"For copyright, the implications are fundamental. Established notions about copyright become obsolete, rooted as they are in the technology of print. The recognition of a copyright and the practice of paying royalties emerged with the printing press. With the arrival of electronic reproduction, these practices become unworkable. Electronic publishing is analogous not so much to the print shop of the eighteenth century as to word-of-mouth communication, to which copyright was never applied." Ithiel de Sola Pool, Technologies of Freedom (1983) at 214.
"Intellectual property law cannot be patched, retrofitted, or expanded to contain the gasses of digitized expression any more than real estate law might be revised to cover the allocation of broadcasting spectrum." (Barlow).
To some, the Net poses the death of intellectual property protection regimes as we know it. Others, such as the NII Task Force, find that "[t]he coat is getting a little tight. There is no need for a new one, but the old one needs a few alterations." (Footnote omitted). Others have responded that "the Emperor's clothes still fit just fine." (Rose, Emperor's Clothes).
Features of the Net. I make the following presumptions about the future technology applicable to the Net.
To craft an intellectual property regime tailored to the digital age, it is important to evaluate the context to see how users actually behave. This provides a clue to whether it is realistic to expect users to conform their conduct to existing or proposed intellectual property protection regimes.
There are multiple perspectives about intellectual property rights on the Internet (see Rose, Is Copyright Dead?). These perspectives include:
(Note that there is also the moral rights perspective, which exists on a different scale but is most closely aligned with the Strong IP Regimes category.)
As Lance Rose has pointed out, no one segment dominates the other; rather, we can expect that each segment will continue to attract adherents well into the future. The issue then becomes whether we want to craft our laws to override the beliefs of people in categories A and B, or if we want to primarily conform the behavior of people in categories C and D.
Lance Rose has argued that we should acknowledge that there will always be people in Category A, regardless of the intellectual property protection regime (Rose, Emperor's Clothes).
There are a couple of other Net cultural aspects worth noting:
There are different types of intellectual property circulating on the Net that raise similar but distinct issues.
I draw a distinction between "software" and "content." This is not a rigid distinction. As I conceptualize it, software can be used to create content. This is somewhat tautological. For a more rigorous analysis of the distinction, see Samuelson et al., where they describe software as possessing "behavior."
In determining a proper protection regime for software, it is useful to assess exactly what "property" exists in software. This is not as obvious as it appears.
Samuelson et al. argue that software is more like a machine than an authored text. This suggests that copyright regimes are inherently unsuited to protect the value of software; rather, software is more like "industrial knowhow."
As a result, Samuelson et al. argue that one possible solution is to create a "registration depository" where creators of significant advances can register innovations and receive some protection for such registered concepts.
Contrast the Samuelson et al. position with Dyson's assertion that the software market has become so competitive that little value is created from the software functions themselves. Dyson believes that currently value from software is being generated from the distribution chain, which ultimately is likely to also lose value as Net distribution becomes costless (or nearly so).
In Dyson's world, software will become valueless because neither the functions nor the distribution warrant value. In such a world, creators will derive value from software creations by using such creations to create demand for ancillary services (technical support, skilled technicians, systems integration, customized proprietary programming).
Note that such a model is predicated on proper attribution, or else the creator will not be recognized and therefore not solicited for the ancillary services. Attribution may be facilitated by digital signatures. The NII task force also recognized the importance of attribution, even in the context of infringing behavior, by proposing to criminalize the fraudulent removal of identifying information from a creation.
As should be clear by now, the judgement over the created value in software completes affects the choice of a proper model. In Samuelson et al.'s world, the proper response is essentially more regulation. In Dyson's world, existing copyright models are adequate; if anything, "infringing" distribution/redistribution of software should be encouraged.
Choosing between the two models, and their offspring and derivatives, is difficult. However, as Lance Rose has noted, we have seen numerous successes of existing copyright laws of protecting the interests of creators while recognizing "normal" human behavior. As Rose's piece is entitled, "the Emperor's Clothes Still Fit Just Fine."
Furthermore, we should recognize that many creators will not need to rely on ex post facto suits for infringement to recoup value. Rather, there is some technology and logistical processes, of uncertain efficacy, in the pipeline that could result in extra-judicial prospective protection of software. Some examples:
Note that in the metering models, there will be a tremendous increase in the amount of information transmitted back and forth on the Net. These transmission demands will create costs that must be borne by someone--ultimately, the user.
There are two key types of information: loosely, information that creates value from being known, and information that creates value from being kept confidential. The latter group includes information that loses value over time (i.e., market information).
Without intellectual property protection, it is likely that information not for public consumption will be made available either by subscription/encryption or by patronage. Either way, the result will be stratification into the information poor and the information rich. In turn, this stratification will be highly correlated with wealth, leading to perpetuation of society classes.
Note that the stratification will not necessarily result from superior information, but from superior access to information. In "drinking from a firehose," it is helpful to have someone controlling the spigot. The spigot will be controlled by indexers, who will reap much value from their expertise.
Many creators fear the leakage of "exclusive" information. Some have suggested that leakage should be supported, because it has the same effect as marketing and creating demand for access to the complete proprietary information (Dyson). There is an emerging trend of giving away valuable information to become recognized as the leader in the industry; once again, rewards come from the sale of ancillary services (ex: allowing people to tape Grateful Dead concerts to create demand for attending Grateful Dead concerts and purchasing Grateful Dead paraphernalia; Fenwick & West's promotion of the Multimedia Law Primer, which is a promotion piece to induce browsers to buy the book, which in turn is a promotion piece to induce readers to hire Fenwick as attorneys). Others have argued that leakage is not an exclusively a threat on the Net, given the piracy that takes place with T-shirts, etc., but that there are limits to such piracy because someone engaging in the business of infringement will face much greater odds of being caught (Rose, The Emperor's Clothes).
The issue boils down to whether copyright laws are intended to prevent all forms of infringing behavior. In the context of information intended to be kept secret, there are probably other more efficient mechanisms to control infringing behavior: a combination of trade secret law, contractual provisions, and perhaps "pipe-narrowing" to make infringement costly: charging high connect times, restricting searches, and permitting access only with proprietary programs that disable certain features (Rose, SysLaw).
In the context of information that benefits from being known, there will continue to be much benefit from distributing such information as an entree to ancillary services. Again, the most important feature in such contexts will be the right of attribution. Presumably, appropriation by indexers and other data pirates will not pose a problem so long as the attribution remains.
Much information designed for public consumption will be advertiser-supported. Perhaps we will finally see the long-rumored merger of advertising and information. Perhaps the intermixing of advertising and content, such as we see on TV and in magazines, will remain robust. So long as the value comes from ancillary services (whatever is being advertised), the right to attribution remains fundamental.
Copyright laws still have a place, but as they do today, they will only protect the very valuable copyrighted materials. To the extent these are not protected by technology, infringers will face steep penalties and holders will have incentives to protect their interests. This suggests that the existing regime has its place, as it currently has, without modification and recognizing the limitations.
For those copyrights that have very high value, the proposed copyright clearance process may prove valuable.
One other approach to revitalize existing copyright laws is to recognize the ability of copyright holders to impose "shrinkwrapped" online use licenses on content. These might say, "I give the right for distribution for educational and research purposes only." Infringement of such licenses would give holders a right of action; one that would probably rarely be enforced, but would enhance the power of motivated holders.
Finally, there may be technology solutions to assist in preventing infringement. For example, Bell Labs has created a method to insert "serial numbers" for documents. This would imbed unique codes in documents, so that each and every copy could be traced to the original source, without being immediately obvious to any infringer. While this would not disable copying, it would provide disincentives if everyone knew the risk that the infringing copy could be traced back to them. (Voss). (See also Jim Warren, proposing a similar concept.).
Joint Efforts. The copyright scheme is not especially well-suited to assigning ownership interests when there is collective development. We have already seen this problem in multimedia, to which the copyright clearance process could provide some relief, but there remains the difficult issues arising from "message bases," digital sampling, and product produced by groupware.
Another analogous problem arises in assigning the ownership of programs created by programs.
Jurisdiction. The global nature of the Net, cutting across jurisdiction boundaries, creates an inevitable conflict of laws. For example, in some jurisdictions, accessing a web-accessible document might be deemed making and distributing an infringing copy. If a user from a jurisdiction without such a law browses the document, there has been unintentional and (IMO) harmless infringement.
This problem is especially acute in the context of moral rights, which are not universally recognized in all jurisdictions. Could a holder of moral rights assert that someone lacks the right to browse their document? Note that Pepper and Corrizini have placed a remark on their Website that commercial sites lacked the right to link to their site. Would such a restriction be more enforceable in a moral rights jurisdiction?
John Perry Barlow, "The Economy of Ideas: Selling Wine Without Bottles," Wired, March 1994. (available online at eff.org, in the Intellectual Property section, and at http://hotwired.lycos.com/).
Dan Burk, "Transborder Intellectual Property Issues on the Electronic Frontier," 5 Stanford Journal of Law and Policy Review (1994) (Available online at http://www.virtualschool.edu/mon/ElectronicProperty/BurkTransborderIPIssues.
Brad Cox, "Superdistribution," Wired, September 1994 at 89 (available online at hotwired.lycos.com).
Esther Dyson, "Intellectual Property on the Net," Release 1.0, December 28, 1994.
Jean Erhard, "Digital Rights," Internet World, November/December 1994 at 78.
Gary N. Griswold, "A Method for Protecting Copyright on Networks," Summer 1994. (Available online at http://www.cni.org/docs/ima.ip-workshop/Griswold.html).
Information Infrastructure Task Force, Intellectual Property and the National Information Infrastructure (Green Paper), preliminary draft, July 1994. (available online at http://www.virtualschool.edu/mon/ElectronicProperty/LehmanRptIntelProperty.html).
Lance Rose, "What Kind of Online Copyright System Do You Want? Tell the NII Task Force Today!," Boardwatch, September 1994 at 88.
Pamela Samuelson, "Legally Speaking: The NII Intellectual Property Report," Communications of the ACM, December 1994 (Available online at http://www.eff.org/pub/GII_NII/Govt_docs/HTML/ipwg_samuelson.html).
Deborah Reilly, "The National Information Infrastructure and Copyright: Intersections and Tensions," Journal of Patent and Trademark Office Society, December 1994 at 903.
Lance Rose, "Is Copyright Dead on the Net?," Wired, November 1993 at 112. (Available online at http://www.hotwired.com/)
Lance Rose and Jonathan Wallace, SysLaw (2d Ed.) 1992 at 59-60.
Lance Rose, "The Emperor's Clothes Still Fit Just Fine," Wired, February 1995 at 103 (available online at http://www.hotwired.com/).
Pamela Samuelson, Randall Davis, Mitchell D. Kapor, and J. H. Reichman, "A Manifesto Concerning the Legal Protection of Computer Programs," Columbia Law Review (forthcoming).
William S. Strong, "Copyright in the New World of Electronic Publishing," June 17, 1994 (Available online at http://www.press.umich.edu/jep/works/strong.copyright.html).
David Voss, "Stop That Copy," Wired, August 1994 at 34 (available online at http://www.hotwired.com/).
Jim Warren, "GovAccess.107," March 12, 1995.
Also, check out articles at ftp.research.att.com/dist