Professional Documents
Culture Documents
1. Copyright Overview..........................................................................................2
1.1. Copyright in Australia 2
1.2. Copyright and the Internet 2
1.3. Existence of copyright 3
1.4. Term of protection 3
1.5. Exceptions to Copyright 4
1.5.1. Fair dealing 4
1.5.2. Educational institutions and libraries 4
1.5.3. Technical processes and temporary copies 5
1.5.4. Computer software 5
1.. Copyright infringement 5
1.!. "enalties 5
1.#. $eneral comments
2. Licensing of Copyright.....................................................................................6
2.1.1. Background 6
2.1.2. You and Facebook 7
3. Test for ISP Liability.........................................................................................
!. "oral #ights......................................................................................................$
4.1.1. Background 9
4.1.2. Indigenous Australians and Copyright Law 10
%. Copyright &'en('ent )*igital &gen(a+ &ct 2,,, )Cth+............................12
6. &nti-circ.'vention in &.stralia....................................................................13
.1. Case %tudy& %ony Computer Entertainment ' %te'ens 14
/. &nti-Circ.'vention in the 0nite( States......................................................1%
!.1. Case %tudy& (nited %tates ' Elcomsoft 1
7.1.1. Background 16
7.1.2. Arguments at trial 16
7.1.3. The decision 17
. Protection of Co'p.ter Progra's................................................................1
#.1. Copyright Amendment )"arallel Importation* Act 2++3 1#
$. Protection of Online *atabases......................................................................1$
,.1. %atisfying -.riginality/ 1,
,.2. 0imitations associated 1ith -online/ data2ases 2+
1,. The International #egi'e...............................................................................2,
1+.1. European (nion 3irecti'es 21
11. Case St.(y1 2apster........................................................................................22
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Date: 13 September, 2011
12.
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
2
1. Copyright Overview
Copyright protects authors and creators from unauthorised reproduction or adaptation of
original creations such as books, computer programs, scripts, paintings, sculptures,
drawings, photographs, music, film, video, broadcasts and the choreography of a
performance. The copyright owner has the exclusive right to copy, publish, perform,
broadcast, adapt (for example, a screenplay from a novel, sell, license or import
copyright protected creations. Copyright is a type of intellectual property as it protects
the creative and inventive endeavours.
!ome useful links that contain general information about copyright protection include"
#. Anti1circu!vention in Australia
%n order to control the distribution and use of their works, copyright owners are
increasingly embedding access and copy protection mechanisms in their digital works.
%t is the circumvention of these access controls that often infringes copyright and paves
the way for free and easy dissemination of copyright protected material. The
permissibility of such technologies is a controversial issue, as there is no easy way of
reaching a balance between copyright holders$ right to have their work ade@uately
protected and the right of the consumer to freely use legitimately ac@uired material.
%n #ustralia the Copyright Amendment )3igital Agenda* Act 2+++ (C#)# contains
provisions to criminalise devices for the purpose of 6the circumvention, or facilitating
the circumvention, of any effective technological protection measures$ (now (art F
)ivison 2# of the Copyright Act. %t is similar to its 8! predecessor, the )JC# (see
below. #ctivities protected by the amendments include the importation, and
manufacture of circumvention devices and circumvention services (s 112# Copyright
Act, removal or alteration of electronic rights management information (s 112G and,
commercial dealings with works whose electronic rights management information is
removed or altered (s 112C. #ltering electronic rights management information may
include commercially distributing, importing a copy of a work, communicating the copy
to the public or using a copy knowing the electronic rights management information had
been so removed or altered without the permission of the copyright holder (s 112C, the
latter dealing also applies to s 112G.
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
15
The C#)# was unsuccessfully used by !ony in its case challenging the legality of
(lay!tation 6mod chips$, see below.
!ee p. 17A last paragraph , p.22,, p.243
the Copyright #mendment #ct 2,,2 (Cth replaced C#)#
(http"''www.comlaw.gov.au'Com;aw';egislation'#ct1.nsf','C3<77A)A###<)1*2C
#27A252,,,C<47)M/pen)ocument
Commentary
(http"''www.ema.gov.au'www'agd'agd.nsf'(age'Copyright0%ssuesand:eviews0Copyrig
ht#mendment#ct2,,2
!ee also (http"''www.unimelb.edu.au'copyright'information'fastfind'**0T(J.html
;%?B )/<!?$T ./:B
0S 3ree tra(e agree'ent8s affect on the Copyright &'en('ent )*igital &gen(a+
&ct 2,,, )Cth+
E <xtension of the 7, year period of protection to A, years (that is the term of
copyright protection now extends for the life of the author plus A, years rather
than the life of the author plus 7, years.
E <nhancement of scope of protection for electronic right management
information
E ?ew criminal offences for commercial and significant infringement of copyright
E ;imits of the liability of carriage service providers
E %ntorudciton of eoncmoic rights for performers
E %mplementation of a scheme to limit the remdedies available against carriage
service providers
#.1. Case )tudy2 )ony Co!puter Entertain!ent v )tevens
The *ederal Court in Da2ushi:i Daisha %ony Computer Entertainment ' %te'ens =2,,2>
*C# 1,2 (http"''www.austlii.edu.au'au'cases'cth'federal0ct'2,,2'1,2.html, found that
KmodEchipsK installed on (laystation consoles to circumvent copy protections do not
breach the new provisions of the Copyright Act as amended by the C#)# because the
device did not prevent the actual copying of the games.
<ach time a game is inserted, a (laystation console checked its authenticity by reading
the access code, which is burned onto the game C). The mod chips avoid this
authentication process, allowing pirated versions of the game to run on the console.
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
17
The finding rested on the fact that the chips do not 6prevent or inhibit the infringement
of copyright$, since the actual 6infringement of copyright$ occurs when the game is
copied, not when it is played.
The #ustralian Competition and Consumer Commission (http"''www.accc.gov.au,
intervening as an amicus curae (friend of the court, argued that the chips did not have
6limited commercially significant purpose or use, or no such purpose or use, other than
the circumvention$, since they also worked to overcome !ony$s regional protection
measures & a legal purpose. Lowever, the Court did not deal with this issue.
Da2ushi:i Daisha %ony Computer Entertainment ' %te'ens (2,,4 142 *C: 41 *ull
Court of the *ederal Court
(http"''www.austlii.edu.au'au'cases'cth'*C#*C'2,,4'17A.html
Commentary
(http"''www.ag.gov.au'agd'...'enewscopyrighthome.nsf'(age'e?ews0%ssue04,0E
0!eptember02,,4O2
$. Anti1Circu!vention in the 3nited )tates
#merica$s 3igital Billennium Copyright Act 1,,# (http"''frwebgate.access.gpo.gov'cgiE
bin'getdoc.cgiMdbnameN1,70cong0billsPdocidNf"h2231enr.txt.pdf represents the most
comprehensive reform of 8nited !tates copyright and seeks to update the law to reflect
copyright concerns of the )igital #ge. %t also implements the .orld %ntellectual
(roperty /rganisation$s (.%(/ (http"''www.wipo.org Copyright and (erformance and
(honograms Treaty (see section 1,.
The )JC# is divided into five titles"
Title I, the 6.%(/ Copyright and (erformances and (honograms Treaties
%mplementation #ct of 1113,$ implements the .%(/ treaties.
Title II, the 6/nline Copyright %nfringement ;iability ;imitation #ct,$ creates
limitations on the liability of online service providers for copyright infringement
when engaging in certain types of activities.
Title III, the 6Computer Jaintenance Competition #ssurance #ct,$ creates an
exemption for making a copy of a computer program by activating a computer
for purposes of maintenance or repair.
Title I9 contains six miscellaneous provisions, relating to the functions of the
Copyright /ffice, distance education, the exceptions in the Copyright #ct for
libraries and for making ephemeral recordings, QwebcastingR of sound
recordings on the %nternet, and the applicability of collective bargaining
agreement obligations in the case of transfers of rights in motion pictures.
Title 9, the 6Fessel Lull )esign (rotection #ct,$ creates a new form of
protection for the design of vessel hulls. (<xtracted from
http"''www.loc.gov'copyright'legislation'dmca.pdf.
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
12
%t is a controversial piece of legislation as its antiEcircumvention provisions affect the
way software engineers, computer scientists, and computer security specialists do their
work. The law also affects how librarians and educational institutions ac@uire new
works, how %nternet users can protect their privacy, and even how 9ournalists can report
on stories involving technical protection measures. Gy using a technical device to
protect music, images or words the copyright holder can turn traditionally permissible
access to or use of digital content into a civil violation. This new law has complex
provisions and a few narrow exemptions (extracted from
http"''www.chillingeffects.org'anticircumvention.
The <lectronic *rontier *oundation (<** also noted that the )CJ# also seriously
inhibits encryption research, as the current provisions are far too narrow to cover all
legitimate research methods (see
http"''www.eff.org'%(')JC#'1111,3,10eff0comments.html.
!ome useful links relating to the #ct and its pitfalls include"
http"''www.loc.gov'copyright'legislation'dmca.pdf E provides a detailed outline
of the #ct and its chief provisions.
http"''www.eff.org'%(')JC#' ;%?B )/<!?$T ./:B E includes a full
version of the legislation, as well as several other resources, hosted by the
<lectronic *rontier *oundation, a consumer rights group opposed to many
applications of the )JC#. The 1113 #merican legislation is one of the most
widely discussed and controversial laws in the area. %t gives sweeping protection
to copyright holders by making almost all copyright circumventions criminal
offences-
http"''www.chillingeffects.org'anticircumvention'fa@.cgi & a detailed *#S page
about the )JC#-
http"''antiEdmca.org'fa@0local.html and the #ntiE)JC# homepage & describes
some of the problems associated with the #ct.
$.1. Case )tudy2 3nited )tates v Elco!soft
,.1.1. ac!ground
:ussian software company <lcom!oft became the defendant in the first federal criminal
prosecution under the )JC#$s anticircumvention provisions.
The #dobe eGook :eader enables electronic books to be read, moved between
computers, backed up, printed, copied and to be read aloud through a text to speech
feature. # publisher of a particular electronic book can disable any or all of the functions
provided by the #dobe eGook :eader, which is usually done to protect the intellectual
property in the book.
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
1A
)mitry !klyarov, an employee of :ussian software programmer <lcom!oft, designed
the Q#dvanced eGook (rocessorR, which enables the user of an #dobe eGook :eader to
disable restrictions that the publisher of a particular electronic book might have
imposed. #mong other things it meant that a reader using the #dvanced eGook
(rocessor could make copyright content available for unlimited duplication and
distribution.
<lcom!oft sold the #dvanced eGook (rocessor over the %nternet. #bout 2, copies were
sold worldwide, including nine in the 8nited !tates. #dobe became aware that
<lcom!oft had developed the #dvanced eGook (rocessor and contacted <lcom!oft
asking that they cease and desist from manufacturing and selling the software program.
<lcom!oft refused and #dobe then alerted the 8nited !tates +overnment who charged
<lcom!oft with trafficking in, and offering to the public, a software program that could
circumvent technological protections on copyright material.
,.1.2. *rguments at trial
The two key issues at trial were <lcom!oft$s state of mind during the period it offered
the software, and the 6fair use$ provisions of the )JC#.
:ilf.l
#ccording to instructions given by the 9udge, the 9ury had to agree not only that
<lcom!oft broke the law, but that it did so willfully, as a conscious violation of the
)JC# antiEcircumvention provisions.
<lcom!oft$s attorney, Doseph Gurton, argued that <lcom!oft had no intention of doing
anything improper when it created a program to provide eGook customers with more
options for using the content they purchased. 6<lcom!oft believed at the time it was
creating a program that would allow legitimate users of eGooks more flexibility.
(rosecutor, #ssistant 8! #ttorney !cott *rewing on the other hand maintained that
<lcom!oft 6were selling a burglar tool for software to make a profit$. *rewing said
<lcom!oft representatives knew about the law and willfully violated it, emphasisng
<lcom!oft$s (resident and Janaging )irector$s admission in court about his awareness
of the )JC#.
3air .se
The public$s right to make fair use of copyright works is an entrenched part of copyright
law. %n the 8nited !tates the fair use provision is regarded as necessary to provide a
balance between copyright law and the *irst #mendment guarantee of free speech.
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
13
Gurton claimed that the )JC# brushes aside the fair use rights of consumers protected
by mainstream copyright law. Gurton asked the 9urors to compare the generous rights
afforded to a paper book purchaser to the rights afforded an eGook purchaser. The
purchaser of a paper book can lend, resell, or give the book away. 8nlike a paper book,
an eGook seeks to control what the user can do with that book. Gurton argued that
<lcom!oft$s #dvanced eGook (rocessor merely enabled persons, who had lawfully
purchased the right to view eGooks from retailers, to make back up copies and to
transfer text to other media for personal use under traditional 6fair use$ rights.
# further fact that strengthened the defence case was that under cross examination an
#dobe engineer acknowledged that his company did not find any illegal eGooks on the
%nternet even after hiring two companies to search the .eb for unauthorised copies.
,.1.3. The decision
/n 1A )ecember 2,,2, after several days of deliberation, the 9ury ac@uitted <lcom!oft
of all charges. %n a later interview, Dury *oreman )ennis !trader said" 68nder the eGook
formats, you have no rights at all, and the 9ury had trouble with that concept$. *urther,
!trader said the 9urors didn$t understand why a million dollar company would put on
their web page an illegal thing that would ruin their whole business if they were caught.
*inally, !trader said the 9ury itself found the )JC# confusing, making it easy for 9urors
to believe that executives from :ussia might not fully understand it.
(http"''home.sandiego.edu'Tlsolum'ip'<lcom.htm
Checked, the link and material is no longer available in that website ;%?B )/<!?$T
./:B
&. %rotection of Co!puter %rogra!s
Copyright protection extends to the source and ob9ect code of a computer program and
any expression of systems or methods, but not the functionality of the program (which
is covered by the patent system (Autodes: ' 3yason (1114 1A2 C;: 44,- 3ata Access
' "o1erflex =1111> LC# 51
(http"''www.austlii.edu.au'au'cases'cth'high0ct'1111'51.html. The source code is
protected as a literary work whose definition includes computer programs (s1,
Copyright Act. This means developers may create functionally compatible software
programs without infringing copyright provided no underlying expression is
misappropriated ()iv 5# Copyright Act. The protection of online databases however is
not so straightforward & see section 1.
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
11
&.1. Copyright A!end!ent -%arallel I!portation/ Act 2003
The purpose of the Copyright Amendment )"arallel Importation* Act 2,,4 (Cth
(http"''www.comlaw.gov.au'comlaw';egislation'#ct1.nsf','*G,C374727512)C5C#27
2*A2,,1,,GA7M/pen)ocument is to amend the Copyright Act to allow parallel
importing of computer software, computer games, and books, periodicals and sheet
music in both electronic and print form. (arallel importation is the importation of works
which have been legitimately purchased overseas (i.e purchased without infringing the
creatorKs copyright in the overseas country by someone other than the authorised
importer. %t is believed by many that the prohibition of parallel importation results in a
segregated market. %ts authorisation is aimed primarily at encouraging competition.
!ome industry groups argue that there is a link between parallel importation and the
importation of pirated or infringing material. This is because parallel importation
weakens the ability to identify the importation and distribution of pirate copies (see
4ills 3igest 144 (http"''www.aph.gov.au'library'pubs'bd'2,,1E,2',2bd144.htm.
4. %rotection of Online .ata*ases
.ith the evolution and commercialisation of the %nternet, companies and organisations
are providing and storing large volumes of database information online. Jany
companies invest large amounts of time and money into the collection of data and the
creation of databases, and the information accumulated represents significant
commercial value. %n recent years, the %nternet has experienced significant growth and
expansion, and organiCations discover that their online databases become readily
accessible not only to the average consumers, but also to their competitors.
(rotection is afforded to databases under the Copyright Act as a 6literary work$- s 1,
explicitly defines a literary work to include Qa table, or compilation, expressed in words,
figures or symbolsR, provided that the database is original within the meaning of section
42(1 and provided that the 6traditional$ common law threshold of originality is
satisfied.
?umerous #ustralian cases have concluded that databases can be considered as
compilations, and @ualify for protection as a literary work, bringing databases under the
protection of the #ct (see below.
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
2,
4.1. )atisfying 5Originality6
*or copyright to subsist in a compilation it must be shown that the database contains
original content or has sufficient labour, skill, 9udgement or ingenuity used in its
selection and arrangement. %t is unlikely that databases will satisfy this re@uirement of
originality as most databases are a compilation of material that is generally available.
?evertheless, what will be sufficient will depend on the particular facts of the case.
#ustralia$s position on the standard of originality was decided in T6 7lanagan %mash
6epairs ' Eones =2,,,> *C# 227
(http"''www.austlii.edu.au'au'cases'cth'federal0ct'2,,,'227.html, the Court considered
this issue and found that the applicantKs motor vehicle database attracted protection
under the 6sweat of the brow$ doctrine. Dustice Lely suggested that copyright subsisted
in the databases because of the selection or arrangement of material, and the sufficient
skill, 9udgement and labour that was involved. Telstra Corporation 0imited ' 3es:top
Bar:eting %ystems "ty 0td =2,,1> *C# 212
(http"''www.austlii.edu.au'au'cases'cth'federal0ct'2,,1'212.html affirmed this
approach.
%f a compilation argument is successful, then generally speaking it is the combination or
arrangement of material in the online database which is protected, rather than the
underlying information or data. Copyright exists in the database as an entire work and
not in each individual piece of information that comprises the database.
4.2. (i!itations associated with 5online6 data*ases
<ven if the whole of the database is considered to be sub9ect to copyright, the @uestion
still remains whether a substantial part of that database has been copied. !ubstantial
copying has been referenced to the @uality of the replication rather than @uantity.
8ltimately, this is a @uestion of fact and degree depending on individual cases. %t is
however doubtful that courts will consider the taking of a few pieces of insignificant
data from a database as sufficient to constitute a substantial reproduction of the
copyright work in that database.
The Copyright Act appears to provide that the author of a work must be a 6@ualified
person$ (as described in s 42(1. There are concerns that where a computer program
has contributed or created an online database, the apparent re@uirement of 6human$
authorship may not be satisfied.
The use of copyright to protect online databases is an argument in #ustralia which is of
uncertain strength. <ven if databases are given standing as compilation works, they
continue to encounter difficulties in other elements of copyright, such as originality.
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
21
10. he International ,egi!e
The first international document protecting copyright was the 1332 Gerne Convention
for the (rotection of ;iterary and #rtistic .orks
(http"''www.wipo.int'treaties'en'ip'berne'trtdocs0wo,,1.html, which contains 4 basic
principles"
?ational Treatment & which prevents discrimination against copyright holders of
other countries-
#utomatic protection & provides works are automatically protected- and
%ndependence of protection & the work will be protected within a signatory state
irrespective of the copyright status in the country of origin.
The Convention since 1332 has gone substantial changes, the latest in 11A1 in (aris, and
is administered by the .orld %ntellectual (roperty /rganisation (.%(/. The
Convention$s ma9or shortfall was that it lacked effective enforcement measures.
This deficiency lead to the #greement on Trade :elated #spects of %ntellectual (roperty
:ights (T:%(! (http"''www.wipo.int'treaties'en'ip'berne'trtdocs0wo,,1.html,
administered by the .orld Trade /rganisation (http"''www.wto.org. .hile T:%(! still
embodies many principles of the Gerne Convention, it contains a powerful enforcement
mechanism. !tates who do not adopt T:%(sEcompliant intellectual property systems can
be disciplined through the .T/Ks dispute settlement mechanism, which is capable of
authorising trade sanctions against dissident states. %n 1115 it was incorporated into the
+eneral #greement on Tariffs and Trade which makes it an important trade focused
source of copyright protection.
The other notable international treaty is the 8niversal Copyright Convention 1172
(http"''www.law.cornell.edu'treaties'berne'overview.html, which is administered by
8?<!C/. %t was offered as initially offered as an alternative to the Gerne Convention,
but today is shadowed by the Gerne Convention (see
http"''www.wikipedia.org'wiki'8niversal0Copyright0Convention.
.%(/$s Copyright Treaty (http"''www.wipo.int'clea'docs'en'wo'wo,44en.html and
(erformance and (henograms Treaty 1112
(http"''www.wipo.int'clea'docs'en'wo'wo,45en.html protect copyright in electronic
media and computer programs, as well as updating the Gerne Convention to reflect
T:%(!. The .%(/ Copyright Treaty ensures that computer programs are protected as
literary works (#rticle 5 and that the arrangement and selection of material in databases
is protected (#rticle 7. %t provides authors of works with control over their rental and
distribution (#rticles 2E3 which they may not have under the Gerne Convention alone.
%t also prohibits circumvention of technological measures for the protection of works
(#rticle 11 and unauthorised modification of rights management information contained
in works (#rticle 12.
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
22
The interoperation of these instruments results in protection for exported works being
assured by in signatory country, and protection for imported works is guaranteed by
domestic legislation which reflect the principles within these agreements (see Uee *en
;im Cy2erspace 0a1& Commentaries and Baterials p 5,5.
p.132
p. 111 )raft access to knowledge treaty 2,,7
(http"''www.cptech.org'a2k'a2k0treaty0may1.pdf
The treaty is intended to ease the transfer of knowledge to developing nations, and to
secure the viability of open innovation systems all over the world
10.1. European 3nion .irectives
Copyright of material published on websites is protected by the <8 )irective 12'1'<C
on the ;egal (rotection of )atabases (http"''eurE
lex.europa.eu';ex8ri!erv';ex8ri!erv.doMuriNC<;<V"42,,1;,,21"<?"LTJ; by
classifying a website as a database. %t provides protection to the creator of the databases
from extraction and reEultilisation of a whole or substantial part of the content of the
database based on either @ualitative or @uantitative measurements.
The <8 )irective 2,,1'21'<C on the Larmonisation of Certain #spects of Copyright
and :elated :ights in the %nformation !ociety (http"''eurE
lex.europa.eu';ex8ri!erv';ex8ri!erv.doMuriNC<;<V"42,,1;,,21"<?"LTJ; seeks
to further harmonise copyright law across the <8 and the provisions encourage member
states to ratify the .%(/ Copyright Treaty. The )irective"
harmonises the rights of reproduction and distribution-
sets out a new right of communication to the public by wire or wireless (that is,
by nonEtraditional, including electronic means-
specifies an exhaustive list of optional exceptions to the rights-
imposes obligations on member states to protect technological measures
employed by
rights owners to prevent unauthorised use and to protect rights management
information attached to works by rights owners to enable them to keep control of
their works- and
contains limited safeguards to enable legitimate users to use copyright works.
(http"''www.nationalarchives.gov.uk'legal'copyright.htm
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
24
11. Case )tudy2 7apster
%n 2,,1 ?apster agreed to comply with court orders forcing them to restrict access to
copyright materials available via their site. ?ine record companies and other rights
holders, including !ony Jusic and Capitol :ecords had sued ?apster for copyright
infringement in the case of A C B 6ecords Inc< et al ' 5apster Inc
(http"''www.copyright.gov'docs'napsteramicus.html.
?apster provided a central registration and indexing facility for endEuser sharing of
J(4 files. Gy sharing files through uploading and downloading, the 8! Court of
#ppeal found that ?apster$s subscribers were dealing with musical copyright works in
breach of the true copyright owner$s exclusive rights of reproduction and distribution
under 8! copyright law.
The Court further found that ?apster, although not itself engaging in direct copyright
infringement, nevertheless had both actual and constructive knowledge of direct
infringement by its subscribers and had therefore contributed to the breaches.
# casenote of this case can be obtained from
http"''www.digital.org.au'issue'napster.htm. *or further details of the copyright issues
raised by ?apster see http"''www.digital.org.au'issue'napster.htm.
p.2,2
BaCaa case
p.2,3 J+J !tudios, %nc. v. +rokster, ;td. 757 8.!. 114 (2,,7
(http"''www.law.cornell.edu'supct'html',5E53,.H!.html
Casenote (http"''www.copyright.gov'docs'mgm'index.html
p.2,1
#ustralian BaCaa case
(http"''www.austlii.edu.au'au'cases'cth'federal0ct'2,,7'1A2.html
Casenote (http"''www.copyright.org.au'news'newsbytopic'recentcases'822,54'
File: /var/www/apps/conversion/tmp/scratch_3/238656322.doc Revision: 2 Date: 13 September, 2011
25