The search for intent-based doctrines of secondary liability in copyright law

被引:4
|
作者
Hogberg, Sverker K.
机构
关键词
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
The widespread copyright infringement that the internet and personal computers have engendered has led copyright owners to sue software and service providers as facilitators under theories of secondary liability. The most prominent lawsuits have been brought against vendors of peer-to-peer file sharing software-Napster, Aimster, and Grokster-who have been held liable under the judicial doctrines of vicarious liability and contributory infringement for the copyright violations committed by their users. Although these secondary liability doctrines are well established in copyright law, the Napster and Aimster decisions have expanded the role that illicit intent to profit from others' copyrighted works plays in determining liability. The expanded scrutiny of intent makes it difficult for developers of copying and distribution technologies to predict their potential liability and undermines the limited immunity for the development of useful technologies that the Supreme Court established in its Sony decision. This Note argues that the Supreme Court's promulgation of its inducement doctrine in Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd. obviates the need to expand the role of illicit intent in vicarious liability and contributory infringement. The Courts inducement rule effectively plugs the gaps in the existing secondary liability doctrines without the attendant adverse effects of the expanded scrutiny of intent.
引用
收藏
页码:909 / 958
页数:50
相关论文
共 50 条
  • [41] An Intent-based Network Virtualization Platform for SDN
    Han, Yoonseon
    Li, Jian
    Hoang, Doan
    Yoo, Jae-Hyoung
    Hong, James Won-Ki
    2016 12TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT AND WORKSHOPS(CNSM 2016), 2016, : 353 - 358
  • [42] Reactive Configuration Updating for Intent-Based Networking
    Tsuzaki, Yoshiharu
    Okabe, Yasuo
    2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 97 - 102
  • [43] Intent-Based Categorization of Search Results Using Questions from Web Q&A Corpus
    Yoon, Soungwoong
    Jatowt, Adam
    Tanaka, Katsumi
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2009, PROCEEDINGS, 2009, 5802 : 145 - 158
  • [44] Intent-based Management for the Distributed Computing Continuum
    Morichetta, Andrea
    Spring, Nikolaus
    Raith, Philipp
    Dustdar, Schahram
    2023 IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED SYSTEM ENGINEERING, SOSE, 2023, : 239 - 249
  • [45] End-to-End Intent-Based Networking
    Velasco, Luis
    Signorelli, Marco
    de Dios, Oscar Gonzalez
    Papagianni, Chrysa
    Bifulco, Roberto
    Olmos, Juan Jose Vegas
    Pryor, Simon
    Carrozzo, Gino
    Schulz-Zander, Julius
    Bennis, Mehdi
    Martinez, Ricardo
    Cugini, Filippo
    Salvadori, Claudio
    Lefebvre, Vincent
    Valcarenghi, Luca
    Ruiz, Marc
    IEEE COMMUNICATIONS MAGAZINE, 2021, 59 (10) : 106 - 112
  • [46] NECESSITY OF INTENT FOR INFRINGEMENT OF COMMON-LAW COPYRIGHT
    不详
    YALE LAW JOURNAL, 1945, 54 (03): : 697 - 706
  • [47] The Role of Intent-Based Networking in ICT Supply Chains
    Bensalem, Mounir
    Dizdarevic, Jasenka
    Carpio, Francisco
    Jukan, Admela
    2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [48] An Intent-Based Control Approach for an Intelligent Mobility Aid
    Zhou, Wuxiao
    Xu, Li
    Yang, Jie
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 2, 2010, : 59 - 62
  • [49] INTENDER: Fuzzing Intent-Based Networking with Intent-State Transition Guidance
    Kim, Jiwon
    Ujcich, Benjamin E.
    Tian, Dave
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4463 - 4480
  • [50] Intent Security Testing An Approach to Testing the Intent-based Vulnerability of Android Components
    Salva, Sebastien
    Zafimiharisoa, Stassia R.
    Laurenc, Patrice
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 355 - 362