opinion

Legal Options to Address Pirated Cam Performances

Many webcam performers have experienced a new trend in online piracy — the illegal recording and publication of live webcam performances. The “business model” is disturbingly simple: sign up to purchase or view a live webcam performance on any number of webcam networks, use current screen capture technology to record the performance, then distribute the performances on numerous pirate websites hosted in some remote jurisdiction. Throw in a remote proxy server for good measure, and start generating traffic to a website populated with stolen performances. Offer a tease of the content for free, and encourage the user to download the entire performance from a file locker for a price.

The webcam performer is victimized because her content is stolen, but the webcam network is also impacted because users can watch recorded “private” performances of their favorite cam stars without paying the typical fee for live viewing. The stage name of the performer and the brand name of the network’s website are often included in the URLs generated by the pirate sites, thus resulting in potential trademark infringement against both parties.

While litigation is expensive and uncertain, permitting rampant theft of copyrighted performances is likewise unacceptable.

So what can be done about this new brand of piracy? The first step is to sort out who owns what. The webcam network’s model agreement will typically state which party retains the copyright to the performances. Most often those rights will remain with the performer, who will provide some sort of license to the network permitting publication. That means the performer is the party that possesses the legal right to take action for copyright infringement. Performers who retain copyrights to their performances typically cannot rely on the webcam networks to enforce those rights. In some circumstances, the performer can authorize the network to take certain steps to enforce his or her copyrights, but not without proper additional agreements or assignments. Only the proper party should attempt to take legal action against a pirate camshow site.

The most common initial response to this type of copyright infringement is transmission of a notification of infringement under the Digital Millennium Copyright Act (i.e., a “DMCA notice.”) Importantly, a DMCA notice is only legally effective when sent to a third-party providing services to the infringer. DMCA notices should not be sent to infringing parties, directly. The intent behind a DMCA notice is to force the online service provider (such as a host or billing company) to stop providing services to the party committing the copyright violation. In the business model described above, the DMCA notice would properly be directed to the file locker providing the file storage and download service, not to the infringing site itself.

When pursuing the infringing party directly, the proper legal vehicle is a Cease and Desist demand (“C&D demand.”) A C&D demand is designed to put the infringer on notice that they’ve been caught, and to demand that the infringing content be removed from circulation. Typically, a C&D demand reserves the right to sue for damages, or seek other remedies, even if the material is promptly taken down.

Both DMCA notices and C&D demands are relatively inexpensive and can often be effective. While the pirate camshow sites frequently hide in jurisdictions with lax copyright enforcement policies, the operators often choose to respond to proper legal notices (sent by proper parties) rather than risk a potential lawsuit. From their perspective, there’s plenty of other content to be stolen, so discretion is the better part of valor when faced with a valid infringement notice.

Naturally, some pirate camshow sites will refuse to respond to legal notices, and call the copyright holder’s bluff. While this can be frustrating, claimants should make sure they have identified all possible service providers for purposes of DMCA notices, including hosts, domain privacy service providers, file lockers, billing companies, proxy service providers, content delivery networks, etc. Loss of essential services can result in quick compliance. Equally important is thorough investigation into all relevant contact points and addresses. A legal notice sent to the correct physical address frequently gets an infringer’s attention.

For some copyright or trademark holders, the filing of a lawsuit for intellectual property theft will be the final solution. While litigation is expensive and uncertain, permitting rampant theft of copyrighted performances is likewise unacceptable.

Lawrence G. Walters, Esq., heads up Walters Law Group and has represented website operators for over 25 years. Nothing contained in the foregoing article is intended as legal advice. Please consult individual legal counsel with any questions or concerns.

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Best Practices for Payment Gateway Security

Securing digital payment transactions is critical for all businesses, but especially those in high-risk industries. Payment gateways are a core component of the digital payment ecosystem, and therefore must follow best practices to keep customer data safe.

Jonathan Corona ·
opinion

Ready for New Visa Acquirer Changes?

Next spring, Visa will roll out the U.S. version of its new Visa Acquirer Monitoring Program (VAMP), which goes into effect April 1, 2025. This follows Visa Europe, which rolled out VAMP back in June. VAMP charts a new path for acquirers to manage fraud and chargeback ratios.

Cathy Beardsley ·
opinion

How to Halt Hackers as Fraud Attacks Rise

For hackers, it’s often a game of trial and error. Bad actors will perform enumeration and account testing, repeating the same test on a system to look for vulnerabilities — and if you are not equipped with the proper tools, your merchant account could be the next target.

Cathy Beardsley ·
profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
opinion

Creating Payment Redundancies to Maximize Payout Uptime

During the global CrowdStrike outage that took place toward the end of July, a flawed software update brought air travel and electronic commerce to a grinding halt worldwide. This dramatically underscores the importance of having a backup plan in place for critical infrastructure.

Jonathan Corona ·
opinion

The Need for Minimal Friction in Age Verification Technology

In the adult sector, robust age assurance, comprised of age verification and age estimation methods, is critical to ensuring legal compliance with ever-evolving regulations, safeguarding minors from inappropriate content and protecting the privacy of adults wishing to view adult content.

Gavin Worrall ·
Show More