BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?
No donation is too small. If every visitor before 31 December gives just £1, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!
[Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback] | ||
England and Wales Court of Appeal (Criminal Division) Decisions |
||
You are here: BAILII >> Databases >> England and Wales Court of Appeal (Criminal Division) Decisions >> Higgs v R [2008] EWCA Crim 1324 (24 June 2008) URL: http://www.bailii.org/ew/cases/EWCA/Crim/2008/1324.html Cite as: [2009] WLR 73, [2008] EWCA Crim 1324, [2008] FSR 34, [2009] 1 WLR 73 |
[New search] [Printable RTF version] [Buy ICLR report: [2009] 1 WLR 73] [Help]
COURT OF APPEAL (CRIMINAL DIVISION)
ON APPEAL FROM BRISTOL CROWN COURT
Her Honour Judge Hagen
T20070068
Strand, London, WC2A 2LL |
||
B e f o r e :
LORD JUSTICE HUGHES
and
MR JUSTICE ANDREW SMITH
____________________
Neil Stanley Higgs |
Appellant |
|
- and - |
||
The Queen |
Respondent |
____________________
Iain Macdonald (instructed by Bristol City Council Legal Services) for The Crown
Hearing date: 11 June 2008
____________________
Crown Copyright ©
Lord Justice Jacob:
(1) A person commits an offence if he –
(a) manufactures for sale or hire, or
(b) imports otherwise than for his private and domestic use, or
(c) in the course of a business –
(i) sells or lets for hire, or
(ii) offers or exposes for sale or hire, or
(iii) advertises for sale or hire, or
(iv) possesses, or
(v) distributes, or
(d) distributes otherwise than in the course of a business to such an extent as to affect prejudicially the copyright owner, any device, product or component which is primarily designed, produced, or adapted for the purpose of enabling or facilitating the circumvention of effective technological measures.
(2) A person commits an offence if he provides, promotes, advertises or markets –
(a) in the course of a business, or
(b) otherwise than in the course of a business to such an extent as to affect prejudicially the copyright owner, a service the purpose of which is to enable or facilitate the circumvention of effective technological measures.
(1) In sections 296ZA to 296ZE, "technological measures" are any technology, device or component which is designed, in the normal course of its operation, to protect a copyright work other than a computer program.
(2) Such measures are "effective" if the use of the work is controlled by the copyright owner through –
(a) an access control or protection process such as encryption, scrambling or other transformation of the work, or
(b) a copy control mechanism, which achieves the intended protection.
(3) In this section, the reference to –
(a) protection of a work is to the prevention or restriction of acts that are not authorised by the copyright owner of that work and are restricted by copyright; and
(b) use of a work does not extend to any use of the work that is outside the scope of the acts restricted by copyright.
(1) The copying of the work is an act restricted by the copyright in every description of copyright work; and references in this Part to copying and copies shall be construed as follows.
(2) Copying in relation to a literary, dramatic, musical or artistic work means
reproducing the work in any material form.
This includes storing the work in any medium by electronic means.
(3) ….
(4) Copying in relation to a film or broadcast includes making a photograph of the whole or any substantial part of any image forming part of the film or broadcast.
(5) …
(6) Copying in relation to any description of work includes the making of copies which are transient or are incidental to some other use of the work.
It follows that the making of transient copies of copyright material into a RAM is a restricted act. In this context taking even a single frame of a cinematograph film is also probably an infringement (see Spelling Goldberg v BPC Publishing [1981] RPC 225). Putting it another way, the playing of a pirate game on a console would itself be an infringement. And even a narrow interpretation of ETM would seemingly catch that. Mr Vaitilingam, Counsel for Mr Higgs, whilst not positively so accepting, acknowledged that he did not see how it could be otherwise.
technological protection measure means a device or product, or a component incorporated into a process, that is designed, in the ordinary course of its operation, to prevent or inhibit the infringement of copyright in a work or other subject-matter by either or both of the following means:
(a) by ensuring that access to the work or other subject matter is available solely by use of an access code or process (including decryption, unscrambling or other transformation of the work or other subject-matter) with the authority of the owner or exclusive licensee of the copyright;
(b) through a copy control mechanism."
[38] Sackville J (the first instance judge) concluded thathttp://www.austlii.edu.au/cgi-bin/sinodisp/au/cases/cth/HCA/2005/58.html?query=Stevens%20AND%20Sony - fn28#fn28:
"a 'technological protection measure', as defined, must be a device or product which utilises technological means to deny a person access to a copyright work [or other subject-matter], or which limits a person's capacity to make copies of a work [or other subject-matter] to which access has been gained, and thereby 'physically' prevents or inhibits the person from undertaking acts which, if carried out, would or might infringe copyright in the work [or other subject-matter]".
That construction should be accepted.
[39] It is important to understand that the reference to the undertaking of acts which, if carried out, would or might infringe, is consistent with the fundamental notion that copyright comprises the exclusive right to do any one or more of "acts" primarily identified in ss 31 and 85-88 of the Act. The definition of "technological protection measure" proceeds on the footing that, but for the operation of the device or product or component incorporated into a process, there would be no technological or mechanical barrier to "access" the copyright material or to make copies of the work after "access" has been gained. The term "access" as used in the definition is not further explained in the legislation. It may be taken to identify placement of the addressee in a position where, but for the "technological protection measure", the addressee would be in a position to infringe.
[139] In my opinion, for the purpose of s 10(1), a device is a device that is "designed ... to ... inhibit" copyright if the device functions, "in the ordinary course of its operation", so as to make the doing of an act of copyright infringement - not impossible - but more difficult than it would be if the device did not operate.
Australian: "to prevent or inhibit the infringement of copyright"
UK: "prevention or restriction of acts that are not authorised by the copyright owner of that work and are restricted by copyright."
There is no real difference between "inhibit" and "restriction". If you inhibit an activity you will restrict it and vice versa. In the end Mr MacDonald did not rest his primary argument on the difference in language.
[208] … When the competing legislation of other jurisdictions, giving effect to the international treaties, is contrasted, it appears clear that the distinctive statutory formula adopted in Australia was a deliberate one. It was less protective of copyright than the legal regimes adopted in the United States, the United Kingdom and elsewhere.
A footnote refers to the US legislation and the current UK legislation. After all he goes on to say that "textual foundation" for a less protective interpretation lies in the meaning to attributed to "designed" and "inhibit" both of which words are reflected in the UK legislation unless, contrary to our view, there is a fundamental distinction between "inhibiting" and "restricting" an act.
WIPO Copyright Treaty 1996
Art. 11 Obligations concerning Technological Measures
Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law.
WIPO Performances and Phonograms Treaty 1996
Art. 18 Obligations concerning Technological Measures
Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by performers or producers of phonograms in connection with the exercise of their rights under this Treaty and that restrict acts, in respect of their performances or phonograms, which are not authorized by the performers of the producers of phonograms concerned or permitted by law.
Article 6 Obligations as to technological measures
1. Member States shall provide adequate legal protection against the circumvention of any effective technological measures, which the person concerned carries out in the knowledge, or with reasonable grounds to know, that he or she is pursuing that objective.
2. Member States shall provide adequate legal protection against the manufacture, import, distribution, sale, rental, advertisement for sale or rental, or possession for commercial purposes of devices, products or components or the provision of services which:
(a) are promoted, advertised or marketed for the purpose of circumvention of, or
(b) have only a limited commercially significant purpose or use other than to circumvent, or
(c) are primarily designed, produced, adapted or performed for the purpose of enabling or facilitating the circumvention of, any effective technological measures.
3. For the purposes of this Directive, the expression "technological measures" means any technology, device or component that, in the normal course of its operation, is designed to prevent or restrict acts, in respect of works or other subject-matter, which are not authorised by the rightholder of any copyright or any right related to copyright as provided for by law or the sui generis right provided for in Chapter III of Directive 96/9/EC. Technological measures shall be deemed "effective" where the use of a protected work or other subject-matter is controlled by the rightholders through application of an access control or protection process, such as encryption, scrambling or other transformation of the work or other subject-matter or a copy control mechanism, which achieves the protection objective.
4. …
Directive: "designed to prevent or restrict acts, in respect of works or other subject-matter, which are not authorised by the rightholder"
UK Act: "prevention or restriction of acts that are not authorised by the copyright owner of that work and are restricted by copyright."
The UK Act adds the words "and are restricted by copyright."
Art. 6(3) The expression "technological measures" as used in this Article, means any technology, device or component that, in the normal course of its operation, is designed to prevent or inhibit the infringement of any copyright …
The reference to "infringement of any copyright" was changed in the final version to "acts which are not authorised by the rightholder."
"I would be quite prepared, in an appropriate case involving truly feasible alternative interpretations of a convention, to allow the evidence contained in the travaux préparatoires to be determinative of the question of construction. But that is only possible where the court is satisfied that the travaux préparatoires clearly and indisputably point to a definite legal intention: see Fothergill v Monarch Airlines Ltd., per Lord Wilberforce, at p.278c. Only a bull's-eye counts. Nothing less will do."
So the travaux do not help.
Do the provisions of section 296ZF of the Copyright Designs and Patents Act 1988 in relation to "effective technological measures" apply to devices incorporated into computer games consoles and computer games which do not prevent counterfeit copies being made of such games but which do prevent the counterfeit copies from being played on games consoles?