Vol 7 No 1 - Roger Williams University School of Law
Vol 7 No 1 - Roger Williams University School of Law Vol 7 No 1 - Roger Williams University School of Law
United States Supreme Court quoted with seeming approval arespected commentator’s observation that protection of facts andideas “may in certain circumstances be available under a theory ofunfair competition.”41 More recently, in National BasketballAssociation v. Motorola, Inc.,42 the Court of Appeals for the SecondCircuit ruled that although sports scores were mere facts, thuslacking sufficient originality to qualify for federal copyrightprotection, they might nevertheless be protected againstmisappropriation as “hot news” despite their lack of originality.43Significantly, however, the court went on to hold that “hot news”misappropriation claims would survive the federal preemptionprovisions of U.S. copyright law only when the plaintiff and thedefendant are in direct competition and the appropriation, if notprohibited, would threaten the very existence of the product orservice provided by the plaintiff.44 Because this had not beenshown, the court ordered the NBA’s claim for misappropriationdismissed.45Database owners have also sought to avail themselves ofvarious forms of federal and state legislative protection. Forexample, the Electronic Communications Privacy Act46 protectselectronic communications from interception and provides civilremedies and criminal penalties for violations of the Act.47 TheAct also prohibits intentionally accessing without authorization afacility through which an electronic communication service isprovided and thereby obtaining access to an electronicdid not deal in commodity futures contracts and had no plans to do so).41. Feist, 499 U.S. at 354 (quoting Melville B. Nimmer & David Nimmer, Nimmeron Copyright § 3.04, at 3-23 (footnote omitted)).42. 105 F.3d 841 (2d Cir. 1997).43. Id. at 852-53; but see Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d772, 786-89 (5th Cir. 1999) (finding federal preemption).44. Nat’l Basketball Ass’n, 105 F.3d at 853.44. Nat’l Basketball Ass’n, 105 F.3d at 853.45. Id. at 853-54.46. 18 U.S.C. §§ 2510-22, 2701-11 (1994).47. An “electronic communication” is defined as “any transfer of signs, signals,writing, images, sounds, data, or intelligence of any nature transmitted in whole or inpart by a wire, radio, electromagnetic, photoelectronic or photooptical system thataffects interstate or foreign commerce . . . .” 18 U.S.C. § 2510(12).47. An “electronic communication” is defined as “any transfer of signs, signals,writing, images, sounds, data, or intelligence of any nature transmitted in whole or inpart by a wire, radio, electromagnetic, photoelectronic or photooptical system thataffects interstate or foreign commerce . . . .” 18 U.S.C. § 2510(12).
communication while it is in electronic storage in such a system.48Database developers have also sought protection under theLanham Act. Claims for false designation of origin under section43(a), passing off, and trademark dilution under section 43(c) arepotential causes of action for database developers againstpirates.49 When the source and reliability of data is significant tothe intended users, these Lanham Act claims may proveefficacious.With the enactment of the Digital Millennium Copyright Act(DMCA) of 1999,50 yet another form of protection becameavailable to database producers. The DMCA implements theWorld Intellectual Property Organization Copyright Treaty51 byprohibiting circumvention of copyright protection systems andprotecting the integrity of copyright management informationsystems, including terms and conditions for use of a work.52 Theanti-circumvention provision of the DMCA prohibits (1) thecircumvention of technological measures that effectively controlaccess to or a work protected under U.S. copyright law and (2) themanufacture of, importation of, offering to the public of, providingof, or trafficking in any technology, product, service, device,component, or part thereof, that is primarily designed or producedfor the purpose of circumventing either anti-access or anti-copyingtechnological measures.53 The copyright managementinformation provision prohibits the unauthorized removal oralteration of copyright management information or providing,distributing, or importing for distribution, false copyrightmanagement information, which is defined to include any termsand conditions for use of the work.54The DMCA explicitly limits its prohibitions to circumventionof technological measures that effectively control access to or48. Id. § 2701(a). An “electronic communications service” is defined as “anyservice which provides to the users thereof the ability to send or receive wire orelectronic communications,” id. § 2510(15), while the term “electronic storage” isdefined as “any temporary, intermediate storage of a wire or electronic communicationincidental to the electronic transfer thereof . . . .” Id. § 2510(17).49. 15 U.S.C. § 1125(a) (1994).50. 17 U.S.C. § 1201 (Supp. IV 1998).51. The World Intellectual Property Organization Copyright Treaty, Apr. 12,1997, S. Treaty Doc. No. 105-17 (1997).52. 17 U.S.C. §§ 1201, 1202 (Supp. IV 1998).53. Id. § 1201.54. Id. § 1202.
- Page 3: ROGER WILLIAMS UNIVERSITYLAW REVIEW
- Page 7 and 8: ROGER WILLIAMS UNIVERSITYSCHOOL OF
- Page 9: Identification StatementThe Roger W
- Page 12 and 13: contract exclusion or disclaimer of
- Page 14 and 15: and other laws of countries in whic
- Page 16 and 17: Symposium and writes on this issue
- Page 18 and 19: Indeed, the quotation contains the
- Page 20 and 21: suggestive of a bill designed merel
- Page 22 and 23: United States ought to adopt in lig
- Page 24 and 25: the Supreme Court to reiterate in F
- Page 28 and 29: copying of “a work protected unde
- Page 30 and 31: shall be null and void.65 Member st
- Page 32 and 33: determining the fate of database pr
- Page 34 and 35: The compilation of a database requi
- Page 36 and 37: management information, including c
- Page 38 and 39: one congressional witness noted:
- Page 40 and 41: that were made after the initial te
- Page 42 and 43: preferred language of many business
- Page 44 and 45: the sui generis right mainly serves
- Page 46 and 47: the Paris Convention for the Protec
- Page 48 and 49: directly or indirectly.159 In other
- Page 50 and 51: of resources that qualifies that po
- Page 52 and 53: wish to encourage private lawsuits,
- Page 54 and 55: contract.”185 While section 1405(
- Page 56 and 57: The Directive will inevitably drive
- Page 58 and 59: the process through which digital p
- Page 60 and 61: the United States or the trade and
- Page 62 and 63: patent law is the utilitarian ethic
- Page 64 and 65: a work to be publicly identified as
- Page 66 and 67: the United States, the power of the
- Page 68 and 69: Theory one proposes to reward the a
- Page 70 and 71: of intellectual property rights mus
- Page 72 and 73: only such as are original, and are
- Page 74 and 75: emedies set forth in section 1406.T
United States Supreme Court quoted with seeming approval arespected commentator’s observation that protection <strong>of</strong> facts andideas “may in certain circumstances be available under a theory <strong>of</strong>unfair competition.”41 More recently, in National BasketballAssociation v. Motorola, Inc.,42 the Court <strong>of</strong> Appeals for the SecondCircuit ruled that although sports scores were mere facts, thuslacking sufficient originality to qualify for federal copyrightprotection, they might nevertheless be protected againstmisappropriation as “hot news” despite their lack <strong>of</strong> originality.43Significantly, however, the court went on to hold that “hot news”misappropriation claims would survive the federal preemptionprovisions <strong>of</strong> U.S. copyright law only when the plaintiff and thedefendant are in direct competition and the appropriation, if notprohibited, would threaten the very existence <strong>of</strong> the product orservice provided by the plaintiff.44 Because this had not beenshown, the court ordered the NBA’s claim for misappropriationdismissed.45Database owners have also sought to avail themselves <strong>of</strong>various forms <strong>of</strong> federal and state legislative protection. Forexample, the Electronic Communications Privacy Act46 protectselectronic communications from interception and provides civilremedies and criminal penalties for violations <strong>of</strong> the Act.47 TheAct also prohibits intentionally accessing without authorization afacility through which an electronic communication service isprovided and thereby obtaining access to an electronicdid not deal in commodity futures contracts and had no plans to do so).41. Feist, 499 U.S. at 354 (quoting Melville B. Nimmer & David Nimmer, Nimmeron Copyright § 3.04, at 3-23 (footnote omitted)).42. 105 F.3d 841 (2d Cir. 1997).43. Id. at 852-53; but see Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d772, 786-89 (5th Cir. 1999) (finding federal preemption).44. Nat’l Basketball Ass’n, 105 F.3d at 853.44. Nat’l Basketball Ass’n, 105 F.3d at 853.45. Id. at 853-54.46. 18 U.S.C. §§ 2510-22, 2701-11 (1994).47. An “electronic communication” is defined as “any transfer <strong>of</strong> signs, signals,writing, images, sounds, data, or intelligence <strong>of</strong> any nature transmitted in whole or inpart by a wire, radio, electromagnetic, photoelectronic or photooptical system thataffects interstate or foreign commerce . . . .” 18 U.S.C. § 2510(12).47. An “electronic communication” is defined as “any transfer <strong>of</strong> signs, signals,writing, images, sounds, data, or intelligence <strong>of</strong> any nature transmitted in whole or inpart by a wire, radio, electromagnetic, photoelectronic or photooptical system thataffects interstate or foreign commerce . . . .” 18 U.S.C. § 2510(12).