In case you’re not familiar with the original, this is a straightforward parody of Albert M. Watson’s famous portrait of Steve Jobs, which appeared on the cover of Jobs’s biography and the memorial Apple homepage after his death.
Maybe I had copyright on the brain more than usual, but the ad immediately brought to mind the case Leibovitz v. Paramount. That case was over whether an advertisement for a Naked Gun movie (below, right)—a parody of an Annie Leibovitz portrait of Demi Moore on the cover of Vanity Fair (below, left)—was a fair use.1
The Second Circuit ruled that yes, the use was fair. The case has become quite influential; along with Campbell v. Acuff-Rose in 1994, it’s one of the clearest citations for the fact that commercial use does not preclude a finding of fair use.
So back to Silicon Valley. The parallels between the two cases should be clear: an advertisement as a parody of an iconic photograph, recreated by a new photographer, but with a more-than-substantial similarity to the original. In fact, not much distinguishes the two cases. I’d expect a copyright claim from Watson to fail, especially if brought in the Second Circuit.
Interestingly, Watson has litigated over the photograph. Almost exactly a year ago, he brought a suit against artist Alex Guofeng Cao and a partner David Datuna for creating “high art” derivative works of the photograph. One, “Steve Jobs vs Neil Armstrong, After Watson,” was part of a gallery show; the other, “Steve Jobs-Ayn Rand,” sold to a collector for over $200,000.
A work’s status as fine art seems sometimes (but not always!) to weigh in favor of a finding of fair use. The Second Circuit ruled mostly in favor of appropriation artist Richard Prince in a major fair use case last year, for example—a ruling that came down just days before Watson filed suit. We won’t know how that factor would have affected the decision in this case, though, because the parties apparently settled last month—March 6.
It’s possible, too, that Silicon Valley has a license with Watson. It’s a hard thing to find out because there doesn’t have to be any public record of the license. That’s one reason why policing copyright on user-generated platforms is much more complex than some copyright maximalists like to make out: it can be impossible to distinguish a lawfully licensed work from an infringing one, and even more complex if fair use is a factor.
Even if the use of the photograph is a definite fair use or licensed, there’s another interesting possible legal obstacle. (I’m not a lawyer, and we’re out on the fringes here, so take this with a grain of salt.) It seems possible that the estate of Steve Jobs could claim the ad infringes his right of publicity. Such a claim in the Ninth Circuit could lean on White v. Samsung, where a majority held that a robot shown in a Samsung ad was too similar to Vanna White. Judge Kozinski’s dissent in this case is an all-time great.
But doesn’t the group of Silicon Valley guys wearing the famous Jobs turtleneck and in his thoughtful pose evoke Jobs’s image just as much as the Samsung robot evokes White’s? In any case, I agree much more with Kozinski’s dissent than the holding in the case. I hope we don’t see such a challenge.
Side note: I don’t remember this magazine cover or movie ad firsthand, but what staying power must the photo have had to be the recognizable target of a parody two years later! Is there any magazine cover in the past decade that is so iconic? ↩
For the third year in a row (see 2012, 2013) I’ve put together the April Fools’ Day edition of EFF’s EFFector newsletter. I feel like the tide has really turned against online April Fools’ jokes, but to my mind this is something different. There’s no trying to trick people, no ha-ha-this-is-the-opposite-of-what-we-normally-do, no lame fake acquisition, just jokes. What’s wrong with jokes?
We announced the newsletter Monday and sent out the first issue on Thursday to some 150 people. We’ve had new subscribers since then without much more promotion, so maybe people are forwarding it around!
I’ve just finished reading Robert Spoo’s book “Without Copyrights,” an academic look at the history of American publishing in the 19th and early 20th centuries, when American copyright first did not apply at all to works first published abroad, and later applied only with strict manufacturing and notice requirements. The first half of the book documents the interesting practice of copyright-like trade courtesy among publishers, through which those businesses kept the costs of books relatively stable, paid authors through voluntary payments, and internally punished defectors from the system.
But the second half was even more interesting. It covers the suit James Joyce filed against Samuel Roth for his unauthorized publication of Ulysses in the US, and the suit Joyce and Random House fought to publish and unexpurgated copy of the book, which was then considered obscene. That first case, Joyce v. Roth, was especially salient in light of the recent copyright case Garcia v. Google, the “Innocence of Muslims” case.
Ulysses was one of the books affected by early 20th century copyright law’s manufacturing requirements. Its controversial contents prevented an American publication simultaneous with its European debut, throwing the work quickly into the US public domain.1 As a result, Joyce had no American copyright claim to go after Roth with.
Instead of copyright then, Joyce v. Roth alleged violations of a New York state privacy law, with Joyce claiming that Roth had misappropriated his name and image in order to sell magazines. Essentially, Joyce couldn’t object to Roth reprinting the text of Ulysses (expurgated or otherwise), but could try to refuse him the right to put Joyce’s name on the cover.
Roth was fighting a lot of legal battles at the time, and ultimately settled before the case was decided on its merits. It seems somewhat doubtful Joyce could’ve won, not least because the statute he sued under had a specific exemption for putting authors’ names on books. So: Joyce used a flimsy privacy claim to prevent the dissemination by a bad actor2 of an objectionable work.
Compare that to Garcia v. Google, wherein Cindy Lee Garcia is using an (extremely) flimsy copyright claim towards the same ends. She’s trying to prevent the dissemination by a bad actor, here Nakoula Basseley Nakoula, of an objectionable work, “Innocence of Muslims.” Joyce’s was being tricky with privacy law in order to enforce a copyright concern; Garcia is doing the same with copyright law to enforce a privacy concern.
In both cases, it’s likely that many observers identify and sympathize with the plaintiff—but that doesn’t grant license to contort the law to serve a good ends. Had Joyce won outright, the precedent could have had all sorts of unintended consequences: it could have jeopardized other publishers of the public domain, created incentives for improper attribution, and had chilling effects on literary criticism. The same applies for Garcia, should the Ninth Circuit’s position remain in place.
“Without Copyrights,” like 2009’s “Piracy” by Adrian Johns, is a pretty incredible reminder of how closely current debates around tech policy—copyright, free speech, privacy, and more—mirror those from a century or more ago.
It’s a bit more complicated than that, especially owing to a serialized American version, but I think the broad strokes suffice here. ↩
Well, some people really didn’t like Roth. Neither Spoo nor Ezra Pound nor this author are willing to go very far in demonizing him. ↩
Here are some resources I’ve found very useful for getting through the many communication options that are presented as secure.
“The State of Mobile, Cross-Platform, Encrypted Messaging” – This is all about mobile apps for end-to-end crypto. My money’s on TextSecure once it’s out for iPhone. Since the major version upgrade it’s been one of my favorite examples of workable crypto software.
“Next-generation secure email” – Who knows what’s coming next for email? We need something that allows text and media to be transmitted in an end-to-end encrypted asynchronous (but fast) channel. This guide breaks down the various options well.
“Two Factor Authentication List” – This one’s a little different, in that it aims to be an exhaustive list of all the places the 2FA are available for users. It accepts pull requests, so if something’s missing, add it! There’s also a second list, which breaks down the services by category and how the second factor is delivered, but it’s not quite as comprehensive yet.
What am I missing? Let me know and I’ll add it in.