BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?
No donation is too small. If every visitor before 31 December gives just Β£1, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!
[Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback] | ||
England and Wales High Court (Chancery Division) Decisions |
||
You are here: BAILII >> Databases >> England and Wales High Court (Chancery Division) Decisions >> Nintendo Company Ltd & Anor v Playables Ltd & Anor [2010] EWHC 1932 (Ch) (28 July 2010) URL: http://www.bailii.org/ew/cases/EWHC/Ch/2010/1932.html Cite as: [2011] Bus LR D89, [2010] FSR 36, [2010] EWHC 1932 (Ch), [2010] ECDR 14 |
[New search] [Printable RTF version] [Buy ICLR report: [2011] Bus LR D89] [Help]
CHANCERY DIVISION
INTELLECTUAL PROPERTY
Strand, London, WC2A 2LL |
||
B e f o r e :
____________________
NINTENDO COMPANY LIMITED NINTENDO OF EUROPE GmbH |
Claimants |
|
- and - |
||
PLAYABLES LIMITED WAI DAT CHAN |
Defendants |
____________________
The Defendants did not appear and were not represented
Hearing date: 20 July 2010
____________________
Crown Copyright ©
Mr Justice Floyd:
Introduction
i) the shape of the connector arrangement of the slot on the Nintendo DS and the corresponding shape of the game cards designed to fit into it;ii) the boot-up software permanently stored on the Nintendo DS which checks for the presence on an inserted card of the Nintendo Logo Data File ('NLDF') and prevents execution of programs present on the inserted card if the NLDF is not detected
iii) the use of shared key encryption technology and scrambling to enable the Nintendo DS to detect whether game cards are authentic.
i) R4 DS;ii) M3 DS;
iii) DS One Supercard;
iv) DSTT;
v) DS Linker;
vi) Acekard;
vii) CycloDS Evolution;
viii) N5;
ix) EZ.
Nintendo's case under section 296ZD
"(1) This section applies where
(a) effective technological measures have been applied to a copyright work other than a computer program; and
(b) a person (C) manufactures, imports, distributes, sells or lets for hire, offers or exposes for sale or hire, advertises for sale or hire, or has in his possession for commercial purposes any device, product or component, or provides services which
(i) are promoted, advertised or marketed for the purpose of the circumvention of, or
(ii) have only a limited commercially significant purpose or use other than to circumvent, or
(iii) are primarily designed, produced, adapted or performed for the purpose of enabling or facilitating the circumvention of,
those measures.
(2) The following persons have the same rights against C as a copyright owner has in respect of an infringement of copyright -
(a) a person
(i) issuing to the public copies of, or
(ii) communicating to the public,
the work to which effective technological measures have been applied;
(b) the copyright owner or his exclusive licensee, if he is not the person specified in paragraph (a); and
(c) the owner or exclusive licensee of any intellectual property right in the effective technological measures applied to the work."
"(1) In sections 296ZA to 296ZE, "technological measures" are any technology, device or component which is designed, in the normal course of its operation, to protect a copyright work other than a computer program.
(2) Such measures are "effective" if the use of the work is controlled by the copyright owner through
(a) an access control or protection process such as encryption, scrambling or other transformation of the work, or
(b) a copy control mechanism, which achieves the intended protection.
(3) In this section, the reference to
(a) protection of a work is to the prevention or restriction of acts that are not authorised by the copyright owner of that work and are restricted by copyright; and
(b) use of a work does not extend to any use of the work that is outside the scope of the acts restricted by copyright.
(4) Expressions used in sections 296ZA to 296ZE which are defined for the purposes of Part 1 of this Act (copyright) have the same meaning as in that Part."
(a) In relation to ETM:(i) that there are "technological measures";(ii) that they have been "applied" to a copyright work or works (other than a computer program); and(iii) that they are "effective".(b) that the defendant has manufactured, imported, distributed, sold etc, a "device, product or component" or provided services which:
(i) are promoted, advertised or marketed for the purpose of the circumvention of the ETM;(ii) have only a limited commercially significant purpose or use other than to circumvent the ETM; or(iii) are primarily designed, produced, adapted or performed for the purpose of enabling or facilitating the circumvention of the ETM.
i) it is a person issuing to the public copies of, or communicating to the public, the work to which the ETM have been applied, or, if not such person, it is the owner of the copyright in that work, or his exclusive licensee; and/orii) it owns or holds an exclusive licence to any intellectual property right in the ETM applied to the work.
"Technological measures shall be deemed 'effective' where the use of a protected work or other subject-matter is controlled by the rightholders through application of an access control or protection process, such as encryption, scrambling or other transformation of the work or other subject-matter or a copy control mechanism, which achieves the protection objective."
"Is it enough if the technological measure is a discouragement or general commercial hindrance to copyright infringement or must it be a measure which physically prevents it? To our minds the position is clear -- it is the latter. Neither the Directive nor the Act would have been drafted in the way that they are if such a general form of hindrance was enough."
"Once a protected technological measure exists, it is a breach of the provisions, for example, to advertise for sale any device, product, component or service which is primarily designed, produced, adapted or performed for the purpose of enabling or facilitating the circumvention of the technological measure."
i) the defendants did not know or have reason to believe that the accused devices would be used to make infringing copies;ii) there are lawful uses for the accused devices; and
iii) no legitimate reliance can be placed in relation to the actions of HMRC or Trading Standards in seizing the goods.
i) As I have already indicated, it is not a requirement in proceedings brought under section 296ZD to show knowledge or reason to believe that the accused devices would be used to make infringing copies. The section creates a tort of strict liability. There is a partial defence to damages and other financial relief afforded by subsection (7), but that is based on the defendant showing that he did not know or have reason to believe that his acts enabled or facilitated an infringement of copyright. I do not understand the reference in the defence to be to that subsection, which in any event would be a difficult defence to establish in respect of a device which clearly has the facility to reproduce copyright material.ii) Because of the way in which the device is constructed, the lawful uses must be uses of the accused devices in conjunction with the DS console. One such suggested lawful use is for home-made games. However, such use will still circumvent the ETM, or otherwise the game will not play. The mere fact that the device can be used for a non-infringing purpose is not a defence, provided one of the conditions in section 296ZD(1)(b) (considered below) is satisfied.
iii) Mr Howe does not rely for the purposes of this application on anything to be inferred from these matters.
Nintendo's case under section 296
"(1) This section applies where
(a) a technical device has been applied to a computer program; and
(b) a person (A) knowing or having reason to believe that it will be used to make infringing copies -
(i) manufactures for sale or hire, imports, distributes, sells or lets for hire, offers or exposes for sale or hire, advertises for sale or hire or has in his possession for commercial purposes any means the sole intended purpose of which is to facilitate the unauthorised removal or circumvention of the technical device; or
(ii) publishes information intended to enable or assist persons to remove or circumvent the technical device.
(2) The following persons have the same rights against A as a copyright owner has in respect of an infringement of copyright
(a) a person
(i) issuing to the public copies of, or
(ii) communicating to the public,
the computer program to which the technical device has been applied;
(b) the copyright owner or his exclusive licensee, if he is not the person specified in paragraph (a);
(c) the owner or exclusive licensee of any intellectual property right in the technical device applied to the computer program
(6) In this section references to a technical device in relation to a computer program are to any device intended to prevent or restrict acts that are not authorised by the copyright owner of that computer program and are restricted by copyright.
(8) Expressions used in this section which are defined for the purposes of Part 1 of this Act (copyright) have the same meaning as in that Part."
"1. Without prejudice to the provisions of Articles 4, 5 and 6, Member States shall provide, in accordance with their national legislation, appropriate remedies against a person committing any of the acts listed in subparagraphs (a), (b) and (c) below:
(a) any act of putting into circulation a copy of a computer program knowing, or having reason to believe, that it is an infringing copy;
(b) the possession, for commercial purposes, of a copy of a computer program knowing, or having reason to believe, that it is an infringing copy;
(c) any act of putting into circulation, or the possession for commercial purposes of, any means the sole intended purpose of which is to facilitate the unauthorized removal or circumvention of any technical device which may have been applied to protect a computer program.
(a) that there is a "technical device" which has been applied to a computer program;(b) that the defendant:
(i) has manufactured, imported, distributed, sold etc, means the sole intended purpose of which is to facilitate the unauthorised removal or circumvention of the technical device;(ii) knows or has reason to believe that that means will be used to make infringing copies of the computer program.(c) that the claimant has standing to bring their claims because:
(i) it is a person issuing to the public copies of, or communicating to the public, the computer program to which the technical device has been applied, or, if not such person, it is the owner of the copyright in the computer program, or his exclusive licensee; and/or(ii) it owns or holds an exclusive license to any intellectual property right in the technical device applied to the computer program.
The jurisdiction point
"Ordinary copyright"
(a) the source code for the Nintendo DS boot up software, as an original computer program (i.e. literary work);
(b) the NLDF, as either an original literary work or an original artistic work;
(c) the Nintendo Racetrack Logo, as an original artistic work.
Liability of the second defendant