Case Law Columbia Pictures Indus., Inc. v. Fung

Columbia Pictures Indus., Inc. v. Fung

Document Cited Authorities (33) Cited in (220) Related (3)

OPINION TEXT STARTS HERE

Ira P. Rothken, Esq. (argued), Robert L. Kovsky, Esq., and Jared R. Smith, Esq. of Rothken Law Firm, Novato, CA, for DefendantAppellants.

Paul M. Smith (argued), Steven B. Fabrizio, William M. Hohengarten, Duane C. Pozza, Garret A. Levin, Caroline D. Lopez, Jenner & Block LLP, Washington, D.C.; Karen R. Thorland, Motion Picture Association of America, Inc., Sherman Oaks, CA; Gianni P. Servodidio, Jenner & Block LLP, New York, NY, for PlaintiffsAppellees.

Andrew H. Schapiro, Mayer Brown LLP, New York, NY, for amicus curiae Google, Inc.

Appeal from the United States District Court for the Central District of California, Stephen V. Wilson, District Judge, Presiding. D.C. No. 2:06–cv–05578–SVW–JC.

Before: HARRY PREGERSON, RAYMOND C. FISHER, and MARSHA S. BERZON, Circuit Judges.

OPINION

BERZON, Circuit Judge:

This case is yet another concerning the application of established intellectual property concepts to new technologies. See, e.g., UMG Recordings, Inc. v. Shelter Capital Partners, LLC, ––– F.3d ––––, 2013 WL 1092793 (9th Cir.2013); Perfect 10, Inc. v. Visa Int'l Serv. Ass'n, 494 F.3d 788 (9th Cir.2007); Viacom Int'l, Inc. v. YouTube, Inc., 676 F.3d 19 (2d Cir.2012). Various film studios alleged that the services offered and websites maintained by Appellants Gary Fung and his company, isoHunt Web Technologies, Inc. (isohunt.com, torrentbox.com, podtropolis.com, and ed2k-it.com, collectively referred to in this opinion as “Fung” or the “Fung sites”) induced third parties to download infringingcopies of the studios' copyrighted works.1 The district court agreed, holding that the undisputed facts establish that Fung is liable for contributory copyright infringement. The district court also held as a matter of law that Fung is not entitled to protection from damages liability under any of the “safe harbor” provisions of the Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. § 512, Congress's foray into mediating the competing interests in protecting intellectual property interests and in encouraging creative development of devices for using the Internet to make information available. By separate order, the district court permanently enjoined Fung from engaging in a number of activities that ostensibly facilitate the infringement of Plaintiffs' works.

Fung contests the copyright violation determination as well as the determination of his ineligibility for safe harbor protection under the DMCA. He also argues that the injunction is punitive and unduly vague, violates his rights to free speech, and exceeds the district court's jurisdiction by requiring filtering of communications occurring outside of the United States. We affirm on the liability issues but reverse in part with regard to the injunctive relief granted.

TECHNOLOGICAL BACKGROUND

This case concerns a peer-to-peer file sharing protocol 2 known as BitTorrent. We begin by providing basic background information useful to understanding the role the Fung sites play in copyright infringement.

I. Client-server vs. peer-to-peer networks

The traditional method of sharing content over a network is the relatively straightforward client-server model. In a client-server network, one or more central computers (called “servers”) store the information; upon request from a user (or “client”), the server sends the requested information to the client. In other words, the server supplies information resources to clients, but the clients do not share any of their resources with the server. Client-server networks tend to be relatively secure, but they have a few drawbacks: if the server goes down, the entire network fails; and if many clients make requests at the same time, the server can become overwhelmed, increasing the time it takes the server to fulfill requests from clients. Client-server systems, moreover, tend to be more expensive to set up and operate than other systems. Websites work on a client-server model, with the server storing the website's content and delivering it to users upon demand.

“Peer-to-peer” (P2P) networking is a generic term used to refer to several different types of technology that have one thing in common: a decentralized infrastructure whereby each participant in the network (typically called a “peer,” but sometimes called a “node”) acts as both a supplier and consumer of information resources. Although less secure, P2P networks are generally more reliable than client-server networks and do not suffer from the same bottleneck problems. See generally Metro–Goldwyn–Mayer Studios, Inc. v. Grokster, Ltd. (“ Grokster III ”), 545 U.S. 913, 920 & n. 1, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005). These strengths make P2P networks ideally suited for sharing large files, a feature that has led to their adoption by, among others, those wanting access to pirated media, including music, movies, and television shows. Id. But there also are a great number of non-infringing uses for peer-to-peer networks; copyright infringement is in no sense intrinsic to the technology, any more than making unauthorized copies of television shows was to the video tape recorder. Compare A & M Records v. Napster, Inc., 239 F.3d 1004, 1021 (9th Cir.2001)with Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 456, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984).

II. Architecture of P2P networks

In a client-server network, clients can easily learn what files the server has available for download, because the files are all in one central place. In a P2P network, in contrast, there is no centralized file repository, so figuring out what information other peers have available is more challenging. The various P2P protocols permit indexing in different ways.

A. “Pure” P2P networks

In “pure” P2P networks, a user wanting to find out which peers have particular content available for download will send out a search query to several of his neighbor peers. As those neighbor peers receive the query, they send a response back to the requesting user reporting whether they have any content matching the search terms, and then pass the query on to some of their neighbors, who repeat the same two steps; this process is known as “flooding.” In large P2P networks, the query does not get to every peer on the network, because permitting that amount of signaling traffic would either overwhelm the resources of the peers or use up all of the network's bandwidth (or both). See Grokster III, 545 U.S. at 920 n. 1, 125 S.Ct. 2764. Therefore, the P2P protocol will usually specify that queries should no longer be passed on after a certain amount of time (the so-called “time to live”) or after they have already been passed on a certain number of times (the “hop count”). Once the querying user has the search results, he can go directly to a peer that has the content desired to download it.

This search method is an inefficient one for finding content (especially rare content that only a few peers have), and it causes a lot of signaling traffic on the network. The most popular pure P2P protocol was Gnutella. StreamCast, a Grokster defendant, used Gnutella to power its software application, Morpheus. See Grokster III, 545 U.S. at 921–22, 125 S.Ct. 2764.3

B. “Centralized” P2P networks

“Centralized” P2P networks, by contrast, use a centralized server to index the content available on all the peers: the user sends the query to the indexing server, which tells the user which peers have the content available for download. At the same time the user tells the indexing server what files he has available for others to download. Once the user makes contact with the indexing server, he knows which specific peers to contact for the content sought, which reduces search time and signaling traffic as compared to a “pure” P2P protocol.

Although a centralized P2P network has similarities with a client-server network, the key difference is that the indexing server does not store or transfer the content. It just tells users which other peers have the content they seek. In other words, searching is centralized, but file transfers are peer-to-peer. One consequent disadvantage of a centralized P2P network is that it has a single point of potential failure: the indexing server. If it fails, the entire system fails. Napster was a centralized P2P network, see generally Napster, 239 F.3d at 1011–13, as, in part, is eDonkey, the technology upon which one of the Fung sites, ed2k-it.com, is based.

C. Hybrid P2P networks

Finally, there are a number of hybrid protocols. The most common type of hybrid systems use what are called “supernodes.” In these systems, each peer is called a “node,” and each node is assigned to one “supernode.” A supernode is a regular node that has been “promoted,” usually because it has more bandwith available, to perform certain tasks. Each supernode indexes the content available on each of the nodes attached to it, called its “descendants.” When a node sends out a search query, it goes just to the supernode to which it is attached. The supernode responds to the query by telling the node which of its descendant nodes has the desired content. The supernode may also forward the query on to other supernodes, which may or may not forward the query on further, depending on the protocol. See generally Grokster III, 545 U.S. at 921, 125 S.Ct. 2764.

The use of supernodes is meant to broaden the search pool as much as possible while limiting redundancy in the search. As with centralized P2P systems, supernodes only handle search...

5 cases
Document | U.S. District Court — Northern District of California – 2020
Kihn v. Bill Graham Archives, LLC
"...1164, 127 L.Ed.2d 500 (1994) (defendant bore the burden on fair use defense to copyright infringement); Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 1039 (9th Cir. 2013) (Digital Millennium Copyright Act safe harbor is an affirmative defense on which defendant has the burden of es..."
Document | U.S. District Court — Northern District of Georgia – 2020
Atl. Recording Corp. v. Spinrilla, LLC
"...The former violates the copyright holder's right to distribution, the latter the right to reproduction." Columbia Pictures Indus. v. Fung , 710 F.3d 1020, 1034 (9th Cir. 2013). Unauthorized online streaming of copyright protected content, Plaintiffs argue, infringes the copyright owner's ex..."
Document | U.S. District Court — Eastern District of Virginia – 2015
BMG Rights Mgmt. (US) LLC v. Cox Commc'ns, Inc.
"...a ‘peer,’ but sometimes called a ‘node’) acts as both a supplier and consumer of information resources.” Columbia Pictures Indus., Inc. v. Fung , 710 F.3d 1020, 1024 (9th Cir.2013). While P2P protocols have many benefits and non-infringing uses, see Grokster , 545 U.S. at 920, 125 S.Ct. 276..."
Document | U.S. District Court — Western District of Texas – 2019
Umg Recordings, Inc. v. Grande Commc'ns Networks, LLC
"...copyrighted material. See, e.g., Maverick Recording Co. v. Harper, 598 F.3d 193, 197 (5th Cir. 2010) ; Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 1034 (9th Cir. 2013). But Plaintiffs' claims are based on notices and evidence that Grande subscribers made copyrighted material avai..."
Document | U.S. District Court — Southern District of New York – 2016
Enigma Software Grp. USA, LLC v. Bleeping Computer LLC
"...to act on behalf of the [website]") (internal quotation marks and citation omitted), aff'd in part and modified on other grounds , 710 F.3d 1020 (9th Cir.2013).Because the SAC adequately pleads that Quietman7 acted as Bleeping's agent, he does not qualify as a third-party ICP under the CDA ..."

Try vLex and Vincent AI for free

Start a free trial
5 books and journal articles
Document | Núm. 63-3, 2014
How Law Made Silicon Valley
"...defendants safe harbor protection because they were aware of their users' ongoing infringing activities), aff'd in part as modified, 710 F.3d 1020 (9th Cir. 2013); Capitol Records, Inc. v. MP3tunes, LLC, No. 07 Civ. 9931(WHP), 2009 WL 3364036 (S.D.N.Y. Oct. 16, 2009) (denying an online musi..."
Document | Núm. 10-1, September 2017 – 2017
One Crack and an 'Evisceration': The Current State of the DMCA's Safe Harbor
"...v. Cybernet Ventures, Inc., 213 F. Supp. 2d 1146 (C.D. Cal. 2002). 5. 545 U.S. 913 (2005). 6. See Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 1046 (9th Cir. 2013). 7. See Gardner v. CafePress Inc., 113 U.S.P.Q.2d (BNA) 1154, 1159–60 (S.D. Cal. 2014). 8. 940 F. Supp. 2d 110, 121 (..."
Document | Núm. 105-3, March 2020 – 2020
Convergence and Conflation in Online Copyright
"...for the kind of conduct § 512(a) addresses. See, e.g. , S. REP. NO. 105-190, at 41 (1998); see also Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 1041 (9th Cir. 2013); Viacom Int’l, Inc. v. YouTube, Inc., 676 F.3d 19, 39 (2d Cir. 2012); In re Charter Commc’ns, Inc., 393 F.3d 771, 7..."
Document | Vol. 63 Núm. 3, February 2022 – 2022
WITHHOLDING INJUNCTIONS IN COPYRIGHT CASES: IMPACTS OF EBAY.
"...and Winter have seemingly overridden that presumption in all injunction cases. (445.) See, e.g., Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020 (9th Cir. 2013) (facilitating BitTorrent infringements); Malibu Media, LLC v. Flanagan, No. 2:13-CV-5890, 2014 U.S. Dist. LEXIS 89224 (E.D. ..."
Document | Núm. 58-3, July 2021 – 2021
INTELLECTUAL PROPERTY CRIMES
"...Infringement Without Restricting Innovation, 56 STAN. L. REV. 1345, 1370 (2004); see also Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 2021] INTELLECTUAL PROPERTY CRIMES 1189 V. PATENT A patent is a government-issued document granting its holder the exclusive right to make, use, m..."

Try vLex and Vincent AI for free

Start a free trial
3 firm's commentaries
Document | JD Supra United States – 2014
An Update On The Legal Implications Of User-Generated Content: Facebook, Youtube, Twitter, And Instagram
"...direct financial benefit where defendant only received a one- time set up fee and recurring flat rate). 38 Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 1044 (9th Cir. 2013) (quoting Perfect 10 II, 488 F.3d at 1117). C. Right and Ability to Control. This term was intended to codify..."
Document | Mondaq United States – 2014
Content Owners’ Pursuit Of Secondary Infringement Claims
"...liability was important to the plaintiffs' success. Elements for Inducing Infringement In Columbia Pictures Industries Inc. v. Fung, 710 F.3d 1020 (9th Cir. 2013), cert. dismissed by U.S Sup. Ct. 2013, the U.S. Court of Appeals for the Ninth Circuit reviewed the lower court's grant of summa..."
Document | JD Supra United States – 2015
Twitter, the DMCA and Copyright in the Age of Sharing
"...providers should make sure their policies comply with the safe harbor provisions of the DMCA. Kimberly Buffington Carolyn Toto Columbia Pictures, 710 F.3d at 1033.) As noted above, users satisfy the “infringement” element by uploading the infringing photographs. (Id.) The only causation ele..."

Try vLex and Vincent AI for free

Start a free trial

Experience vLex's unparalleled legal AI

Access millions of documents and let Vincent AI power your research, drafting, and document analysis — all in one platform.

Start a free trial

Start Your 3-day Free Trial of vLex and Vincent AI, Your Precision-Engineered Legal Assistant

  • Access comprehensive legal content with no limitations across vLex's unparalleled global legal database

  • Build stronger arguments with verified citations and CERT citator that tracks case history and precedential strength

  • Transform your legal research from hours to minutes with Vincent AI's intelligent search and analysis capabilities

  • Elevate your practice by focusing your expertise where it matters most while Vincent handles the heavy lifting

vLex
5 books and journal articles
Document | Núm. 63-3, 2014
How Law Made Silicon Valley
"...defendants safe harbor protection because they were aware of their users' ongoing infringing activities), aff'd in part as modified, 710 F.3d 1020 (9th Cir. 2013); Capitol Records, Inc. v. MP3tunes, LLC, No. 07 Civ. 9931(WHP), 2009 WL 3364036 (S.D.N.Y. Oct. 16, 2009) (denying an online musi..."
Document | Núm. 10-1, September 2017 – 2017
One Crack and an 'Evisceration': The Current State of the DMCA's Safe Harbor
"...v. Cybernet Ventures, Inc., 213 F. Supp. 2d 1146 (C.D. Cal. 2002). 5. 545 U.S. 913 (2005). 6. See Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 1046 (9th Cir. 2013). 7. See Gardner v. CafePress Inc., 113 U.S.P.Q.2d (BNA) 1154, 1159–60 (S.D. Cal. 2014). 8. 940 F. Supp. 2d 110, 121 (..."
Document | Núm. 105-3, March 2020 – 2020
Convergence and Conflation in Online Copyright
"...for the kind of conduct § 512(a) addresses. See, e.g. , S. REP. NO. 105-190, at 41 (1998); see also Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 1041 (9th Cir. 2013); Viacom Int’l, Inc. v. YouTube, Inc., 676 F.3d 19, 39 (2d Cir. 2012); In re Charter Commc’ns, Inc., 393 F.3d 771, 7..."
Document | Vol. 63 Núm. 3, February 2022 – 2022
WITHHOLDING INJUNCTIONS IN COPYRIGHT CASES: IMPACTS OF EBAY.
"...and Winter have seemingly overridden that presumption in all injunction cases. (445.) See, e.g., Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020 (9th Cir. 2013) (facilitating BitTorrent infringements); Malibu Media, LLC v. Flanagan, No. 2:13-CV-5890, 2014 U.S. Dist. LEXIS 89224 (E.D. ..."
Document | Núm. 58-3, July 2021 – 2021
INTELLECTUAL PROPERTY CRIMES
"...Infringement Without Restricting Innovation, 56 STAN. L. REV. 1345, 1370 (2004); see also Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 2021] INTELLECTUAL PROPERTY CRIMES 1189 V. PATENT A patent is a government-issued document granting its holder the exclusive right to make, use, m..."

Try vLex and Vincent AI for free

Start a free trial

Start Your 3-day Free Trial of vLex and Vincent AI, Your Precision-Engineered Legal Assistant

  • Access comprehensive legal content with no limitations across vLex's unparalleled global legal database

  • Build stronger arguments with verified citations and CERT citator that tracks case history and precedential strength

  • Transform your legal research from hours to minutes with Vincent AI's intelligent search and analysis capabilities

  • Elevate your practice by focusing your expertise where it matters most while Vincent handles the heavy lifting

vLex
5 cases
Document | U.S. District Court — Northern District of California – 2020
Kihn v. Bill Graham Archives, LLC
"...1164, 127 L.Ed.2d 500 (1994) (defendant bore the burden on fair use defense to copyright infringement); Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 1039 (9th Cir. 2013) (Digital Millennium Copyright Act safe harbor is an affirmative defense on which defendant has the burden of es..."
Document | U.S. District Court — Northern District of Georgia – 2020
Atl. Recording Corp. v. Spinrilla, LLC
"...The former violates the copyright holder's right to distribution, the latter the right to reproduction." Columbia Pictures Indus. v. Fung , 710 F.3d 1020, 1034 (9th Cir. 2013). Unauthorized online streaming of copyright protected content, Plaintiffs argue, infringes the copyright owner's ex..."
Document | U.S. District Court — Eastern District of Virginia – 2015
BMG Rights Mgmt. (US) LLC v. Cox Commc'ns, Inc.
"...a ‘peer,’ but sometimes called a ‘node’) acts as both a supplier and consumer of information resources.” Columbia Pictures Indus., Inc. v. Fung , 710 F.3d 1020, 1024 (9th Cir.2013). While P2P protocols have many benefits and non-infringing uses, see Grokster , 545 U.S. at 920, 125 S.Ct. 276..."
Document | U.S. District Court — Western District of Texas – 2019
Umg Recordings, Inc. v. Grande Commc'ns Networks, LLC
"...copyrighted material. See, e.g., Maverick Recording Co. v. Harper, 598 F.3d 193, 197 (5th Cir. 2010) ; Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 1034 (9th Cir. 2013). But Plaintiffs' claims are based on notices and evidence that Grande subscribers made copyrighted material avai..."
Document | U.S. District Court — Southern District of New York – 2016
Enigma Software Grp. USA, LLC v. Bleeping Computer LLC
"...to act on behalf of the [website]") (internal quotation marks and citation omitted), aff'd in part and modified on other grounds , 710 F.3d 1020 (9th Cir.2013).Because the SAC adequately pleads that Quietman7 acted as Bleeping's agent, he does not qualify as a third-party ICP under the CDA ..."

Try vLex and Vincent AI for free

Start a free trial

Start Your 3-day Free Trial of vLex and Vincent AI, Your Precision-Engineered Legal Assistant

  • Access comprehensive legal content with no limitations across vLex's unparalleled global legal database

  • Build stronger arguments with verified citations and CERT citator that tracks case history and precedential strength

  • Transform your legal research from hours to minutes with Vincent AI's intelligent search and analysis capabilities

  • Elevate your practice by focusing your expertise where it matters most while Vincent handles the heavy lifting

vLex

Start Your 3-day Free Trial of vLex and Vincent AI, Your Precision-Engineered Legal Assistant

  • Access comprehensive legal content with no limitations across vLex's unparalleled global legal database

  • Build stronger arguments with verified citations and CERT citator that tracks case history and precedential strength

  • Transform your legal research from hours to minutes with Vincent AI's intelligent search and analysis capabilities

  • Elevate your practice by focusing your expertise where it matters most while Vincent handles the heavy lifting

vLex
3 firm's commentaries
Document | JD Supra United States – 2014
An Update On The Legal Implications Of User-Generated Content: Facebook, Youtube, Twitter, And Instagram
"...direct financial benefit where defendant only received a one- time set up fee and recurring flat rate). 38 Columbia Pictures Indus., Inc. v. Fung, 710 F.3d 1020, 1044 (9th Cir. 2013) (quoting Perfect 10 II, 488 F.3d at 1117). C. Right and Ability to Control. This term was intended to codify..."
Document | Mondaq United States – 2014
Content Owners’ Pursuit Of Secondary Infringement Claims
"...liability was important to the plaintiffs' success. Elements for Inducing Infringement In Columbia Pictures Industries Inc. v. Fung, 710 F.3d 1020 (9th Cir. 2013), cert. dismissed by U.S Sup. Ct. 2013, the U.S. Court of Appeals for the Ninth Circuit reviewed the lower court's grant of summa..."
Document | JD Supra United States – 2015
Twitter, the DMCA and Copyright in the Age of Sharing
"...providers should make sure their policies comply with the safe harbor provisions of the DMCA. Kimberly Buffington Carolyn Toto Columbia Pictures, 710 F.3d at 1033.) As noted above, users satisfy the “infringement” element by uploading the infringing photographs. (Id.) The only causation ele..."

Try vLex and Vincent AI for free

Start a free trial