SHARE
Facebook X Pinterest WhatsApp

Fuzzy Boundaries: The Potential Impact of Vague Secondary Liability Doctrines on Innovation

Written By
thumbnail
Web Webster
Web Webster
Jan 20, 2011

[ Thanks to An Anonymous Reader for
this link. ]

“Broadly stated, the rationale at the heart of the
secondary liability doctrine is this: an entity that knowingly
helps to facilitate the commission of an illegal act (such as
copyright infringement, for example) should be penalized for its
contribution to the illegal activity.1 If a technology company
induces its customers to use its product for infringing purposes,
for instance, both the users and the company should be liable for
such infringement—the users for direct infringement and the
company for contributory infringement, which is a species of
secondary liability.

“The doctrine is appealing as a practical solution to widespread
infringement because it targets the entities that enable illegal
behavior—e.g., the Napsters and Groksters of the
world—and thus eradicates the distribution mechanism that
enables infringement in the first place. Judge Kozinski and Mr
Goldfoot (I’ll generally refer to them as “the authors” from here
on), like the movie and music industries, certainly believe that
the doctrine of secondary liability should be readily used as a
handy and effective tool for weeding out copyright infringement.
According to the authors, people “who provide powerful tools that
can be used for good or evil have some responsibility to make sure
that those tools are used responsibly.” Put more bluntly, however,
if you outlaw the tool, you needn’t chase after the users, so in
practice it’s less a question of ethics and more a question of
convenience and efficiency.”


Complete Story

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

Red Hat reveals major enhancements to Red Hat Enterprise Linux AI
sjvn
Oct 22, 2024
How to Find AWS EC2 Instance Type Over SSH (6 Methods)
Benny Lanco
Sep 23, 2024
Crond: Daemon to Execute Scheduled Commands
Rose Hosting Blog
Sep 20, 2024
A Detailed Introduction to Oracle VirtualBox
Senthil Kumar
Sep 19, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.