Академический Документы
Профессиональный Документы
Культура Документы
IN THE
UNITED STATES COURT OF APPEALS
FOR THE DISTRICT OF COLUMBIA CIRCUIT
Appellee,
V°
Appellant.
ARGUMENT ................................................................................................................................... 1
CONCLUSION .............................................................................................................................. 15
TABLE OF AUTHORITIES*
CASES
Alabama Power Co. v. EPA, 40 F.3d 450 (D.C. Cir. 1994) .......................................................... 12
Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240 (3d Cir. 1983) ........................ 9
Carson Harbor Village, Ltd. v. Unocal Corp., 270 F.3d 863 (9th Cir. 2001) ............................... 10
Community for Creative Non-Violence v. Reid, 490 U.S. 730 (1989) ........................................... 12
NaturalResources Defense Council, Inc. v. EPA, 907 F.2d 1146 (D.C. Cir. 1990) ..................... 10
Playboy Enterprises, Inc. v. Frena, 839 F. Supp. 1552 (M.D. Fla. 1993) ....................................... 7
Playboy Enterprises, Inc. v. Russ Hardenbaugh, Inc., 982 F. Supp. 503 (N.D. Ohio 1997) .......... 7
Sega Enterprises Ltd. v. MAPHIA, 857 F. Supp. 679 (N.D. Cal. 1994) .......................................... 7
Sony Corp. of A merica v. Universal City Studios, Inc., 464 U.S. 417 (1984) ................................. 9
Twentieth Century Music Corp. v. Aiken, 422 U.S. 151 (1975) ...................................................... 9
United States v. Stowe, No. 96C2702, 1996 WL 467238 (N.D. Ill. Aug. 15, 1996) ....................... 7
In re Verizon Internet Services Inc., 240 F. Supp. 2d 24 (D.D.C. 2003) ......................... 4, 9, 10, 14
ii
STATUTES
LEGISLATIVE MATERIAL
The Copyright Infringement Liability of Online and Internet Service Providers: Hearing
before the Senate Committee on the Judiciary, 105th Cong. (Sept. 4, 1997) ................ 5
Copyright Piracy, and H.R. 2265, The No Electronic Theft (NET) Act: Hearing Before
the Subcomm. on Courts and Intellectual Property of the House Comm. on the
Judiciary, 105th Cong. (Sept. 11, 1997) ................................................................ 6, 7, 8
Nil Copyright Protection Act of 1995 (Part II): Hearing Before the Subcomm. on Courts
and Intellectual Property of the House Comm. on the Judiciary, 104th Cong.
(Feb. 7-8, 1996) .......................................................................................................... 6, 8
Online Copyright Liability Limitation Act: Hearing Before the Subcomm. on Courts and
Intellectual Property of the House Comm. on the Judiciary, 105th Cong.
(Sept. 16-17, 1997) ........................................................................................................ 6
Statement by Marybeth Peters, The Register of Copyrights, Before the Senate Comm. on
the Judiciary, 108th Cong. (Sept. 9, 2003) available at
http://www.copyright.gov/docs/regstat090903.html ..................................................... 1
111
MISCELLANEOUS
Mark Eckenweiler & Benjamin Wittes, Cyberspace's Lingua Franca, Legal Times, Jan.
23, 1995.......................................................................................................................... 7
Pew Internet & American Life Project, The Impact of Recording Suite Against Music
File Swappers (Jan. 2004) at http://www.pewinternet.org/reports/pdfs/
PIP_File_Swapping_Memo_0104.pdf ........................................................................... 1
iv
The Recording Industry Association of America ("RIAA") respectfully submits this
petition for panel rehearing or rehearing en banc pursuant to Federal Rules of Appellate
Procedure 35 and 40. RIAA seeks further review because this case involves a question of
exceptional importance under the Digital Millennium Copyright Act ("DMCA"). In a case of
first impression, the panel sharply restricted the scope of the subpoena authority Congress
conferred in 17 U.S.C. § 512(h), rendering that authority useless as a practical matter and
defeating one of the essential objectives of the DMCA. The panel's misreading of the statutory
text produced a result that is irreconcilable with the Act's overall structure and purposes - and
that flatly contradicts the position of the Copyright Office of the United States. 1 If left
undisturbed, the decision threatens to curtail efforts by the recording industry to combat Internet
piracy that is decimating the industry - efforts that were just beginning to bear fruit. 2
ARGUMENT
Congress enacted the DMCA to combat the emerging reality of"massive piracy" of
copyrighted works on the Internet. S. Rep. No. 105-190, at 8 (1998) ("S. Rep."). Congress was
concerned that this piracy would hobble the Internet for two reasons: (1) Internet service
providers ("ISPs") would refrain from investing because of the threat of substantial liability for
infringement committed by their subscribers, and (2) copyright owners would hesitate to make
works available online because of the ease with which digital works can be pirated. Icl. Title II
of the DMCA, codified at 17 U.S.C. § 512, addresses both concerns. Section 512 confers upon
1 See Statement by Marybeth Peters, The Register of Copyrights, Before the Senate Comm. on
the Judiciary, 108th Cong. (Sept. 9, 2003) (http://www.copyright.gov/docs/regstat090903.html).
2 See Pew Internet &American Life Project, The Impact of Recording Industry Suits Against
Music File Swappers (Jan. 2004) (reporting that the number of Americans downloading music
files dropped by half since the recording industry began filings law suits against individual
infringers) (http://www.pewintemet.org/reports/pdfs/PIP_File_Swapping_Memo_0104.pdf).
ISPs certain limitations on liability, the terms of which vary according to the function the ISP
owners to combat piracy and act swiftly when notified of infringement being committed by users
The core of the congressional bargain struck in § 512 is that copyright owners should
seek redress in the first instance against infringing users, not ISPs, and that ISPs must facilitate
copyright owners' efforts to do so. For copyright owners to enforce their rights, however, they
need to learn the identities of those infringing their copyrights on the Internet, usually
anonymously. To achieve the DMCA's goals, Congress authorized copyright owners to obtain
this information from ISPs. Thus, pursuant to 17 U.S.C. § 512(h)(1), a copyright owner may
obtain from a district court clerk a "subpoena to a service provider for identification of an alleged
infringer" using the ISP's network. Section 512(h) also imposes numerous safeguards, requiring
copyright owners to specify their claims of infringement, limiting the information that may be
obtained by means of the subpoena, and restricting the use of information obtained by the
Section 512(h) subpoenas are critical to copyright owners' efforts to protect their rights in
the Internet age. As the panel acknowledged, "[t]he stakes are large for the music, motion
picture, and software industries." RIAA v. Verizon Internet Servs., Inc., No. 03-7015 at 15 (D.C.
Cir. Dec. 19, 2003) ("Slip op."). More than two billion infringing music files are downloaded
each month on peer-to-peer ("P2P") systems such as KaZaA. See RIAA Br. at 2. This massive
piracy has cost the music industry billions in lost revenues. Id. The infringement takes place in
broad daylight - every day millions of infringers upload and download copyrighted files on P2P
networks, shielded by the anonymity of an alias and an Internet Protocol ("IP") address.
2
Copyright owners can observe this infringement and can ascertain the IP addresses of infringers.
Only ISPs, however, can identify the actual persons committing infringement. Absent disclosure
This appeal arises out of RIAA's effort to use § 512(h) subpoenas to obtain the identities
without authorization. Id. at 6-7 (citing J.A. 81,233-34). Reversing the district court, the panel
held that Congress authorized § 512(h) subpoenas only when infringers store infringing material
on an ISP's network, and not when (as is often the case in P2P networks) such material is stored
on the subscribers' home computers and disseminated over the ISP's network, i.e., when the ISP
is acting as a mere "conduit." Slip. op. at 7. The panel identified no direct instruction from
Congress restricting the subpoena authority in that manner. Rather, the panel limited § 512(h) on
the basis of an inference drawn from a cross-reference in § 512(h) to another subsection of § 512.
As will be shown infra, the panel's interpretation rests on fundamental errors of statutory
construction. The panel's decision is worthy of further review, however, not merely because it
was wrong but because the panel's errors will eviscerate § 512(h), and with it the underlying
purposes of § 512. The panel authorized § 512(h) subpoenas where the DMCA gives copyright
owners another remedy (seeking removal of the infringing material or links to the infringing
material stored on the ISP's network, see § 512(b), (c), (d)), but eliminated their availability
where they are needed most, i.e., where the copyright owner's only option for stopping the
infringement is a direct suit against the infringer. 3 Even worse, the limited subpoena power the
panel preserved is of little value. Typically, an ISP storing infringing material on a website or
3 If the ISP does not store, cache, or link to the infringing material, the copyright owner cannot
benefit from the "notice and take down" provisions contained in §§ 512(b), (c) and (d) to stop
ongoing infringement.
3
bulletin board does not know the identity of individuals who post infringing material; those ISPs
simply post information sent by others. Only ISPs that provide the initial Internet access know
who the infringer (the sender) is. Under the panel's interpretation, however, copyright owners
can subpoena only ISPs that cannot identify the infringers, not the ISPs that can.
Because the vast majority of digital piracy involves P2P networks, the panel's misreading
of § 512(h) will subvert the balanced objectives of the DMCA. Copyright owners will be
prevented from asserting their rights directly against infringing users. At the same time, ISPs
will benefit in two ways: they will profit handsomely from illegal downloading over high-end
broadband services, see RIAA Br. at 3 (noting that over half the capacity of broadband networks
are consumed by P2P users), and will receive the DMCA's limitations on liability without the
concomitant obligation to do the most important thing they can do to stop infringement over their
networks - identify the infringers. Congress could not possibly have intended this result.
The district court found "no sound reason why Congress would enable a copyright owner
to obtain identifying information from a service provider storing infringing material on its
system, but would not enable a copyright owner to obtain identifying information from a service
provider transmitting the material over its system." In re Verizon Internet Servs., Inc., 240 F.
Supp. 2d 24, 35 (D.D.C. 2003). For its part, the panel never supplied any substantive
explanation for this irrational result. Regardless of whether an ISP transmits or stores infringing
material, the damage to the copyright owner from the infringement is the same (irreparable), the
subscriber's conduct is the same (unlawful), and the burden on the ISP to identify the infringer is
the same (minimal). While there may be a rationale for Congress's decision to give conduit ISPs
a broader limitation on liability than ISPs storing infringing material, there is no such rationale
for treating ISPs differently when it comes to identifying infringers. Id. at 35.
4
The panel's only defense of its constricted reading is its claim that "the legislative history
of the DMCA betrays no awareness whatsoever that internet users might be able directly to
exchange files containing copyrighted works." Slip op. at 14. Even if that assertion were correct
(and it is not), it fails as a justification. At the insistence oflSPs, Congress drafted the DMCA
broadly to ensure that it would not be immediately outmoded by changes in technology. See The
Copyright Infringement Liability of Online and Internet Service Providers: Hearing before the
Senate Comm. on the Judiciary, 105th Cong. 23, 25-26 (Sept. 4, 1997) (ISP testimony
advocating for a statute drafted by "function" which would be more adaptable to technological
change). The whole point of the DMCA was to provide broad, enduring rules for the future, and
thus to avoid the necessity of ongoing legislative revision. See generally, PGA Tour, Inc. v.
In any case, the text and legislative history of § 512 refute the panel's assumption.
Section § 512(a) - the provision for which ISPs fought the hardest - was designed to cover
certain situations in which the ISP serves only as a "conduit" for Internet users "directly...
exchang[ing] files containing copyrighted works." Slip op. at 14. ISPs would not have feared
derivative liability in these circumstances unless their subscribers were using the "conduit" to
including the § 512(a) limitation for conduit functions that do not involve storage - on ISPs
specifically provides for injunctive relief against ISPs to block infringement by subscribers even
where the infringing material resides on the subscriber's computer. These provisions presuppose
against, infringing activity where materials are stored on subscribers' computers and merely
transmitted by ISPs. The legislative record is replete with concerns that individuals would
engage in wide-ranging copyright infringement using the conduit facilities of ISPsfrom their
home computers. The most obvious of those is e-mail, a technology in wide use when the
DMCA was enacted in 1998. Congress heard testimony about the "growing use of 'blanket' e-
mail messages" to commit copyright infringement and about a specific infringer using e-mail
(and attachments thereto) to disseminate 150 copyrighted software programs. 4 One songwriter
explained to Congress the problems copyright owners faced from e-mail distribution systems
because ISPs had no obligation to reveal the identities of e-mail customers committing copyright
In this regard, the panel erred in contending that Congress was concerned only with File
Transfer Protocol ("FTP") sites and Bulletin Board Services ("BBS") stored on the systems of
ISPs, and with rogue ISPs. Slip op. at 14. Congress knew in 1998 that FTP sites and BBS
services (precursors to P2P services) on home computers were engines of copyright piracy. 6 The
4 Online Copyright Liability Limitation Act: Hearing Before the Subcomm. on Courts and
Intellectual Property of the House Comm. on the Judiciary, 105th Cong. 172, 175 (Sept. 16-17
1997) (statement of Ronald Dunn, President of the Information Industry Association); NII
Copyright Protection Act of 1995 (Part 2)- Hearing Before the Subcomm. on Courts and
Intellectual Property of the House Comm. on the Judiciary, 104th Cong. 84, 88 (Feb. 7-8, 1996)
(statement of Garry L. McDaniels on behalf of the Software Publishers Association). See also
Copyright Piracy, and H.R. 2265, The No Electronic Theft (NET) Act."Hearing Before the House
Subcomm. on Courts and Intellectual Property of the House Comm. on the Judiciary, 105th
Cong. 17-18 (Sept. 11, 1997) (statement of Kevin DiGregory, Deputy Attorney General,
Department of Justice) (describing use of e-mail to commit infringement of software programs).
5 See Online Copyright Liability Limitation Act: Hearing Before the Subcomm. on Courts and
Intellectual Property of the House Comm. on the Judiciary, 105th Cong. 156, 160 (Sept. 16-17,
1997) (statement of Allee Willis, songwriter).
6 The panel appears to have believed incorrectly that FTP sites and BBS sites resided only on
servers maintained by ISPs. Slip op. at 14. Rather, many FTP and BBS sites were located on
cases cited most prominently in hearings and in the House and Senate reports involved BBS
services operated from home computers. See, e.g., Religious Tech. Ctr. v. Netcom On-line
Communication Servs., Inc., 907 F. Supp. 1361, 1365-66 (N.D. Cal. 1995) (describing BBS
operated at home and linked to the Internet by an ISP) (cited at S. Rep. at 19 n.20); Playboy
Enters., Inc. v. Frena, 839 F. Supp. 1552, 1555-56 (M.D. Fla. 1993) (BBS operated from
individual's own computer) (cited at S. Rep. at 19 n.20); Sega Enters. Ltd. v. MAPHIA, 857 F.
Supp. 679, 682 (N.D. Cal. 1994) (computer servers for infringing BBS located in defendant's
residence); Playboy Enters., Inc. v. Russ Hardenbaugh, Inc., 982 F. Supp. 503,507 (N.D. Ohio
1997) (describing FBI seizure of BBS equipment from defendant's premises), z The Department
of Justice testified concerning infringement committed from FTP and BBS sites run on home
computers. See Copyright Piracy, and H.R. 2265, The No Electronic Theft (NET) Act: Hearing
Before the Subcomm. on Courts and Intellectual Property of the House Comm. on the Judiciary,
105th Cong. 17-18 (Sept. 11, 1997) (statement of Kevin DiGregory, Deputy Attorney General,
Department of Justice). Indeed, the Department was already prosecuting criminal copyright
infringers operating BBS services from their homes. See, e.g., United States v. Stowe, No.
In all of these situations - well-known to Congress when it enacted the DMCA - only the
conduit ISP that provides access to the Internet can identify the infringer. At least one major ISP
recognized this problem and proposed that, in exchange for limitations on liability, ISPs should
home computers. See Andrew Leonard, Mutiny on the Net, Salon, March 1998, available at
http://archive.salon.com/21 st/feature/1998/03/cov_20feature.html (FTP software "allows anyone
with a computer and a modem to make [pirated music] files on their home computer accessible
to the rest of the Net"); Mark Eckenweiler & Benjamin Wittes, Cyberspace's Lingua Franca,
Legal Times, Jan. 23, 1995 ("[m]any BBS's are operated by hobbyists off of home computers").
7 By 1998, BBS services operated out of people's homes were a also a haven for obscenity and
child pornography. See, e.g., United States v. Thomas, 74 F.3d 701,705 (6th Cir. 1996)
(describing obscene bulletin board operated from home since 1991).
be required, "[i]n those cases where the allegedly infringing content is not on facilities controlled
by the lISP] .... [to] take[] reasonable steps to assist the copyright owner in identifying the party
that does control the hosting facility (upon receipt of a subpoena if necessary)." Nil Copyright
Protection Act of 1995: Hearing Before the Subcomm. on Courts and Intellectual Property of the
House. Comm. on the Judiciary, 104th Cong. 261 (Feb. 7-8, 1996) (testimony of Stephen M.
The overriding theme of the legislative record is that with the expanding power of
personal computers and rapidly increasing bandwidth, anyone would be able to perpetrate
massive copyright infringement. See Copyright Piracy, and H.R. 2265, The No Electronic Theft
(NET) Act: Hearing before the Subcommittee on Courts and Intellectual Property of the House
Committee on the Judiciary, 105th Cong. (Sept. 11, 1997) (Statement of Marybeth Peters,
Register of Copyrights) (noting how "a disgruntled former employee, a dissatisfied customer,
[or] an Internet user opposed to the fundamental concept of copyright law" can "inflict
tremendous damage to the market for a copyrighted work"). The panel was thus fundamentally
in error in concluding that users "directly... exchang[ing]" copyright works (such as through
P2P infringement) was an unforeseen risk when Congress enacted the DMCA. Rather, Congress
fully understood the crippling piracy that already beset the music industry (among others) and
that would only get worse. In the DMCA, Congress acted to give copyright owners the tools to
stop such piracy, wherever the infringing material was stored. The panel's opinion strips
Finally, in assessing the need for further review, it is important to recall that the ill effects
of the panel's decision are not confined to copyright owners. Enforcing copyright laws serves
the public interest, because "the ultimate aim" of the copyright laws is "to stimulate artistic
creativity for the general public good." Twentieth Century Music Corp. v. Aiken, 422 U.S. 151,
156 (1975); see Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 429 (1984)
Indeed, "it is virtually axiomatic that the public interest can only be served by upholding
creative energies, and resources which are invested in the protected work." Apple Computer,
Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1255 (3d Cir. 1983) (internal quotation and
citation omitted). The panel's decision threatens to allow literally billions of copyright violations
Despite expressing regret for the harmful consequences of restricting § 512(h), the panel
believed that the plain meaning of the statutory text compelled that result. The panel's reading,
however, rests on fundamental errors of statutory construction. Once those errors are brought
into focus, and the provisions on which the panel relied are read in light of the overall structure
and purposes of the DMCA, it should be clear that the panel misread § 512(h).
Section 512(h) does not impose any direct limitations on a copyright owner's ability to
obtain DMCA subpoenas. As the district court observed, had Congress wanted to limit § 512(h)
to exclude conduit providers, it could easily have done so directly. Congress "could have stated
such a limitation in subsection (h), or stated that subsection (h) does not apply to subsections (a),
(b), or (d), or even have placed the subpoena authority itself within subsection (c). But Congress
did not do so." 240 F. Supp. 2d at 33. According to the panel, Congress chose the peculiar
the ISP with "a notification described in subsection (c)(3)(A)." Although a copyright owner
seeking the identity of a subscriber using a P2P system can indisputably satisfy the other
prerequisites listed in § 512(c)(3)(A), the panel concluded that one such prerequisite could never
be satisfied - namely, "[i]dentification of the material that is claimed to be infringing.., and that
locate the material." § 512(c)(3)(A)(iii). The panel believed that an "ISP can neither 'remove'
nor 'disable access to' the infringing material" when it resides on a subscriber's computer rather
than the ISP's network. Slip op. at 9-10. For this reason, and this reason alone, the panel
concluded that the cross-reference to § 512(c)(3)(A) necessarily meant that § 512(h) subpoenas
could not issue unless infringing material is stored on the ISP's network.
The panel, however, erred in concluding that an ISP cannot "disable access" to material
residing on a subscriber's computer, and that error was the product of the panel's misuse of a
canon of statutory construction. The panel rejected the district court's common-sense conclusion
that an ISP "certainly can disable access to the material by terminating the account altogether."
240 F. Supp. 2d at 33 n.5. The panel noted that the DMCA uses the words "disable access" and
"terminat[e]" distinctly elsewhere in § 512 (specifically in § 512(j), which governs the scope of
permissible injunctions), and invoked the canon that different terms used in a statute are
In so doing, the panel ignored the possibility that the terms have distinct, yet overlapping
meanings. Yet that is a common occurrence. Courts have routinely recognized that even distinct
statutory terms can have an overlapping or common meaning. See, e.g., Natural Res. Def.
Council Inc. v. EPA, 907 F.2d 1146, 1163 (D.C. Cir. 1990) (rejecting argument that terms
cannot have overlapping meaning where "the language of the definitions does not explicitly
indicate that they are to be mutually exclusive"); Carson Harbor Village, Ltd. v. Unocal Corp.,
10
270 F.3d 863,882 (9th Cir. 2001) (concluding that "there is at least substantial overlap between"
two terms used in the same statute and "reject[ing] the interpretation that the difference in the
definitions requires us to... make the terms mutually exclusive"); United States v. Hill, 79 F.3d
1477, 1482-83 (6th Cir. 1996) (noting that two terms in the same provision "must have different
meanings," but concluding nonetheless "that there is considerable overlap between the two
terms"). As the Supreme Court has said, "Congress... is permitted to use synonyms in a
Thus, the canon that different terms in a statute are presumed to have different meanings
does not eliminate the need to give each term its ordinary meaning, even if those ordinary
meanings overlap to some extent. In the DMCA, Congress used terms that have such an overlap
and did so purposefully. The objective of disabling access to infringing material is to prevent the
outside world from accessing that material. Terminating a subscriber's account achieves that
objective. The DMCA authorizes the termination of a subscriber's account not simply (as the
panel appeared to believe, slip op. at 10) as a punishment to prevent the infringer from accessing
the Intemet to surf the World Wide Web. Rather, it is a remedy for the copyright owner to
prevent others from gaining access to infringing material (either by accessing the subscriber's
computer or receiving a transmission from the subscriber). Whether infringing material is stored
on a website hosted by an ISP or on a home computer, in each case it is connected to the Internet
(and to the world-at-large) by the ISP's facilities. In either situation, tuming offthe connection
to the Intemet prevents others from accessing it and thus "disables access" to the infringing
material. Indeed, were Verizon ever sued for copyright infringement arising out of the conduct
of a subscriber whose account it had terminated, it would certainly claim that terminating the
subscriber's account satisfied any obligation to disable access to the infringing material.
11
Similarly, the panel was wrong in drawing from § 5120) the proposition that disabling access
and terminating must have mutually exclusive meanings. If an ISP under an injunction to disable
access to infringing material were to terminate the account of the subscriber, there is no doubt
the ISP would be in compliance with the injunction -thus proving that, as used in § 512(j), the
terms "disable access" and "terminat[e]" do not have mutually exclusive meanings.
The district court read the statute correctly. The court gave the phrases "disable access"
ineffective." Webster's Third New International Dictionary 642 (1993). To "terminate" means
"to bring to an ending or cessation in time, sequence or continuity." See id. at 2359.
Terminating a subscriber's account brings an end to the subscriber's connection to the Intemet
and thus makes access to the subscriber's infringing material ineffective, i.e, disabled.
In contrast, the panel appears to have created its own specialized technical meaning for
each term. Congress, however, did not define "disable access" or "terminate a subscriber's
account," and the terms do not have established meanings in the legal or computer fields.
Community for Creative Non-Violence v. Reid, 490 U.S. 730, 739-40 (1989); McDermott Int 'l,
Inc. v. Wilander, 498 U.S. 337, 342 (1991). Nor did Congress place the terms in quotation
marks, refer to other authorities to define the terms, or indicate that the terms should be given
anything other than their ordinary meanings. See Utah v. Evans, 536 U.S. 452, 467 (2002);
Alabama Power Co. v. EPA, 40 F.3d 450, 454 (D.C. Cir. 1994). Indeed, had Congress wanted to
give the terms specialized meanings, it demonstrated elsewhere in § 512 that it knew how to do
8 One other term the Congress expressly defined - twice - is "service provider." § 512(k)(1)(A)
& (B). It is crystal clear that Congress intended the term "service provider" as used in
subsection (h) to encompass ISPs providing "conduit" functions. See § 512(k)(1)(B). As the
12
In elevating its preferred canon above all others, the panel paid no heed to the "basic
principle of statutory construction.., that where words in a statute are not defined, they must be
given their ordinary meaning." United States v. Granderson, 511 U.S. 39, 71 (1994) (internal
quotation and citation omitted). Thus, wholly apart from any consideration of the DMCA's
structure and purposes, the panel's reading of the text of § 512 fails on its own terms.
The panel's opinion ignores the text, structure, and purposes of§ 512(h). More
unmoored from the text and structure of § 512(h), as well as the structure of § 512 as a whole.
The sharp contrast between the broadly worded § 512(h) and the narrowly crafted
limitations on liability in subsections (a)-(d) demonstrates that Congress did not intend § 512(h)
to be restricted to ISPs that perform specific functions. For each of subsections (a)-(d), Congress
specified the functions ISPs must be performing to qualify for a limitation on liability. Each
subsection contains prefatory language that clearly and expressly defines a specific ISP function.
construction making clear the function an ISP performs is critical to determining the application
of §§ 512(a)-(d). See § 512(n); S. Rep. at 55 ("Section 512's limitations on liability are based on
("Subsection [(n)] establishes a rule of construction applicable to subsections (a) through (d)").
and included no prefatory language limiting its application to ISPs performing particular
functions. Section 512(h) by its terms applies broadly to all ISPs performing all functions. In
district court found, it is deserving of some weight that Congress went out of its way to define
the term broadly when it is used subsection (h). Although the panel characterized this argument
as "silly," slip op. at 11, it is hard to understand why Congress would have taken such a step if it
intended that subsection (h) could never apply to conduit providers, as the panel concluded.
13
this regard, § 512(h) is similar to § 512(i), which also applies to all ISPs, including conduit ISPs.
Moreover, § 512(n)'s rule of construction does not apply to § 512(h). Congress could hardly
have been more clear that § 512(h) was not limited to ISPs performing a certain set of functions.
Nor did Congress anywhere suggest that it intended, as the panel concluded, that
subsection (c)(3)(A) drastically restricts the scope of the subpoena provision. Congress made
clear that it intended subsection (c)(3)(A) to provide "procedures," not substantive limitations.
See H. Rep. No. 105-55 (II) at 55 (1998). Subsection (c)(3)(A) is referenced in numerous
subsections within § 512 as a mechanism for providing ISPs with sufficient information to
comply with their obligations. In none of those other subsections, however, does it create an
implicit limitation on the scope of the subsection. Cf slip op. at 12-13 (discussing adoption of
subsection (c)(3)(A) in subsections (b) and (d)). Nor should it here. The obvious purpose of
establishes its bona tides and communicates the needed information to the ISP. Congress made
use of the cross-reference for that reason, and not to limit the substantive scope of § 512(h). 9
Moreover, the limitation that the panel imposed does not appear in subsection (c)(3)(A).
The panel held that § 512(h) applies solely when ISPs are storing infringing material. Nothing in
subsection (c)(3)(A), however, mentions where infringing material is stored. That requirement is
in an entirely different portion of subsection (c) that is not referenced in subsection (h). The
effect of the panel's decision is to take a substantive limitation in subsection (c)(1), import that
9 One oddity of the panel's holding that a copyright owner cannot obtain a § 512(h) subpoena
because the ISP cannot "disable access" to infringing material is that § 512(h) does not require
an ISP to disable access to any material at all. It merely requires the ISP to identify the infringer,
something the ISP clearly can do. Indeed, the district court recognized the different purpose
fulfilled by subsection (h) and served by subsection (c)(3)(A) by holding that "[t]he requirement
for the notification is simply that it identify the infringing material to be removed, not that
removal be effectuated." 240 F. Supp. 2d at 33 n.5.
14
limitation by reference into the wholly procedural subsection (c)(3)(A) through the phrase
"disable access," and then import it again by reference into subsection (h) - all without any
suggestion by Congress (in the text or legislative history) that it intended such a result.
Finally, the panel also ignored a provision that speaks directly to the issue in this case.
The panel concluded that, because DMCA notifications to conduit ISPs would be ineffective in
requiring the ISP to disable access to infringing material, such notifications cannot form the basis
for a DMCA subpoena. Section 512(h), however, contemplated exactly this situation and makes
clear that an ISP's obligation to identify infringers is distinct from the obligation imposed on
ISPs to disable access to infringing material upon receipt of a DMCA notification. Thus, an ISP
must respond to a DMCA subpoena "notwithstanding any other provision of law and regardless
of whether the service provider responds to the notification." § 512(h)(5) (emphasis added).
Congress thus envisioned that there would be situations, as here, in which an ISP need not
For all of these reasons, an examination of the text, structure, and purpose of the DMCA
compels the conclusion that § 512(h) is not limited as the panel believed, but applies to all ISPs
CONCLUSION
For the foregoing reasons, RIAA respectfully requests that the Court grant rehearing or
rehearing en banc.
15
Respectfully submitted,
I hereby certify that on this 2nd day of February, 2004, I caused copies of the foregoing
RIAA v. Verizon Internet Services Inc., No. 03-7015 (D.C. Cir. Dec. 19, 2003) .................... Add. 1
No. 03-7015
V.
Consolidated with
03-7053
Add. 1
2
Before: GINSBURG,
Chief Judge, and ROBERTS,Circuit
Judge, and WILLIAMS,
Senior Circuit Judge.
Opinion for the Court filed by Chief Judge GINSBURG.
GINSBURG, Chief Judge: This case concerns the Recording
Industry Association of America's use of the subpoena provi-
sion of the Digital Millennium Copyright Act, 17 U.S.C.
§ 512(h), to identify internet users the RIAA believes are
infringing the copyrights of its members. The RIAA served
two subpoenas upon Verizon Internet Services in order to
discover the names of two Verizon subscribers who appeared
to be trading large numbers of .rap3 files of copyrighted
music via "peer-to-peer" (P2P) file sharing programs, such as
Add. 2
3
I. Background
Individuals with a personal computer and access to the
internet began to offer digital copies of recordings for down-
load by other users, an activity known as file sharing, in the
late 1990's using a program called Napster. Although re-
cording companies and music publishers successfully obtained
an injunction against Napster's facilitating the sharing of files
containing copyrighted recordings, see A&M Records, Inc. v.
Napster, Inc., 284 F.3d 1091 (9th Cir. 2002); A&M Records,
Inc. v. Napster, Inc., 239 F.3d 1004 (9th Cir. 2001), millions of
people in the United States and around the world continue to
Add. 3
4
Add. 4
5
Add. 5
6
II. Analysis
The court ordinarily reviews a district court's grant of a
motion to compel or denial of a motion to quash for abuse of
discretion. See, e.g., In re Sealed Case, 121 F.3d 729, 740
(D.C. Cir. 1997). Here, however, Verizon contends the orders
of the district court were based upon errors of law, specifical-
ly errors regarding the meaning of § 512(h). Our review is
therefore plenary. See In re Subpoena Served Upon the
Add. 6
7
Add. 7
8
Add. 8
9
Add. 9
10
Add. 10
11
Add. 11
12
Add. 12
13
Add. 13
14
(BBSs) and file transfer protocol (FTP) sites, which the RIAA
says were precursors to P2P programs.
We need not, however, resort to investigating what the
105th Congress may have known because the text of § 512(h)
and the overall structure of § 512 clearly establish, as we
have seen, that § 512(h) does not authorize the issuance of a
subpoena to an ISP acting as a mere conduit for the trans-
mission of information sent by others. Legislative history
can serve to inform the court's reading of an otherwise
ambiguous text; it cannot lead the court to contradict the
legislation itself. See Ratzlaf v. United States, 510 U.S. 135,
147-48 (1994) ("[W]e do not resort to legislative history to
cloud a statutory text that is clear").
In any event, not only is the statute clear (albeit complex),
the legislative history of the DMCA betrays no awareness
whatsoever that internet users might be able directly to
exchange files containing copyrighted works. That is not
surprising; P2P software was "not even a glimmer in any-
one's eye when the DMCA was enacted." In re Verizon I,
240 F. Supp. 2d at 38. Furthermore, such testimony as was
available to the Congress prior to passage of the DMCA
concerned "hackers" who established unauthorized FTP or
BBS sites on the servers of ISPs, see Balance of Responsibil-
ities on the Internet and the Online Copyright Liability
Limitation Act: Hearing on H.R. 2180 Before the House
Subcomm. on Courts and Intellectual Property, Comm. on
the Judiciary, 105th Cong. (1997) (statement of Ken Wasch,
President, Software Publishers Ass'n); rogue ISPs that post-
ed FTP sites on their servers, thereby making files of copy-
righted musical works available for download, see Complaint,
Geffen Records, Inc. v. Arizona Bizness Network, No. CIV.
98-0794, at ¶ 1 (D. Ariz. May 5, 1998) available at http:
//www.riaa.com/news/newsletter/pdf/geffencomplaint.pdf, (last
visited December 2, 2003); and BBS subscribers using dial-up
technology to connect to a BBS hosted by an ISP. The
Congress had no reason to foresee the application of § 512(h)
to P2P file sharing, nor did they draft the DMCA broadly
enough to reach the new technology when it came along.
Had the Congress been aware of P2P technology, or antici-
Add. 14
15
Add. 15
16
III. Conclusion
For the foregoing reasons, we remand this case to the
district court to vacate its order enforcing the February 4
subpoena and to grant Verizon's motion to quash the July 24
subpoena.
So ordered.
Add. 16
CERTIFICATE OF PARTIES AND AMICI
Pursuant to D.C. Circuit Rules 28(a)(1)(A) and 35(c), the Recording Industry Association
of America, by its attorneys, hereby certifies that the following parties, intervenors and amici
District Court. The parties and amici before the District Court were as follows:
Plaintiff
Defendant
United States
Consumer Alert
National Grange
Privacy Activism
Public Knowledge
Add. 17
Utility Consumers' Action Network
Samuelson Law, Technology & Public Policy Clinic at Boalt Hall School of Law
Yahoo!, Inc.
Southern Star
SMCNET LLC
DM Solutions
Inkeeper Co.
Progressive Internet
Southern Star
Add. 18
Mercury Network Corp.
LRBCG.com, Inc.
STIC.net, LP
Wiredsafety.og
Parry Aftab
Court of Appeals. The parties and amici before this Court were as follows:
Plaintiff-Appellee
Defendant-Appellant
Intervenor
Public Citizen
InKeeper Co.
Add. 19
New York State Telecommunications Association, Inc.
Southern Star
Stic.net. LP
Consumer Action
Consumers Union
Add. 20
DigitalConsumer.org
EDUCAUSE
Privacyactivism
Public Knowledge
WiredSafety.org
Add. 21
CORPORATE DISCLOSURE STATEMENT
Pursuant to D.C. Circuit Rules 26.1 and 35(c), the Recording Industry Association of
America, by its attorneys, respectfully states that it is not a corporate entity, and is neither owned
by a parent corporation nor by any publicly held corporation that owns 10% or more of its stock.
Add. 22