COSTAR GROUP, INCORPORATED; CoStar Realty Information, Incorporated, Plaintiffs-Appellants, v. LOOPNET, INCORPORATED, Defendant-Appellee.
No. 03-1911
United States Court of Appeals, Fourth Circuit
Argued: May 6, 2004. Decided: June 21, 2004.
373 F.3d 544
BMG Music; EMI Music, North America; Sony Music Entertainment, Incorporated; Universal Music Group; Univision Music, LLC; Columbia Pictures Industries, Incorporated; Metro-Goldwyn-Mayer Studios, Incorporated; Paramount Pictures Corporation; Twentieth Century Fox Film Corporation; Universal City Studios, LLLP, Amici Supporting Appellants,
Bellsouth Telecommunications, Incorporated; Netcoalition; Ebay Incorporated; Computer & Communications Industry Association; Google Incorporated; Yahoo! Incorporated; Amazon.Com, Incorporated; United States Internet Service Provider Association; Verizon Communications, Incorporated; U.S. Internet Industry Association, Amici Supporting Appellee.
Before NIEMEYER, MICHAEL, and GREGORY, Circuit Judges.
Affirmed by published opinion. Judge NIEMEYER wrote the opinion, in which Judge MICHAEL joined. Judge GREGORY wrote a dissenting opinion.
OPINION
NIEMEYER, Circuit Judge:
CoStar Group, Inc. and CoStar Realty Information, Inc. (collectively “CoStar“), a copyright owner of numerous photographs of commercial real estate, commenced this copyright infringement action against LoopNet, Inc., an Internet service provider, for direct infringement under
Relying on Religious Technology Center v. Netcom On-Line Communication Services, Inc., 907 F.Supp. 1361 (N.D.Cal. 1995), the district court entered summary judgment in favor of LoopNet on the claim of direct infringement under
I
CoStar is a national provider of commercial real estate information, and it claims to have collected the most comprehensive database of information on commercial real estate markets and commercial properties in the United States and the United Kingdom. Its database includes a large collection of photographs of commercial properties, and CoStar owns the copyright in the vast majority of these photographs. CoStar makes its database, including photographs, available to customers through the Internet and otherwise, and each customer agrees not to post CoStar‘s photographs
LoopNet is an Internet service provider (“ISP“) whose website allows subscribers, generally real estate brokers, to post listings of commercial real estate on the Internet. It claims that its computer system contains over 100,000 customer listings of commercial real estate, including approximately 33,000 photographs, and that it was, during the district court proceedings, adding about 2200 listings each day, 250 of which include photographs. LoopNet does not post real estate listings on its own account. Rather it provides a “web hosting service that enables users who wish to display real estate over the Internet to post listings for those properties on LoopNet‘s web site.”
When using LoopNet‘s services, a subscriber fills out a form and agrees to “Terms and Conditions” that include a promise not to post copies of photographs without authorization. If the subscriber includes a photograph for a listing, it must fill out another form and agree again to the “Terms and Conditions,” along with an additional express warranty that the subscriber has “all necessary rights and authorizations” from the copyright owner of the photographs. The subscriber then uploads the photographs into a folder in LoopNet‘s system, and the photograph is transferred to the RAM of one of LoopNet‘s computers for review. A LoopNet employee then cursorily reviews the photograph (1) to determine whether the photograph in fact depicts commercial real estate, and (2) to identify any obvious evidence, such as a text message or copyright notice, that the photograph may have been copyrighted by another. If the photograph fails either one of these criteria, the employee deletes the photograph and notifies the subscriber. Otherwise, the employee clicks an “accept” button that prompts LoopNet‘s system to associate the photograph with the web page for the property listing, making the photograph available for viewing.
Beginning in early 1998, CoStar became aware that photographs for which it held copyrights were being posted on LoopNet‘s website by LoopNet‘s subscribers. When CoStar informed LoopNet of the violations, LoopNet removed the photographs. In addition, LoopNet instituted and followed a policy of marking properties to which infringing photographs had been posted so that if other photographs were posted to that property, LoopNet could inspect the photographs side-by-side to make sure that the new photographs were not the infringing photographs. By late summer 1999, CoStar had discovered 112 infringing photographs on LoopNet‘s website, and by September 2001, it had found over 300. At that time, LoopNet had in its system about 33,000 photographs posted by its subscribers.
CoStar commenced this action in September 1999 against LoopNet, alleging copyright infringement, violation of the Lanham Act, and several state-law causes of action. On cross-motions for summary judgment, the district court concluded that LoopNet had not engaged in direct infringement under the Copyright Act. It left open, however, CoStar‘s claims that LoopNet might have contributorily infringed CoStar‘s copyrights and that LoopNet was not entitled to the “safe harbor” immunity provided by the Digital Millennium Copyright Act,
CoStar contends principally that the district court erred in providing LoopNet “conclusive immunity,” as a “‘passive’ provider of Internet” services, from strict liability for its hosting of CoStar‘s copyrighted pictures on LoopNet‘s website. The district court based its decision on the reasoning of Religious Technology Center v. Netcom On-Line Communication Services, Inc., 907 F.Supp. 1361 (N.D.Cal. 1995) (”Netcom“), which held that an ISP serving as a passive conduit for copyrighted material is not liable as a direct infringer. CoStar asserts that LoopNet is strictly liable for infringement of CoStar‘s rights protected by
Stated otherwise, CoStar argues (1) that the Netcom decision was a pragmatic and temporary limitation of traditional copyright liability, which would otherwise have held ISPs strictly liable, and that in view of the enactment of the DMCA, Netcom‘s limitation is no longer necessary; (2) that Congress considered Netcom in enacting the DMCA, codifying its principles and thereby supplanting and preempting Netcom as the only exemption from liability for direct infringement; and (3) that because LoopNet cannot satisfy the conditions of the DMCA, it remains strictly liable for direct infringement under
A
In Netcom, the court held, among other things, that neither the ISP providing Internet access, nor the bulletin board service storing the posted material, was liable for direct copyright infringement under
Where the infringing subscriber is clearly directly liable for the same act, it does not make sense to adopt a rule that would lead to the liability of countless parties whose role in the infringement is nothing more than setting up and operating a system that is necessary for the functioning of the Internet. . . . The court does not find workable a theory of infringement that would hold the entire Internet liable for activities that cannot reasonable be deterred. Billions of bits of data flow through the Internet and are necessarily stored on servers throughout the network and it is thus practically impossible to screen out infringing bits from noninfringing bits. Because the court cannot see any meaningful distinction (without regard to knowledge) between what Netcom did and what every other Usenet server
does, the court finds that Netcom cannot be held liable for direct infringement.
CoStar argues, in view of the court‘s explanation, that the Netcom decision was driven by expedience and that its holding is inconsistent with the established law of copyright, as represented by Playboy Enterprises, Inc. v. Frena, 839 F.Supp. 1552 (M.D.Fla.1993) (holding an ISP strictly liable for illegal copying on its computer system). It maintains that the court made a policy judgment based not on what the law was but on the fact that the Internet would have been crippled as a medium if preexisting law had been applied. It argues further that since the enactment of the DMCA in 1998, the problem identified in Netcom has been solved by the DMCA, and consequently there is no longer any need for the courts to continue to uphold this “special exemption” from
While the court in Netcom did point out the dramatic consequences of a decision that would hold ISPs strictly liable for transmitting copyrighted materials through their systems without knowledge of what was being transmitted, the court grounded its ruling principally on its interpretation of
“[T]he Copyright Act grants the copyright holder ‘exclusive’ rights to use and to authorize the use of his work in five qualified ways, including reproduction of the copyrighted work in copies.” Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 432-33, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984). And it provides that “[a]nyone who violates any of the exclusive rights of the copyright owner . . . is an infringer of the copyright.”
While the Copyright Act does not require that the infringer know that he is infringing or that his conduct amount to a willful violation of the copyright owner‘s rights, it nonetheless requires conduct by a person who causes in some meaningful way an infringement. Were this not so, the Supreme Court could not have held, as it did in Sony, that a manufacturer of copy machines, possessing constructive knowledge that purchasers of its machine may be using them to engage in copyright infringement, is not strictly liable for infringement. 464 U.S. at 439-42, 104 S.Ct. 774. This, of course, does not mean that a manufacturer or owner of machines used for copyright violations could not have some indirect liability, such as contributory or vicarious liability. But such extensions of liability would require a showing of additional elements such as knowledge coupled with inducement or supervision coupled with a financial interest in the illegal copying.
The Copyright Act does not specifically provide for such extended liability,
The absence of such express language in the copyright statute does not preclude the imposition of liability for copyright infringements on certain parties who have not themselves engaged in the infringing activity. For vicarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying the circumstances in which it is just to hold one individual accountable for the actions of another.
Sony, 464 U.S. at 435, 104 S.Ct. 774. Under a theory of contributory infringement, “one who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another” is liable for the infringement, too. Gershwin Publishing Corp. v. Columbia Artists Mgmt., Inc., 443 F.2d 1159, 1162 (2d Cir.1971) (footnote omitted). Under a theory of vicarious liability, a defendant who “has the right and ability to supervise the infringing activity and also has a direct financial interest in such activities” is similarly liable. Id.
But to establish direct liability under
Moreover, in the context of the conduct typically engaged in by an ISP, construing the Copyright Act to require some aspect of volition and meaningful causation—as distinct from passive ownership and management of an electronic Internet facility—receives additional support from the Act‘s concept of “copying.” A violation of
In concluding that an ISP has not itself fixed a copy in its system of more than transitory duration when it provides an Internet hosting service to its subscribers, we do not hold that a computer owner who downloads copyrighted software onto a computer cannot infringe the software‘s copyright. See, e.g., MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, 518-19 (9th Cir.1993). When the computer owner downloads copyrighted software, it possesses the software, which then functions in the service of the computer or its owner, and the copying is no longer of a transitory nature. See, e.g., Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 260 (5th Cir.1988). “Transitory duration” is thus both a qualitative and quantitative characterization. It is quantitative insofar as it describes the period during which the function occurs, and it is qualitative in the sense that it describes the status of transition. Thus, when the copyrighted software is downloaded onto the computer, because it may be used to serve the computer or the computer owner, it no longer remains transitory. This, however, is unlike an ISP, which provides a system that automatically receives a subscriber‘s infringing material and transmits it to the Internet at the instigation of the subscriber.
Accordingly, we conclude that Netcom made a particularly rational interpretation of
The staple article of commerce doctrine must strike a balance between a copyright holder‘s legitimate demand for effective—not merely symbolic—protection of the statutory monopoly, and the rights of others freely to engage in substantially unrelated areas of commerce.
Sony, 464 U.S. at 442, 104 S.Ct. 774. We thus find it an overstatement by CoStar to argue that Netcom represented the adoption of a new “special liability-limiting rule for Internet servers.”
B
CoStar rests its position not only on the marginalization of the Netcom holding, but also on the assertion that the DMCA rendered Netcom no longer necessary—indeed, even codified and preempted Netcom—by imposing an exclusive safe harbor for ISPs that fulfill the conditions of the DMCA. CoStar argues that because the DMCA supplanted Netcom, LoopNet must rely for its defense exclusively on the immunity conferred by the DMCA. This argument, however, is belied by the plain language of the DMCA itself.
The DMCA was enacted as
Other defenses not affected.—The failure of a service provider‘s conduct to qualify for limitation of liability under this section shall not bear adversely upon the consideration of a defense by the service provider that the service provider‘s conduct is not infringing under this title or any other defense.
Given that the statute declares its intent not to “bear adversely upon” any of the ISP‘s defenses under law, including the defense that the plaintiff has not made out a prima facie case for infringement, it is difficult to argue, as CoStar does, that the statute in fact precludes ISPs from relying on an entire strain of case law holding that direct infringement must involve conduct having a volitional or causal aspect. Giving such a construction to the DMCA would in fact “bear adversely upon the consideration” of this defense, in direct contravention of
CoStar advances the additional argument that because “Congress ‘codified’ Netcom in the DMCA . . . it can only be to the DMCA that we look for enforcement of those principles.” The brief of several
CoStar‘s argument that the DMCA supplanted and preempted Netcom is further undermined by the DMCA‘s legislative history. Congress actually expressed its intent that the courts would continue to determine how to apply the Copyright Act to the Internet and that the DMCA would merely create a floor of protection for ISPs. After citing the conflicting decisions in Netcom and Frena, the Senate Committee on the Judiciary explained that “rather than embarking upon a wholesale clarification of these doctrines, the Committee decided to leave current law in its evolving state and, instead, to create a series of ‘safe harbors,’ for certain common activities of service providers.” S.Rep. No. 105-190, at 19 (1998). The Ninth Circuit has found this language persuasive, citing it in finding that “[t]he DMCA did not simply rewrite copyright law for the on-line world.” Ellison v. Robertson, 357 F.3d 1072, 1077 (9th Cir.2004). Furthermore, the final conference report supports this passage, stating:
As provided in subsection (l), Section 512 is not intended to imply that a service provider is or is not liable as an infringer either for conduct that qualifies for a limitation of liability or for conduct that fails to so qualify. Rather, the limitations of liability apply if the provider is found to be liable under existing principles of law.
H.R. Conf. Rep. No. 105-796, at 73 (1998), reprinted in 1998 U.S.C.C.A.N. 639, 649. Thus the DMCA was intended not to change the “evolving” doctrines on ISP liability for copyright infringement, which included Netcom and Frena, but to offer a certain safe harbor for ISPs. Courts were left free to continue to construe the Copyright Act in deciding the scope and nature of prima facie liability. The legislative “compromise” repeatedly invoked by CoStar and its amici was that Congress would not end the debate by importing and fixing copyright infringement liability in the form articulated by Netcom, but rather would provide a limited safe harbor immediately necessary to ISPs, and allow the courts to continue defining what constitutes a prima facie case of copyright infringement against an ISP.
CoStar challenges our conclusion by relying also on a passage from ALS Scan, which is concededly ambiguous when taken out of context, where we wrote:
Although we find the Netcom court reasoning more persuasive, the ultimate conclusion on this point is controlled by Congress’ codification of the Netcom principles in Title II of the DMCA. As the House Report for that Act states,
The bill distinguishes between direct infringement and secondary liability, treating each separately.
This structure is consistent with evolving case law, and appropriate in light of the different legal bases for and policies behind the different forms of liability.
As to direct infringement, liability is ruled out for passive, automatic acts engaged in through a technological process initiated by another. Thus the bill essentially codifies the result in the leading and most thoughtful judicial decision to date: Religious Technology Center v. Netcom On-Line Communication Services, Inc., 907 F.Supp. 1361 (N.D.Cal.1995). In doing so, it overrules these aspects of Playboy Enterprises, Inc. v. Frena, 839 F.Supp. 1552 (M.D.Fla.1993), insofar as that case suggests that such acts by service providers could constitute direct infringement, and provides certainty that Netcom and its progeny, so far only a few district court cases, will be the law of the land. H.R.Rep. No. 105-551(I), at 11 (1998). Accordingly, we address only ALS Scan‘s claims brought under the DMCA itself.
ALS Scan, 239 F.3d at 622. This portion of legislative history was referring to an earlier version of the legislation, in which the entire holding of Netcom was imported.* The distinction between this earlier bill and the legislation as ultimately passed was not relevant to the holding in ALS Scan, where we denied summary judgment to both parties and remanded for the district court to determine facts that would be relevant to whether the defendant had committed contributory or vicarious infringement, such as whether the defendant system‘s “‘sole purpose’ [was] infringement of ALS Scan‘s copyrights,” and
With respect to the issue of what creates liability for direct infringement, the distinction between the two bills is more important. The earlier version of the bill was meant to incorporate all of Netcom‘s protections, whereas the final law reflected the abovementioned compromise between the earlier version and the concerns of copyright-holders. Congress would enact certain safe-harbor provisions absolutely necessary to the immediate survival of ISPs, while courts would continue to consider the question of whether passive ISPs could ever be directly liable for violations of copyright committed using their systems.
It is clear that Congress intended the DMCA‘s safe harbor for ISPs to be a floor, not a ceiling, of protection. Congress said nothing about whether passive ISPs should ever be held strictly liable as direct infringers or whether plaintiffs suing ISPs should instead proceed under contributory theories. The DMCA has merely added a second step to assessing infringement liability for Internet service providers, after it is determined whether they are infringers in the first place under the preexisting Copyright Act. Thus, the DMCA is irrelevant to determining what constitutes a prima facie case of copyright infringement.
At bottom, we hold that ISPs, when passively storing material at the direction of users in order to make that material available to other users upon their request, do not “copy” the material in direct violation of
III
CoStar contends that even under Netcom‘s construction of copyright infringement liability for ISPs, LoopNet‘s conduct in this case is more than passive, in that LoopNet screens photographs posted by its subscribers. In CoStar‘s opinion, this screening process renders LoopNet liable for direct copyright infringement.
LoopNet, like other ISPs, affords its subscribers an Internet-based facility on which to post materials, but the materials posted are of a type and kind selected by the subscriber and at a time initiated by the subscriber. Similarly, users who wish to access a subscriber‘s information may do so without intervention from LoopNet. A subscriber seeking to post a listing on LoopNet‘s website containing only text fills out a form and agrees to LoopNet‘s “Terms and Conditions,” which include the obligation to respect others’ copyrights. Once the subscriber has filled out the form and agreed to the “Terms and Conditions,” an identification number is automatically assigned to the listing, and a web page containing the listing and the identification number is automatically created. The web page is then hosted on LoopNet‘s website to be viewed by users who request the listing. CoStar does not contend that LoopNet‘s activity in signing up subscribers with only textual property listings is anything other than passive.
Although LoopNet engages in volitional conduct to block photographs measured by two grossly defined criteria, this conduct, which takes only seconds, does not amount to “copying,” nor does it add volition to LoopNet‘s involvement in storing the copy. The employee‘s look is so cursory as to be insignificant, and if it has any significance, it tends only to lessen the possibility that LoopNet‘s automatic electronic responses will inadvertently enable others to trespass on a copyright owner‘s rights. In performing this gatekeeping function, LoopNet does not attempt to search out or select photographs for duplication; it merely prevents users from duplicating certain photographs. To invoke again the analogy of the shop with the copy machine, LoopNet can be compared to an owner of a copy machine who has stationed a guard by the door to turn away customers who are attempting to duplicate clearly copyrighted works. LoopNet has not by this screening process become engaged as a “copier” of copyrighted works who can be held liable under
To the extent that LoopNet‘s intervention in screening photographs goes further than the simple gatekeeping function described above, it is because of CoStar‘s complaints about copyright violations. Whenever CoStar has complained to LoopNet about a particular photograph, LoopNet has removed the photograph, and the property listing with which the photograph was associated has been marked. The next time the user tries to post a photograph to accompany that listing, LoopNet conducts a manual side-by-side review to make sure that the user is not reposting the infringing photograph. CoStar and other copyright holders benefit significantly from this type of response. If they find such conduct by an ISP too active, they can avoid it by adding a copyright notice to their photographs, which CoStar does not do. CoStar can hardly request LoopNet to prevent its users from infringing upon particular unmarked photographs and then subsequently seek to hold LoopNet liable as a direct infringer when LoopNet complies with CoStar‘s request.
In short, we do not conclude that LoopNet‘s perfunctory gatekeeping process, which furthers the goals of the Copyright Act, can be taken to create liability for LoopNet as a direct infringer when its conduct otherwise does not amount to direct infringement.
AFFIRMED
GREGORY, Circuit Judge, dissenting:
While I largely agree with the majority‘s careful explication of the direct infringement doctrine within the cybersphere post-DMCA, I cannot join the majority‘s application of that law. First, I disagree with the majority‘s characterizations of LoopNet as “an analogue to the owner of a traditional copying machine whose customers pay a fixed amount per copy and operate the machine themselves to make copies,” ante at 550, and its comparison of the company to “an owner of a copy machine who has stationed a guard by the door to turn away customers who are attempting to duplicate clearly copyrighted works,” id. at 556. Specifically, these ill-fitting characterizations lead the majority to the erroneous conclusion that LoopNet is not liable for direct infringement despite its volitional screening process. Because I would hold that LoopNet engages in non-passive, volitional conduct with respect to the photographs on its website such that the Netcom defense does not apply, I respectfully dissent.
I
In examining whether LoopNet is a passive provider not subject to direct infringement liability, the majority conducts a comparison of LoopNet‘s posting processes as to text and images. The majority properly recognizes, and CoStar does not dispute, that when a subscriber posts text to LoopNet‘s website the process is completely passive. Indeed, whatever text the subscriber enters into LoopNet‘s form is automatically uploaded to, and immediately accessible on, LoopNet‘s website. By contrast, when a subscriber wishes to post a photograph on the site, such posting is not automatic or immediate. Instead, the photograph is transferred to LoopNet‘s computers where one of the company‘s employees can review the photo to ensure (1) it is an image of commercial real estate, and (2) it is not an obviously copyrighted image.
At this stage of the process the LoopNet employee has a choice, he or she can reject the photograph because it does not comply with the above-noted criteria, or he or she can “accept” the photograph, at which time it becomes accessible on the subscriber‘s web page to which the text was previously and automatically uploaded. The majority thus finds itself in a bind, namely how is this decision by the LoopNet employee whether or not to “accept” an image akin to the automated posting of text such that it, too, does not constitute direct infringement. The majority attempts to resolve this paradox by first admitting, “LoopNet engages in volitional conduct to block photographs,” ante at 556 (emphasis added), however, it reasons, “this conduct, which takes only seconds, does not amount to ‘copying,’ nor does it add volition to LoopNet‘s involvement in storing the copy. The employee‘s look is so cursory as to be insignificant. . . . In performing this gatekeeping function, LoopNet does not attempt to search out or select photographs for duplication; it merely prevents users from duplicating certain photographs.” Id. (first emphasis added). In so determining that LoopNet‘s “gatekeeping function” does not expose it to direct infringement liability, I submit that the majority expands the non-volitional defense well beyond Netcom and subsequent holdings, and gives direct infringers in the commercial cybersphere far greater protections than they would be accorded in print and other more traditional media.
II
In Netcom, the court recognized that traditional strict liability copyright princi-
Since Netcom, courts have recognized that the non-volitional defense to direct infringement claims extends only to “passive” service providers, through which data flow is “automatic.” In ALS Scan, we stated of Netcom, “when an Internet provider serves, without human intervention, as a passive conduit for copyrighted material, it is not liable as a direct infringer.” 239 F.3d at 622 (Niemeyer, J.) (emphasis added); see also Playboy Enters., Inc. v. Webbworld, Inc., 991 F.Supp. 543, 552 (N.D.Tex.1997); Playboy Enters., Inc. v. Russ Hardenburgh, Inc., 982 F.Supp. 503, 513 (N.D.Ohio 1997). In this case, however, the majority profoundly deviates from the passivity approach.
The difference between LoopNet‘s conduct in this case and the protection originally afforded by Netcom is illustrated by examining the Netcom court‘s aforementioned statement that “Netcom did not take any affirmative action that directly resulted in copying plaintiffs’ works other than by installing and maintaining a system whereby software automatically forwards messages received from subscribers onto the Usenet, and temporarily stores copies on its system.” 907 F.Supp. at 1368 (emphasis added). Here, however, LoopNet‘s conduct with regard to the photos is anything but automatic. In contrast to the real estate property descriptions which are automatically uploaded to the website without any service provider input, the
The majority tries to diminish the importance of this fact by arguing that the review is very brief and the reviewer presses a single button. At the heart of the review, however, is an inherently “volitional” action without which the subscriber‘s photos would not be accessible. For every photograph submitted, a LoopNet employee must determine: (1) is this real estate and (2) does the photo comply—on its face, at least—with our terms and conditions. These inquiries are the antitheses of passive, automatic actions. See Russ Hardenburgh, Inc., 982 F.Supp. at 513 (denying Netcom immunity to BBS operator which (1) encouraged subscribers to upload files and (2) employed “a screening procedure in which [the operator‘s] employees viewed all files in the upload file and moved them into the generally available files for subscribers” (emphasis added)); id. (stating those facts “transform Defendants from passive providers of a space in which infringing activities happened to occur to active participants in the process of copyright infringement“); cf. Webbworld, Inc., 991 F.Supp. 543, 552 (N.D.Tex.1997) (refusing to apply Netcom immunity to defendant that “did not function as a mere provider of access,” but provided content and functioned as a “commercial destination within the Internet“). As the district court in Perfect 10, Inc. v. Cybernet Ventures, Inc., 213 F.Supp.2d at 1168, recently remarked “[t]he principle distilled from these [cyber direct infringement] cases is that defendants must actively engage in one of the activities recognized in the Copyright Act.” Similarly, we emphasized in ALS Scan, 239 F.3d at 622, it was the lack of “human intervention” which rendered Netcom a passive service provider. Here, however, humans employed by LoopNet limited the content of postings and screened and sometimes edited photos to keep quality consistent, thus taking the case far outside the previously understood scope of coverage for Netcom‘s volitional defense.
The majority downplays LoopNet‘s volition, and the break from previous application of the volitional defense, by focusing on the fact that it is the subscriber, not LoopNet, who begins the volitional process, i.e., the subscriber is the initial direct infringer.1 This distinction, however, is illusory, as I believe is demonstrated by analyzing LoopNet‘s actions through the hypothetical of a more traditional copyright context.
Consider the following example: LoopNet Magazine is a for-profit publication freely distributed in curbside boxes that displays commercial real estate listings. LoopNet Magazine solicits listings from its readership, but neither the reader who submits the listing, nor the reader accessing the listing pays for the service. Instead, LoopNet Magazine subsists on advertising revenue and other products it sells through the publication. Readers may electronically submit textual listings, or those with text and graphics. When LoopNet Magazine receives a text listing, its computers automatically transfer the content into the template for the next is-
Reader X sends LoopNet Magazine text describing commercial office space for rent in New York City‘s renowned Flatiron Building; the text describing the property is, of course, automatically inserted into the LoopNet Magazine template and is ready for publication. Reader X has also submitted a photograph of the Flatiron Building, and signs the terms and conditions form. Reader X knows, however, that she has not complied with the terms and conditions because the photo is not hers, rather it is Edward Steichen‘s 1905 photograph, The Flatiron. LoopNet Magazine‘s Intern Y receives the photo of the Flatiron Building, notes Reader X has signed the terms and conditions, and evaluates the photo for a few seconds. Intern Y finds the image to be a beautiful depiction of the building, precisely the type of material LoopNet Magazine seeks to display, and does not recognize it as the copyrighted Steichen image. However, Intern Y finds that the image was “uploaded in a format that‘s not correct,” so he takes steps to remedy the image “so that it can appear [in the publication] without any technical problems.” J.A. 175 (deposition testimony of
That another person initiated the process which led to LoopNet‘s infringement is of no consequence. LoopNet remains the pivotal volitional actor, “but for” whose action, the images would never appear on the website. Indeed, “volition” is defined as “the act of willing or choosing[;] the act of deciding (as on a course of action or an end to be striven for)[;] the exercise of the will . . . [or] the termination of an act or exercise of choosing or willing[;] a state of decision or choice.” Webster‘s Third New International Dictionary of the English Language, unabridged 2562 (1981). Under any analytical framework, LoopNet has engaged in active, volitional conduct; its employees make a conscious choice as to whether a given image will appear in its electronic publication, or whether the image will be deleted from the company‘s system.3 Nothing in the brief nature of
Notes
(a) Limitation.... [A] provider shall not be liable for—
(1) direct infringement, based solely on the intermediate storage and transmission of material through a system or network controlled or operated by or for that provider, if—
(A) the transmission was initiated by another person;
(B) the storage and transmission is carried out through an automatic technological process, without any selection of that material by the provider; and
(C) no copy of the material thereby made by the provider is maintained on the provider‘s system or network in a manner ordinarily accessible to anyone other than the recipients anticipated by the person who initiated the transmission, and no such copy is maintained on the system or network in a manner ordinarily accessible to such recipients for a longer period than is reasonably necessary for the transmission....
H.R.Rep. No. 105-551, pt. 1, at 7-8 (1998). These provisions most closely resemble those codified at