Intellectual property crimes.
Owners of intellectual property are able to protect their rights by pursuing civil remedies. Yet the possibility of civil sanctions alone is insufficient to deter violators who steal trade secrets or infringe on others' trademarks, copyrights, or patents.(1) Indeed, some intellectual property thieves view civil damage actions as just another cost of doing business. It has been estimated that the theft of intellectual property rights in the United States United States, officially United States of America, republic (2005 est. pop. 295,734,000), 3,539,227 sq mi (9,166,598 sq km), North America. The United States is the world's third largest country in population and the fourth largest country in area. cost over $300 billion dollars in 1997 alone, with high technology corporations most frequently targeted.(2)
The lack of deterrence associated with civil mechanisms led the federal government and most states to enact statutes designed to prevent the theft of intellectual property rights. These are often general statutes which can be interpreted to offer protection to the intellectual property at issue. Other statutes are specifically tailored to the type of intellectual property for which protection is sought. These latter provisions are used with increasing frequency to deter and punish perpetrators.
This article examines several areas of intellectual property law under which criminal prosecutions are brought. Section II covers the theft of trade secrets, while Section III discusses trademark counterfeiting. Next, Section IV addresses copyright infringement Noun 1. copyright infringement - a violation of the rights secured by a copyright
infringement of copyright
plagiarisation, plagiarization, piracy, plagiarism - the act of plagiarizing; taking someone's words or ideas as if they were your own . Section V examines the new problems raised by online servers, while Section VI looks at patents and Section VII at art crimes. Finally, Section VIII discusses sentencing for intellectual property crimes.
II. THEFT OF TRADE SECRETS
Prior to the enactment of the Economic Espionage Act, addressed in Part A, no federal criminal statute dealt directly with the theft of intangible trade secrets. Parts B through E of this Section will cover alternative statutes federal prosecutors have used in the past, with limited success, to penalize pe·nal·ize
tr.v. pe·nal·ized, pe·nal·iz·ing, pe·nal·iz·es
1. To subject to a penalty, especially for infringement of a law or official regulation. See Synonyms at punish.
2. the misappropriation misappropriation n. the intentional, illegal use of the property or funds of another person for one's own use or other unauthorized purpose, particularly by a public official, a trustee of a trust, an executor or administrator of a dead person's estate, or by any of trade secrets. These include the National Stolen Property Act, the Trade Secrets Act, the Mail and Wire Fraud statutes, and the Racketeer Influenced and Corrupt Organizations Act. Finally, Part F describes state provisions used to combat trade secret theft.
A. Economic Espionage Act of 1996
In October 1996, discouraged by the failure of civil remedies to prevent trade secret theft, the inability of prosecutors to effectively use other criminal statutes, and the frequent efforts by foreign governments to obtain trade secrets from American companies, Congress made the theft of trade secrets a federal crime with the enactment of the Economic Espionage Act ("EEA EEA European Economic Area
EEA European Environment Agency
EEA Employment Equity Act (Canada)
EEA Een En Ander (Dutch)
EEA Erick van Egeraat Associated Architects
EEA Energy and Environmental Analysis ").(3) The EEA established two criminal offenses under which governments can prosecute trade secret theft. The first offense, "economic espionage," arises only when the theft benefits a foreign government.(4) This carries higher penalties than the second offense, "theft of trade secrets," which is broader and generally concerns all trade secret theft.(5)
1. Definition of Trade Secret
The EEA defines trade secrets to include "all forms and types of financial, business, scientific, technical, economic, or engineering information ... whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing.... "(6)Although substantially similar to the trade secret definition in the civil Uniform Trade Secrets Act ("UTSA"),(7) the definition in the EEA is broader in an effort to modernize the law and "keep pace with growing technology, especially in the computer and information storage sectors."(8)
In order to protect property that is considered a trade secret, the owner of the property must take reasonable measures to keep it secret.(9) Additionally, the economic value of the information must be derived from the general public's lack of knowledge about it or the public's inability to readily access it through proper means.(10) This provision imposes a higher standard of self-protection on the owner of a trade secret than on owners of other types of property.(11)
Another important provision of the EEA is its broad definition of property: "tangible or intangible, and whether or how stored."(12) This implies that information stolen in electronic form or merely memorized falls under the definition of trade secret theft.(13) As discussed in later sections, this is the first time that federal legislation has specifically protected intangible property intangible property n. items such as stock in a company which represent value but are not actual, tangible objects. without additional requirements, such as a use of the mail or a wire transmission.
The EEA's legislative history indicates that the provision covering memorized information was not intended to include the general knowledge and skill learned on a job when an employee leaves a company and moves to another in the same or a similar field.(14)
3. Intent and Method of Misappropriation
Under the first offense, economic espionage, the perpetrator A term commonly used by law enforcement officers to designate a person who actually commits a crime. must intend or know that the "offense will benefit any foreign government, foreign instrumentality Instrumentality
Notes issued by a federal agency whose obligations are guaranteed by the full-faith-and-credit of the government, even though the agency's responsibilities are not necessarily those of the US government. , or foreign agent."(15)
When trade secret theft does not benefit a foreign government, provisions of the second offense apply. Under the EEA, "theft of trade secrets" requires specific intent and methods of misappropriation. Section 1832 states broadly that any unauthorized possession of a trade secret with intent to injure another violates the act.(16)
The EEA intent requirements include "knowingly" intending "to convert a trade secret," while "knowing that the offense will, injure any owner of that trade secret."(17) Consequently, the scope of the EEA is somewhat more limited than its civil counterpart, the UTSA, which does not require that the "defendant be aware of the trade secret."(18)
On the other hand, the EEA's definition of "theft" of a trade secret is broader than the UTSA's, which provides simply that theft is misappropriation by improper means.(19) The EEA definition considers the mere receipt of a trade secret a violation.(20)
4. Applicability to Conduct Abroad
Another expansive provision of the EEA is [sections] 1837, which allows the government to prosecute conduct that occurs overseas if the party involved in the activity is bound by United States federal law or if an "act in furtherance fur·ther·ance
The act of furthering, advancing, or helping forward: "Pakistan does not aspire to any . . . role in furtherance of the strategies of other powers" Ismail Patel. of the offense was committed in the United States."(21) The first provision in [sections] 1837 extends the reach of the federal government to penalize the actions of United States citizens and corporations abroad, presumably pre·sum·a·ble
That can be presumed or taken for granted; reasonable as a supposition: presumable causes of the disaster. even when there is no other nexus with the United States.(22) The second provision enables the federal government to pursue trade secret theft outside of the country as long as some part of the activity, such as a phone call, was connected to the United States.(23)
At the same time, [sections] 1833 narrows the scope of the act by providing two exceptions relating to relating to relate prep → concernant
relating to relate prep → bezüglich +gen, mit Bezug auf +acc law enforcement and other governmental activities.(24) The first exception allows the government to continue an otherwise lawful "investigative, protective, or intelligence activity."(25) The second exception permits the reporting of suspected criminal activity to law enforcement.(26)
5. Prosecutions Under the EEA
Because the EEA is a new law, the government has only begun to prosecute violators. Some commentators have attributed the slow enforcement to the tension between criminal law and the generally civil nature and history of intellectual property protection.(27) Commentators also speculate that the government will wait for cases where "the blatancy of the theft and the potential ease of conviction" are obvious.(28)
The government has brought at least 13 criminal actions under the EEA. All are fairly straightforward, stemming from FBI stings, and were filed under [sections] 1832.(29) In June 1997, the FBI in Philadelphia charged two Taiwanese nationals with attempting to steal trade secrets involving Taxol, a cancer-fighting drug produced by Bristol-Myers Squibb Bristol-Myers Squibb (NYSE: BMY), colloquially referred to as BMS, is a pharmaceutical corporation, formed by a 1989 merger between pharmaceutical companies Bristol-Myers Company, founded in 1887 by William McLaren Bristol and John Ripley Myers in Clinton, NY (both were Company.(30) According to according to
1. As stated or indicated by; on the authority of: according to historians.
2. In keeping with: according to instructions.
3. the FBI, these arrests are believed to be the first two brought under the EEA involving an international corporation.(31) This case has led to the only judicial decision under the EEA.(32) In United States v. Hsu, the Third Circuit held in an interlocutory appeal An interlocutory appeal, in the law of civil procedure is an appeal of a ruling by a trial court that is made before the trial itself has concluded. Most jurisdictions generally prohibit such appeals, requiring parties to wait until the trial has concluded before they challenge any that impossibility was not a defense to attempted trade secret theft under [sections] 1832(a)(4) because the defendant's culpability culpability (See: culpable) in an attempt charge "depends only on 'the circumstances as he believes them to be,' not as they really are."(33)
Other reported cases filed under the EEA involve the theft of PPG PPG Points Per Game (basketball player statistic)
PPG Power Play Goals (hockey)
PPG Planning Policy Guidance (UK)
PPG Programmable Pulse Generator
PPG Power Puff Girls Industries' glass-making process,(34) a breast cancer treatment This article or section recently underwent a major revision or rewrite and needs further review. You can help!
The mainstay of breast cancer treatment is surgery when the tumor is localized, with possible adjuvant hormonal therapy (with tamoxifen or an aromatase called Taximofen,(35) attempted theft of future razor systems from the Gillette Company,(36) theft of a proprietary software program developed by Deloitte-Touche,(37) and the attempted sale of marketing plans and subscription lists to a rival newspaper.(38) Lastly, in September 1997, the FBI in Cleveland arrested a Taiwanese businessman and his daughter in connection with the theft of trade secrets from the Avery Dennison Avery Dennison Corporation (NYSE: AVY) produces pressure-sensitive materials (such as self-adhesive labels), office products, and various paper products. R. Stanton Avery founded Avery in 1935. Avery Dennison Corporation was created in 1990 by merger of Avery and Dennison. Corporation relating to formulations for self-adhesive products, initially valued at $50-60 million.(39)
B. National Stolen Property Act
The National Stolen Property Act ("NSPA NSPA National Scholastic Press Association
NSPA National Strength Professionals Association (Mount Airy, MD)
NSPA National Society of Public Accountants
NSPA Nebraska School Psychologists Association
NSPA National Standard Parts Association ")(40) provides criminal sanctions for any person who "transports, transmits, or transfers in interstate or foreign commerce any goods, wares, merchandise, securities or money, of the value of $5,000 or more, knowing the same to have been stolen, converted or taken by fraud...."(41) Although the NSPA was not designed or intended to apply to trade secret theft,(42) the federal courts have held that under certain circumstances the NSPA is applicable to the theft of tangible property tangible property n. physical articles (things) as distinguished from "incorporeal" assets such as rights, patents, copyrights, and franchises. Commonly tangible property is called "personalty. containing trade secrets.(43)
1. Transported in Interstate or Foreign Commerce
To fall within the scope of the NSPA, allegedly stolen trade secrets must be transported or transferred in interstate or foreign commerce.(44) This requirement exists because Congress enacted the statute under the authority of the commerce clause. The purpose of the statute was to combat theft across state and foreign boundaries, previously unactionable by individual state and foreign governments.(45) The prosecution must also prove that the stolen item was physically transported; it is not enough for the prosecution to establish the presence of a stolen trade secret in a state or country other than its original location.(46)
2. Goods, Wares or Merchandise
In United States v. Seagraves,(47) the Third Circuit defined "goods, wares or merchandise" broadly as "such personal property or chattels CHATTELS, property. A term which includes all hinds of property, except the freehold or things which are parcel of it. It is a more extensive term than goods or effects. Debtors taken in execution, captives, apprentices, are accounted chattels. Godol. Orph. Leg. part 3, chap. 6, Sec. 1. as are ordinarily a subject of commerce."(48) Accordingly, the Seagraves court held that stolen maps were the subjects of commerce, albeit of a specialized nature, and were therefore "goods, wares or merchandise" within the terms of the NSPA.(49) Courts have also held that trade secrets must be stolen while in a tangible form or in conjunction with tangible goods.(50) A violation cannot be established if, for example, a thief merely memorizes a secret formula and then writes it down after crossing a state or foreign boundary.(51)
3. Minimum Value 0f $5,000
The intent of the NSPA is to address only the theft of items having substantial market value.(52) Courts have taken a variety of approaches in determining the "value" of trade secrets. Some courts have looked for an actual market for the products embodying the stolen trade secrets to determine their value.(53) Absent a market, courts have looked for "any reasonable method" of valuation.(54) The amount of time and money defendants invested in the misappropriation scheme is one alternative to market value.(55) Another alternative is using the black market price.(56)
4. Stolen, Convened, or Taken by Fraud
Finally, the NSPA requires a physical theft: the "goods, wares, [or] merchandise" must be physically "stolen, converted or taken by fraud."(57)
5. Knowledge that Items Were Stolen
Possession of stolen trade secrets by a defendant is not sufficient to place a potential transgressor of [sections] 2314 within the boundaries of the NSPA. The government must introduce evidence establishing that the defendant knew the items were stolen.(58) The defendant's knowledge of the illegal origin of the trade secret may be inferred from the defendant's behavior.(59)
6. Shortcomings of the NSPA
With the rapid growth of computerized digital technologies, prosecutors often have difficulties obtaining convictions under the NSPA. The intangible nature of many trade secrets has prevented the government from using the NSPA to prosecute trade secret theft because the statute is limited to "goods, wares, merchandise, securities or money" which are tangible property.(60)
In United States v. Brown,(61) the Tenth Circuit considered a prosecution under the NSPA arising out of the alleged theft of a computer program and its source code.(62) Although the stolen program was recovered at the defendant's residence, the prosecution could not prove that the software had been physically removed from plaintiff's place of business.(63) The intangible properties of computer programs led the court to state "for section 2314 to apply there must be some tangible item taken, however insignificant or valueless it may be, absent the intangible component."(64) Accordingly, the Tenth Circuit held that the "essential ingredient of the statute [[sections] 2314]--the involvement of physical `goods, wares, [or] merchandise' that were themselves `stolen, converted or taken by fraud'--was missing...."(65)
C. Trade Secrets Act
Prior to the EEA, the only federal statute that specifically addressed the theft of trade secrets was the Trade Secrets Act, which prohibits the unauthorized disclosure of confidential information Noun 1. confidential information - an indication of potential opportunity; "he got a tip on the stock market"; "a good lead for a job"
steer, tip, wind, hint, lead by government employees.(66) Because this legislation does not apply to private sector employees, federal prosecutors more often mined to the NSPA and Mail and Wire Fraud statutes for criminal misappropriation of trade secrets.(67)
D. Mail and Wire Fraud Statutes
The mail and wire fraud statutes(68) provide criminal sanctions for using or attempting to use the mails(69)(including private delivery services) and wire services to perpetrate per·pe·trate
tr.v. per·pe·trat·ed, per·pe·trat·ing, per·pe·trates
To be responsible for; commit: perpetrate a crime; perpetrate a practical joke. fraud.(70) Unlike the NSPA, these statutes may be applied to the theft of intangible rights,(71) such as trade secrets.(72)
Violation of these statutes requires neither proof that the scheme's victims were in fact defrauded,(73) nor proof that the defendant gained anything through the scheme.(74) Rather, violations turn on actual intent to harm the victim.(75)
In some cases, appellate courts have upheld convictions under the mail and wire fraud statutes even when there has been no violation of the NSPA.(76) This resulted from the statutes' broader definition of property as compared to the NSPA's definition of "goods, wares and merchandise."(77) However, under the mail and wire fraud statutes, use of the mail or wire is necessary for there to be misappropriation.(78)
E. Racketeer Influenced and Corrupt Organizations Act
Criminal sanctions for theft of trade secrets are also available under the Racketeer Influenced and Corrupt Organizations Act ("RICO RICO n. . ").(79) Although many cases brought under RICO are civil actions,(80) the predicate In programming, a statement that evaluates an expression and provides a true or false answer based on the condition of the data. acts necessary to sustain a RICO claim are violations of criminal law. Consequently, the elements of civil and criminal RICO actions are similar. The definition of racketeering activity applicable to the theft of trade secrets includes mail fraud,(81) wire fraud,(82) activity prohibited by the NSPA,(83) and the receipt of stolen property.(84)
Courts faced with trade secret theft charges have reached different conclusions on the definition of a "pattern of racketeering activity" within the meaning of the RICO statute.(85) One district court held that the definition is met by a single scheme of trade secrets misappropriation if there are sufficient allegations of concerted activity directed toward a goal of injuring the plaintiff.(86) In that case, the plaintiff alleged that the defendant's scheme to misappropriate mis·ap·pro·pri·ate
tr.v. mis·ap·pro·pri·at·ed, mis·ap·pro·pri·at·ing, mis·ap·pro·pri·ates
a. To appropriate wrongly: misappropriating the theories of social science. the plaintiff's trade secrets included multiple mailings and telephone conversations, in violation of the mail fraud and wire fraud statutes.(87) The court held this scheme established a pattern of racketeering activity.(88)
In contrast, another district court held an isolated criminal episode, though accomplished through several fraudulent acts, does not evidence "threat of continuing criminal activity" so as to give rise to pattern of racketeering activity within meaning of RICO.(89)
F. State Law Provisions
In addition to the various federal statutes criminalizing the misappropriation of trade secrets, all states have enacted criminal statutes applicable to the theft, use, or disclosure of another's trade secrets.(90) These state statutes vary greatly in their scope and sanctions. Some specifically address trade secrets,(91) while others have been interpreted to cover trade secrets despite no explicit reference See explicit link. to them.(92) However, the scope of protection afforded by some state statutes is, like the scope of the NSPA, limited because they apply only to the theft of tangible items.(93)
III. TRADEMARK COUNTERFEITING
Over the past several decades, the theft of trademarks, the symbols or names associated with brand names and products, has become an increasingly lucrative activity for criminals. It has also had an equally significant yet opposite effect on the economy, as companies lose an estimated $20 billion a year to criminal commercial trademark counterfeiting.(94)
This Section will cover the various statutes that the government uses to protect companies' investments in developing brand names and trademarks. Part A addresses the Trademark Counterfeiting Act of 1984, including its similarities to and differences from its civil counterpart, the Lanham Act The Lanham Act of 1946, also known as the Trademark Act (15 U.S.C.A. § 1051 et seq., ch. 540, 60 Stat. 427 [1988 & Supp. V 1993]), is a federal statute that regulates the use of Trademarks in commercial activity. . It also reviews defenses to charges of trademark counterfeiting and discusses the FBI's recent campaign against trademark counterfeiting. Part B covers the trademark counterfeiting provisions of the Racketeer Influenced and Corrupt Organizations Act and of the Money Laundering The process of taking the proceeds of criminal activity and making them appear legal.
Laundering allows criminals to transform illegally obtained gain into seemingly legitimate funds. Act.
A. Trademark Counterfeiting Act
The Trademark Counterfeiting Act ("TCA TCA
1. trichloroacetic acid.
2. tricarboxylic acid cycle (Krebs cycle).
TCA Tricyclic antidepressant, see there ") criminalizes the intentional trafficking in counterfeit goods or services.(95) To prove a violation of 18 U.S.C. [sections] 2320, the government must establish that: (1) the defendant trafficked or attempted to traffic in goods or services; (2) such trafficking, or the attempt to traffic, was intentional; (3) the defendant used a counterfeit mark on or in connection with such goods or services; and (4) the defendant knew that the mark so used was counterfeit.(96) Counterfeit goods include those that have a mark identical to or substantially indistinguishable from a registered trademark.(97) The government need not prove that the defendant had a criminal intent.(98) The government may also prosecute conspiracies to violate the statute.(99)
The TCA incorporates the defenses of its civil counterpart, the Lanham Act,(100) These defenses include laches A defense to an equitable action, that bars recovery by the plaintiff because of the plaintiff's undue delay in seeking relief.
Laches is a defense to a proceeding in which a plaintiff seeks equitable relief. , unclean hands, fraud in obtaining trademark registration, use of mark in violation of antitrust laws, and invalid trademark.(101)
Under the TCA, an individual who intentionally traffics in goods or services and knowingly uses a counterfeit mark shall be fined no more than $2,000,000 or imprisoned im·pris·on
tr.v. im·pris·oned, im·pris·on·ing, im·pris·ons
To put in or as if in prison; confine.
[Middle English emprisonen, from Old French emprisoner : en- not more than ten years, or both.(102) For organizations, the fine shall not be more than $5,000,000.(103)
3. Operation Counter Copy
In May 1997, the U.S. Department of Justice ("DOJ (Department Of Justice) The legal arm of the U.S. government that represents the public interest of the United States. It is headed by the Attorney General. ") announced `the results of a nationwide crack-down on criminal trademark and copyright fraud--"Operation Counter Copy"--which commenced in October 1996.(104) This operation netted thirty-five indictments, including three convictions and eight guilty pleas of individuals for conspiracy and trafficking in trademark infringing products.(105) The DOJ initiated "Operation Counter Copy" as part of its overall "increased effort to address criminal violations of intellectual property rights."(106)
B. RICO and Money Laundering Act
As with theft of trade secrets, trademark counterfeiting is also illegal under the Racketeer Influenced and Corrupt Organizations ("RICO") and money laundering tatutes. In 1994, Congress added trademark counterfeiting to the list of unlawful activities under the money laundering statute.(107) The Anticounterfeiting Consumer Protection Act of 1996 made trademark and copyright counterfeiting a predicate offense under RICO.(108) Due to frustration with the usefulness of the TCA in providing remedies to trademark counterfeiting, Congress amended the RICO statute to enable the government to counter organized criminal activity as a whole "rather than merely react to each crime the organization commits."(109)
Penalties for violations of the RICO and money laundering statutes are significantly more severe than those under the TCA.(110) While the aforementioned amendments do not expand the definition of conduct that is illegal under the TCA and do not necessarily increase penalties associated with that conduct, their provisions do increase penalties when used to prosecute an organized crime.(111)
Under RICO, fines can be up to twice the gross profits or other proceeds of the activity.(112) Similarly, the penalty for a money laundering violation is a maximum sentence of twenty years TWENTY YEARS. The lapse of twenty years raises a presumption of certain facts, and after such a time, the party against whom the presumption has been raised, will be required to prove a negative to establish his rights.
2. and a maximum fine of $500,000 or twice the amount involved in the transaction, whichever is greater.(113)
In addition to fines and imprisonment Imprisonment
See also Isolation.
former federal maximum security penitentiary, near San Francisco; “escapeproof.” [Am. Hist.: Flexner, 218]
German prison ship in World War II. [Br. Hist. , the amended RICO statute allows law enforcement officials, including customs agents, to seize counterfeit goods and any "personal or real estate assets connected with the criminal enterprise." (114)
Part A of this section discusses the Copyright Act, emphasizing the elements of the criminal copyright infringement offense and affirmative defenses and the effects of reverse engineering. Parts B through E describe the application of the National Stolen Property Act, mail and wire fraud statutes, the Racketeer Influenced and Corrupt Organizations Act, and the money laundering statutes to criminal copyright infringement. Part F discusses pending legislation to extend copyright protection to computer databases and other collections of information.
A. Copyright Act
Congress' exclusive power to regulate copyright law is grounded in the Constitution.(115) Criminal copyright infringement, first introduced into federal copyright law in 1897, is distinguished from civil violations by the requirement that the conduct be willful and undertaken for profit.(116) Since 1897, the criminal copyright statute has been frequently amended as Congress has attempted to strengthen it and broaden its scope.(117) The Copyright Act of 1976 relaxed the mens rea As an element of criminal responsibility, a guilty mind; a guilty or wrongful purpose; a criminal intent. Guilty knowledge and wilfulness.
A fundamental principle of Criminal Law is that a crime consists of both a mental and a physical element. requirement for criminal copyright infringement by requiring only that the infringement be undertaken willfully willfully adv. referring to doing something intentionally, purposefully and stubbornly. Examples: "He drove the car willfully into the crowd on the sidewalk." "She willfully left the dangerous substances on the property." (See: willful) and for purposes of commercial advantage or private financial gain.(118) This lower threshold eases the burden of proving that the transgressor acted "for profit." In 1982, Congress increased the sanctions for criminal infringement, codifying stricter fines for criminal infringement in a separate statute.(119)
Enacted by Congress in October 1992, the Copyright Felony Act(120) responded primarily to the growing problem of large-scale computer software piracy The illegal copying of software for distribution within the organization, or to friends, clubs and other groups, or for duplication and resale. The software industry loses billions of dollars each year to piracy, and although it may seem innocent enough to install an application on a .(121) Prior to its passage, only unauthorized copying of sound recordings, motion pictures, or audiovisual works was a federal felony.(122) The Act amended 18 U.S.C. [sections] 2319 by broadening its coverage to protect all copyrighted works and lowering the numerical and monetary thresholds for felony sanctions.(123) The mens rea requirement remained unchanged under the 1992 Act, requiring the government to prove that the infringer's conduct was both willful and for purposes of commercial advantage or private financial gain.(124)
Finally, in December, 1997, the "No Electronic Theft (NET) Act" was enacted.(125) This Act removes the strict financial gain requirement; the government eed only prove either that the infringer acted for financial gain, or that she reproduced or distributed one or more copies of copyrighted works that have a total retail value of $1,000.(126) Thus, the criminal copyright statute now reaches those infringers who act solely to harm another or for nonfinancial gratification.(127)
Because a copyright cannot exist before an expression is captured in a fixed, tangible medium, musical or dramatic performances may not be protected by copyright until they are recorded. An artist's interest in his performance is protected against unauthorized recording by 18 U.S.C. [sections] 2319A. This section, added in December 1994, provides for both fines and imprisonment for the recording, reproduction, transmission, and distribution (whether for sale or not) of live musical performances.(128)
1. Elements of the Offense
The government has the burden of proving three elements in a criminal prosecution for copyright infringement under 17 U.S.C. [sections] 506: (1) that a copyright has been infringed upon; (2) that the violation was performed willfully; and (3) that the infringement was for purposes of commercial advantage or private financial gain, or that the infringer reproduced or distributed, during any 180-day period, one or more copies or phonorecords of one or more copyrighted works, with a total retail value of more than $1,000.(129) The elements of a [sections] 2319A violation are similar.(130)
As in civil cases, the first element--copyright infringement--can be proven by direct evidence, if available,(131) or by indirect evidence showing that the defendant had access to the copyrighted work and that the alleged copy is "substantially similar" to the original work.(132) The substantial similarity test is a two step analysis which requires: (1) a showing of substantial similarity in the basic ideas involved, established by focusing on specific "extrinsic EVIDENCE, EXTRINSIC. External evidence, or that which is not contained in the body of an agreement, contract, and the like.
2. It is a general rule that extrinsic evidence cannot be admitted to contradict, explain, vary or change the terms of a contract or of a " criteria, such as the type of work involved, the materials used, the subject matter, and the setting for the subject; and (2) a showing that the defendant's alleged copy expresses the same "intrinsic" substance and value as the original work.(133)
As an alternative to the substantial similarity test, courts may employ the "virtual identity" standard, or they may apply both. Whereas the substantial similarity test allows the potentially infringing work to be broken down into protectable and unprotectable elements, which will be compared with the original work for substantial similarity, the virtual identity test looks at the two works as a whole to determine if they are virtually identical.(134)
In McCulloch v. Albert E. Price, Inc.,(135) the Ninth Circuit held that it is not necessary under the substantial similarity test to determine the scope of copyright protection or to identify the idea behind a copyright holder's work.(136) The McCulloch court also decided that although the district court did not expressly follow the prevailing two-prong substantial similarity test,(137) similarity of ideas and expressions among the works was sufficient to support a finding of substantial similarity, where the lower court found that similarity "confusing."(138) Some courts allow the allegedly infringing work to be separated from the noninfringing work by filtering out copyright-protected from non-protected components.(139) Finally, the copyright infringement element may be established even though the person distributing the infringing work did not produce the copies herself.(140)
The second element of the criminal copyright offense is intent. A majority of the courts have interpreted the term "willfully" to mean that the government must show that the defendant specifically intended to violate the copyright law.(141) The Second and Ninth Circuits have taken the minority view, holding that "willfulness" requires only an intent to copy, not an intent to infringe.
c. Financial Gain/Threshold Violation
The third element of the criminal copyright offense is intent to profit. The Seventh Circuit has held that a defendant need not actually realize commercial advantage or private financial gain for a court to find this element of the offense; it is enough that the defendant commit the violation for the purpose of financial gain.(143) The aforementioned December 1997 amendments to 17 U.S.C. [sections] 506(a) have removed the financial gain requirement, by allowing the government to prove either financial gain or that one or more copies were reproduced or distributed with a total retail value of more than $1,000; thus, the infringer need not have intent to profit to be found guilty.(144)
A common statutory defense to copyright infringement is the "first sale" doctrine.(145) According to the doctrine, upon sale, the author conveys title to the particular copyrighted work and abolishes his right to restrict subsequent sales of the work.(146) The Third Circuit has held that infringing goods do not have to be made in the United States for the first sale doctrine to apply.(147) However, the Ninth Circuit subsequently held that a defendant could not use the first sale doctrine as a statutory defense to a copyright infringement charge for importation of infringing goods.(148) The Supreme Court granted certiorari certiorari
In law, a writ issued by a superior court for the reexamination of an action of a lower court. The writ of certiorari was originally a writ from England's Court of Queen's (King's) Bench to the judges of an inferior court; it was later expanded to include writs to resolve this split in the circuits, and its unanimous March 1998 opinion in Quality King Distribs., Inc. v. L'anza Research Int'l, Inc.(149) decisively rejected the Ninth Circuit's approach, holding that the first sale defense precluded assertions by a copyright owner that the re-importation of its goods from overseas markets constituted copyright infringement.(150)
Other defenses include fair use, parody and scenes a faire. Fair use considers the nature of both the infringing work and the work infringed against, as well as the purpose and economic impact of the specific use.(151) A defense of fair use as parody(152) considers almost exclusively the expressive intent of the infringing work to determine if the unique message could have been adequately conveyed through a less intrusive means.(153) A scenes a faire defense(154) relies on the fact that the infringing elements are so common or integral to the sort of work being produced that it is impossible to create works in the same category without those elements and therefore they may not be protected by copyright.(155)
3. Reverse Engineering
Because only the expression of an idea, and not the idea itself, may be protected under copyright, a copy made for the purposes of reverse engineering may represent a fair use exception to the copyright doctrine. Reverse engineering is the process, now most often applied to software, where a protected work is broken down to its component and nonprotected parts, from which a similar, competitive but noncopy product may be created.(156) When determining whether nonliteral elements of computer programs are substantially similar in copyright infringement cases, the court must first break down the allegedly infringing program into its constituent structural parts and isolate each level of abstraction The level of complexity by which a system is viewed. The higher the level, the less detail. The lower the level, the more detail. The highest level of abstraction is the single system itself. contained within that structure, sift protectable expression from nonprotectable material, and then compare the material structure of allegedly infringing program.(157) While this is more often at issue in trade secret violations, the doctrine has been applied to copyright violations in software cases.
B. National Stolen Property Act
In Dowling v. United States Dowling v. United States, 473 U.S. 207 (1985), was a United States Supreme Court case that discussed whether copies of copyrighted works could be regarded as stolen property for the purposes of a law which criminalized the interstate transportation of such property. ,(159) the Supreme Court held that the National Stolen Property Act(160) does not prohibit the interstate transportation of goods infringing on another's copyright.(161) Because there had been no actual physical removal or theft of the property, the Court held that the Act's requirement that the goods be "stolen, converted or taken by fraud" was not met. The decision overruled a long line of cases extending the protection of the Act to copyrighted goods.(162)
C. Mail and Wire Fraud Statutes
The mail and wire fraud statutes(163) impose criminal penalties on those who utilize the mails or wires to defraud To make a Misrepresentation of an existing material fact, knowing it to be false or making it recklessly without regard to whether it is true or false, intending for someone to rely on the misrepresentation and under circumstances in which such person does rely on it to his or others through copyright infringement.(164) To establish a violation of either statute, the government must meet the same criteria as set out in Section II.D. of this Article. Additionally, one district court has held that federal copyright law does "not necessarily preempt pre·empt or pre-empt
v. pre·empt·ed, pre·empt·ing, pre·empts
1. To appropriate, seize, or take for oneself before others. See Synonyms at appropriate.
a. other proprietary rights."(165) Because the defendants in that prosecution would not profit from their infringement until transmission by wire had occurred, this court held that remedies were not limited to those provided by the copyright statute and that prosecution under the wire fraud statute was acceptable.(166)
D. Racketeer Influenced and Corrupt Organizations Act
As with theft of trade secrets and trademark counterfeiting, RICO(167) claims can be brought for copyright infringement if the infringing acts continue over a period of time and relate to each other in a common plan created by the violators with the intent to defraud.(168) The Anticounterfeiting Consumer Protection Act of 1996 has made copyright counterfeiting a racketeering activity under RICO.(169)
E. Money Laundering Act
Section 1956 of the money laundering statute defines money laundering and includes the receipt of proceeds from trafficking in counterfeit goods or goods infringing copyright as specified unlawful activities.(170)
F. The Database Protection Bill
In October 1997, Rep. Howard Coble John Howard Coble, born March 18 1931 is a Republican Congressman representing the 6th district of North Carolina (map) Early Life
Coble was born in Greensboro, North Carolina. (R.-N.C.) introduced the Collections of Information Antipiracy Act,(171) which would provide criminal penalties for the use of all or part of a "collection of information gathered, organized, or maintained by another person through the investment of substantial monetary or other resources."(172) A violation of the proposed law would require willful action, that the act be undertaken for commercial or financial advantage--whether direct or indirect--and that the perpetrator cause loss or damage to the compiler of the information.(173) The Act passed the House on May 19, 1998.(174) The Act was introduced into the Senate on July 10, 1998, but was not enacted.(175)
Similar legislation introduced in the 104th Congress(176) was defeated and was criticized for extending copyright protection to hitherto uncopyrightable databases.(177) Even though the current bill was not ultimately enacted, it might serve as a model for future legislation.(178)
V. ONLINE SERVERS: CRIMINAL VIOLATIONS OF THE COPYRIGHT FELONY ACT
Part A of this section outlines applications of `the Copyright Act to on-line activities. It then addresses applications of the first-sale doctrine This article is about the first-sale doctrine as applied to copyright. For the analogous first-sale doctrine applicable to patents, see First-sale doctrine (patent).
The first-sale doctrine is a limitation on copyright that was recognized by the U.S. to file transfers in cyberspace Coined by William Gibson in his 1984 novel "Neuromancer," it is a futuristic computer network that people use by plugging their minds into it! The term now refers to the Internet or to the online or digital world in general. See Internet and virtual reality. Contrast with meatspace. . Part B discusses criminal liability by focusing on the dual requirements of intent and commercial advantage/financial gain. Finally, Part C addresses Warez (soft "wares") Pirated software distributed over the Internet. A warez site may also provide hackers with viruses and Trojans as well as tips, techniques and scripts for gaining illegal entry into networks and systems. It may also offer ways to cheat at online games. Sites and Internet Service Providers' liability for activities on their networks.
A criminal violation of the Copyright Act occurs when one willfully reproduces or publicly distributes any kind of copyrighted work.(179) The Copyright Act of 1976(180) protects the use of the text files,(181) image files,(182) and sound files(183) on the Internet.(184) Criminal copyright infringement that (1) is facilitated by or achieved through the Internet and (2) meets the statutorily prescribed number of copies or dollar value may lead to felony prosecution.(185) Systematic, unauthorized trading in copyrighted works on the Internet--whether sound, picture, or text files, or unlicensed software distribution--potentially qualifies as trafficking in counterfeit works. (186)
The protection that the 1976 Copyright Act affords digital works is in dispute. Commentators have argued that several areas of the Act should be amended in light of the growing use of cyberspace.(187) Two issues which are particularly problematic in the context of cyberspace are addressed here: the "first sale doctrine" exception, and the statutory requirement that criminal liability be based on findings of intent and commercial or financial gain.
A. The Internet and the First Sale Doctrine
The first sale doctrine allows a copyright holder to legally sell or give away her copy of the work.(188) Literally applied to file transfers in cyberspace, the doctrine arguably ar·gu·a·ble
1. Open to argument: an arguable question, still unresolved.
2. That can be argued plausibly; defensible in argument: three arguable points of law. implies that a person who legally downloads(189) a file copy to her own computer can freely redistribute re·dis·trib·ute
tr.v. re·dis·trib·ut·ed, re·dis·trib·ut·ing, re·dis·trib·utes
To distribute again in a different way; reallocate. that copy, whether or not she assesses a fee, to anyone else.(190) The problem attending such cyberspace redistribution lies in the ability of the first owner to retain a copy of the file she transfers. The argument is that eventually the copyrighted item will be so widely and freely available, and the demand will fall so low, that the owner will no longer benefit financially from her copyrighted work. In response, others argue that the first sale doctrine should not apply to the Internet at all.(191) Currently, the unauthorized reproduction or public distribution of any kind of copyrighted work can result in a felony prosecution.(192)
B. Criminal Liability
1. The Intent Requirement
Criminal liability for copyright infringement is predicated on a finding that the alleged perpetrator acted willfully.(193) The cyberspace context complicates the prosecutor's job because the defendant can convincingly argue an unknowing contribution to or commission of an offense.(194) The expansion of copyright law to address the Internet has yielded civil cases involving allegations of copyright infringement directed against the system operator ("Sysop (SYStem OPerator) Pronounced "siss-op." A person who runs an online communications system or bulletin board. The sysop may also act as mediator for system conferences.
sysop - system operator ")(195) or the bulletin board service ("BBS (1) (Bulletin Board System) A computer system used as an information source and forum for a particular interest group. They were widely used in the U.S. ").(196) Although the criminal section of the Copyright Act does not immunize im·mu·nize
1. To render immune.
2. To produce immunity in, as by inoculation.
im on-line providers from criminal liability for either direct(197) or contributory copyright infringement,(198) to date there have been no successful criminal copyright prosecutions of system providers.
The most heated debate involving service provider liability surrounds civil offenses. Because civil liability does not require that a provider willfully intended to commit or contribute to the infringement, the question arises whether an entity that merely maintains the network should be held liable.(199) In Religious Technology Center v. Netcom On-Line Communication Service, Inc.,(200) the district court held that a BBS service provider could not be held directly or vicariously vi·car·i·ous
1. Felt or undergone as if one were taking part in the experience or feelings of another: read about mountain climbing and experienced vicarious thrills.
2. liable for civil copyright infringement committed by a subscriber.(201) The Netcom court reasoned that, although copyright infringement is governed by strict liability, implicating a server irrespective of irrespective of
Without consideration of; regardless of.
preposition despite any intervention on its part would lead to unreasonable liability.(202)
2. The Commercial Advantage/Financial Gain Requirement
The "commercial advantage" or "financial gain" requirement for a finding of criminal copyright liability has hitherto hindered prosecutors.(203) The leading case demonstrating this problem is United States v. LaMacchia.(204) Even though defendant David LaMacchia set up a secret bulletin board and distributed unauthorized copies of commercially published, copyrighted software, he escaped criminal liability because he neither sought nor received financial or commercial gain from his actions.(205)
In 1997, Congress enacted the aforementioned No Electronic Theft ("NET") Act, which expressly amended 17 U.S.C. [sections] 506(a) to provide that the government can prove either financial gain or that one or more copies or phonorecords of one or more copyrighted works were reproduced or distributed during any 180-day period, provided that the copies have a total retail value exceeding $1,000.(206) This legislation also changed the statute of limitations A type of federal or state law that restricts the time within which legal proceedings may be brought.
Statutes of limitations, which date back to early Roman Law, are a fundamental part of European and U.S. law. from three years to five years, thus broadening the scope of its protection.(207)
C. Warez Sites and Internet Service Provider Internet service provider (ISP)
Company that provides Internet connections and services to individuals and organizations. For a monthly fee, ISPs provide computer users with a connection to their site (see data transmission), as well as a log-in name and password. Liability
Warez Sites are anonymous, often short-lived file-transfer protocol ("FTP FTP
in full file transfer protocol
Internet protocol that allows a computer to send files to or receive files from another computer. Like many Internet resources, FTP works by means of a client-server architecture; the user runs client software to connect to ") sites that exist solely to disseminate unlicensed copies of software and/or passwords for pirate software.(208) Warez sites may be unauthorized use of server space but are not usually maintained for profit or malicious purposes.(209) Any user of the Internet, Usenet or a BBS who is able to log on before all available lines are occupied can download a full, unencrypted, and unlicensed version of new software.
At the December 1996 Geneva Geneva, canton and city, Switzerland
Geneva (jənē`və), Fr. Genève, canton (1990 pop. 373,019), 109 sq mi (282 sq km), SW Switzerland, surrounding the southwest tip of the Lake of Geneva. meeting of the World Intellectual Property Organization ("WIPO WIPO World Intellectual Property Organization
WIPO World Intellectual Piracy Organization (satire website)
WIPO Write in Poll Option
WIPO Wing Information Protection Office (USAF) "), draft treaty provisions creating liability for Internet Service Providers ("ISPs") and Sysops were almost unanimously rejected.(210) Partly in response to the debate over those provisions, and partly in response to Netcom,(211) Congress passed the On-Line Copyright Infringement Liability Limitation Act(212) in October of 1998 as part of a larger bill. This law protects ISPs and Sysops from monetary, injunctive or equitable relief for "liability relating to material on-line" if such persons merely provide the server space for the infringing material and neither control nor endorse the infringing material.(213)
In general, the newly created 17 U.S.C. [sections] 512 exempts a service provider(214) from liability for monetary, injunctive or other equitable relief for copyright infringement by reason of the provider's transmitting, routing, or providing a connection for such material, or temporarily storing such material in the course of such a transmission, routing, or connection.(215) The provider remains exempt from liability for copyright infringement so long as the provider has no "actual knowledge" and is not aware of information indicating that the material is infringing, and such provider "does not receive a financial benefit directly attributable to the infringing activity."(216) Although the law does not require a provider to monitor or otherwise seek out information indicating infringement, the law does require that a provider, upon obtaining such information, expediently remove, or disable To turn off; deactivate. See disabled. access to, such material.(217) Those who knowingly, materially misrepresent mis·rep·re·sent
tr.v. mis·rep·re·sent·ed, mis·rep·re·sent·ing, mis·rep·re·sents
1. To give an incorrect or misleading representation of.
2. that material is infringing, or that material was removed or disabled by mistake or misrepresented are liable for damages.(218) Where a provider does remove or disable access to such material in "good faith," or based on circumstances "from which infringing activity is apparent, regardless of whether the material is ultimately determined to be infringing," it will generally(219) not be liable.(220) The law also specifies conditions under which limitations on liability of nonprofit educational institutions apply,(221) enables a copyright owner to request a subpoena subpoena (səpē`nə) [Lat.,=under penalty], in law, an order to a witness to appear before a court. A subpoena ad testificandum [Lat. be issued to a service provider for identification of an alleged infringer,(222) and describes conditions under which a court may grant injunctive relief injunctive relief n. a court-ordered act or prohibition against an act or condition which has been requested, and sometimes granted, in a petition to the court for an injunction. with respect to service providers.(223)
This section is divided into three parts. Part A discusses criminal liability for false patent marking. Part B addresses counterfeiting and forging of letters patent An instrument issued by a government that conveys a right or title to a private individual or organization, including conveyances of land and inventions.
Although Article I, Section 8, Clause 8, of the U.S. . Finally, Part C applies the National Stolen Property Act to patent infringement patent infringement n. the manufacture and/or use of an invention or improvement for which someone else owns a patent issued by the government, without obtaining permission of the owner of the patent by contract, license or waiver. .
A. False Marking
While most federal remedies for patent misuse In the United States, patent misuse is an affirmative defense used in patent litigation after the defendant has been found to have infringed a patent. This umbrella term usually describes:
2. His rights are, 1. ; (2) the patent number; or (3) the words "patent" or "patentee."(226) Additionally, the use of the word "patent," or any word or number indicating that the item is patented, in connection with an unpatented item violates this statute, as does the use of the words "patent applied for," "patent pending," or any other words falsely conveying the status of a patent.(227) In order to prove any of the above violations, deceitful intent of the defendant must be shown.(228)
B. Counterfeiting or Forging Letters Patent
Letters Patent are the display of information, on the item, that the government has given the manufacturer the right to exclude others from making that item. The Letters Patent statute(229) imposes criminal sanctions on persons forging, counterfeiting or altering any letters patent, as well as knowingly passing, uttering, or publishing as genuine, any such letters patent.(230)
C. National Stolen Property Act
In addition to excluding interstate transportation of goods infringing on another's copyright from the coverage of the National Stolen Property Act,(231) Dowling v. United States(232) implied, and has been interpreted to mean, that the Act also does not apply to the interstate transportation of goods infringing on patents.(233) Since patent infringement, like copyright infringement, does not involve a physical taking, the Supreme Court took a literal view of the Act's requirement that the copyrighted goods in dispute be "stolen, converted or taken by fraud."(234)
VII. ART CRIMES
Art crime(235) has become a booming multi-billion dollar industry(236)--third only to the illegal drug smuggling smuggling, illegal transport across state or national boundaries of goods or persons liable to customs or to prohibition. Smuggling has been carried on in nearly all nations and has occasionally been adopted as an instrument of national policy, as by Great Britain and arms trading markets.(237) Crimes span simple theft and vandalism,(238) to forgery,(239) money laundering,(240) and various forms of fraud.
White collar art criminals act as gallery or auction house dealers,(241) museum directors or curators,(242) and collectors. Even artists may engage in tactics facilitating subsequent white collar crime white collar crime n. a generic term for crimes involving commercial fraud, cheating consumers, swindles, insider trading on the stock market, embezzlement and other forms of dishonest business schemes. .(243) An appraiser may refuse to authenticate (1) To verify (guarantee) the identity of a person or company. To ensure that the individual or organization is really who it says it is. See authentication and digital certificate.
(2) To verify (guarantee) that data has not been altered. a legitimate artwork as part of a conspiracy to drive up the value of the remaining stock.(244) These perpetrators use their positions of power or privilege to commit non-violent crimes which often require an advanced level of education and skill.(245)
Several obstacles to detection of art crimes exist. Collectors may often be hesitant to report fraud; swindled buyers may fear embarrassment or unwelcome attention by thieves and IRS An abbreviation for the Internal Revenue Service, a federal agency charged with the responsibility of administering and enforcing internal revenue laws. agents, continue the deception in order to resell the piece, or balk balk
the action of a horse when it refuses to obey a command to which it usually responds. See also jibbing. at the threat to the legitimacy of the remaining pieces in their collection.(246) The complexity and expense of accurate authentication (1) Verifying the integrity of a transmitted message. See message integrity, e-mail authentication and MAC.
(2) Verifying the identity of a user logging into a network. also impedes detection.(247)
In addition, many art crimes are easy to perpetrate.(248) Novice collectors are often willing to rely on a dealer's reputation instead of researching their purchases which encourages and rewards art crime.(249)
The international art community(250) has welcomed several recent innovations in publicizing art theft,(251) tracing provenance prov·e·nance
1. Place of origin; derivation.
2. Proof of authenticity or of past ownership. Used of art works and antiques. ,(252) and registering works of art,(253) but a lack of effective legislation has hampered attempts at effective containment.(254) The remainder of this Section examines existing federal and state laws that have met with limited success in combating art crimes.
Part A addresses the federal measures applied to art crime prosecutions, specifically the Theft of Major Artwork Act, Mail and Wire Fraud Statutes, the Copyright Felony Act, and compliance with UNESCO UNESCO: see United Nations Educational, Scientific, and Cultural Organization.
in full United Nations Educational, Scientific and Cultural Organization and UNIDROIT treaties. Part B reviews state art crime prosecutions under larceny and forgery laws, extended to protect art and antiquities.
A. Federal Statutes
1. Theft of Major Artwork Act
The Theft of Major Artwork Act(255) specifically targets criminals that have stolen or fraudulently obtained "any object of cultural heritage"(256) from a "museum."(257) The Act also penalizes possession of an object known to be stolen or fraudulently obtained.(258) The statute of limitations for returning an indictment or filing an information extends to twenty years after commission of the art theft(259) in order to compensate for the often delayed detection of such crimes and the unique difficulties of recovering stolen works.(260) The first reported charge under this statute occurred in January 1998, when the FBI in Philadelphia charged two defendants for the stealing over two hundred relics from the Historical Society of Pennsylvania Historical Society of Pennsylvania is an historical library and archive founded in Philadelphia in 1824. Today, the Society houses over 19 million manuscript sript and graphic items and features one of the largest family history libraries in the nation. .(261) The Act was most recently used Most Recently Used (MRU) may refer to:
2. Mail and Wire Fraud Statutes
United States v. Center Art Gallery-Hawaii(263) exemplifies the successful prosecution of art crime using mail and wire fraud statutes.(264) In this case, the gallery and its two owners were each convicted(265) for activities involving the largest art fraud ring in history.(266) The defendants, however, were not prosecuted for the sale of forged works of art, nor for their false appraisals, but rather for mailing false authentication certificates to customers and soliciting further business over the telephone in violation of mail and wire fraud statutes.(267)
In United States v. Burke,(268) four owners and representatives of Manhattan's Barclay Gallery were each charged and convicted of all(269) twenty-two counts of mail fraud and twenty-eight counts of wire fraud; the gallery "allegedly used high-pressure telephone sales pitches" to perpetrate its scheme.(270) Despite singular prosecutorial success,(271) the requisite demonstration of criminal intent inhibits widescale utilization of mail and wire fraud statutes to punish art crime.
3. Copyright Felony Act
A stringent mens rea requirement similarly limits the usefulness and success of art crime prosecutions pursued under the Copyright Felony Act. The statute protects only unpublished works and works not in the public domain, leaving many older works unprotected.(272) Many forgeries do not involve copying.(273)
4. UNESCO and UNIDROIT: Enforcement by Treaties
In 1970, the United Nations Educational, Scientific, and Cultural Organization United Nations Educational, Scientific, and Cultural Organization (UNESCO), specialized agency of the United Nations, with headquarters in Paris. Its counterpart in the League of Nations was the International Committee for Intellectual Cooperation. ("UNESCO") adopted the "Convention on Cultural Property Implementation,"(274) ratified by the United States in 1983.(275) The treaty intends to protect the "cultural patrimony PATRIMONY. Patrimony is sometimes understood to mean all kinds of property but its more limited signification, includes only such estate, as has descended in the same family and in a still more confined sense, it is only that which has descended or been devised in a direct line from the " of countries "from the pillage of archaeological or ethnological eth·nol·o·gy
1. The science that analyzes and compares human cultures, as in social structure, language, religion, and technology; cultural anthropology.
2. materials" by providing import restrictions for such objects.(276) The United States established the "Cultural Property Advisory Committee"(277) which has led to restrictions on imports of antiquities from several countries.(278)
Because several countries considered major forces in the art trade failed to ratify the 1970 UNESCO Convention, UNESCO asked UNIDROIT (the International Institute for the Unification of Private Law The International Institute for the Unification of Private Law, also known as UNIDROIT, is an independent intergovernmental organisation. Its purpose is to study needs and methods for modernising, harmonising, and coordinating private international law and in particular , Rome) to prepare a new treaty that would provide protection to art trade in the rest of the world.(279) This treaty, completed on June 24, 1995, would greatly expand protection, but has a significant restriction: it only applies to art works stolen or looted loot
1. Valuables pillaged in time of war; spoils.
2. Stolen goods.
3. Informal Goods illicitly obtained, as by bribery.
4. after the date that the host country has ratified the treaty.(280) Thus far, out of the twenty-two countries who have signed the treaty, only three have ratified it, while two others have acceded to it.(281) The United States abstained from voting on the treaty and has not yet signed or ratified the UNIDROIT convention. This convention has generated significant controversy in the United States and the United Kingdom, as art dealers claim that they will no longer be able to exhibit or sell works in countries that have ratified the convention, on the grounds that the works might be confiscated con·fis·cate
tr.v. con·fis·cat·ed, con·fis·cat·ing, con·fis·cates
1. To seize (private property) for the public treasury.
2. To seize by or as if by authority. See Synonyms at appropriate.
adj. by the country of origin, leaving art dealers without a cause of action.(282)
B. State Approaches
Various states have recognized the importance of promoting the arts by including provisions aimed at their protection and encouraging their development.(283) A number of states have enacted criminal simulation statutes, designed to customize existing forgery laws which, without such modification, are limited to actions associated with written documents and checks. For example, New York's Criminal Simulation Statute(284) extended New York's preexisting pre·ex·ist or pre-ex·ist
v. pre·ex·ist·ed, pre·ex·ist·ing, pre·ex·ists
To exist before (something); precede: Dinosaurs preexisted humans.
v.intr. statute aimed at forgery of cultural property(285) to "antiques, objets d'art, rare books and comparable matter."(286)
Twenty-six other states and Guam have codified cod·i·fy
tr.v. cod·i·fied, cod·i·fy·ing, cod·i·fies
1. To reduce to a code: codify laws.
2. To arrange or systematize. similar "criminal simulation" provisions into their penal codes,(287) reflecting a growing awareness of the special type of protection needed in the art community. In three states, however, these statutes do not apply to all art and antiquities, but are limited to certain excavated or historical objects.(288) Imposing stricter requirements, two states require disclosure of the number of copies in limited editions of fine art works, with penalties and injunctions for inadequate or erroneous disclosure.(289) In addition, states often use traditional statutes, such as conspiracy(290) or grand larceny A category of larceny—the offense of illegally taking the property of another—in which the value of the property taken is greater than that set for petit larceny.
At Common Law, the punishment for grand larceny was death. , to prosecute art-related fraud.(291)
Several provisions of the Federal Sentencing Guidelines The Federal Sentencing Guidelines are rules that set out a uniform sentencing policy for convicted defendants in the United States federal court system. The Guidelines are the product of the United States Sentencing Commission and are part of an overall federal sentencing reform are applicable to the theft of intellectual property.(292) This Section delineates the provisions applicable to each statute: the Economic Espionage Act, the National Stolen Property Act, the Trade Secrets Act, the Mail and Wire Fraud statutes, the RICO Act, the Trademark Counterfeiting Act and Copyright Felony Act, and False Marking and Counterfeiting or Forging Letters Patent. Because a defendant may be prosecuted under any combination of these statutes, the grouping analysis must be considered when determining the defendant's sentence after a multi-count conviction.(293)
A. Economic Espionage Act of 1996
Defendants convicted of violating 18 U.S.C. [sections] 1831 may be imprisoned for a maximum of fifteen years and/or fined $500,000.(294) Those convicted of violating [sections] 1832 may be imprisoned for up to ten years and/or fined $500,000.(295) Although the Act mandates forfeiture The involuntary relinquishment of money or property without compensation as a consequence of a breach or nonperformance of some legal obligation or the commission of a crime. The loss of a corporate charter or franchise as a result of illegality, malfeasance, or Nonfeasance. of any proceeds or property derived from violations, property used to commit or facilitate the commission of the crime may be forfeited only at the discretion of the Court.(296) Existing state law continues to provide alternative relief; the Act specifically states that it does not "preempt or displace any other remedies, whether civil or criminal."(297)
B. National Stolen Property Act
The National Stolen Property Act imposes imprisonment for not more than ten years and/or a fine determined under Title 18.(298)
Defendants convicted of violating the Act are sentenced under [sections] 2B 1.1.(299) The base offense level of four applies upon a total maximum loss to the victim of $100.(300) The offense level then rises as the financial loss to the victim increases, up to a maximum increase of twenty offense levels for losses exceeding $80,000,000.(301) Additionally, if the offense involved more than minimal planning, the offense level is in creased by two levels.(302) If the defendant is a person in the business of receiving and selling stolen property, the offense level is increased by four levels.(303)
C. Trade Secrets Act
Violations of the Trade Secrets Act may result in a maximum one-year imprisonment or a fine determined under Title 18; moreover, the convicted is removed from office or employment.(304)
Defendants are sentenced under [sections] 2H3.1.(305) The base offense level of nine is increased by three if the purpose of the conduct was to obtain commercial advantage or economic gain.(306) If the purpose of the conduct was to facilitate another offense, [sections] 2H3.1 requires the application of the guideline applicable to an attempt to commit the other offense when that offense level is greater than that determined for violation of the Trade Secrets Act.(307)
D. Mail and Wire Fraud Statutes
Mail and wire fraud risks a maximum five-year sentence and/or a fine determined under Title 18.(308) Fines can increase to $1,00,000 and the prison term can expand to thirty years, if the crime affects a financial institution.(309)
Defendants convicted of mail or wire fraud are sentenced under [sections] 2Fl.1, "Offenses Involving Fraud or Deceit."(310) The base offense level of six applies upon a total maximum loss to the victim of two thousand dollars.(311) The offense level then rises as the financial loss to the victim increases, up to a maximum increase of eighteen offense levels for losses exceeding eighty million dollars.(312) Additionally, the offense level can be elevated two levels if the crime involved more than one victim or if the crime involved more than minimal planning.(313)
E. Racketeer Influenced and Corrupt Organizations Act
Convictions under RICO carry a maximum sentence of twenty years and/or a fine determined under Title 18.(314) Additionally, RICO requires that the defendant forfeit any interests in enterprises established, operated, or maintained in violation of the statute.(315) Defendants convicted of RICO violations are sentenced under [sections] 2E1.1.316 The Anticounterfeiting Consumer Protection Act of 1996(317) broadens the scope of RICO to include intellectual property violations but does not change the penalties.
F. Trademark Counterfeiting Act and Copyright Felony Act
Individuals convicted of trafficking in forged or counterfeit goods TCA face a prison term of not more than ten years and/or a fine of up to $2,000,000.(318) Similarly, organizations convicted of trafficking in counterfeit goods risk a maximum fine of $5,000,000.(319) Upon a determination that any articles in the possession of a defendant bear counterfeit marks, the goods may be ordered destroyed.(320) The first-time offense of trafficking goods that bear forged or counterfeited labels may result in not more than five years imprisonment and/or a fine determined under Title 18.(321) Defendants convicted of trademark counterfeiting or criminal copyright infringement are sentenced under [sections] 2B5.3.(322) The base offense level is six.(323) If the retail value of the infringing items exceeds $2,000, the offense level increases by the corresponding number of levels indicated by the table in [sections] 2Fl.1, "Fraud and Deceit."(324)
The Copyright Felony Act defines a felony offense as the reproduction or distribution, during any 180-day period, of at least ten unauthorized copies, of one or more copyrighted works, with a collective value of more than $2,500.(325) First-time offenders may be imprisoned for not more than five years(326) and/or fined not more than $250,000 for an individual, or $500,000 for an organization.(327) In addition, if the offender derives personal financial gain from the offense, or causes third-party financial losses, the offender may be fined up to the greater of twice the gross gain or twice the gross loss.(328) Repeat offenders risk an increase in the maximum prison sentence increases to ten years.(329) The Copyright Felony Act prescribes a misdemeanor sentence for any criminal copyright infringement failing to meet the numerical thresholds described above: a maximum one-year imprisonment and a fine not to exceed $100,000.(330)
Finally, [sections] 506(b) grants courts discretion to order the forfeiture and destruction of infringing items and all implements, devices, or equipment used in their manufacture.(331)
Violations of [sections] 2319A can result in imprisonment for up to five years, and/or a fine determined under Title 18.332 Subsequent offenses carry maximum ten-year sentences and/or fines.(333) The convicted must also surrender rights to the illegal material.(334)
G. False Marking and Counterfeiting or Forging Letters Patent
False marking violations under [sections] 292 result in maximum fines of $500 per offense(335) where each false marking is subject to a separate fine.(336) One-half of the proceeds from a [sections] 292 conviction go to the citizen who brings the crime to the attention of the government; the other half of the proceeds go to the United States.(337) Violations of the Letters Patent statute(338) risk a maximum ten-year imprisonment and/or(339) fines pursuant to [sections] 3571 of Title 18.(340) Defendants convicted of counterfeiting or forging letters patent are sentenced under [sections] 2F1.1.(341)
(1.) Traditionally, theft of trade secrets has been handled by civil remedy CIVIL REMEDY, practice. This term is used in opposition to the remedy given by indictment in a criminal case, and signifies the remedy which the law gives to the party against the offender.
2. . However, because of increased technological complexity, delays in civil litigation An action brought in court to enforce a particular right. The act or process of bringing a lawsuit in and of itself; a judicial contest; any dispute.
When a person begins a civil lawsuit, the person enters into a process called litigation. , and advances in computer technology, all of which permit thieves to profit more rapidly from trade secrets, traditional remedies, such as injunctions and civil damages, have become ineffective. Furthermore, because of the intangible nature of trade secrets, which once lost can never be physically recovered, the civil remedy is quite illusory.
(2.) See Jack Nelson, Spies Took $300-Billion Toll on U.S. Firms in '97 Business: FBI Says Espionage is Increasing, with at Least 23 Governments Targeting American Companies, L.A. TIMES, Jan. 12, 1998, at A1 (noting that numerous foreign governments are "targeting" intellectual property of American firms, especially trade secrets); Sharon Walsh & Robert O'Harrow, Jr., Trying to Keep a Lock on Company Secrets; Law Enforcement Officials Fear Rise in Computer Crimes, Made Easier by Technological Advances, WASH. POST, Feb. 17, 1998, at DI (describing computer espionage aimed at company secrets). See generally AMERICAN SOCIETY FOR INDUSTRIAL SECURITY 1997/98 TRENDS IN INTELLECTUAL PROPERTY LOSS SPECLAL REPORT (1998).
(3.) Economic Espionage Act of 1996, Pub. L. No. 104-294, 110 Stat. 3488 (codified at 18 U.S.C. [subsections] 1831-1839) [hereinafter here·in·af·ter
In a following part of this document, statement, or book.
Formal or law from this point on in this document, matter, or case
Adv. 1. "EEA"]; see Gerald J. Mossinghoff et al., The Economic Espionage Act: A New Federal Regime of Trade Secret Protection, 79 J. PAT. & TRADEMARK OFF. SOC'Y 191, 191-95 (1997) (discussing reasons for enactment of the EEA).
(4.) 18 U.S.C.A. [sections] 1831 (West Supp. 1998).
(5.) 18 U.S.C.A. [sections] 1832 (West Supp. 1998). The EEA provides for a maximum term of imprisonment of 15 years if the criminal act was done with the intent to benefit a foreign government and 10 years in all other cases. The maximum fine that may be imposed upon an organization is $10 million if the intent of the organization was to benefit a foreign government. In all other cases, the maximum fine imposed on an organization is $5 million. 18 U.S.C.A. [subsections] 1831-1832.
(6.) 18 U.S.C.A. [sections] 1839 (West Supp. 1998). Even if the original owner never loses custody over his property, the EEA recognizes the loss of value to that owner. See generally COMPUTER CRIME & INTELLECTUAL PROPERTY SECTION, CRIMINAL DIVISION, U.S. DEP'T OF JUSTICE, FEDERAL PROSECUTION OF VIOLATIONS OF INTELLECTUAL PROPERTY RIGHTS (COPYRIGHTS, TRADEMARKS AND TRADE SECRETS) 73 (1997) [hereinafter "FEDERAL PROSECUTION MANUAL"].
(7.) UNIV UNIV University
UNIV Universal . TRADE SECP SECP Securities and Exchange Commission of Pakistan
SECP Software Engineering Change Proposal , ETS ETS Educational Testing Service (nonprofit private educational testing and measurement organization)
ETS Emergency Telecommunications Service
ETS Electronic Trading System
ETS Engineering (&) Technical Services ACT, 14 U.L.A. 438 (1996).
(8.) Mossinghoff, New Regime, supra A relational DBMS from Cincom Systems, Inc., Cincinnati, OH (www.cincom.com) that runs on IBM mainframes and VAXs. It includes a query language and a program that automates the database design process. note 3, at 197. The EEA trade secret definition is broader in that it expands the number of trade secrets listed, expressly protects intangible information, and protects information in any form regardless of how it is stored. See Arthur J. Schwab & David J. Porter, Federal Prosecution of Trade Secrets: Understanding the Economic Espionage Act of 1996, 10 No. 4 J. PROPRIETARY RTS (Request To Send) An RS-232 signal sent from the transmitting station to the receiving station requesting permission to transmit. Contrast with CTS.
1. (operating system) RTS - run-time system.
2. . 2, 3-4 (1998). 9. 18 U.S.C.A. [sections] 1839(3)(A) (West Supp. 1998)
(10.) See 18 U.S.C.A. [sections] 1839(3)(B) (West Supp. 1998).
(11.) See FEDERAL PROSECUTION MANUAL, supra note 6, at 75.
(12.) 18 U.S.C.A. [sections] 1839(3).
(13.) James H.A. Pooley, et al., Understanding the Economic Espionage Act of 1996, 5 TEX (tai epsion chi) A typesetting language developed by Stanford professor Donald Knuth that is noted for its ability to describe elaborate scientific formulas. Pronounced "tek" or the guttural "tekhhh" (the X is the Greek chi, not the English X), TeX is widely used for mathematical book . INTELL. PROP. L.J. 177, 189 (1997).
(14.) H.R. REP. No. 104-788, at 7 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4033 [hereinafter "EEA HOUSE REPORT"].
(15.) 18 U.S.C.A. [sections] 1831(a) (West Supp. 1998).
(16.) Section 1832 states in relevant part: Whoever, with intent to convert a trade secret, that is related to or included in a product that is produced for or placed in interstate or foreign commerce, to the economic benefit of anyone other than the owner thereof, and intending or knowing that the offense will, injure any owner of that trade secret, knowingly--
(1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains such information; (2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys such information; (3) receives, buys, or possesses such information, knowing the same to have been stolen or appropriated, obtained, or converted without authorization; (4) attempts to commit any offense described in paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any offense described in paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy ...
18 U.S.C.A. [sections] 1832(a) (West Supp. 1998). The five clauses of [subsections] 1831(a) and 1832(a) are the same and are presumably disjunctive dis·junc·tive
1. Serving to separate or divide.
2. Grammar Serving to establish a relationship of contrast or opposition. The conjunction but in the phrase poor but comfortable is disjunctive. so that violation of any one clause is sufficient to violate the statute. 18 U.S.C.A. [subsections] 1831(a) & 1832(a). Section 1832 contains three limitations not found in [sections] 1831: (1) defendant must intend to convert a trade secret to the economic benefit of someone other than the owner; (2) defendant must intend or know the threat will injure the owner of the trade secret; and (3) the trade secret must be "related to or included in a product that is produced for or placed in interstate or foreign commerce." United States v. Hsu, 155 F.3d 189, 196 (3d Cir. 1998).
(17.) 18 U.S.C.A. [sections] 1832(a).
(18.) 14 U.L.A. 438 (1996).
(19.) Pooley, supra note 13, at 192.
(20.) See 18 U.S.C.A. [sections] 1832(a)(3) (applying the act to anyone who knowingly "receives, buys, or possesses such information, knowing the same to have been stolen or appropriated, obtained, or converted without authorization"); see also Pooley, supra note 13, at 192 (stating that EEA provisions are in some respects significantly broader than other civil trade secret laws).
(21.) 18 U.S.C.A. [sections] 1837(2) (West Supp. 1998).
(22.) 18 U.S.C.A. [sections] 1837(1) (West Supp. 1998).
(23.) 18 U.S.C.A. [sections] 1837(2) (West Supp. 1998).
(24.) Section 1833 states:
This chapter does not prohibit--
(1) any otherwise lawful activity conducted by a governmental entity of the United States, a State, or a political subdivision of a State; or (2) the reporting of a suspected violation of law to any governmental entity of the United States, a State, or a political subdivision of a State, if has lawful authority with respect to that violation.
18 U.S.C.A. [sections] 1833 (West Supp. 1998).
(25.) EEA HOUSE REPORT, supra note 14, at 14.
(27.) See Gerald J. Mossinghoff et al., The Economic Espionage Act: A Prosecution Update, 80 J. PAW. [&TRADEMARK] OFF. SOC'Y 360, 366 (1998).
(28.) Victoria Slind-Flor, New Spy Act SPY ACT Securely Protect Yourself Against Cyber Trespass Act (proposed US privacy legislation) to Boost White-Collar Defense Biz: Enhanced Enforcement of Trade Secret Theft Expected, NAT'L L.J., July 28, 1997, at A1; see also Mossinghoff, Prosecution Update, supra note 27, at 367 (opining o·pine
v. o·pined, o·pin·ing, o·pines
To state as an opinion.
To express an opinion: opined on the defendant's testimony. government desire to "work out the `bugs' in the new law" with lesser offenders before pursuing more serious cases).
(29.) Mossinghoff, Prosecution Update, supra note 27, at 366-67. Although some current cases involve foreign companies and nationals, there have been no cases under section 1831 involving the theft of trade secrets to benefit foreign governments, instrumentalities, or agents.
(30.) United States v. Hsu, No. 97-523-M (filed E.D. Pa. 1997); United States v. Ho, No. 97-522-M (filed E.D. Pa. 1997); FBI Charges Taiwanese Tried to Steal Taxol Trade Secrets from BMS BMS
Bachelor of Marine Science , Pharmaceutical Litig. Rep., July 1997, at 12,413.
(31.) FBI Charges, supra note 30, at 12,413.
(32.) United States v. Hsu, 155 F.3d 189 (3d Cir. 1998).
(33.) Id. at 203.
(34.) Slind-Flor, supra note 28, at Al.
(36.) See Mossinghoff, Prosecution Update, supra note 27, at 365-66 (discussing employee's attempts to sell trade secrets to competitors).
(37.) See id. at 366 (discussing defendant's knowing conversion of proprietary software program by selling it for her personal benefit). This appears to be the first case that cites no other criminal statutes other than the EEA in the indictment. Id.
(38.) See id. (discussing arrest of circulation managers after allegedly offering to sell marketing plans and subscription lists to rival newspaper).
(39.) See id. at 365 (discussing arrests resulting from FBI sting operation Noun 1. sting operation - a complicated confidence game planned and executed with great care (especially an operation implemented by undercover agents to apprehend criminals) ); see also Daniel Eisenberg, Eyeing the Competition, TIME, Mar. 22, 1999 at 58 (discussing a December 1998 conviction under the EEA).
(40.) 18 U.S.C. [sections] 2314 (1994). The NSPA was intended "to fight the `roving criminal' whose access to automobiles made it easy to move stolen property across state lines,.... frustrating local law enforcement." Keith D. Krakaur & Robert C. Juman, Two New Federal Offenses Help Battle Corporate Espionage, 4 No. 2 Bus. CRIMES BULL.: COMPLIANCE & LITIG. 7, 7 (1997).
(41.) 18 U.S.C. [sections] 2314. Section 2314 provides criminal sanctions to any person:
having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises, transports or causes to be transported, or induces any person or persons to travel in, or to be transported in interstate or foreign commerce in the execution or concealment of a scheme or artifice to defraud that person or those persons of money or property having a value of $5,000 or more....
18 U.S.C. [sections] 2314.
(42.) Spencer Simon, The Economic Espionage Act of 1996, 13 BERKELEY TECH. L.J. 305,306 (1998).
(43.) See United States v. Stegora, 849 F.2d 291, 292 (8th Cir. 1988) (ruling theft of sample of synthetic casting material used in repairing broken bones This article or section has multiple issues:
* It does not cite any references or sources. Please help improve this article by citing reliable sources.
* It needs to be expanded.
Please help [ improve the article] or discuss these issues on the talk page. falls under NSPA even though a major portion of its value comes from an intangible component); United States v. Bottone, 365 F.2d 389, 393-94 (2d Cir. 1966) (holding NSPA applicable to theft of documents containing trade secrets); United States v. Seagraves, 265 F.2d 876, 880 (3d Cir. 1959) (finding theft of geophysical maps identifying possible oil deposits to fall under NSPA).
(44.) Van Dorn Co. v. Howington, 623 F. Supp. 1548, 1558 (N.D. Ohio 1985).
(45.) Peter J.G. Toren, The Prosecution of Trade Secret Thefts Under Federal Law, 22 PEPP PEPP Payment Error Prevention Program
PEPP Pediatric Education for Prehospital Professionals
PEPP Professional Engineers in Private Practice (division of NSPE)
PEPP Probation Environmental Preservation Project . L. REV. 59, 67-68 (1994).
(46.) See United States v. Brown, 925 F.2d 1301, 1305 (10th Cir. 1991) (dismissing prosecution for lack of proof that computer program was physically removed from plaintiff's place of business); Abbott v. United States, 239 F.2d 310, 312 (5th Cir. 1956) (requiring government to prove "[w]ho carried it, or how, or who caused it to be transported"); see also Bottone, 365 F.2d at 393 (finding NSPA covers photocopies transported in interstate commerce interstate commerce
In the U.S., any commercial transaction or traffic that crosses state boundaries or that involves more than one state. Government regulation of interstate commerce is founded on the commerce clause of the Constitution (Article I, section 8), which stolen from company and not made on company's equipment); Howington, 623 F. Supp. at 1558 (holding plaintiff failed to allege transportation by "merely stat[ing] that a trade secret was appropriated in violation of the statutes").
(47.) 265 F.2d 876 (3d Cir. 1959). In Seagraves, the stolen trade secrets were geophysical and geological maps produced by Gulf Oil and copied with its equipment onto its paper. The court distinguished the instant case from others by noting that the trade secrets stolen were "the permanent form into which was cast the advice and assistance for which the defendants were consulted." Id. at 880. Evidence showed that maps of this type were frequently sold. In addition, expert testimony Testimony about a scientific, technical, or professional issue given by a person qualified to testify because of familiarity with the subject or special training in the field. established the value of some of the individual maps at well over $5,000. Id.
(48.) Seagraves, 265 F.2d at 880 (citing BLACK'S LAW DICTIONARY A law dictionary is a dictionary that is designed and compiled to give information about terms used in the field of law.
A distinction is made between different types of law dictionaries. A monolingual law dictionary covers one language, a bilingual covers two. 823 (4th ed. 1951)); see also Brown, 925 F.2d at 1308-09 (placing a restriction that goods, wares or merchandise must be transported in physical form to qualify as stolen trade secrets under NSPA); United States v. Greenwald, 479 F.2d 320, 321 (6th Cir. 1973) (finding documents containing chemical formulation to be goods, wares, or merchandise, because they were treated as assets in chemical manufacturers' market).
(49.) Id.; see also Greenwald, 479 F.2d at 322 (arguing established market among chemical competitors for chemical formulations sufficient to make stolen chemical formula "good" within meaning of NSPA). But see Brown, 925 F.2d at 1308-09 (finding that computer programs are intangible intellectual property, not "goods, wares or merchandise" within meaning of NSPA). For further discussion of this topic, see the COMPUTER CRIMES article in this issue.
(50.) See United States v. Lyons, 992 F.2d 1029, 1033 (10th Cir. 1993) (holding computer software stolen in conjunction with computer hardware was theft of tangible property).
(51.) See, e.g., R.E. Davis Chem. Corp. v. Nalco Chem. Co., 757 F. Supp. 1499, 1512 (N.D. ill. 1990) (deciding that documents obtained and studied within boundaries of Texas have not crossed state lines).
(52.) See United States v. Schaffer, 266 F.2d 435, 439 (2d Cir. 1959), aff'd, 362 U.S. 511 (1960) (stating purpose of $5000 minimum value is to decrease case load at Department of Justice).
(53.) See United States v. Seagraves, 265 F.2d 876, 880 (3d Cir. 1959) (looking to amount paid for stolen maps to determine their market value); see also United States v. Greenwald, 479 F.2d 320, 321 (6th Cir. 1973) (attributing defendant's profits from sale of stolen chemical formulas to established market of finished products among competitors in industry). But see In re Vericker, 446 F.2d 244, 248 (2d Cir. 1971) (refusing to find market for papers showing individuals who are or may have engaged in criminal activity or what procedures are used by FBI in tracking them down); United States v. Willette, 764 F. Supp. 759, 761-62 (N.D.N.Y. 1991) (refusing to determine value based on retail price when owner was part of wholesale market).
(54.) See United States v. Wilson, 900 F.2d 1350, 1355-56 (9th Cir. 1990) (rejecting strict market value where goods have "no readily ascertainable market value"); United States v. Stegora, 849 F.2d 291, 292 (8th Cir. 1988)
(looking to amount that owner invested in developing trade secret). But see Abbott v. United States, 239 F.2d 310, 312-13 (5th Cir. 1956) (rejecting alternate valuation scheme and relying on 18 U.S.C. [sections] 2311 to require establishment of genuine market value--where willing buyers bargain with willing sellers--to meet minimum value requirement).
(55.) See Wilson, 900 F.2d at 1355-56 (looking to development costs and price for which defendant sold stolen goods to determine valuation absent actual market).
(56.) See United States v. Jackson, 576 F.2d 749, 757 (8th Cir. 1978) (using "thieves' market value" since value of contraband was speculative or not fixed and thieves' market was only guidepost available for establishing value).
(57.) 18 U.S.C. [sections] 2314.
(58.) See 18 U.S.C. [sections] 2314. ("[w]hoever transports ... goods, wares, merchandise ... knowing the same to have been stolen") (emphasis added).
(59.) See United States v. Bottone, 365 F.2d 389, 392-93 (2d Cir. 1966) (holding proof of defendant's comings and goings clearly sufficient to suggest he knew he was selling stolen goods).
(60.) 18 U.S.C. [sections] 2314 (1994). But see United States v. Riggs, 739 F. Supp. 414, 421 (N.D. Ill. 1990) (applying NSPA's "goods, wares, or merchandise" definition to intangible, technical information).
(61.) 925 F.2d 1301 (10th Cir. 1991).
(62.) Id. at 1302.
(63.) Id. at 1305.
(64.) Id. at 1307 n.14. The court explained:
[S]ection 2314 applies only to physical "goods, wares or merchandise." Purely intellectual property is not within this category. It can be represented physically, such as through writing on a page, but the underlying, intellectual property itself, remains intangible. It is true that the intellectual property involved in the instant case was more nearly "stolen, converted or taken by fraud" in the sense that it was at no time freely presented to the public.... We hold that the computer program itself is an intangible intellectual property, and as such, it alone cannot [sic] constitute goods, [or] wares ... which have been stolen, converted or taken within the meaning of [subsections] 2314 or 2315.
Id. at 1307-08 (citations omitted).
(65.) Id. at 1307; cf. United States v. Lyons, 992 F.2d 1029, 1033 (10th Cir. 1993) (distinguishing Brown by allowing sentencing under NSPA because defendant stole both software and hardware).
(66.) 18 U.S.C. [sections] 1905 (1994). There is only one reported decision under this statute. See United States v. Wallington, 889 F.2d 573 (5th Cir. 1989). Since the statute only provides for misdemeanor sanctions, it has not often been used to prosecute unauthorized disclosures. See Pooley, supra note 13, at 179.
(67.) See Pooley, supra note 13, at 179-80.
(68.) 18 U.S.C.A. [subsections] 1341, 1343 (1994).
(69.) The mail fraud statute is flexible since almost any use of the mall brings one under the statute's prohibitions. See Schmuck schmuck also shmuck
A clumsy or stupid person; an oaf.
[Yiddish shmok, penis, fool, probably from Polish smok, serpent, tail.]
Noun 1. v. United States, 489 U.S. 705, 710-11 (1989) (holding that use, of mail need not be essential part of scheme but only a "step in [the] plot").
(70.) For a more extensive discussion of the mail and wire fraud statutes, see the MAIL AND WIRE FRAUD article in this issue.
(71.) 18 U.S.C. [sections] 1346 (1994).
(72.) See United States v. Henry, 29 F.3d 112, 114 (3d Cir. 1994) (stating "[t]he statutes cover schemes to defraud another of intangible property, such as confidential business information").
(73.) See Sunbird sunbird, common name for tropical, Old World birds, including more than one hundred species in the family Nectariniidae. Like the unrelated New World hummingbirds, to which sunbirds are often compared, sunbirds have long and slender, highly curved bills, tube-shaped Air Serv., Inc. v. Beech Aircraft Corp., Civ. A. No. 89-2181-V, 1992 WL 135021, *4 (D. Kan. May 29, 1992) (rejecting motion to dismiss on grounds plaintiff failed to show victims were actually defrauded).
(74.) See Ginsburg v. United States, 909 F.2d 982, 991 (7th Cir. 1990) (finding "actual success of a scheme to defraud is not required for a mail fraud conviction").
(75.) See United States v. Dixon, 536 F.2d 1388, 1399 n. 11 (2d Cir. 1976) (requiting prosecution prove "some actual harm or injury was contemplated"); see also United States v. Von Barta, 635 F.2d 999, 1006 (2d Cir. 1980) (stating defendant must have intended to defraud), overruled on other grounds by Ingber v. Enzor, 841 F.2d 450 (2d Cir. 1988); United States v. Regent Office Supply Co., 421 F.2d 1174, 1181 (2d Cir. 1970) (stating that there must be showing of intended harm; misrepresentations amounting to deceit are not sufficient to constitute fraudulent intent).
(76.) FEDERAL PROSECUTION MANUAL, supra note 6, at 91-92; see also Abbott v. United States, 239 F.2d 310, 315 (5th Cir. 1956).
(77.) FEDERAL PROSECUTION MANUAL, supra note 6, at 92.
(78.) 18 U.S.C. [subsections] 1341, 1343 (1994); see also Pooley, supra note 13, at 186.
(79.) 18 U.S.C. [subsections] 1961-1968 (1994). For a full discussion of [subsections] 1961-1968, see the RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS article in this issue.
(80.) See Religious Tech. Ctr. v. Wollersheim, 796 F.2d 1076, 1084 (9th Cir. 1986) (recognizing civil RICO claims for trade secret theft; finding that injunctive relief not available in this RICO action).
(81.) 18 U.S.C. [sections] 1341 (1994).
(82.) 18 U.S.C. [sections] 1343 (1994).
(83.) 18 U.S.C. [sections] 2314 (1994).
(84.) 18 U.S.C. [sections] 2315 (1994).
(85.) There must be at least two predicate acts of racketeering activity to establish a pattern of racketeering activity. 18 U.S.C. [sections] 1961(5) (1994).
(86.) S.I. Handling Sys., Inc. v. Heisley, 658 F. Supp. 362, 377 (E.D. Pa. 1986).
(88.) Id. at 375.
(89.) Fleet Mgmt. Sys., Inc. v. Archer-Daniels-Midland Co., 627 F. Supp. 550, 559 (C.D. Ill. 1986). The suit alleged that the defendant had misappropriated mis·ap·pro·pri·ate
tr.v. mis·ap·pro·pri·at·ed, mis·ap·pro·pri·at·ing, mis·ap·pro·pri·ates
a. To appropriate wrongly: misappropriating the theories of social science. computer software, obtained by license from the plaintiff and then fraudulently misrepresented to plaintiff that it purged the software from its computer system in numerous mail and wire communications over the next two years. Id. at 552-53; see also H.J. Inc. v. Northwestern Bell Northwestern Bell Telephone Company served the states just north of the Southwestern Bell area, including: Iowa, Minnesota, South Dakota, North Dakota, and Nebraska. Tel. Co., 492 U.S. 229, 239 (1989) (stating at least two separate predicate acts of racketeering activity having continuity and relationship and posing threat of continued criminal activity are required to prove pattern of racketeering activity).
(90.) See ALA. CODE [sections] 13A-8-1 (1994) (theft and related offenses); ALASKA, A STAT. [subsections] 11.46.100 to 11.46.150, 11.46.990 (Michie 1996) (theft and related offenses); ARIZ ARIZ Arizona (old style) . REV. STAT. ANN. [subsections] 13-1801 to 13-1804 (West 1994) (theft); ARK. CODE ANN. [sections] 5-36-107 (Michie 1987 & Supp. 1993) (theft of trade secret); CAL. PENAL CODE [sections] 499C (Deering 1983 & Supp. 1996) (trade secrets, theft or unauthorized copying); COLO Colo Colorado (old style state abbreviation)
COLO Columbus, Ohio
COLO Colonial National Historic Park (US National Park Service)
COLO Cost Of Living Option . REV. STAT. [sections] 7-74-101 (1997) (uniform trade secrets act); CONN. GEN. STAT. ANN. [sections] 53a-124 (West 1993) (larceny in the third degree, class D felony); DEL. CODE ANN. tit. 11, [subsections] 841,857(4) (1995) (theft and related offenses); D.C. CODE ANN. [subsections] 48-501 to 48-510 (1997) (trade secrets); FLA. STAT. ANN. [sections] 812.081 (West 1994) (trade secrets, theft); GA. CODE ANN. [sections] 16-8-13 (1996) (theft of trade secrets); HAW. REV. STAT. [sections] 708-800 (1993 & Supp. 1997) (offenses against property rights); IDAHO CODE [subsections] 48-801 to 48-807 (1947) (Idaho trade secrets act); 720 ILL. COMP. STAT. 5/16-1 (1997) (theft and related offenses); IND. CODE [subsections] 24-2-3-1 to 24-2-3-8 (1998) (trade secrets); IOWA Iowa, state, United States
Iowa (ī`əwə), midwestern state in the N central United States. It is bounded by the Mississippi R. CODE [subsections] 550.1 to 550.8 (1997) (trade secrets); KAN. STAT. ANN. [subsections] 60-3320 to 60-3325 (1994) (trade secrets); Ky. REV. STAT. ANN. [subsections] 365.880 to 365.900 (Michie 1996) (uniform trade secrets act); LA. REV. STAT. ANN. [subsections] 51.1431 to 51.1439 (West 1987 & Supp. 1998) (uniform trade secrets act); ME. REV. STAT. ANN. tit. 17A [subsections] 351 to 353, 362 (West 1983 & Supp. 1998) (theft-consolidation); MD. CODE ANN., Commercial Law [subsections] 11-1201 to 11-1209 (1990 & Supp. 1997) (Maryland uniform trade secrets act); MASS. GEN. LAWS ch. 93, [sections] 42 (1994), ch. 266 [sections] 60A (1992) (crimes against property--stolen trade secrets); MICH v. i. 1. To lie hid; to skulk; to act, or carry one's self, sneakingly. . COMP. LAWS ANN. [subsections] 752.771 to 7:52.773 (West 1991) (penal code--trade secrets); MINN MINN Minnesota (old style) . STAT. [sections] 609.52 (1991 & Supp. 1998) (theft and related crime); Miss. CODE ANN. [subsections] 75-26-1 to 75-26-19 (1991 & Supp. 1997) (uniform trade secrets act); Mo. ANN. STAT. [sections] 570.010 (West 1994) (stealing and related offenses); MONT. CODE ANN. [subsections] 45-2-101, 45-6-302 (1992) (theft and related offenses); NEB. REV. STAT. [subsections] 87-501 to 87-507 (1995) (trade secrets act); NEY. REV. STAT. [subsections] 600A.010 to 600A. 100 (1997) (trade secrets (uniform act)); N.H. REV. STAT. ANN. [subsections] 637:1 to 637:11 (1996) (criminal code: theft); N.J. STAT. ANN. [sections] 2C:20-1 (West 1995) (theft and related offenses); N.M. STAT. ANN. [sections] 57-3A- (Michie 1996) (larceny); N.Y. PENAL LAW [sections] 155.00 (McKinney 1984 & Supp. 1998) (offenses involving theft: larceny); N.C. GEN. STAT. [sections] 14-75.1 (1993) (offenses against property: larceny); N.D. CENT. CODE [subsections] 47-25.1- 01 to 47-25.1-08 (Supp. 1993) (trade secrets); Omo REV. CODE ANN. [sections] 2913.01 (Anderson 1996) (theft and fraud); OKLA OKLA Oklahoma (old style) . STAT. ANN. tit. 21, [sections] 1732 (West 1983 & Supp. 1998) (larceny of trade secrets); OR. REV. STAT. [sections] 164.015 (1995) (offenses against property); 18 PA. CONS. STAT. [sections] 3930 (1995 & Supp. 1997) (theft of trade secrets); R.I. GEN. LAWS [sections] 11-41-1 (1994 & Supp. 1996) (stealing as larceny); S.C. CODE ANN. [sections] 16-13-30 (Law Co-op. Supp. 1996) (petit larceny A form of larceny—the stealing of another's personal property—in which the value of the property taken is generally less than $50.
At Common Law, the penalty for the offense was whipping or some other Corporal Punishment. , grand larceny); S.D. CODIFIED LAWS ANN. [subsections] 22-1-2, 22-30A-1 to 22-30A-3 (Michie 1998) (theft); TENN TENN Tennessee (old style)
TENN Tetranitroapthalene (Explosive) . CODE ANN. [sections] 39-14-138 (1997) (theft of trade secrets); TEX. PENAL CODE ANN. [sections] 31.05 (West 1994 & Supp. 1998) (theft of trade secrets); UTAH Utah, state, United States
Utah (y`tä'), Rocky Mt. state of the W United States. CODE ANN. [subsections] 76-6-401, 76-6-404 (1953 & Supp. 1998) (theft); VT. STAT. ANN. tit. 13, [subsections] 2501 to 2502 (Supp. 1996) (grand larceny); V.I. CODE ANN. tit. 14, [sections] 1665 (1974) (disclosure of trade secret by government employee); VA. CODE ANN. [sections] 18.2-95 (Michie Supp. 1996) (grand larceny defined; how punished); WASH. REV. CODE [sections] 19.108.010 (1996) (theft and robbery); W. VA. CODE [sections] 61-3-13 (1997) (grand and petit larceny); Wis. STAT. ANN. [sections] 943.205 (West 1996) (theft of trade secrets); WYO WYO Wyoming (old style)
WYO Write Your Own . STAT. [subsections] 6-3-401 to 6-3-403, 6-3-502 (1997) (larceny and related offenses); see also Linda B. Samuels & Bryan K. Johnson, The Uniform Trade Secrets Act: The States' Response, 24 CREIGHTON L. REV. 49 (1990).
(91.) For examples of state codes specifically addressing trade secrets, see COLO. REV. STAT. [sections] 7-74-101 (1997) (uniform trade secrets act), FLA. STAT. ANN. [sections] 812.081 (West 1994), and Omar. STAT. ANN. tit. 21, [sections] 1732 (West 1983 & Supp. 1998).
(92.) For examples of state codes using the general theft statutes to cover theft of trade secrets, see N.H. REV. STAT. ANN. [subsections] 637:1 to 637:3 (1996) and UTAH CODE ANN. [subsections] 76-6-401, 76-4-404 (1953 & Supp. 1998).
(93.) For examples of state code requiting tangible items to cover theft of trade secrets, see GA. CODE ANN. [sections] 16-8-13 (1996), MICH. COMP. LAWS ANN. [subsections] 752.771 to 752.773 (West 1991), and TENN. CODE ANN. [sections] 39-3-1126 (1997).
(94.) See H.R. REP. No. 104-556, at 2 (1996), reprinted in 1996 U.S.C.C.A.N. 1074, 1075 [hereinafter "ANTICOUNTERFEITING HOUSE REPORT"].
(95.) 18 U.S.C. [sections] 2320(d)(1)(A) (1994).
(96.) See United States v. Sultan, 115 F.3d 321, 325 (5th Cir. 1997) (presenting requirements for prosecuting criminal trademark counterfeiting offense); United States v. Torkington, 812 F.2d 1347, 1349 (11th Cir. 1987) (explaining the requirement that counterfeit mark must be likely to cause confusion among prospective purchasers).
(97.) 18 U.S.C. [sections] 2320 (1994).
(98.) See United States v. Baker United States v. Baker was a case brought against University of Michigan undergraduate Jake Baker related to several incidents regarding snuff stories that he wrote while he was a student at the University of Michigan. Baker was charged with violation of 18 U.S.C. , 807 F.2d 427, 429 (5th Cir. 1986) (relying on legislative history to show that criminal intent is not required).
(99.) FEDERAL PROSECUTION MANUAL, supra note 6, at 56.
(100.) 15 U.S.C. [sections] 1051 (1994).
(101.) FEDERAL PROSECUTION MANUAL, supra note 6, at 59.
(102.) 18 U.S.C. [sections] 2320(a) (1994).
(103.) 18 U.S.C. [sections] 2320(a) (1994). Repeat offenders, whether individuals or organizations, will receive harsher penalties. Id.
(104.) United States Dep't of Justice, FBI Releases First Results of Nationwide Crack Down on Criminal Trademark and Copyright Fraud, 1997 WL 230122.
(107.) See 18 U.S.C. [sections] 1956(c)(7)(D) (1994).
(108.) Pub. L. 104-153, [sections] 3, 110 Stat. 1386 (1996) (amending 18 U.S.C. [sections] 1961(1)(B)).
(109.) ANTICOUNTERFEITING HOUSE REPORT, supra note 94, at 3-4 (1996).
(110.) FEDERAL PROSECUTION MANUAL, supra note 6, at 61.
(111.) ANTICOUNTERFEITING HOUSE REPORT, supra note 94, at 6.
(112.) 18 U.S.C. [sections] 1963(a) (1994).
(113.) 18 U.S.C. [sections] 1956(a)(1) (1994).
(114.) ANTICOUNTERFEITING HOUSE REPORT, supra note 94, at 7.
(115.) U.S. CONST CONST Construction
CONST Under Construction
CONST Commission for Constitutional Affairs and European Governance (COR) . art. I, [sections] 8, cl. 8. Congress shall have the power "[t]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.... "Id.
(116.) See, e.g., United States v. LaMacchia, 871 F. Supp. 535, 539 (D. Mass. 1994) (requiring commercial exploitation for the criminal offense of software piracy). See generally Mary Jane Saunders, Criminal Copyright Infringement and the Copyright Felony Act, 71 DENy. U. L. REV. 671, 672 (1994) (discussing requirements for criminal copyright infringement); Robert A. Spanner, The Brave New World Brave New World
Aldous Huxley’s grim picture of the future, where scientific and social developments have turned life into a tragic travesty. [Br. Lit.: Magill I, 79]
See : Dystopia
Brave New World of Criminal Software Infringement Prosecutions, COMPUTER LAW, Nov. 1995, at 1 (discussing various factors involved in criminal software prosecutions); Kent Walker, Federal Criminal Remedies for the Theft of Intellectual Property, 16 HASTINGS COMM. & ENT ENT ears, nose, and throat (otorhinolaryngology).
ear, nose, and throat
ear, nose and throat.
ENT Ears, nose & throat; formally, otorhinolaryngology . L.J. 681 (1994) (presenting U.S. Attorney's view on factors for prosecuting high-technology crime as distinguished from civil infringement).
(117.) See LaMacchia, 871 F. Supp. at 539-40 (discussing history of criminal copyright law); FEDERAL PROSECUTION MANUAL, supra note 6, at 17-39 (describing the criminal copyright statute); Saunders, supra note 116, at 679-80 (same).
(118.) Copyright Act of 1976, Pub. L. No. 94-553, 90 Stat. 2541 (codified as amended at 17 U.S.C. [sections] 506(a) (1994)).
(119.) Act of May 24, 1982, Pub. L. No. 97-180, 96 Stat. 9 (codified at 18 U.S.C. [sections] 2319 (1994)). While certain acts of criminal copyright infringement were defined as felonies, most infringements remained misdemeanor offenses. 18 U.S.C. [sections] 2319 (1994).
(120.) Pub. L. No. 102-561, 106 Stat. 4233 (codified as amended at 18 U.S.C. [sections] 2319(b)-(c) (1994)). For an in-depth discussion of the legislative history of the Copyright Felony Act, see Saunders, supra note 116, at 679-80.
(121.) For a discussion of what constitutes copyright infringement of computer software, compare MAI MAI Mail (File Name Extension)
MAI Multilateral Agreement on Investment
MAI Maius (Latin: May)
MAI Ministerul Administratiei si Internelor (Romanian) Sys. Corp. v. Peak Computer, Inc., 991 F.2d 511, 518-19 (9th Cir. 1993) (asserting that "copying" occurs even when a copyrighted program is temporarily loaded into a computer's RAM (random access memory)), with Stenograph, LLC (Logical Link Control) See "LANs" under data link protocol.
LLC - Logical Link Control v. Bossard Assoc. Inc., 144 F.3d 96 (D.C. Cir. 1998) (exploring alternative installation standard for copying). See also Religious Tech. Ctr. v. Netcom On-Line Communication Servs., Inc., 907 F. Supp. 1361, 1368-73 (N.D. Cal. 1995) (holding Internet provider Internet provider - Internet Service Provider not liable for copyrighted material loaded onto computer by third party when provider lacked knowledge that material was copyrighted).
(122.) For a comparison of the old and revised statute, see Carl H. Loewenson, Jr. & Martha E. Nelson, Congress Toughens Criminal Copyright Law, N.Y.L.J., Nov. 13, 1992, at 1.
(123.) 18 U.S.C. [sections] 2319 (1994). Under the 1992 Act, felony sanctions applied to ten or more copies made within a 180 day period, with a retail value more than $2,500. 18 U.S.C. [sections] 2319 (1994).
(124.) 17 U.S.C. [sections] 506(a) (1994).
(125.) No Electronic Theft (NET) Act of 1997, Pub. L. No. 105-147, 111 Stat. 2678 (1997) (amending 17 U.S.C. [subsections] 506, 507, 18 U.S.C. [subsections] 2319, 2319A, 2320).
(126.) NET Act of 1997, [sections] 2(b) (amending 17 U.S.C. 8 506(a)).
(127.) See H.R. REP. No. 105-339, at 3-5 (1997) (describing legislative justifications for removal of "financial gain" requirement for criminal copyright infringement). But see Wendy M. Grossman, Cyber View: Downloading As a Crime, Sci. AM., Mar. 1998, at 37 (criticizing NET Act for absence of fair-use exemptions).
(128.) The section also provides for forfeiture, seizure and destruction of such unauthorized recordings, and encompasses the distribution in the United States of copies of unauthorized recordings made outside the United States. 18 U.S.C. [sections] 2319A(b)-(c) (1994).
(129.) 17 U.S.C. [sections] 506(c)-(d) amended by Pub. L. No. 105-147, [sections] 2(b), 111 Stat. 2678 (1997).
(130.) 18 U.S.C. [sections] 2319A(a) (1994). Section 2319A(a) states in relevant part:
Whoever, without the consent of the performer or performers involved, knowingly and for purposes of commercial advantage or private financial gain-- (1) fixes the sounds or sounds and images of a live musical performance in a copy or phono-record, or reproduces copies or phonorecords of such a performance from an unauthorized fixation; (2) transmits or otherwise communicates to the public the sounds or sounds and images of a live musical performance; or (3) distributes or offers to distribute, sells or offers to sell, rents or offers to rent, or traffics in any copy or phonorecord fixed as described in paragraph (1), regardless of whether the fixations occurred in the United States ...
Id.; see also FEDERAL PROSECUTION MANUAL, supra note 6, at 40.
(131.) See United States v. Larracuente, 952 F.2d 672, 673 (2d Cir. 1992) (holding that infringement can be proven by evidence of a valid copyright plus copying).
(132.) See United States v. Cohen cohen
(Hebrew: “priest”) Jewish priest descended from Zadok (a descendant of Aaron), priest at the First Temple of Jerusalem. The biblical priesthood was hereditary and male. , 946 F.2d 430 (6th Cir. 1991) (upholding a conviction of criminal copyright infringement supported by circumstantial evidence circumstantial evidence
In law, evidence that is drawn not from direct observation of a fact at issue but from events or circumstances that surround it. If a witness arrives at a crime scene seconds after hearing a gunshot to find someone standing over a corpse and holding a ); Saunders, supra note 116, at 682-85 (discussing methods of proving first element of offense).
(133.) See Smith v. Jackson, 84 F.3d 1213, 1218 (9th Cir. 1996) (discussing extrinsic and intrinsic prongs of substantial similarity test).
(134.) For a comparison of the virtual identity and substantial similarity tests for infringement, see Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435 (9th Cir. 1994). Virtual identity may be a more useful standard for determining infringement in the case of "reverse engineering," whereby programmers dissect legally obtained software and then instruct a third set of programmers on functional requirements of the software, thus creating "virtually identical" software programs which are not exact copies of one another.
(135.) 823 F.2d 316 (9th Cir. 1987)
(136.) Id. at 319.
(137.) See Hartman v. Hallmark Cards, Inc., 833 F.2d 117, 120 (8th Cir. 1987) (applying two-prong test to copyrighted graphics); Cooling Sys. & Flexibles, Inc. v. Stuart Radiator, Inc., 777 F.2d 485,493 (9th Cir. 1985) (explaining that extrinsic test can be decided as matter of law, while intrinsic test is a question of fact). See generally Saunders, supra note 116, at 499 (discussing approaches by various courts to showing of extrinsic and intrinsic similarities of original work and alleged copy).
(138.) McCulloch, 823 F.2d at 319.
(139.) See Apple Computer, 35 F. 3d at 1441-47 (describing court's proper dissection dissection /dis·sec·tion/ (di-sek´shun)
1. the act of dissecting.
2. a part or whole of an organism prepared by dissecting. of the Microsoft graphical user interface graphical user interface (GUI)
Computer display format that allows the user to select commands, call up files, start programs, and do other routine tasks by using a mouse to point to pictorial symbols (icons) or lists of menu choices on the screen as opposed to having to (GUI (Graphical User Interface) A graphics-based user interface that incorporates movable windows, icons and a mouse. The ability to resize application windows and change style and size of fonts are the significant advantages of a GUI vs. a character-based interface. ) into protectable and unprotectable components for purposes of evaluating substantial similarity); Lotus Dev. Corp. v. Paperback Software Int'l, 740 F. Supp. 37, 67 (D. Mass. 1990) (stating that only those components that are copyrightable should be analyzed). But see Atari Games Atari Games Corporation was an American producer of arcade games, and originally part of Atari Inc. History
When, in 1984, Warner Communications sold the Atari Consumer division of Atari Inc. Corp. v. Oman, 888 F.2d 878, 882 (D.C. Cir. 1989) (declaring that sequence of frames in computer game must be analyzed as a whole and not on a component-by-component basis).
(140.) See United States v. Moore, 604 F.2d 1228, 1235 (9th Cir. 1979) (holding that government may establish criminal infringement by proving that defendants distributed copyrighted sound recordings; it is not necessary to prove defendants both reproduced and distributed infringing recordings).
(141.) See United States v. Morison, 844 F. 2d 1057, 1071 (4th Cir. 1988) (establishing willful to mean that defendant knowingly did an illegal act); United States v. Cross, 816 F.2d 297, 303 (7th Cir. 1987) (asserting that defendant must act with the knowledge that his activity is illegal); United States v. Heilman, 614 F.2d 1133, 1137 (7th Cir. 1980) (finding willful infringement of copyright Noun 1. infringement of copyright - a violation of the rights secured by a copyright
plagiarisation, plagiarization, piracy, plagiarism - the act of plagiarizing; taking someone's words or ideas as if they were your own when defendant knew material was copyrighted); Saunders, supra note 116, at 688 (comparing majority and minority rules); cf. United States v. Manzer, 69 F.3d 222, 226 (8th Cir. 1995) (declaring that government need only prove intent to defraud, and not intent to break the law, but must go beyond proof of merely intent to copy).
(142.) See United States v. Hernandez, 952 F.2d 1110 (9th Cir. 1991) (holding that defendant had requisite intent to join conspiracy to infringe because he had control over tapes, had shown others how to duplicate tapes, and had transported tapes from production site to storage unit); United States v. Backer, 134 F.2d 533 (2d Cir. 1943) (holding that defendant unlawfully gave orders to make copies closely resembling copyrighted work without causing "copyright trouble"); Saunders, supra note 116, at 688 (comparing majority and minority rules).
(143.) See Cross, 816 F.2d at 301 (holding that fact that copies were not sold for money was irrelevant where hope of gain existed) (citing Moore, 604 F.2d at 1235); see also United States v. Moran, 757 F. Supp. 1046, 1051 (D. Neb. 1991) (holding that defendant did not willfully violate copyright laws by creating copies of legally purchased video cassettes and renting those copies while retaining originals to guard against theft, based on testimony that he never simultaneously rented both copy and original).
(144.) Pub. L. No. 105-147, [sections] 2(b), 111 Stat. 2678 (1997) (amending 17 U.S.C. [sections] 506(a)).
(145.) Section 109(a) provides: "the owner of a particular copy ... lawfully made under this rifle, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy" 17 U.S.C. [sections] 109(a) (1994).
(146.) Id. There must have been a lawful original sale of the work for the first sale doctrine to apply. See United States v. Larracuente, 952 F.2d 672, 673 (2d Cir. 1992) (shifting burden to government to prove copies not legally made nor owned by defendant after defendant has met production burden of [sections] 109 defense); United States v. Cohen, 946 F.2d 430, 433 (6th Cir. 1991) (requiting lawful sale to invoke first sale doctrine); United States v. Drum, 733 F.2d 1503, 1507 (8th Cir. 1984) (stating that government may prove absence of first sale either by evidence of source of the recordings, or by evidence that recordings were never authorized); Microsoft Corp. v. Harmony Computers & Elecs., 846 F. Supp. 208, 212 (E.D.N.Y. 1994) (holding that entering license agreement is not a "sale"). But see ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1453-55 (7th Cir. 1996) (holding "shrinkwrap" license, a package label limiting use of work, enforceable under state contract law, while not creating exclusive rights otherwise preempted by Copyright Act).
(147.) Sebastian Int'l, Inc. v. Consumer Contacts (PTY Pty Austral & S African Proprietary ) Ltd., 847 F.2d 1093, 1099 (3d Cir. 1988). A district court in the Third Circuit has held that if copies of a work are lawfully made, but their distribution in the United States would infringe on a United States copyright owner's exclusive rights, then the mere act of importation constitutes a violation. T.B. Harms Co. v. Jem Records, Inc., 655 F. Supp. 1575, 1579 (D.N.J, 1987).
(148.) See L'anza Research Int'l, Inc. v. Quality King Distribs., Inc., 98 F.3d 1109, 1117 (9th Cir. 1996) (holding that the first sale doctrine, under 17 U.S.C. [sections] 109(a), does not bar defendant's liability under 17 U.S.C. [sections] 602(a) for re-importation of infringing goods lawfully sold abroad), rev'd, 118 S. Ct. 1125 (1998); see also BMG BMG Bundesministerium für Gesundheit (Germand: Federal Ministry for Health)
BMG Be My Girl
BMG Blue Man Group
BMG Bertelsmann Music Group
BMG Be My Guest
BMG Browning Machine Gun
BMG Bulk Metallic Glass Music v. Perez, 952 F.2d 318, 319 (9th Cir. 1991) (stating that first sale doctrine does not provide defense to infringement by goods manufactured abroad). Interestingly, both L'anza and Sebastian involved hair-care products: the asserted copyright interest was in the bottle labels.
(149.) 118 S. Ct. 1125 (1998).
(150.) Id. at 1134 ("The whole point of the first sale doctrine is that once the copyright owner places a copyrighted item in the stream of commerce by selling it, he has exhausted his exclusive statutory right to control its distribution."). However, the Supreme Court did not address "cases in which the allegedly infringing imports were manufactured abroad." Id. at 1135 (Ginsburg, J., concurring). See generally Joan Biskupic, Court Lets Discounters Keep Selling U.S.-Made Goods They Buy Overseas, WASH. POST, Mar. 10, 1998, at A7 (noting concerns by U.S. manufacturers, including software and recording industries, that this decision would legitimize le·git·i·mize
tr.v. le·git·i·mized, le·git·i·miz·ing, le·git·i·miz·es
le·git the multi-billion dollar "gray market" industry which undercuts their domestic marketing).
(151.) See Dr. Seuss Noun 1. Dr. Seuss - United States writer of children's books (1904-1991)
Geisel, Theodor Seuss Geisel Enters., L.P.v. Penguin Books USA, Inc., 109 F.3d 1394, 1399 (9th Cir. 1997) (applying the four elements of the fair use doctrine).
(152.) See Campbell v. Acuff-Rose Music Acuff-Rose Music was an American music publishing firm headquartered in Nashville, Tennessee.
Acuff-Rose was formed by country music performer Roy Acuff and Fred Rose, a major Nashville music-industry figure who had a respected ability as a talent scout. , Inc., 510 U.S. 569 (1994) (finding that song which would otherwise infringe on copyright was fair use as parody); Leibovitz v. Paramount Pictures Corp., 948 F. Supp. 1214, 1219 (S.D.N.Y. 1996), aff'd, 137 F.3d 109 (2d Cir. 1998) (rejecting claim that all commercial use of protected elements of copyrighted work is de facto [Latin, In fact.] In fact, in deed, actually.
This phrase is used to characterize an officer, a government, a past action, or a state of affairs that must be accepted for all practical purposes, but is illegal or illegitimate. infringement).
(153.) Leibovitz, 948 F. Supp. at 1221-24.
(154.) See Atari, Inc. v. North Am. Philips Consumer Elecs. Corp., 672 F.2d 607, 616-19 (7th Cir. 1996) (describing doctrine); Smith v. Jackson, 84 F.3d 1213, 1218-19 (9th Cir. 1996) (same).
(155.) See McDonald v. Multimedia Entertainment, Inc., 20 U.S.P.Q. 2d (BNA BNA Bureau of National Affairs, Inc.
BNA Birds of North America
BNA block numbering area (US Census)
BNA British North America
BNA Banco Nacional de Angola (National Bank of Angola) ) 1372 (S.D.N.Y. 1991) (finding that single musical note or three-note sequence is too common to receive protection). See generally WILLIAM PATRY, THE FAIR USE PRIVILEGE IN COPYRIGHT LAW 63-64, 465-66 (1985).
(156.) See PATRY, supra note 155, at 468-77.
(157.) See, e.g., Computer Assoc. Int'l, Inc. v. Altai, Inc., 982 F.2d 693 (2d. Cir. 1992).
(158.) See Sega Enterprises, Ltd. v. Accolade, Inc., 977 F.2d 1510, 1514 (9th Cir. 1993) (holding that reverse engineering undertaken for legitimate purpose is "as a matter of law a fair use of the copyrighted work"). But see Atari Games Corp. v. Nintendo of America, Inc., 975 F.2d 832, 843 (Fed. Cir. 1992) ("The fair use reproductions of a computer program must not exceed what is necessary to understand the unprotected elements of the work.").
(159.) 473 U.S. 207 (1985).
(160.) 18 U.S.C. [sections] 2314 (1994).
(161.) See Dowling at 216. The defendants in Dowling taped, without authorization, commercially unreleased Elvis Presley performances and produced record albums. Id. at 214. The Supreme Court, citing the Copyright Act, concluded that Congress had not intended for the National Stolen Property Act to apply to copyright infringement. Id. at 221-27.
(162.) See, e.g., United States v. Belmont, 715 F.2d 459, 461 (9th Cir. 1983) (applying Act to interstate transportation of "off the air" copies of motion pictures); United States v. Drebin, 557 F.2d 1316, 1328 (9th Cir. 1977) (holding that copies of copyrighted motion pictures constitute goods, wares or merchandise, and thus fall within the meaning of the Act).
(163.) 18 U.S.C. [subsections] 1341, 1343 (1994).
(164.) See, e.g., United States v. Manzer, 69 F.3d 222, 229 (8th Cir. 1994) (using mail and telephone to sell unauthorized satellite decryption (cryptography) decryption - Any procedure used in cryptography to convert ciphertext (encrypted data) into plaintext. equipment); United States v. Shultz, 482 F.2d 1179, 1182 (6th Cir. 1973) (using mails to sell counterfeit sound recordings); Cooper v. United States, 639 F. Supp. 176, 180 (M.D. Fla. 1986) (using wires, specifically telephones, to distribute thousands of pirated sound recordings).
(165.) United States v. Wang, 898 F. Supp. 758, 760 (D. Colo. 1995).
(167.) 18 U.S.C. [subsections] 1961-1968 (1994).
(168.) See generally supra Part II.E. of this Article (discussing RICO); cf. United States v. Drum, 733 F.2d 1503, 1506 (11th Cir. 1981) (applying RICO to charges arising out of sound recording copyright infringement business); United States v. Sam Goody Sam Goody is a music and entertainment retailer in the United States and formerly in the United Kingdom. It is owned and operated by Musicland, which itself is owned by former rival Trans World Entertainment which also runs Suncoast Motion Picture Company and, until January 2006, , Inc., 506 F. Supp. 380 (E.D.N.Y. 1981) (holding that repeat copyright infringers who satisfied RICO criteria could not avoid prosecution on the grounds they were not members of organized crime because RICO applies to any enterprise, both legal and illegal).
(169.) Pub. L. 104-153, [sections] 3, 110 Stat. 1386 (1996), (amending 18 U.S.C. [sections] 1961(1)).
(170.) 18 U.S.C.A. [sections] 1956(c)(7)(D) (Supp. 1998). For a further discussion of this statute, see the MONEY LAUNDERING article in this issue.
(171.) H.R. 2652, 105th Cong. (1997).
(172.) Id., [sections] 1201; see also 143 CONG. REC. E2000 (daily ed. Oct. 9, 1997) (introductory remarks of Rep. Coble co·ble
1. Nautical A small flatbottom fishing boat with a lugsail on a raking mast.
2. Scots A kind of flatbottom rowboat. ).
(173.) H.R. 2652, 105th Cong. [sections] 1207(a).
(174.) 144 Cong. Rec. H3398-01.
(175.) 1997 US S.B. 2291 (SN)
(176.) H.R. 351, 104th Cong. (1996).
(177.) See Julius J. Marke, Database Protection Acts and the 105th Congress, N.Y.L.J., Mar. 18, 1997, at 5 (raising concerns that such legislation would (1) overrule The refusal by a judge to sustain an objection set forth by an attorney during a trial, such as an objection to a particular question posed to a witness. To make void, annul, supersede, or reject through a subsequent decision or action. Feist feist also fice
n. Chiefly Southern U.S.
A small mongrel dog.
[Variant of obsolete fist, short for fisting dog, from Middle English fisting, Publications, Inc. v. Rural Telephone Serv. Co., 499 U.S. 340 (1991); (2) protect factual data beyond scope traditionally contemplated by Congress and Supreme Court; (3) provide renewable terms amounting to perpetual copyright Perpetual copyright refers to a copyright which does not expire. In general, copyright on all works not having special legislation in their favour expires after a certain number years, usually dependent on the author's date of death. ; and (4) create government monopolies over information).
(178.) See Legislation: Copyright Reforms Passed, But Major Patent Bill Is in Limbo as Session Ends, PAT., TRADEMARK & COPYRIGHT J. (BNA), at 101 (Dec. 4, 1997) (noting bill's potential delay due to researchers' concern that new database protection could hinder access to traditionally public information).
(179.) For a general overview of the elements of the criminal copyright offense, see supra Part IV.A.1. of this article.
(180.) Pub. L. No. 94-553, [sections] 101, 90 Stat. 2541-2589 (codified as amended in scattered sections of 17 U.S.C.).
(181.) 17 U.S.C. [sections] 101 (1994). The 1980 amendment to the 1976 Act places computer programs within the category of protected "literary works." Computer databases are also included in the category of "literary works." See H.R. REP. No. 94-1476, at 54, reprinted in 1976 U.S.C.C.A.N. 5659, 5667 (1975).
(182.) See Playboy Enter., Inc. v. Frena fre·na
A plural of frenum. , 839 F. Supp. 1552, 1555 (M.D. Fla. 1993) (recognizing full copyright protection for digitized magazine pictures).
(183.) See Frank Music Corp. v. CompuServe Inc., C.A. No. 93 Civ. 8153 (JFK) (S.D.N.Y. Dec. 19, 1995). In an out-of-court settlement, defendant CompuServe agreed to compensate music publishers for prior use of the copyrighted songs. CompuServe also guaranteed that its music bulletin board managers would obtain licensing agreements for the future use of any copyrighted material, as well as pay royalties to the copyright holders. Matthew Goldstein Dr. Matthew Goldstein is the current chancellor of the City University of New York (CUNY). He was appointed Chancellor effective September 1, 1999. Dr. Goldstein is the first City University graduate to head the University, having received his undergraduate degree from City College. , Accord Ends On-Line Suit Over Music, N.Y.L.J., Nov. 8, 1995, at 1; see also Alan J. Hartnick, 1st Mechanical License in Cyberspace, N.Y.L.J., Feb. 16, 1996, at 5 (discussing need for such licenses to protect copyrighted works).
(184.) The "Internet" refers to the on-line world and is used interchangeably with "cyberspace" and "Web." It is described as "an international network of interconnected computers" from which any number of users may access a "wide variety of communication and information retrieval information retrieval
Recovery of information, especially in a database stored in a computer. Two main approaches are matching words in the query against the database index (keyword searching) and traversing the database using hypertext or hypermedia links. methods." See Reno v. American Civil Liberties Union Reno v. American Civil Liberties Union, 521 U.S. 844 (1997), is a United States Supreme Court case, in which 7 of the 9 Justices of the Court voted to strike down anti-obscenity provisions of the Communications Decency Act (the "CDA"), finding they violated the freedom of , 117 S. Ct. 2329, 2334 (1997) (explaining and adopting Internet terminology).
(185.) 18 U.S.C. [sections] 2319 (1994). Infringement of ten copies or phonorecords of one or more copyrighted works valued at more than $2,500 carries a maximum sentence of three years for a first offense and six for a second offense. Infringement of one or more copies or phonorecords which have a total retail value of more than $1,000 carries a maximum sentence of one year. 18 U.S.C. [sections] 2319(b) (1994) amended by Pub. L. No. 105-47, [sections] 2(d), 111 Stat. 2678, 2679 (1997).
(186.) 18 U.S.C. [subsections] 2319, 2319A(1994).
(187.) The White House created the National Information Infrastructure Task Force ("IITF IITF - Information Infrastructure Task Force ") in February 1992 to investigate regulatory needs for the on-line word. The IITF then formed the Working Group on Intellectual Property to examine the intellectual property implications of the National Information Infrastructure ("NII (National Information Infrastructure) The U.S. government's policy for managing advanced technology in the country. The Clinton/Gore administration (1993-2001) was very enthusiastic about the Internet and proposed that it should be funded by private industry and be "). On July 7, 1994, the Working Group released a preliminary draft of its report, known as the "Green Paper." Following testimony and public comments on this draft, the Working Group released in September 1995 a final version of the report, known as the "White Paper." Its main finding was that "with no more than minor clarification and limited amendment the Copyright Act will provide the necessary balance of protection of rights." WORKING GROUP ON INTELLECTUAL PROPERTY RIGHTS, INTELLECTUAL PROPERTY AND THE NATIONAL INFORMATION INFRASTRUCTURE 17 (1995) [hereinafter "WHITE PAPER" ].
Several commentators have criticized the authors of the White Paper for overbreadth and lack of technical knowledge. See Andrew Grosso, Copyright and the Internet: A Footnote, A Sleight of Hand sleight of hand
n. pl. sleights of hand
1. A trick or set of tricks performed by a juggler or magician so quickly and deftly that the manner of execution cannot be observed; legerdemain.
2. , and a Call to Reason, FED. LAW., Jan. 1997, at 44 (arguing that White Paper definitions make "mere viewing" over the Interne in·terne
Variant of intern. unlawful); Joseph V. Myers III, Speaking Frankly About Copyright Infringement on Computer Bulletin Boards: Lessons to Be Learned from Frank Music, Netcom and the White Paper, 49 VAND. L. REV. 439, 450-62 (1996) (criticizing White Paper for overstating liability contemplated by Copyright Act and distinguishing display from reproduction with regard to on-line violations of the Act); Pamela Samuelson Pamela Samuelson is the Richard M. Sherman '74 Distinguished Professor of Law and Information Management at the University of California, Berkeley with a joint appointment in the UC Berkeley School of Information and Boalt Hall, the School of Law. , The Copyright Grab, 4.01 WIRED 135 (1996) (criticizing White Paper for misrepresenting judicial copyright precedent and extending copyright protection beyond traditional commercial applications); Pamela Samuelson, Intellectual Property Issues Raised by the National Information Infrastructure, PRACTISING LAW INSTITUTE Practising Law Institute (PLI) is a non-profit Continuing Legal Education (CLE) organization chartered by the Regents of the University of the State of New York, founded in 1933. 
"..., PATENTS, COPYRIGHTS, TRADEMARKS AND LITERARY PROPERTY COURSE HANDBOOK SERIES, 454 PLI/PAT 43, 48, 56-57 (1996); see also EDWARD A. CAVAZOS & GAVINO MORIN, CYBERSPACE AND THE LAW 48 (1994) (discussing copyright protection issues raised by Internet); LANCE ROSE, NETLAW 83 (1995) (arguing that United States intellectual property laws have evolved along with technology and can protect intellectual property rights of owners in cyberspace); Eric Schlachter, The Intellectual Property Renaissance in Cyberspace: Why Copyright Law Could Be Unimportant on the Internet, 12 BERKELEY TECH. L.J. 15, 32 (1997) (analyzing deficiencies of traditional copyright concepts with regard to Internet conventions and use).
(188.) See 17 U.S.C. [sections] 109(a) (1994) (allowing the owner of a "particular copy or phonorecord lawfully made ... or any person authorized by such owner" to, without copyright owner's authority, "sell or otherwise dispose of the possession of that copy or phonorecord").
(189.) Downloading is the act of retrieving or accessing any information over the Internet. By way of contrast, "uploading" denotes placing files onto a server from which they may be accessed by anyone browsing the Web.
(190.) If the downloader is the equivalent of a record buyer, then, just as the latter may legally turn around and resell her copy of the record, the former may resell whatever she downloaded. The difference between the two scenarios is that the record seller sacrifices her copy of the record, whereas the downloader likely retains a copy of what she downloaded. WHITE PAPER, supra note 187, at 95.
(191.) WHITE PAPER, supra note 187, at 95. Alternatively, copyright management systems can be used as a means for circumventing or monitoring subsequent use of downloaded programs. See Elizabeth Corcoran, Digital Information Protection Proposed; Device Would Stop Electronic Duplication, WASH. POST, Feb. 20, 1998, at G3 (noting concerns that such devices would not allow for fair use doctrine).
(192.) 17 U.S.C. [sections] 506(a) (1994) amended by Pub. L. No. 105-339, [sections] 2(b), 111 Stat. 2678 (1997).
(193.) 17 U.S.C. [sections 506(a) (1994) amended by Pub. L. No. 105-339, [sections] 2(b), 111 Stat. 2678 (1997).
(194.) In contrast, a finding of civil copyright vicarious liability The tort doctrine that imposes responsibility upon one person for the failure of another, with whom the person has a special relationship (such as Parent and Child, requires only that the defendant be in a position to control the use of the copyrighted works and had authorized such use without the owner's permission. Sony Corp. v Universal City Studios, Inc. 464 U.S. 417, 437 (1984). See generally MELVILLE B. NIMMER & DAVID NIMMER, NIMMER ON COPYRIGHT: A TREATISE ON THE LAW OF LITERARY, MUSIC AND ARTISTIC PROPERTY, AND THE PROTECTION OF IDEAS [sections] 12.04(A)(2)(a) (1997).
(195.) The entity that runs the on-line system or service.
(196.) See Sega Enter. Ltd. v. Maphia, No. CIV. A. 93-4262 CW, 1997 WL 337558, at * 1 (N.D. Cal. June 9, 1997) (permanently enjoining en·join
tr.v. en·joined, en·join·ing, en·joins
1. To direct or impose with authority and emphasis.
2. To prohibit or forbid. See Synonyms at forbid. BBS operator from "displaying, transferring or making available" copyrighted video games See video game console. illegally copied by persons using BBS, upon finding owner knowingly facilitated infringement); Sega Enter. Ltd. v. Maphia, 857 F. Supp. 679, 683 (N.D. Cal. 1994) (holding defendant Sysop liable because it operated electronic bulletin board to which users uploaded plaintiff's copyrighted games, while other users downloaded them, and defendant had specific knowledge of, and at times even solicited, infringing actions); Playboy Enter. v. Frena, 839 F. Supp. 1552, 1556-57 (M.D. Fla. 1993) (holding operator of computer BBS, which was accessible to customers for fee, liable for copyright infringement because users had downloaded plaintiff's unauthorized pictures); see also Playboy Enter. v. Russ Hardenburgh Inc., 982 F. Supp. 503, 511-12 (N.D. Ohio 1997) (collecting cases discussing direct or contributory infringement Contributory infringement may refer to:
infra prep. notes 199-202 and accompanying text (offering reasons why Sysops should not be held liable for infringing activity occurring on their networks).
(197.) 17 U.S.C. [sections] 506(a) (1994) amended by Pub. L. No. 105-339, [sections] 2(b) 111 Stat. 2678 (1997).
(198.) To hold a party liable for contributory infringement, the government must prove that the system provider induced, caused, or substantially contributed to the infringing conduct. Casella v. Morris, 820 F. 2d 362, 365 (11th Cir. 1987); see also NIMMER & NIMMER, supra note 194, [sections] 12.04(A)(2)(a).
(199.) See generally I. Trotter Hardy, The Proper Regime for "Cyberspace," 55 U. PITT. L. REV. 993 (1994) (analyzing whether on-line service providers ought to be exempt from liability or given a higher standard for liability if, for example, they are ignorant of, or unable to prevent, illegal behavior by users).
(200.) 907 F. Supp. 1361 (N.D. Cal. 1995).
(201.) See id. at 1374 (holding liability might exist where provider fails to remove infringing works after receiving notice of posting on network).
(202.) See id. at 1369. The On-Line Copyright Infringement Liability Limitation Act, H.R. 3209, 105th Cong. (1998) was introduced in February 1998 to codify codify to arrange and label a system of laws. Netcom and to overrule Playboy Enter. v. Frena, 839 F. Supp. 1552 (M.D. Fla. 1993) (discussed supra note 196); The act has since been signed into law. See infra notes 206-23 and accompanying text.
(203.) WHITE PAPER, supra note 187, at 228-29. The requirement led the Working Group to conclude that current copyright law is "insufficient to prevent flagrant fla·grant
1. Conspicuously bad, offensive, or reprehensible: a flagrant miscarriage of justice; flagrant cases of wrongdoing at the highest levels of government. See Usage Note at blatant.
2. copyright violations in the NII context." Id. at 127-28.
(204.) 871 F. Supp. 535 (D. Mass. 1994).
(205.) Id. at 537.
(206.) Pub. L. No. 105-339, [sections] 2(b), 111 Stat. 2678 (1997) (amending 17 U.S.C. [sections] 506(a)).
(207.) Pub. L. No. 105-339, [sections] 2(c), 111 Stat. 2678 (1997) (amending 17 U.S.C. [sections] 507(a)).
(208.) See David McCandless, Warez Wars, 5.04 WIRED 133, 134-35 (1997) (discussing business efforts to combat Warez Sites and Warez culture).
(209.) Id. at 135 ("Warez crackers, traders, and collectors don't pirate software to make a living: they pirate software because they can. The more the manufacturers harden a product with tricky serial numbers and anticopy systems, the more fun it becomes to break.").
(210.) See generally Brace G. Joseph, The New WIPO Copyright and Phonograms Treaties: Twenty-One Days in Geneva and the Return to Washington, in GLOBAL TRADEMARK AND COPYRIGHT: PROTECTING INTELLECTUAL PROPERTY RIGHTS IN THE INTERNATIONAL MARKETPLACE, 488 PLI/PAT 371 (1997) (describing outcome of WIPO meeting); Pamela Samuelson, The U.S. Digital Agenda at WIPO, 37 VA. J. INT'L L. 369 (1997) (same).
(211.) Religious Tech. Ctr. v. Netcom On-Line Communication Serv., Inc., 901 F. Supp. 1361, 1361 (N.D. Cal. 1995); see also supra notes 200-02 and accompanying text.
(212.) Digital Millennium Copyright Act The Digital Millennium Copyright Act (DMCA) is a United States copyright law which implements two 1996 WIPO treaties. It criminalizes production and dissemination of technology, devices, or services that are used to measures that control access to copyrighted works (commonly , Pub. L. No. 105-304, 112 Stat. 2877 (1998).
(213.) Pub. L. No. 105-304, 112 Stat. 2877 (1998) (amending 17 U.S.C. [sections] 511, adding [sections] 512.); H.R. 2180, 105th Cong., [sections] 2 (1997); see also Legislation: Bill Would Limit Liability for Infringement Occurring On-Line, Pat., Trademark & Copyright J. (BNA), at 231, 244-46 (July 24, 1997) (describing contents of and justification for H.R. 2180).
(214.) The statute defines a service provider, as used in subsection (a) of the statute, as "an entity offering the transmission, routing, or providing or connections for digital online communications, between or among points specified by a user, or material of the user's choosing, without modification to the content of the material as sent or received." 17 U.S.C. [sections] 512(k)(1)(A). For all other subsections in the statute "the term `service provider' means a provider of online services or network access, or the operator of facilities therefor, and includes an entity described in subparagraph (A)." 17 U.S.C. [sections] 512(k)(l)(B).
(215.) 17 U.S.C. [sections] 512(a) (1998). Such liability exemption will only apply, however, if:
(1) the transmission of the material was initiated by or at the direction of a person other than the service provider; (2) the transmission ... is carried out through an automatic technical process without selection by the service provider; (3) the service provider does not select the recipients of the material except as an automatic response to the request of another person; (4) no copy of the material made by the service provider ... is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients ... for a longer period that is reasonably necessary for the transmission; (5) the material is transmitted through the system or network without modification of its content.
17 U.S.C.A. [sections] 512(a) (West Supp. 1998).
(216.) 17 U.S.C.A. [sections] 512(c)(1)(A)(i), (ii), (c)(1)(B) (West Supp. 1998).
(217.) 17 U.S.C. [sections] 512(c)(1)(A)(iii), (c)(1)(C) (1998). However such limitations on liability are contingent upon Adj. 1. contingent upon - determined by conditions or circumstances that follow; "arms sales contingent on the approval of congress"
contingent on, dependant on, dependant upon, dependent on, dependent upon, depending on, contingent the provider's designation of an agent to receive notifications of such infringement and making contact information available through its service. 17 U.S.C.A. [sections] 512(c)(2) (West Supp. 1998).
(218.) 17 U.S.C.A. [sections] 512(0(1), (2) (West Supp. 1998).
(219.) See 17 U.S.C.A. [sections] 512(g)(2) (West Supp. 1998) (discussing an exception under which a service provider could be liable for taking down material).
(220.) 17 U.S.C.A. [sections] 512(g)(1) (West Supp. 1998).
(221.) 17 U.S.C.A. [sections] 512(e) (West Supp. 1998).
(222.) 17 U.S.C.A. [sections] 512(h) (West Supp. 1998).
(223.) 17 U.S.C.A. [sections] 5120) (West Supp. 1998).
(224.) 35 U.S.C. [sections] 292 (1998); see also Boyd v. Schildkrant Giftware Corp., 936 F.2d 76, 79 (2d Cir. 1991) (finding that impermissibly im·per·mis·si·ble
Not permitted; not permissible: impermissible behavior.
im placing patent number on product by mistake does not constitute violation of false patent marking statute); cf. Arcadia Mach. & Tool v. Sturm, Ruger & Co., 786 F.2d 1124, 1125 (Fed. Cir. 1986) (holding that label declaring contents of package "may be manufactured under" one or more listed patents or pending applications did not violate false patent marking statute when box was used for various models).
(225.) Filmon Process Corp. v. Spell-Right Corp., 404 F.2d 1351, 1355 (D.C. Cir. 1968).
(226.) 35 U.S.C. [sections] 292(a) (1994).
(227.) 35 U.S.C. [sections] 292(a) (1994).
(228.) 35 U.S.C. [sections] 292(a) (1994); see also Boyd, 936 F.2d at 79 (holding that cosmetic compact case manufacturer who misunderstood instructions to delete reference of patent holder's patent number and shipped compacts with holder's number had not intended to deceive). But see Johnston v. Textron, Inc., 579 F. Supp. 783, 795-96 (D.R.I.), aff'd, 758 F.2d 666 (1984) (finding use of word "patented" in connection with radio advertising of unpatented article after being notified by patent holder of such false marking activity violated statute).
(229.) 18 U.S.C. [sections] 497 (1994).
(230.) 18 U.S.C. [sections] 497 (1994).
(231.) 18 U.S.C. [sections] 2314 (1994).
(232.) 473 U.S. 207 (1985).
(233.) Id. at 227; see also United States v. LaMacchia, 871 F. Supp. 535,537 (D. Mass. 1994) ("Dowling is a narrower case than [defendant] would have it, and holds only that copyright infringement does not satisfy the physical `taking' requirement of the National Stolen Property Act.").
(234.) See Dowling, 473 U.S. at 216 (finding that National Stolen Property Act clearly "contemplate[s] a physical identity between the items unlawfully obtained and those eventually transported" and finding language of copyright statutes to clearly distinguish possessory pos·ses·so·ry
1. Of, relating to, or having possession.
2. Law Depending on or arising from possession: possessory interest. interests of copyright holder from ordinary property interests); see also Naso v. Park, 850 F. Supp. 264, 275 (S.D.N.Y. 1984) (holding that patent-infringing goods do not qualify under statute as stolen, converted or fraudulently-taken goods).
(235.) For the purpose of this section, the term "art crime" will be limited to fine arts such as paintings, sculptures and, to a lesser degree, books, antiquities and archaeological objects. Related statutes include the Native American Graves Protection Act of 1990 and the Archeological Resources Act.
(236.) See Michael James, Internet May Shed Light on Shadowy Art Thieves; FBI and Interpol to Display Stolen Works on Web Sites, BALTIMORE SUN Baltimore Sun
Daily newspaper published in Baltimore, Md., U.S. It was begun as a four-page penny tabloid in 1837 by Arunah Shepherdson Abell, a journeyman printer from Rhode Island. , Aug. 17, 1998, at 1A (citing Art Loss Register's estimates of $3 billion of stolen, unaccounted unaccounted
unaccounted for unable to be found or traced: four people were killed in the floods, and eleven remain unaccounted for
unaccounted adj artworks, numbering over 100,000); Christine Spolar, Antiques Up for Grabs in Budapest: Hungarian Families Vie to Sell Heirlooms to Posh Galleries, WASH. POST, Dec. 31, 1997, at A17 (discussing natural growth in illicit art trade when prices escalate and currency falters and warning that "[a]s prices soar, the potential for fraud multiplies"); see also David Holmstrom, Stolen-Art Market Is a Big Business at $2 Billion A Year, CHRISTIAN SCI. MONITOR, Aug. 11, 1994, at 1; William Touhy, Picture This: Art Thievery Thievery
See also Gangsterism, Highwaymen, Outlawry.
Alfarache, Guzmán de
picaresque, peripatetic thief; lived by unscrupulous wits. [Span. Lit. is Thriving, L.A. TIMES, Aug. 16, 1994, at H1.
(237.) See Steve Lopez with Charlotte Faltermeyer, The Great Art Caper: Is the Heist of the Century about to Be Solved? Two Cons May Hold the Answer, TIME MAG., Nov. 17, 1997, at 74 (tracing recent developments in recovery efforts of nine works valued at $300 million stolen from Boston's Gardner Museum in 1990); cf. Anthony J. Del Piano, The Fine Art of Forgery, Theft and Fraud, CRIM CRIM Criminal
CRIM Computer Research Institute of Montreal
CRIM Centro de Recaudación de Ingresos Municipales (Municipal Internal Revenue Center, San Juan)
CRIM Centre de Recherche en Ingénierie Multilingue . JUST., Summer 1993 at 16, 17 (contending that art theft is second only to illicit drug illicit drug Street drug, see there market).
(238.) Theft and vandalism of art, despite their often tremendously costly and devastating effects, usually do not demand the degree of sophistication so·phis·ti·cate
v. so·phis·ti·cat·ed, so·phis·ti·cat·ing, so·phis·ti·cates
1. To cause to become less natural, especially to make less naive and more worldly.
2. that characterizes white collar crime; however, the subsequent resale or laundering of stolen art, a major element of white collar art crime, is complex and sophisticated. See Del Piano, supra note 237, at 18 (noting that trafficking of stolen art transforms simple thefts into complex criminal enterprises). For review and discussion on the use of civil actions to seek relief in art crimes, see generally Steven A. Bibas, Note, The Case Against Statutes of Limitations for Stolen Art, 103 YALE L.J. 2437 (1994), in which the author rejects property approaches to art crimes and argues for the elimination of statutes of limitation for victims who report art thefts. See also Ashton Hawkins, et al., A Tale of Two Innocents: Creating an Equitable Balance Between the Rights of Former Owners and Good Faith Purchasers of Stolen Art, 64 FORDHAM L. REV. 49 (1995) (advocating legislative encouragement of international arts registry to establish rights and liability limitations for purchasers of valuable art); William G. Pearlstein, Claims for the Repatriation Repatriation
The process of converting a foreign currency into the currency of one's own country.
If you are American, converting British Pounds back to U.S. dollars is an example of repatriation. of Cultural Property: Prospects for a Managed Antiquities Market, 28 LAW & POL'Y INT'L BUS. 123 (1996) (analyzing patrimony claims and proposing managed antiquities market). Ongoing investigations into World War II looting has vaulted consideration of this issue to the forefront of the art world.
(239.) See Julie K.L. Dam, et al., The Faking Game Demand Keeps Growing for Big-Name Art--and Brazen bra·zen
1. Marked by flagrant and insolent audacity. See Synonyms at shameless.
2. Having a loud, usually harsh, resonant sound: "sudden brazen clashes of the soldiers' band" Forgers are Happy to Provide and Endless Supply, TIME INT., Mar. 10, 1997, at 50 (citing former New York New York, state, United States
New York, Middle Atlantic state of the United States. It is bordered by Vermont, Massachusetts, Connecticut, and the Atlantic Ocean (E), New Jersey and Pennsylvania (S), Lakes Erie and Ontario and the Canadian province of Metropolitan Museum of Art director's estimate that "half forgeries" and "outright fakes" comprise nearly half the art on the market); Alycen Mitchell, Seeing Red over Riopelle: Art Dealers and Collectors are Getting Badly Burned by Forgeries of his Work, FIN. POST, Nov. 22, 1997, at 30 (discussing first picture forger convicted in Canada amidst wave of fake Riopelles). See generally LEE CATTERALL, THE GREAT DALI ART FRAUD AND OTHER DECEPTIONS (1992); THOMAS HOVING, FALSE IMPRESSIONS: THE HUNT FOR BIG-TIME ART FAKES (1996); JAMES KOOBATIAN, FAKING IT Faking It was a television programme originating on UK Channel 4 which has spawned various international remakes, including a US version which began in 2003 on the TLC network. : AN INTERNATIONAL BIBLIOGRAPHY OF ART AND LITERARY FORGERIES, 1949-1986 (1987).
(240.) For example, the Drug Enforcement Agency (DEA) staged "Operation Dinero" to uncover money laundering by the Cali Columbia drug cartel Noun 1. drug cartel - an illicit cartel formed to control the production and distribution of narcotic drugs; "drug cartels sometimes finance terrorist organizations" , netting three paintings attributed to Picasso, Rubens and Reynolds. See Anna J. Kisluk, DEA Operation Nets 3 Pictures, IFAR IFAR International Fanconi Anemia Registry (research and support group)
IFAR International Foundation for Art Research (research organization for visual art works)
IFAR Institute for Aging Research REP., Dec. 1995, at 6, 8; see also Antony Thorncroft, Landscape of Larceny, FIN. POST, March 15, 1997, at 26 (describing botched botch
tr.v. botched, botch·ing, botch·es
1. To ruin through clumsiness.
2. To make or perform clumsily; bungle.
3. To repair or mend clumsily.
1. attempts to sell $170 million worth of Old Masters taken in the Russborough heist leading to use of paintings as collateral for other crimes); Customs Auction of a Dali Accents Laundering by An, MONEY LAUNDERING ALERT, June 1, 1995 (noting the "large disparity between cash bank deposits made by auction houses and cash receipts reported by them on IRS Form 8300"); Jo Durden-Smith, Masterpieces as Money, TOWN & COUNTRY MONTHLY, July 1, 1996, at 30 (concluding that art works are just another form of money). For a general discussion of money laundering, see the MONEY LAUNDERING article in this issue.
(241.) "[Thirty to forty] per cent of the world's available antiquities pass through the sale rooms in New York and London. Roughly [ninety] per cent of these pieces are of unknown provenance, meaning they are almost certainly stolen, smuggled, or both." Richard McGill Murphy, A Corrupt Culture, NEW LEADER, Feb. 23, 1998, at 15 (reviewing Peter Watson's SOTHEBY'S: THE INSIDE STORY, a scathing expose of the reputed auction house). Sotheby's reactions to such claims have been startling star·tle
v. star·tled, star·tling, star·tles
1. To cause to make a quick involuntary movement or start.
2. To alarm, frighten, or surprise suddenly. See Synonyms at frighten. : "Sotheby's was breaking no laws selling smuggled material. We are here to make money," explained former London managing director. Julie Rekai Rickerd, Revealing the Rot of a Venerable Auction House, FIN. POST, Feb. 21, 1998, at R5. Watson also accused Sotheby's of creating a false market by manufacturing telephone bids to increase floor auction prices. Id.; see also Lisa J. Borodkin, Note, The Economics of Antiquities Looting and a Proposed Legal Alternative, 95 COLUM. L. REV. 377, 385-86 (1995) (discussing ways in which art auction system contributes to perpetration per·pe·trate
tr.v. per·pe·trat·ed, per·pe·trat·ing, per·pe·trates
To be responsible for; commit: perpetrate a crime; perpetrate a practical joke. of art fraud).
(242.) See JOHN E CONKLIN, ART CRIME 21-33 (1994), at 87 (asserting that art fraud can be perpetrated by collectors, dealers, museums, and auction houses alike); Steven F. Grover, Note, The Need for Civil-Law Nations to Adopt Discovery Rules in Art Replevin A legal action to recover the possession of items of Personal Property.
Replevin is one of the oldest Forms of Action known to Common Law, first appearing about the beginning of the thirteenth century. Actions: A Comparative Study, 70 TEX. L. REV. 1431, 1438 (1992) (asserting that some reputable museum staffers may be tempted by lucrative corruption).
(243.) See, e.g., CONKLIN, supra note 242, at 61 (estimating "Dali signed 350,000 blank sheets of art paper in his career," to make inexpensive photographic reproductions, which were then marketed as high-priced "originals" or "limited editions").
(244.) But see Kramer v. Pollock-Krasner Found., 890 F. Supp. 250 (S.D.N.Y. 1995) (rejecting dealer's allegation of conspiracy by authenticators in refusing to authenticate his alleged Pollock painting); Vitale v. Marlborough Gallery, 32 U.S.P.Q. 2d (BNA) 1283 (S.D.N.Y. 1994) (dismissing purchaser of alleged Pollock painting's claim that authenticators and dealers conspired in refusing to authenticate his painting).
(245.) See Steven Mark Levy, Liability of the Art Expert for Professional Malpractice, 1991 Wis. L. REV. 595, 596 ("Fine arts experts, including authenticators, appraisers and consultants, wield tremendous financial power in the art market.").
(246.) Denise M. Topolnicki & J. Howard Green, The Fine Art of Fraud, MONEY, Sept. 1986, at 73. Furthermore, there is no simple either-or dichotomy between authentic and fake art works. See R.H. MARIJNISSEN, PAINTINGS, GENUINE, FRAUD, FAKE: MODERN METHODS OF EXAMINING PAINTINGS 20-34 (1985) (listing fifteen categories of "authenticity").
(247.) See Lawrence S. Bauman, Note, Legal Control of the Fabrication fabrication (fab´rikā´shn),
n the construction or making of a restoration. and Marketing of Fake Paintings, 24 STAN. L. REV. 930, 935-36 (1972) (pointing out the unavailability of art experts for the purposes of authentication's and providing several reasons for this problem). For examples of high-priced scientific authentication techniques, see David Conrads, Progress is Real for Those in the Business of Spotting Fakes: Scientists and Art Historians are Erecting a Formidable Barrier Between Art Forgers and Art Museums, CHRISTIAN SCIENCE Christian Science, religion founded upon principles of divine healing and laws expressed in the acts and sayings of Jesus, as discovered and set forth by Mary Baker Eddy and practiced by the Church of Christ, Scientist. MONITOR, Oct. 8, 1996, at 12 and Leonard D. Du Boff boff 1
1. A line in a play or film, for example, that elicits a big laugh: "He doesn't go for the big boffs, artificially inflated, but lets his comedy build through a leisurely , Controlling the Artful art·ful
1. Exhibiting art or skill: "The furniture is an artful blend of antiques and reproductions" Michael W. Robbins.
2. Con: Authentication and Regulation, 27 HASTINGS L.J. 973, 988-97 (1976).
(248.) See Mitchell, supra note 239, at 30 (explaining forgers' preference for modern art because its simpler style facilitates imitation and does not require complicated antiquating techniques).
(249.) See Robin Morris Collin, The Law and Stolen Art, Artifacts, and Antiquities, 36 How. L.J. 17, 27 (1993) (stating that consumers seldom inquire into legitimacy of art work); Topolnicki & Green, supra note 246, at 73 (pointing out that victims of many art frauds are usually novice collectors); cf. Balog v. Center Art Gallery-Hawaii, Inc., 745 F. Supp. 1556, 1562 (D. Haw. 1990) ("[S]ome well-executed fakes have fooled even knowledgeable buyers and dealers."); Bauman, supra note 247, at 932-34 (citing numerous methods of forgery, such as faked signatures, completions of unfinished canvases, misrepresentation misrepresentation
In law, any false or misleading expression of fact, usually with the intent to deceive or defraud. It most commonly occurs in insurance and real-estate contracts. False advertising may also constitute misrepresentation. of a work's author, reproductions, pastiches [a method of combining elements of several works to create a new work], and faked unfinished drawings).
(250.) See, e.g., Stephen K. Urice, World War II and the Movement of Cultural Property: and Introduction and Brief Bibliography for the Museum Administrator, LEGAL PROBLEMS OF MUSEUM ADMINISTRATION, ALI-ABA COURSE OF STUDY MATERIALS, March 26, 1998 (listing books and websites to consult when researching potential acquisitions).
(251.) The Art Loss Register ("AIR") maintains an international, permanent, computerized clearinghouse on stolen and missing art; their image database of over 60,000 items has been instrumental in the recovery of numerous stolen objects. For more information regarding AIR, see The Art Loss Register (visited Jan. 29, 1999) <http://www.artloss.com/>. Additionally the International Foundation for Art Research ("IFAR"), a non-profit organization dedicated to preventing and recovering stolen, forged and misattributed art works, maintains the AIR's U.S. office and can be reached at 500 Fifth Avenue, Suite 1234, New York, NY 10110 (tel. 212-391-6234; fax 212-391-8794; email firstname.lastname@example.org). See generally Barbara Lantin, The Art of Helping Police with Inquiries, INDEPENDENT (London), Apr. 3, 1996 (discussing role of the Art Loss Register).
(252.) The Getty Information Institute, Los Angeles Los Angeles (lôs ăn`jələs, lŏs, ăn`jəlēz'), city (1990 pop. 3,485,398), seat of Los Angeles co., S Calif.; inc. 1850. , has established the "Getty Provenance Index" which documents the provenance (history of ownership) of over a half-million art works, which are ceded by means of their "Object ID Checklist." This database is currently on a CD-ROM. See Getty Information Institute, The Work of the Getty Provenance Institute (visited Jan. 29, 1999) <http://www.gii.getty.edu/provenance/index.html>.
(253.) A San Francisco San Francisco (săn frănsĭs`kō), city (1990 pop. 723,959), coextensive with San Francisco co., W Calif., on the tip of a peninsula between the Pacific Ocean and San Francisco Bay, which are connected by the strait known as the Golden high-technology firm has developed a digital registration process, "ISIS," (Intrinsic Signature Identification System) that could help resolve disputes about authenticity and ownership of art works, thereby discouraging forgery and theft. The process is "based on the premise that all objects contain unique microscopic physical features and random anomalies that cannot be duplicated." Suzanne Muchnic, Have Forgers Finally Met Their Match? A New Digital Registration Process Could Discourage Forgery and Theft and Help Resolve Disputes About Authenticity and Ownership of Valuable Artworks, L.A. TIMES, Jul. 2, 1995, at Calendar 50 (concluding that success of this project remains uncertain). For further information on ISIS, see Verification Technologies, Inc., Main Page (visited Jan. 29, 1999) <http://www.netventure.com/vti/isis>.
(254.) See Bauman, supra note 247, at 931 (asserting that existing state and federal regulatory attempts to control art crime frequently fail since available statutes for prosecution of art crime are primarily intended for other purposes, thus requiring creative tailoring to be of much use); Du Boff, supra note 247, at 998 (stating that such statutes may also be ineffective because their penalties are insufficient deterrents in light of the potential profits). Faced with this statutory futility, prosecutors frequently choose not to waste precious funds and time on a losing baffle. See also Balog, 745 F. Supp. at 1564 (stating that a dealer's authentication of a work, unless that dealer witnessed work being produced, "can never be more than an educated guess or opinion"); Du Boff, supra note 247, at 998 (asserting that intent requirement for fraudulent authentication may encourage sellers to intentionally not authenticate works).
(255.) Pub. L. 103-322, Title XXXII, Subtitle sub·ti·tle
1. A secondary, usually explanatory title, as of a literary work.
2. A printed translation of the dialogue of a foreign-language film shown at the bottom of the screen.
tr.v. I, [sections] 320902(a), 108 Stat. 1796, 2123-24 (1994) (codified at 18 U.S.C. [sections] 668 (1994)). The Act appears as part of the much larger "Violent Crime Control and Law Enforcement Act The Violent Crime Control and Law Enforcement Act (1994), also known as the Biden Crime Law, is a piece of legislation, sponsored by Rep. Jack Brooks and supported by Sen. of 1994." There appears to be no legislative history specifically addressing the art crime statute.
(256.) "Object of cultural heritage" is defined to include any object that is either (a) over 100 years old and worth over $5,000, or (b) worth at least $100,000, regardless of age. 18 U.S.C. [sections] 668(a)(2) (1994).
(257.) Museum is defined broadly enough to include most libraries; the Act protects any organized and permanent institutions that (a) are in the United States; (b) are "established for an essentially educational or aesthetic purpose;" (c) have a professional staff; and (d) own and regularly display to the public tangible objects. 18 U.S.C. [sections] 668(a)(1) (1994).
(258.) 18 U.S.C. [sections] 668(b)(2) (1994).
(259.) Pub. L. No. 103-322, Title XXXII, Subtitle I, [sections] 320902(b), 108 Stat. 1796, 2124 (1997) (codified at 18 U.S.C. [sections] 3294 (1994)).
(260.) See Patty Gerstenblith, Cultural Property and World War II: Some Implications for American Museums: A Legal Background, LEGAL PROBLEMS OF MUSEUM ADMINISTRATION, ALI-ABA COURSE OF STUDY MATERIALS, March 26, 1998, at 20 (discussing judicial side-stepping of traditional statute of limitations in order to facilitate art recovery).
(261.) See Joseph A. Slobodzian, Case of the Missing History; FBI Recovers Artifacts Worth $3 Million; Electrician, Janitor Charged, WASH. POST, Jan. 8, 1998, at B7 (describing stolen objects, including artifacts from Revolutionary War and Civil War eras).
(262.) See United States v. O'Higgins, No. 98 CR. 358(RPP RPP Report on Plans and Priorities
RPP Registered Pension Plan
RPP Regulated Price Plan (Ontario Energy Board)
RPP Rate Pressure Product
RPP Registered Polarity Practitioner (elemental reflexology) ), 1998 WL 698272 (S.D.N.Y. Oct. 6, 1998) (rejecting defendant's commerce clause challenge to [sections] 668 for theft of one leaf from a Mozart piano minuet minuet (mĭnyĕt`), French dance, originally from Poitou, introduced at the court of Louis XIV in 1650. It became popular during the 17th and 18th cent. and an essay and three letters by Richard Wagner).
(263.) Cr. No. 89-00125-03-HM (D. Haw. May 4, 1990), aff'd, Nos. 90-10612, 90-10616, 90-10617, 1993 WL 118176 (9th Cir. Apr. 15, 1993).
(264.) See 18 U.S.C. [sections] 1341 (1994) (discussing mail fraud); 18 U.S.C. [sections] 1343 (1994) (discussing wire fraud).
(265.) The gallery's president was fined $750,000 and given a three-year prison sentence, and the vice-president was fined $282,000 and given a two-and-a-half year prison sentence. They were also ordered to pay restitution. CONKLIN, supra note 242, at 83. See generally CATTERALL, supra note 239, at 163-328 (reviewing development of Center Art Galleries frauds).
(266.) See Art Gallery, Officers Convicted in Dali Case, NAT'L. L.J., May 21, 1990, at 6 (deeming scandal "the largest art fraud in history at a consumer loss of more than $100 million from 1977 to 1989").
(267.) In addition, civil litigation based upon the same conduct paralleled the criminal prosecution. Granat v. Center Art Galleries, No. 91-7252 (RLC RLC Residual lung capacity ), 1993 WL 403977, at *2 (S.D.N.Y. Oct. 6, 1993); Balog v. Center Art Gallery-Hawaii, 745 F. Supp. 1560, 1569 (D. Haw. 1990).
(268.) No. [subsections] Cr. 722 (MBM MBM
meat and bone meal. ) (S.D.N.Y. 1990); see also United States v. Burke, 718 F. Supp. 1130 (S.D.N.Y. 1989) (holding evidence admissible (algorithm) admissible - A description of a search algorithm that is guaranteed to find a minimal solution path before any other solution paths, if a solution exists. An example of an admissible search algorithm is A* search. despite overly broad search warrant). 269. CATTERALL, supra note 239, at 96.
(270.) Arnold H. Lubasch, U.S. Accuses 4 of High Profits in Fake Dali Art, N.Y. TIMES, OCt. 4, 1988, at B6; see also Marianne Yen, 4 Charged in Dali Art Fraud, WASH. POST, Oct. 4, 1988, at D1.
(271.) See United States v. Amiel, 813 F. Supp. 958 (E.D.N.Y.), aff'd 995 F.2d 367 (2d Cir. 1993) (involving the government prosecution of forgers and dealers of the forgeries, including four members of the Amiel family for mail fraud and conspiracy). The defendants were running what was reputed to be "the single largest worldwide source and distribution network of bogus prints." David S. Hilzenrath, Cracking Down on Counterfeit Art; U.S. Charges 4 in the Global Distribution of Bogus Prints, WASH. POST, Jan. 31, 1992, at C1. A dealer of the Amiel works also pled guilty to mail fraud. Id.
(272.) See Bauman, supra note 247, at 939 (noting limited use of copyright laws in art crimes prosecution).
(274.) Nov. 14, 1970, 823 U.N.T.S. 231, 10 LL.M LL.M Legum Magister (Master of Laws) . 289. See generally ELIZABETH SIMPSON, THE SPOILS OF WAR; WORLD WAR II AND ITS AFTERMATH: THE LOSS, REAPPEARANCE, AND RECOVERY OF CULTURAL PROPERTY 272-311 (1997) (setting forth relevant treaties).
(275.) The 1970 UNESCO Convention was implemented into U.S. law by the Convention on Cultural Property Implementation Act ("CPIA CPIA Canadian Plastics Industry Association
CPIA Country Policy and Institutional Assessment
CPIA Canadian Printing Industries Association
CPIA Colorado Photonics Industry Association
CPIA Chemical Propulsion Information Agency "), Pub. L. 97-416, Title III Title III Program is a U.S. Federal Grant Program to improve education History
The Title III Program began as part of the Higher Education Act of 1965, which sought to provide support to strengthen various aspects of the schools through a formula grant program to accredited, , 96 Stat. 2329, 2350 (1983) (codified at 19 U.S.C. [subsections] 2601-2613 (1994)). Because the CPIA mainly restricts the importation of illegally imported foreign cultural property and only affords redress to foreign state parties to the UNESCO convention, it does not provide private causes of action and is thus "limited to an extremely small ... subset of potential claims." See Hawkins et. al., supra note 238, at 83. See generally Lawrence M. Kaye, The Future of the Past: Recovering Cultural Property, 4 CARDOZO J. INT'L & COMP. L. 23, 24-25 (1996) (discussing history of international response to illicit trade in cultural property); Marilyn Phelan, A Synopsis of the Laws Protecting Our Cultural Heritage, 28 NEW ENG NEW ENG New England . L. Rev. 63, 98 (1993) (discussing enactment, purpose, and scope of CPIA).
(276.) 19 U.S.C. [sections] 2602(a) (1994).
(277.) 19 U.S.C. [sections] 2605 (1994).
(278.) See generally Carl Nagin, Hot Art: Illegal Traffic in Antiquities, TOWN & COUNTRY MONTHLY, Mar. 1, 1995, at 138 (discussing effectiveness of committee despite its "cumbersome bureaucratic bu·reau·crat
1. An official of a bureaucracy.
2. An official who is rigidly devoted to the details of administrative procedure.
(279.) Final Act of the Diplomatic Conference for the Adoption of the Draft UNIDROIT Convention on the International Return of Stolen or Illegally Exported Cultural Objects, June 24, 1995, 34 I.L.M. 1322 [hereinafter UNIDROIT]. The final title of the treaty is "UNIDROIT Convention on Stolen or Illegally Exported Cultural Objects."
(280.) UNIDROIT, supra note 279, at 1334-35, art. 10 (stating that provisions apply prospectively, not retroactively).
(281.) See List of the States Which Signed the Convention (visited Sep. 16, 1998) <http://www.tufts.edu/ departments/fletcher/multi/www/unidroit95-rat.html> (listing 22 signatories). As of January 1998, Lithuania, Paraguay, and Romania have ratified the UNIDROIT treaty while China and Ecuador have acceded to it. On January 21, 1998 the fifth ratification instrument was deposited by Romania with the Italian government. Consequently, pursuant to Article 12, paragraph 1 (UNIDROIT, Ch. 5, art. 12(1), 34 I.L.M. at 1335), the treaty will enter into force between these five nations on July 1, 1998. See Letter from Marina Schneider, Research Officer, Unidroit Secretariat (Feb. 12, 1998) (on file with the American Criminal Law Review) (noting "that Peru and Hungary have already passed the law permitting the ratification and we are waiting for the formal deposit of the instruments"); see also Richard P. Greenfield, The Trouble with the Trojan Gold, NEWSDAY (N.Y.), Jan. 7, 1996, at A38 (explaining why United States has abstained from voting on UNIDROIT convention); Kimbell to Host Swiss Collection: Paintings Find Temporary Sanctuary in Fort Worth, DALLAS MORNING NEWS, Jul. 5, 1997, at 43A (discussing problems in ratification process). For general discussion and analysis of UNIDROIT, see Marina Schneider, The UNIDROIT Convention on Stolen or Illegally Exported Cultural Objects (visited Sept. 16, 1998) <http://www.city.ac.uk/artspol/schneider. html>; see also Jennifer Howard, Objects of Desire; Contested Artifacts Are the Prize in an International Culture Clash, WASH. POST, Dec. 14, 1997, at C1 (describing inherent complications in repatriating artistic and cultural objects); Brian Bengs, Note, Dead on Arrival? A Comparison of the UNIDROIT Convention on Stolen or Illegally Exported Cultural Objects and U.S. Property Law, 6 TRANSNAT'L L. & CONTEMP. PROBS. 503 (1996) (analyzing potential effects of UNIDROIT on United States property law).
(282.) See, e.g., Godfrey Barker & Laura Stewart, The Arts: Maastricht--the Last Art Fair?, DAILY TELEGRAPH (London), Mar. 11, 1996, at 18 (claiming that if the Netherlands ratifies treaty, art dealers will move annual fair from Maastricht to non-ratifying country); Hawkins et al., supra note 238, at 86 ("[i]f adopted, UNIDROIT would effectively supplant sup·plant
tr.v. sup·plant·ed, sup·plant·ing, sup·plants
1. To usurp the place of, especially through intrigue or underhanded tactics.
2. the CPIA").
(283.) See, e.g., N.Y. ARTS & CULT. AFF AFF Affectionate
AFF Adult FriendFinder (website)
AFF American FactFinder (US Census data retrieval system)
AFF Accelerated Free Fall (type of skydiving training) LAW. [sections] 3.01 (McKinney 1984) (stating promotion of arts as statutory goal).
(284.) A person is guilty of class A misdemeanor criminal simulation when (1) with intent to defraud, he makes or alters any object in such manner that it appears to have an antiquity, rarity, source or authorship which it does not in fact possess; or (2) with knowledge of its tree character and with intent to defraud, he utters or possesses an object so simulated. N.Y. PENAL LAW [sections] 170.45 (McKinney 1984). The New York statute "substantially adopts a similar provision of the MODEL PENAL CODE The Model Penal Code (MPC) is one of the most important developments in American law, and perhaps the most important influence on American Criminal Law since it was completed in 1962. (9 224.2)." Staff Notes of the Commission on Revision of the Penal Law, N.Y. PENAL LAW [sections] 170.45.
(285.) Former N.Y. PENAL LAW [sections] 959 was aimed at "[the] reproduction or forgery of archeological objects." Staff Notes of the Commission on Revision of the Penal Law, N.Y. PFNAL LAW [sections] 170.45 (McKinney 1984).
(286.) N.Y. PENAL LAW [sections] 170.45; see also N.Y. ARTS & CULT. AFF. LAW [sections] 13.03 (McKinney Supp. 1997) (falsifying fal·si·fy
v. fal·si·fied, fal·si·fy·ing, fal·si·fies
1. To state untruthfully; misrepresent.
a. certificates of authenticity for a work of fine arts is a class A misdemeanor).
(287.) See ALA. CODE [sections] 13A-9-10 (1995); ALASKA STAT. [sections] 11.46.530 (Michie 1996); ARIZ. Rev. STAT. ANN. [sections] 13-2004 (West 1989); ARK. CODE ANN. [sections] 5-37-213 (Michie 1993); COLO. Rev. STAT. [sections] 18-5-110 (1990); CONN. GEN. STAT. ANN. [sections] 53a-141 (West 1994); FLA. STAT. ch. 267.13 (1993); [sections] GUAM CODE ANN. [sections] 46.16 (1995); HAW. Rev. STAT. [sections] 708-855 (1993); IOWA CODE [sections] 715A.3 (1997); KY. Rev. STAT. ANN. [sections] 516.110 (Banks-Baldwin 1995); ME. Rev. STAT. ANN. tit. 17A, [sections] 705 (West 1983); Miss. CODE ANN. [sections] 39-7-27 (1996); Mo. Rev. STAT. [sections] 570.090 (1979); MONT. CODE ANN. [sections] 22-3441 (1995); NEB. Rev. STAT. [sections] 28-606 (1995); N.H. Rev. STAT. ANN. [sections] 227-C:17 (1989); N.J. STAT. ANN. [sections] 2C:21-2 (West 1995); Omo Rev. CODE ANN. [sections] 2913.32 (Anderson 1996); OR. Rev. STAT. [sections] 165.037 (1995); 18 PA. CONS. STAT. ANN. [sections] 4102 (1983 & Supp. 1997); S.D. CODIFIED LAWS ANN. [sections] 1-20-37 (Michie 1992); TENN. CODE ANN [sections] 39-14-115 (1997); TEX. CODE ANN. [sections] 32.22 (1994); UTAH CODE ANN. [sections] 76-6-518 (1995 & Supp. 1997); VT. STAT. ANN. tit. 13, [sections] 2023 (Supp. 1996); WIS. STAT. ANN. [sections] 943.38 (West 1996).
(288.) These three states are Florida, Montana, and South Dakota South Dakota (dəkō`tə), state in the N central United States. It is bordered by North Dakota (N), Minnesota and Iowa (E), Nebraska (S), and Wyoming and Montana (W). . See FLA. STAT. ch. 267.13 (1993) (limiting application to "any archaeological or historical object"); MONT. CODE ANN. [sections] 22-3-441 (1995) (limiting application to "heritage property or paleontological pa·le·on·tol·o·gy
The study of the forms of life existing in prehistoric or geologic times, as represented by the fossils of plants, animals, and other organisms. remains;"former refers to Native American objects); S.D. CODIFIED LAWS [sections] 1-20-37 (Michie 1992) (limiting application to "any archaeological, paleontological, ethnological or historical" object).
(289.) See CAL. CIVIL CODE [subsections] 1744(a)(10), 1745 to 1745.5 (West 1985 & Supp. 1997) (requiring disclosure of total size of limited editions with penalty not to exceed $1,000 for each violation); 815 ILL. COMP. STAT. [sections] 345/0.01-9 (West 1997) (same).
(290.) In February 1987, the New York Attorney General's Office obtained the first felony convictions in the nation against the operators of a telephone boiler-room gallery in its conspiracy prosecution of four defendants in the Carol Convertine Gallery case. See Topolnicki & Green, supra note 246, at 73. The defendants reached potential customers over the telephone and by mailing brochures and price lists and providing false certificates of authentication. Two defendants pleaded guilty to conspiracy, and two others were convicted of nine counts of fraud. One defendant was convicted of an additional eight misdemeanor counts for the issuance of the false certificates. See CONKLIN, supra note 242, at 82-83. The gallery was in part supplied by another member of the Amiel family. See Douglas C. McGill, Fake Art Prints: Big Business Getting Bigger, N.Y. TIMES, July 22, 1987, at A1; see also United States v. Amiel, 813 F. Supp. 958, 959 (E.D.N.Y. 1993) (describing the convictions obtained in that prosecution). In related civil litigation, a French corporation which claimed an exclusive license in Dali works filed a civil RICO suit, under 18 U.S.C. [sections] 1962(c) (enterprise involvement in racketeering), based on predicate acts of money laundering, mail fraud and wire fraud. See Galerie Furstenberg v. Coffaro, 697 F. Supp. 1282 (S.D.N.Y. 1988) (dismissing plaintiff's money laundering, conspiracy, and trademark claims, but allowing civil RICO suit based solely on mail and wire fraud acts).
(291.) See People v. Mahboubian, 543 N.E.2d 34, 36 (N.Y. 1989) (discussing defendants' attempts to defraud insurance company by staging theft of art forgeries and collecting on the value of authentic pieces); cf Bill Callahan Bill Callahan is the name of:
(292.) U.S. SENTENCING GUIDELINES MANUAL App. A (1998) [hereinafter U.S.S.G.].
(293.) See U.S.S.G. [subsections] 3D1.1-3D1.5 (1998) (explaining calculation of single offense level for multi-count convictions).
(294.) 18 U.S.C.A. [sections] 1831 (a)(5) (Supp. 1998). As of Nov. 1, 1997, the Sentencing Guidelines were amended so that [sections] 2B1.1 covers offenses involving economic espionage under 18 U.S.C. [sections] 1831. Section 2B1.1 (b)(7) permits an increase by two levels for trade secret theft where the defendant knew or intended that it would benefit a foreign government, instrumentality, or agent. Sentencing Guidelines for the United States Courts "United States courts" may refer to:
(295.) 18 U.S.C.A. [sections] 1832(a)(5) (Supp. 1998). Section 2B1.1 also applies to thefts of trade secrets violations as defined under [sections] 1832. See discussion, supra note 294 (addressing amendment to [sections] 2Bl.1).
(296.) 18 U.S.C.A. [sections] 1834(a)(1) (Supp. 1998). The court may consider "the nature, scope, and proportionality of the use of the property in the offense." 18 U.S.C.A. [sections] 1834(a)(2) (Supp. 1998). The forfeiture provision has been likened to the forfeiture provision in RICO. Michael Coblenz, Criminal Punishment of Trade Secret Theft Under New Federal Law: The Economic Espionage Act of 1996, A.B.A. IP NEWSL., Spring 1997, at 11, 49.
(297.) 18 U.S.C.A. [sections] 1838 (Supp. 1998) (construction with other laws). The Act also contains provisions for injunctions. 18 U.S.C.A. [sections] 1836(a) (Supp. 1998) (civil proceedings to enjoin To direct, require, command, or admonish.
Enjoin connotes a degree of urgency, as when a court enjoins one party in a lawsuit by ordering the person to do, or refrain from doing, something to prevent permanent loss to the other party or parties. violations); see also Coblenz, supra note 296, at 49-50.
(298.) 18 U.S.C. [sections] 2314 (1994). Section 2314 was amended in 1994 to remove the outdated maximum fine. Pub. L. No. 103-322, Title XXXIII, [sections] 330016(1)(L), 108 Stat. 1796, 2147 (1994).
(299.) U.S.S.G. App. A (1998). For an application of this Act to a particular type of intellectual property crime, refer to the sentencing provisions of the applicable section of this article
(300.) U.S.S.G. [sections] 2B1.1(a), (b)(1) (1998).
(301.) U.S.S.G. [sections] 2B1.1(b)(1) (1998).
(302.) U.S.S.G. [sections] 2B1.1(b)(4)(A) (1998).
(303.) U.S.S.G. [sections] 2B1.(b)(4)(B) (1998); see also United States v. Collins, 104 F.3d 143, 144 (8th Cir. 1997) (upholding sentence increase of four levels for being in business of receiving and selling stolen goods, as defined by 18 U.S.C. [sections] 2314).
(304.) 18 U.S.C. [sections] 1905 (1994). The Act makes it a misdemeanor for any employee of the United States to disclose trade secrets "[t]o any extent not authorized by law." 18 U.S.C. [sections] 1905 (1994).
(305.) U.S.S.G. App. A (1998).
(306.) U.S.S.G. [sections] 2H3.1(a)-(b) (1998).
(307.) U.S.S.G. [sections] 2H3.1(c)(1) (1998).
(308.) 18 U.S.C. [subsections] 1341, 1343 (1994).
(309.) 18 U.S.C. [subsections] 1341, 1343 (1994).
(310.) U.S.S.G. [sections] 2F1.1 (1998).
(311.) U.S.S.G. [sections] 2F1.1(a)-(b) (1998).
(312.) U.S.S.G. [sections] 2F1.1(b)(1) (1998); see also United States v. Austin, 54 F.3d 394, 402 (7th Cir. 1995) (upholding sentence based on sales revenue of $3.8 million, even though the art works "were worthless fakes" having no value).
(313.) U.S.S.G. [sections] 2F1.1(b)(2) (1998); see also United States v. Austin, 103 F. 3d 606, 608 (7th Cir. 1997) (affirming upward adjustment in sentencing for more than minimal planning and for organizing or supervising more than five persons); United States v. Ellerbee, 73 F.3d 105, 108 (6th Cir. 1996) (upholding two-level enhancement of sentence based on evidence of "more than minimal planning," which could be deduced by "more planning than is typical, repeated acts, and steps to conceal the crime"); United States v. Mett, 65 F.3d 1531, 1537 (9th Cir. 1995) (sustaining increased sentence).
(314.) 18 U.S.C. [sections] 1963(a) (1994).
(315.) 18 U.S.C. [sections] 1963(a) (1994).
(316.) U.S.S.G. App. A (1998); see United States v. Carrozza, 4 F.3d 70, 74-75 (lst Cir. 1993) (reviewing and applying [sections] 2E1.1 to RICO violation under 18 U.S.C. [sections] 1963). For a complete discussion of sentencing under RICO, see the RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS ACT article in this issue.
(317.) Pub. L. No. 104-153, [sections] 3, 110 Stat. 1136 (1996) (amending 18 U.S.C. [sections] 1961(1)(B)).
(318.) 18 U.S.C. [sections] 2320(a) (1994).
(319.) See 18 U.S.C. [sections] 2320(a) (1994) (requiring higher penalties for repeat offenders).
(320.) 18 U.S.C. [sections] 2320(b) (1994); see also Vuitton v. White, 945 F.2d 569, 575-76 (3d Cir. 1991) (discussing requirements for relief under the ex parte [Latin, On one side only.] Done by, for, or on the application of one party alone.
An ex parte judicial proceeding is conducted for the benefit of only one party. seizure provision of the Act)
(321.) 18 U.S.C. [sections] 2318(a) (Supp. 1997). In 1996, the statute was amended to include "computer program(s)." Pub. L. No. 104-153, [sections] 4(a)-(b), 110 Stat. 1386 (1996).
(322.) U.S.S.G. App. A (1998).
(323.) U.S.S.G. [sections] 2B5.3(a) (1998).
(324.) U.S.S.G. [sections] 2B5.3(b)(1) (1998). However, the reference in [sections] 2B5.1 to the table contained in [sections] 2F1.1 applies only to the actual table, not to the entire offense guideline, which means that enhancements contained in [sections] 2F1.1 are not applicable to defendants convicted of violating [sections] 2319 or [sections] 2320. "An instruction to use a particular subsection or table from another offense guideline refers only to the particular subsection or table referenced, and not to the entire offense guideline." U.S.S.G. [sections] 1B1.5(b)(2) (1998). But cf. Miner, infra note 325, at 307 (criticizing the U.S.S.G. penalties for copyright felonies as "much too low").
(325.) 18 U.S.C. [sections] 2319(b)(1) (1994). The Copyright Felony Act does not require that all affected copyrights be of the same class or held by the same copyright owner. Saunders, supra note 116, at 690. The ten copies or phonorecords can be an aggregation of works by different authors, allowing for the establishment of a case of criminal copyright infringement against an infringer who has adversely affected several different copyright holders. Id. As stated in United States v. Larracuente, 952 F.2d 672 (2d Cir. 1992), the definition of "retail value" in cases involving copies of good quality is "the suggested retail price of the legitimate copyrighted work when it was released and not the value of the infringing copies." Accord United States v. Cho, 136 F.3d 982 (5th Cir. 1998); United States v. Ellerbee, 73 F.3d 105, 109 (6th Cir. 1996); United States v. Hicks Hicks , Edward 1780-1849.
American painter of primitive works, notably The Peaceable Kingdom, of which nearly 100 versions exist. , 46 F.3d. 1128 (4th Cir. 1995). See generally Roger J. Miner, Considering Copyright Crimes, 42 J. COPYRIGHT SOC'Y U.S.A. 303, 310 (1995).
(326.) Saunders, supra note 116, at 690
(327.) 18 U.S.C. [sections] 3571(b)-(c) (1994).
(328.) 18 U.S.C. [sections] 3571 (d) (1994). For an example of the application of the Sentencing Guidelines to copyright felonies, see Larracuente, 952 F.2d at 674-75. 329. 18 U.S.C. [sections] 2319(b)(2) (1994).
(330.) 18 U.S.C. [subsections] 2319(b)(3), 3571(b)(5) (1994).
(331.) 17 U.S.C. [sections] 506(b) (1994); see also United States v. One Sharp Photocopier photocopier
Device for producing copies of text or graphic material by the use of light, heat, chemicals, or electrostatic charge. Most modern copiers use a method called xerography. , 771 F. Supp. 980, 984 (D. Minn. 1991) (finding government is entitled to forfeiture of a copier used to illegally duplicate software operations manual accompanying copyrighted computer software).
(332.) 18 U.S.C. [sections] 2319A(a) (1994).
(333.) 18 U.S.C. [sections] 2319A(a) (1994).
(334.) 18 U.S.C. [sections] 2319A(b)-(c) (1994).
(335.) 35 U.S.C. [sections] 292(a) (1994); see Accent Designs, Inc. v. Jan Jewelry Designs, Inc., 827 F. Supp. 957, 968-70 (S.D.N.Y. 1993) (applying [sections] 292(a)'s fining mechanism).
(336.) See Krieger v. Colby, 106 F. Supp. 124, 131 (S.D. Cal. 1952) (imposing eight separate fines on defendants who received shipments of goods whose labels violated the predecessor to [sections] 292). But see Sadler-Cisar, Inc. v. Commercial Sales Network, Inc., 786 F. Supp. 1287, 1296 (N.D. Ohio 1991) (holding that "continuous markings over a given time constitute a single offense" under [sections] 292(a)).
(337.) 35 U.S.C. [sections] 292(b) (1994); see also Mainland Indus., Inc. v. Standal's Patents, Ltd., 229 U.S.P.Q. (BNA) 43, 46 (D. Or. 1985) (holding that half the fines are payable to the United States), aff'd, 799 F.2d 746 (Fed. Cir. 1986).
(338.) 18 U.S.C. [sections] 497 (1994).
(339.) 18 U.S.C. [sections] 497 0994).
(340.) 18 U.S.C. [sections] 3571(b) (1994) (outlining fines for individuals); 18 U.S.C. [sections] 3571(c) (1994) (setting forth fines for organizations); 18 U.S.C. [sections] 3571(d) (1994) (stating that fine equals twice gross gain or loss when violators have pecuniary Monetary; relating to money; financial; consisting of money or that which can be valued in money.
pecuniary adj. relating to money, as in "pecuniary loss. gain or if victim suffer loss).
(341.) U.S.S.G. App. A(1998).