10 Years of P2P Software Litigation
Chapter 3: Targeted Attacks on the US Secondary Liability Law
The previous chapter told the story of the rise and fall of Napster, the radical technology that opened the floodgates to widespread online copyright infringement of sound recordings and music. By one count, it attracted 70 million registered users during its two-year lifespan.1 Since it had created such a vast pool of users with rapacious appetites for fast, free access to music, switching offthat network created an obvious void. Happily for those users, there were plenty of other developers eager to accommodate their needs. Whilst the concept of sharing files via P2P was revolutionary, the software code necessary to implement it was not. Even before Napster’s network was shut down, a multitude of competitors had been released, each jostling with each other to facilitate the most infringement. Within two months of its demise, at least six of Napster’s successors had already been downloaded more than five million times apiece.2
Unlike Napster’s Fanning, the most sophisticated and ambitious of these successors were highly conscious of the intricacies of the secondary liability law and how it was likely to interact with their software code. This group used the decision of the Ninth Circuit in Napster as a “roadmap” to avoiding liability. That map read: “[d]on’t be at the center of the p2p network and be sure not to have any ability to police the network. Intentionally relinquish control over the software.”3 Having identified the vulnerabilities inherent in Napster’s code, this second group came up with evermore...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.