Copyright infringement

[7] In 1668 publisher John Hancock wrote of "some dishonest Booksellers, called Land-Pirats, who make it their practise to steal Impressions of other mens Copies" in the work A String of Pearls: or, The Best Things Reserved till Last by Thomas Brooks.

Article 61 of the 1994 Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires criminal procedures and penalties in cases of "willful trademark counterfeiting or copyright piracy on a commercial scale.

"[4] In a study published in the Journal of Behavioural and Experimental Economics, and reported on in early May 2014, researchers from the University of Portsmouth in the UK discussed findings from examining the illegal downloading behavior of 6,000 Finnish people, aged seven to 84.

[24] In a public talk between Bill Gates, Warren Buffett, and Brent Schlender at the University of Washington in 1998, Bill Gates commented on piracy as a means to an end, whereby people who use Microsoft software illegally will eventually pay for it, out of familiarity, as a country's economy develops and legitimate products become more affordable to businesses and consumers: Although about three million computers get sold every year in China, people don't pay for the software.

Romanian-born documentary maker Ilinca Calugareanu wrote a New York Times article telling the story of Irina Margareta Nistor, a narrator for state TV under Nicolae Ceauşescu's regime.

[30] According to the U.S. Chamber of Commerce's 2021 IP Index, the nations with the lowest scores for copyright protection were Vietnam, Pakistan, Egypt, Nigeria, Brunei, Algeria, Venezuela and Argentina.

For example, major motion-picture corporation MGM Studios filed suit against P2P file-sharing services Grokster and Streamcast for their contributory role in copyright infringement.

The MGM v. Grokster case did not overturn the earlier Sony v. Universal City Studios decision, but rather clouded the legal waters; future designers of software capable of being used for copyright infringement were warned.

[38] Article 61 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) requires that signatory countries establish criminal procedures and penalties in cases of "willful trademark counterfeiting or copyright piracy on a commercial scale".

The ruling gave rise to what became known as the "LaMacchia Loophole", wherein criminal charges of fraud or copyright infringement would be dismissed under current legal standards, so long as there was no profit motive involved.

Proposed laws such as the Stop Online Piracy Act broaden the definition of "willful infringement", and introduce felony charges for unauthorized media streaming.

The Directive was not intended to legitimize file-sharing, but rather the common practice of space shifting copyright-protected content from a legally purchased CD (for example) to certain kinds of devices and media, provided rights holders are compensated and no copy protection measures are circumvented.

[47] Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work".

reviewing anticircumvention rulemaking under DMCA – anti-circumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers.

[48] According to Abby House Media Inc. v. Apple Inc., it is legal to point users to DRM-stripping software and inform them how to use it because of lack of evidence that DRM stripping leads to copyright infringement.

Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel or pornography.

Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws.

In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.

Strategies include education, civil and criminal legislation, and international agreements,[73] as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased.

Aside from upholding international copyright treaty obligations to provide general limitations and exceptions,[61] nations have enacted compulsory licensing laws applying specifically to digital works and uses.

While a negative impact was found for the film industry, videogame sales were positively affected by illegal consumption, possibly due to "the industry being successful in converting illegal users to paying users" and employing player-oriented strategies (for example, by providing additional bonus levels or items in the gameplay for a fee); finally, no evidence was found for any claims of sales displacement in the other market sectors.

"[84] The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies.

The researchers, who worked with 6,000 participants, stated: "Movie pirates are also more likely to cut down their piracy if they feel they are harming the industry compared with people who illegally download music".

[91] In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software."

[95] In a March 2019 article, The New York Times reported that the Qatar-based beIN Media Group suffered "billions of dollars" of losses, following the unilateral cancellation of an exclusive contract it shared with the Asian Football Confederation (AFC) for the past 10 years.

The report said piracy is "causing considerable harm to EU businesses" and high economic losses have occurred in Argentina, China, Ecuador and India.

It also informed Saudi Arabia has not "taken sufficient steps to stop the infringement" caused via BeoutQ, like other countries have, to minimize the extent of financial and economic loss.

[99] In another decision, US District Court Judge James P. Jones found that the "RIAA's request problematically assumes that every illegal download resulted in a lost sale",[100] indicating profit/loss estimates were likely extremely off.

Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sales and the creation of peer-to-peer file sharing sites such as Napster is tenuous, based on correlation rather than causation.

He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century".

An advertisement for copyright and patent preparation services from 1906, when copyright registration formalities were still required in the US
Pirated edition of German philosopher Alfred Schmidt (Amsterdam, c. 1970 )
A common explanation for why copyright infringement is not theft is that the original copyright holder still possesses the work they made, unlike the theft of an object.
Demonstration in Sweden in support of file sharing , 2006
The Pirate Bay logo, a retaliation to the stereotypical image of piracy
Animation showing seven remote computers exchanging data with an 8th (local) computer over a network
The BitTorrent protocol : In this animation, the colored bars beneath all of the seven clients in the upper region above represent the file, with each color representing an individual piece of the file. After the initial pieces transfer from the seed (large system at the bottom), the pieces are individually transferred from client to client. The original seeder only needs to send out one copy of the file for all the clients to receive a copy.