more than 200 percent per month. Id., Exh. 127 at ER00130. Approximately 10,000 music files are shared per second using Napster, and every second more than 100 users attempt to connect to the system. See Kessler Dec. P

I. FINDINGS OF FACT A. MP3 Technology 1. Digital compression technology makes it possible

to store audio recordings in a digital format that uses less memory and may be uploaded and downloaded over the Internet. See David M. Lisi Dec. (Tygar Rep.) at 11. ***

29.

2. Consumers typically acquire MP3 files in two ways. First, users may download audio recordings that have already been converted into MP3 format by

3. Napster, Inc. currently collects no revenues and charges its clientele no fees; it is a free service. See, e.g., | Frackman Dec., Exh. A (Richardson Dep.) at

using an Internet service such as Napster. See Lisi

179:15.

Dec. (Tygar Rep.) at 11. Second, "ripping" software makes it possible to copy an audio compact disc ("CD") directly onto a computer hard-drive; ripping

software

compresses

the

millions

of

bytes

of

information on a typical CD into a smaller MP3

file

However,

been

a

non-profit

Defendant eventually plans to "monetize" its user base. See id. at 115:24-116:13; Teece Rep. at 4, 7-11. Potential revenue sources include targeted email; advertising; commissions from links to commercial

websites;

and

direct marketing

of CDs,

Napster products, and CD burners and rippers. ***

B. Defendant's Business

4. Napster Inc.'s value--which is measured, at least in part, by the size of its user base--lies between 60 and

1. Napster, Inc. is a start-up company based in San Mateo, California. It distributes its proprietary file-

its Internet

80 million dollars. See Teece Rep. at 11-12; Def.'s

website. People who have downloaded this software can log-on to the Napster system and share MP3 music files with other users who are also logged-on to the system. See Kessler Dec. P 6. It is uncontradicted that Napster users currently upload or

Opp. at 35. Defendant obtained substantial capital infusions after the onset of this litigation. For example, in May 2000, the venture firm Hummer Winblad purchased a _ twenty-percent ownership interest in the company for 13 million dollars; other imvestors simultaneously invested 1.5 million dollars. See Hank Barry Dec. P 7.

download

MP3

free

never

user base. ***

Kessler Dec. P 32; 1 Laurence F. Pulgram Dec., Exh. A (Conroy Dep.) at 13:19-24.

software

it has

organization. See id. at 116:10. It plans to delay the maximization of revenues while it attracts a large

that requires a fraction of the storage space. See id.;

sharing

12,

of charge

files without

via

payment to each other,

defendant, or copyright owners. According to a Napster, Inc. executive summary, the Napster service gives its users the unprecedented

5. The evidence shows that virtually all Napster users download or upload copyrighted files and that the vast majority of the music available on Napster is

ability to "locate music by their favorite artists in MP3 format." | Frackman Dec., Exh. A (Richardson Dep.), Exh. 127 at ER00031. Defendant boasts that it "takes

the

frustration

out of locating

servers

copyrighted.

Eighty-seven

percent

of

the

files

sampled by plaintiffs' expert, Dr. Ingram Olkin, "belong to or are administered by plaintiffs or other copyright holders." Olkin Rep. at 7. After analyzing

with

MP3 files" by providing a peer-to-peer file-sharing system that allows Napster account holders to conduct relatively sophisticated searches for music files on the hard drives of millions of other

Olkin's data, Charles J. Hausman, anti-piracy counsel for the RIAA, determined that 834 out of 1,150 files in Olkin's download database belong to or are

anonymous users. See A&M Records, Inc. v. Napster,

99

administered by plaintiffs; plaintiffs alone own the

Napster website advertised the ease with which users

copyrights to more than seventy percent of the 1,150 files. See Charles J. Hausman Dec. P 8. Napster users shared these files without authorization. See id.

could find their favorite popular music without "wading through page after page of unknown artists." 1 Frackman Dec., Exh. C (Parker Dep.) at 104:16105:10, Exh. 235. Defendant did not even create the New Artist Program that runs on its Internet website

6.

Napster,

Inc.

has

never

obtained

licenses

to

until April 2000--well after plaintiffs filed this action.

distribute or download, or to facilitate others in distributing or downloading, the music that plaintiffs own. See Kevin Conroy Dec. P 4; Richard Cottrell Dec. P 5; Mark R. Eisenberg Dec. P 21; Lawrence Kenswil Dec. P 15; Paul Vidich Dec. P 8; Mike Stoller Dec. P 11.

See Krause Dec. P 9, Exh. A. *** 10. Defendant employs the term "space-shifting" to refer to the process of converting a CD the consumer

already owns into MP3 format and using Napster to transfer

1

Frackman

162:14,

Dec.,

Exh.

254,

Exh.

at

C

(Parker

SF00099

Dep.),

(declaring

the

music

to

a different

computer--from

home to office, for example.'° See Def. Opp. at 12.

7. Defendant's internal documents indicate that it seeks to take over, or at least threaten, plaintiffs' role in the promotion and distribution of music. See, e.g.,

The court finds that space-shifting accounts for a de minimis portion of Napster use and is not a significant aspect of defendant's business. According to the court's understanding of the Napster technology, a user who wanted to space-shift files

160:1-

that

"ultimately Napster could evolve into a full-fledged music distribution platform, usurping the record industry as we know it today and allowing us to digitally promote and distribute emerging artists at a

from her home to her office would have to log-on to the system from her home computer, leave that computer online, commute to work, and log-on to

Napster from her office computer to access the desired file. In the meantime, many users might download it before she reached the office. Common

fraction of the cost" but noting that "we should focus on our realistic short-term goals while wooing the industry before we try to undermine it").

sense dictates that this use does not draw users to the

system. Defendant fails to cite a single Napster, Inc.

8. Defendant's internal documents also demonstrate that its executives knew Napster users were engaging

document indicating that the company saw spaceshifting as an attraction for its user base, and survey

in unauthorized downloading and uploading of copyrighted music. See, e.g., 1 Frackman Dec., Exh.

evidence shows that almost half of college-student

C (Parker Dep.) at 160:1-162:14, Exh. 254 at SF00100 (stating that Napster users "are exchanging pirated music."); id. at SFO0102 ("We are not just making pirated music available but also pushing demand"). Several Napster executives admitted in their depositions that they believed many of the millions of MP3 music files available on Napster were copyrighted. See, e.g., | Frackman Dec., Exh. B (Fanning Dep.) at 105:10-108:2.

survey respondents previously owned less than ten percent of the songs they have downloaded. See E. Deborah Jay Rep. at 4, 21 & Tbl. 7.

C. The Napster Technology '° Defendant also provides an audio player capable of playing MP3 files on a user's hard drive,

regardless of how

9. At least on paper, the promotion of new artists constituted an aspect of defendant's plan as early as October 1999. See Sean F. Parker Dec. P 5 & Exh. B

n8; Scott Krause Dec. P 6. New or unsigned artists now may promote their works and distribute them in MP3 format via the Napster service. See Krause Dec. PP 8-15. Napster, Inc. has sought business alliances

and

developed

both

Internet-

and

software-based

See

relief.

See

id. While

a consumer

might rip CDs and then play the resultant MP3 files on the Napster player, the court rejects any suggestion that this activity constitutes a substantial, non-infringing use of Napster for the same reasons it dismisses defendant’ argument about space-shifting from home to office. The court also notes that, because the audio player can only play music files which a user already possesses, it cannot be used for sampling.

However, the court finds that the New Artist Program accounts for a small portion of Napster use and did not become central to defendant's business strategy until this action made it convenient to give

top billing. An

obtained.

upload or download music and, hence, is not relevant

to the requested

technologies to support its New Artist Program. See Parker Dec.

the program

those files were

Edward Kessler Reply Dec. in Support of Def.'s Mot. for Summ. Adjud. P 29. Neither party has briefed the function of the audio player in support of its position on the necessity of a preliminary injunction. However, the player has little or no connection to the alleged copying that occurs when Napster users

early version of the

100

1.

Internet

users

may

download

by employing the hotlist tool featured in the client software. See id. P 12.

defendant's

proprietary MusicShare software free of charge from the Napster website. This free software enables users to access the Napster computer network. See Kessler

7. An account holder may use the search tools included in the Napster client software to find MP3 files. See id. P 10. The server-side application software maintains a search index that is updated in

Dec. P 6. 2. The software becomes fully functional after users

real time as users log-on and -off of the system. ***

register with Napster by selecting an account name, or "user name," and a password. See Kessler Dec. PP 6, 23. Persons who register may include biographical

9. The content of the actual MP3 file is transferred over the Internet between users, not through the Napster servers. See Kessler Dec. P 12; A&M

data, but registration does not require a real name or address. See 2 Frackman Dec., Exh. E (Kessler Dep.) at 255:20-257:22. Napster does not associate user

Records, Inc. v. Napster, Inc., 2000 WL 573136, at *7

(N.D. Cal. May 12, 2000). However, users would not

be able

names with the biographical information that individuals provide at registration. See id. Indeed, after a user logs-on, her physical address information is no longer available to the Napster server. See id. 3. The

software

features a browser

interface,

Napster system.

users to compile

and

store

the

uploaded

file names

and

***

11. Defendant also provides Napster users with a chat service. Its central servers permit users who are logged-on to communicate with other online users, including those whose user names comprise the

search

engine, and chat functions that operate in conjunction with defendant's online network of servers. See id. PP 6, 13. The software also contains a "hotlist" tool that

allows

to access

corresponding routing data without signing on to the

hotlist.

lists of other

See

Kessler

Dec.

P

13.

Aside

from

communicating with specific online users logged-on to the same cluster of servers, the chat service allows users to communicate in groups. Defendant organizes these groups within "channels" or "chat rooms"

account holders' user names. See id. P 8. In addition, the Napster software may be used to play and categorize audio files, which users can store in specific file directories on their hard drives. See id. PP 6-7. Those directories, which allow account holders to share files on Napster, constitute the "user library." Id. Some users store their MP3 files in such directories; others do not. See id.

named

after particular musical

genres.

See id.; 2

Pulgram Dec., Exh. B (2 Fanning Dep.) at 219:4-14. Alternatively, users can create their own channels in which to communicate. See Kessler Dec. P 13.

13. Account holders who access the Napster network

12. Defendant's New Artist Program technology functions in two interrelated environments: (a) on its Internet website and (b) through its network-client browser and search technology. See Krause Dec. PP

may

of

9-15. The website version performs several functions.

designated hotlist names only within the cluster to which they are assigned. See id. Users can access the

that consists of certain biographical and descriptive

4. Defendant maintains clusters of servers that compose its network or system. See Kessler Dec. P communicate,

share

files,

and

learn

It allows new or unsigned artists to create a "profile" data including artist and band names, similar artists or influences, and news about the band. See id. PP 910, Exh. C. Defendant only accepts completed forms if the submitting artist authorizes Napster users to

network of servers free of charge.

5. Once an account holder signs on to the Napster network,

the

Napster

browser

interacts

with

its

proprietary server-side software. See id. PP 7, 8; 2

share his music. See id. P 10, Exh. D. Once defendant

Frackman

accepts the profile, it stores all of the relevant information in a database linked to its Internet website. See id. P 11. Defendant has accepted several

Dec.,

Exh.

E

(Kessler

Dep.)

at

54:16-

56:10. If a user sets the "allowable uploads" function of the MusicShare software above zero, all of the

thousand such profiles. ***

MP3 file names she stores in her user library automatically become available to other online Napster users. See Kessler Dec. P 7.***

Napster account holders who use MusicShare software and log-on to the Napster system can locate and download new artists' songs in the same manner

6. A user who is logged-on to the Napster servers via

they would find and utilizing the search libraries. See id. P 9. both new artists and

the client software may access the content of other users' uploaded "locations" in one of two ways: (a) by utilizing defendant's proprietary search engine, or (b)

101

download any other files: by engine, or by browsing user While on the Napster network, other users may use the chat

function to market music directly or learn about new

E. Effect of Napster on the Market for Plaintiffs’

artists. See id. PP 8, 15.

Copyrighted Works

D. Plaintiffs' Business

1. The court finds that Napster use is likely to reduce CD purchases by college students, whom defendant admits constitute a key demographic. ***

1. The music publisher plaintiffs compose music and write songs. See, e.g., Stoller Dec. P 2. They depend financially upon the sale of sound recordings because they earn royalties from such sales. See id. at PP 2, 11, 13. However, they do not get a royalty

2. Because plaintiffs entered the digital download market very recently, or plan to enter it in the next few months, they are especially vulnerable to direct competition from Napster, Inc. See Teece Rep. at 1516. The court finds that, in choosing between the free Napster service and _ pay-per-download _ sites, consumers are likely to choose Napster. See id. at 14; Jay Rep. at 4, 18 (reaching this conclusion with regard to a survey sample of college students).

when a Napster user uploads or downloads an MP3 file

of

their

authorization.

compositions

See id. P

without

payment

11. The record

or

company

plaintiffs' sound recordings also result from a substantial investment of money, time, manpower, and creativity. See Conroy Dec. P 5; Cottrell Dec. 5; Eisenberg Dec. PP 5, 21; Kenswil Dec. P 5.

Defendant's economic expert, Dr. Robert E. Hall, opines that plaintiffs' music could still command a high price after a period when the price has been zero due to Napster use; thus, he concludes, plaintiffs will not suffer irreparable harm between now and a trial verdict against defendant. See Lisi Dec. (Hall Rep.) PP 39, 54. This argument does not square with Hall's assertion that preliminarily enjoining defendant will put it out of business because users will switch to services offered by "kindred spirits." Hall Rep. P 1519, 73; see also Barry Dec. P 13. If this is true, consumers will not necessarily resume buying music

In contrast, defendant invests nothing in the content of the music which means that, compared with plaintiffs, it incurs virtually no costs in providing a wide array of music to satisfy consumer demand. See Teece Rep. at 14. 2. To make a profit, the record company plaintiffs largely rely on the success of "hit" or popular recordings, which may constitute as little as ten or fifteen percent of albums released. See. e.g., Eisenberg Dec. P 7. Many, or all, of their top

recordings have been available for free on Napster.

if Napster is enjoined; rather, they will go to other sites offering free MP3 files. Indeed, as Dr. David J.

See Frank Creighton Dec. P 5.

Teece

3. The record company plaintiffs have invested substantial time, effort, and funds in actual or planned entry into the digital downloading market.

who

obtain

MP3

so

files for

free using Napster can retain and play them indefinitely--and, even if they download a song to make a purchasing decision, they may decide not to buy the music.

contributed

to

a

new

downloading

Hall also maintains that Napster, Inc. will increase the volume of plaintiffs' online sales by stimulating consumer investment in the hardware and software needed to obtain and play MP3 files. See Hall Rep. PP 45-49. However, he ignores evidence of reduced CD-buying among college students due to Napster use, see Jay Rep. at 18, and the data upon which he relies to argue that Napster has enhanced sales is either weak (in the case of the Fader Report) or unavailable for the court's review. *** The court therefore finds that the barriers to commercial

that users can only play them for a finite period of time--often less than a month. *** In contrast, persons

has

free--an attitude that creates formidable hurdles for

4. Promotional samples offered by plaintiffs and other retail sites differ significantly from using Napster to decide whether to buy a CD. The record company plaintiffs have made some free downloads available but have limited them in amount and duration. They have not provided entire albums, and

typically have been "timed-out"

defendant

the establishment of a commercial market. See Teece Rep. at 14-18.

28 KK

the downloads

avers,

attitude that digitally-downloaded songs ought to be

distribution

While Napster users can burn CDs

comprised of unauthorized downloads they obtained to "sample" new songs, sampling on sites affiliated with plaintiffs does not substitute for purchasing the

sense

of

entitlement to free music probably outweigh benefits that defendant purports to confer.

posed

by

an

emerging

the

3. Downloading on Napster also has the potential to disrupt plaintiffs’ promotional efforts because it does not involve any of the restrictions on timing, amount,

entire disc. See Teece Rep. at 17.

or selection that plaintiffs impose when they offer free music

102

files. See Conroy

Dec.

P 9-17; Cottrell

Dec. P 15; Eisenberg Dec. P 13; Kenswil Dec. P 12; Vidich Dec. PP 7(d), 8; see also Teece Rep. at 18. a CD,

4. In the instant action, the purpose and character of the use militates against a finding of fair use. Ascertaining whether the new work transforms the copyrighted material satisfies the main goal of the

sampling on Napster is vastly different than that offered by plaintiffs. On Napster, the user--not the

first factor. See Campbell v. Acuff-Rose Music, Inc., 510 US. 569, 579, 127 L. Ed. 2d 500, 114 S. Ct. 1164

copyright owner--determines how sample and how long to keep it. ***

(1994). Plaintiff persuasively argues that downloading MP3 files does not transform the copyrighted music. See UMG Recordings, Inc. v. MP3.com. Inc., 92 F. Supp. 2d 349, 351 (S.D.N.Y.

Even if Napster users sometimes download files to determine

whether

C.

they

Affirmative

want

to purchase

Defense

much

music

of Fair

Use

to and

Substantial Non-Infringing Use

2000)

1. Defendant asserts the affirmative defenses of fair use and substantial non-infringing use. The latter

defense

is also

known

as

the

staple

article

of

commerce doctrine. See Sony, 464 U.S. at 442. Sony

of commercially significant noninfringing uses." Id.

Supreme

Court also declared

in Sony,

commercial

"Any

the

burden

of

proving

these

defenses. See Bateman v. Mnemonics,

1532,

repackaging

copyrighted

use

weighs

against,

but

does

not

preclude, a determination of fairness. See Acuff-Rose,

individual may reproduce a copyrighted work for a ‘fair use'; the copyright holder does not possess the exclusive right to such a use." Jd. at 433. Defendant

bears

that

5. Under the first factor, the court must also determine whether the use is commercial. In AcuffRose, the Supreme Court clarified that a finding of

stands for the rule that a manufacturer is not liable for selling a "staple article of commerce" that is "capable The

(concluding

recordings in MP3 format suitable for downloading "adds no 'new aesthetics, new insights and understandings' to the original").

510 U.S. at 584. 6. If a use is non-commercial, the plaintiff bears the burden of showing a meaningful likelihood that it would adversely affect the potential market for the

affirmative Inc., 79 F.3d

1542 n.22 (11th Cir. 1996) ("It is clear the

copyrighted work if it became widespread. See Sony, 464 US. at 451.

burden of proving fair use is always on the putative infringer.").

7. Although downloading and uploading MP3 music files is not paradigmatic commercial activity, it is

2. For the reasons set forth below, the court finds that any potential non-infringing use of the Napster service is minimal or connected to the infringing activity, or both. The substantial or commercially significant use of the service was, and continues to

also not personal use in the traditional sense. Plaintiffs have not shown that the majority of Napster users download music to sell--that is, for profit. However, given the vast scale of Napster use among anonymous individuals, the court finds that

be, the unauthorized downloading and uploading of popular music, most of which is copyrighted.

downloading and uploading MP3 music files with the assistance of Napster are not private uses. At the very least, a host user sending a file cannot be said to engage in a personal use when distributing that file to an anonymous requester. Moreover, the fact that Napster users get for free something they would ordinarily have to buy suggests that they reap economic advantages from Napster use. See Seger Enters. Ltd. v. MAPHIA, 857 F. Supp. 679, 687 (N.D. Cal. 1994) ("Sega I") (holding that copying to save users expense of purchasing authorized copies has commercial character and thus weighs against finding

3. Section 107 of the Copyright Act provides a nonexhaustive list of fair use factors. These factors include:

(1) the purpose and character of the use, including whether such use is of a

commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the

copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the

of fair use); cf.

American

Texaco,

F.3d

Inc.,

60

913,

Geophysical 922

(2d

Union v. Cir.

1994)

(holding that for-profit enterprise which made unauthorized copies of scholarly articles to facilitate scientific research reaped indirect economic advantage from copying and, hence, that copying

copyrighted work.

17 USC. § 107.

constituted commercial use).

103

musical

Conroy Dec. P 9; Eisenberg Dec. P 16. They only

compositions and sound recordings are creative in nature; they constitute entertainment, which cuts against a finding of fair use under the second factor.

make promotional downloads available on a highly restricted basis. See Conroy Dec. P 9-17; Cottrell

See Harper & Row Publishers, Inc. v. Nation Enters.,

Vidich Dec. PP 7(d), 8. Copyright owners also earn royalties from streamed song samples on retail

8. The

court

finds

that the copyrighted

Dec. P 15; Eisenberg Dec. P 13; Kenswil Dec. P 12;

471 US. 539, 563, 85 L. Ed. 2d 588, 105 S. Ct. 2218

websites like Amazon.com. See Lambert Reply Dec. P 3. Second, the majority of VCR purchasers in Sony

(1985); Sega I, 857 F. Supp. at 687; Playboy Enters., Inc. v. Frena, 839 F. Supp. 1552, 1558 (M.D. Fla. 1993) (citing In re New Era Publications Int'l v.

did not distribute taped television broadcasts, but merely enjoyed them at home. See id at 423. In contrast, a Napster user who downloads a copy of a song to her hard drive may make that song available to millions of other individuals, even if she eventually chooses to purchase the CD. So-called sampling on Napster may quickly facilitate unauthorized distribution at an exponential rate.

Carol Publ'g, 904 F.2d 152, 157-58 (2d Cir.), cert. denied, 498 U.S. 92], 112 L. Ed. 2d 25], 111 S. Ct. 297 (1990)). 9. With regard to the third factor, it is undisputed that downloading or uploading MP3 music files involves copying the entirety of the copyrighted work. The

Ninth Circuit held prior to Sony that "wholesale copying of copyrighted material precludes application of the fair use doctrine." Marcus v.

Defendant's argument that using Napster to sample music is akin to visiting a free listening station in a record store, or listening to song samples on a retail website, fails to convince the court because Napster users can keep the music they download. Whether or not they decide to buy the CD,

Rowley, 695 F.2d 1171, 1176 (9th Cir. 1983). Even after Sony, wholesale copying for private home use tips the fair use analysis in plaintiffs' favor if such

copying is likely to adversely affect the market for

they still obtain a permanent copy of the song. In

the copyrighted material. See Sony, 464 U.S. at 449-

contrast, second Lambert from the out" See Kenswil

50, 456. 10. The fourth factor, the effect on the potential market for the copyrighted work, also weighs against

a finding

of fair

use.

Plaintiffs

have

produced

evidence that Napster use harms the market for their copyrighted musical compositions and sound recordings in at least two ways. First, it reduces CD

12. Even if the type of sampling supposedly done on

Napster were a non-commercial use, plaintiffs have demonstrated a substantial likelihood that it would

sales among college students. See Jay Rep. at 4, 18; cf.

Fine

plaintiffs’

Rep.

at

entry

1.

into

Second,

the

it raises

market

for

barriers

the

to

adversely affect the potential market for their copyrighted works if it became widespread. See Sony, 464 U.S. at 45]. ***

digital

downloading of music. See Teece Rep. at 12-18. 11. Defendant asserts several potential fair uses of the Napster service-including sampling, space-shifting, and the authorized distribution of new artists’ work. Sampling on Napster is not a personal use in the

traditional

sense

that

courts

have

Defendant maintains that sampling does not decrease retail music sales and may even stimulate them. To support this assertion, it relies heavily on the Fader Report, which concludes that consumers do not view MP3 files as perfect substitutes for CDs. See Lisi Dec. (Fader Rep.) P 63. Fader cites a survey that he did not conduct for the assertion that "60% of online users who download free digital music do so to preview music before buying the CD." Fader Rep. P 74, Examining the results of a different survey that

recognized--

copying which occurs within the household and does not confer any financial benefit on the user. See, e.g., Sony, 464 U.S. at 423, 449-50. Instead, sampling on Napster amounts to obtaining permanent copies of songs that users would otherwise have to purchase; it

also carries the potential millions

of

people.

for viral distribution

Defendant

ignores

many retail sites only offer thirty-to-sixtysamples in streaming audio format, see Reply Dec. P 2, and promotional downloads record company plaintiffs are often "timedCottrell Dec. P 15; Eisenberg Dec. P 13; Dec. P 12; Vidich Dec. PP 7(d), 8.

to

he

critical

purportedly

designed,

but

did

not

carefully

supervise, he reports that about twenty-eight percent of Napster users indicate that their music purchases have increased since they began using the Napster

differences between sampling songs on Napster and VCR usage in Sony. First, while "time-shifting [TV broadcasts] merely enables a viewer to see ... a work

software. See id. P 43. For reasons explained in the court's evidentiary order, the Fader Report is unreliable and falls to rebut plaintiffs' showing of

which he has been invited to witness in its entirety

free of charge," plaintiffs in this action almost always charge for their music-- even if it is downloaded song-by-song. Sony, 464 U.S. at 449-50; see e.g.,

harm.

104

Plaintiffs

have

demonstrated

a

meaningful

likelihood that the activity defendant calls sampling actually decreases retail sales of their music. 13. Any potential enhancement of plaintiffs’ sales due

implies that space-shifting music is sufficiently analogous to time-shifting television broadcasts to merit the protection of Sony. According to the gravely flawed Fader Report, space-shifting--like

to sampling would not tip the fair use analysis conclusively in favor of defendant. Indeed, courts

time-shifting--leaves the value of the copyrights unscathed because it does not displace sales. See

have rejected the suggestion that a positive impact on sales negates the copyright holder's entitlement to licensing fees or access to derivative markets. See Ringgold v. Black Entertainment Television, 126 F.3d

Fader Rep. P 77; Sony, 464 U.S. at 421 (concluding that plaintiffs did not prove that time-shifting created any likelihood of harm). ***The court has already held that the Jay Report bears greater indicia of reliability than the Fader Report. Moreover, under

70, 81 n.16 (2d Cir. 1997) ***

either analysis, the instant matter is distinguishable

The MP3.com opinion is especially instructive. Although MP3.com's activities arguably stimulated

from Sony because the Supreme Court determined in

Sony

CD sales, the plaintiffs "adduced substantial evidence

that they ... [had] taken steps to enter [the digital

infringement.

Under

Sony,

the

copyright

holder

cannot extend his monopoly to products "capable of substantial noninfringing uses." Sony, 464 U.S. at 442. Defendant fails to show that space-shifting constitutes a commercially significant use of Napster.

PP 6-17; Eisenberg Dec. PP 9-22; Vidich Dec. PP 710. Plaintiffs' economic expert opined that the availability of free MP3 files will reduce the market

Indeed,

the

most

credible

explanation

for

the

exponential growth of traffic to the website is the vast

for authorized, commercial downloading. See Teece Dec. at 14-18. This point is corroborated by the fact

array of free MP3 files offered by other users--not the ability of each individual to space-shift music she already owns. Thus, even if space-shifting is a fair use, it is not substantial enough to preclude liability under the staple article of commerce doctrine. See Cable/Home Communication Corp. v. Network

that all forty-nine songs available for purchase on Sony's website can be obtained for free using

Dec.

the principal,

15. Defendant argues that, if space-shifting is deemed a fair use, the staple article of commerce doctrine precludes liability for contributory or vicarious

downloads. See Conroy Dec. PP 9-18; Cottrell Dec.

See Eisenberg

represented

US. at 421.

downloading market]." MP3.com, 92 F. Supp. 2d at 352. The fourth factor thus weighed against a finding of fair use. Plaintiffs in the instant action similarly allege that Napster use impedes their entry into the online market. The record company plaintiffs have already expended considerable funds and effort to commence Internet sales and licensing for digital

Napster.

that time-shifting

rather than an occasional use of VCRs. See Sony, 464

P 16. If consumers

choose to buy, rather than burn, entire CDs they are

still more likely to obtain permanent copies of songs on Napster than buy them from Sony's site or listen to

Prods., Inc., 902 F.2d 829, 846 (Ith Cir.

1990)

(affirming finding of contributory infringement where defendant primarily promoted pirate computer chips and other devices capable of descrambling payTV broadcasts as infringement aids); A&M Records

streamed samples at other online locations. The court concludes that, even assuming the sampling alleged in this case is a non-commercial use, the record company plaintiffs have demonstrated a meaningful likelihood that it would adversely affect their entry into the online market if it became widespread. See Sony, 464 U.S. at 451. Moreover, it deprives the music publisher plaintiffs of royalties for individual songs. The unauthorized downloading of plaintiffs' music to sample songs would not constitute a fair use, even if it enhanced CD sales.

v. General Audio

Video Cassettes, Inc., 948 F. Supp.

1449, 1456 (C.D. Cal. 1996) (rejecting Sony defense because counterfeiting was chief purpose of timeloaded cassettes that defendant sold). 16. This court also declines to apply the staple article of commerce doctrine because, as paragraphs (D)(6) and (E)(2) of the legal conclusions explain, Napster exercises ongoing control over its service. In Sony,

14. The court is also unconvinced that Sony applies to space-shifting. Defendant erroneously relies on the

the defendant's participation did not extend past manufacturing and selling the VCRs: "the only

Ninth

contact between Sony and the users of the Betamax

Circuit's

assertion,

in a case

involving

an

inapplicable statute, that space-shifting constitutes noncommercial personal use. See Recording Indus.

... occurred at the moment of sale." Sony, 464 U.S. at

438. Here, in contrast, Napster, Inc. maintains and supervises an integrated system that users must

Ass'n of Am. v. Diamond Multimedia Sys., Inc., 180 F.3d 1072, 1079 (9th Cir. 1999) (discussing the applicability of the Audio

1992 to the Rio MP3

Home

player). ***

access

to upload

or download

files.

***

Given

defendant's control over the service, as opposed to mere manufacturing or selling, the existence of a

Recording Act of

Defendant also

105

potentially

unobjectionable

use like space-shifting

D. Contributory Copyright Infringement

does not defeat plaintiffs' claims. 1. Once they have shown direct infringement by Napster users, plaintiffs must demonstrate a likelihood of success on _ their contributory infringement claim. A contributory infringer is "one

17. Nor do other potential non-infringing uses of Napster preclude contributory or vicarious liability. Defendant claims that it engages in the authorized

promotion of independent artists, ninety-eight percent of whom are not represented by the record company plaintiffs. See Def.'s Opp. at 10 (citing, inter alia, Krause Dec. P Program may

commercially

who,

16), 27. However, the New Artist not represent a_ substantial or

significant

aspect

of Napster.

with

knowledge

of the

infringing

activity,

induces, causes or materially contributes to the infringing conduct of another." Gershwin Publ’g Corp. v. Columbia Artists Management, Inc., 443 F.2d 1159, 1162 (2d Cir. 1971); see Fonovisa, Inc. v.

The

Cherry Auction,

evidence suggests that defendant initially promoted the availability of songs by major stars, as opposed to "page after page of unknown artists." See 1 Frackman Dec., Exh. C (Parker Dep.) at 104:16-105:10, Exh. 235. Its purported mission of distributing music by artists unable to obtain record-label representation

1996).

Courts

Inc.,

do

76 F.3d 259,

not

require

264

actual

(9th

Cir.

knowledge;

rather, a defendant incurs contributory copyright liability if he has reason to know of the third party's

direct infringement. See Cable/Home Communication Corp., 902 F.2d at 846; Sega Enter. Ltd. v. MAPHIA,

948 F. Supp. 923, 933 (N.D. Cal. 1996) ("Sega II").

appears to have been developed later. Other facts point to the conclusion that the New Artists Program was an afterthought, not a major aspect of the Napster business plan. Former CEO Eileen Richardson claimed in her deposition that she told the press Napster is not about known artists like

2. Plaintiffs present convincing evidence that Napster executives actually knew about and sought to protect use of the service to transfer illegal MP3 files. For example, a document authored by co-founder Sean

Madonna. But, tellingly, discovery related to downloads by Napster executives reveals that Richardson's own computer contained about five Madonna files obtained using Napster. See |

real

Parker mentions the need to remain ignorant of users’ names

and

IP

addresses

"since

they

are

exchanging pirated music." | Frackman Dec., Exh. C (Parker Dep.) at 160:1-162:14, Exh. 254 at SFO0100 (emphasis added). The same document states that, in

Frackman Dec., Exh. A (Richardson Dep.) at 238:2-

bargaining with the RIAA,

240:25. Defendant did not launch the website aspect of its New Artist Program until after plaintiffs filed suit, and as recently as July 2000, bona fide new

from the fact that "we are not just making pirated

music available but also pushing demand." Id. at 160:1-162:14, Exh. 254 at SF00102 (emphasis

artists constituted a very small percentage of music available on Napster. See Krause Dec. P 9, Exh. A; Olkin Reply Dec. PP 3-5; Hausman Reply Dec. PP 3-

added). These admissions suggest that facilitating the unauthorized exchange of copyrighted music was a central part of Napster, Inc.'s business strategy from the inception.

6. In

any

event,

Napster's

primary

role

of

Plaintiff also demonstrate that defendant had actual notice of direct infringement because the RIAA informed it of more than 12,000 infringing files. See Creighton 12/3/99 Dec., Exh. D. Although Napster, Inc. purportedly terminated the users offering these files, the songs are still available using the Napster service, as are the copyrighted works which the record company plaintiffs identified in Schedules A and B of their complaint. See Creighton Supp. Dec. PP 3-4.

facilitating the unauthorized copying and distribution established artists' songs renders Sony inapplicable.

See General Audio Video, 948 F. Supp. at 1456-57; RCA Records, 594 F. Supp. at 339. 18. Plaintiffs do not object to all of the supposedly

non-infringing uses of Napster. They do not seek an injunction covering the New Artist authorized by rights Nor do they seek to

defendant will benefit

chat rooms or message boards, Program or any distribution holders. See Pl.'s Reply at 19. enjoin applications unrelated to

3. The law does not require actual knowledge of specific acts of infringement. See

the music recording industry. Because plaintiffs do not ask the court to shut down such satellite

Gershwin, 443 F.2d at 1163 (holding that general knowledge that third parties

activities, the fact that these activities may be non-

infringing does not lessen plaintiffs' likelihood of success. The court therefore finds that plaintiffs have established a reasonable probability of proving thirdparty infringement.

performed copyrighted works _ satisfied knowledge element of contributory infringement); Sega [| 857 F. Supp. at 686-87 (concluding

106

that

plaintiffs

established

knowledge element, even though electronic bulletin board company did not know exactly when infringing video games would be uploaded to or downloaded from bulletin board). Accordingly, the court rejects

70:14-16, Exh. 230, P 3-5; Exh. B (Fanning Dep.), Exhs. 174-76. Such conduct satisfies the objective test for constructive knowledge--defendant had reason to know about infringement by third parties. See Cable/Home Communication Corp., 902 F.2d at 846. n24

defendant's argument that titles in the Napster directory

cannot

be

used

to

distinguish

infringing from non-infringing files and thus that

defendant

cannot

know

6. Plaintiffs have also shown that defendant materially contributed to the infringing activity. In

about

infringement by any particular user of any

Fonovisa, the owners of copyrights for musical recordings stated a contributory infringement claim against the operators of a swap meet at which

particular musical recording or composition. See Lisi Dec. (Tygar Rep.) at 29 (offering

expert opinion about difficulty of identifying

independent vendors sold counterfeit recordings. See

copyrighted works by file name); Lars Ulrich Dep. at 36:16-37:2 (stating that in the past he did not object to individuals taping his band's concerts and making MP3 files of such concerts available via Napster); Sanders Dep. at 24:23-29:13 (discussing complex process

Fonovisa,

76 F.3d at 264. The Ninth Circuit held the

copyright owners' allegations were "sufficient to show material contribution" because "it would have been difficult for the infringing activity to take place in the massive quantities alleged without the support services provided by the swap meet." Id. According to plaintiffs in the instant action, "Napster is

for determining chain of title for copyright

essentially

owners).

an

Internet

swap

meet--more

technologically sophisticated but in many ways indistinguishable from the [defendant] in Fonovisa." Pl.'s Br. at 6. The court largely agrees with this characterization.

4. Defendant's reliance on Religious Technology Center y. Netcom On-Line Communication Services,

Inc., 907 F. Supp. 1361 (N.D. Cal. 1995), does not alter the court's conclusion that plaintiffs have a

Unlike

reasonable likelihood of proving contributory liability. The cited passage from Religious Technology Center states:

offer

their

the swap

infringing

meet

vendors,

music

for

Napster

free.

users

However,

defendant's material contribution is still analogous to that of the swap meet in Fonovisa. The swap meet

provided support services like parking, booth space, Where a BBS

advertising,

[bulletin board service]

operator cannot reasonably verify a claim of infringement, either because

the copyright holder's failure to provide the necessary documentation to show that there is likely infringement, the operator's lack of knowledge will be found reasonable and there will be no liability for contributory infringement for allowing the continued distribution of the works on its system.

Defendant marshals two district court cases in an

attempt to rebut plaintiffs' argument about material contribution. See /ntellectual Reserve, Inc. v. Utah Lighthouse Ministry, 75 F. Supp. 2d 1290, 1293 (D. Utah 1999) (holding that posting links to infringing websites did not contribute to infringement by those websites' operators); Bernstein v. J.C. Penney, Inc.,

1998 U.S. Dist. LEXIS 19048, 50 U.S.P.Q.2D (BNA) 1063 (C.D. Cal. 1998) (paraphrasing defendant's apparently successful argument that "multiple linking does not constitute substantial participation in any

executives their own

infringement where the linking website does not mention the fact that Internet users could, by

computers using the service and promoted the website with screen shots listing infringing files. See 2 Frackman Dec., Exh. D (Brooks Dep.) at 51:8-24,

54:25-56:11, Exh. 64 at 2-4, Exh.

76 F.3d at

the proprietary and means of

KK

least, defendant had constructive its users' illegal conduct... The

evidence indicates that Napster downloaded infringing material to

supplies servers,

Without the support services defendant provides, Napster users could not find and download the music they want with the ease of which defendant boasts.

of copyright notices on the copies, or

very of

See Fonovisa,

establishing a connection between users' computers.

of a possible fair use defense, the lack

5. At the knowledge

and clientele.

264. Here, Napster, Inc. software, search engine,

following the links, find infringing material on another website"). The Bernstein court offered no reasoning for its dismissal of the complaint. Neither case is factually apposite, for Napster provides its

126 at 002260,

002263; 1 Frackman Dec., Exh. A (Richardson Dep.) at 20:5-22:10, 25:2-26:1; Exh. C (Parker Dep.) at

107

users with much more than hyperlinking; Napster is

Dec.

an integrated service designed to enable users to locate and download MP3 music files. In keeping with its view that Napster, Inc. plays a more active

service attracts more and more users by offering an increasing amount of quality music for free. See, e.g., 1 Frackman Dec., Exh. A (Richardson Dep.) at 112:18-113:2. It hopes to "monetize" its user base

role in facilitating file-sharing than an Internet service provider acting as a passive conduit, this court finds it probable that defendant materially contributed to unlawful conduct. 7. Because

they have

made

a convincing

showing

443

artists

does,

police

limited

to

not

exercise

443 F.2d at 1161-63.

depend

upon

argument

its

service.

centers

on

This

the

First

fact

that

not itself contain copyrighted material. Directories have been accorded First Amendment protection. See Princeton Community Phone Book,

Inc. v. Bate,

582

F.2d 706, 710-11 (3d Cir.) (holding that First Amendment affords as much protection to listing in

directory as it does to newspaper advertisement), cert. denied, 439 U.S. 966, 58 L. Ed. 2d 424, 99S. Ct. 454

(1978).

2. Although an overbroad injunction might implicate the First Amendment, free speech concerns "are

its

protected

by

and

doctrine." Nihon Bus. Data, Inc.,

Religious Tech.

coextensive

with

the

Keizai Shimbun, Inc. 166 F.3d 65, 74 (2d

Ctr., 907 F. Supp.

fair

use

v. Comline Cir. 1999);

at 1377 (stating

that, where otherwise appropriate, imposing liability for copyright infringement does not necessarily create First Amendment concerns because the fair use defense encompasses this issue). This court has already determined that plaintiffs do not seek to

its

supervisory powers to be deemed capable of doing so. See Gershwin,

injunction

defendant offers an electronic directory, which does

material fact about vicarious liability). need

that

Amendment

could delete specific postings raised genuine issue of defendant

an

1. According to Napster, Inc., the requested injunction would impose a prior restraint on its free speech, as well as that of its users and the unsigned

F.2d at

service. See Religious Tech. Ctr., 907 F. Supp. at 1376 (concluding that evidence that Internet access provider acted to suspend subscribers' accounts and

a

non-infringing,

F. Defendant's First Amendment Challenge

Although Napster, Inc. argues that it is technologically difficult, and perhaps infeasible, to distinguish legal and illegal conduct, plaintiffs have shown that defendant supervises Napster use. Indeed, Napster, Inc. itself takes pains to inform the court of its improved methods of blocking users about whom rights holders complain. See Def.'s Opp. Br. at 19 (citing Kessler Dec. P 22), 33 (citing Kessler Dec. PP 23-24). This is tantamount to an admission that

Moreover,

were

4. Plaintiffs have shown a reasonable likelihood of success on their vicarious infringement claims.

right to terminate vendors at will; it also controlled customers' access and promoted its services. See id.

sometimes

Napster

attracts Napster's financially-valuable user base.

2. In Fonovisa, the swap meet operator satisfied the first element of vicarious liability because it had the

and

The

Defendant's representations about the primacy of its legitimate uses thus appear disingenuous. The ability to download myriad popular music files without payment seems to constitute the glittering object that

to supervise the infringing activity and also has a direct financial interest in such activities." Fonovisa,

can,

n25

unlawful activity would not have such a dire impact.

1. Even in the absence of an employment relationship, a defendant incurs liability for vicarious copyright infringement if he "has the right and ability

defendant

251.

If many of defendant's commercially significant uses

E. Vicarious Copyright Infringement

Gershwin,

Exh.

noted in the factual findings. ***

reasonable likelihood of success on their contributory infringement claims.

(quoting

Dep.),

through one of several generation revenue models

with regard to both the knowledge and material contribution elements, plaintiffs have established a

76 F.3d at 262 1162).

(Parker

The court

therefore finds that Napster, Inc. has the right and ability to supervise its users' infringing conduct.

enjoin any fair uses of the Napster service that are not completely contrived or peripheral to its existence.

3. Plaintiffs have shown a reasonable likelihood that

3. The parties dispute the extent to which infringing

Napster,

and

Inc. has a direct financial

interest in the

infringing currently

activity. *** Although Napster, Inc. generates no revenue, its internal

documents

state

directly from

that

it "will

increases

drive

in userbase."

[sic]

non-infringing

aspects

of

the

service

are

separable. Napster, Inc.'s interim CEO Hank Barry and Vice President of Engineering Edward Kessler both opine that the requested injunction would have

revenues

1 Frackman

the

108

practical

effect

of compelling

defendant

to

exclude all songs from its system, including those which plaintiffs do not own. See Barry Dec. P 13;

American Med. Ass'n,

Kessler Dec. P 39. In this view, the injunction would

(finding licensing agreement precluding use of competitor's products to be misuse), and cert. denied 522 U.S. 933 (1997); see also, e.g., Alcatel USA, Inc.

(1997), as amended

destroy the Napster service, or if the service did not shut down completely, forcibly supplant peer-to-peer file-sharing with a model under which defendant dictated the content. See Kessler Dec. P 39. Barry

v.

avers that, as a result of the injunction, Napster would lose its competitive edge vis-a-vis similar services. In contrast, plaintiffs contend that Napster's New for

business

and _ scientific

Dec. PP 3-4. ***

Dec. P 21; Kenswil Stoller Dec. P 11.

infringing and non-infringing aspects of its service, its First Amendment argument still fails. Courts will

Inc., 109 F.3d 1394,

1406 (9th Cir.)

(enjoining entire book that included parody in of Dr. Seuss poem because defendant proceeded book production after onset of litigation), dismissed, //8 S. Ct. 27 (1997). Even if technologically impossible for Napster, Inc. to

772,

792-95

of

misuse

court

still

must

take

action

P

15; Vidich

rejects

the

Dec.

P 8;

misuse

of

K. Balance of the Hardships

style with cert. it is offer

1. The court cannot give much weight to defendant's lament that the requested relief will put it out of business. See Sun Microsystems, Inc. v. Microsoft

Corp.,

such functions as its directory without facilitating the

Dec.

3. Accordingly, this court copyright defense. ***

not sustain a First Amendment challenge where the defendant entraps itself in an “all-or-nothing predicament." Dr. Seuss Enters. L.P. v. Penguin

infringement,

F.3d

rejection

See Conroy Dec. P 4; Cottrell Dec. P 5; Eisenberg

In the event that Napster, Inc. cannot separate the

USA,

166

court's

licensees from developing own products constituted misuse). Plaintiffs have granted no licenses to defendant, let alone impermissibly restrictive ones.

research would remain viable if the court granted the requested relief. See Pl.'s Reply at 19; Daniel Farmer

Books

Inc,

district

Reynolds, 911 F.2d 970, 978-79 (4th Cir. 1990) (concluding that exclusive licensing clause inhibiting

Artist Program, message boards, chat rooms, and file-

applications

Tech,

defense based on licensing agreement allowing plaintiff to gain control over uncopyrighted products), reh'g and reh'g en banc denied, /80 F.3d 267 (Sth Cir. 1999); Lasercomb Am., Inc. vy.

See Barry Dec. P 13.

sharing

DGI

(overturning

121 F.3d 516, 521 (9th Cir.)

133 F.3d 1140 (9th Cir. 1998)

188

F.3d

1115,

1119

(9th

Cir.

1999).

Although even a narrow injunction may so fully eviscerate Napster, Inc. as to destroy its user base n30 or make its service technologically infeasible, the

to

protect plaintiffs’ copyrights. See, e.g., Orth-OVision, Inc. v. Home Box Office, 474 F. Supp. 672, 686 n.14 (S.D.N.Y. 1979).

business interests of an infringer do not trump a rights holder's entitlement to copyright protection. Nor does defendant's supposed

G. Misuse of Copyright Defense

inability to separate

infringing and non-infringing elements of its service constitute a valid reason for denying plaintiffs relief or for issuing a stay. See Dr. Seuss, 109 F.3d at 1406.

1. Defendant essentially raises an antitrust argument

as

an

equitable

defense

against

the

preliminary

injunction motion. Under the rubric of misuse of copyright, Napster, Inc. argues that plaintiffs seek to aggrandize their monopoly beyond the scope of their copyrights by (1) restricting the flow of unsigned artists’ music, which competes with their own, and

(2) controlling the distribution of music

Any destruction of Napster, Inc. by a preliminary injunction is speculative compared to the statistical evidence of massive, unauthorized downloading and uploading of plaintiffs' copyrighted works--as many as 10,000 files per second, by defendant's own admission. See Kessler Dec. P 29. The court has every reason to believe that, without a preliminary injunction, these numbers will mushroom as Napster users, and newcomers attracted by the publicity,

over the

Internet. Alleged antitrust violations by a copyright plaintiff generally do not afford a valid defense

against an infringement action and ought not to dissuade a court from granting injunctive relief. See 4 Nimmer on Copyright §

13.09[A], at 13-286 (citing,

scramble to obtain as much free music as possible

inter alia, Orth-O-Vision, 474 F. Supp. at 687).

before trial.

2. Furthermore, most of the cases defendant cites deal

2. Napster, Inc. contends that its service poses no harm to plaintiffs because future SDMI specifications will protect their music releases in both CD and downloadable formats. Defendant purportedly

with improper attempts to enlarge a copyright monopoly through restricted or exclusive licensing. See, e.g., Practice Management Info. Corp. v.

109

intends to support SDMI-compliant

compensate defendant for its losses in the event that

formats when

they become available. See Kessler Dec. P 37. However, this argument suffers from two fatal flaws. First, assuming SDMI protections work, they will

this injunction is reversed or vacated.

only affect plaintiffs' new releases; neither the copyrighted material in Schedules A and B of the

IT IS SO ORDERED. MARILYN HALL PATEL

complaint nor any other existing music that plaintiffs own will be covered. See 1 Pulgram Dec. (Vidich Dep.) at 54:6-55:4, 59:8-62:10. Second, because the

Chief Judge, United States District Court

SDMI specifications have not yet taken effect, they cannot shield plaintiffs from irreparable harm at this

moment--the moment in which the preliminary injunction is sought See id. at 59:8-62:10. A rightsfriendly regime scheduled for implementation, at the earliest, by the end of 2000 does nothing to staunch the

illegal

flow

of plaintiffs'

copyrighted

material

over the Internet in the summer and autumn of this year. 3. Thus, even if the court were required to balance

the hardships, which it is not because plaintiffs have raised serious questions and shown a_ strong likelihood of success on the merits, plaintiffs would

prevail in their motion for a preliminary injunction. Ill. CONCLUSION

For the foregoing reasons, the court GRANTS plaintiffs' motion for a preliminary injunction against Napster, Inc. Defendant is hereby preliminarily

ENJOINED from engaging in, or facilitating others in copying, downloading, uploading, transmitting, or distributing

plaintiffs’

| copyrighted

= musical

compositions and sound recordings, protected by either federal or state law, without express permission of the rights owner. This injunction applies to all such works that plaintiffs own; it is not

limited to those listed in Schedules A and B of the complaint. Plaintiffs have shown persuasively that they own the copyrights to more than seventy percent of the

music available on the Napster system. See Hausman Dec. P 8. Because defendant has contributed to illegal copying on a scale that is bears the burden of developing with the injunction. Defendant work owned by plaintiffs which

without precedent, it a means to comply must insure that no neither defendant nor

Napster users have permission to use or distribute is uploaded or downloaded on Napster. The court ORDERS plaintiffs to cooperate with defendant in identifying the works to which they own copyrights. To this end, plaintiffs must file a written plan no later than

September

expedient

method

5,

2000,

by

which

ascertained. The court also post a bond for the sum

describing

their rights

the

most

can

be

ORDERS plaintiffs to of $ 5,000,000.00 to

110

MGM

v. GROKSTER

electronic files by universities, government agencies, corporations, and libraries, among others. *

No. 04-480

Other users of peer-to-peer networks include individual recipients of Grokster's and StreamCast's software, and although the networks that they enjoy through using the software can be used to share any type of digital file, they have prominently employed those networks in sharing copyrighted music and

SUPREME COURT OF THE UNITED STATES

125 S. Ct. 2764; 162 L. Ed. 2d 781; 2005 U.S

video files without authorization. A group of copyright holders (MGM for short, but including motion picture studios, recording companies, songwriters, and music publishers) sued Grokster and StreamCast for their users' copyright infringements, alleging that they knowingly and intentionally distributed their software to enable users to reproduce and distribute the copyrighted works in violation of the Copyright Act, 77 U.S.C. § 101 et

June 27, 2005

JUSTICE SOUTER delivered the opinion of the

Court.

seq. (2000 ed. and Supp. II). MGM sought damages and an injunction. ***

The question is under what circumstances the distributor of a product capable of both lawful and unlawful use is liable for acts of copyright infringement by third parties using the product. We hold that one who distributes a device with the object

The copied file is placed in a designated sharing

folder on the requesting user's computer, where it is

of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of

available for other users to download in turn, along with any other file in that folder. ***

infringement by third parties.

As this description indicates, Grokster and StreamCast use no servers to intercept the content of the search requests or to mediate the file transfers conducted by users of the software, there being no

I A

central point through which the substance of the

Respondents, Grokster, Ltd., and StreamCast Networks, Inc., defendants in the trial court,

communications passes in either direction. 4

distribute free software products that allow computer users to share electronic files through peer-to-peer

Although Grokster and StreamCast do not

therefore know when particular files are copied, a few searches using their software would show what is

networks, so called because users' computers communicate directly with each other, not through central servers. The advantage of peer-to-peer networks over information networks of other types shows up in their substantial and growing popularity. Because they need no central computer server to mediate the exchange of information or files among users, the high-bandwidth communications capacity for a server may be dispensed with, and the need for costly server storage space is eliminated. Since copies of a file (particularly a popular one) are available on many users' computers, file requests and retrievals may be faster than on other types of networks, and since file exchanges do not travel through a server, communications can take place

available on the networks the software reaches. MGM commissioned a statistician to conduct a > Peer-to-peer networks have disadvantages as well. Searches on peer-to-peer networks may not reach and uncover all available files because search requests may not be transmitted to every computer on the network. There may be redundant copies of popular files. The creator of the software has no incentive to minimize storage or bandwidth consumption, the costs of which are borne by every user of the network. Most relevant here, it is more difficult to control the content of files available for

retrieval and the behavior of users.

between any computers that remain connected to the network without risk that a glitch in the server will disable the network in its entirety. Given these benefits in security, cost, and efficiency, peer-to-peer networks are employed to store and distribute

and

* There is some evidence that both Grokster StreamCast previously operated supernodes,

which compiled indexes of files available on all of the nodes connected to them. This evidence, pertaining to previous versions of the defendants’ software, is not before us and would not affect our

conclusions in any event.

111

systematic search, and his study showed that nearly

the companies of 8 million copyrighted files that

90% of the files available for download on the FastTrack system were copyrighted works.” Grokster and StreamCast dispute this figure, raising

could be obtained using their software.

methodological problems and arguing that free copying even of copyrighted works may be authorized by the rightholders. They also argue that potential noninfringing uses of their software are significant in kind, even if infrequent in practice.

Some musical performers, for example, have gained new audiences by distributing their copyrighted works for free across peer-to-peer networks, and some distributors of unprotected content have used peer-to-peer networks to disseminate files, Shakespeare being an example. Indeed, StreamCast has given Morpheus users the opportunity to

download the briefs in this very case, though their popularity has not been quantified. As for quantification, the parties' anecdotal and statistical evidence entered thus far to show the content available on the FastTrack and Gnutella networks does not say much about which files are actually downloaded by users, and no one can say how often the software is used to obtain copies of

unprotected material. But MGM's evidence gives reason to think that the vast majority of users’ downloads are acts of infringement, and because well

Grokster and StreamCast are not, however,

merely passive recipients of information about

infringing use. The record is replete with evidence that from the moment Grokster and StreamCast began to distribute their free software, each one

clearly voiced the objective that recipients use it to download copyrighted works, and each took active steps to encourage infringement. After the notorious file-sharing service, Napster, was sued by copyright holders for facilitation of copyright infringement, A & M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896 (ND Cal. 2000),

affd in part, rev'd in part, 239 F.3d 1004 (CA9 2001), StreamCast gave away a software program of a kind known as OpenNap, designed as compatible with the

Napster program and open to Napster users for downloading files from other Napster and OpenNap users' computers. Evidence indicates that "it was always [StreamCast's] intent to use [its OpenNap network] to be able to capture email addresses of [its] initial target market so that [it] could promote [its]

StreamCast Morpheus interface to them," App. 861; indeed, the OpenNap program was engineered "'to leverage Napster's 50 million user base," id., at 746.

over 100 million copies of the software in question are known to have been downloaded, and billions of files are shared across the FastTrack and Gnutella

StreamCast monitored both the number of users

downloading its OpenNap program and the number of music files they downloaded. Jd., at 859, 863, 866.

networks each month, the probable scope of

It also used the resulting OpenNap network to

copyright infringement is staggering.

distribute copies of the Morpheus software and to encourage users to adopt it. Jd, at 861, 867, 1039.

Grokster and StreamCast concede the

infringement in most downloads, Brief for Respondents 10, and it is uncontested that they are

aware that users employ their software primarily to download copyrighted files, even if the decentralized FastTrack and Gnutella networks fail to reveal which files are being copied, and when. From time to time,

moreover, the companies have learned about their users’ infringement directly, as from users who have

sent e-mail to each company with questions about playing copyrighted movies they had downloaded, to whom the companies have responded with guidance.

App. 559-563, 808-816, 939-954. And MGM notified

Internal company documents indicate that StreamCast hoped to attract large numbers of former Napster users if that company was shut down by court order or otherwise, and that StreamCast planned to be the next Napster. /d., at 861. A kit

developed by StreamCast to be delivered to advertisers, for example, contained press articles about StreamCast's potential to capture former Napster users, id., at 568-572, and it introduced itself to some potential advertisers as a company "which is similar to what Napster was," id., at 884. It broadcast banner advertisements to users of other Napstercompatible software, urging them to adopt its

OpenNap. /d., at 586. An internal e-mail from a company executive stated: "We have put this ° By comparison, evidence introduced by

the plaintiffs in A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (CA9 2001), showed that 87% of files available on the Napster filesharing network were copyrighted, id, at 1013.

network in place so that when Napster pulls the plug on their free service . . . or if the Court orders them shut down prior to that . . . we will be positioned to capture the flood of their 32 million users that will be actively looking for an alternative." /d., at 588-589,

861.

Thus, StreamCast developed promotional materials to market its service as the best Napster alternative. One proposed advertisement read: "Napster Inc. has announced that it will soon begin

Grokster and StreamCast receive no revenue from users, who obtain the software itself for nothing. Instead, both companies generate income by selling advertising space, and they stream the advertising to

charging you a fee. That's if the courts don't order it shut down first. What will you do to get around it?"

Grokster and Morpheus users while they are employing the programs. As the number of users of each program increases, advertising opportunities become worth more. Cf. App. 539, 804. While there

Id., at 897. Another proposed ad touted StreamCast's

software as the " # 1 alternative to Napster" and asked "when the lights went off at Napster . . . where

is doubtless some demand for free Shakespeare, the

did the users go?" Jd., at 836 (ellipsis in original).’

evidence shows that substantive volume is a function of free access to copyrighted work. Users seeking

StreamCast even planned to flaunt the illegal uses of its software; when it launched the OpenNap network,

Top 40 songs, for example, or the latest release by Modest Mouse, are certain to be far more numerous than those seeking a free Decameron, and Grokster

the chief technology officer of the company averred that "the goal is to get in trouble with the law and get sued. It's the best way to get in the news." /d., at 916.

and StreamCast translated that demand into dollars.

The evidence that Grokster sought to capture the market of former Napster users is sparser but revealing, for Grokster launched its own OpenNap system called Swaptor and inserted digital codes into

Finally, there is no evidence that either company

engines to look for "Napster" or "free filesharing"

made an effort to filter copyrighted material from users' downloads or otherwise impede the sharing of copyrighted files. Although Grokster appears to have sent e-mails warning users about infringing content when it received threatening notice from the

would be directed to the Grokster Web site, where

copyright holders, it never blocked anyone from

they could download the Grokster software. /d., at

continuing to use its software to share copyrighted files. [d., at 75-76. StreamCast not only rejected another company's offer of help to monitor infringement, id., at 928-929, but blocked the Internet Protocol addresses of entities it believed were trying to engage in such monitoring on its networks, id., at

its Web site so that computer users using Web search

992-993. And Grokster's name is an apparent derivative of Napster. StreamCast's executives monitored the number of songs by certain commercial artists available on their networks, and an internal communication

917-922.

indicates they aimed to have a larger number of

B

copyrighted songs available on their networks than

other file-sharing networks. /d., at 868. The point, of

*** The District Court held that those who used

course, would be to attract users of a mind to

the Grokster and Morpheus software to download copyrighted media files directly infringed MGM's

infringe, just as it would be with their promotional materials developed showing copyrighted songs as examples of the kinds of files available through

copyrights, a conclusion not contested on appeal, but the court nonetheless granted summary judgment in

Morpheus. /d., at 848. Morpheus in fact allowed

favor of Grokster and StreamCast as to any liability arising from distribution of the then current versions of their software. Distributing that software gave rise

users to search specifically for "Top 40" songs, id., at 735, which were inevitably copyrighted. Similarly, Grokster sent users a newsletter promoting its ability

to no liability in the court's view, because its use did

to provide particular, popular copyrighted materials.

not provide the distributors with actual knowledge of specific acts of infringement.

In addition to this evidence of express promotion, marketing, and intent to promote further, the business models employed by Grokster and StreamCast confirm that their principal object was use of their software to download copyrighted works.

The Court of Appeals affirmed. 380 F.3d 1154 (CA9 2004). In the court's analysis, a defendant was liable as a contributory infringer when it had knowledge of direct infringement and materially

contributed to the infringement. But the court read Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417, 78 L. Ed. 2d 574, 104 S. Ct. 774 (1984), as holding that distribution of a commercial product capable of substantial noninfringing uses could not give rise to contributory liability for infringement unless the distributor had actual

’ The record makes clear that StreamCast developed these promotional materials whether it released them to the public. these advertisements were not released public and do not show encouragement infringe, they illuminate StreamCast's

but not Even if to the to

knowledge of specific instances of infringement and failed to act on that knowledge. The fact that the

purposes.

113

software was capable of substantial noninfringing

today as the videocassette recorder or VCR.

uses in the Ninth Circuit's view meant that Grokster and StreamCast were not liable, because they had no such actual knowledge, owing to the decentralized

Copyright holders sued Sony as the manufacturer, claiming it was contributorily liable for infringement that occurred when VCR owners taped copyrighted programs because it supplied the means used to infringe, and it had constructive knowledge that

architecture of their software. The court also held that Grokster and StreamCast did not materially contribute to their users' infringement because it was

infringement would occur. At the trial on the merits,

the users themselves who searched for, retrieved, and

the evidence showed that the principal use of the VCR was for "'time-shifting,"" or taping a program

stored the infringing files, with no involvement by

the defendants beyond providing the software in the first place. The Ninth Circuit also considered whether Grokster and StreamCast could be liable under a

theory of vicarious infringement. The court held against liability because the defendants did not monitor or control the use of the software, had no agreed-upon right or current ability to supervise its use, and had no independent duty to police infringement. We granted certiorari. 543 US. __,

160 L. Ed. 2d 518, 125 S. Ct. 686 (2004). Hl A MGM and many of the amici fault the Court of Appeals's holding for upsetting a sound balance between the respective values of supporting creative

pursuits through copyright protection and promoting innovation in new communication technologies by limiting the incidence of liability for copyright

infringement. The more artistic protection is favored, the more technological innovation may be discouraged; the administration of copyright law is an

exercise in managing the trade-off. *** When a widely shared service or product is used

to commit infringement, it may be impossible to enforce rights in the protected work effectively against all direct infringers, the only practical alternative being to go against the distributor of the

copying device for secondary liability on a theory of contributory or vicarious infringement. See Jn re Aimster Copyright Litigation, 334 F.3d 643, 645-646 (CA7 2003). ***

object of bringing about taping in violation of copyright or had taken active steps to increase its

profits from unlawful taping. Id., at 438, 78 L. Ed. 2d 574, 1048. Ct. 774. Although Sony's advertisements urged consumers to buy the VCR to "record favorite shows" or "build a library'" of recorded programs,

id., at 459, 78 L. Ed. 2d 574, 104 S. Ct. 774 (Blackmun, J., dissenting), neither of these uses was necessarily infringing, id., at 424, 454-455, 78 L. Ed.

2d 574, 104'S. Ct. 774. On those facts, with no evidence of stated or indicated intent to promote infringing uses, the only conceivable basis for imposing liability was on a

theory of contributory infringement arising from its sale of VCRs to consumers with knowledge that some would use them to infringe. Jd. at 439, 78 L. Ed. 2d 574, 104 S. Ct. 774. But because the VCR was

"capable of commercially significant noninfringing uses," we held the manufacturer could not be faulted solely on the basis of its distribution. /d., at 442,

78

L. Ed. 2d 574, 104 S. Ct. 774. *** In sum, where an article is "good for nothing else" but infringement, Canda v. Michigan Malleable lron Co., supra, at 489, there is no legitimate public interest in its unlicensed availability, and there is no injustice in presuming or imputing an intent to

infringe, see Henry v. A. B. Dick Co., 224 U.S. 1, 48, 56 L. Ed. 645, 32'S. Ct. 364, 1912 Dec. Comm'r Pat. 575 (1912), overruled on other grounds, Motion Picture Patents Co. v. Universal Film Mfg. Co., 243

B Despite the currency of these principles of

secondary liability, this Court has dealt with secondary copyright infringement in only one recent case, and because MGM

for later viewing at a more convenient time, which the Court found to be a fair, not an infringing, use. Id., at 423-424,78 L. Ed. 2d 574, 1048. Ct. 774. There was no evidence that Sony had expressed an

has tailored its principal

claim to our opinion there, a look at our earlier holding is in order. In Sony Corp. v. Universal City Studios, supra, this Court addressed a claim that

secondary liability for infringement can arise from the very distribution of a commercial product. There, the product, novel at the time, was what we know

U.S. 502, 61 L. Ed. 871, 37S. Ct. 416, 1917 Dec. Comm'r Pat. 391 (1917). Conversely, the doctrine

absolves the equivocal conduct of selling an item with substantial lawful as well as unlawful uses, and limits liability to instances of more acute fault than

the mere understanding that some of one's products will be misused. It leaves breathing room for innovation and a vigorous commerce. See Sony Corp. v. Universal City Studios, supra, at 442; Dawson Chemical Co. v. Rohm & Haas Co., 448 U.S. 176,

221, 65 L. Ed. 2d 696, 100 S. Ct. 2601 (1980); Henry

v. A. B. Dick Co., supra, at 48, 56 L. Ed. 645, 32S.

Kalem Co. v. Harper Brothers, 222 U.S., at 62-63, 56

Ct. 364.

L. Ed. 2d 92, 32S. Ct. 20 (copyright infringement).

We agree with MGM that the Court of Appeals

For the same reasons that Sony took the staplearticle doctrine of patent law as a model for its copyright safe-harbor rule, the inducement rule, too, is a sensible one for copyright. We adopt it here, holding that one who distributes a device with the object of promoting its use to infringe copyright, as

misapplied Sony, which it read as limiting secondary

liability quite beyond the circumstances to which the case applied. Sony barred secondary liability based on presuming or imputing intent to cause infringement solely from the design or distribution of

a product capable of substantial lawful use, which the distributor knows is in fact used for infringement.

shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties. We are, of course, mindful of the need to keep from trenching on regular commerce or discouraging the

The Ninth Circuit has read Sony's limitation to mean

that whenever a product is capable of substantial lawful use, the producer can never be held

development of technologies with lawful and

contributorily liable for third parties' infringing use of it; it read the rule as being this broad, even when an actual purpose to cause infringing use is shown by evidence independent of design and distribution of the product, unless the distributors had "specific

unlawful potential. Accordingly, just as Sony did not

find intentional inducement despite the knowledge of the VCR manufacturer that its device could be used to infringe, 464 U.S., at 439, n. 19, 78 L. Ed. 2d 574, 104 S. Ct. 774, mere knowledge of infringing potential or of actual infringing uses would not be

knowledge of infringement at a time at which they contributed to the infringement, and failed to act upon that information." 380 F.3d at 1162 (internal quotation marks and alterations omitted). Because the

enough here to subject a distributor to liability. Nor would ordinary acts incident to product distribution, such as offering customers technical support or product updates, support liability in themselves. The inducement rule, instead, premises liability on

Circuit found the StreamCast and Grokster software capable of substantial lawful use, it concluded on the basis of its reading of Sony that neither company could be held liable, since there was no showing that

purposeful, culpable expression and conduct, and thus does nothing to compromise legitimate commerce or discourage innovation having a lawful promise.

their software, being without any central server,

afforded them knowledge of specific unlawful uses. This view of Sony, however, was error, converting the case from one about liability resting on imputed intent to one about liability on any theory. Because Sony did not displace other theories

* OK OK

In sum, this case is significantly different from Sony and reliance on that case to rule in favor of StreamCast and Grokster was error. Sony dealt with a claim of liability based solely on distributing a product with alternative lawful and unlawful uses, with knowledge that some users would follow the unlawful course. The case struck a balance between the interests of protection and innovation by holding that the product's capability of substantial lawful employment should bar the imputation of fault and consequent secondary liability for the unlawful acts of others.

of secondary liability, and because we find below that it was error to grant summary judgment to the companies on MGM's inducement claim, we do not revisit Sony further, as MGM

requests, to add a more

quantified description of the point of balance between protection and commerce when liability rests solely on distribution with knowledge that unlawful use will occur. It is enough to note that the Ninth Circuit's judgment rested on an erroneous understanding of Sony and to leave further consideration of the Sony rule for a day when that may be required.

MGM's evidence in this case most obviously addresses a different basis of liability for distributing

Cc

a product open to alternative uses. Here, evidence of the distributors' words and deeds going beyond

*** The classic case of direct evidence of

unlawful purpose occurs when one induces commission of infringement by another, or "entices

distribution as such shows a purpose to cause and

or persuades another" to infringe, Black's Law Dictionary 790 (8th ed. 2004), as by advertising.

profit from third-party acts of copyright infringement.

Thus at common law a copyright or patent defendant

found, it will not be on the basis of presuming or imputing fault, but from inferring a patently illegal

If liability for inducing infringement is ultimately

who "not only expected but invoked [infringing use] by advertisement" was liable for infringement "on principles recognized in every part of the law."

objective from statements and actions showing what that objective was.

115

further proceedings. 259 F. Supp. 2d, at 1035. This

There is substantial evidence in MGM's favor on all elements of inducement, and summary judgment

conclusion appears to rest almost entirely on the collection of declarations submitted by Grokster and StreamCast. /bid. Review of these declarations reveals mostly anecdotal evidence, sometimes obtained second-hand, of authorized copyrighted works or public domain works available online and

in favor of Grokster and StreamCast was error. On remand, reconsideration of MGM's motion for summary judgment will be in order. The judgment of the Court of Appeals is vacated, and the case is remanded for further

shared through peer-to-peer networks, and general statements about the benefits of peer-to-peer technology. *** These declarations do not support summary judgment in the face of evidence, proffered by MGM, of overwhelming use of Grokster's and

proceedings consistent with this opinion. It is so ordered.

JUSTICE GINSBURG, with whom THE CHIEF JUSTICE and JUSTICE KENNEDY join, concurring

StreamCast's software for infringement. Even if the absolute number of noninfringing files copied using the Grokster and StreamCast

At bottom, however labeled, the question in this case is whether Grokster and StreamCast are liable for the direct infringing acts of others. Liability under our jurisprudence may be predicated on actively encouraging (or inducing) infringement through specific acts (as the Court's opinion develops) or on distributing a product distributees use to infringe copyrights, if the product is not capable of "substantial" or "commercially significant"

software is large, it does not follow that the products are therefore put to substantial noninfringing uses and are thus immune from liability. The number of noninfringing copies may be reflective of, and dwarfed by, the huge total volume of files shared. Further, the District Court and the Court of Appeals did not sharply distinguish between uses of Grokster's

and StreamCast's software products (which this case is about) and uses of peer-to-peer technology generally (which this case is not about).

noninfringing uses. Sony, 464 U.S., at 442, 78 L. Ed. 2d 574, 1048S. Ct. 774; see also 3 M. Nimmer & D. Nimmer, Nimmer on Copyright § 12.04[A][2] (2005). While the two categories overlap, they capture different culpable behavior. Long coexisting,

In sum, when the record in this case was

developed, there was evidence that Grokster's and

both are now codified in patent law. Compare 35

StreamCast's products were, and had been for some time, overwhelmingly used to infringe, ante, at 4-6; App. 434-439, 476-481, and that this infringement was the overwhelming source of revenue from the products, ante, at 8-9; 259 F. Supp. 2d, at 1043-1044.

U.S.C. § 271(b) (active inducement liability), with ¢ 271(c) (contributory liability for distribution of a product not "suitable for substantial noninfringing use"). ***

Fairly appraised, the evidence was insufficient to

This case differs markedly from Sony. Cf. Peters, Brace Memorial Lecture: Copyright Enters the Public Domain, 51 J. Copyright Soc. 701, 724 (2004) ("The Grokster panel's reading of Sony is the broadest that any court has given it... ."). Here, there has been no finding of any fair use and little beyond anecdotal evidence of noninfringing uses. In finding the

demonstrate, beyond genuine debate, a reasonable

prospect that substantial or commercially significant noninfringing uses were likely to develop over time. On this record, the District Court should not have

ruled dispositively on the contributory infringement charge by granting summary judgment to Grokster and StreamCast.

Grokster and StreamCast software products capable of substantial noninfringing uses, the District Court and the Court of Appeals appear to have relied largely on declarations submitted by the defendants. These declarations include assertions (some of them hearsay) that a number of copyright owners authorize

If, on remand, the case is not resolved on

summary judgment in favor of MGM based on Grokster and StreamCast actively inducing infringement, the Court of Appeals, I would emphasize, should reconsider, on a fuller record, its

distribution of their works on the Internet and that some public domain material is available through peer-to-peer networks including those accessed through Grokster's and StreamCast's software. 380 F.3d at 1161; 259 F. Supp. 2d 1029, 1035-1036 (CD

interpretation of Sony's product distribution holding. JUSTICE BREYER, with whom JUSTICE STEVENS and JUSTICE O'CONNOR join, concurring. I agree with the Court that the distributor of a dual-use technology may be liable for the infringing

Cal. 2003); App. 125-171. The District Court declared it "undisputed that there are substantial noninfringing uses for Defendants’ software," thus obviating the need for

activities of third parties where he or she actively seeks to advance the infringement. Ante, at 1.1

116

further agree that, in light of our holding today, we need not now "revisit" Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417, 78 L. Ed.

2d 574, 104S. Ct. 774 (1984). Ante, at 17. Other Members of the Court, however, take up the Sony question: whether Grokster's product is "capable of

442, 78 L. Ed. 2d 574, 104 S. Ct. 774. It pointed to patent law's "staple article of commerce" doctrine, ibid., under which a distributor of a product is not liable for patent infringement by its customers unless that product is "unsuited for any commercial

noninfringing use." Dawson Chemical Co. v. Rohm & Haas Co., 448 U.S. 176, 198, 65 L. Ed. 2d 696, 100

‘substantial’ or 'commercially significant' noninfringing uses." Ante, at | (GINSBURG, J.,

S. Ct. 260] (1980). The Court wrote that the sale of

concurring) (quoting Sony, supra, at 442, 78 L. Ed.

copying equipment, "like the sale of other articles of

2d 574, 104 S. Ct. 774). And they answer that question by stating that the Court of Appeals was wrong when it granted summary judgment on the

commerce, does not constitute contributory infringement if the product is widely used for legitimate, unobjectionable purposes. Indeed, it need merely be capable of substantial noninfringing uses."

issue in Grokster's favor. Ante, at 4. I write to explain

Sony, 464 U.S., at 442, 78 L. Ed. 2d 574, 104 S. Ct. 774 (emphasis added). The Court ultimately characterized the legal "question" in the particular

why I disagree with them on this matter.

I The Court's opinion in Sony and the record evidence (as described and analyzed in the many

briefs before us) together convince me that the Court of Appeals' conclusion has adequate legal support.

case as "whether [Sony's VCR] is capable of commercially significant noninfringing uses" (while declining to give "precise content" to these terms). Ibid. (emphasis added). ***

The Court found that the magnitude of

A I begin with Sony's standard. In Sony, the Court considered the potential copyright liability of a company that did not itself illegally copy protected material, but rather sold a machine -- a Video Cassette Recorder (VCR) -- that could be used to do so. A buyer could use that machine for noninfringing purposes, such as recording for later viewing (sometimes called 'time-shifting," Sony, 464 U.S., at 421, 78 L. Ed. 2d 574, 104 S. Ct. 774) uncopyrighted television programs or copyrighted programs with a copyright holder's permission. The buyer could use

authorized programming was "significant," and it also noted the "significant potential for future authorized copying." *** The Court, in using the key word "substantial," indicated that these circumstances alone constituted a sufficient basis for rejecting the imposition of secondary liability. See id., at 456, 78 L. Ed. 2d 574, 104 S. Ct. 774 ("Sony demonstrated a significant likelihood that substantial numbers of copyright

holders" would not object to time-shifting (emphasis added)). Nonetheless, the Court buttressed its

the machine for infringing purposes as well, such as building libraries of taped copyrighted programs. Or, the buyer might use the machine to record

conclusion by finding separately that, in any event, unauthorized time- shifting often constituted not

copyrighted programs under circumstances in which

2d 574, 104S. Ct. 774.

the legal status of the act of recording was uncertain (i.e., where the copying may, or may not, have constituted a "fair use," id, at 425-426,

78 L. Ed. 2d

574, 1048. Ct. 774). Sony knew many customers would use its VCRs to engage in unauthorized copying and "library-building."" /d., at 458-459, 78

L. Ed. 2d 574, 104 S. Ct. 774 (Blackmun, J., dissenting). But that fact, said the Court, was insufficient to make Sony itself an infringer. And the

infringement, but "fair use." /d., at 447-456, 78 L. Ed.

B When measured against Sony's underlying evidence and analysis, the evidence now before us shows that Grokster passes Sony's test -- that is, whether the company's product is capable of substantial or commercially significant noninfringing

uses. Id., at 442, 78 L. Ed. 2d 574, 104'S. Ct. 774. For

Court ultimately held that Sony was not liable for its

one thing, petitioners’ (hereinafter MGM) own expert declared that 75% of current files available on

customers' acts of infringement.

Grokster are infringing and 15% are "likely

In reaching this conclusion, the Court

recognized the need for the law, in fixing secondary copyright liability, to "strike a balance between a copyright holder's legitimate demand for effective -not merely symbolic -- protection of the statutory monopoly, and the rights of others freely to engage in substantially unrelated areas of commerce." /d., at

infringing." See App. 436-439, PP6-17 (Decl. of Dr. Ingram Olkin); cf. ante, at 4 (opinion of the Court).

That leaves some number of files near 10% that apparently are noninfringing, a figure very similar to the 9% or so of authorized time-shifting uses of the VCR that the Court faced in Sony. ***

There may be other now-unforeseen noninfringing uses that develop for peer-to-peer software, just as the home-video rental industry (unmentioned in Sony) developed for the VCR. But the foreseeable development of such uses, when taken together with an estimated 10% noninfringing material, is sufficient to meet Sony's standard. And while Sony considered the record following a trial, there are no facts asserted by MGM in its summary

judgment filings that lead me to believe the outcome after a trial here could be any different. The lower

courts reached the same conclusion. *** I The real question here, I believe, is not whether the record evidence satisfies Sony. As I have interpreted the standard set forth in that case, it does. KOK

Instead, the real question is whether we should modify the Sony standard, as MGM requests, or interpret Sony more strictly, as I believe JUSTICE GINSBURG's approach would do in practice. *** As [ have said, Sony itself sought to "strike a

balance between a copyright holder's legitimate demand for effective -- not merely symbolic -protection of the statutory monopoly, and the rights of others freely to engage in substantially unrelated areas of commerce." Id, at 442, 78 L. Ed. 2d 574, 104 S. Ct. 774. Thus, to determine whether modification, or a strict interpretation, of Sony is needed, I would ask whether MGM has shown that Sony incorrectly balanced copyright and new-

Court's holding today reinforces (by adding a weapon to the copyright holder's legal arsenal). Sony's rule is strongly technology protecting. The rule deliberately makes it difficult for courts to

find secondary liability where new technology is at issue. It establishes that the law will not impose copyright liability upon the distributors of dual-use technologies (who do not themselves engage in

unauthorized copying) unless the product in question will be used almost exclusively to infringe copyrights (or unless they actively induce infringements as we today describe). Sony thereby recognizes that the copyright laws are not intended to discourage or to control the emergence of new technologies, including

(perhaps especially) those that help disseminate information and ideas more broadly or more efficiently. Thus Sony’s rule shelters VCRs, typewriters, tape recorders, photocopiers, computers, cassette players, compact disc burners, digital video recorders, MP3 players, Internet search engines, and

peer-to-peer software. But Sony's rule does not shelter descramblers, even if one could theoretically use a descrambler in a noninfringing way. 464 U.S.,

at 441-442, 78 L. Ed. 2d 574, 104 S. Ct. 774; Compare Cable/Home Communication Corp., supra, at 837-850 (developer liable for advertising television signal descrambler), with Vault Corp., supra, at 262 (primary use infringing but a substantial noninfringing use).

new or necessary copyright-related benefits outweigh

Sony's rule is forward looking. It does not confine its scope to a static snapshot of a product's current uses (thereby threatening technologies that have undeveloped future markets). Rather, as the VCR example makes clear, a product's market can evolve dramatically over time. And Sony -- by referring to a capacity for substantial noninfringing uses -- recognizes that fact. Sony’s word "capable"

any such weakening?

refers to a plausible, not simply a theoretical,

technology interests. In particular: (1) Has Sony (as I interpret it) worked to protect new technology? (2) If so, would modification or strict interpretation significantly weaken that protection? (3) If so, would

A The first question is the easiest to answer. Sony's rule, as I interpret it, has provided entrepreneurs with needed assurance that they will be shielded from copyright liability as they bring valuable new technologies to market.

Sony's rule is clear. That clarity allows those who develop new products that are capable of

substantial noninfringing uses to know, ex ante, that distribution of their product will not yield massive monetary liability. At the same time, it helps deter them from distributing products that have no other real function than -- or that are specifically intended for -- copyright infringement, deterrence that the

likelihood that such uses will come to pass, and that fact anchors Sony in practical reality. Cf. Aimster, supra, at 651. Sony's rule is mindful of the limitations facing judges where matters of technology are concerned. Judges have no specialized technical ability to answer questions about present or future technological

feasibilility or commercial viability where technology professionals, engineers, and venture capitalists themselves may radically disagree and where

answers may differ depending upon whether one focuses upon the time of product development or the time of distribution. Consider, for example, the question whether devices can be added to Grokster's software that will filter out infringing files. MGM tells us this is easy enough to do, as do several amici

that produce and sell the filtering technology. See, e.g., Brief for Motion Picture Studio Petitioners 11; Brief for Audible Magic Corp. et al. as Amicus Curiae 3-10. Grokster says it is not at all easy to do,

technologies). Moreover, Sony has been the law for some time. And that fact imposes a serious burden upon copyright holders like MGM to show a need for change in the current rules of the game, including a

and not an efficient solution in any event, and several apparently disinterested computer science professors agree. See Brief for Respondents 31; Brief for

more strict interpretation of the test. See, e.g., Brief for Motion Picture Studio Petitioners 31 (Sony should not protect products when the "primary or principal"

Computer Science Professors as Amicus Curiae 6-10, 14-18. Which account should a judge credit? Sony says that the judge will not necessarily have to decide.

use is infringing). In any event, the evidence now available does

not, in my view, make out a sufficiently strong case

for change. To say this is not to doubt the basic need to protect copyrighted material from infringement.

Given the nature of the Sony rule, it is not surprising that in the last 20 years, there have been relatively few contributory infringement suits --

The Constitution itself stresses the vital role that

copyright plays in advancing the "useful Arts." Art. I,

based on a product distribution theory -- brought

§ 8, cl. 8. No one disputes that "reward to the author or artist serves to induce release to the public of the products of his creative genius." United States v.

against technology providers (a small handful of federal appellate court cases and perhaps fewer than two dozen District Court cases in the last 20 years). I

Paramount Pictures, Inc., 334 U.S. 131, 158, 92 L.

have found nothing in the briefs or the record that shows that Sony has failed to achieve its innovationprotecting objective.

Ed. 1260, 68 S. Ct. 915 (1948). And deliberate

unlawful copying is no less an unlawful taking of property than garden-variety theft. See, e.g., /8 U.S.C. § 2319 (criminal copyright infringement); ¢ 1961(1)(B) (copyright infringement can be a predicate act under the Racketeer Influenced and Corrupt Organizations Act); § 1956(c)(7)(D) (money

B The second, more difficult, question is whether a modified Sony rule (or a strict interpretation) would significantly weaken the law's ability to protect new technology. JUSTICE GINSBURG's approach would require defendants to produce considerably more concrete evidence -- more than was presented here -to earn Sony's shelter. That heavier evidentiary

laundering includes the receipt of proceeds from copyright infringement). But these highly general principles cannot by themselves tell us how to balance the interests at issue in Sony or whether Sony's standard needs modification. And at certain key points, information is lacking.

demand, and especially the more dramatic (case-bycase balancing) modifications that MGM and the Government seek, would, I believe, undercut the protection that Sony now offers. ***

Will an unmodified Sony lead to a significant diminution in the amount or quality of creative work produced? Since copyright's basic objective is creation and its revenue objectives but a means to

Cc

that end, this is the underlying copyright question.

The third question -- whether a positive copyright impact would outweigh any technologyrelated loss -- I find the most difficult of the three. I do not doubt that a more intrusive Sony test would generally provide greater revenue security for copyright holders. But it is harder to conclude that the gains on the copyright swings would exceed the losses on the technology roundabouts.

See Twentieth Century Music Corp. v. Aiken, 422

U.S. 151, 156, 45 L. Ed. 2d 84, 95 S. Ct. 2040 (1975) ("Creative work is to be encouraged and rewarded, but private motivation must ultimately serve the

cause of promoting broad public availability of literature, music, and the other arts"). And its answer is far from clear. More importantly, copyright holders at least potentially have other tools available to reduce piracy and to abate whatever threat it poses to creative production. As today's opinion makes clear, a copyright holder may proceed against a technology

For one thing, the law disfavors equating the two different kinds of gain and loss; rather, it leans in favor of protecting technology. As Sony itself makes clear, the producer of a technology which permits unlawful copying does not himself engage in unlawful copying -- a fact that makes the attachment

provider where a provable specific intent to infringe (of the kind the Court describes) is present. Ante, at 24 (opinion of the Court). Services like Grokster may

of copyright liability to the creation, production, or distribution of the technology an exceptional thing. See 464 U.S., at 431, 78 L. Ed. 2d 574, 1048S. Ct. 774

well be liable under an inducement theory.

(courts "must be circumspect" in construing the copyright laws to preclude distribution of new

In addition, a copyright holder has always had the legal authority to bring a traditional infringement

119

For these reasons, | disagree with JUSTICE

suit against one who wrongfully copies. Indeed, since September 2003, the Recording Industry Association of America (RIAA) has filed "thousands of suits against people for sharing copyrighted material." Walker, New Movement Hits Universities: Get Legal Music, Washington Post, Mar. 17, 2005, p. El. ***

GINSBURG, but I agree with the Court and join its opinion.

Further, copyright holders may develop new

technological devices that will help curb unlawful infringement. Some new technology, called "digital ‘watermarking" and "digital fingerprinting," can encode within the file information about the author and the copyright scope and date, which "fingerprints" can help to expose infringers. *** At the same time, advances in technology have discouraged unlawful copying by making lawful copying (e.g., downloading music with the copyright

holder's permission) cheaper and easier to achieve. Several services now sell music for less than $ | per song. (Walmart.com, for example, charges $ 0.88 each). Consequently, many consumers initially attracted to the convenience and flexibility of

services like Grokster are now migrating to lawful paid services (services with copying permission) where they can enjoy at little cost even greater convenience and flexibility without engaging in unlawful swapping. See Wu, When Code Isn't Law,

89 Va. L. Rev. 679, 731-735 (2003) *** Finally, as Sony recognized, the legislative option remains available. Courts are less well suited

than Congress to the task of "accommodating fully the varied permutations of competing interests that are inevitably implicated by such new technology." Sony, 464 U.S., at 431, 78 L. Ed. 2d 574, 1048S. Ct. 774; see, e.g., Audio Home Recording Act of 1992, 106 Stat. 4237 (adding 17 U.S.C., ch. 10); Protecting

Innovation and Art While Preventing Piracy: Hearing Before the Senate Comm. on the Judiciary, 108th Cong., 2d Sess. (July 22, 2004). I do not know whether these developments and similar alternatives will prove sufficient, but | am

reasonably certain that, given their existence, a strong demonstrated need for modifying Sony (or for interpreting Sony's standard more strictly) has not yet been shown. That fact, along with the added risks that modification (or strict interpretation) would impose

upon technological innovation, leads me to the conclusion that we should maintain Sony, reading its standard as I have read it. As so read, it requires affirmance of the Ninth Circuit's determination of the relevant aspects of the Sony question. eK

120

Copyright is only one of a number of forms of intellectual property protection.

Patents

and trade secrets are alternative forms of protection, and trademarks serve to identify a product,

company or service. In addition, owners of intellectual property have more recently turned to an alternative method of protection: licensing. Technically, licensing is simply a form of legal contract; it was never specifically designed as a method of intellectual property protection. However, it has become increasingly popular, particularly with the onset of clickwrap licensing. The Uniform Computer Information Transactions Act (UCITA) has been enacted in two states: Maryland and Virginia. Among other things, this law makes so-called “clickwrap” licenses valid and enforceable, without a large degree of scrutiny over what goes in them. The law attempts to manage all aspects of computer and information transactions, and is indeed a dauntingly large piece of legislation. It covers a large variety of situations, and thus is extremely significant in the states where it governs. Furthermore, it permits interested parties from other states to use its provisions even if their transactions do not involve Maryland or Virginia. For that reason, the full table of contents and selected excerpted provisions are included here.

Code of Virginia Title 59.1 - TRADE AND COMMERCE. Chapter 43 - Uniform Computer Information Transactions Act

59.1-501.1 Title 59.1-501.2 Definitions 59.1-501.3 Scope; exclusions 59.1-501.4 Description unavailable 59.1-501.4:1 Consumer protection law governs 59.1-501.5 Relation to federal law; fundamental public policy...

59.1-501.6 Rule of construction 59.1-501.7 Legal recognition of electronic record and authent... 59.1-501.8 Proof and effect of authentication 59.1-501.9 Choice of law 59.1-501.10 Contractual choice of forum 59.1-501.11 Unconscionable contract or term 59.1-501.12 Manifesting assent 59.1-501.13 Description unavailable

59.1-501.13:1 Opportunity to review 59.1-501.14 Description unavailable 59.1-501.14:1 Pretransaction disclosures in Internet-type transa... 59.1-501.15 Variation by agreement; commercial practice 59.1-501.16 Supplemental principles; good faith; commercial pr... 59.1-501.17 Decision for court; legal consequences; reasonable...

59.1-501.18 through 59.1-502 59.1-502.1 59.1-502.2 59.1-502.3 59.1-502.4

Formal requirements Formation in general Offer and acceptance in general Acceptance with varying terms

59.1-502.5 Conditional offer or acceptance 59.1-502.6 Offer and acceptance; electronic agents 59.1-502.7 Formation; releases of informational rights

59.1-502.8 Adopting terms of records 59.1-502.9 Mass-market license 59.1-502.10 Terms of contract formed by conduct

$9.1-502.11 Description unavailable 59.1-502.12 Efficacy and commercial reasonableness of attribut... 59.1-502.13 Determining attribution 59.1-502.14 Electronic error; consumer defenses 59.1-502.15 Electronic message; when effective; effect of ackn...

59.1-502.16 Idea or information submission 59.1-502.17 through 59.1-503

59.1-503.1 Parol or extrinsic evidence 59.1-503.2 59.1-503.3 59.1-503.4 59.1-503.5

Practical construction Modification and rescission Continuing contractual terms Terms to be specified

59.1-503.6 Performance under open terms 59.1-503.7 Interpretation and requirements for grant 59.1-503.8 Description unavailable 59.1-503.9 Agreement for performance to party’s satisfaction... 59.1-503.10 Licenses to nonprofit libraries, archives or educa...

59.1-503.11 through 59. 1-504 59.1-504.1 Warranty and obligations concerning noninterferenc...

59.1-504.2 Express warranty 59.1-504.3 Implied warranty; merchantability of computer prog...

122

59.1-504.4 59.1-504.5 59.1-504.6 59.1-504.7

Implied warranty; informational content Implied warranty; licensee’s purpose; system integ... Disclaimer or modification of warranty Modification of computer program

59.1-504.8 Cumulation and conflict of warranties 59.1-504.9 Third-party beneficiaries of warranty 59.1-504.10 No implied warranties for free software

59.1-504.11 through 59.1-505 59.1-505.1 Ownership of informational rights

59.1-505.2 Title to copy 59.1-505.3 Transfer of contractual interest

59.1-505.4 Effect of transfer of contractual interest 59.1-505.5 Performance by delegate; subcontract 59.1-505.6 Transfer by licensee 59.1-505.7 Financing if financier does not become licensee

59.1-505.8 Finance licenses 59.1-505.9 Financing arrangements; obligations irrevocable

59.1-505.10 Financing arrangements; remedies or enforcement 59.1-505.11 Financing arrangements; effect on licensor’s right...

59.1-505.12 through 59.1-506 59.1-506.1 Performance of contract in general 59.1-506.2 Licensor’s obligations to enable use

59.1-506.3 59.1-506.4 59.1-506.5 59.1-506.6

Submissions of information to satisfaction of part... Immediately completed performance Electronic regulation of performance Copy; delivery; tender of delivery

59.1-506.7 Copy; performance related to delivery; payment 59.1-506.8 Copy; right to inspect; payment before inspection... 59.1-506.9 Copy; when acceptance occurs

59.1-506.10 Copy; effect of acceptance; burden of establishing... 59.1-506.11 59.1-506.12 59.1-506.13 59.1-506.14 59.1-506.15 59.1-506.16 59.1-506.17

Access contracts Correction and support contracts Contracts involving publishers, dealers, and end u... Risk of loss of copy Excuse by failure of presupposed conditions Termination; survival of obligations Notice of termination

59.1-506.18 Termination; enforcement

59.1-506.19 through 59.1-507 59.1-507.1

Breach of contract; material breach

59.1-507.2 Waiver of remedy for breach of contract 59.1-507.3 Cure of breach of contract 59.1-507.4 Copy; refusal of defective tender 59.1-507.5 Copy; contract with previous vested grant of right... 59.1-507.6 Copy; duties upon rightful refusal 59.1-507.7 Copy; revocation of acceptance 59.1-507.8 Adequate assurance of performance 59.1-507.9 Anticipatory repudiation 59.1-507.10 Retraction of anticipatory repudiation

59.1-507.11 through 59.1-508 59.1-508.1 Remedies in general 59.1-508.2 Cancellation 59.1-508.3 Contractual modification of remedy 59.1-508.4 Liquidation of damages

59.1-508.5 Limitation of actions 59.1-508.6 Remedies for fraud

59.1-508.7 Measurement of damages in general 59.1-508.8 Licensor’s damages 59.1-508.9 Licensee’s damages 59.1-508.10 Recoupment

59.1-508.11 Specific performance 59.1-508.12 Completing performance 59.1-508.13 Continuing use 59.1-508.14 Discontinuing access 59.1-508.15 Right to possession and to prevent use

59.1-508.16 Limitations on electronic self-help 59.1-508.17 through 59.1-509 59.1-509.1 Severability 59.1-509.2 Previous rights and transactions Va. Code Ann. § 59.1-501.5. Relation to federal law; fundamental public policy; transactions subject to other state law.

(a) A provision of this chapter that is preempted by federal law is unenforceable to the extent of the preemption. (b) If a term of a contract violates a fundamental public policy, the court may refuse to enforce the contract, enforce the remainder of the contract without the impermissible term, or limit the application of the impermissible term so as to avoid a result contrary to public policy, in each case to the extent that the interest in enforcement is clearly outweighed by a public policy against enforcement of the term.

(c) In a transaction in which a copy of computer information in its final form is made generally available, a term of a contract is unenforceable to the extent that the term prohibits an end-user licensee from engaging in otherwise lawful public discussion relating to the computer information. However, this subsection does not preclude enforcement

of a term

that establishes

or enforces

rights under trade

secret, trademark,

defamation,

commercial

disparagement, or other laws. This subsection does not alter the applicability of subsection (b) to any term not

rendered unenforceable under this subsection. (d) This chapter does not apply to an intellectual property notice that is based solely on intellectual property rights and is not part of a contract. The effect of such a notice is determined by law other than this chapter. (e) If a law of the Commonwealth in effect on the effective date of this chapter applies to a transaction governed by this chapter, the following rules apply: (1) A requirement that a term, waiver, notice, or disclaimer be in a writing is satisfied by a record. (2) A requirement that a record, writing, or term be signed is satisfied by an authentication. (3) A requirement that a term be conspicuous, or the like, is satisfied by a term that is conspicuous under

this chapter. (4) A requirement of consent or agreement to a term is satisfied by a manifestation of assent to the term in accordance with this chapter. Va. Code agents.

Ann.

§ 59.1-501.7.

Legal

recognition

of electronic

record

and

authentication;

use

of electronic

(a) A record or authentication may not be denied legal effect or enforceability solely because it is in electronic form. (b) This chapter does not require that a record or authentication be generated, stored, sent, received, or otherwise processed by electronic means or in electronic form. (c) In any transaction, a person may establish requirements regarding the type of authentication or record acceptable to that person.

(d) A person using an electronic agent that he has selected for making an authentication, performance, or agreement, including manifestation of assent, is bound by the operations of the electronic agent, even if no individual was aware of or reviewed the agent’s operations or the results of the operations.

Va. Code Ann. § 59.1-501.8. Proof and effect of authentication. (a) Authentication may be proven in any manner, including a showing that a party made use of information or access that could have been available only if it engaged in conduct or operations that authenticated the record or term.

124

(b) Compliance with a commercially reasonable attribution procedure agreed to or adopted by the parties or

established by law for authenticating a record authenticates the record as a matter of law. Va. Code Ann. § 59.1-501.9. Choice of law. (a) The parties in their agreement may choose the applicable law. However, the choice is not enforceable in a consumer contract to the extent it would vary a statute, administrative rule, or regulation that may not be varied by agreement under the law of Virginia. (b) In the absence of an enforceable agreement on choice of law, the contract is governed by the law of Virginia. Va. Code Ann. § 59.1-501.10. Contractual choice of forum. (a) The parties in their agreement may choose an exclusive judicial forum unless the choice is unreasonable or unjust. (b) A judicial forum specified in an agreement is not exclusive unless the agreement expressly so provides and, in a mass-market transaction, expressly and conspicuously so provides. Va. Code Ann. § 59.1-501.11. Unconscionable contract or term. (a) If a court as a matter of law finds a contract or a term thereof to have been unconscionable at the time it was made, the court may refuse to enforce the contract, enforce the remainder of the contract without the unconscionable

term, or limit the application of the unconscionable term so as to avoid an unconscionable result. (b) If a court as a matter of law finds a contract or a term thereof has been induced by unconscionable conduct

or that unconscionable conduct has occurred in the collection of a claim arising from the contract, the court may grant appropriate relief. (c) If it is claimed or appears to the court that a contract or term thereof may be unconscionable, the parties must be afforded a reasonable opportunity to present evidence as to its commercial setting, purpose, and effect to aid the court in making the determination. Va. Code Ann. § 59.1-501.12. Manifesting assent.

(a) A person manifests assent to a record or term if the person, acting with knowledge of, or after having an opportunity to review the record or term or a copy of it: (1) authenticates the record or term with intent to adopt or accept it; or (2) intentionally engages in conduct or makes statements with reason to know that the other party or its electronic agent may infer from the conduct or statement that the person assents to the record or term. (b) An electronic agent manifests assent to a record or term if, after having an opportunity to review it, the electronic agent: (1) authenticates the record or term; or (2) engages in operations that in the circumstances indicate acceptance of the record or term. (c) If this chapter or other law requires assent to a specific term, a manifestation of assent must relate specifically to the term. (d) Conduct or operations manifesting assent may be proved in any manner, including showing that a person or an electronic agent obtained or used the information or informational rights and that a procedure existed by which a person or an electronic agent must have engaged in the conduct or operations in order to do so. Proof of compliance with subsection (a) (2) is sufficient if there is conduct that assents and subsequent conduct that reaffirms assent by electronic means. (e) The effect of provisions of this section may be modified by an agreement setting out standards applicable to future transactions between the parties. (f) Providers of online services, network access, and telecommunications services, or the operators of facilities

thereof, do not manifest assent to a contractual relationship simply by their provision of these services to other parties, including but not limited to transmission, routing, or providing connections, linking, caching, hosting,

information location tools, or storage of materials at the request or initiation of a person other than the service provider.

Va. Code Ann. § 59.1-501.13. Repealed by Acts 2004, c. 794.

125

Va. Code Ann. § 59.1-501.13:1. Opportunity to review. (a) A person has an opportunity to review a record or term only if it is made available in a manner that ought to call it to the attention of a reasonable person and permit review. (b) An electronic agent has an opportunity to review a record or term only if it is made available in a manner

that would enable a reasonably configured electronic agent to react to the record or term. (c) If a record or term is available for review only after a person becomes

obligated to pay or begins its

performance, the person has an opportunity to review only if he has a right to a return if he rejects the record. However, a right to a return is not required if: (1) the record proposes a modification of contract or provides particulars of performance under § 59.1503.5; or

(2) the primary performance is other than delivery or acceptance of a copy, the agreement is not a massmarket transaction, and the parties at the time of contracting had reason to know that a record or term would be presented after performance, use, or access to the information began. (d) The right to a return under this section may arise by law or by agreement.

(e) The effect of this section may be modified by an agreement setting out standards applicable to future transactions between the parties. Va. Code Ann. § 59.1-501.14. Repealed by Acts 2004, c. 794. Va. Code Ann. § 59.1-501.14:1. Pretransaction disclosures in Internet-type transactions.

This section applies to a licensor that makes its computer information available to a licensee by electronic means from its Internet or similar electronic site. In such a case, the licensor affords an opportunity to review the terms of a standard form license, which opportunity satisfies § 59.1-501.13:1 with respect to a licensee that acquires the information from that site, if the licensor: (1) makes the standard terms of the license readily available for review by the licensee before the information is delivered or the licensee becomes obligated to pay, whichever occurs first, by: (A) displaying prominently and in close proximity to a description of the computer information, or

to instructions or steps for acquiring it, the standard terms or a reference to an electronic location from which they can be readily obtained; or (B) disclosing the availability of the standard terms in a prominent place on the site from which the computer information is offered and promptly furnishing a copy of the standard terms on request before the transfer of the computer information; and (2) does not take affirmative acts to prevent printing or storage of the standard terms for archival or review purposes by the licensee.

Failure to provide an opportunity to review under this section does not preclude a person from providing a person an opportunity to review by other means pursuant to § 59.1-501.13:1 or law other than this chapter. Va. Code Ann. § 59.1-501.15. Variation by agreement; commercial practice. (a) The effect of any provision of this chapter, including an allocation of risk or imposition of a burden, may be varied by agreement of the parties. (b) The following rules are not variable by agreement:

(1) Obligations of good faith, diligence, reasonableness, and care imposed by this chapter may not be disclaimed by agreement, but the parties by agreement may determine the standards by which the of the obligation is to be measured if the standards are not manifestly unreasonable; (2) The limitations on enforceability imposed by unconscionability under § 59.1-501.11 and public policy under § 59.1-501.5 (b) may not be varied by agreement; and (3) Limitations on enforceability of, or agreement to, a contract, term, or right expressly sections listed in the following subsections may not be varied by agreement except to the extent each section: (A) the limitations on agreed choice of law in § 59.1-501.9 (a); (B) the limitations on agreed choice of forum in § 59.1-501.10;

performance fundamental stated in the provided in

(C) the requirements for manifesting assent in § 59.1-501.12 and opportunity for review in § 59.1501.13:1; (D) the limitations on enforceability in § 59.1-502.1; (E) the limitations on a mass-market license in § 59.1-502.9;

126

(F) the consumer defense arising from an electronic error in § 59.1-502.14; (G) the requirements for an enforceable term in §§ 59.1-503.3 (b), 59.1-503.7 (g), 59.1-504.6 (b) and (c), and 59.1-508.4 (a); (H) the requirements of § 59.1-503.4 (b) (2); (I) the limitations on a financier in §§ 59.1-505.7 through 59.1-505.11; (J) the restrictions on altering the period of limitations in § 59.1-508.5 (a) and (b); and (K) the limitations on self-help repossession in §§ 59.1-508.15 (b) and 59.1-508.16.

Va. Code Ann. § 59.1-502.2. Formation in general. (a) A contract may be formed in any manner sufficient to show agreement, including offer and acceptance or conduct of both parties or operations of electronic agents which recognize the existence of a contract. (b) If the parties so intend, an agreement sufficient to constitute a contract may be found even if the time of its making is undetermined, one or more terms are left open or to be agreed upon, the records of the parties do not otherwise establish a contract, or one party reserves the right to modify terms. (c) Even if one or more terms are left open or to be agreed upon, a contract does not fail for indefiniteness if the

parties intended to make a contract and there is a reasonably certain basis for giving an appropriate remedy. (d) In the absence of conduct or performance by both parties to the contrary, a contract is not formed if there is a material disagreement about a material term, including a term concerning scope. (e) If a term is to be adopted by later agreement and the parties intend not to be bound unless the term is so adopted, a contract is not formed if the parties do not agree to the term. In that case, each party shall deliver to the other party, or with the consent of the other party destroy, all copies of information, access materials, and other materials received or made, and each party is entitled to a return with respect to any contract fee paid for which

performance has not been received, has not been accepted, or has been redelivered without any benefit being retained. The parties remain bound by any contractual use term only with respect to information or copies received

or made from copies received pursuant to the agreement, but the contractual use term does not apply to information or copies properly received or obtained from another source. Va. Code Ann. § 59.1-502.3. Offer and acceptance in general.

Unless otherwise unambiguously indicated by the language or the circumstances: (1) An offer to make a contract invites acceptance in any manner and by any medium reasonable under the circumstances. (2) An order or other offer to acquire a copy for prompt or current delivery invites acceptance by either a

prompt promise to ship or a prompt or current shipment of a conforming or nonconforming copy. However, a shipment of a nonconforming copy is not an acceptance if the licensor seasonably notifies the licensee that the

shipment is offered only as an accommodation to the licensee. (3) If the beginning of a requested performance is a reasonable mode of acceptance, an offeror that is not notified of acceptance or performance within a reasonable time may treat the offer as having lapsed before

acceptance. (4) If an offer in an electronic message evokes an electronic message accepting the offer, a contract is formed: (A) when an electronic acceptance is received; or (B) if the response consists of beginning performance, full performance, or giving access to information, when the performance is received or the access is enabled and necessary access materials are received. Va. Code Ann. § 59.1-502.6. Offer and acceptance; electronic agents. (a) A contract may be formed by the interaction of electronic agents. If the interaction results in the electronic

agents’ engaging in operations that under the circumstances indicate acceptance of an offer, a contract is formed, but a court may grant appropriate relief if the operations resulted from fraud, electronic mistake, or the like. (b) A

contract

may

be formed

by the interaction

of an electronic

agent and

an individual

acting on the

individual’s own behalf or for another person. A contract is formed if the individual takes an action or makes a statement that the individual can refuse to take or say and that the individual has reason to know will:

(1) cause the electronic agent to perform, provide benefits, or allow the use or access that is the subject of the contract, or send instructions to do so; or

(2) indicate acceptance, regardless of other expressions or actions by the individual to which the individual has reason to know the electronic agent cannot react. (c) The terms of a contract formed under subsection (b) are determined under § 59.1-502.8 or § 59.1-502.9 but do not include a term provided by the individual if the individual had reason to know that the electronic agent could not react to the term.

These provisions (which are only a small part of UCITA) provide an idea of the overall

perspective of UCITA and some of the ways it handles complex transactional issues.

VI. A.

Computer Crimes

The Virginia Computer Crimes Act.

Va. Code Ann. § 18.2-152.1. Short title. This article shall be known and may be cited as the “Virginia Computer Crimes Act.” Va. Code Ann. § 18.2-152.2. Definitions.

For purposes of this article: “Computer” means an electronic, magnetic, optical, hydraulic or organic device or group of devices which, pursuant to a computer program, to human instruction, or to permanent instructions contained in the device or group of devices, can automatically perform computer operations with or on computer data and can communicate the

results to another computer or to a person. The term “computer” includes any connected or directly related device, equipment, or facility which enables the computer to store, retrieve or communicate computer programs, computer data or the results of computer operations to or from a person, another computer or another device. “Computer data” means any representation of information, knowledge, facts, concepts, or instructions which is being prepared or has been prepared and is intended to be processed, is being processed, or has been processed in a

computer or computer network. “Computer data” may be in any form, whether readable only by a computer or only by a human or by either, including, but not limited to, computer printouts, magnetic storage media, punched cards,

or stored internally in the memory of the computer. “Computer network” means two or more computers connected by a network. “Computer operation” means arithmetic, logical, monitoring, storage or retrieval

functions

and

any

combination thereof, and includes, but is not limited to, communication with, storage of data to, or retrieval of data

from any device or human hand manipulation of electronic or magnetic impulses. A “computer operation” for a particular computer may also be any function for which that computer was generally designed. “Computer program” means an ordered set of data representing coded instructions or statements that, when executed by a computer, causes the computer to perform one or more computer operations. “Computer services” means computer time or services, including data processing, services, Internet services, electronic mail services, electronic message services, or information or data stored in connection therewith.

“Computer software” means a set of computer programs, procedures and associated documentation concerned with computer data or with the operation of a computer, computer program, or computer network. “Electronic mail service provider’ (EMSP) means any person who (i) is an intermediary in sending or receiving electronic mail and (ii) provides to end-users of electronic mail services the ability to send or receive

electronic mail. “Financial instrument” includes, but is not limited to, any check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card, transaction authorization mechanism, marketable security, or any computerized representation thereof.

“Network” means any combination of digital transmission facilities and packet switches, routers, and similar equipment interconnected to enable the exchange of computer data. “Owner” means an owner or lessee of a computer or a computer network or an owner, lessee, or licensce of

computer data, computer programs, or computer software. “Person” shall include any individual, partnership, association, corporation or joint venture.

“Property” shall include: 1. Real property; 2. Computers and computer networks; 3.

Financial

instruments, computer data, computer programs,

computer software and all other personal

property regardless of whether they are: a. Tangible or intangible; b. In a format readable by humans or by a computer;

c.

In transit between computers or within a computer network or between any devices which

comprise a computer; or d. Located on any paper or in any device on which it is stored by a computer or by a human; and 4. Computer services.

129

A person “uses” a computer or computer network when he attempts to cause or causes: 1. 2. data or 3.

A computer or computer network The withholding or denial of the computer software to another user; A person to put false information

to perform or to stop performing computer operations; use of a computer, computer network, computer program, computer or into a computer.

A person is “without authority’ when he has no right or permission of the owner to use a computer or computer network or he uses a computer or computer network in a manner exceeding such right or permission. Va. Code Ann. § 18.2-152.3. Computer fraud. Any person who uses a computer or computer network without authority and with the intent to: 1. Obtain property or services by false pretenses; 2. Embezzle or commit larceny; or 3. Convert the property of another

is guilty of the crime of computer fraud. If the value of the property or services obtained is $200 or more, the crime of computer fraud shall be punishable as a Class 5 felony. Where the value of the property or services obtained is less than $200, the crime of

computer fraud shall be punishable as a Class 1 misdemeanor. Va. Code Ann. § 18.2-152.3:1. Transmission of unsolicited bulk electronic mail (spam); penalty. A. Any person who: 1. Uses a computer or computer network with the intent to falsify or forge electronic mail transmission information or other routing information in any manner in connection with the transmission of unsolicited

bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers; or

2. Knowingly sells, gives, or otherwise distributes or possesses with the intent to sell, give, or distribute software that (i) is primarily designed or produced for the purpose of facilitating or enabling the falsification of electronic mail transmission information or other.routing information; (ii) has only limited commercially significant purpose or use other than to facilitate or enable the falsification of electronic

mail transmission information or other routing information; or (iii) is marketed by that person acting alone or with another for use in facilitating or enabling the falsification of electronic mail transmission information or other routing information is guilty of a Class 1 misdemeanor. B. A person is guilty of a Class 6 felony if he commits a violation of subsection A and:

1. The volume of UBE transmitted exceeded 10,000 attempted recipients in any 24-hour period, 100,000 attempted recipients in any 30-day time period, or one million attempted recipients in any one-year time period; or 2. The revenue generated from a specific UBE

transmission exceeded $1,000 or the total revenue generated

from all UBE transmitted to any EMSP exceeded $50,000. C. A person is guilty of a Class 6 felony if he knowingly hires, employs, uses, or permits any minor to assist in the transmission of UBE in violation of subdivision B 1 or subdivision B 2. Va. Code Ann. § 18.2-152.4. Computer trespass; penalty. A. It shall be unlawful for any person to use a computer or computer network without authority and with the intent to: 1. Temporarily or permanently remove, halt, or otherwise disable any computer data, computer programs, or computer software from a computer or computer network; 2. Cause a computer to malfunction, regardless of how long the malfunction persists; 3. Alter or erase any computer data, computer programs, or computer software; 4. Effect the creation or alteration of a financial instrument or of an electronic transfer of funds; 5. Cause physical injury to the property of another; or 6. Make or cause to be made an unauthorized copy, in any form, including, but not limited to, any printed or electronic form of computer data, computer programs, or computer software residing in, communicated by, or produced by a computer or computer network.

B. Any person who violates this section shal! be guilty of computer trespass, which offense shall be punishable as a Class 1 misdemeanor. If there is damage to the property of another valued at $2,500 or more caused by such

person’s malicious act in violation of this section, the offense shall be punishable as a Class 6 felony.

30

C. Nothing in this section shall be construed to interfere with or prohibit terms or conditions in a contract or license related to computers, computer data, computer networks, computer operations, computer programs, computer services, or computer software or to create any liability by reason of terms or conditions adopted by, or technical measures implemented by, a Virginia-based electronic mail service provider to prevent the transmission of unsolicited electronic mail in violation of this article. Nothing in this section shall be construed to prohibit the monitoring of computer usage of, the otherwise lawful copying of data of, or the denial of computer or Internet access to a minor by a parent or legal guardian of the minor. Va. Code Ann. § 18.2-152.5. Computer invasion of privacy. A. A person is guilty of the crime of computer invasion of privacy when he uses a computer or computer network and intentionally examines without authority any employment, salary, credit or any other financial or personal information relating to any other person. “Examination” under this section requires the offender to review the information relating to any other person after the time at which the offender knows or should know that he is without authority to view the information displayed. B. The crime of computer invasion of privacy shall be punishable as a Class 1 misdemeanor. Va. Code Ann. § 18.2-152.6. Theft of computer services. Any person who willfully uses a computer or computer network, with intent to obtain computer

services

without authority, shall be guilty of the crime of theft of computer services, which shall be punishable as a Class | misdemeanor. If the theft of computer services is valued at $2,500 or more, he is guilty of a Class 6 felony. Va. Code Ann. § 18.2-152.7. Personal trespass by computer.

A. A person is guilty of the crime of personal trespass by computer when he uses a computer or computer network without authority and with the intent to cause physical injury to an individual. B. If committed maliciously, the crime of personal trespass by computer shall be punishable as a Class 3

felony. If such act is done unlawfully but not maliciously, the crime of personal trespass by computer shall be punishable as a Class 6 felony. Va. Code Ann. § 18.2-152.7:1. Harassment by computer; penalty. If any person, with the intent to coerce, intimidate, or harass any person, shall use a computer or computer network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, or make any suggestion or proposal of an obscene nature, or threaten any illegal or immoral act, he shall be guilty of a Class 1 misdemeanor. Va. Code Ann. § 18.2-152.8. Property capable of embezzlement. For purposes of § 18.2-111, personal property subject to embezzlement shall include: 1. Computers and computer networks; 2. Financial instruments, computer data, computer programs, computer software and all other personal property regardless of whether they are: a. Tangible or intangible; b. In a format readable by humans or by a computer; c. In transit between computers or within a computer network or between any devices which comprise a computer; or d. Located on any paper or in any device on which it is stored by a computer or by a human; and 3. Computer services.

Va. Code Ann. § 18.2-152.9. Limitation of prosecution. Notwithstanding the provisions of § 19.2-8, prosecution of a crime which is punishable as a misdemeanor pursuant to this article must be commenced before the earlier of (i) five years after the commission of the last act in the course of conduct constituting a violation of this article or (ii) one year after the existence of the illegal act and

the identity of the offender are discovered by the Commonwealth, by the owner, or by anyone else who is damaged by such violation. Va. Code Ann. § 18.2-152.10. Venue for prosecution. For the purpose of venue under this article, any violation of this article shall be considered to have been committed in any county or city: 1. In which any act was performed in furtherance of any course of conduct which violated this article;

131

2. In which the owner has his principal place of business in the Commonwealth; 3. In which any offender had control or possession of any proceeds of the violation or of any books, records, documents, property, financial instrument, computer software, computer program, computer data, or other material or objects which were used in furtherance of the violation;

4. From which, to which, or through which any access to a computer or computer network was made whether by wires, electromagnetic waves, microwaves, or any other means of communication;

5. In which the offender resides; or 6. In which any computer which is an object or an instrument of the violation is located at the time of the alleged offense. Va. Code Ann. § 18.2-152.11. Article not exclusive.

The provisions of this article shall not be construed to preclude the applicability of any other provision of the criminal law of this Commonwealth which presently applies or may in the future apply to any transaction or course of conduct which violates this article, unless such provision is clearly inconsistent with the terms of this article. Va. Code Ann. § 18.2-152.12. Civil relief; damages. A. Any person whose property or person is injured by reason of a violation of any provision of this article may sue therefor and recover for any damages sustained and the costs of suit. Without limiting the generality of the term,

“damages” shall include loss of profits. B. If the injury under this article arises from the transmission

of unsolicited

bulk electronic

mail

in

contravention of the authority granted by or in violation of the policies set by the electronic mail service provider where the defendant has knowledge of the authority or policies of the EMSP or where the authority or policies of the EMSP are available on the electronic mail service provider’s website, the injured person, other than an electronic mail service provider, may also recover attorneys’ fees and costs, and may elect, in lieu of actual damages, to recover the lesser of $10 for each and every unsolicited bulk electronic mail message transmitted in violation of this article, or $25,000 per day. The injured person shall not have a cause of action against the electronic mail service

provider that merely transmits the unsolicited bulk electronic mail over its computer network. Transmission of electronic mail from an organization to its members shall not be deemed to be unsolicited bulk electronic mail. C. If the injury under this article arises from the transmission of unsolicited bulk electronic mail in contravention of the authority granted by or in violation of the policies set by the electronic mail service provider where the defendant has knowledge of the authority or policies of the EMSP or where the authority or policies of the EMSP are available on the electronic mail service provider’s website, an injured electronic mail service provider

may also recover attorneys’ fees and costs, and may elect, in lieu of actual damages, to recover $1 for each and every intended recipient of an unsolicited bulk electronic mail message where the intended recipient is an end user of the EMSP or $25,000 for each day an attempt is made to transmit an unsolicited bulk electronic mail message to an end user of the EMSP. In calculating the statutory damages under this provision, the court may adjust the amount

awarded as necessary, but in doing so shall take into account the number of complaints to the EMSP generated by the defendant’s messages, the defendant’s degree of culpability, the defendant’s prior history of such conduct, and the extent of economic gain resulting from the conduct. Transmission of electronic mail from an organization to its members shall not be deemed to be unsolicited bulk electronic mail. D. At the request of any party to an action brought pursuant to this section, the court may, in its discretion, conduct all legal proceedings in such a way as to protect the secrecy and security of the computer, computer network, computer data, computer program and computer software involved in order to prevent possible recurrence of the same or a similar act by another person and to protect any trade secrets of any party and in such a way as to protect the privacy of nonparties who complain about violations of this section. E. The provisions of this article shall not be construed to limit any person’s right to pursue any additional civil remedy otherwise allowed by law.

F. A civil action under this section must be commenced before expiration of the time period prescribed in § 8.01-40.1. In actions alleging injury arising from the transmission of unsolicited bulk electronic mail, personal jurisdiction may be exercised pursuant to § 8.01-328.1.

Va. Code Ann. § 18.2-152.13. Severability. If any provision or clause of this article or application thereof to any person or circumstances is held to be invalid, such invalidity shall not affect other provisions or applications of this article which can be given effect

without the invalid provision or application, and to this end the provisions of this article are declared to be severable.

132

Va. Code Ann. § 18.2-152.14. Computer as instrument of forgery. The creation, alteration, or deletion of any computer data contained in any computer or computer network, which if done on a tangible document or instrument would constitute forgery under Article | (§ 18.2-168 et seq.) of Chapter 6 of this Title, will also be deemed to be forgery. The absence of a tangible writing directly created or altered by the offender shall not be a defense to any crime set forth in Article | (§ 18.2-168 et seq.) of Chapter 6 of this Title if a creation, alteration, or deletion of computer data was involved in lieu of a tangible document or

instrument. Va. Code Ann. § 18.2-152.15. Encryption used in criminal activity.

Any person who willfully uses encryption to further any criminal activity shall be guilty of an offense which is separate and distinct from the predicate criminal activity and punishable as a Class 1 misdemeanor.

“Encryption”

means the enciphering

unintelligible data into intelligible form.

of intelligible data into unintelligible form

or the deciphering of

Present: Hassell, C.J., Koontz, Kinser, Lemons, Agee,’ and Goodwyn, JJ., and Lacy, S.J. JEREMY

v.

JAYNES

Record

No.

OPINION JUSTICE G.

062388

September COMMONWEALTH

OF

BY STEVEN

12,

AGEE

2008°

VIRGINIA

FROM THE COURT OF APPEALS Upon rehearing pursuant to April 28, 2008 and May

OF VIRGINIA orders dated 19, 2008

Jeremy Jaynes appeals from the judgment of the Court of Appeals which affirmed his convictions in the Circuit Court of Loudoun County for violations of Code § 18.2-152.3:1, the unsolicited bulk electronic mail (e-mail)

provision of the Virginia Computer Crimes Act, Code §§ 18.2-152.1 through —152.15. For the reasons set forth below, we will reverse the judgment of the Court of Appeals.

I. From several

mails Inc.

2003,

his

within (AOL)

a on

Jaynes

in

26, had

routers

each

sent

of

he

requested

intentionally

“ Justice

and

PROCEEDINGS

North

and

three

Carolina,

servers

to

Jaynes

send

subscribers

separate

of

occasions.

over

Online,

On

16,

July

transmission

information

onto

any

19,

19,104.

2003,

None

of

communication the

header

participated

in

he

the from

sent

the

24,172,

Jaynes.

hearing

and

and

with

AOL’s

recipients

information

e-

America

e-mail

July

used 10,000

unsolicited

sent

pieces

to

BELOW

of

On

falsified

Agee

MATERIAL

period

12,197

network.

2003,

AND

Raleigh,

24-hour

routing

proprietary

mails

home

computers,

falsified

July

BACKGROUND

and

of

on

the

e-

He sender

domain

decision

of

this case prior to his retirement from the Court on June 30, 2008. * The prior opinion rendered February 29, 2008, reported at 275 Va. 341, 657 S.E.2d 478 (2008), was withdrawn by the Court after a petition for rehearing was granted by Orders dated April 28, 2008 and May 19, 2008.

134

names

before

transmitting

the

However,

investigators

used

identify

Jaynes

sender

arrested

and

provides

in A. 1

as

the

charged

with

relevant

a

e-mails

to

the

recipients.°®

sophisticated of

the

violating

database

e-mails. 7

Code

§

search

Jaynes

to

was

18.2-152.3:1,

which

part:

Any person who: Uses a computer or computer network with the intent to falsify or forge electronic mail transmission information or other routing information in any manner in connection with the transmission of

unsolicited the

bulk

computer

provider Class

1

or

electronic

network

its

of

an

subscribers

mail

through

electronic

.

.

.

or

mail

is

into service

guilty

of

a

misdemeanor.

A person is guilty of a Class 6 felony if he commits a violation of subsection A and: The volume of UBE transmitted exceeded 10,000 attempted recipients in any 24-hour period, 100,000 attempted recipients in any 30-day time period, or

one

million

time

While a

cache

e-mail

also

AOL

of

executing compact

addresses

led

to

e-mail

account

the

attempted

recipients

in

any

one-year

period.

a

search

discs and

1.3

(CDs)

information

of

information for

Jaynes’

containing

billion

confiscation

address

of

millions

e-mail

storage

and of

other AOL

home,

police

over user

discs

176

million

names.

The

which

personal

discovered

search

contained

and

subscribers.

full

private The

AOL

° Simple Mail Transfer Protocol (SMTP) is what an e-mail server uses to transmit an e-mail message, and the SMTP requires verification of the sender’s IP address and domain. Evidence at trial demonstrated that Jaynes sent the e-mails with domain names which did not correspond to the domain names assigned to the sending IP addresses.

135

user and

information was

in

Jaynes’

demonstrated

recipients in

part,

had

stolen

from

possession.

that

of

been

Jaynes

his

During

knew

that

unsolicited

because

the

e-mail

AOL

by

a

trial,

all

of

e-mails

of

employee

evidence

the

were

addresses

former

more

than

50,000

subscribers

all

to

recipients

AOL,

ended

in

“@aol.com.”? An were

expert

not

witness

consistent

constituted

with

e-mail)

header

information

mails.

Other were

Loudoun

County

and

others

were

the

to

dismiss

statute

The

circuit

court strike

denied in

which

disguised

the

charges

that he

the

and

dormant

violated

motion.

Jaynes

challenged

the

him

filed

e-

AOL’s

William

First

and

located

on

Commerce

the

the

of

were

against

as

sender

all

Prince

to

send

that

Jaynes

rather

true to

some

in

by

referred

addresses

located

sent but

the

although

violated

vague,

e-mail,

demonstrated

Virginia,

unconstitutionally

to

trial

e-mails

(sometimes

multiple

in

was

motion

at

had

located

moved

that

used

the

bulk

e-mail

Jaynes

and

evidence

servers

Jaynes

bulk

because

that

solicited

unsolicited

“spam”

grounds

testified

in

County. the Clause,

Amendment.

a

separate

jurisdiction

of

the

7 Computers may be identified by their unique IP address number, which consists of blocks of numerals

separated by periods. Jaynes’ e-mails advertised one of refund claims product, (2) a “Penny

“History potential

which

Eraser”

product.

buyers

would

redirected

consummate

the

them

To

click

outside

three Stock

purchase on

a

the

purchase.

136

products: Picker,”

(1) and

of

products,

one

hyperlink

e-mail,

these within

where

the

they

a FedEx (3) a e-mail,

could

circuit

court.

denied

the

A

The

motion

jury

in

and

prison

consecutively The

Court

of

an

on

Jaynes

of

circuit

each an

Court

affirmed

Va.

App.

673,

the

of

his

makes of

634

four

Appeals.

assignments First,

he

of

error

assigns

on

charged.

Second,

Jaynes

First

Amendment

crimes

“abridge[s] and

it

was

Separately, Appeals

vagueness. Commerce

the error

not

Jaynes to

Lastly, Clause

hold

that

Jaynes

of

the

Jaynes

the

Code

§

asserts

circuit

posits

to

three

run

of

nine

Jaynes

v.

(2006).

We

years.

awarded

18.2-152.3:1

because

judgment

Code

his

error

to

§

18.2-

failure

statute

him

anonymous

18.2-152.3:1 the

over

convictions

the

of

the

jurisdiction

right

that

States

to

contends

§

the

is

on

that

of

the

void

for

violates

the

Constitution.

JURISDICTION

the

had

had

as

to

error

reverse

Code

United

that

court

to

assigns

A.

that

357

to

Code

ANALYSIS

court

of

sentences

S.E.2d

circuit

Court

Jaynes

convictions,

the

basis.

and

violating

imprisonment

that

speech,”

of

sentenced

with

term

counts

determination

152.3:1

jurisdiction

appeal.

Jaynes

the

had

three

count,

II.

the

it

court

active

Appeals 48

determined

strike.

the

for

Commonwealth,

Jaynes

to

convicted

18.2-152.3:1,

years

court

Court

of

Appeals

jurisdiction he

did

137

not

over “use”

erred

him a

for

in

holding

violating

computer

in

§

Virginia. only

in

He the

send

Jaynes

the

committed

no

the

did

have

an

v.

Baskerville,

the

basis

that

In

crime.

transmissions prove intent

of

must

also

prove

provider’s

is

occurred computer

not or

subscriber

that

complete

into

the

containing

e-mails,

he

the

circuit

crime

must

the

a

and

connection for

until computer

the

with

that

there

is

network

false

of

§

elements

of

no

18.2-

such The

use

with

of

routing an

e-mail

Thus,

e-mail

transmission

of

e-mail

the

was

Commonwealth

false

use

of

Commonwealth

transmission.

routing

138

the

be

volume

that

such

Moreno not

had

the

the

information.

transmission

network

the

period,

computer

under

void.

all

of

actions

courts.

Code

establish

time

routing

are

he

no

could

court

under

element

his

(1995),

convictions

is

computers

had

and

Jaynes,

a

he

Virginia,

Virginia

his

occur

Carolina,

argues

by

used

in

because

in

used

North

him

specific

the

Raleigh,

over

to

falsifying

only

653

Commonwealth

sender

he

can

information

S.E.2d

and

a

statute

Further,

452

prosecute

within

the

through

him

addition

the

information

16,

to

successfully the

crime

Va.

the

in

result”

jurisdiction

152.3:1(B),

must

“immediate

over

home

that

routing

because

Virginia. of

of

e-mail

that

his

routing

according

jurisdiction To

in

249

for

Therefore,

from

violation

the

maintains

crime

over

a

where

e-mails

control not

that

location

falsified. to

contends

information.

the

passing

provider

or

Jaynes be

routed

argues

through

established,

server AOL

in

AOL

all

e-mail

must

reach

subscribers

as

his

that

located

The

in

standard

reasonable

e-mails

of

he

review

to

AOL

Jaynes’

action,

acts

intended

to,

has

a

that

and

long may

be

though

he

is

events

of

which

are

do

been

person

state

a

charged

beyond the

may

fact,

the evil

the

AOL’s public.

an

utilize

intended

was

Applying

along the

with

and

all

evidence that

AOL’s

transmission

are

servers

intended

and

in

servers

knew

the

servers

necessary

through

produce

of

place

the

jurisdiction

outside

jurisdiction is

AOL

that

exercise

commonplace in

ended

he

the

Virginia.

committed

in

of

and

because

conclude

e-mail

in

knew

presented

would

Thus

the

occurred

Furthermore,

we

Jaynes

Virginia.

the

e-mail

selecting

servers

general

evidence

subscribers

of

criminal

the

that

the

By

e-mails

location

to

that

in

network,

the

therefrom,

located

computer

that

to

are

result

whose

to

evidence

recipient’s

Jaynes AOL

happened

the

recipient.

utilize

users

that

As

the

recipients,

accessible

conclusion

sent

through

established

and

inferences the

to

e-mails

disagree.

intended

would

evidence

easily

We

e-mail

send

Virginia,

information

supports

to

sent

flow

the

e-mails

intended

“@aol.com.”

which

his

“merely

servers.”

to

clearly

‘It

he

order

intended

our

that

harm

where



but

the

liability

the

when

state,

within

criminal

fruit.’

139

the

over

he

evil

starts

Travelers

are

state.

that



a

results,

the

train

Health

of

Ass'n

v.

Commonwealth,

(citing

Strassheim

Jaynes, referred

to

conduct

as if

and

who,

17-18, kK

parties

turn,

of

at

argues different

the

route

type

of

an

mail

control

used.

reliance

affirmative

act

between

not

the

the

drugs

is

out-of-state

defendant,

to

an

while

accomplice

the

drugs

to

two

the

drugs

in

Virginia.

in

other 249

the

result”

of

Jaynes’

action,

e-mails

e-mails.

service the

handling

networks

before

the

and

an

of

deliver

of

principle,

through

crime

charged

fails

Va.

and

regardless

or and

of

use

as computer

the

“immediate

intermediate

of

the

computer

its

subscribers

140

above,

any

use

the

use

the

*

noted

AOL’s was

*

of

the

because

as

is

*

subscribers

use

such

cannot

Moreno.

because,

a

e-mail

contends,

in

AOL

the

sender

Jaynes

occurred

insured

Because

e-mail

routing,

selecting

e-mails

provider

could

that

Moreno

to

the

his

on

network

part

this

routed

which

of

e-mail

(1911)).

that

Moreno,

(1949)

284-85

doctrine,”

of

e-mail

Such

recipients

an

269

be

intervention

Jaynes’

by

sold

263,

654.

that

destination,

taken

In

delivery

ultimately

S.E.2d

280,

intervene

delivered

its

Jaynes’

U.S.

result

harm.

for

S.E.2d

argues

“immediate

reaches

same

221

51

*

Jaynes number

892,

Moreno,

in-state

in

452

kek

on

third

who

877,

Daily,

arranged

accomplices

at

v.

the

the

Arizona,

Arizona

Va.

relying

applicable

in

188

routes

network

is

an

integral

of

AOL’s

e-mail

of

servers Jaynes of

was

the

was

Code

§

“immediate

amenable

to

over

Jaynes

next

Amendment

and

the

Court

that

Virginia

to §

FIRST

of

that

raise

his

a

First

*

not

18.2-152.3:1

as

exists

which

Salerno, the That

481

statute is,

by

Jaynes

potentially

he

U.S.

hold

that

violation

court

had

cannot

affirming

motion

to

dismiss

without

was

in

the

on

need

to

of

but a

He

circuit

that

that

challenge, nature

First

enforced.

deciding

the

the

the

be

in

Amendment

make

does

basis. Jaynes

had

concluded

trespass

address

the

First

a not

STANDING

pure

facial

argue

“that

the

Act

would

739,

745

(1987).

contends the

under

is

*

claiming

reach

a

18.2-152.3:1

overbroad

1.

under

we

for

circuit

erred

eliminating *

§

statute

assumed

18.2-152.3:1

does

acts,

OVERBREADTH

Code

as

Appeals

Appeals

issue.

Jaynes

the

AMENDMENT

the

denying

thereby

Amendment

Accordingly,

therefore

Court

of

Code

statute,

in

deficient

ruling

standing

prosecution

contends

constitutionally

The

Jaynes’

Jaynes. B.

court’s

of

18.2-152.3:1.

jurisdiction

argues

result”

it

is

that

protected

be

challenge

to

no

circumstances

set

§

valid.”

United

States

Instead,

Jaynes

challenges

unconstitutional because speech

141

of

Code

the of

as

overbroad.

statute

could

a

party,

third

v.

he

(Jaynes)

is

entitled

unprotected

speech.”

The First

Commonwealth

Amendment

However, actually

when

in

Commonwealth’s

I”) a

policies (RRHA).

Court

which

no

otherwise

standing

of

the

First

to

raise

the

standing

issue

longstanding Amendment

proceedings,

we

Va.

at

RRHA

damage

offenses,

55-56,

property but

a

Fourteenth

rights

are

with

the

disagree

arrest

and

assert

that

the

barred

from

access

at

conviction, RRHA

and

563

standing

676-77. Hicks

its

thus

of

to

to

and

S.E.2d

that

made

at

Upon

prior

his

asserted

RRHA

determining were

had

which

been

property

property.

Id.

trespass a

right

persons

overbroad

was

had

and

subsequent he

to

Authority

Hicks

on

(2002)

certain

trespass

that

conviction

to

678-79.

674

defendant

Housing

trespass

properties his

563

challenge

S.E.2d

because

policies

to

48,

Redevelopment

continued

S.E.2d

Va.

overbreadth

264

from

264

accorded

Richmond

Amendment

context and

Hicks,

the

banned

First

v.

Amendment

563

the II,

by

of

52-53,

has

his

arguments.

this

First

in

Hicks

court

Commonwealth

(“Hicks

at

in

Jaynes

for

defense.

viewed

state

exoneration

contends

jurisprudence

applicable

In

claim

overbreadth

presented

Amendment

raise

to

invalid.

would

under Id.

to be

the at

54,

° The Commonwealth also argues that Jaynes did not preserve this issue for appeal because he did not raise

his overbreadth challenge in the circuit court. This contention is without merit. Jaynes raised it in his brief in support

142

563

S.E.2d

engaged under

at

in

any

which

reversed policy

his

protected

by

kek

As

an

a

of

the

issue

and

United

of

that

matter

the

conduct

Court the

that

Id. at

that

trespass

this

concluded

States

First

issue of

58,

had

statute in

RRHA

are

he

Hicks

I

trespass

clearly

563

S.E.2d

at

680.

Amendment

was

First

Supreme

placed

standing

before

Amendment

Court

the

standing

in Hicks

only

in

Court:

was

the

whether

subject

to

courts.

the

of

doctrine of

substantive is

the

guise

a

standing

challenge

accept

substantive the

that

contend

*

as-~applied

under

of

Amendment.”

federal

rules

To

it

the

the

overbreadth federal

not

invalid,

speech

expansion

by wk

was

because

First

did

or

prohibits

which

state’s

review

conduct

convicted

opinion

II addressed

a

Hicks

*

[T]he

context

was

conviction

by

kek

Although

expressive

he

“also

kK

677-78.

of

the

First

constitutional that

to

a

would

standing,

a

view

state

rights

*

of

Amendment

exception

otherwise

statute.

Commonwealth’s

constitutional

Fourteenth

law,

* of

court

to

limit

state a

and

party

to

* Hicks

II

to

ignore

citizens

in

would

permit,

the

contravention

Amendment.

of his motion to dismiss, the Commonwealth addressed a facial challenge in response and the circuit court in its

letter opinion labeled Jaynes’ argument “a broad, general, facial First Amendment challenge.”

143

Accordingly, Amendment

we

hold

overbreadth

Jaynes

has

standing

to

raise

the

First

claim.?° 2. TRESPASS

The Commonwealth argues, in the alternative, that if Jaynes has standing to raise a First Amendment overbreadth claim, that claim is not proper for consideration because his conduct was a form of trespass and thus not entitled to First Amendment protection. Code § 18.2-152.3:1, in the Commonwealth’s view, is like a trespass statute, prohibiting trespassing on the privately owned

e-mail

Amendment position

servers

through

the

intentional

use

of false

protection is afforded in that circumstance.

and

held

Jaynes’

First

Amendment

information

and

that no

The Court of Appeals

argument

was

“not

First

adopted this

relevant.”

Jaynes

Commonwealth, 48 Va. App. 673, 693, 634 S.E.2d 357, 367 (2006). * * * We disagree.

Trespass property.

S.E.2d

the

See

890,

personal owner

is

the

e.g.,

894

assumpsit.”)

Vines

(1992)

property may

unauthorized

of

bring

v.

Branch,

(“Where another

an

(emphasis

use

a

of

or

244

person

entry

onto

another’s

185,

190,

418

Va.

has

illegally

and

converted

it

in

trespass,

trover,

action added);

Code

§

to

18.2-119,

his

seized own

the

use,

detinue,

-125,

or

-128,

-

132. Significantly, unauthorized

10 The

use

of

Commonwealth

standing

in

First

Code

§

18.2-152.3:1

privately

also

owned

argues

Amendment

does

e-mail

prohibit

servers.

an alternate

overbreadth

not

cases

The

standing not

the statute

rule:

extend

that

to

persons who engage only in commercial speech. That rule was previously rejected in Bigelow v. Virginia, 421 U.S. 809, 817 (1975); see also Virginia State Bd. of Pharmacy v. Virginia

144

_v.

only in

prohibits

connection

Thus,

even

if

using

server,

the

Code

§

ok

sender

that

this

not

is First

a

the

this

now

[*

could

These

through

information such

specifically

names

under

use

*

action

right

property,

claimed

First

is

*

or

allowed

to

Code

servers.

use

§

its

18.2-152.3:1

trespass.

Therefore,

statute.

]

use

not

cases

Commonwealth’s

3.

is

routing

domain

trespass

constituted

trespass

private

the

We

a

unauthorized

Amendment

impacting

in

and

prosecuted

between

claim

property.

reject

not

false

e-mail

unauthorized

is

property

Amendment

of

be

of

provider

addresses

no

the

private

erred

IP

litigation

held

owner

certain

service

could

was

use

O*

providers’

the

e-mail

false

there

In

First

an

sending

18.2-152.3:1

k

have

intentional

with

persons

although

the

private

the

courts

of

the

Internet

service

common

law

trespass

and

be

raised

have

no

by

private

a

not

but

parties,

relevance

being

argument

the

and

hold

owner

of

and the

action

Accordingly, the

a

because

against

government

right.

owner

here

property

asserted

against

Amendment

against

that

Court

of

we Appeals

regard. CONSTITUTIONALITY

turn

to

unconstitutionally

Jaynes’

OF

CODE

contention

overbroad.

To

§

18.2-152.3:1

that

Code

§

address

this

challenge,

Citizens Consumer Council, 425 U.S. 748, 770 speech, like other varieties, is protected”).

145

(1976)

18.2-152.3:1 we

(“commercial

first

review

mails. use

In

a

certain

transmitting

protocol

must

send

to

information sender

which

another.**

are

or

The

domain

names

which

and

versa.

The

IP

sender,

can

if

the

IP

organization,

domain

can

file

or

with

domain

the

may

not

be

registration

a

eventually

registration

name

transmission

domain

address

registering name

addresses

of

which the

is

e-mail;

discoverable

contact

not

or

domain

database lead

not

to

the

however,

through

a

fee

and

A

will the

database

in

is of

a

IP

provides

searchable

an

IP

address

identify

acquired the

the

from

address

or

information

on

sender’s

not

an

organization.

with

contact

organizations.

IP

obtain

directly

search

registered

a

name

the

private

contained

do

servers

for

and

To

name

IP

address

prevent

identity

search

of

and

the

use

sender

of

information.’?

'' The protocol is the product of private collaboration and not established by a governmental entity. "2 Tn this case Jaynes used registered IP addresses, although the domain names were false.

146

e-

computer

name

by

of

routing

registering

domain

name

one

names

pays

are

the

domain

the

e-mail

the

process.

registrant

associate

and

a

servers

to

the

that

Domain

registration the

IP

and

Internet

transmission

information

e-mail.

information

and

address

but

a

the

requires

address

to

of

e-mails,

what

SMTP

each

name,

contact

database vice

of

through

domain

identifying

IP

assigned

organizations

receiving

This

an

recipient

addresses

and

aspects

prescribes

contain

and

address

technical

a

As

shown

protocol

the

mail

is

to

like

the

only enter

150

(2002),

documents

a

protected

of

of

such

does,

scrutiny

test.

constitutional

compelling

IP

address

or

on

Tract

that are

to

Society IP

only

domain

publish domain

in

the

v.

names

536

at

166.

prohibiting Code

Supreme

false §

burden

“core

it

interest.

test is

Id.

as

“a

invalid

at

147

347.

or

protected 514

In

in on

that

of

as

this

subject

to

a

to

the

strict

deemed

further

applying

the

regulations

regulation

be

the

U.S.

speech,”

will

drawn

by

infringes

and

in

religious

information

direct

statute

narrowly

engage

characterized

political

a

to

Comm’n,

routing

has

[the

political

18.2-152.3:1

speech

345.

of

speech

536

registration

right

Elections

Court

Id. at

that

The

anonymous

Ohio

neighborhoods

domain

surrender

v.

office

and

a

e-

Therefore,

Stratton,

in

of

name.

and

the

anonymous

of

result[]

freedom

for

Village

bases

the

an

private

addresses

U.S.

name

mayor’s

data

of

if

transmission

and

canvass

presumptively

Under

state

file

searchable

anonymous

speech.”

statutes

can

chose

e-mails, The

address

speaker

McIntyre

By

right.

prohibiting

statute

&

aspect

(1995).

dissemination

State

who

e-mail

a

particularly

Amendment.”

342

IP

record

through

“an

an

registered

speech, is

content

false

anonymity.”

anonymous

because

of

such

“necessarily

speaker’s]

334,

way

Bible

discoverable

First

entry

persons

Watchtower

speech,

record,

registration

identifying

U.S.

the

requires

sender,

in

by

this

a

test,

we

must

also

consider

constitutional,

S.E.2d

761,

that

City

764

(1984), must

Phillips,

81,

There control

is

the

generally Act,

Va. no

and

Many

states

unlike

*

*

Jaynes

fraudulent

strict tailored

not

of or

scrutiny to

§

In

of

of

270,

518,

validity.

272

e-mail.

15

the

such

was

In re

enacted

bulk

federal

e-mail §

CAN-SPAM the

7701 (a) (2).

bulk

regulation

to

e-mail,

threatened

U.S.C.

unsolicited

311

(2003).

commercial

bulk

523,

regarding

18.2-152.3:1

enacting

commercial

Va.

doubt

favor

unsolicited

contest

not

e-mail

to

limited

defamation

standard, the

Commonwealth’s

illegal

illegal

protect

the

commercial

transmission

pornography

Code

restricted

otherwise is

transmission

in

S.E.2d

regulated

unsolicited

18.2-152.3:1

226

but,

commercial

*

or

fraudulent

have

574

SPAM.

that

have

does

controlling

as

convenience

Virginia,

e-mails.

to

of

presumed

reasonable

resolved

that

are

Newsome,

any

85-86,

stated

efficiency

other

be

transmission

Congress

v.

and

dispute

referred

statutes

Council

constitutionality

265

state

to

bulk

e-mail.

e-mail,

or

otherwise

nor

speech.

Code

e-mail

§

of is

it

18.2-152.3:1 interests

SUBSTANTIAL

148

OVERBREADTH

in as

Code

speech

viewed

is

not

advanced

§

or

restricted

unprotected

Commonwealth. 4.

well

commercial

Therefore,

compelling

as

Nevertheless,

instances

of

interest

under

to such the

narrowly by

the

as

The

Commonwealth

enforcement

of

Code

§

unconstitutionally statutes

that

substantial of

a

all

a

facial

circumstances.

*

A

argues

overbroad

content

applications

of

its

provisions

unsolicited and

bulk

unsolicited

obscene

images.

hypothetical as

applied The

U.S.

does

United

Amendment

e-mail

According

not

128

S.Ct.

The

the

to

those

concept

of

constitutionality flowing

successful

facial

overbreadth

of

the

from

affected

statute

18.2-152.3:1

is

a

in

Code does

the

not

e-mail

would bulk

be

impose

and

is

a

not

any

“most”

constitutional,

commercial

proposes that

§

citing

e-mail,

criminal

defamatory

transaction, or

contains

to

the

Commonwealth

an

where

the

Act

unconstitutional

render

States

overbreadth ,

that

e-mail

situation

limited

remedy

it

of

unsolicited

bulk

is

if

the

because

the

to

to

that

on

application

of

preclude

*

restrictions

its

test

application

*

Commonwealth

substantially

remedy

related

challenge. the

a

not even

overbroad.

not

policy

precludes

The

is

should

because,

that

substantially

but

we

18.2-152.3:1

overbreadth

successful

that

overbroad,

are

statute,

challenge

argues

the

Supreme doctrine

1830

(2008).

Act

might

substantially

Court in

be

recently

United The

Court

“imagine[d]

overbroad.”

reviewed

States

v.

the

Williams,

First 553

noted

[i]n order to maintain an appropriate balance, we have vigorously enforced the requirement that a statute’s overbreadth be substantial, not only in an absolute sense,

149

but

also

relative

to

the

statute’s

plainly

legitimate

sweep. [I]t

reaches

is

too

impossible

far

without

128

S.Ct.

to

determine

first

whether

knowing

what

a

statute

the

statute

covers. 553

U.S.

at

Williams

in

,

this

18.2-152.3:1 political, were

*

*

We

facial

thus

is

not

Code

§

can

be

invalidating

the

statute.

Commonwealth

would

to

involve

“unsolicited criminal

Alternatively

applies provider

adopted

be

only

“actually

asserts

by

this a

that

objects

Court

e-

statute.

that

Jaynes’

because

to

need a

the

that

or

suggests

the

the

150

the

would

statute

obscene we

receiving

bulk

declare

prevent

according

e-mail

that

not

limiting

that

construction

defamation

where

we

because

non-commercial

Commonwealth

instances

via

CONSTRUCTION

declaration

bulk

anonymous example,

the

fail

§

overbroad.”

Such

activity,

the

in

a

violate

under

Code

today

must

18.2-152.3:1

unconstitutional

construction

apply

would

as

For

published

§

Commonwealth

18.2-152.3:1

speech.

argument

Code

inquiry

containing

Commonwealth’s

“substantially

the

e-mail

being

Publius

that

straightforward

expressive

5. NARROWING Lastly,

Applying

bulk

just

by

the

to

all

other

Papers

reject

challenge

statute

or

transmission

1838.

relatively

prohibit

Federalist

that *

would

is

religious,

the

mail,

case

at

e-mail.”

that

to

does

the not

does

not

materials.” hold

Internet

the

statute

service

Our avoid 597 cure

a

jurisprudence constitutional

S.E.2d

195,

Caldwell, statute

is

256 cannot

(1997);

(1988).

(2004).

151,

be

General

*

v.

*

Assembly,

269

Va.

to

not

303,

313,

608

lies

courts.

For

the

foregoing

properly

had

jurisdiction

Code

standing §

on

transmission containing

its of

a That

face all

Amendment

to

the

because

United

Va.

2,

statutes

to

such Life

v.

(1998).

A

constitutional

884-85

&

nn.49-50

Ass'n,

484

the

province

906

hold

U.S.

Fidelity

(2005)

that We

Amendment

statute

religious

816-17

v.

1,

when

Human

within

844,

Jaynes.

unsolicited

political,

it

within

we

over First

for

814,

901,

268

to

*

383,

of &

*

the

Deposit

*

CONCLUSION

reasons,

raise

18.2-152.3:1.

overbroad

First

to

only

Soc’y

Jackson

S.E.2d

statute

Warden,

allowed

U.S.

a

construing

Booksellers

task

the

v.

S.E.2d

521

American

a

is

bring

III.

has

Burns

500

ACLU,

Such

interpret

Virginia

157,

v.

to

Nevertheless,

rewritten

Reno

*

infirmity.

reasonable.

Virginia

us

deficiencies

Va.

requirements.

Co.,

196

constitutional

construction

397

requires

it

is

also

or

States

151

circuit

hold

overbreadth

court

that claim

Jaynes as

to

unconstitutionally

prohibits bulk

the

the

e-mails

other

anonymous

including

speech

those

protected

Constitution.

by

the

Accordingly,

Reversed

and

'? Yn light of this holding, we do not address Jayne’s other assignments of error.

152

final

judgment.

B.

The Computer Fraud and Abuse Act

18 U.S.C. § 1030.

Fraud and related activity in connection with computers

(a) Whoever— (1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of

national defense or foreign relations, or any restricted data, as defined in paragraph y. of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; (2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains—

(A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); (B) information from any department or agency of the United States; or (C) information from any protected computer if the conduct involved an interstate or foreign communication; (3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States;

(4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $ 5,000 in any 1-year period; (5) (A) (i) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer; (ii) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or (iii) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage; and (B) by conduct described in clause (i), (ii), or (iii) of subparagraph (A), caused (or, in the case of an attempted offense, would, if completed, have caused)— (i) loss to 1 or more persons during any 1-year period (and, for purposes of an investigation, prosecution, or other proceeding brought by the United States only, loss resulting from a related course of conduct affecting 1 or more other protected computers) aggregating at least $ 5,000 in value; (ii) the modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of 1 or more individuals; (iii) physical injury to any person; (iv) a threat to public health or safety; or (v) damage affecting a computer system used by or for a government entity in furtherance of the administration of justice, national defense, or national security; (6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if—

(A) such trafficking affects interstate or foreign commerce; or

153

(B) such computer is used by or for the Government of the United States; (7) with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to cause damage to a protected computer; shall be punished as provided in subsection (c) of this section. (b) Whoever attempts to commit an offense under subsection (a) of this section shall be punished as provided in subsection (c) of this section. (c) The punishment for an offense under subsection (a) or (b) of this section is— (1) (A) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(1) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than twenty years, or both, in the case of an offense under subsection (a)(1) of this section which occurs after a conviction for another offense under this section; or an attempt to commit an offense punishable under this subparagraph; (2) (A) except as provided in subparagraph (B), a fine under this title or imprisonment for not more than one year, or both, in the case of an offense under subsection (a)(2), (a)(3), (a)(5)(A)(iii), or (a)(6) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; (B) a fine under this title or imprisonment for not more than 5 years, or both, in the case of an offense under subsection (a)(2), or an attempt to commit an offense punishable under this subparagraph, if—

(i) the offense was committed for purposes of commercial advantage or private financial gain; (ii) the offense was committed in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or of any State; or (iii) the value of the information obtained exceeds $ 5,000; and (C) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(2), (a)(3) or (a)(6) of this section which occurs after a conviction for another offense

under this section, or an attempt to commit an offense punishable under this subparagraph; (3) (A) a fine under this title or imprisonment for not more than five years, or both, in the case of an offense under subsection (a)(4) or (a)(7) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(4), (a)(5)(A)(iii), or (a)(7) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this section; (4) (A) except as provided in paragraph (5), a fine under this title, imprisonment for not more than 10 years, or both, in the case of an offense under subsection (a)(5)(A)(i), or an attempt to commit an offense punishable under that subsection; (B) a fine under this title, imprisonment for not more than 5 years, or both, in the case of an offense under subsection (a)(5)(A)(ii), or an attempt to commit an offense punishable under that subsection; (C) except as provided in paragraph (5), a fine under this title, imprisonment for not more than 20 years, or both, in the case of an offense under subsection (a)(5)(A)(i) or (a)(5)(A)(ii), or an attempt to commit an offense punishable under either subsection, that occurs after a conviction for another offense under this section; and (5) (A) if the offender knowingly or recklessly causes or attempts to cause serious bodily injury from conduct in violation of subsection (a)(5)(A)(i), a fine under this title or imprisonment for not more than 20 years, or both; and (B) if the offender knowingly or recklessly causes or attempts to cause death from conduct in violation of subsection (a)(5)(A)(i), a fine under this title or imprisonment for any term of years or for life, or both.

(d) (1) The United States Secret Service shall, in addition to any other agency having such authority, have the authority to investigate offenses under this section. (2) The Federal Bureau of Investigation shall have primary authority to investigate offenses under subsection (a)(1) for any cases involving espionage, foreign counterintelligence, information protected against unauthorized disclosure for reasons of national defense or foreign relations, or Restricted Data (as that term is defined in section 1 ly of the Atomic Energy Act of 1954 (42 U.S.C. 2014(y)), except for offenses affecting the duties of the United States Secret Service pursuant to section 3056(a) of this title. (3) Such authority shall be exercised in accordance with an agreement which shall be entered into by the

Secretary of the Treasury and the Attorney General.

154

(e) As used in this section— (1) the term “computer” means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device; (2) the term “protected computer” means a computer— (A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States

Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or (B) which is used in interstate or foreign commerce or communication,

including a computer located

outside the United States that is used in a manner that affects interstate or foreign commerce

or

communication of the United States; (3) the term “State” includes the District of Columbia, the Commonwealth of Puerto Rico, and any other commonwealth, possession or territory of the United States; (4) the term “financial institution” means— (A) an institution, with deposits insured by the Federal Deposit Insurance Corporation; (B) the Federal Reserve or a member of the Federal Reserve including any Federal Reserve Bank; (C) a credit union with accounts insured by the National Credit Union Administration; (D) a member of the Federal home loan bank system and any home loan bank; (E) any institution of the Farm Credit System under the Farm Credit Act of 1971; (F) a broker-dealer registered with the Securities and Exchange Commission pursuant to section 15 of the Securities Exchange Act of 1934; (G) the Securities Investor Protection Corporation; (H) a branch or agency of a foreign bank (as such terms are defined in paragraphs (1) and (3) of section 1(b) of the International Banking Act of 1978); and (1) an organization operating under section 25 or section 25(a) of the Federal Reserve Act; (5) the term “financial record” means information derived from any record held by a financial institution pertaining to a customer’s relationship with the financial institution; (6) the term “exceeds authorized access” means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter; (7) the term “department of the United States” means the legislative or judicial branch of the Government or

one of the executive department enumerated in section 101 of title 5; (8) the term “damage” means any impairment to the integrity or availability of data, a program, a system, or information; (9) the term “government entity” includes the Government of the United States, any State or political subdivision of the United States, any foreign country, and any state, province, municipality, or other political

subdivision of a foreign country; (10) the term “conviction” shall include a conviction under the law of any State for a crime punishable by imprisonment

for more

than

| year,

an element

of which

is unauthorized

access,

or exceeding

authorized

access, to a computer; (11) the term “loss” means any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service; and (12) the term “person” means any individual, firm, corporation, educational institution, financial institution, governmental entity, or legal or other entity.

(f) This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or a political subdivision of a State, or of an intelligence agency of the United States.

(g) Any person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief. A civil action for a violation of this section may be brought only if the conduct involves | of the factors set forth in clause (i), (ii), (iii), (iv), or (v) of subsection (a)(5)(B). Damages for a violation involving only conduct described in subsection (a)(5)(B)(i) are limited to economic damages. No action may be brought under this subsection unless such action is begun within 2 years of the date of the act complained of or the date of the discovery of the damage. No action may

155

be brought under this subsection for the negligent design or manufacture of computer hardware, computer software, or firmware.

(h) The Attorney General and the Secretary of the Treasury shall report to the Congress annually, during the first 3 years following the date of the enactment of this subsection, concerning investigations and prosecutions under subsection (a)(5).

EF Cultural Travel BV v. Explorica, Inc. The scraper has been likened to a “robot,” a

No. 01-2000

tool that is extensively used on the Internet. Robots are used to gather information for countless purposes, ranging from compiling results for search engines

UNITED STATES COURT OF APPEALS FOR THE FIRST CIRCUIT

such as Yahoo! to filtering for inappropriate content. The widespread deployment of robots enables global Internet users to find comprehensive information

274 F.3d 577

quickly and almost effortlessly. December

17, 2001, Decided

Like a robot, the scraper sought information COFFIN, J.: Appellant Explorica, Inc. (“Explorica’”) and several of its employees challenge a preliminary injunction issued against them for

through the Internet. Unlike other robots, however, the scraper focused solely on EF’s website, using

alleged violations of the Computer Fraud and Abuse

Specifically, Zefer utilized tour codes whose significance was not readily understandable to the public. With the tour codes, the scraper accessed

information

Act (“CFAA”), 18 U.S.C. § 1030. * * * We affirm the district court’s conclusion that appellees will

that

other

robots

would

not

have.

EF’s website repeatedly and easily obtained pricing information for those specific tours. The scraper sent more than 30,000 inquiries to EF’s website and recorded the pricing information into a spreadsheet.”

likely succeed on the merits of their CFAA claim, but rest on a narrower basis than the court below. I. Background Explorica was formed in 2000 to compete in

the field of global tours for high school students. Several of Explorica’s employees formerly were

2 John Hawley, one of Zefer’s senior technical associates, explained the technical progression of the scraper in an affidavit: {a.] Open an Excel spreadsheet. The spreadsheet initially contains EFTours gateway and destination city codes, which are available on the EFTours web site. [b.] Identify the first gateway and destination city codes [on the] Excel spreadsheet. [c.] Create a [website address] request for the EFTours tour prices page based on a combination of gateway and destination city. Example: show me all the

employed by appellee EF, which has been in business for more than thirty-five years. EF and its partners and subsidiaries make up the world’s largest private student travel organization. Shortly after the individual defendants left EF in the beginning of 2000, Explorica began competing in the teenage tour market. The company’s vice president (and former vice president of information strategy at EF), Philip Gormley, envisioned that Explorica could gain a substantial advantage over all other student tour companies, and especially EF, by undercutting EF’s already competitive prices on student tours. Gormley considered several ways to obtain and utilize EF’s

prices for a London trip leaving JFK. which

is

[d.] View the requested web page retained in the random access

prices: by manually keying in the information from EF’s brochures and other printed materials; by using

memory of the requesting computer in the

a scanner to record

* KOK

that same

information;

form of HTML

or, by

manually searching for each tour offered through EF’s website. Ultimately, however, Gormley engaged Zefer,

Explorica’s

Internet consultant,

to design

[computer

language]

code.

[e.] Search the HTML for the tour prices for each season, year, etc. [f.] Store the prices into the Excel spreadsheet.

a

computer program called a “scraper” to glean all of the necessary information from EF’s website. Zefer

[g.] Identify the next gateway and city codes in the spreadsheet.

designed the program in three days.

156

on EF’s website.” The court next found that the manner by which Explorica accessed EF’s website likely violated a confidentiality agreement between appellant Gormley and EF, because Gormley

Zefer ran the scraper program twice, first to retrieve the 2000 tour prices and then the 2001 prices. All told, the scraper downloaded 60,000 lines of data, the equivalent of eight telephone directories of information. * * * Once Zefer “scraped” all of the

provided to Zefer technical instructions concerning the creation of the scraper. Finally, the district court noted without elaboration that the scraper bypassed

prices, it sent a spreadsheet containing EF’s pricing

technical

information to Explorica, which then systematically undercut EF’s prices. *** Explorica thereafter printed its own brochures and began competing in EF’s tour market.

restrictions embedded

in the website to

acquire the information. The court therefore let stand

its earlier decision granting the preliminary injunction. Appellants contend that the district court erred

in

taking

too

narrow

a

view

of

what

is

and use of the scraper

authorized under the CFAA and similarly mistook the

came to light about a year and a half later during state-court litigation regarding appellant Olsson’s departure from appellee EFICE. EF then filed this action, alleging violations of the CFAA; the

reach of the confidentiality agreement. Appellants also argue that the district court erred in finding that and that the preliminary injunction violates the First

Copyright

Amendment.

The

development

Act

of

1976,

17

U.S.C.

§

101;

appellees suffered a “loss,” as defined by the CFAA,

the

Racketeer Influenced and Corrupt Organizations Act, 18 U.S.C. § 1961; and various related state laws. It sought a preliminary injunction barring Explorica and Zefer from using the scraper program and demanded the return of all materials generated through use of the scraper.

Il. Standard of Review A district court may issue a preliminary injunction only upon considering “(1) the likelihood of success on the merits; (2) the potential for

irreparable harm if the injunction is denied; (3) the On May 30, 2001, the district court granted a preliminary injunction against Explorica based on the CFAA, which criminally and civilly prohibits certain access to computers. See 18 U.S.C. § 1030(a)(4). The court found that EF would likely prove that Explorica violated the CFAA when it used EF’s website in a manner outside the “reasonable

balance of relevant impositions . . .; and (4) the effect (if any) of the court’s ruling on the public interest.” *** Appellants challenge only the district court’s finding that appellees are likely to succeed on the merits, and we thus confine our review to that factor.

expectations” of both EF and its ordinary users. The

Il. The Computer Fraud and Abuse Act

*

court also concluded that EF could show that it suffered a loss, as required by the statute, consisting of reduced business, harm to its goodwill, and the cost of diagnostic measures it incurred to evaluate possible harm to EF’s systems, although it could not show that Explorica’s actions physically damaged its computers. In a supplemental opinion * ** the district court further articulated its “reasonable expectations” standard and explained that copyright, contractual and technical restraints sufficiently notified Explorica that its use of a scraper would be unauthorized and thus would violate the CFAA.

Although

statement

***

should

reasonable

person

finding

have may

that

dispelled have

“such

any had

a

violations

of

[Whoever] knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value . . . shall be punished.

18 U.S.C. § 1030(a)(4).° Appellees

clear

notion that

alleged

1030(a)(4). * * * That section provides

and a link directing users with questions to contact company,

appellees

three provisions of the CFAA, the district court found that they were likely to succeed only under section

The district court first relied on EF’s use of a copyright symbol on one of the pages of its website the

OK *

knowingly

allege

and with

that

the

appellants

intent to defraud accessed the

a the

8

‘presumption of open access’ applied to information

Although the CFAA is primarily a

criminal statute, under § 1030(g), “any person who suffers damage or loss . . . may maintain a civil action . . . for compensatory damages and injunctive

[8.] Repeat steps 3-7 for all gateway and destination city combinations.

relief or other equitable relief.”

157

server hosting EF’s website more than 30,000 times

third party, either orally or in writing, any

to obtain proprietary pricing and tour information, and confidential information about appellees’ technical abilities. At the heart of the parties’ dispute

Confidential or Proprietary Information . . . and never to at any time (i) directly or indirectly publish, disseminate or otherwise disclose, deliver or make available to anybody any Confidential or Proprietary Information or (ii) use such Confidential or Proprietary Information for Employee’s own benefit or for the benefit of any other person or business entity other than EF.

is whether appellants’ actions either were “without authorization” or “exceeded authorized access” as defined by the CFAA.” We conclude that because of

the

broad

confidentiality

actions “exceeded

agreement

authorized

access,”

appellants’ and so we do

not reach the more general arguments made about statutory meaning, including whether use of a scraper alone renders access unauthorized."°

As

used

in this

Agreement,

the

term “Confidential or _ Proprietary Information” means (a) any trade or business secrets or confidential information of EF, whether or not reduced to writing . . .; (b) any technical, business, or financial information, the use or disclosure of which might reasonably be construed to be contrary to the interests of EF....

A. “Exceeds authorized access”

Congress defined “exceeds authorized access,” as accessing “a computer with authorization and [using] such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6). EF is likely to prove such excessive access based on the confidentiality agreement between Gormley and EF.

The record contains at least two communications from Gormley to Zefer seeming to

Pertinently, that agreement provides:

rely on information about EF to which he was privy only because of his employment there. First, in an email to Zefer employee Joseph Alt exploring the use

Employee agrees to maintain in strict confidence and not to disclose to any

of a scraper, Gormley wrote: “might one of the team

be able to write a program to automatically extract

° At oral argument, appellants contended that they had no “intent to defraud” as

prices

defined by the CFAA. That argument was not raised in

the

briefs

and

thus

has

been

waived.

. . . ? I could

Likewise, at oral argument Explorica attempted to

Congress did not define the phrase “without authorization,” perhaps assuming that the

2001

Appellees

the scraper program.

related to [its] intended

based

on

includes

contend that the result

the “exceeds

authorized

*

*

On

a high

speed

Furthermore,

the voluminous

spreadsheet containing all of the scraped information the

tour

codes,

which

EF

claims

are

proprietary information. Each page of the spreadsheet

would be the same under either test, but we need not resolve this dispute because we affirm the court’s

ruling

*

This documentary evidence points to Gormley’s heavy involvement in the conception of

Circuit’s reasoning that

function,” United States v. Morris, 928 F.2d 504, 510

1991).

prices.

connection it is possible to move quickly from one price table to the next by hitting backspace and then the down arrow.

computer use is “without authorization” only if the

(2d Cir.

the

gateway from a list of about 100 domestic gateways (middle drop down menu). When you select your origin gateway a page with a couple of tables comes up. One table has 1999-2000 prices and the other has 2000-

words speak for themselves. The meaning, however, has proven to be elusive. The district court applied what it termed the “default rule” that conduct is without authorization only if it is not “in line with the reasonable expectations” of the website owner and its users. Appellants argue that this is an overly broad reading that restricts access and is at odds with the Internet’s intended purpose of providing the “open and free exchange of information.” They urge us to

is not “in any way

on

150 tours. * * * You then select your origin

0

use

him/her

Here is a link to the page where you can grab EF’s prices. There are two important drop down menus on the right. . . . With the lowest one you select one of about

* * *

instead the Second

with

to Zefer employee John Hawley:

* * *

adopt appellant Zefer’s argument that the preliminary injunction violates the First Amendment. The lateness of Explorica’s attempt renders it fruitless.

adopt

work

specification.” Gormley also sent the following email

produced

by Zefer

includes

the tour and

gateway

codes, the date of travel, and the price for the tour.

access”

An uninformed reader would regard the tour codes as

prong of § 1030(a)(4).

158

nothing but gibberish. * * * Although the codes can be correlated to the actual tours and destination points, the codes standing alone need to be “translated” to be meaningful.

scraper.'° Accordingly, the district court’s finding that Explorica likely violated the CFAA was not clearly erroneous. B. Damage or Loss under section 1030(g)

Explorica argues that none of the information Gormley provided Zefer was confidential

an

Appellants also challenge the district court’s finding that the appellees would likely prove they met the CFAA’s “damage or loss” requirements. Under the CFAA, EF may maintain a private cause of action if it suffered “damage or loss.” 18 U.S.C.

employee’s non-compete agreement. The opinion mentioned in passing that there was no actionable misuse of confidential information because the only

to the integrity or availability of data, a program, a system, or information that . . . causes loss

evidence

aggregating at least $ 5,000

and that the confidentiality agreement therefore is irrelevant. * * * The case on which they rely, Lanier Professional Services, Inc. v. Ricci, 192 F.3d 1, 5 (Ist

Cir.

1999),

focused

that

the

almost

employee

exclusively

had

taken

information was a “practically worthless” from the employee’s successor. Id. at 5. Here,

evidence

that

on

the

other

Gormley

hand,

there

provided

on

protected affidavit

is

ample

Explorica

proprietary information about the structure of the website and the tour codes. To be sure, gathering manually the various codes through repeated searching and deciphering of the URLs * ** theoretically may be possible. Practically speaking, however, if proven, Explorica’s wholesale use of

EF’s travel codes to facilitate gathering EF’s prices

§ 1030(g). “Damage” is defined as “any impairment in value during any

l-year period to one or more individuals ... . “ 18 U.S.C. § 1030(e)(8). “Loss” is not defined. The district court held that although EF could not show any “damage” it would likely be able to show “loss” under the statute. It reasoned that a general understanding of the word “loss” would fairly encompass a loss of business, goodwill, and the cost

of diagnostic measures that EF took after it learned of Explorica’s access to its website.'? Appellants respond that such diagnostic measures cannot be included in the $5,000 threshold because their

from its website reeks of use--and, indeed, abuse--of

proprietary information that goes authorized use of EF’s website."

beyond

any

Gormley voluntarily entered a_ broad confidentiality agreement prohibiting his disclosure

of any

information

“which

might

reasonably

be

construed to be contrary to the interests of EF.” * * * Appellants would face an uphill battle trying to argue

that it was not against EF’s interests for appellants to use the tour codes to mine EF’s pricing data. * * * If EF’s allegations are proven, it will likely prove that whatever authorization Explorica had to navigate around EF’s site (even in a competitive vein), it exceeded that authorization by providing proprietary information and know-how to Zefer to create the “ Among the several emails in the record is one from Zefer employee Joseph Alt to the Explorica “team” at Zefer:

Below is the information needed to log into EF’s site as a tour leader. Please use

this to gather competitor information from both a business and experience design perspective. We may also be able to glean

'6 EF also claims that Explorica skirted the website’s technical restraints. To learn about a specific tour, a user must navigate through several different web pages by “clicking” on various drop-down menus and choosing the desired departure location, date, tour destination, tour length, and price

range.

The

district court

found

that the

scraper

circumvented the technical restraints by operating at

a warp

speed

that the website was

not normally

intended to accommodate.

We

need

argument

was

a violation

that this alone

not reach

the

of the

CFAA, however, because the apparent transfer of information in violation of the Confidentiality Agreement furnishes a sufficient basis for injunctive relief. Likewise, we express no opinion on the district court’s ruling that EF’s copyright notice served as a “clear statement [that] should have dispelled any notion a reasonable person may have had the ‘presumption of open access’” to EF’s website.

"7

It is undisputed that appellees paid

$ 20,944.92 to assess whether their website had been

knowledge of their technical abilities. As with all of our information, this is extremely

compromised. Appellees also claim costs exceeding $ 40,000 that they will incur to “remedy and secure their website and computer.” We need not consider

confidential. anyone.

whether these expenses constitute loss because the initial $ 20,944.92 greatly exceeds the threshold.

Please

do not share

it with

actions

neither

caused

any

physical

damage

nor

will loom

placed any stress on EF’s website. Few courts have endeavored to resolve the contours of damage and loss under the CFAA. * * * Two district courts that have addressed the issue have

found that expenses such as those borne by EF do fall

We

agree

with

this

construction

the

In the absence of a statutory definition for

“Joss,” we

apply the well-known

undefined

words

***

of

The

their normal,

word

“loss”

Inc.

rule of assigning “detriment,

disadvantage, or deprivation from failure to keep, have or get.” * * * Appellees unquestionably suffered

a detriment and a disadvantage by having to expend

Privacy

Litigation,

154

F.

Supp.

2d

497

$ 5,000 resulting from a party’s intrusion are “losses” for purposes of the “damage or loss” requirement of the CFAA.

is fortunate, but it does not lessen

the loss represented

to restrict the

11. We therefore conclude that expenses of at least

substantial sums to assess the extent, if any, of the physical damage to their website caused by appellants’ intrusion. That the physical components were not damaged

were

(S.D.N.Y. 2001), that Congress could not have intended other types of loss to support recovery unless that threshold were met. Indeed, the Senate Report explicitly states that “if the loss to the victim meets the required monetary threshold,” the victim is entitled to relief under the CFAA. S. Rep. 104-357, at

everyday meaning. means

If we

We do not hold, however, that any loss is compensable. The CFAA provides recovery for “damage” only if it results in a loss of at least $ 5,000. We agree with the court in In re Doubleclick

under the statute.

CFAA.

ever-larger.

statute as appellants urge, we would flout Congress’s intent by effectively permitting the CFAA to languish in the twentieth century, as violators of the Act move into the twenty-first century and beyond.

by consultant fees. Congress’s

use of the disjunctive, “damage or loss,” confirms

IV. Conclusion

that it anticipated recovery in cases involving other

than purely physical damage. *** To parse the words in any other way would not only impair Congress’s intended scope of the Act, but would also serve to reward sophisticated intruders. As we move into an increasingly electronic world, the instances of physical damage will likely be fewer while the value to the victim of what has been stolen and the victim’s

For the foregoing reasons, we agree with the district court that appellees will likely succeed on the

merits

of their

CFAA

claim

under

18

U.S.C.

§ 1030(a)(4). Accordingly, the preliminary injunction was properly ordered. Affirmed.

costs in shoring up its security features undoubtedly

160

XanEdu Change the course.

These course materials were produced by XanEdu and are intended for your individual use. If you have any questions regarding these materials, please

contact: Customer Service [email protected] 800-218-5971

XanEdu is changing the course of how knowledge is shared and how students engage with content. Learn more about our award-winning digital solutions for web, iPad, and Android tablets at: www.xanedu.com XanEdu 4750 Venture Drive, Suite 400 Ann Arbor, MI 48108

CPID 797802

a ? 61506

655017