Curator of Special Collections and Hebraica-JudaicaDoes your name belong to you? What about your photo or image? Does it matter if you鈥檙e dead or alive? May your name or likeness be used for commercial purposes?
These queries fall under the question of publicity rights, defined by Black鈥檚 Law Dictionary as 鈥渢he right to control the use of one鈥檚 own name, picture, or likeness and to prevent another from using it for commercial benefit without one鈥檚 consent.鈥
A well-known legal case exploring this concept was Hebrew University vs. General Motors, regarding GM鈥檚 use of Albert Einstein鈥檚 image in an advertisement. The Hebrew University claimed exclusive rights to Einstein鈥檚 name and likeness as a beneficiary under Einstein鈥檚 will. The case was brought to the United States District Court Central District of California in 2012. The court ruled that the right of publicity lasted no longer than fifty years after an individual鈥檚 demise, thus releasing Einstein鈥檚 name and image for public use.
The Albert Einstein College of Medicine, opened by 黑料社 All not long after Einstein鈥檚 death in 1955, would not have been affected by the California court鈥檚 ruling, no matter the outcome of the case. In 1951, Albert Einstein wrote a letter to Dr. Samuel Belkin, president of the University, expressing his 鈥済reat satisfaction that 黑料社 All is planning to establish a medical school.鈥 Dr. Belkin suggested naming the medical for Einstein; Einstein countered that a Jewish medical school should be named for Maimonides. Though 鈥淓instein resisted, Belkin persisted,鈥 and by 1953, Einstein agreed to allow 黑料社 All to name the medical school for him.
On Einstein鈥檚 74th birthday on March 14, 1953, Belkin presented him with a model of the medical school at a press conference in Princeton, New Jersey. Many newspapers covered the event; a headline in the New York Times proclaimed 鈥淒r. Einstein gives name to a college,鈥 and the article portrayed the media presence: 鈥淎mid the flashing of photographers鈥 bulbs, the whirring of newsreel cameras, and the glare of television lights, he was notified that the 黑料社 All Medical School had been named the Albert Einstein College of Medicine.鈥 of Einstein鈥檚 1953 statement to the press: 鈥淚 am grateful that 黑料社 All has honored me by using my name in connection with the new College of Medicine.鈥 No one can argue with that!
Nonetheless, the depiction of the coverage of the press conference in 1953 is relevant to the nature of publicity rights. Just imagine all the equipment needed in 1953; today, if necessary, a cell phone would suffice. Over the past century, the means of communication have progressed by leaps and bounds, and the speed and immediacy of distribution has increased exponentially. Researchers who request photographs from the archives are frequently surprised by the dearth of photos of important university personalities or events; they find it hard to picture that everyone didn鈥檛 have a cell phone camera immediately at hand. Beginning with photography in the early 20th century, followed by radio, telegraph, film and television, and then the advent of digital cameras and technology鈥攁ll these developments coupled with nearly instantaneous dissemination available via the internet have inexorably altered the landscape of use, and thus potentially misuse and abuse, of names and images for commercial purposes. Will the line between commercial use and other uses blur as the boundaries between commerce and social network media fray on the web? Will new methods of communication be invented? How will these developments affect or change laws of publicity rights?
Stay tuned!
Back to top
Rabbi Shalom Carmy
Assistant Professor of Jewish Philosophy and Bible Rabbi Shalom Carmy
Let鈥檚 not talk about legal ownership, copyright law or rabbinic injunctions aimed at preventing plagiarism or republication without permission. What about intellectual fairness and public benefit, regardless of legal recourse?
Say I prepare tentative notes that you publish in my name without my permission. Ideas and formulations not intended for the public are now identified as mine, misrepresenting my beliefs and conclusions, misleading readers and often holding me up to ridicule.
Or you tape a class meant for a specific audience and then disseminate my provisional discussion, complete with hesitations, casual remarks and thought experiments. Likewise, if you publish material I intended to print but in a different sequence than I planned, again, you are distorting my work without my permission.
You may claim, rightly or wrongly, that there is intellectual or moral gain from exposing my rough drafts and intimate conversations, but first and foremost you are invading my privacy. Whether I can launch injunctions or collect damages, you are treating me shabbily and interfering with my study and my work.
The next three examples are less straightforward.
Martin Buber supported World War I before he opposed it. He was not obligated to reprint his early pro-war writings. His failure to do so, even as he advertised his later criticism, encouraged the impression that he had never supported the German war effort. When Buber switched positions is significant for an understanding of his social philosophy and Zionism. I did not find out about this change until I began teaching Buber. Buber could not truthfully deny his history, and scholars were justified in unearthing it, but one can hardly insist that Buber had an obligation to reissue writings that he no longer agreed with and presumably regretted.[1]
We all know that on June 6, 1958, General de Gaulle ended a speech by shouting the words Vive l鈥橝lg茅rie Francais (Long live French Algeria), thus aligning himself with the Pied-Noirs who opposed French withdrawal from Algeria. His most recent major biographer, Julian Jackson, claims this is not quite right. De Gaulle shouted Vive l鈥橝lg茅rie; a moment later, after stepping back, he added Francais, perhaps because he realized the crowd was not satisfied. If so, de Gaulle edited the rough draft out loud in public. The army finished the editing by erasing the time lag between noun and adjective. Were they entitled to do so? This point strengthens the evidence that de Gaulle was already unenthusiastic about retaining Algeria.[2]
As editor of Tradition, I was occasionally presented with statements by authoritative rabbinic figures which we could not validate. It was awkward to admit we could not give credence to the author鈥檚 report, and of course we could not prevent publication on the internet or in other journals. Yet, our policy was not to reproduce such assertions without satisfactory verification. In an age of fake news and promiscuous rumormongering, we reasoned it was better to let an authentic conversation go unreported than to propagate dubious claims that take on a life of their own. Sometimes the purported information was subsequently demonstrated to be fraudulent.
References
[1] For a recent survey, see Paul Mendes-Flohr, Martin Buber: A Life of Faith and Dissent (Yale, 2019)
[2] Julian Jackson, De Gaulle (Harvard University Press, 2018) 486.
Back to top
Rabbi Daniel Feldman
Rosh Yeshiva at the Rabbi Isaac Elchanan Theological Seminary and an instructor in the Sy Syms School of Business Daniel Feldman
Values abound and intersect, combine and conflict, when considering the question of the protection of intellectual property in Jewish law. As is the case with the general legal and philosophical discussion of the topic, there is a fundamental tension at the core: on the one hand, the technical application of terms such as 鈥渙wnership鈥 and 鈥渢heft鈥 to that which is intangible is uncertain. On the other hand, the value placed upon intellectual creativity is so vast鈥攁ll the more so, within the Beit HaMidrash [study hall]鈥攖hat to leave the product of this creativity unprotected seems unthinkable.
When the content at stake is in a realm as precious as Torah innovation, another fundamental tension is amplified. The Torah is independently recognized as a gift, a transcendent intangible that is nonetheless perceived as a concrete acquisition of both the Jewish people as a whole and accomplished scholars as individuals, seemingly granting the words material status.[1]
At the same time, the crucial value this content holds for the progress of mandated Torah study tempts one to paraphrase the mantra of modern computer hackers, that knowledge vital to society 鈥渨ants to be free.鈥>[2]
Further, these opposing ideals clash in a battlefield largely ungoverned by explicit halakhic [Jewish law] sources, forcing a recourse to broader declarations of values. Indeed, this was the approach of at least one major decisor, who simply asserted that it was inconceivable that Jewish law would not agree to a protection indicated both by common sense and universal cultural agreement and that no further source was needed.[3]
Others utilized terms such as 鈥渢heft鈥 as a given,[4] perhaps understanding that the output of one鈥檚 intellect can be no less worthy than that of one鈥檚 hands, whether or not the details neatly fall into place. Perhaps, some considered, rabbinic law fostered a status of 鈥渢heft鈥 onto intellectual appropriation despite the technical mismatch as a corrective to the societal discord that could otherwise ensue.[5]
To other authorities, Jewish law governed but through other models. Some turned to the laws of tort liability, either by seeing appropriated texts as 鈥渄amaged鈥 through their reduced marketability,[6] or, more conceptually, observing that if one is liable for the harm inflicted by his creations (such as a public hazard), by logical extension he 鈥渙wns鈥 the benefits as well.[7] Others saw creative products as subject to conditions expressed by a creator, who sells copies but not duplication rights.[8] Others asserted the inverse of a cherished Jewish value: it is 鈥淪odom-like鈥 to withhold benefit to another that inflicts no loss of the owner[9]; the implication, by inference, is that if there is any kind of loss, potential or present, the owner is justified in dictating terms of use.[10]
In some of the literature, the only recourse is presented as an activist legal construct: rabbinic edicts and declarations, banning, for example, the republication of a work outside the aegis of the original author.[11] This may create the impression that without and until such legislation, Jewish law maintained no objection.[12] However, the opposite conclusion is also possible: despite the complexity of the issue, the value system of the Torah, through the totality of its message, must respect the rights of the intellectual creator. Accordingly, the rabbis legislate to demand adherence to that which is already proper.
Ultimately, one of the most essential of Jewish values may be the most relevant. The fundamental reciprocity of the golden rule, 鈥淟ove your neighbor as yourself,鈥 commands that we show appropriate deference, in credit and in compensation, to those who have toiled to enlighten our minds and souls. As Hillel put it[13] (to credit the source), the rest is commentary.
References
[1] See Resp. Machaneh Chaim CM 2:49, and the rebuttal of Resp. Maharam Shick, YD 156. h
[2] According to Wikipedia, this quote is generally attributed to Stewart Brand, who originally articulated it in balance with the opposing consideration: 鈥淥n the one hand information wants to be expensive, because it鈥檚 so valuable鈥n the other hand, information wants to be free鈥︹ In his original formulation, the push towards 鈥渇ree鈥 is reflected in the reality of ever-increasing accessibility; in usage, it is often a reference to a societal right to advances in valuable knowledge and art. Similarly, in some of the halakhic [Jewish legal] literature, Torah content is paradoxically presented as less protected, as it considered a part of the legacy of the Jewish people.
[3] Resp. Shoel U鈥橫eishiv, kama, 1:44. See also Resp. Meishiv Davar, O.C. 24. The governance of secular law would also be relevant; see Resp. Beit Yitzchak, YD, II, 75.
[4] See, for example, Resp. Iggerot Moshe, OC V, 40 :19.
[5] Per Gittin, 59a. See R. Yehoshua Chilo, Mishnat Yehoshua: Choshen Mishpat (who ultimately rejects this model). Mishnat Yehoshua is one of several contemporary works that extensively survey the issue of intellectual property; others include R. Yaakov Avraham Cohen, Emek HaMishpat, volume IV; R. Avraham Levi, Zekhuyot Yotzrim: Madrikh Hilkhati; and R. Menashe Weisfish (ed.), Mishnat Zechuyot HaYotzer.
[6] While this damage, both indirect and physically intangible, would not be recoverable in rabbinic court, it could nonetheless warrant an a priori prohibition.
[7] See R. Shimon Shkop, Chiddushim, Bava Kama, 1.
[8] See R. Zalman Nechemiah Goldberg, Techumin, VI, pp 370ff, per Bava Metzia 78b, and note the analysis of Emek HaMishpat IV, 37, and Mishnat Yehoshua, Inyanei Zechuyot Yotzrim, ch. 3.
[9] See Avot 5:10 and Bava Batra 12b.
[10] See Resp. Noda B鈥橸ehudah, tinyana, C.M 24; and compare Resp. Divrei Malkiel III, 157
[11] See, for example, Resp. Rama, 10, and Resp. Chatam Sofer, C.M. 79, and VI, 56.
[12] See the discussion in Mishnat Yehoshua, ch. 1.
[13] Shabbat 31a.
Back to top
Paul Glassman
Director of University LibrariesA National Need
A recent institute on open educational resources convened by the observed that academic libraries have a growing opportunity to offer solutions to the exorbitant costs of college textbooks.
A national survey of college students by the concluded that students worry more about textbook costs than about the cost of tuition. At a typical private, four-year, liberal arts college in northern New Jersey, the average cost of the required textbooks in four first-year courses (biology, art history, accounting and sociology) totals $273, while a concluded that students often spend as much as $1,204 for textbooks and supplies for the academic year. The average art history textbook costs $152. A survey found that 65% of students simply do not purchase the course text and that, of those, 94% worry that the decision will affect their academic performance.[1]
As a result, students turn to academic libraries, where budget constraints and the rapid publication rate of new editions often preclude the purchase of current course textbooks. Nevertheless, in a survey of 118 college and university libraries, one quarter of respondents reported the traditional practice of not being involved at all in textbook acquisitions.[2] In turn, students attempt to rely on interlibrary loan, which either by policy or demand is an unsustainable solution. A Library Journal survey reports that about 60% of students who use library resources for assigned reading do so to save money on textbooks.[3]
Power to the People (i. e., the Authors)
How can academic institutions and their libraries address this need in their efforts to help students succeed? In several , open education resources (OER) are part of a textbook revolution: faculty members create textbooks that are free and that can be edited and revised freely.
In 2009, were the first to adopt an open-access policy, awarding faculty the right to share their scholarly production openly and without the commercial intervention of publishers. Available in formats such as PDF and EPUB, textbooks produced as OER can also be bound and sold at nominal cost at college bookstores if there is a groundswell of demand for print versions. All this results from the premise that knowledge and expertise are community resources, their production having been supported by institutions of higher learning for centuries. OER embrace the premise that academic knowledge and expertise in the classroom is no longer property to be guarded, re-packaged and sold by commercial publishers for profit.
But books, even if their content is uncopyrighted, do not write themselves, nor does their content appear magically. Which conditions foster the textbook revolution? Several factors need to be in place for this critical innovation to launch: institutional awareness about the need to adopt this type of resource and about the benefits of OER; financial incentives or professional development funds to potential authors; and willing partners.
In this last regard, academic libraries, as centers of content, preservation, and teaching, may take on a pivotal role in OER efforts.[4]
Typically, authors share their instructional materials as OER by selecting a Creative Commons license, which renders the work free to use. Authors can still retain copyright when they license their work with Creative Commons.[5] Although progress has been made in large publicly supported institutions (e.g., , University of Minnesota), smaller institutions may need to adopt a more incremental, grassroots approach.[6]
Digital Alternatives
Another solution to the problem of textbook affordability is digital alternatives, such as e-books and other electronic materials, resources already owned or licensed by academic libraries. In collaboration with faculty members, librarians can employ their knowledge and subject specialties to curate digital alternatives for students. Since nearly all periodical literature and a growing amount of monographic material are acquired in electronic format, this solution not only features simultaneous access but also offers the benefit of a multiplicity of voices and diversity of perspectives not possible with a single textbook. As a result, faculty members can 鈥渇lip鈥 their courses from requiring costly commercial textbooks to using subscription resources (periodical literature, electronic reference sources and relevant chapters from electronic books) commonly made available via the academic libraries of those institutions through consortial agreements.
Conclusion
Academic libraries are not only aggregators of information and knowledge. When they are at the center of OER initiatives and digital alternatives, academic libraries can also catalyze the creation and curation of new instructional materials to be shared globally and thus revolutionize student learning.
References
[1] Ethan Senack, Fixing the Broken Textbook Market: How Students Respond to High Textbook Costs and Demand Alternatives (Boston: The Student PIRGs, 2014).
[2] Survey of Academic Library Upper Management: View of the Library Role in Providing Textbooks (New York: Primary Research Group, 2018).
[3] Library Journal, Textbook Affordability Survey Report (New York: Library Journal, 2019), p. 3.
[4] Erin Davis, Dory Cochran, Britt Fagerheim & Becky Thoms, 鈥淓nhancing Teaching and Learning: Libraries and Open Educational Resources in the Classroom,鈥 Public Services Quarterly, vol. 12, no. 1, p. 26.
[5] Melissa Falldin and Karen Lauritsen, Authoring Open Textbooks (Minneapolis: Open Textbook Network, ca. 2018), p. 9.
[6] Jeremy Smith, 鈥淪eeking Alternatives to High-Cost Textbooks: Six Years of The Open Education Initiative at the University of Massachusetts Amherst,鈥 in Jonathan Lashley, Andrew Wesolek, and Anne Langley, OER: A Field Guide for Academic Librarians (Forest Grove, Oregon: Pacific University Press, 2018), pp. 333-350.
Back to top
Robert J. Greenberg
Clinical Associate Professor of Business LawIntellectual property is usually divided into three main subcategories: trademarks, copyrights and patents. This essay will provide a brief overview of each area 鈥 its source, what is eligible for protection, the duration of the protection, the relevant government entity, what constitutes infringement and what defenses might be available to avoid or minimize infringers鈥 liability.
Trademarks are used to identify the source of goods in commerce. Trademark law is codified in the Lanham Act, 15 U.S.C. 搂搂 1051 et seq. The basis for trademark law rests in the Commerce Clause, found in Article I, Section 8, Clause 3, of the United States Constitution. Items which most commonly function as trademarks are brand names (McDonalds), logos and symbols (the golden arches), sounds (the Tarzan yell), colors (Pepto Bismol pink, Tiffany blue, UPS brown), shapes (the Coca Cola glass bottle) and fragrances (cherry-scented transmission fluid).
Trademark registration is handled by the United States Patent and Trademark Office, a federal agency within the United States Department of Commerce. Trademarks which are found to be arbitrary, fanciful or suggestive will normally be registered without complication. Marks which are merely descriptive will not be registered unless the mark has acquired 鈥渟econdary meaning鈥 (i.e., the public associates the descriptive mark with one particular source, such as Dunkin Donuts). Any mark that is generic will be denied registration.
Trademarks are registered in connection with specific classes of goods and services. Thus, different parties could register the same trademark in different classes of goods, so long as there is no likelihood of confusion between the sources of the goods. The federal courts have identified as many as eight different factors that should be considered when evaluating the likelihood of confusion, including the similarity of the goods in question, the similarity of the marks, the channels of trade and the sophistication of the intended customers.
Trademark infringement occurs when someone creates a likelihood of confusion in the minds of consumers as to the source of the goods in question. Remedies for trademark infringement may include monetary damages, injunctive relief and seizure and destruction of the infringing goods.
The initial period of protection for a registered trademark is 10 years. So long as the trademark continues to be used in commerce, the registration can be renewed an unlimited number of times for additional 10-year periods.
Copyrights and patents are provided for explicitly in Article I, Section 8, Clause 8, of the United States Constitution, which states that Congress shall have the power 鈥渢o promote the progress of science and useful arts by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.鈥
Copyright law in the United States is further codified at 17 U.S.C. 搂搂 101 et seq. Section 102 enumerates the different subject matter that may be eligible for copyright protection: literary, musical and dramatic works; choreographic works; pictorial, graphic and sculptural works; motion pictures and other audiovisual works; sound recordings; and architectural works.
Eligible subject matter qualifies for protection only if it is an original work of authorship that has been fixed in a tangible medium of expression. Accordingly, ideas that have not been expressed in writing would not qualify for protection. Similarly, an extemporaneous speech or improvised musical performance that is not being recorded contemporaneously would not qualify. If one has eligible subject matter that is original and fixed in a tangible medium of expression, one need not engage in any formal registration process with the Copyright Office, officially part of the Library of Congress, to have copyright protection. However, there are distinct advantages to registration, and one may lose certain rights by not registering the work.
Having valid copyright in a work gives the holder certain exclusive rights, including the right to make copies, to prepare derivative works, to distribute the work and to engage in public display and public performance of the work.
Regarding infringement, it is typically rare for the plaintiff to have direct proof of copying. Far more common is for the plaintiff to raise a presumption of copying based upon the defendant鈥檚 access to the work in question and the substantial similarity between the two works. The burden then shifts to the defendant to prove that the 鈥渋nfringing鈥 work was not copied from the original (e.g., by establishing independent creation).
Another defense that is frequently raised is 鈥渇air use.鈥 Section 107 sets forth four factors to consider in evaluating whether a defendant engaged in fair use, including the purpose and character of the use (commercial or nonprofit educational), the nature of the copyrighted work, the amount and substantiality of the portion used in relation to the work as a whole and the effect of the use on the potential market for the copyrighted work. Remedies for copyright infringement include monetary damages, injunctive relief, seizure and destruction of the infringing works and criminal penalties.
The duration of copyright is found in Sections 302-305 of the 1976 Copyright Act. Most works created on or after January 1, 1978, will be protected for the life of the author plus seventy years and will then pass into the public domain, while works created and copyrighted before January 1, 1978, are protected under the 1919 Copyright Act for an initial term of twenty-eight years with a possible renewal for an additional twenty years. The Sonny Bono Copyright Term Protection Act of 1998 added an additional twenty years of protection to any works still under copyright.
Patents are also administered by the United States Patent and Trademark Office. The three basic types of patents are utility patents (for scientific discoveries and inventions), design patents and plant patents. The Supreme Court has also recognized business method patents, which are used to protect unique ways of doing business, such as Amazon鈥檚 鈥1-Click Shopping鈥 and Priceline鈥檚 鈥淩everse Auction.鈥
To qualify for patent protection, the subject matter must be new, useful and non-obvious in light of the prior art (i.e., what is known at the time). The three standards are not easy to satisfy; patent protection is the most difficult (and most expensive) of the three types of intellectual property to obtain. The typical utility patent application consists of claims as to how the device functions and detailed drawings of the item. Often, the claims will be written broadly to preemptively preclude potential competitors from the marketplace and facilitate sending infringers cease-and-desist letters and initiate litigation in the future.
Should the Patent Office approve a request to register, the term of protection runs for twenty years from the date the application was filed. Previously, protection ran for seventeen years from the date the application was granted; the term was changed in 1995 to bring the United States into conformity with the World Trade Organization鈥檚 Agreement on Trade-Related Aspects of Intellectual Property Rights and the practice followed by most of the European countries.
Finally, trade secret law is available to protect those who might be reluctant to engage in public disclosure of their intellectual property by filing for trademark, copyright or patent protection. The most famous trade secret would be the Coca-Cola formula, which would clearly be worth much less if it were known by everyone. Other examples of trade secrets would be confidential customer lists, proprietary business methods and so on.
Trade secrets remain protected so long as they remain secrets. When businesses need to reveal trade secret information to employees for those people to perform their jobs, they will attempt to protect the information and restrict the workers from revealing the information by means of non-disclosure agreements and non-compete clauses. Unfortunately, as a practical matter, those are effective only so long as the subject individuals are ethical and obedient to the law. The unethical employee who has no respect for such agreements can easily cause a business to lose its trade secret protection, and financial recovery against the employee after litigation likely will not come close to making the company whole for the loss it has sustained.
Back to top
Stephanie L. Gross
Scholarly Communication Librarian, Library Systems and Digital Services Stephanie Gross, Librarian, Electronic ReservesOpen access (OA) is a publishing and distribution model that makes scholarly research literature鈥攎uch of which is funded by taxpayers around the world鈥攆reely available to the public online, without restrictions (). (See videos and ).
OA frequently refers to journals. Although their content is 鈥渇ree,鈥 many are indeed peer-reviewed and achieve high-impact status. As OA content is not behind prohibitively expensive paywalls, readership consequently hails from all corners of the globe. (For legal access to full-text OA articles, see .)
OA is also associated with Open Educational Resources (OER) (i.e., resources used to educate and train students). Open Data is a third example of OA scholarship available to scientists and students. typically applies to a range of non-textual materials, including datasets, statistics, transcripts and survey results along with the metadata associated with these objects. The data is the information necessary to replicate and verify research results.
Models of OA JournalsGreen (self-archiving)鈥擳he author shares a version (usually post-print) to an OA website, often their institution鈥檚 institutional repository. Publishers may stipulate embargoes of 12-48 months, mandatory use of Digital Object Identifiers (DOI), and use of pre-print PDF (rather than the publisher鈥檚 PDF). (For more on the importance of institutional repositories, see 鈥,鈥 by S.Y. Rieh, et al. SI, U Michigan, [2007].)
黑料社 All鈥檚 institutional repository, , was established in May 2018 and so far has 4,095 items posted by 4,050 authors, encompassing 2,734 subjects. YAIR accepts research and scholarship from YU faculty, staff, and students. Examples of material on YAIR include articles, monographs, theses and dissertations, working papers, technical reports, conference papers and presentations, datasets, software code, images, video and other multimedia creations.
Gold OA articles are those whose access is immediate on the publisher鈥檚 website.
Hybrid OA refers to a journal to which a publishing fee has been paid by the author or the author鈥檚 institution.
Popular open-access websites include arXiv, ResearchGate and Academia.edu. 鈥渋s a repository of electronic preprints (known as e-prints) approved for posting after moderation, but not full peer review. It consists of scientific papers in the fields of mathematics, physics, astronomy, electrical engineering, computer science, quantitative biology, statistics, mathematical finance and economics, all of which can be accessed online. In many fields of mathematics and physics, almost all scientific papers are self-archived on the arXiv repository.鈥
is a social networking site for scientists and researchers to share papers, ask and answer questions and find collaborators. People who wish to become site members need to have an email address at a recognized institution or be manually confirmed as a published researcher to sign up for an account. The site has been criticized for generating profiles for non-users, and a study found that over 50% of the uploaded papers appear to infringe on copyright because the authors uploaded the publisher鈥檚 version (Hamid R. Jamali, 16 February 2017, , Scientometrics, 112(1): 241鈥254).
Popular among many YU faculty is , an American social networking website for academics. The platform can be used to share papers, monitor their impact and follow the research in a field.
Academia.edu is not an OA repository and is not recommended as a way to pursue green OA. Experts such as invite researchers to use field-specific repositories or general-purpose repositories, such as , which 鈥渁llows researchers to deposit data sets, research software, reports, and any other research related digital artifacts. For each submission, a persistent Digital Object Identifier (DOI) is minted, which makes the stored items easily citable.鈥
Research guides on open access:
Public Services and Outreach Librarian, Pollack Library Wendy Kosakoff, Librarian, Pollack Library
I recently read an enlightening series of articles in a major news magazine. In one of the articles, however, a broad historical assertion struck me as questionable. I did some research and found that the statement was inaccurate or at least debatable. There was no citation attributing the statement to a source. Because the article was an historical piece not within the first-hand knowledge of the reporter, I found the omission of a source citation, and the apparent inaccuracy, particularly troubling. My discovery tainted the rest of the reporting on an otherwise eye-opening topic.
As a librarian, part of my job is to teach students the importance of careful research, accurate reporting and appropriate citation of sources. Students need strong and honest information-seeking skills to succeed.
黑料社 All鈥檚 academic integrity policy provides a foundation for these objectives, but the library鈥檚 goal is more robust: we want our students to become successful and productive citizens, employees and leaders in society. An important starting point is teaching students to approach their research with rigor and integrity, enabling them to construct convincing and well-supported arguments.
Student research鈥攍ike faculty research鈥攊nvolves aggregating information that ultimately inspires original thought. Credit must be given any time a writer cites facts or uses other people鈥檚 words or ideas. Proper citation of sources helps the reader evaluate the foundation and reliability of the facts or ideas and gives credit where credit is due, making clear which ideas the writer gathered from elsewhere and which are original. Citations also point a reader to sources for further scholarly investigation.
How do libraries help cultivate academic integrity? YU librarians are passionate about our work and enjoy helping patrons conduct research to support the best possible written product. We have created that covers proper attribution of sources and includes information about avoiding plagiarism, a variety of style guides, citation generators, citation managers and more. We also teach students how to evaluate resources. In the digital age it can be easy to find information. But how can one know what is accurate and true? A librarian can help!
As a librarian, I want to help students do their best original work with the utmost honesty. The accuracy and integrity of a finished project should never be open for question.
Back to top
Rina Krautwirth
Research and Instruction Librarian, Hedi Steinberg Library Rina Krautwirth, Reference and Instruction Librarian
It is 2 a.m., the night before your research paper is due, which will determine a major portion of your grade for the course. As you do your best to stay awake to finish the paper, you find that someone has posted an essay online on your exact topic. You think about how much time it would save to hand in this essay as your own, and you begin to weigh this option against the likelihood of getting caught. This type of scenario is just one of many possible ethical dilemmas that students today during the digital age might face (12).
What is academic integrity? Academic integrity involves 鈥淸u]nderstanding what it means to be honest in the particular culture of the academic world and being able to apply the scholarly conventions of acknowledgement,鈥 such as proper citation of sources (7). Research has shown that students today, while familiar with the term academic integrity, do not have as strong of a grasp as they should of all that this concept entails. One research study found that a significant amount of plagiarism occurs simply because students lack sufficient understanding of what constitutes plagiarism (3), such as how to cite sources.
In a more extreme form, academic dishonesty in its broadest definition includes 鈥渁ny form of fraud in an academic setting鈥 (5). Instances include plagiarism, cheating on tests, deception, fabrication, exchanging work with other students or purchasing work; the latter has its own term: contract cheating, which refers to paying contractors to write the work (10; 1). Additionally, a 2015 research study showed that an estimated 17% of U.S. college students misuse ADHD drugs to enhance studying (11).
Academic dishonesty has many negative consequences, such as cost to the individual鈥檚 learning, 鈥渕isaligned instruction鈥 and 鈥渦nfair grade distribution鈥 for others in the classroom (10). Several students interviewed on this topic felt that cheating lessens the value of the cheater鈥檚 college degree (12). In the case of study drugs, students even could face risks to their health.
Why might someone commit academic fraud? Researchers have tried to pinpoint the factors that might account for academic dishonesty. At the forefront is lack of a culture of academic integrity. A study of health profession students found that cheating 鈥渋s more likely to occur when students view it as a social norm (鈥榚verybody does it鈥)鈥 (9). Of particular concern, some research has suggested that those who cheat have a higher likelihood of unethical professional practice as well (6; 14).
Research has shown that cheating has been on the rise from the 1940s to this decade (5). The advent of the digital age, while mostly positive, in some ways offers more opportunity to violate academic integrity. In part, 鈥淸r]eadily available technology may contribute to the problem because student behaviors have included cutting and pasting internet information, sharing online quizzes and texting confidential information to classmates鈥 (8). Regarding plagiarism, the practice 鈥渋s becoming more evident as technology enables easy access to online resources鈥 (13). Even more so, 鈥淸w]ith technology-assisted academic dishonesty, control of student behavior can become extremely difficult and taxing on educators鈥 (8). As technology continues to progress, universities will need to set more measures in place to combat technology-assisted cheating.
What else might motivate a student to commit academic fraud? In the aforementioned analysis of health profession students, 鈥淸p]eer pressure, competition for high grades, heavy course demands, time management constraints, [and] dissatisfaction with faculty instruction鈥 factored into academic dishonesty (9). Furthermore, perseverance, academic aptitude, self-discipline, life events and balancing school with other commitments also emerged from another study as reasons that students might outsource their work (1). Other reasons shown from various studies included 鈥減ressure to maintain grades, emphasis of grade over comprehension鈥arger classroom settings, reduced fear of getting caught, poorer self-control and higher self-oriented thoughts, small consequences attached to getting caught鈥nd overall actions and attitudes of faculty regarding cheating鈥 (6). Again, in the digital age, 鈥渁dvances in electronic technology, which make it easier to cheat鈥 played a role (9). These considerations, exacerbated by a culture of academic dishonesty, contribute to academic fraud.
What types of interventions might resolve this issue? Keener (6), who surveyed student and faculty perceptions of academic integrity, suggests that 鈥淸e]vidence supports initiatives aimed at involving students in developing academic honesty policies.鈥 Bealle (2), a library professor who created classroom materials on the topic, has found that many advantages arise from incorporating academic integrity lessons into the classroom itself. Similarly, Smedley (13), a researcher in the field, studied an educational intervention for undergraduate nursing students in a private college in Sydney, Australia, and found that promoting awareness helped more in reducing plagiarism than did relying solely on plagiarism detection software. Regarding technology-driven cheating, banning cell phones, tablets and so on might serve as one effective strategy to combat this type of cheating (6).
According to Mabins (8), 鈥渋ncreased awareness, standardized faculty mentoring and training, and a student involved process鈥 all together collectively contribute to a culture of academic integrity. The university can contribute to the culture of success by serving as a model of ethical decision-making and by effectively communicating academic integrity information (4). Given that 鈥淸c]hanging the culture and overall environment is found to curb cheating鈥 (6), students and faculty alike can take measures to create a culture of academic integrity, particularly in the digital age when new technology offers more opportunity for academic dishonesty.
References
Amigud, A., & Lancaster, T. (2019). 246 reasons to cheat: An analysis of students鈥 reasons for seeking to outsource academic work. Computers & Education, 134, 98鈥107.
Bealle, P. (2017). Community College Academic Integrity Lessons That Put Research into Practice. Theory into Practice, 56(2), 144鈥155.
Birks, M., Smithson, J., Antney, J., Zhao, L., & Burkot, C. (2018). Exploring the paradox: A cross-sectional study of academic dishonesty among Australian nursing students. Nurse Education Today, 65, 96鈥101.
Bretag, T., Mahmud, S., Wallace, M., Walker, R., McGowan, U., East, J., 鈥 James, C. (2014). 鈥楾each us how to do it properly!鈥 An Australian academic integrity student survey. Studies in Higher Education, 39(7), 1150鈥1169.
Kanat-Maymon, Y., Benjamin, M., Stavsky, A., Shoshani, A., & Roth, G. (2015). The role of basic need fulfillment in academic dishonesty: A self-determination theory perspective. Contemporary Educational Psychology, 43, 1鈥9.
Keener, T. A., Galvez Peralta, M., Smith, M., Swager, L., Ingles, J., Wen, S., & Barbier, M. (2019). Student and faculty perceptions: appropriate consequences of lapses in academic integrity in health sciences education. BMC Medical Education, 19(1), 209.
L枚fstr枚m, E., Trotman, T., Furnari, M., & Shephard, K. (2015). Who teaches academic integrity and how do they teach it? Higher Education (00181560), 69(3), 435鈥448.
Mabins, M., Gokun, Y., Ryan, M., & Divine, H. (2014). Pharmacy educators鈥 experience and views on academic dishonesty. Currents in Pharmacy Teaching and Learning, 6(2), 185鈥193.
Maring, J., Vail, M., Wright, K. A., Tebbenhoff, B., Canova, K., & Costello, E. (2018). Attitudes Toward Academic Dishonesty in Health Profession Students. Journal of Allied Health, 47(4), e97鈥揺103. Retrieved from
Patall, E. A., & Leach, J. K. (2015). The role of choice provision in academic dishonesty. Contemporary Educational Psychology, 42, 97鈥110.
Peachman, R. R. (n.d.). Why you should skip adderall as a study drug. Retrieved August 29, 2019, from Consumer Reports website:
Prihar, A., am, C. W. 2:44, Feb 07, & 2019. (n.d.). Cheating at Yale: Students get honest about academic dishonesty. Retrieved August 29, 2019, from
Smedley, A., Crawford, T., & Cloete, L. (2015). An intervention aimed at reducing plagiarism in undergraduate nursing students. Nurse Education in Practice, 15(3), 168鈥173.
Tabsh, S. W., Abdelfatah, A. S., & El Kadi, H. A. (2017). Engineering students and faculty perceptions of academic dishonesty. Quality Assurance in Education, 25(4), 378鈥393.
Sy Syms Professor of FinanceMovies are the most expensive works of art, with budgets that can reach hundreds of millions of dollars. Ownership of movie properties is fairly well defined, but the new digital era has completely upended the old models of valuing film properties. This valuation is crucial, both for financing the movie in the first place and for any future transactions in the completed film.
For example, our work (Palia et al, 2008) documents how studios parse the rights to show a film in various territories and venues (TV, DVD) to determine how budgets should be split among collaborating studios and production companies. Independent films often sell rights forward to finance their movies, and if the creative team and the financiers cannot agree on a price, the movie may never get made.
Valuation is also crucial when film libraries change hands. For example, the value of the film library of MGM was a big component in the discussions during the trials and tribulations of MGM during the early part of the 21st century that culminated in a bankruptcy filing in 2010. It had never been easy to estimate how many people will watch a particular film and in what venues. However, traditionally, one could value a film based on comparables or, if the film has already been made and shown, on early results (usually U.S. theatrical exhibition).
The digital age has dramatically changed these equations. The first crack in the wall appeared when piracy became an issue. First, there were grainy VHS tapes filmed during screenings and sold around the world. Piracy has graduated since to full-blown good quality copies available illegally on the internet. New valuation models must consider how much of the projected revenue may be lost to piracy. There is broad consensus that there will be a decline in revenues, but the extent is not clear (Danaher and Smith, 2017).
The second challenge to film valuation is more recent. The percentage of film revenues coming from U.S. theaters has been declining for decades. International revenues and home entertainment receipts have seen a tremendous growth (see Ravid, 1999 and our current research). The switch from VHS to DVD did not make a huge difference, except in the quality of the image, and a reasonably stable valuation model could be established.
However, in recent years, streaming has been growing in leaps and bounds. Streaming revenues are expected to surpass global theatrical revenues for the first time this year (Roxborough, 2018). Streaming is a completely different distribution mode, with different pricing structures. Whereas consumers had to rent or buy DVDs or VHS tapes, they can buy unlimited access to, say, all of Netflix content. Therefore, it is very difficult to estimate how much films are worth now as the technology and the pricing models are evolving.
Piracy and streaming have also transformed the traditional 鈥渞elease windows.鈥 Films used to open in the United States, then overseas, and then would go to home entertainment. Now, films may be released on all distribution channels simultaneously or with a short delay.
For example, the Academy Award-winning movie Roma opened on Netflix shortly after a very limited theatrical release in 2018 and then expanded in theaters. Interestingly, streaming and theatrical release coexisted peacefully.
This profound revolution in distribution has made the valuation of film properties very difficult. Independent films, which rely on such valuations and would have been made under the old system, may not be made now as nobody will take the risk of future income. Interestingly, this may explain the large increase in production funded by streaming services, in particular Netflix. Their proprietary data allows them to best analyze the streaming value of films, and thus they can better assess the possible economic success of the properties.
This evolving process illustrates the idea that intellectual property boundaries are important, but valuation is crucial as well.
References
Danaher, Brett and Michael Smith, 鈥淒igital Piracy Film Quality and Social Welfare,鈥 George Mason Law Review, vol. 24, 2017, pp. 923-938.
Roxborough, Scott, 鈥淕lobal Streaming Revenues is set to Outpace Box Office in 2019, Study Finds," Hollywood Reporter, December 17, 2018.
Palia, Darius, Ravid, S. Abraham, and Reisel, Natalia, 鈥淐hoosing to Cofinance: Analysis of Project-Specific Alliances in the Movie Industry,鈥 Review of Financial Studies, April 2008, pp. 483-511.
Ravid, S. Abraham, 鈥淚nformation Blockbusters and Stars: A Study of the Film Industry,鈥 Journal of Business, October 1999, pp. 463-392.
Back to top
Rabbi Moshe Schapiro
Reference Librarian, Mendel Gottesman Library of Hebraica-Judaica Rabbi Moshe Schapiro
We usually discuss issues of ownership in legal terms. This holds true whether we are talking about land, movables or intellectual property. It is important, however, especially from the perspective of Jewish law, to view the concept of ownership through a theological lens as well. Do we really own our property, or for that matter, our ideas?
The Mishnah (Avot 3:8) declares: 鈥淕ive Him from His own, for you and your possessions are His. And so has David said, 鈥楩or everything is from You, and from Your own we have given You鈥 (Chronicles I 29:14).鈥 The medieval commentator R. Jonah of Gerondi explains that we do not truly own our possessions. Rather, they are given to us by God as a deposit to be guarded. Even though normally a guardian may not make personal use of a deposit, God has granted us the use of our wealth to meet all our needs.
However, the primary obligation of the guardian is to see to it that the deposit is used in accordance with the will of the depositor. It is the belief in God鈥檚 absolute ownership of the material world that should engender a spirit of generosity and charity with one鈥檚 wealth. If this generosity is not forthcoming, the Talmud (Ketubot 49b) states that the Jewish court may assess a person鈥檚 property and force them to donate an appropriate amount to charity.
The spirit of generosity and charity also encompasses the conveying of knowledge and sharing of wisdom. R. Moses Isserles (Hoshen Mishpat 292:20) rules that the Jewish court may force someone to lend books to his neighbors when no other books for study are available. R. Elijah of Vilna (ad loc. #47) identifies the Talmudic source for this ruling. Ketubot 50a presents two interpretations of the verse 鈥渨ealth and riches are in his house and his charity endures forever鈥 (Psalms 112:3). Either it refers to one who learns Torah and then teaches it to others, or to one who copies Bible scrolls and lends them to others to use. R. Elijah elaborates: since teaching and lending texts constitute forms of charity, and since it was already established that the Jewish court may compel the giving of charity, R. Isserles鈥 ruling that we can force the owner to lend out his books follows logically.
The value of sharing knowledge with others is not limited to Torah learning. Just as the Talmud (Berakhot 58a) formulates a blessing upon seeing a Torah scholar (鈥淲ho apportioned of His knowledge to those who fear Him鈥), so, too, it formulates a blessing upon seeing a secular scholar (鈥淲ho has given of His knowledge to human beings鈥). All forms of wisdom emanate from God, and where the spirit of charity would be served, it follows that any form of wisdom should be shared generously.
With the advent of the digital age, the ability to make scholarly research available to a global community creates a unique opportunity for generosity. From the perspective of Jewish law, this may create a formal religious obligation as well. R. Moshe Feinstein (Introduction, Dibrot Moshe, Bava Kamma) writes that the mitzvah of teaching Torah obligates Torah scholars to publish their research and insights for two reasons: to spread their knowledge to the widest possible audience and to prevent their research from becoming lost or forgotten. It follows that a Torah scholar who does not make his work available via electronic media diminishes his fulfillment of the commandment to teach Torah.
Jewish legal sources address the question of intellectual property rights extensively, including important issues such as reward for effort, return on investment and scholars鈥 need to support themselves. The Torah recognizes that it would be unfair and irresponsible to deny scholars the material benefit of their hard work.
However, Jewish law also seeks to mold attitudes and encourage positive behaviors. Acknowledging that God grants our intellectual achievements should lead to a spirit of generosity and a willingness, within reason, to share our knowledge and insight with others. Digital platforms make this generosity more attainable and more impactful.
Back to top
Marlene Schiffman
Catalog Librarian, Metadata Services and Processing Marlene Schiffman, Catalog Librarian, Metadata Services and Processing
An orphan work is one for which the owner of a copyrighted work cannot be identified and located by those who wish to make use of the work鈥攖ypically publishers, libraries, museums, historical societies, universities or archives--in a manner that requires permission of the copyright owner. The long duration of copyrights, and the absence of mandatory registration, notice, renewal and recording of transfers have given rise to millions of orphan works.[1]
Even if the user makes a reasonably diligent effort to find the owner, there is a remote risk that a copyright owner could bring an infringement action after the work is reused. Secondary users would have to initiate another search since they cannot rely on the search of a previous user. It would stifle creativity to prevent authors from remixing, sampling and otherwise building upon the works of their predecessors as raw material for new expression.[2]
A search may be conducted by delving deeper into copyright records at the Copyright Office.[3] These records may help determine who owns the work currently through records of copyright transfers. Copyright Office renewal records will reveal if the publisher has failed to renew the copyright in the work, which puts the work in the public domain if it was published between 1923 and 1964. The three most common methods of searching Copyright Office records are hiring a search firm, paying the Copyright Office to do the search or searching the Copyright Office records using the internet. Each search requires a different amount of effort, and in many cases, the copyright owner still cannot be identified.
With visual or digital works, software and related tools that facilitate image recognition, fingerprinting, watermarking, audio recognition and licensing for copyrighted works are technologies already available, and startups are hoping to fill this role in assisting those who search for copyright owners.[4]
The problem with these schemes is deciding upon whom the burden would fall for creating the database; for example, who would have to register the billions of analog art works in a digital format? The creators of such works do not have the resources to engage in such a project.[5] Mass digitization projects may serve important public benefit objectives including preservation and accessibility and providing authors and copyright holders of out-of-print works with potential new sources of revenue. How could any archives possibly locate millions of copyright holders associated with such a project? Congress has only exacerbated the problem by enacting longer and longer copyright terms, abolishing the requirement that copyright holders must renew the copyright twenty-eight years from publication and that they register their works with the Copyright Office.[6]
Potential users of orphan works contend that if users conduct a reasonably diligent search, they should be protected from excessive penalties should the owner appear. Payment should be limited to a fee as if it had been negotiated beforehand between the user and the copyright owner. Photographers have suggested that use of orphan works be limited to individuals for non-revenue producing personal or community purposes. Non-profit educational institutions might be given permission to use them in exhibits, documentaries or websites and even in souvenir sales in connection with an exhibit.[7]
Ultimately, a legislative solution needs to be addressed by Congressional action. Bills were proposed in 2006 and 2015, but they have not resulted in any concrete legislation. Comprehensive copyright revision is not expected soon. So how should libraries and archives handle orphan works in the meantime?[8]
An institution must consider the following risk factors when proceeding without permission:
The investment in the project using the copyrighted work. The more money spent on the project, the greater the risk if its publication must be suspended.
The diligence of the copyright search. The more diligently it has been researched in good faith, the less risk.
The nature of the work and the reduction of risk. How easy will it be to remove the unauthorized material?
An analysis of the risk. This will determine how hard it would be to replace the material if the owner insists that it be removed.
The likelihood of discovery depends on how widely distributed the infringement is. Liability might result only in payment to the rights holder of the standard fee within the trade for a similar use.[9] Ultimately, stakeholders would benefit from legal clarification from Congress that would allow orphan works to be available for public use in a way that is equitable for both users and copyright holders.
References
[1] Neil Weinstock Netanel, Copyright: What Everyone Needs to Know (New York: Oxford University Press, 2018), 52.
[2] Netanel, Copyright, 203.
[3] Richard Stim, Getting Permission, 6th ed. (Berkeley, CA: Nolo, 2016), 44-45.
[4] Allan Adler Testimony, in Copyright and the Orphan Works Issue, ed. Andrew D. Owens (New York: Nova Science Publishers, 2010), 8. For a description of PicScout, 鈥渁 young technology company based in San Francisco CA and Israel,鈥 specializing in image recognition technology, see Maya Gura Testimony in the same volume, 15-16.
[5] Victor S. Perlman Testimony, in Copyright and the Orphan Works Issue, 29.
[6] For legislation concerning lengthening of copyright terms and strengthening of copyright protection, see Marybeth Peters Testimony, in Copyright and the Orphan Works Issue, 34-35.
[7] The American Society of Media Photographers suggests the possibility of limiting use of orphan works to institutions qualified under 搂501(c)(3) of the Internal Revenue Code. Perlman, in Copyright and the Orphan Works Issue, 26.
[8] Stim, Getting Permission, 46.
[9] Fishman, Stephen, The Copyright Handbook: What Every Writer Needs to Know, 13th edition, ed. David Goguen (Berkeley, CA: Nolo, 2017), 376.
Back to top
Deena Schwimmer
Archivist Deena Schwimmer, Archivist, 黑料社 All Libraries
The doctrine of Fair Use, [1] which provides the framework for using copyrighted material without the copyright holder鈥檚 permission, has been, at the same time and for the same reason, one of the most and least applauded components of U.S. copyright law.
It was first codified in the U.S. Copyright Act of 1976; however, its common law history in the United States dates from the earliest copyright legislation passed by Congress in 1790. In his 1841 ruling in ,[2] Justice Joseph Story first articulated what evolved into the 鈥渇our factors鈥 to be considered in making a fair use determination,[3] which have been the criteria ever since and are enshrined in the 1976 Act.
Such divergent attitudes regarding the Fair Use doctrine exist because the four factors are not applied in a formulaic manner but rather as a balance based on the full circumstances of each case. Critics of the doctrine perceive it as a muddy morass, too vague to rely upon except in proven cases. Its supporters champion it as a flexible, living system that advances creativity and innovation.
Fair Use should be viewed within the wider context of U.S. copyright law, which itself originates in Congress鈥 power to grant time-limited, exclusive rights to creators for the purpose of promoting 鈥淧rogress of Science and the useful Arts.鈥漑4] This limited monopoly incentivizes creativity while ensuring these works become available to society as their copyrights expire and they enter the public domain.
To further preserve this balance between the interests of creators and the public, copyright law contains other limitations to creators鈥 exclusive rights. These consist of a set of specific, qualified uses by (primarily) libraries, archives and educators,[5] and unspecified, unqualified uses[6] deemed to be 鈥渇air鈥 per the four factors, which may be asserted by all.
Understood this way, it is because of the broadness (vagueness to some) inherent in Fair Use that it contributes to preventing copyright from unreasonably suppressing the use and enjoyment of works that enrich the public. Indeed, in her majority opinion in Eldred v. Ashcroft, Justice Ruth Bader Ginsberg referred to Fair Use as a built-in first amendment safeguard.[7]
It can be argued that the practices and tools so integral to our current digital age would not have flourished or even arisen without an extensible, flexible Fair Use framework. The doctrine鈥檚 adaptability has enabled forward-looking courts to apply it in support of uses that transform the copyrighted material鈥檚 original purpose, despite making outright and even extensive uses of it.[8] It is due to Fair Use that we have, for example, search engines, the remix culture, appropriation art, fan fiction and anatomization of political news.
In academia, the specificity of the exclusions for libraries and educators in the Copyright Act has made them inadequate for today鈥檚 practices. Because of Fair Use, however, efforts such as digitizing archives and repurposing popular culture content for media and cultural studies curricula are widespread, and the discipline of digital humanities has emerged.
Fair use fosters the functioning and advancement of our modern society.
References
[1] 鈥淏reathing Space within the Confines of Copyright鈥 comes from Justice David Souter, writing for the majority in Campbell v. Acuff-Rose Music, 510 U.S. 569 (1994).
[2] 9 F Cas 342 (CCD Mass 1841).
[3] Those factors are: (1) the purpose and character of the use; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work. See 17 U.S.C. 搂 107 (2016).
[4] U.S. CONST. Art. I, 搂 8, cl. 8.
[5] 17 U.S.C. 搂108, 110, 1201(d)
[6] The preamble to the Fair Use Exclusion provides examples of uses that were traditionally found to be fair, such as criticism and news reporting; however, these were not intended as comprehensive. See 17 U.S.C. 搂 107 (2016).
[7] Eldred v. Ashcroft, 537 U.S. 186 (2003).
[8] For just a few of many examples, see Authors Guild, Inc. v. Google Inc., No. 13-4829-cv (2d Cir. Oct. 16, 2015); Blanch v. Koons, 467 F.3d 244 (2d Cir. 2006); Bill Graham Archives v. Dorling Kindersley Ltd., 448 F.3d 605 (2d Cir. 2006); Campbell v. Acuff-Rose Music, 510 U.S. 569 (1994).
Back to top
Dr. Joshua Waxman
Assistant Professor at Stern College for WomenIn my scholarly work in developing and applying algorithms to Jewish texts, I sometimes come across issues of copyright. In one recent example, my research group was trying[1] to train a machine learning model to recognize instances of citations (e.g., 鈥渁nd the Sages expounded in chapter Lulav Hagazul鈥) in rabbinic responsa (that is, collections of questions posed to a rabbi on matters of rabbinic law, coupled with the rabbi鈥檚 response) and use those citations to predict the topic of that responsum (e.g., blemishes on an etrog).
Our initial plan was to utilize Rav Moshe Feinstein鈥檚 Igerot Moshe [Letters of Moshe] because that would best align with work by other researchers.[2] Due to copyright issues, we were unable to acquire this resource and instead trained on Rav Yosef Karo鈥檚 commentary Bet Yosef [House of Yosef] and tested on the Responsa of Rabbi Solomon Luria, all taken from Sefaria.[3]
Sefaria鈥檚 goal is to open-source a Jewish library. They have made, freely accessible, a large number of Jewish texts. In the Mi VaMi project,[4] which highlights the social scholastic network of the Talmud, we build upon Sefaria鈥檚 Hebrew, Aramaic and Hebrew Talmud text, which is the William Davidson digital edition of the Talmud, available at no charge under a Creative Commons non-commercial license. This digital edition was, in turn, acquired from the Koren No茅 Talmud. Yet, one thing that the digital version lacks that the printed version has is vowel points and punctuation, which were painstakingly put into the text by Rav Adin Steinzaltz.
Outside of Sefaria, there are also many texts which are not accessible to the world at large. For example, the Talmud text on Sefaria is essentially that of the printed Vilna edition. Hachi Garsinan,[5] a website from the Friedberg Jewish Manuscript Society with free registration, compares the versions from various manuscripts side-by-side. These variants are quite important for my work on the Talmudic scholastic graph, as more than half of occurrences of the names of Amoraim have variants in one of their manuscripts, and we don鈥檛 want to work with erroneous data. Luckily, these variant texts are accessible at this excellent site, though it is in a 鈥渨alled garden.鈥漑6]
Another example of locked-up texts are the critical editions of Onkelos鈥 Targum (an Aramaic translation of the Pentateuch). In the Ktav edition of Targum Onkelos, Rabbi Dr. Israel Drazin bases his commentary on the critical edition of the Targum text created by Dr. Alexander Sperber, but because of the Sperber copyright, prints the actual text of Onkelos taken from the earlier work of Rabbi Dr. Avraham Berliner. In the later Gefen edition by Rabbi Drs. Israel Drazin and Stanley Wagner, they provide a nice text with vowel points but for 鈥渢echnical reasons鈥 use neither the Berliner nor the Sperber text. This is thus another example of an important text being locked away.
Having to contend with this issue of locked texts led me to think about the nature of Jewish texts, which belong to the author who put in years of work and, at the same time, to the Jewish people at large. Please note that these are just musings rather than a deep scholarly analysis of the topic of intellectual property and hasagat gevul[7] [moving of the boundary marker]. I clearly speak here not as an expert in either Jewish law or in American law.
One place to begin is Yerushalmi Peah 2:4:
专' 讬讛讜砖注 讘谉 诇讜讬 讗诪专: 注诇讬讛诐 鈥 "讜注诇讬讛诐", 讻诇 鈥 "讻讻诇", 讚讘专讬诐 鈥 "讛讚讘专讬诐": 诪拽专讗, 诪砖谞讛, 转诇诪讜讚 讜讗讙讚讛. 讗驻讬诇讜 诪讛 砖转诇诪讬讚 讜转讬拽 注转讬讚 诇讛讜专讜转 诇驻谞讬 专讘讜, 讻讘专 谞讗诪专 诇诪砖讛 讘住讬谞讬. 诪讛 讟注诐? "讬砖 讚讘专 砖讬讗诪专 专讗讛 讝讛 讞讚砖 讛讜讗" [拽讛诇转 讗 讬] 鈥 诪砖讬讘讜 讞讘讬专讜 讜讗讜诪专 诇讜: "讻讘专 讛讬讛 诇注讜诇诪讬诐."
Rabbi Yehoshua ben Levi said (interpreting Devarim 9:10, regarding the two tablets with the Ten Commandments): Upon them - 鈥淎nd upon them鈥 鈥 were all 鈥 鈥渓ike all鈥 鈥 matters 鈥 鈥渢he matters/commandments.鈥 That is, (upon the narrow tablets were) Scripture, Mishna, Talmud and hermeneutic interpretations. Even that which a dedicated disciple will, in the future, innovate before his teacher was already said to Moses on Sinai. What is the source? (Kohelet 1:10) 鈥淭here is a thing of which [someone] will say, 鈥楽ee this, it is new.鈥欌 His fellow will respond and say to him, 鈥淚t has already been for ages which were before us.鈥
That is, based on a verse in Kohelet, even that which a student states before his teacher was already stated to Moshe on Har Sinai. One might say that the whole realm of Torah discussion is part of the inheritance of the Jewish people, or perhaps that if an innovation is indeed true, then it is, in some sense, not novel but part of the very Torah which existed 鈥渇rom time immemorial.鈥
Yet, there is another thread, non-contradictory, that stresses the importance of attribution, which suggests an ownership of novel thoughts. In a source which, funnily enough, is most often quoted without attribution (Megillah 16a), Rabbi Eleazar (ben Pedat) citing Rabbi Chanina says, 鈥淲hoever says a matter in the name of the person who said it brings redemption to the world.鈥
Rav Moshe Feinstein put an exceptional level of effort and expertise into his responsa, and attribution and compensation are certainly deserved. On the other hand, this is Torah and belongs to the Jewish people. Hillel HaZaken, who was poor, famously (Yoma 35b) avoided paying the entrance fee to the Bet Midrash by perching on the skylight and listening in.[8]
There is a position within the thought of the Sages that maintains that 鈥渋nformation deserves to be free.鈥 For example, there are the competing approaches of Rabban Gamliel II and Rabbi Eleazar ben Azaria (Berachot 28a) about having or removing the guard at the entrance to the study hall, allowing greater accessibility with the possible drawback of allowing in inappropriate students, with the Talmud鈥檚 conclusion endorsing the open-access approach as the correct one.
The Mishna and various related teachings (Yoma 38a) level criticism at certain families and individuals, who performed holy work for the Bet HaMikdash, for keeping trade secrets such as how to make the incense rise, prepare the shewbread so that it will not mold or use a particular musical and scribal technique. The ideas behind the criticism is that this knowledge shouldn鈥檛 be kept completely to themselves. Each, save the last, offered a defense that they wanted to prevent misuse.
Before Berliner and Sperber spent years and applied their expertise to write their own precise versions of Targum Onkelos, Onkelos himself wrote it and established the ground truth. These scholars own their work and deserved credit and compensation, but I just (jealously, perhaps ridiculously) wonder that, since they worked to reconstruct the original text and that is its essential value, how could the reconstructed yet original true text of Onkelos not be in the public domain of the Jewish people?
This ownership argument can indeed be applied to Onkelos himself, for he might have reconstructed an earlier Targumic text. In Megillah 3a, we hear of various innovations, which are nevertheless authentic because, in some real or theoretic sense, they already existed. For example, they state that Onkelos composed the Targum based on the ideas and positions of his teachers Rabbi Eliezer ben Hyrcanus and Rabbi Yehoshua ben Chanania. Thus, he deserves credit, though the Targum gains much of its authoritativeness and canonical status because it is based on existing tradition. The stam [anonymous stratum] of the gemara questions even this much ownership of the Targum. After all, a verse in Nehemiah (8:8) is interpreted to mean that a public reading included Targum, so the Targum must have predated Onkelos. The proffered answer is 砖讻讞讜诐 讜讞讝专讜 讜讬住讚讜诐, 鈥渢hey forgot it, and then returned and reestablished it.鈥 In other words, the very same Targum was forgotten and then reestablished.
I鈥檒l close with a nice idea from Rabbi Nechemia Ruzinsky, in his beautiful sefer Mishnat Nechemia [The Teachings of Nechemia],[9] which surveys the consistent positions of many rabbis whose views are recorded in the Talmudic literature. He notes multiple instances where Rabbi Eleazar ben Pedat angered Rabbi Yochanan and Resh Lakish for presenting halachic decisions that they believed to be their own without proper attribution.[10] How could Rabbi Eleazar ben Pedat not offer proper attribution? After all, he was the one famous for stressing the importance of attribution to bring redemption to the world!
Rabbi Razinsky answers, based on Bava Metzia chapter 4, that Rabbi Eleazar ben Pedat was the master of braytot (literally 鈥渙utside teachings鈥, that is, teachings of the Sages from an earlier strata called Tannaim, from approximately 10-220 CE, which had not been incorporated into the Mishna) which were not known to others, even to Rabbi Yochanan. There, we find Rabbi Yochanan complaining to Resh Lakish that Rabbi Eleazar was reciting halachic [Jewish legal] positions as if they were directly from the Mouth of God, without attribution. Resh Lakish explains that, in this case, Rabbi Eleazar was actually citing a brayta [outside teaching] on his own. (This brayta can be found in Torat Kohanim). Indeed, Rabbi Eleazar had learned these from Rav in Bavel, who in turn had learned them from Rabbi Chiya.
Along similar lines, after Resh Lakish鈥檚 death, when Rabbi Eleazar ben Pedat was assigned to learn in companionship with Rabbi Yochanan, he annoyed Rabbi Yochanan by repeatedly supporting him rather than attacking his position. For every novel statement Rabbi Yochanan made, Rabbi Eleazar said tanya demasaye鈥檃 lach, 鈥渢here is a brayta which supports you!鈥 Again, this was because he knew of these braytot [outside teachings] of Rabbi Chiya.
With this in mind, it becomes evident that Rabbi Eleazar ben Pedat was not taking illicit credit for Rabbi Yochanan and Resh Lakish鈥檚 Torah. Rather, all the times these scholars thought that Rabbi Eleazar was plagiarizing their statements, he was actually just expounding these braytot.
At the end of the day, intellectual property, including in the Torah realm, belongs to its creators and innovators, in the sense that proper attribution should be given and copyright law should be respected. At the same time (Devarim 33:4), the Torah is an inheritance of the Jewish people. An interesting dilemma.
References
[1] Adina Cohen and Joshua Waxman, 2019, NER of Citations and Fine-Grained Classification of Responsa, in Israeli Seminar on Computational Linguistics Conference
[2] Elli Fischer and Moshe Schorr, 2018, 鈥淭he Shape of a Rabbinic Career: Rav Moshe Feinstein and Rav Yaakov Ettlinger鈥,
[3] ,
[4] Joshua Waxman, 2019, A Graph Database of Scholastic Relationships in the Babylonian Talmud, Proceedings of the Digital Humanities 2019.
[5] The name is Aramaic for 鈥淪o do we establish the version of the text.鈥
[6] A walled garden is 鈥渁 restricted range of information to which subscribers to a particular service are limited.鈥
[7] Literally 鈥渕oving of the boundary marker鈥. This had an original, Scriptural implication of theft of land by moving a landmark but was extended in rabbinic law to restricting competition in commerce and, in the 1500鈥檚 and on, to protecting printer鈥檚 rights by banning others from reprinting a book for several years after the initial printing, effectively a copyright restriction.
[8] See the Shach in Choshen Mishpat 292:35 about stealing Torah when it is not otherwise accessible.
[9]
[10] See Yerushalmi Berachot 2:5, Yerushalmi Yevamot 3:10, Makkot 5, Menachot 83, and Yevamot 96. In the last instance, several Sages attempt to placate Rabbi Yochanan, and he is eventually comforted by the idea that, just as Yehoshua stated halacha without attribution and everyone knew it came from his teacher Moshe, so does Rabbi Eleazar teach without attribution, and everyone knows it came from his teacher Rabbi Yochanan. This would not work for statements taken from Resh Lakish, however, so the problem remains.
Back to top