To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Secondary liability

From Wikipedia, the free encyclopedia

Secondary liability, or indirect infringement, arises when a party materially contributes to, facilitates, induces, or is otherwise responsible for directly infringing acts carried out by another party. The US has statutorily codified secondary liability rules for trademarks and patents, but for matters relating to copyright, this has solely been a product of case law developments. In other words, courts, rather than Congress, have been the primary developers of theories and policies concerning secondary liability.

YouTube Encyclopedic

  • 1/5
    Views:
    3 060
    4 613
    507
    1 235
    429
  • William Fisher, CopyrightX, Lecture 11.1, Supplements to Copyright: Secondary Liability
  • Business Law II - Professor Sharma (Lecture 2, Chapters 23 & 24 - 02.07.2015)
  • Scheme Liability, Section 10(b), and Stoneridge Investment Partners v. Scientific Atlanta (1 of 3)
  • Digital Millennium Copyright Act
  • Scheme Liability, Section 10(b), and Stoneridge Investment Partners v. Scientific Atlanta (2 of 3)

Transcription

Hello. I'm Terry Fisher. This is the 11th of 12 lectures on copyright. The topic for today is supplements to copyright. Included in that topic are two main clusters of legal rules- the doctrine of secondary liability and the rules recently adopted by many countries that reinforce so-called technological protection measures. As usual, I'll be focusing on the law in the United States. But I will also mention how the issues addressed today are implicated by multilateral treaties and how countries other than the United States handle them. During portions of the lecture, I'll be using a map of copyright law. The current version of which can, as usual, be downloaded from my homepage, the address of which is tfisher.org. If copyright law were always obeyed, either because people voluntarily complied with its provisions or because they were perfectly enforced, the rules we consider today would almost certainly not exist. But as I'm sure you know, copyright law is not always obeyed. Indeed, broadly speaking, the frequency of disobedience seems to be increasing. Some level of disobedience is not necessarily terrible. We tolerate moderate levels of illegality in lots of fields. For example, violations of speed limits and of rules prohibiting the possession of certain drugs are common and have not, as yet, proven socially catastrophic. Indeed, in the context of copyright law, some degree of disobedience may be affirmatively beneficial. Infringement provides a mechanism by which people who could not afford the prices at which copies of copyrighted works are sold can gain access to those works. Because as you know copyrighted works are non-rivalrous, no one is injured when poor people gain access to copyrighted works for free. If people who could and otherwise would pay for access to the works begin to obtain them illegally for free, then the copyright owners do, of course, forfeit revenue. But so long as the levels of illegality remain moderate, the resultant leakage is tolerable and, as I say, arguably socially beneficial. If the leakage becomes too severe, however, then copyright owners begin to suffer serious injuries, and all of the various values advanced by copyright are imperiled. Lawmakers in such circumstances feel pressure to address the problem in some way. How? One obvious answer is to increase the civil and criminal penalties for engaging in copyright infringement. By making illegal conduct more costly, lawmakers could reduce its incident. We'll consider strategies of this sort next week in the last lecture in this series when we discuss remedies. For now, I'll note only that increasing penalties is not always efficacious and can have some serious side effects. In this lecture, we'll consider two other ways in which lawmakers have attempted to curb copyright infringement and to reduce the associated leakage of the system. The first of those strategies consist of bringing pressure to bear on third parties, specifically parties who do not themselves violate any of the exclusive rights enjoyed by copyright owners. But who enable or encourage violations by others. The basic idea is that, if we can force the third parties to withdraw their support for the infringers, or, better yet, induce those third parties to act affirmatively to curb infringement, we can increase the levels of compliance with the law. Before plunging into the details that currently implement this broad strategy, we should pause to consider the theories underlying this approach as a whole. There are two general approaches used to justify and shape this strategy. The first is simple but important. Encouraging illegality is widely seen as immoral. The person who encourages lawbreaking may not be as blameworthy as the person who engages in it. But it's still blameworthy to some extent. And thus, rightly subject to legal penalties. As we've seen, two of the general theories of copyright, the fairness theory and the personality theory, are founded at least in part on moral considerations. Viewed the lenses of those theories, authors and artists deserve either rewards for their labor or continuing control over projections of their personalities. Conduct that fails to respect their rights is immoral. Encouraging conduct that fails to respect authors' and artists' rights is, thus, also immoral. Perhaps to a lesser degree but immoral nonetheless. And thus properly subject to legal penalties. Sentiments of this sort, as we'll see, color many judicial opinions in this field. The second approach is more complicated and less intuitive. It's associated with the welfare theory of copyright and more broadly with the utilitarian approach to law in general of which the welfare theory of copyright is one branch. This second approach is sometimes called gatekeeper theory. That term was invented by Professor Reinier Kraakman who pioneered this argument. In a seminal article, Kraakman points out that in a diverse array of context, the law and list third parties frustrate or penalize recalcitrant primary wrongdoers. Examples include- the liability sometimes imposed on bartenders or social hosts when their drunk customers or guests cause injuries to themselves or others, penalties imposed on accountants when their clients engage in fraud, and penalties employed on employers who hire illegal immigrants. In other words, employers who facilitate the unlawful behavior of the immigrants themselves. Kraakman offers the following analytical framework to guide determinations of when it makes sense to employ this general technique. Quote successful gatekeeping is likely to require, one, serious misconduct that practicable penalties cannot deter. Two, missing or inadequate private gatekeeping incentives. Three, gatekeepers who can and will prevent misconduct reliably regardless of the preferences and market alternatives of wrongdoers. And four, gatekeepers whom legal rules can induce to detect misconduct at reasonable cost. Close quote. For subtle application of this framework, to override the problems, many but not all of which involves securities regulation, I encourage you to consult Kraakman's article, which is available in the spring 1986 issue of the Journal of Law Economics and Organization. Our concern here is, of course, not the general theory of gatekeeper liability but with copyright law. As applied to copyright, Kraakman's guidelines would suggest that penalties should be imposed on third parties in hopes of suppressing infringing behavior by others only if one, otherwise the incidence of copyright infringement would be acceptably high because directing for interest cannot be controlled by socially acceptable sanctions. Two, the third parties, left to their own devices, would not intervene to curb infringement and indeed might foster it. Three, the third parties we might target are in a position to effectively suppress infringement. In other words, the direct infringers cannot engage in unlawful behavior without their aid. And four, the social and economic costs of penalizing the third parties are not unacceptably high. In many of the contexts I'll be discussing this lecture, the first two requirements are probably met. The third and fourth, however, are not so invariably satisfied. When assessing the imposition of secondary liability in a particular context or case, you should ask yourself, if we penalize this particular third party, will the incidents of direct infringement diminish? Or will the direction infringers just find some other enabler? And what are the social costs of imposing secondary liability in this setting? This last question will be especially salient when dealing with so-called dual use technologies. In other words, technologies that can be and are used both to facilitate illegal behavior and to facilitate lawful and socially beneficial behavior. When considering the use of secondary liability to suppress such technologies, you should consider carefully whether the social benefits of blocking the bad uses exceed the social harms of blocking the good uses. If not, then the use of secondary liability reduces rather than enhances net social welfare. So to review, deployments of secondary liability in copyright law can and frequently are evaluated or justified from one of two perspectives- the immorality of helping someone to violate the rights of others and the possible though not inevitable net benefits to social welfare of enlisting gatekeepers to control otherwise resistant forms of misconduct. With those two perspectives in mind, let's turn to the law. In the United States, the liability of third parties for facilitating the infringing behavior of others is managed by two offsetting sets of rules. The first set consists of doctrines of contributory and vicarious liability. The second consists of a set of statutory quote safe harbors close quote which are embodied in Section 512 of the statute that immunize organizations that otherwise might be liable either for direct infringement or more likely for contributory or vicarious infringement. This doctrinal structure should by now be familiar to you. The doctrines of contributory and vicarious infringement give copyright owners a reasonably generous set of rights. Section 512 then carves out of those rights some specific exceptions and limitations. This pattern, I hope you see, resembles the relationship between Section 106 on one hand and Sections 107 through 122 on the other. Broad grants of rights subsequently qualified by exceptions. The history behind this particular incarnation of the structure is unusual. But the structure itself is typical of copyright law. I will first briefly outline the main features of these supposed sets of rules and then examine a few of the cases in which courts have struggled to apply them. The doctrines of contributory and vicarious infringement were developed by the courts with little or no guidance from the legislature. Sometimes, these doctrines are said to be rooted in the language of Section 106 of the statute, which, as you can see, gives copyright owners the exclusive right to quote do or to authorize close quote any of the things we have considered in the past four lectures. Third parties who encourage copyright infringement might be said to be quote authorizing close quote the infringing behavior, which, as you can see, Section 106 forbids. But this is a pretty thin read on which to rest a massive doctrinal edifice. It's more accurate and honest to acknowledge that the courts have developed these doctrines on their own. And that the copyright statute does not meaningfully guide them. The two doctrines are close cousins but have different origins. Contributory infringement emerged from general tort law. It's said to implement the general principle that one who directly contribute to a tort should be held responsible along with the tortfeasor, himself or herself. The role played by the moral principle I mentioned a few minutes ago should be apparent in this principle. By contrast, vicarious infringement is an outgrowth of the law of respondeat superior, the branch of the law of agency that governs the responsibility of employers for the misconduct of their employees. In the early 20th Century, the courts extended the respondeat superior principal well beyond employment relations. To govern a variety of relationships in which defendants did not themselves engage in copyright infringement but had economic interests that were intertwined with those of parties who did engage in copyright infringement. By the middle of the 20th Century, the two doctrines had evolved to contain the following requirements. To hold a defendant liable for contributory infringement, a plaintiff must show three things. A, that someone had engaged in or was engaging in direct infringement. B, that the defendant had actual or constructive knowledge of that infringement. And C, that the defendant materially contributed to that infringement. By contrast, to hold a defendant liable for vicarious infringement a plaintiff must show three somewhat different things. A, that someone had engaged in or was engaging in direct infringement. B, that the defendant benefited financially from that infringement. And C, that the defendant had the right and ability to supervise the direct infringement. In other words, to stop it and failed to do so. Note that while actual or constructive knowledge is essential to contributory infringement, it's not necessary for vicarious infringement. In that sense, vicarious infringement partakes more of the principle of strict liability than its contributory infringement cousin. The classic illustration of these two doctrines was distilled from a set of cases in the early 20th Century that involved dance halls. Suppose that a musical group without permission performs some copyrighted musical compositions in front of a public audience. The playlist, in other words, the set of songs the group plays, had been selected by the group's manager. The owner of the hall in which the performance takes place keeps a portion of the ticket prices paid by the members of the audience and makes no effort to prevent the group from playing the songs without permission. Under these circumstances, the owners of the copyrights in the songs would have three causes of action. A claim against the group for direct infringement, namely, as you know by now, a violation of the public performance right embodied in Section 1064. A claim against the manager for contributory infringement because, although the manager himself did not publicly perform any compositions, he plainly knew of the band's plan and encouraged it. And finally, a claim against the owner of the hall for vicarious infringement. Because, even if the owner did not know of the band's plan, he is profiting from the band's behavior. And he failed to exercise his clear power to stop them. All of this is straightforward, I hope. Now, let's consider a few modern cases where the application of these principles is less clear-cut. A prosaic but influential case was decided by the Court of Appeals for the Ninth Circuit in 1996. The defendant, Cherry Auction, was the operator of this flea market, located in Fresno, California. A flea market, otherwise known as a swap meet, is a marketplace where a large number of independent vendors sell merchandise, typically inexpensive or used merchandise, to customers who come hunting for bargains. In this instance, the vendors, as is typical, paid modest rental fees to Cherry Auction. Cherry Auction provided those vendors booth space, operated the parking facilities, and advertised the marketplace. In addition to collect the fees for the vendors, Cherry Auction collected entrance fees from the customer's. Finally, Cherry Auction reserved the right to exclude any vendor for any reason. The plaintiff, Fonovisa, Incorporated, Owns? The copyrights in a large number of Latino sound recordings. Fonovisa complained several times at Cherry Auction that sum of the vendors in the flea market were selling pirated copies of Fonovisa's recordings to no available. Finally, Fonovisa brought suit against the flea market. Because Cherry Auction was not itself copying or distributing Fonovisa's works, Cherry was not liable for direct copyright infringement. But if the facts were as Fonovisa alleged, then some of the vendors were surely violating Section 1063 and were not shielded by the first sale doctrine embodied in section 109(a). If the reasons why the vendors were engaged in copyright infringement are not clear to you, you should pause here to review the first segment of lecture number eight. Fonovisa contended that Cherry Auction was secondarily liable for the vendors' unlawful behavior, both under the doctrine of contributory infringement and under the doctrine of vicarious infringement. The trial court was unpersuaded and dismissed the suit for failure to state a claim upon which relief could be granted. The Court of Appeals for the Ninth Circuit reversed and remanded the case. In the opinion explaining its decision, the Ninth Circuit clarified and arguably expanded both secondary liability doctrines. With respect to contributory infringement, the court ruled that Fonovisa had sufficiently alleged knowledge of the infringing sales on the part of Cherry Auction. More importantly and controversially, the court ruled that quote material contribution close quote of the sort required by the doctrine of contributory infringement could be established by showing that the defendant quote provided the site and facilities for known infringing activity close quote. With respect to vicarious infringement, the Ninth Circuit ruled that Cherry Auction controlled the flea market site and had unconstrained authority to expel any vendor. It, thus, plainly had the right and ability to supervise the infringing activity. More importantly and controversially, the court ruled that the quote financial interest required to establish vicarious liability could be established by showing that the infringing behavior quote enhanced the attractiveness of the defendant's venue to potential customers close quote. In other words, that the infringing conduct acted as a draw, pulling customers toward the defendant's site and thus enabling the defendant to earn more money. It should be apparent that this is an expansive interpretation. Taken literally, it would encompass many kinds of behavior in which the financial benefit to the defendant is more indirect than the sort enjoyed by the dance hall owners. This concludes our examination of the basic principles of secondary liability. After the break, we'll examine a set of recent cases that have applied or modified those principles in context in which defendants supplied goods or services that are sometimes used for infringing purposes and sometimes for non-infringement purposes.

Early case law

Secondary liability in copyright has come about with case-by-case decisions. In other words, there has not been any real or consolidated theory. Furthermore, patent and copyright cases have tended to cross-cite each other. Examples of this are cases such as Kalem Co. v. Harper Brothers[1] (the producer of the movie Ben Hur did not himself infringe, but was responsible for making and commercially distributing the infringing film), Shapiro, Bernstein and Co. v. H.L. Green Co.[2] (a booth in a department store that sold infringing sound recordings and the store was ultimately held liable), and the so-called "dance hall" cases (the operator of an entertainment establishment was held liable because he had effective control of the premises and obtained a direct financial benefit derived from charging entrance fees to the public).[3]

The Copyright Act of 1790 did not provide a formal definition of infringement, stating only that "any person or persons who shall print or publish any manuscript, without the consent and approbation of the author or proprietor thereof... shall be liable to suffer and pay to the said author or proprietor all damages occasioned by such injury." Furthermore, the Copyright Act of 1909 simply provided that any person who "shall infringe the copyright in any work protected under the copyright laws of the United States... shall be liable" for various remedies.

Despite the fact that the Copyright Act of 1909 did not explicitly establish liability for acts committed by a party different than the direct infringer, several cases decided under this Act set forth the guidelines under which a party may be deemed secondarily liable. Examples of the gradual recognition by courts of copyright liability extending to those who contribute to or vicariously profit from the infringing acts of others are Fishel v. Lueckel[4] and Kalem Co. v. Harper Brothers.[1][5]

Types

There are generally two kinds of secondary liability developed by courts – vicarious liability and contributory liability. Although the line between these categories of liability is blurry, a precondition for all forms of secondary liability is the underlying act (or acts) of infringement. However, unlike contributory infringement, knowledge is not an element of vicarious liability. 907 F. Supp. 1361, **36, citing 3 NIMMER ON COPYRIGHT § 12.04{A}{1}, at 12-70 (1995)

Some academics have classified the active inducement adopted in MGM Studios, Inc. v. Grokster, Ltd. as a new type of secondary liability because it is based on express acts of inducement and not on a mere failure to act;[6] furthermore, the specific intent to bring about infringing acts is another important factor in this analysis.

Vicarious liability

One of the theories widely accepted as a basis for liability in copyright infringement cases is vicarious liability.[7] The concept of vicarious liability was developed in the Second Circuit as an extension of the common law doctrine of agencyrespondeat superior (the responsibility of the superior for the acts of their subordinate). Pursuant to this doctrine, courts recognized that employers should be liable for the infringing acts of their employees under traditional master-servant principles. An example of this is M. Witmark & Sons v. Calloway.[8]

Beyond the master-servant context, however, courts have extended liability to those who profit from infringing activity when an enterprise has the right and ability to prevent the infringement. Under Dreamland Ball Room v. Shapiro, Bernstein & Co.,[3]

"[T]he owner of a dance hall at whose place copyrighted musical compositions are played in violation of the rights of the copyright holder is liable, if the playing be for the profit of the proprietor of the dance hall. And this is so even though the orchestra be employed under a contract that would ordinarily make it an independent contractor."

By contrast, courts did not extend liability to landlords who leased premises to a direct infringer for a fixed rental and did not participate directly in organizing or soliciting the infringing activity. For example, Deutsch v. Arnold,[9] Fonovisa v. Cherry Auction[10] (extending liability to the operator of a swap meet who repeatedly leased booth space to concessionaires selling infringing tapes).[11]

The landmark case on vicarious liability for sales of counterfeit recordings is Shapiro, Bernstein and Co. v. H.L. Green Co.[2] In Shapiro, the court was faced with a copyright infringement suit against the owner of a chain of department stores where a concessionaire was selling counterfeit recordings. The Shapiro court ultimately imposed liability, even though the defendant was unaware of the infringement, reasoning that the store proprietor had the power to cease the conduct of the concessionaire, and because the proprietor obtained direct financial benefit from the infringement.

Contributory liability

Contributory liability or contributory infringement has been widely defined as a form of liability on the part of someone who is not directly infringing but nevertheless is making contributions to the infringing acts of others. Material contributions to the act (or enabling thereof), as well as knowledge of the act itself, are key elements of contributory liability. Additionally, in the course of performing such material contributions, the parties know that they are materially infringing copyrighted content.

Contributory liability is rooted in the tort theory of enterprise liability. Contributory liability holds the third party liable for the primary act based on the third party's relationship with the actual harm – either by enabling or by benefiting from it. As the court stated in Gershwin Publ'g Corp. v. Columbia Artists Mgmt.: “ "one who, with knowledge of the infringing activity, induces, causes, or materially contributes ... may be held liable as a contributory infringer."[12]

Not long after the passage of the 1976 Copyright Act, the scope of contributory infringement liability was tested in a case in which the copyright owners claimed that the sale of a recording device – the VCR – illegally contributed to infringement. In Sony Corp. of America v. Universal City Studios, Inc.[13] was established a variant on contributory liability claims with respect to technologies. When Universal City Studios initially sued Sony for making and selling the Betamax, the theory was that Sony materially contributed to acts of infringement performed by users of the Betamax, and knew or had reason to know that the technology would be used for infringing purposes. The Supreme Court of the United States held that, even though material contributions and knowledge of the infringement are generally sufficient to establish secondary liability, in the case of infringing technology, contributory liability cannot be imposed unless the technology lacks substantial non-infringing uses. As the Court phrased the Sony exception with regard to new technologies: "The sale of copying equipment, like the sale of other articles of commerce, does not constitute contributory infringement if the product is widely used for legitimate, unobjectionable purposes. Indeed, it need merely be capable of substantial noninfringing uses."[13]

Liability of internet service providers (ISPs)

Regarding internet communications, sometimes the most promising remedy is only available from the standpoint of the internet intermediary (e.g. delete the post, take down the link). In fact, the internet is a special field for secondary liability, because the open architecture of the internet facilitates many communications and users need intermediaries in order to access and contact each other's services.

The question of whether Internet service providers (ISPs) should be held liable for the actions of network users is unresolved.[14] As to copyright, however, ISPs remain liable, in all territories, as primary, direct infringers of copyright if, and only to the extent, that they are direct actors and make copies on behalf of their customers, so the issue of additional secondary liability is less significant in a case where direct liability is alleged. An ISP's direct liability arises from the ISP's own actions, not the actions of another party.

Recent statutes in the United States (Digital Millennium Copyright Act of 1998) and the European Union have provided significant, though not total, immunity from primary copyright liability that, in the absence of those statutes, would exist for ISPs.[15]

The DMCA states four safe harbors: (a) Transitory network communications (b) System caching (c) Information storage and (d) Information location tools.[16] The last three have so called “notice & take down” rules for specificity in notice of infringement, counter-notice and put-back and liability if false notice has been given.

In order to be eligible for the safe harbor provisions, it is required that the service provider has adopted and reasonably implemented a policy to terminate the accounts of repetitive infringers. In addition, ISPs must accommodate and not interfere with standard technical measures used by copyright owners to protect their works.[16]

As to trademarks, in the absence of statutory guidance, courts have extended both types of secondary liability (vicarious and contributory) to third parties, including in some circumstances ISPs. Here, too, the question whether ISPs will be held liable for the acts of their infringing customers will depend on the degree of the ISP's knowledge and involvement in the specific infringing activity.[17]

In the future

Future treatment of secondary liability by US courts is uncertain. Some cases and commentators have argued for broadening secondary liability through cost–benefit analysis, multi-factor balancing tests, or simply basing it on technical designs or business models.[18]

The proposed EU directive would make aiding and abetting infringement a basis for liability. In light of the above, it is permissible to conclude that there is no consensus on this issue.

See also

References

  1. ^ a b Kalem Co. v. Harper Brothers, 222 U.S. 55 (1911).
  2. ^ a b Shapiro, Bernstein and Co. v. H.L. Green Co., 316 F.2d 304 (1963).
  3. ^ a b Dreamland Ball Room v. Shapiro, Bernstein & Co., 36 F. 2d 354 (7th Cir. 1929).
  4. ^ Fishel v. Lueckel, 53 F. 499 (1892).
  5. ^ Robert P. Merges, Peter S. Menell, and Mark A. Lemley (2007). Intellectual Property in the New Technological Era, p. 572, Aspen Publishers, New York.
  6. ^ Pamela Samuelson,Three Reactions to MGM v. Grokster Archived 2010-07-06 at the Wayback Machine, 13 Mich. Telecomm. Tech. L. Rev. (2006).
  7. ^ Robert A. Gorman and Jane C. Ginsburg (2009). Copyright Cases and Materials, Foundation Press, New York.
  8. ^ M. Witmark & Sons v. Calloway, 22 F. 2d 412, 415  (1927).
  9. ^ Deutsch v. Arnold, 98 F. 2d 686 (1938).
  10. ^ Fonovisa v. Cherry Auction, 76 F. 3d 259 (9th Cir. 1996).
  11. ^ Julie E. Cohen, Lydia Pallas Loren, Ruth L. Okediji, and Maureen A. O'Rourke (2006). Copyright in a Global Information Economy, p. 481, Aspen Publishers, New York.
  12. ^ Gershwin Publ’g Corp. v. Columbia Artists Mgmt., 443 F. 2d 1159 (2d Cir. 1971).
  13. ^ a b Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417 Archived 2008-09-19 at the Wayback Machine (1984).
  14. ^ See K. A. Taipale, Secondary Liability on the Internet: Towards a Performative Standard for Constitutive Responsibility, Center for Advanced Studies Working Paper No. 04-2003 (2003).
  15. ^ See D. Panethiere,The Basis for Copyright Infringement Liability: The Law in Common Law Jurisdictions, 13 European Intellectual Property Review 26 (1998).
  16. ^ a b 17 U.S.C. §512
  17. ^ See Jane Coleman, Secondary Trademark Infringement: A Short Treatise on Contributory and Vicarious Infringement in Trademark Archived 2012-09-13 at archive.today (Revised, Sept. 2010).
  18. ^ Pamela Samuelson, Preliminary Thoughts on Copyright Reform, Utah Law Review (2007); UC Berkeley Public Law Research Paper No. 1002676.

External links

This page was last edited on 31 December 2023, at 02:06
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.