The takedown of the Downfall meme

It’s a bit old now, but I was a bit surprised that no one on the blog has mentioned the mass removals of Hitler Downfall parodies on YouTube (although I think it was mentioned on Noise). For the uninitiated, this is a meme involving modifying the subtitles in a scene from the movie Downfall, where Hitler is angrily ranting at his flunkies. He’s gotten very angry over things ranging from the faulty hardware on his XBox to the choice of Sarah Palin as John McCain’s running mate. There are (were) hundreds of these parody videos on YouTube, the first of which appeared in 2006, with many of them reaching hundreds of thousands of views. On April 20th, Constantin Films, which owns the copyright for the original movie had YouTube remove many of the videos.

When I first read about this story, I had (like many other initial reporters) assumed that DMCA takedown notices were sent to the creators of these parody videos. Perhaps like Lenz v. Universal, the parody video creators would then file a counternotice. However, it seems like a different process was actually used, with YouTube using software called “Content ID”. This technology automatically removes videos containing copyrighted content (based on some sort of audio/video signature within the file), regardless of if the video contains elements that make it a noninfringing use (like Fair Use). This article has a good breakdown of the events.

Since this happened, a number of bloggers have written about the issue, arguing that parodying the scene is constitutes Fair Use. A number of the original videos do seem to be back up. And, like many internet memes, the Hitler Downfall meme has become incredibly self-referential. At least two Hitler Downfall parody videos have been produced addressing the takedown of other Hitler Downfall parody videos, both of which are still available on YouTube. One of them was created by Brad Templeton, an EFF chairman: http://www.youtube.com/watch?v=PzUoWkbNLe8. In it, Hitler is the one ordering DMCA takedown notices on Hitler Downfall parody videos, while his lackies try sticking up for Fair Use. Templeton also has a very interesting blog post about the difficulties he had in creating his own parody video, which discusses not only Fair Use but also how he had to use a loophole to avoid circumventing the encryption on his DVD.

Somewhat more amusing, I think, is a parody video created by someone with the username Plankhead: http://www.youtube.com/watch?v=kBO5dh9qrIQ. In this version, it’s Hitler who is complaining about the takedown of the other parody videos. He brings up how parody is fair use and not an infringement of copyright as well as the chilling effects of the “broken” DMCA takedown notice procedure. Hitler even explicitly cites Title 17 USC Section 107.

In the end though, I haven’t seen much action about this issue since the initial ruckus a few weeks ago. As Plankhead’s Hitler laments, “Everyone’s gonna get upset about how corporations can illegally take down parodies. But tomorrow, they’ll forget all about it and watch cat videos.”

Big Content doesn’t like proposed amendments to Indian Copyright Law

The last major revision to Indian Copyright Law was in 1957. It has seen a number of amendments since, the last one  in 1999. These laws have not kept up with the changing nature of the role of technology in the distribution of copyrighted material. India recently proposed amendments (pdf) to the law to address these changes and to bring Indian Copyright Law into compliance with the WIPO Internet Treaties (pdf).

As discussed in this article at Ars Technica, the International Intellectual Property Alliance (IIPA), representing Big Content in the US (MPAA, RIAA etc.) is not happy with the proposed amendments. Their main complaint is about India’s take on the DRM anticircumvention provisions. The amendment allows the circumvention of DRM if the intended use is not infringing. For example, end users can rip a DRM protected DVD for personal use without breaking the law. While this seems to be fair and is in complicance with the WIPO Internet Treaties, the DMCA, an equivalent law in the US holds that circumventing DRM for any use is illegal. Clearly, it serves the purposes of Big Content well. Under the Indian version of the law, the onus would be on copyright holders to determine if a circumvention was an infringement.

My main take away was the influence Big Content has on government policy in the US. Apart from laws like the DMCA, parts of which go overboard in their attempt to protect the interests of copyright holders, they also heavily influence creation of the “Priority Watch List” of the US which includes India, China and even Canada. Formulating unbiased policy is a real challenge and I’m glad India got it right in this case.

Is consumer’s privacy protected by consumer protection policies?

Alex Kantchelian, Dhawal Mujumdar & Sean Carey

FTC Policies on Deception and Unfairness

These two papers outline the FTC’s policies on cracking down on consumer unfairness and deception. The FTC policies are defined from several court cases that influenced consumer protection. However, no single statement on consumer unfairness and deception had been issued up to that point by the FTC.


The FTC policy statement on Unfairness


The FTC is responding to a letter by Senators Danforth and Ford, concerning one aspect of the FTC’s jurisdiction over “unfair or deceptive acts or practices.” The senate subcommittee is planning to hold hearings on the concept of “unfairness” as applied to consumer transactions

The FTC states that the concept of consumer unfairness is not immediately obvious and this uncertainty is troublesome for some business and members of the legal profession. They attempt to delineate a concrete framework for future application of the FTC’s unfairness authority. However, from court rulings, the FTC has boiled down unfair acts or practices in affecting commerce into three categories: consumer injury, violating established public policy, or it is unethical or unscrupulous.

Consumer Injury

The commission is concerned with substantive harms, such as monetary harm and unwarranted health and safety risks. Emotional effects tend to not ‘make the cut’ as evidence of injury. The injury must not be outweighed by any offsetting of the consumer or competitive benefits that the sales practices also produces, i.e. the item producer can justify not informing the consumer if it saves the consumer money. However, if sellers adopt a number of practices that unjustifiably hinder free market decisions, it can be considered unfair. This includes over coercion, or exercising undue influence over highly susceptible purchasers.

Violation of public policy

Violation of public policy is used by the FTC as a means of providing additional evidence on the degree of consumer injury caused by specific practices. The S&H court considered it as a separate consideration. The FTC thinks its important to examine outside statutory policies and established judicial principles for assistance in helping the agency

Unethical or unscrupulous conduct

Unethical or unscrupulous conduct is used for certainty in reaching all the purposes of the underlying statue that forbids “Unfair” acts or practices. The FTC has decided that though this is largely duplicative, because truly unethical or unscrupulous conduct will almost always injure customers or violate public policy as well.

Summary of FTC policy statement on deception

Section 5 of the FTC act declares unfair or deceptive acts or practices unlawful. Section 12 specifically prohibits false ads. There is no single definitive statement of the Commission’s authority on deceptive acts.

Summary:

The FTC does not have any single, definitive statement of their authority on deceptive acts. However, they have an outline for the basis of a deception case: It must have misrepresentation, omission or practice that is likely to mislead the customer, false oral or written representations, misleading price claims, sales of hazardous or systematically defective products or services without adequate disclosers or similar issues. Second, the FTC examines the practice from the perspective of a consumer acting reasonably in the circumstances and third, the FTC looks if the representation, omission or practice is a material one. Most deception involves written or oral misrepresentations, or omission of material information and generally occurs in other forms of conduct associated with a sales transaction. Advertisements will also be considered when dealing with a case of deception. The commission has also found deception where a sales representative misrepresented the purpose of the initial contact with customers.

Part 2, There Must be a Representation, Omission or Practice that is likely to mislead the consumer.

Most deception involves written or oral misrepresentation, or omissions of material information. The Commission looks for both expressed and implied claims, the latter determined through an examination of the representation itself. In some cases, consumers can be presumed to reach false beliefs about products or services because of omissions. The commission can sometimes reach these claims, but other times may require evidence of a consumers’ expectations.

Part 3, The act or practice must be considered from the perspective of the reasonable consumer.

Marketing and point-of-sales practices such as bait and switch cases that can mislead consumers are also deceptive. When a product is sold, there is an implied representation that the product is fit for the purpose for which it is sold, if not then it is considered deceptive. Additionally, the FTC will take special consideration to the needs of specific audiences, for example: vulnerable audiences such as the terminally ill, the elderly and young children. The FTC takes into consideration how the consumer will interpret claims by advertisements and written material. They will avoid cases with ‘obviously exaggerated or puffing representations’ that consumers would not take seriously. Also, the Commission notes that it sees little incentive to deceive consumers for products that are inexpensive or easy to evaluate such as consumables (toilet paper, soap, etc). The commission will look at the practice closely before issuing a complaint based on deception. The FTC takes into account the entire advertisement, transaction or course of dealing  and how the consumer is likely to respond. The FTC considers the entire “mosaic” in addition to materiality

Part 4, the representation, omission or practice must be material

The third major element that the FTC considers is the materiality of the representation. The FTC considers a “material” as information that affects the consumer’s choice or conduct. This “material” can be concern purpose, safety, efficacy, or cost. If the commission cannot find material evidence that there is deception, the commission will seek evidence that the omission of material is important to consumers.

Conclusion:

The Commission works to find acts or practices that it considers deceptive if there is a misrepresentation, omission or other such practices that could harm consumers. Although the commission does not require extrinsic material evidence, but in certain situations such evidence might be necessary.

Sears Holdings Management Corporation Case

Sometimes you wonder whether all these commissions like Federal Trade Commission are there for namesake only. But when you look at the recent case involving Sears Holdings Management Corporation, then you realize their importance. The principle mission of Federal Trade Commission (FTC) is “consumer protection” and prevention of “anti-competitive” business practices. And in this case they precisely stick to their core mission and once again prove their worth.

Sears Holding Management Corporation (“respondent” or “SHMC”), a subsidiary of Sears Holding Corporation. SHMC  handles marketing operations for the Sears Roebuck and Kmart retail stores, and operates the sears.com and kmart.com retail internet websites.
From on or about April 2007 through January 2008, SHMC disseminated via the internet a software application for consumers to download and install onto their computers, This application was created, developed, and managed for SHMC by a third party in connection with SHMC’s “My SHC Community” market research program. The application, when installed, runs in background at all times on consumers’ computers and transmits tracked information, including nearly all of the internet behavior that occurs on those computers, to servers maintained on behalf of SHMC. Information collected and transmitted included all the web browsing, secure sessions, checking online accounts, and use of web-based email and instant messaging services.
If you are angered and aghast with the level of encroachment into the privacy of consumers then hold on to your seat, its just the beginning. SHMC didn’t mention all the details about their application and what it was going to collect in their “click-wrap” license or their privacy policies. Fifteen out of hundred visitors to sears.com and kmart.com websites presented with a “My SHC Community” pop-up box. This pop-up box mentioned the purpose and benefits joining of “My SHC Community”. But it made no mention of the software application (“the application”). Likewise, general “Privacy Policy” statement accessed via the hyperlink in the pop-up box did not mention the application. Furthermore, the pop-up box message invited consumers to enter their email address to receive a follow-up email from SHMC with more information. Subsequently, invitation messages were emailed to those consumers who supplied their email address. These invitation messages described what consumers would receive in exchange for becoming member of the “My SHC Community”. Consumers who wished to proceed were asked to click the “Join Today” button at the bottom of the message.
After clicking “Join Today” button in the email, consumers were directed to a landing page that restated many of the representations about the potential interactions between members and the “community”. However, landing page did not mention anything about the application. There was one more “Join Today” button on the landing page. Consumers who clicked on this button were directed to registration page. To complete the registration, consumers needed to enter their name, address, age, and email address. Below the fields of entering information, the registration page presented a “Privacy Statement and User License Agreement” (PSULA) in a scroll box that displayed ten lines of multi-page document at a time.
A description of the software application (that was going to get installed) begins on approximately the 75th line down in the scroll box. That means consumer had to navigate through seven pages to read this information. This description involved the information about internet usage. It also mentioned about various activities of it was going to monitor. Even though the PSULA had information about the activities it was going to monitor, it was still ambiguous about what this application was actually going to do. For example, it was mentioned that this application will monitor the collected information for better understanding of their consumers and their household but it didn’t mention what SMHC meant by monitoring. Was this monitoring done by automatic programs or someone manually? The PSULA did not mention about any specific information that was monitored. They also mentioned that their application might examine the header information of the instant/e-mail messages of their consumers. PSULA also described how the information that application would collect was transmitted to SHMC’s servers, how it might be used and how it was maintained. Lastly it clearly stated that PSULA reserved the right to continue to use information collected. At the end, it asked consumers to accept these terms and conditions and those who accepted these terms and conditions were directed to an installation page that explained downloading and installation instructions for the application. Installation page didn’t give any information about the application. When installed, the application worked and transmitted information substantially as described in PSULA.
The tracked information included not only information about websites consumers visited and links that they clicked but also text of secure pages, such as online banking statements, online drug prescription records, select header files that could show the sender, recipient, subject and size of web-based email messages etc.
We believe the level of encroachment into the privacy of consumers was not only blatant but also shocking. It failed to disclose adequately that the software application when installed would nearly monitor all the internet behavior and activities on the consumers computers. Thus, this failure to disclose various facts and information was nothing but deceptive practice as discussed in FTC’s policy about deception.

Understanding privacy under FTC and OECD consumer protection policies


Precisely and exhaustively defining the concept of privacy is a challenging problem. For starters, the Merriam-Webster defines one’s right to privacy as the “freedom from unauthorized intrusion”. How inclusive is this definition?
As suggested, we often contrast privacy with being spied on – someone collecting and possibly disclosing data about us, without our knowledge or consent. The FTC policy on unfairness would a priori seem naturally suited to the task. To be unfair, the privacy breach has to be a practice that injuries the consumer. Can we establish injury in a general privacy breach case? Unfortunately, the requirements do not look extremely promising. First, privacy breach must have substantial effect, namely lead to monetary or physical harm for the consumer: “more subjective types of harm are excluded” [FTC on unfairness]. There is usually no directly observable monetary or physical harm when a privacy breach occurs, with the exception of a few cases which tend to receive massive media-coverage, such as the murder of Rebecca Schaeffer, where a stalker obtained the actress home address through the California DMV records.  Second, the net value of the privacy breach has to be considered: possibly good outcomes balance the gravity of the injury. So, trading privacy in exchange of cash has good chances to actually play in your favor before the FTC committee (and your department store fidelity card does just that). Third, the privacy breach has to be unavoidable to the consumer. This obviously happens with an information hiding manufacturer [Sony BMG rootkit incident], but it does not need to be the case [Sears Holdings case] in order to result in a huge privacy disaster.
The FTC statement on unfairness is thus not so well suited for privacy protection purposes. What about the statement on deception? Oddly, it turns out that one can take the problem by a somewhat idiosyncratic angle: alleging misleading privacy expectations regarding a given product[Sears Holdings case]. What is surprising is the fact that privacy is treated as any other product feature, so that we are never really talking that much about privacy rather than misrepresenting and deceptive practices. Moreover, in the analysis of the likelihood of deception, one implicitly relies on unstated privacy expectations of reasonable consumers. The problem is that even reasonable consumers may not have enough technical knowledge to understand privacy issues in today’s highly complex world of softwares, so that the very foundations of reasonable expectations and the analysis of effects on the targeted audience are deeply weakened.
Privacy, understand as the right to be left alone is, at most, moderately well served by the FTC consumer protection policies. Unfortunately, in the information-intensive world, it also seems that a lot of “non-intrusive” data processing naturally falls into our understanding of privacy. For example, one’s ability to inspect her stored personal data on relevant systems, or one’s right to have her personal information data well secured from malevolent outsiders are pretty basic privacy requirements, which are not covered by our leading definition.
Interestingly, the OECD has pointed to some of those issues in its Guidelines on Protection of Privacy and Transborder Flows of Personal Data. In a tussle between free-flow of information which is economically benefic and privacy for the protection of the consumer, the OECD suggests 7 principles to be enforced by its members. Data collecting limitation, data quality for restraining data collection to only the relevant to the purpose it is been collected, purpose specification before the time of collection, security safeguards for protecting collected data, openness which is readily available purposes and nature of the collected data, individual participation for avoiding the tyranny of a blind administration, and finally accountability.
In France for instance, the CNIL (the National Commission of Computerized Systems and Liberties) implements these recommendations since 1978 (thus, ahead of OECD’s guidelines), albeit not without several criticisms, ranging from the quality of the decisions reached, decisions being often in favor of governmental actions, to its painfully long processes because of the overwhelming number of submitted requests and cases before this relatively small administrative organ.

The ACTA Threat

By Yoshang Cheng, David Rolnitzky, Lee Schneider, Jessica Voytek,

A coalition of governments are secretly meeting in an attempt to form a far-reaching agreement over copyright infringement.  The secret agreement, called the Anti-Counterfeiting Trade Agreement (ACTA), would establish international standards on intellectual property rights enforcement throughout such participating countries as the US, Canada and several members of the EU.  The agreement will formalize a process for finding 3rd parties liable for the infringements of their subscribers, and limiting their liability if they remove the content.  Although the actual wording of this agreement has not been officially published, reliable sources report that these negotiations are occurring behind closed doors, without public input.  The agreement is being structured similarly to the North American Free Trade Agreement (NAFTA), except it will create rules and regulations regarding private copying and copyright laws.  Recently a document containing the ACTA provisions related to the Internet was leaked, which has spurred more discussion.

The ACTA has come under fire from a number of organizations, including the Electronic Frontier Foundation and Public Knowledge, claiming that ACTA has several potentially serious concerns for consumers’ privacy, civil liberties, innovation and the free flow of information on the Internet, and the sovereignty of developing nations.  Increased liability for ISPs (Internet Service Providers) could result in increased monitoring of users, which could then impede their civil rights. Although developing nations have not been involved with negotiations, chances are that their compliance with the regulations will be required as a condition of future trade agreements, effectively limiting the ability for developing countries to choose policy options best suited to their countries.

The effect of this secret agreement on ISP’s could be far-reaching.  These new provisions would require ISPs to take down possibly infringing content, as well as delete the accounts and subscriptions of users who are accused without any judicial oversight.  As a result, the so-called “chilling effect” documented by Urban and Quilter in their 2005 study could be expanded on a global-scale.  The chilling effect is a term that describes the practice of using DMCA takedown notices to improperly limit the speech of others, usually for commercial or political gain.  According to the study, an astonishing 57% of DMCA take down notices sent to Google were targeting apparent competitors. ISPs, fearing liability from this new international coalition, would be compelled to comply with these notices without any kind of judicial oversight.

Civil rights, including freedom of expression may be impacted by this agreement.  In the US, the fair use doctrine was adopted in order to mitigate the tension between freedom of expression and copyright restrictions on expression.  Fair use is not a standard component of copyright law in every country.  In a society without fair use, unauthorized use would be infringement.  “If Hollywood could order intellectual property laws for Christmas what would they look like? This is pretty close,” said David Fewer, staff counsel at the University of Ottawa’s Canadian Internet Policy and Public Interest Clinic, in an article posted on Canada.com. Therefore this legislation would unduly benefit corporations at the expense of civil liberties.

The implementation of these new rules raises civil rights concerns.  For example, media outlets in Ireland and Canada have proposed scenarios in which people would be searched at international borders by security-turned-copyright-enforcer.  Such search and potential seizure of any items that “infringes” on copyright laws, such as ripped CD’s and movies, could be done without probable cause.

The impact of the agreement also has some potential consequences for policy in countries both within and outside the countries negotiating the ACTA.  As stated earlier, the agreement has a provision to create a legal regime to “encourage ISP’s to cooperate with right holders in the removal of infringing material” by giving them safe harbor from certain legal threats.  Though the US already has a “takedown notice” provision, the agreement could provide other coalition governments with new leeway to by-pass the normal legislative process in their countries in order to get DMCA-like legislation on the books.  Furthermore, tying such legislation to foreign treaties may constrain Congress’s ability to modify the DMCA in the future.

National sovereignty may also be impacted by ratification of this agreement.  Developing nations (such as China, India and Indonesia) have not been included in the negotiations but may still be required (indirectly) to comply with them.  Since the developing nations rely on international trade agreements for their well being, it would be easy for the ACTA nations to require compliance as a prerequisite to trade.  These laws would then supercede the ability for these developing nations to create laws for their countries.

The effects of ratifying ACTA in its current state would be far-reaching.  The applications of DMCA laws in the US, specifically the safe harbor provisions and take down notice process, are easily manipulated for commercial or political gain.  The rights of corporations are placed above the rights of citizens, and the process of law is turned on its head.  Accusation is proof enough to force action to remove the offending content.  The agreement would restrict the choices available to agreeing nations and developing nations alike. With so much at stake concerning the rights of individuals and the implications for international policies, it is troubling that these negotiations are being conducted secretly.

Do Not Call/No Trespassing

After reading the OPG v. Diebold case, I couldn’t help feeling bad for the poor Diebold employees whose home addresses and cell phone numbers were published in that email archive.  If publishing the archive falls under the fair use doctrine, does that mean that there is no issue with publishing their personal contact information also?  Or is that information considered factual, something that can be discovered?  Is a cell phone number considered private information?  What if a reader of the archive uses those home addresses to find and harass the employee(s)?  Is there any remediation is available to those Diebold employees??  This just seemed like an interesting intersection of Fair Use, Facts, and Privacy to me.

Do First, Ask Later: Copyright, Norms and Expectations

by Alison Meier, Kate Smith, Joan Ekaterin, and Jess Hemerly

Do First, Ask Later: Remix Culture and the “Gray Area”
Web 2.0 culture is driven by community-created content, information sharing, and yes, copyright infringement. Blogs repost photos from newspapers, magazines, and other blog posts, often with attribution but rarely with permission. YouTube is overflowing with unlicensed television clips and videos with unauthorized background music; some of these uses are infringing and are others within the scope of fair use (e.g., Lenz v. Universal, which we’ll read later this semester). While some Web 2.0 use has been found infringing by courts, like music file sharing (see A&M v. Napster), most falls in uncharted legal territory. Users creating content often takes the approach of do first, ask later. (more…)