Copyright and the Internet

The Internet poses both enormous promise and great risk for companies. Although the Internet opens a vast array of new business opportunities to customers without the need to establish brick-and-mortar stores, a company's valuable trade secrets and other assets can be disseminated easily to millions of others with just a keystroke. Moreover, improper use of a company's resources can lead to liability for infringement, defamation, and harassment.

Perhaps the three most significant issues confronting businesses in the electronic age are the use of unlicensed software, which can subject a company to civil and criminal liability; improper use of the Internet by employees, which can also subject a company to liability; and protection of a company's Web site. Although companies cannot predict or avert every possible danger, they can go a long way toward protecting themselves from liability by establishing and enforcing software compliance and Internet usage policies. Samples of policies are found in this chapter. Similarly, companies can protect their Web sites from infringement by implementing and posting a legal notice or disclaimer section on their Web sites confirming the terms and conditions for use of their sites, verifying that no warranties are being made, and stating that links to others' sites do not constitute endorsement of products or services offered at those sites. Further discussion of Web site terms and conditions policies is found later in this chapter.

The Risk of Using Unlicensed Software

One of the most alarming trends today is the use of unlicensed software. Experts estimate that the use of unlicensed software causes a loss of revenue of nearly $3 billion annually in the United States. The proliferation of unlicensed software is easy to understand because improper use is so readily accomplished. No additional product need be bought, and software can be copied easily or accessed by multiple users through a network. The ease of copying and access itself leads to the misconception that the purchase of one software package for a company is sufficient for companywide use.

Software makers have become increasingly vigilant about ensuring that their software is not pirated or used without license. Because it is quite common for employees to make copies of software and install it on another computer for home use, for a friend, or for a coworker, software makers often join associations to protect their proprietary rights. One of the best known associations is the Software Information Industry Association (SIIA, formerly known as the Software Publishers Association), which has established an antipiracy division devoted to locating cases of retail, corporate, and Internet piracy. In many instances, former disgruntled employees report piracy to SIIA. Microsoft has become especially effective in locating software pirates and maintains an office in Florida dedicated exclusively to combating software piracy in South Florida and Latin America. Penalties for the use of unlicensed software have included back payments for the unlicensed software, injunctions ordering audits of a company's computers to locate pirated software, and imprisonment. In 1999, a father and son were sentenced to five years and one year in prison, respectively, for engaging in a conspiracy to sell more than $20 million of pirated Microsoft software.

One issue confronting many companies today is the use of software by employees who work at home either exclusively or on a flexible telecommuting schedule. Although some software companies allow their software to be used both on company premises and at home, in many instances loading a copy of a software program licensed to an employer onto a home computer is a violation of the software license and of copyright law. Thus, companies need to make sure that software used at home for business use is properly licensed. Additionally, the use of unlicensed software promotes viruses, which can readily destroy a company's valuable information stored on a computer.

How can a company protect against piracy? SIIA offers an audit program to identify whether a company's software is properly licensed. Access SIIA's Web site at www.siia.net and search for ''Audits'' or ''Software Management Tools.'' Companies should also implement and enforce a software compliance program that clearly notifies employees that software used by employees must be properly licensed and must not be copied for home use and that employees should report any violations or piracy to a designated company representative. Policies related to software usage can be presented to employees as separate agreements or can be included in the company's employee handbook, which employees should be required to sign, confirming that they have read the handbook and agree to its terms. See Figure 12-1 for sample software usage policy.

Internet Policies

Because a company's electronic communication systems are owned by the company, it must ensure that those systems are used for business purposes only. Improper use of the Internet during business hours not only results in a loss of productivity but can also lead to liability, as a court recently ruled in holding that Continental Airlines could be liable for defamatory and harassing remarks about an employee that were posted in a chat room that Continental Airlines knew about and could have controlled. Thus, companies should implement Internet usage policies to ensure that employees understand that use of the Internet during business hours must be for business purposes only and that improper use can lead to discipline, including termination.

How does a company determine that its electronic communication systems are being used improperly? Generally, companies have a right to monitor use of their online communication systems as long as employees are notified that the company might engage in such monitoring. Implementing and enforcing an Internet usage policy is the easiest way to help protect a company from liability for improper Internet usage during business hours. Such policies can be provided to employees as separate agreements or can be incorporated into a company's employee handbook. Monitoring of phone conversations by employers is generally illegal. (Customer service and telemarketing calls can be monitored if it is disclosed each and every time at the beginning of the call. See Figure 12-2 for a sample Internet usage policy.

Figure 12-1. Software usage policy.
  1. General Statement of Policy. It is the policy of ABC, Inc. (the ''Company''), to respect all computer software copyrights and to adhere to the terms of all software licenses to which the Company is a party. The Company will take all steps necessary to prohibit users from duplicating any licensed software or related documentation for use on the Company's premises or elsewhere unless the Company is expressly authorized to do so. Unauthorized use or duplication of software may subject users and the Company to civil and criminal penalties under the U.S. Copyright Act. The Company does not permit any user to use software in any manner inconsistent with applicable license agreements, including giving or receiving software from clients, contractors, customers, and others.

  2. Acquisition of Software. All software acquired by the Company must be purchased through the Information System (IS) Department. Software acquisition channels are restricted to ensure that the Company has a complete record of all software that has been purchased for the Company's computers and can register, support, and upgrade such software accordingly. This includes software that may be downloaded or purchased from the Internet.

  3. Registration of Software. The IS Department is responsible for completing registration and inventory requirements before installing software. Because of personnel turnover, software will be registered in the Company's name rather than in the name of an individual user.

  4. Home Computers. The Company's computers are owned by the Company and must be kept both software legal and virus free. Only software purchased through the Company's procedures described in this policy may be used on the Company's computers. Users are not permitted to bring software from home and load it onto the Company's computers. Similarly, Company-owned software cannot be taken home and loaded on a user's home computer unless express permission is received from the Company's software manager. If a user is to use software at home, the Company will purchase a separate package that will be owned by the Company and registered to it. Nevertheless, because some software companies allow home use under their license agreements with the Company, home use may be permitted. Use of Company-owned software at home is permissible for business use only. Users should consult with the Company's software manager to determine whether home use is appropriate. In the event a user ceases to work for the Company, any Company-owned software must be removed from a user's home computer, and related documentation and materials must be returned to the Company.

  5. Use of Software. Software can be used only in accordance with the terms of applicable license agreements. Unless otherwise authorized in the license, any duplication of copyrighted software, except for backup and archival purposes by the Company's software manager, is a violation of copyright law. Additionally, such unauthorized duplication is a violation of the Company's policies. Thus, all users are subject to the following rules:

    1. All users must use all Company-owned software strictly in accordance with Company license agreements and this policy. All users acknowledge that they do not own this software or its related documentation and, unless expressly authorized by the software owner, may not make additional copies except for archival purposes.

    2. The Company does not tolerate the use of any unauthorized copies of software. Any person illegally reproducing software may be subject to civil and criminal penalties, as well as discipline according to the Company's Employee Handbook, including termination of employment.

    3. Users cannot use software within the Company that has been brought in from any unauthorized location, including but not limited to the Internet, home, friends, and colleagues.

    4. Any user who determines that there may be a misuse of software within the Company must notify the Company's software manager.

    5. All software owned by the Company must be used solely for the Company's business purposes and must be purchased through the procedures set forth in this policy.

___________________________________Date:___________________________________
Signature

Web Site Considerations and Policies

The use of a Web site is an easy and inexpensive way for a company to provide information to customers and potential customers and achieve national and even global recognition. Even if a company does not sell goods or services through its Web site but merely uses the site as an information and marketing tool, a number of legal considerations are involved, and the company's Web site should be reviewed periodically to ensure that it does not infringe the rights of others.

The following tips can help companies ensure that their Web site increases business rather than liability.

Ownership of Web Site Content

Make sure your company owns its Web site content. If a company engages another to create its Web site, appropriate language should be included in the contracting documents to ensure that the company will own the finished product and all content. Otherwise, the party who created the site may own the content, and the commissioning company will not be able to revise the content because such would violate the creator's rights to create derivative works. Moreover, the contract should provide that the designer will use only original material and will indemnify the company if a claim is made that the company's Web site infringes material owned by another. If the company's Web site has already been created, the company should confirm that the company owns the content and, if necessary, obtain an assignment of copyright from the Web site creator. See Figure 10-2 for a sample copyright assignment form.

Figure 12-2. Internet usage policy.
The following policy applies both to the Company's internal network and electronic mail (e-mail) system and to that of any electronic communication provider, such as America Online, to which the Company affords access (''Systems'').
  1. The Systems, documents stored thereon, and electronic messages are owned by the Company.

  2. E-mail, network, and Internet access is restricted to authorized business use only. Company personnel may use the Company's Systems and computer and data communication resources solely for the furtherance of the Company's business activities. Personnel should not use these resources for nonbusiness matters.

  3. Confidential Company or client materials may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way.Modification of such materials or use of them for any other purpose, except as permitted herein or with the Company's prior written consent, is a violation of the Company's copyrights and other proprietary rights.

  4. Use of the Company's computer and data communication resources is subject to periodic monitoring, and there is no expectation of privacy regarding online activities, regardless of how material is sent, received, or created.

  5. The Company expressly prohibits the transmission of any discriminatory, offensive, harassing, or threatening communications of any kind or nature, including pictures or other images.

  6. All e-mail messages are automatically stored in backup or archival files, regardless of an employee's ''deletion'' of a message.

  7. All stored e-mail messages and all material downloaded from the Internet are subject to periodic review at the discretion of management.

  8. Company personnel may not print, upload, transmit, or disseminate another party's copyrighted materials, including software programs.

  9. Deliberately wasting computer resources, knowingly interfering with the normal operation of the Company's Systems, using the Systems to gain unauthorized access to any computer system, attempting to monitor or tamper with another employee's communications or files, knowingly running or installing a program intended to cause damage or place an excessive load on the Systems, and using the Systems in any way to adversely affect the Company or its customers are prohibited.

  10. Employees are provided individually selected, confidential passwords for the protection of the Company and not to ensure any privacy unique to the employee. Employees are expected to keep their passwords secure and should safeguard their logon ID and password from disclosure.

  11. Penalties for violation of any of the terms of this Internet Usage Policy may range from a warning to suspension of Internet privileges to probation to termination of employment, depending upon the nature of the violation.

  12. Access to and use of the Company's Systems constitute consent for Company recording and monitoring of all electronic material and acceptance of the terms of this policy.


Use of a Copyright Notice

Because the material on a company's Web site can be protected by copyright, a copyright notice should be displayed prominently on the home page of the company's Web site. Although copyright registration affords a number of benefits, registration may be impractical for companies whose Web sites change continually and include new material, which would then necessitate repeated copyright applications. The use of a notice, though not required, will defeat a claim of innocent infringement, so companies should place the notice prominently on their Web sites. Such a notice should take the following form: ©2000 Alliance Consulting, Inc.

Linking to Others' Sites

As discussed in Chapter 7, linking to others' sites can be risky. To eliminate risk, ask permission before linking to another's Web site. At a minimum, use only narrative instruction (for example, ''Further information can be obtained at ABC Inc.'s Web site at www.xxx.com'') and refrain from using another company's trademarks or logos. Deeplinking, which bypasses another's home page to information deep within the site, is perhaps the most risky conduct of all and should be avoided. To further reduce risk, appoint one individual who has the sole authority to make changes to the company's Web site.

Terms and Conditions Sections

Most companies provide a link on their home pages to their terms and conditions, privacy policies, legal terms, or disclaimer sections. Most users probably will not read these in depth, if at all, but such policies can protect a company by allowing it to assert that it adequately notified users of company policies, and a user is thus liable for actions violating such policies. To review sample terms and conditions, check the legal disclaimers used on the Web sites of large companies such as www.ibm.com, www.ford.com, and www.microsoft.com.

At a minimum, the terms and conditions should include the following:

  • A statement that use of the Web site is deemed to be an agreement to the Web site owner's terms and conditions and that if a user does not agree to the terms and conditions, the user should not continue to use the site

  • A reminder that the Web site design, text, and illustrations are owned by the company and that material from the site cannot be copied, reproduced, republished, uploaded, posted, transmitted, modified, or distributed in any way

  • A statement that links to another's site are not endorsements or approvals of those sites or of products or services offered at those sites and are provided only for the user's convenience

  • A statement that material posted or transmitted to the site will be treated as nonconfidential and that users who transmit materials to the company's site agree that the company may use the material for any purpose, including reproduction, publication, transmission, and posting

  • A disclaimer that the materials on the site are provided as-is, without warranties of any kind, and that the Web site owner will not be liable for any damages arising out of or in connection with use of the site, including losses caused by viruses, communications delays, or failures

  • A statement that by accessing the site, users agree that jurisdiction for any disputes arising between the parties will be where the company has its principal place of business

  • A notice that any trademarks of the company shown on the site are owned by the company and cannot be used by others without prior written consent

  • A copyright notice

Doing Business on the Web

Although conducting business on the Web presents enormous opportunities to reach customers, doing business on the Internet also entails some risks for most companies. The most significant areas of concern are as follows:

  • Jurisdiction. Injuries and damages based on electronic transactions and communications can subject the sender of the information to jurisdiction in venues in which the sender does not physically do business. Generally, the more interactive a Web site, the more likely that a court will require the sender to submit to jurisdiction in the locale where the message is received. If a Web site is passive, merely presenting text and information, the sender probably will not be subject to jurisdiction in the locale where the message was received. Web sites at which customers can order goods and services and interact with the sender typically have resulted in jurisdiction being imposed on the sender in any location where the message is received, even though the sender maintains no physical presence or office at that location. Although it is uncertain whether such a technique will be successful, companies should post a statement on their Web sites that parties doing business with the company automatically agree that venue will be in the state where the company's principal offices are located.

  • Contracts. If a company does business on the Internet and accepts orders and business, the contracts used should be as nearly identical as possible to the ones used by the company for conventional paper transactions (assuming that such contracts have been approved by legal counsel). Because online contracts generally are held to be just as valid as conventional paper contracts, the use of similar or identical documents helps a company ensure that its contracts are enforceable. Customers can be asked to review the contract and click an ''I accept'' bar. Under new legislation passed in 2000, such a click-through is a signature as valid as a signature on a paper document.

  • Linking. Courts are divided as to whether linking to a page with defamatory or illegal material subjects the linker to liability. In some cases it has been held that intentionally sending a person to a site offering pirated software constitutes contributory copyright infringement. The safest course of action is to routinely monitor the pages and sites to which a company links to review the sites for offensive, harassing, defamatory, or illegal material. If such material is present, immediately remove the link. Typically, Internet service providers such as America Online have a safe harbor such that they are not liable for harmful material sent through their systems unless they know of the material and refuse to stop it. Using such a policy as an analogy to linking by businesses suggests that innocent linking may be a defense. Linking to sites containing known pirated information is considerably more risky.

  • Metatags. The use of metatags (hidden codes that allow search engines to find a Web site) to divert traffic to one's Web site probably is unlawful where another party's trademark is used.

  • Licenses. The licenses required to operate a brick-and-mortar business apply with equal force to cyberbusinesses. Thus, if the sale of wine requires a license in a jurisdiction, offering the wine for sale over the Internet requires compliance with licensing regulations. Similarly, conducting contests over the Internet is highly regulated.

  • Privacy issues Sending unsolicited advertisements (spamming) is subject to intense scrutiny, and at least one company that sent such advertisements was found guilty of trespass. The Interactive Services Association provides information about marketing through unsolicited e-mails at its Web site at www.isa.net. Similarly, tracking, collecting, and using information gained from customers using a Web site raises privacy concerns. The Terms and Conditions section of the Web site could indicate that users have no expectation of privacy and that the Web site owner can use the information submitted for any purposes it likes. Because such policies are objectionable to most consumers, many companies state that the only information collected and stored for normal Web site use is the identity of the Internet service provider, the Web site that referred the user, the pages requested, and the time and date of that request. Most companies also state that for normal Web site usage, personally identifiable information such as name, mailing address, phone number, e-mail address, and social security number are not collected, stored, or passed along to any other company and that such information is collected only when needed to fulfill a customer's request. The Federal Trade Commission offers a variety of information and publications about ensuring Internet privacy on its Web site at www.ftc.gov. Although there is no legal requirement that a company adopt a privacy policy, such policies often provide reassurance to consumers.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.161.222