CyberSec Group

+1.800.821.0520

Data Breach Hotline

  • Home
  • Cyber Security Services
    • Vulnerability Assessment
      • Custome Cyber1
      • Data Security
      • Network Security
      • Email Security
      • Information Security
      • Content Security
      • Endpoint Security
      • Mobile Security
        • Mobile Threat Prevention
        • Mobile Device Management
        • Secure Mobile Infrastructure
      • Wireless Security
      • Web Services Security
    • Penetration Testing
      • Custom Cyber2
      • Web Application Testing
      • Wireless Testing
      • Specialist Testing
      • Cloud Security Testing
      • SCADA and ICS Testing
      • Mobile Device Testing
      • Red Team Testing
      • Technology Testing Services
      • Network Penetration Testing
      • Firewalls Penetration Testing
    • Data Breach Prevention
      • Custome Cyber3
      • Managed Security Services
      • Cyber Security Strategy
      • Cyber Security Architecture
      • System Hardening
      • Cryptography
    • Cyber Security Risk Assessment and Analysis
      • Custome Cyber4
      • Self-Risk Assessments
      • Vulnerability Scanning
      • Physical Security Assessments
      • Breach and Compromise Assessments
      • Third Party Cyber Audits
      • Source Code Audit
      • Web Application Assessment
      • Technology Compliance Assessment
  • Incident Response
    • Cyber Crime Investigation
      • Incident Investigation
      • DDoS Attack Investigation
      • Online Banking Fraud Investigation
      • Botnet Monitoring
    • Computer Forensics
      • Collecting Digital Evidence
      • Forensic Witnesses
      • Enterprise Forensics
      • Data Collection and Preservation
      • Data Recovery and Forensic Analysis
    • Cyber Incident Readiness Planning
      • SIEM Managed Services
      • Host Intrusion Analysis
      • Cyber Incident Response Testing
      • Technical First Respond
      • Software Auditing
      • Malware Analysis and Investigation
  • Legal and Compliance
    • Cyber Litigation Support
      • Cyber Due Diligence
      • Incident Investigation Support
      • Online Banking Services Support
      • Personal Data Assistance
      • Trade Secrets
      • Domain disputes
      • Representation with Authorites
    • Compliance services
      • Policy & Process Design
      • Security Training
      • Risk Assessment
      • Business Continuity
      • HIPAA and HITECH
      • Privacy Impact Assessment
      • IT/IS Audit
    • Online Brand protection
      • Protection of Business Reputation
      • Anticounterfeiting
      • Antipiracy
      • Mobile App Monitoring
      • Antiphishing
      • Online Copyright Protection
  • Industries
    • Custom Industries1
      • Government
      • Retail
      • Pharmaceuticals
      • Data Center
      • Small & Medium Business
      • Healthcare
    • Custom Industries2
      • Education
      • Media & Entertainment
      • Manufacturing & Distribution
      • Energy & Utilities
      • Finance
      • Legal & Professional Services
  • Who We Are
    • Our Experts
      • Arkady Bukh
    • Blog
    • Subscribe
  • Contact Us

DOJ Asks U.S. Supreme Court Not to Hear Case with Potential Major Impact on Cloud-Computing Copyright Issues

8 Nov 2016 By Igor-Klopov Leave a Comment

On May 29, 2009, the U.S. Department of Justice, submitted an amicus curiae brief which requested that the U.S. Supreme Court not accept certiorari in the case Cable News Network, Inc. v. CSC Holdings. The Cable News Network case is critical because it is one of the first to deal with the copyright infringement problems implicit in user-controlled remote data storage services. While the service at issue is a remote DVR service, the ruling could have a major impact on copyright issues faced by cloud computing services, as well.
Cloud computing is an umbrella term for computer services that permit user programs or data files to be stored remotely and then accessed via the Internet. A well-known example is the expected Google G-Drive, which has been described as “online file backup and storage” that will provide “reliable storage for [user] files, including photos, music and documents” and “allow [ users] to access [their] files from anywhere, anytime, and from any device – be it from [their] desktop, web browser or cellular phone.

The problem with remote data storage services is that computer storage necessarily requires making copies of program and data files — copying that could run afoul of the Copyright Act. The Copyright Act gives the copyright owner the right to “reproduce” its copyrighted work “in copies or phonorecords” 17 U.S,C. § 106(1). “Copies” are defined as “material objects . . . in which a work is fixed by any method . . . and from which a work can be perceived, reproduced or otherwise communicated. 17 U.S.C. § 101. A work is “fixed” when “its embodiment in a copy . . . is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than a transitory duration.” Id.

Based on these sections, many Circuit Courts have held that making even temporary copies of files, such as occurs when a computer program is downloaded into the random access memory (RAM) of a personal computer (PC), constitutes copying for purposes of the Copyright Act. See MAI Systems Corp., 991 F.2d 511 (9th Cir. 1993); Stenograph LLC v. Bossard Assoc., Inc., 144 F.3d 96 (D.C. Cir. 1998); Storage Technology Corp. v. Custom Hardward Engineering & Consulting, Inc., 421 F.3d 1307 (Fed. Cir. 2005). This is sometimes called the “RAM copy” doctrine.

Filed Under: Blog, Cybercrime, News Tagged With: submitted an amicus curiae brief which requested that the U.S. Supreme Court not accept certiorari in the case Cable News Network, the U.S. Department of Justice
  • fb
  • tw
  • gp
  • lkin
  • print
  • large
    small
    large/small
  • Featured Expert

About Igor-Klopov

Igor Klopov was one of the pioneers of cyber crime. Now, he is a recognized expert in fraud investigation and computer forensics.

Personal Website

Data Breach Emergency?

Our team of cyber security experts is
standing by 24/7 to accept your call
and give
Call the Emergency Hotline
+1 800 821 0520
CONTACT US ONLINE
  • Cyber Security Services
  • incident response
  • Legal and Compliance
  • Industries
  • Who We are
  • Contact us

Copyright © 2025 CyberSec Inc. All Rights Reserved.

facebook twiter youtube