{"id":8504,"date":"2019-01-29T20:16:13","date_gmt":"2019-01-30T00:16:13","guid":{"rendered":"http:\/\/nycphantom.com\/journal\/?p=8504"},"modified":"2019-01-29T21:10:00","modified_gmt":"2019-01-30T01:10:00","slug":"copyrightx","status":"publish","type":"post","link":"http:\/\/nycphantom.com\/journal\/?p=8504","title":{"rendered":"CopyrightX"},"content":{"rendered":"\n<p>So I signed up to take\/survey an online free course offered by Harvard. It's on Copyright. I had to write a short essay why I want to take the course and I was accepted. Twice. I wrote about how I don't think intellectual property exists, but intellectual recognition can be legalized. The first time was probably around 2017 and I did not have time to participate. I shall make time this time.<\/p>\n\n\n\n<p>The course will not start until 1\/31\/2019 Thursday. But there's already readings and videos to watch. I shall COPY them for my own pleasure. But of course, though there will always be fools, out of their ignorance and pride, finding my stand \"flippant\", I shall give unto Caesar's [The government power] what's his, despite boldly making my case heard whenever I can.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/lectures\/\">Lectures<\/a><\/h1>\n\n\n\n<p>These twelve lectures were prepared and delivered by&nbsp;<a href=\"http:\/\/www.tfisher.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Prof. William Fisher<\/a>. &nbsp;The original versions were recorded during the Winter of 2013. Six have since then been substantially revised.<\/p>\n\n\n\n<p>All of the lectures are licensed under a Creative Commons License, the terms of which are available&nbsp;on the<a href=\"http:\/\/blogs.law.harvard.edu\/copyrightx\/Permission\">&nbsp;Permission page<\/a>. &nbsp;&nbsp;Some suggestions concerning the alternative ways of gaining access to and viewing them are set forth at the bottom of this page.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>The Foundations of Copyright Law<br><\/strong><ul><li>Introduction [<a href=\"https:\/\/www.youtube.com\/watch?v=CqkonSY__ic\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/yz\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/z0\">Low-data download<\/a>]<\/li><li>Originality&nbsp;[<a href=\"https:\/\/www.youtube.com\/watch?v=CvifyxfVmOE\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/z1\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/z2\">Low-data download<\/a>]<\/li><li>The Idea\/Expression Distinction&nbsp;[<a href=\"https:\/\/youtu.be\/Fw6yBGH9RDc\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/z3\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/z4\">Low-data download<\/a>]<\/li><li>The System of Multilateral Treaties&nbsp;[<a href=\"https:\/\/www.youtube.com\/watch?v=00Bq5n7wYn0\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/z7\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/z6\">Low-data download<\/a>]<\/li><\/ul><\/li><li><strong>Fairness and Personality Theories<br><\/strong><ul><li>Introduction&nbsp;[<a href=\"http:\/\/youtu.be\/nKyWusznRgQ\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/nd\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/ne\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Fairness&nbsp;[<a href=\"http:\/\/youtu.be\/HYJuhPf9s5k\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/nf\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/ng\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Personality&nbsp;[<a href=\"http:\/\/youtu.be\/hsAcrcveg6k\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/nh\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/nj\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><\/ul><\/li><li><strong>The Subject Matter of Copyright<br><\/strong><ul><li>Literary Works (and software)&nbsp;[<a href=\"http:\/\/youtu.be\/zBNsrX7TFIM\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/nv\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/nw\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Dramatic Works (and choreography)&nbsp;[<a href=\"http:\/\/youtu.be\/M4gD1WSo5mA\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/nx\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/ny\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Music&nbsp;[<a href=\"http:\/\/youtu.be\/2GGE_ToREPw\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/nz\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/p0\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Audiovisual Works&nbsp;[<a href=\"http:\/\/youtu.be\/fNMuzM-C14c\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/p1\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/p2\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Fictional Characters&nbsp;[<a href=\"http:\/\/youtu.be\/stKbHeByAd4\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/p3\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/p4\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Visual and Architectural Works&nbsp;[<a href=\"https:\/\/youtu.be\/n5SlotcmGD0\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"https:\/\/brk.mn\/1d2\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/1d3\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/CopyrightX_Lecture3_Illustrations.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Illustrations<\/a><\/li><\/ul><\/li><li><strong>Welfare Theory<\/strong><ul><li>The Utilitarian Framework&nbsp;[<a href=\"http:\/\/youtu.be\/3ISstJYsCWs\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/pa\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/pb\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>The Incentive Theory of Copyright&nbsp;[<a href=\"http:\/\/youtu.be\/t9wqQNCC-Vs\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/pc\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/pd\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Applications and Assessment&nbsp;[<a href=\"http:\/\/youtu.be\/_xHEcRFlLok\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/pe\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>][<a href=\"http:\/\/brk.mn\/pf\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/CopyrightX_Lecture4_Illustrations.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Illustrations<\/a><\/li><\/ul><\/li><li><strong>Authorship<\/strong><ul><li>Sole Authorship&nbsp;[<a href=\"http:\/\/youtu.be\/turx88kpgBc\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/pg\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/ph\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Joint Authorship&nbsp;[<a href=\"http:\/\/youtu.be\/MIjhv9Wmpdk\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/pj\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/pk\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Works for Hire&nbsp;[<a href=\"http:\/\/youtu.be\/4-2qLmmDBnE\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/pm\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/pn\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/CopyrightX_Lecture5_Illustrations.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Illustrations<\/a><\/li><\/ul><\/li><li><strong>The Mechanics of Copyright<\/strong><ul><li>The Decline of Formalities&nbsp;[<a href=\"http:\/\/youtu.be\/BLX65vEVSPQ\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/goo.gl\/pHMZji\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a><a href=\"http:\/\/goo.gl\/szHYKN\" target=\"_blank\" rel=\"noreferrer noopener\">] [Low-data download<\/a>]<\/li><li>Duration&nbsp;[<a href=\"http:\/\/youtu.be\/HA1LsxeGJFI\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>][<a href=\"http:\/\/goo.gl\/haAbaB\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/goo.gl\/Z0GwzJ\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Protective Provisions&nbsp;[<a href=\"http:\/\/youtu.be\/QmStdKU_9qI\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/goo.gl\/913cGS\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/goo.gl\/KsQrp3\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/CopyrightX_Lecture6_Illustrations.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Illustrations<\/a><\/li><\/ul><\/li><li><strong>The Rights to Reproduce and Modify<\/strong><ul><li>Reproduction&nbsp;[<a href=\"http:\/\/youtu.be\/_YmnWVDO19o\">YouTube<\/a>] [<a href=\"http:\/\/goo.gl\/3fKvmj\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/goo.gl\/MF1FQu\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Improper Appropriation&nbsp;[<a href=\"http:\/\/youtu.be\/uP2BnwXabIc\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/goo.gl\/CrnOH8\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/goo.gl\/cIqADR\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Derivative Works&nbsp;[<a href=\"http:\/\/youtu.be\/oJIiZBlAOR8\">YouTube<\/a>] [<a href=\"http:\/\/goo.gl\/A7EpMJ\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/goo.gl\/7zzMf2\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/CopyrightX_Lecture7_Illustrations.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Illustrations<\/a><\/li><\/ul><\/li><li><strong>The Rights to Distribute, Perform, and Display<\/strong><ul><li>Distribution [<a href=\"http:\/\/youtu.be\/H5owaV5yQ98\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/goo.gl\/vCkKdW\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/goo.gl\/5AWdsf\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Public Performances [<a href=\"http:\/\/youtu.be\/zvNof9OqH7I\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/nk\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/nm\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Exceptions and Limitations [<a href=\"http:\/\/youtu.be\/YK2OXBA4bE4\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/goo.gl\/ioIY7n\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/goo.gl\/5s4mZg\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/CopyrightX_Lecture8_Illustrations.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Illustrations<\/a><\/li><\/ul><\/li><li><strong>Fair Use<\/strong><ul><li>The History of Fair Use [<a href=\"http:\/\/youtu.be\/KV8dj-7WA4o\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/c2\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/b1\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Fair Use Today [<a href=\"http:\/\/youtu.be\/Z9q6JA6f5Co\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/c3\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/b2\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Other Approaches [<a href=\"https:\/\/www.youtube.com\/watch?v=sgY_lmxJwUg&amp;feature=youtu.be\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/193\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/19a\">Low-data download<\/a>]<\/li><li><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/CopyrightX_Lecture9_Illustrations.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Illustrations<\/a><\/li><\/ul><\/li><li><strong>Cultural Theory<\/strong><ul><li>Premises [<a href=\"https:\/\/youtu.be\/sFiKtoE9huA\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/qr\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/qs\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Implications [<a href=\"https:\/\/youtu.be\/I7eDSRnJKq0\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/qt\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/qv\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Supplements and Concerns [<a href=\"https:\/\/youtu.be\/UXHJFcyxvbM\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/qw\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/qx\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><\/ul><\/li><li><strong>Supplements to Copyright: Secondary Liability and Para-copyright<\/strong><ul><li>Secondary Liability [<a href=\"https:\/\/youtu.be\/0izqmst4FQI\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/rb\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/rc\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Dual-Use Technologies [<a href=\"https:\/\/youtu.be\/XtWow-tYHwU\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/rd\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/re\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Technological Protection Measures [<a href=\"https:\/\/youtu.be\/QVe6dCuJ4M0\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/rf\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/rg\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/CopyrightX_Lecture11_Illustrations.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Illustrations<\/a><\/li><\/ul><\/li><li><strong>Remedies<\/strong><ul><li>Equitable Relief [<a href=\"https:\/\/youtu.be\/kYUloapzo5U\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/s0\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/s1\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Damages [<a href=\"https:\/\/youtu.be\/8fv5FF0zugU\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/s2\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/s3\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li>Criminal Penalties [<a href=\"https:\/\/youtu.be\/K0M-oUuh7iY\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>] [<a href=\"http:\/\/brk.mn\/s4\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a>] [<a href=\"http:\/\/brk.mn\/s5\" target=\"_blank\" rel=\"noreferrer noopener\">Low-data download<\/a>]<\/li><li><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/CopyrightX_Lecture12_Illustrations.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Illustrations<\/a><\/li><\/ul><\/li><\/ol>\n\n\n\n<h1 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/\">Syllabus for Online Sections 2019<\/a><\/h1>\n\n\n\n<h3 class=\"wp-block-heading\">Week 1<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 1: The Foundations of Copyright Law<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/www.law.cornell.edu\/uscode\/text\/17\/102\">17 U.S.C. 102(a)<\/a><\/li><li>Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340 (1991)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1991_Feist.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1991_Feist.docx\">[MS Word]<\/a>&nbsp;<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15519\">[h2o]<\/a><\/li><li>Mannion v. Coors Brewing Co., 377 F.Supp. 2d 444 (S.D.N.Y. 2005): paragraphs 1-79&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2005_Mannion.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2005_Mannion.docx\">[MS Word]&nbsp;<\/a><a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15521\">[h2o]<\/a><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/Mannion_Illustrations.pdf\">&nbsp;[Illustrations]<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 2<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 2: Fairness and Personality Theories<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/cyber.harvard.edu\/people\/tfisher\/iptheory.pdf\">William Fisher, \u201cTheories of Intellectual Property,\u201d in Stephen Munzer, ed., New Essays in the Legal and Political Theory of Property (Cambridge University Press, 2001)<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 3<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 3: The Subject Matter of Copyright<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Star Athletica v. Varsity Brands (US Supreme Court 2017)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2017_Star_Majority.pdf\">[pdf]<\/a><\/li><li>Oracle v. Google (CAFC 2014)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2014_Oracle.pdf\">[pdf]&nbsp;<\/a><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2014_Oracle.docx\">[MS Word]&nbsp;<\/a><a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15772\">[h2o]<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 4<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 4: Welfare Theory<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/PTKChapter6.pdf\">William Fisher, Promises to Keep: Technology, Law and the Future of Entertainment (2004), Chapter 6<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 5<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 5: Authorship<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/www.law.cornell.edu\/uscode\/text\/17\/201\">17 U.S.C. 201&nbsp;<\/a><\/li><li>Lindsay v. The Wrecked and Abandoned Vessel R.M.S. Titanic, 52 U.S.P.Q.2d 1609 (S.D.N.Y. 1999)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1999_Lindsay.pdf\">[pdf]&nbsp;<\/a><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1999_Lindsay.docx\">[MS Word]<\/a><a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15787\">[h2o]<\/a><\/li><li>Aalmuhammed v. Lee, 202 F.3d 1227 (9th Cir. 1999)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2000_Aalmuhammed.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2000_Aalmuhammed.docx\">[MS Word]<\/a>&nbsp;<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15459\">[h2o]<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 6<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 6: The Mechanics of Copyright<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Stewart v. Abend, 495 U.S. 207 (1990)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1990_Stewart.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1990_Stewart.docx\">[MS Word]<\/a>&nbsp;<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/16062\">[h2o]<\/a><\/li><li>Eldred v. Ashcroft, 537 U.S.1 86 (2003)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2003_Eldred.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2003_Eldred.docx\">[MS Word]&nbsp;<\/a><a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15565\">[h2o]<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 7<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 7: The Rights to Reproduce and Modify<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/www.law.cornell.edu\/uscode\/17\/106.html\">17 U.S.C. 106<\/a><\/li><li>Steinberg v. Columbia Pictures Industries, Inc., 663 F.Supp. 706 (S.D.N.Y. 1987)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1987_Steinberg.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1987_Steinberg.docx\">[MS Word]&nbsp;<\/a><a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15789\">[h2o]&nbsp;<\/a><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/Steinberg_Illustrations.pdf\">[Illustrations]<\/a><\/li><li>Mannion v. Coors Brewing Co., 377 F.Supp. 2d 444 (S.D.N.Y. 2005): paragraphs 81-94 [<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2005_Mannion.pdf\">pdf<\/a>] [<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2005_Mannion.docx\">MS Word<\/a>] [<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15521\">h2o<\/a>]&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/Mannion_Illustrations.pdf\">[Illustrations]<\/a><\/li><li>Castle Rock Entertainment, Inc. v. Carol Publishing Group, Inc., 150 F.3d 132 (2d Cir. 1998): paragraphs 11-58&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1998_Castle_Rock.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1998_Castle_Rock.docx\">[MS Word]<\/a>&nbsp;<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/16068\">[h2o]<\/a><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/Castle_Rock_Illustrations.pdf\">&nbsp;[Illustrations]<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 8<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 8: The Rights to Distribute, Perform, and Display<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Kirtsaeng v. John Wiley &amp; Sons (U.S. Supreme Court, March 19, 2013)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2013_Kirtsaeng.pdf\">[pdf]<\/a><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2013_Kirtsaeng.docx\">&nbsp;[MS Word]&nbsp;<\/a><a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15788\">[h2o]<\/a><\/li><li>American Broadcasting Companies v. Aereo, Inc., 134 S.Ct. 2498 (2014)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2014_Aereo.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2014_Aereo.docx\">[MS Word]&nbsp;<\/a><a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15517\">[h2o]<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 9<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 9: Fair Use<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/www.law.cornell.edu\/uscode\/17\/107.html\">17 U.S.C. 107<\/a><\/li><li>Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569 (1994)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1994_Campbell.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1994_Campbell.docx\">[MS Word]&nbsp;<\/a><a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15780\">[h2o]<\/a><\/li><li>Cariou v. Prince,&nbsp;Docket No. 11-1197-cv&nbsp;(2nd Cir. April 14, 2013)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2013_Cariou.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2013_Cariou.docx\">[MS Word]&nbsp;<\/a><a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15784\">[h2o]<\/a><\/li><li>Authors Guild v. Google, 804 F.3d 202 (2d Cir. 2015)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2015_Authors.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2015_Authors.docx\">[MS Word]<\/a>&nbsp;<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/37267\" target=\"_blank\" rel=\"noreferrer noopener\">[h2o]<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 10<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 10: Cultural Theory<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/www.law.cornell.edu\/uscode\/17\/106A.html\">17 U.S.C. 106A<\/a><\/li><li>Martin v. City of Indianapolis, 192 F.3d 608 (7th Cir. 1999)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1999_Martin.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1999_Martin.docx\">[MS Word]<\/a>&nbsp;<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15778\">[h2o]<\/a><a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/Martin_Illustrations.pdf\">&nbsp;[Illustrations]<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 11<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 11: Supplements to Copyright: Secondary Liability and Para-copyright<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Metro-Goldwyn-Mayer, Inc. v. Grokster, 545 U.S. 913 (2005)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2005_Grokster.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2005_Grokster.docx\">[MS Word]<\/a>&nbsp;<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15491\">[h2o]<\/a><\/li><li>Viacom v. YouTube, 676 F.3d 19 (CA2 2012)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2012_Viacom.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2012_Viacom.docx\">[MS Word]<\/a>&nbsp;<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/15493\">[h2o]<\/a><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Week 12<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"http:\/\/copyx.org\/syllabus-for-online-sections-2019\/Lectures\">Lecture 12: Remedies<\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/www.law.cornell.edu\/uscode\/17\/501.html\">17 U.S.C. 501<\/a>,&nbsp;<a href=\"http:\/\/www.law.cornell.edu\/uscode\/17\/502.html\">502<\/a>,&nbsp;<a href=\"http:\/\/www.law.cornell.edu\/uscode\/17\/503.html\">503<\/a>,&nbsp;<a href=\"http:\/\/www.law.cornell.edu\/uscode\/17\/506.html\">506<\/a><\/li><li>Salinger v. Colting, 607 F.3d 68 (2d Cir. 2010)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2010_Salinger.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/2010_Salinger.docx\">[MS Word]<\/a>&nbsp;<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/16174\">[h2o]<\/a><\/li><li>United States v. Moran, 757 F.Supp. 1046 (D.Neb. 1991)&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1991_Moran.pdf\">[pdf]<\/a>&nbsp;<a href=\"http:\/\/cyber.law.harvard.edu\/people\/tfisher\/cx\/1991_Moran.docx\">[MS Word]<\/a>&nbsp;<a href=\"https:\/\/h2o.law.harvard.edu\/collages\/16175\">[h2o]<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>So I signed up to take\/survey an online free course offered by Harvard. It's on Copyright. I had to write a short essay why I want to take the course and I was accepted. Twice. I wrote about how I &hellip; <a href=\"http:\/\/nycphantom.com\/journal\/?p=8504\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,20,21,3,6],"tags":[],"class_list":["post-8504","post","type-post","status-publish","format-standard","hentry","category-authoring","category-music","category-reviews","category-technical","category-theologization"],"_links":{"self":[{"href":"http:\/\/nycphantom.com\/journal\/index.php?rest_route=\/wp\/v2\/posts\/8504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/nycphantom.com\/journal\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/nycphantom.com\/journal\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/nycphantom.com\/journal\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/nycphantom.com\/journal\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8504"}],"version-history":[{"count":3,"href":"http:\/\/nycphantom.com\/journal\/index.php?rest_route=\/wp\/v2\/posts\/8504\/revisions"}],"predecessor-version":[{"id":8509,"href":"http:\/\/nycphantom.com\/journal\/index.php?rest_route=\/wp\/v2\/posts\/8504\/revisions\/8509"}],"wp:attachment":[{"href":"http:\/\/nycphantom.com\/journal\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/nycphantom.com\/journal\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8504"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/nycphantom.com\/journal\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}