T-245-16 Nintendo Further Written Submissions of Applicant (2016 - 12-14) .
T-245-16 Nintendo Further Written Submissions of Applicant (2016 - 12-14) .
T-245-16
FEDERAL COURT
B E T W E E N:
Applicant
-and-
Respondents
Mark G. Biernacki
Kevin P. Siu
FEDERAL COURT
BETWEEN:
Applicant
- and -
Respondents
under the Copyright Act, RSC 1985, c C-42 (the Act). Many of the issues raised in
2. The Applicant, Nintendo of America Inc., seeks, inter alia, a declaration that
the Respondent, Go Cyber Shopping (2005) Ltd., has circumvented, offered services
contrary to s. 41.1(1)(a)-(c) of the Act, and that the Respondent has infringed the
3. If the Respondent is liable for circumvention and/or infringement under the Act,
the Applicant seeks statutory damages under s. 38.1 of the Act, its costs, as well as an
4. The Applicant also sought a declaration of infringement under ss. 19 and 20 the
Trade-marks Act, RSC 1985, c T-13. However, at the hearing of this Application, the
5. Accordingly, the issues for determination are whether the Respondent is liable
under the asserted provisions of the Act, and if so, the appropriate remedies.
this Application, the Applicant and individual Respondent, Jeramie Douglas King
-2-
7. However, the Applicant maintained all its claims against the corporate
Respondent, Go Cyber Shopping (2005) Ltd. (herein referred to in the singular as the
Respondent). The contested issues between the two parties remain to be dealt with,
as discussed below. Further, following settlement between the Applicant and Mr.
King, the Respondent advised the Court that it would rely solely on its written
8. It is trite law that the party asserting a cause of action bears the burden of
proving each required element of the cause of action, while a party raising an
affirmative defence bears the burden of proving all the elements of the defence.
9. A party may choose not to lead evidence on any issue and elect to argue that the
adverse inference may be drawn from a partys failure to lead evidence that was in its
10. The Applicant adduced affidavit evidence from three witnesses. None were
cross examined.
-3-
11. The Respondent did not lead any evidence, despite filing a Memorandum of
Fact and Law raising certain affirmative defences and arguments regarding the
quantum of damages.
13. The central question for the asserted causes of action is whether each required
element has been established. The effect of the Respondents lack of evidence will be
B. The Parties
14. The Applicant, Nintendo of America Inc., is a famous video game company. It
sells and distributes popular and well-known video games and video game consoles
in Canada. The popularity and success of its video games are a result of substantial
property, and marketing. Each of the Applicants video games can take years and
Respondent also appears to carry on business under the name Modchip Central Ltd.
(which is neither a registered corporation nor business name) through the same retail
-4-
16. King is the sole director and officer of the corporate Respondent (Hunter,
17. The Applicant sells video game consoles in Canada. At issue in this Application
are the handheld video game consoles known as the Nintendo DS and 3DS, and the
18. The Applicant also sells hundreds of video games for its consoles in Canada.
These video games are sold as game cards (in the case of DS and 3DS games) and
discs (in the case of Wii games). Purchasers of genuine Nintendo video games can
play these games on the appropriate Nintendo console by inserting the game card or
disc into the corresponding console. The Applicant does not and has never authorized
downloading of its games onto devices that mimic its game cards or discs and which
19. There are two types of copyrighted works at issue in this Application: computer
code and data used by the Applicant as part of its TPMs (Header Data) and the
video games developed for the Applicants video game consoles (Nintendo
Games).
-5-
20. The Header Data consist of three works in which the Applicant has registered
copyright:
21. Each genuine game card sold by the Applicant contains two of the Header Data
works. Authorized DS game cards each contain a copy of the DS Header Data and the
Nintendo Logo Data File. Authorized 3DS game cards each contain a copy of the
22. The Header Data works serve two relevant functions for the purpose of this
Application.
23. First, the Header Data contains code that represents the Applicants logos,
which are used by the Nintendo DS and 3DS consoles to display the logos on the
screen when the device is turned on with a genuine game card inserted.
24. Second, the Header Data is used by the Nintendo DS and 3DS consoles as part
of the Applicants TPM system. In particular, the Header Data must be present on an
inserted game card (whether genuine or not) in order for the Nintendo DS or 3DS
25. The Applicant also owns copyright in 585 video game works. Copyrights in
217 of the Nintendo Games are registered in Canada. These video game works
include, for example, the New Super Mario Bros. and Pokemon X (Rhoads 1,
26. Copyrights in the remaining 368 Nintendo Games are not registered in Canada
but are registered in the United States. By virtue of the Berne Convention for the
Protection of Literary and Artistic Works (1886), 828 UNTS 221 and s. 5 of the
Copyright Act, these copyrighted works are also subject to copyright protection in
27. The Respondent does not challenge the subsistence or ownership by the
28. The popularity of the Applicants video game systems have made it a target of
making unauthorized copies of its video games or by creating means to enable users
to play such unauthorized copies of its video games on its consoles (Rhoads 1,
29. To prevent or deter these activities, the Applicant employs measures on its
video game systems to protect and control access to its copyrighted works. The
-7-
Applicants measures prevent users from playing unauthorized copies of video games
and from installing unauthorized software, including counterfeit games and software,
30. On the Nintendo DS and 3DS consoles, the Applicant uses at least three distinct
pp. 84-94):
contain the copyrighted Header Data described above, that the console
accessing and playing any Nintendo Game stored on the game card; and
31. On the Wii console, the Applicant uses at least two distinct measures to control
b. Wii Copy Protection Code: a code on Wii game discs which cannot be
32. Since at least 2013, the Respondent has advertised and offered for sale, either
through its websites or at its retail store, certain devices which the Applicant contends
are designed to circumvent TPMs employed on the Applicants Nintendo DS, 3DS,
33. The Applicant uses the term Game Copiers to refer to such devices. The
Applicant takes issue with the following models of Game Copiers sold by the
Respondent:
a. R4i 3DS
b. R4 Revolution R4DS
c. R4 Gold
d. SuperCard DSTWO
e. Sky3DS
-9-
f. Gateway 3DS
g. Acekard2i
h. CycloDS iEvolution
i. DSTTi
j. iEdge
34. A user in possession of a Game Copier can use it to play unauthorized copies of
Record, p. 93):
c. the user inserts the memory card into the Game Copier;
d. the Game Copier is inserted into the game card slot in the DS or 3DS
console;
e. when the Nintendo DS or 3DS is switched on, the Game Copier mimicks a
access the illegally copied ROM on the memory card and play the pirated
35. The Respondent also offers for sale certain devices, referred to as mod chips,
which the Applicant contends are designed to circumvent TPMs employed on the Wii
console.
36. Mod chips generally operate by modifying the firmware of the Wii consoles
disc drive or by disabling certain security routines. Mod chips are usually installed as
disassembling the console and removing components. Mod chips may also be sold in
kits along with other components such as hard drives. (Rhoads 2, Applicants Record,
p. 922-923).
37. Mod chips allow users to play unauthorized copies of Wii video games, such as
pirated copies downloaded from the internet. For example, users may download
unauthorized copies of video games from the internet onto hard drives. When these
hard drives are connected to a modded Wii console, the mod chip allows the user to
access the pirated video games without owning a genuine Wii game disc (Rhoads 2,
38. The Applicant takes issue with the following models of mod chips, kits, and
a. Wiikey 2
- 11 -
c. Wiikey Fusion
f. Solderless Wiikey2
j. DriveKey Programmer
39. In addition to selling mod chips, the Respondent also offers mod chip
installation services online and at its retail store, whereby a customer may drop off a
Wii console to be modded (i.e., installed) with a mod chip (Affidavit of Gavin
40. The Respondent actively promotes its activities through social media. These
new product shipments, and taking pre-orders for next generation devices (Hunter,
41. On its websites, the Respondent provides various descriptions of its products.
For example, it describes the Sky3DS as a device that can play 3DS ROMs on
ALL 3DS versions [] the Sky3DS card works and plays 3DS backups, and like a
42. The Respondent also provides an FAQ for the Sky3DS, providing a
compatible game list, instructions on how to build Header Data, and mentions
examples of the Applicants Nintendo Games such as Animal Crossing and Pokemon
43. In its written submissions, the Respondent asserts certain facts, such as offering
other legitimate services and the relatively small size of its business, in support of
II. Issues
44. During the course of submissions, the issues have been narrowed. The
III. Analysis
Infringement generally
Secondary infringement
46. The Supreme Court in CCH Canadian Ltd v Law Society of Upper Canada,
2004 SCC 13 [CCH] at para. 81 set out the following three-part test for establishing
secondary infringement: (1) the copy must be the product of primary infringement;
(2) the secondary infringer must have known or should have known that he or she is
dealing with a product of infringement; and (3) the secondary dealing must be
47. The Applicant contends that the Respondent infringes its copyright in the three
Header Data works contrary to s. 27(2), in that: (1) unauthorized copies of the works
are either contained on Game Copiers when they are sold or are obtained by
following the instructions provided by the Respondent; (2) the Respondent knew,
ought to have known, or was wilfully blind to the fact that the Game Copiers
contained such works; and (3) the Respondent sold, distributed, offered for sale, and
48. In support of this cause of action, the Applicant adduced evidence of testing for
three models of Game Copiers purchased from the Respondents online store (Rhoads
49. In its defence, the Respondent contends that the impugned devices are
one of the three Header Data works, namely, the DS Header Data. However, the
Respondent denies infringing the other two works, namely, the Nintendo Logo Data
File and the 3DS Header Data (Respondents Memorandum of Fact and Law, paras.
39-45).
50. With respect to the Nintendo Logo Data File, the Respondent asserts that it
does not infringe because it does not sell any devices for use with the Game Boy
51. This implies that the Nintendo Logo Data File is only used on devices sold for
the Game Boy Advance System. However, that is not supported by the evidence. The
evidence clearly establishes that an unauthorized copy of the Nintendo Logo Data
File is present on the devices sold by the Respondent for use on DS consoles (Rhoads
1, Applicants Record, pp. 85, 95). This satisfies the first element of the test for
secondary infringement.
52. The second element of the secondary infringement test may be inferred from
that the Respondent admits knowing that its Game Copiers contain unauthorized
- 16 -
know, that its Game Copiers similarly contain unauthorized copies of the Nintendo
53. As for the third element, there is no dispute that the Respondent sells Game
Copiers.
54. Accordingly, the Respondent also infringes copyright in the Nintendo Logo
55. With respect to the 3DS Header Data, the Respondent asserts that the work is
not present on the Sky3DS device when it is sold. The Applicant does not assert
otherwise. Indeed, the evidence establishes that a template file containing the 3DS
Header Data work must be downloaded from a third party website to provide the
56. Nonetheless, the evidence also shows that the third party website for
downloading the 3DS Header Data is listed on the packaging of the Sky3DS device
instructions on how to obtain the file containing the copyrighted 3DS Header Data
3(1) of the Copyright Act gives the copyright owner the sole right to produce or
reproduce the work or any substantial part thereof in any material form whatever []
- 17 -
and to authorize any such acts. In Apple Computer Inc v Mackintosh Computers Ltd
(1986), 10 CPR (3d) 1 (FCTD) [Apple FC], affd (1987), 18 CPR 129 (FCA), affd
customers with instructions on how to copy the 3DS Header Data is sufficient to meet
59. Further, by authorizing the infringing acts, it may be inferred that the
the Respondent had notice of such facts that would have led a reasonable person to
think that a breach of copyright was being committed, which is sufficient to establish
60. The Respondent does not dispute offering for sale and selling the Sky3DS
device.
61. Accordingly, the Respondent has also infringed the Applicants copyright in the
63. Parliament introduced these provisions into the Copyright Act in 2012, under
the Copyright Modernization Act, SC 2012, c 20. In over four years since their
enactment, this Court has yet to consider and apply these provisions. Under the
64. The Summary section of the Copyright Modernization Act provides that:
[Emphasis added.]
66. Contemporaneous papers authored by the Government of Canada also set out
the rationale for protecting TPMs (Government of Canada, What the New Copyright
Modernization Act Says About Digital Locks, Fact Sheet on Bill C-11, as
While the music industry has moved away from digital locks on
CDs, they continue to be used in many online music services.
Software producers, the video game industry and movie distributors
also continue to use digital locks to protect their investments.
Canadian jobs depend on their ability to make a return on their
investment. Businesses that choose to use digital locks as part of
their business models will have the protection of the law.
[Emphasis added.]
circumvention as follows:
circumvent means,
68. The Applicant relies on paragraph (a) of each definition, which relate to TPMs
used to control access to copyrighted works (access control TPMs). The definitions
under paragraphs (b), which relate to TPMs used to restrict infringing acts
(sometimes referred to as copy control TPMs), are not at issue in the present
Application, but are provided for context and assist in statutory interpretation below.
69. The prohibited acts respecting TPMs are set out in s. 41.1(1) of the Act:
Prohibition
70. The Act also provides certain exceptions to s. 41.1(1), such as s. 41.12
71. The framework of the Act therefore requires the Court to consider the following
within the definition of s. 41; (2) whether the Respondent has engaged in
exception applies.
- 23 -
72. The Applicant submits that each of its measures described above are
empower copyright owners to protect their business models with any technological
74. The Applicant also relies on the principle of technological neutrality to argue
that apart from being effective, there is no basis to discriminate against any
[Emphasis added.]
- 24 -
75. The Respondent disputes that the Physical Configuration of the Applicants
DS and 3DS game cards is a TPM within the meaning of the Act. The Respondent is
silent with respect to whether the Applicants Boot up Security Check and
Applicants Format TPM and Wii Copy Protection Code constitute TPMs, by
76. The Respondent submits that, in the context of being a protection measure, an
access control TPM must create a barrier to the work being copied. Thus, the
Respondent argues, the shape of the Applicants game cartridges fails to meet the
77. The Respondent relies on the English High Court of Justice decision in
Nintendo Co Ltd et al v Playables Ltd et al, [2010] EWHC 1932 (Ch), which was an
Patents Act 1988. The Game Copiers at issue in that case are similar to the ones at
issue in the present Application. The Respondent cites Floyd J. at para. 23:
degree which were it the only basis on which the system could be
said to have ETM, would have to go to trial.
[Emphasis added.]
78. However, the Applicant points out that although Floyd J. nurture[d] some
doubts about whether physical configuration can constitute an ETM, he held in the
summary judgment application that the question would have to go to trial. Thus, his
79. Further, the case is distinguishable because the Court applied the UK definition
of ETM, which differs from the analogous Canadian statute on TPMs. Section
296ZD of the UK Copyright Designs and Patents Act 1988, as amended, provides:
(2) Such measures are effective if the use of the work is controlled
by the copyright owner through--
[Emphasis added.]
80. It is evident from the wording and structure of the UK statute that it
other transformation of the work. Arguably, this implies that access control under
81. The Canadian Act has no such limitation. Under part (a) of the definition, a
component that, in the ordinary course of its operation, (a) controls access to a work
82. Consistent with the foregoing, the definition of circumvent for an access
control TPM extends beyond descrambling and decryption (or other similar
Parliament intended access control TPMs to extend beyond TPMs that merely serve
as barriers to copying.
83. Moreover, since part (b) of the definition for technological protection measure
covers any effective technology, device or component that, in the ordinary course of
its operation [] restricts the doing [] of any act referred to in section 3 [e.g.
84. Thus, having regard to Parliaments express intent to give copyright owners the
power to control access to works, the principle of technological neutrality, the scheme
of the Act, and the plain meaning of the definitions for TPM and circumvent, it is
- 27 -
clear that access control TPMs do not need to employ any barrier to copying in order
to be effective.
85. The remaining question is whether the physical configuration of the Applicants
game cards is an effective measure for controlling access to the Nintendo Games.
86. The evidence shows that the physical configuration of the Applicants game
cartridges, including the shape of the card and the arrangement of the electrical pins,
was designed to fit specifically into a corresponding slot on each of its consoles.
Together they operate much like a lock and key. This measure is quite effective in
87. In the normal course, a work contained on another medium with a different
Applicants consoles. A user without one of the Applicants consoles is also unable to
access a Nintendo Game on a genuine game card. It is therefore clear that the
88. Applying the same logic, the two remaining Nintendo DS and 3DS access
control TPMs, namely, Boot up Security Checks and Encryption/Scrambling, are also
particular, as noted, failure to pass the Boot up Security Checks prevents users from
accessing and playing any Nintendo Game stored on a game card. Similarly,
89. Although implicitly admitted, the Format TPM and Wii Copy Protection Code
namely, Nintendo Games for the Wii console. In particular, as noted, the Format
TPM is a unique data format designed to be used only on Nintendo Games for the
Wii console and the Wii Copy Protection Code must be present for users to access
90. Therefore, all the asserted access control measures are TPMs under s. 41 of the
Act.
91. The Applicant submits that the Respondents Game Copiers circumvent each of
the three TPMs used to control access to its Nintendo DS and 3DS games, and that by
distributing, offering, and selling the Game Copiers, the Respondent has contravened
92. For liability under s. 41.1(1)(c), the Applicant must establish that the
Respondent has committed one of the prohibited acts (e.g. selling Game Copiers,
which is not disputed) and one of the conditions (i), (ii), or (iii). Each of these
deactivate or impair the technological protection measure, unless it is done with the
authority of the copyright owner. There is a dispute only about the meaning of
circumvent.
- 29 -
93. The Respondent cites the Concise Oxford English Dictionary, 11th ed (2006),
a. Avoid: (1) to keep away or refrain from prevent from happening. (2)
it;
94. In contrast, the Applicant submits that circumvent is broadly defined and
single limitationunless the copyright owner has authorized it. Applying the
interpretive maxim expressio unius est exclusio alterius, the Applicant submits that
Parliament did not intend any further limitations under the definition.
95. The dispute over the definition arises because the Respondent argues that the
shape of its Game Copiers, which are designed to fit into the game card slot of
96. The Respondents interpretation must be rejected for the following reasons.
ignores the scheme of the Act and purpose of the prohibition against circumvention.
incompatible with circumvention. A burglar who uses an illicitly copied key to avoid
or bypass a lock to access a house is no less of a burglar than one who uses a lock
pick. Similarly, even if the Respondents Game Copiers replicate only a part of the
TPM, that does not make their use any less of a circumvention.
100. In view of the foregoing, the Respondents Game Copiers circumvent the
101. With respect to the Boot up Security Check TPM, the Respondent makes an
analogous argument: the Game Copiers merely replicate the TPM by reproducing or
102. However, applying the same reasoning as for the Physical Configuration TPM,
it is apparent that the Game Copiers also circumvent the Boot up Security Check
103. With respect to Scrambling and Encryption, the Respondent makes a limited
admission that the Game Copiers descramble or decrypt communications from the
Applicants game consoles. However, the Respondent submits that this TPM merely
provides access to the operating system of the Applicants consoles and does not act
105. First, owners of Nintendo DS and 3DS consoles already have access to the
operating system and can play authorized games using the operating system. In the
case of the Nintendo DS console, users can also access pre-installed software without
any game card inserted. Accordingly, the Respondents Game Copiers are not needed
106. Second, even if the Game Copiers provide access to the operating system, it is
irrelevant, because they also provide unauthorized access to Nintendo Games. The
evidence plainly shows that the Game Copiers permit users to play unauthorized
copies of video games that would otherwise be unplayable without these devices
(Rhoads 1, Applicants Record, p. 93). That is all that is required. The fact that the
Game Copiers may have additional functions beyond circumventing the Applicants
107. Therefore, the Respondents Game Copiers also circumvent the Applicants
109. The Respondent does not dispute that it has distributed, offered for sale, and
sold Game Copier devices. The Respondent also admits that its Game Copiers are
not commercially significant other than to circumvent the TPMs through the
Memorandum of Fact and Law, para. 82). The evidence also shows that the
Respondent knew that its Game Copiers were used by its customers to play pirated
41.1(1)(c)(ii).
111. With respect to circumvention of Wii TPMs, the Respondent admits that it
provided services to circumvent the Wii TPMs through sale and providing installation
services for mod chips. The Respondent has therefore contravened s. 41.1(1)(b),
112. The evidence also establishes that the Respondent directly circumvented the
Applicants Wii TPMs by installing a mod chip on a Wii console, thereby enabling a
user to access unauthorized copies of the Applicants video games. Therefore, the
113. The Respondent raises an affirmative defence under s. 41.12 of the Act, which
exception under the Act, it is assumed that the Respondents reference to homebrew
114. The Respondent bears the burden of establishing that it meets one of the
exceptions under the Act (CCH at para. 48). However, the Respondent adduced no
evidence in support of this defence. Instead, it relied solely on evidence from the
Applicant.
115. Subsections (1), (2), and (3) of s. 41.12 provide an interoperability exception
to each of the activities under paragraphs (a), (b), and (c) of s. 41.1(1), respectively.
116. The required elements for the defence differ slightly under each subsection. The
41.12 (1) Paragraph 41.1(1)(a) does not apply to a person who owns
a computer program or a copy of one, or has a licence to use the
program or copy, and who circumvents a technological protection
measure that protects that program or copy for the sole purpose of
obtaining information that would allow the person to make the
program and any other computer program interoperable.
Services
so for the purpose of making the computer program and any other
computer program interoperable.
117. In support of its defence, the Respondent makes much of the potential
designed for use on the Applicants consoles, but which are not necessarily owned or
118. The Respondent relies heavily on a report submitted by the Applicant regarding
the relative prevalence of illicit software (e.g. pirated video games) versus
The Respondents position appears to be that its sale of circumvention devices and
installation services are for the purpose of making the Applicants game consoles
120. First, the Applicants evidence establishes that the primary purpose of the
121. Second, although homebrew software may be available on the internet and
users of the Respondents devices could theoretically be using them for homebrew,
the scale of such activities is dwarfed by the market for illicit and infringing activities
(Applicants Record, pp. 157-158, 294). Indeed, most of the websites purporting to
make homebrew software available also offer (in far greater quantities) unauthorized
122. Third, the Respondents own website belies its submission. The only mention
Respondent is in no position to show that its products and services were for this
123. Fourth, the Applicants evidence establishes that there are legitimate paths for
124. Fifth, the Respondent failed to adduce any evidence that any users actually did
use their services or devices for the purpose of making the Applicants consoles
125. In view of the foregoing, the Respondent has not met its burden of establishing
C. Remedies
126. The Applicant has elected to recover statutory damages for both copyright
127. The parties differ over the manner in which statutory damages ought to be
128. The following issues must be decided: (1) in respect of TPM circumvention,
whether statutory damages are calculated per TPM circumvented or per work
that the circumvention grants unauthorized access to; (2) whether the Respondent has
demonstrated a special case for limiting statutory damages; and (3) the amount of
129. The relevant statutory provisions of the Act are ss. 38.1(1)(a), 38.1(3), 41.1(2),
and 41.1(4).
130. The availability and range of statutory damages for commercial activities is
Statutory damages
38.1 (1) Subject to this section, a copyright owner may elect, at any
time before final judgment is rendered, to recover, instead of
- 37 -
(a) in a sum of not less than $500 and not more than $20,000
that the court considers just, with respect to all infringements
involved in the proceedings for each work or other subject-
matter, if the infringements are for commercial purposes [].
Special case
(a) either
[]
- 38 -
[Emphasis added.]
133. The Applicant contends that statutory damages for TPM circumvention ought
damages. Using the per-work approach, the Applicant seeks a range of statutory
Nintendo Games, based on a statutorily mandated range between $500 and $20,000
per work.
134. In contrast, the Respondent argues there should be no statutory damages for
copyright infringement has been proven for the Nintendo Games. In support of its
position, the Applicant repeats that the TPM circumvention provided access to the
135. In the alternative, the Respondent submits that damages should be calculated
paras. 94-103).
136. The Applicants approach should be adopted for the following reasons.
137. First, actual infringement of copyright is not necessary for an award of statutory
damages for TPM circumvention. This proposition is self-evident from the scheme of
the statute. Subsection 41.1(4) provides that the copyright owner is entitled to all
that actual circumvention is not required. It logically follows that actual access or
copying of a copyrighted work is also not required. Moreover, s. 41.1 does not limit
necessary element for recovering damages, it easily could have done so as it did in s.
138. Second, a work-based award is more harmonious with the wording of the Act.
Subsection 41.1(4) provides that the owner of the copyright in a work is entitled to
all remedies. If the owner of a single work may claim all remedies for infringement of
that one work, it follows that the owner of multiple works is entitled to a separate
remedy for each infringed work. This is also consistent with the wording in s. 38.1(1),
which provides remedies for infringement of each work or other subject matter.
- 40 -
139. Third, the economic reality of copyright vis--vis TPM circumvention favours a
driven by the value of the works to which access is illicitly gained. A robber breaks a
lock because of the value behind the lock, not because of the value of the lock(s). If
the Applicant had not invested millions of dollars to create a library of valuable video
games, the Respondent would have no market for its circumvention devices.
investments made by the creative industry. In order to be effective, those legal tools
must reflect the value of the works protected and act as a deterrent to the
In effect, a TPM-based award would become a fixed cost of business for trafficking
the most popular and valuable copyright libraries. That could not have been
Parliaments intention.
141. In the circumstances, the Applicant is entitled to a statutory damage award for
each of the 585 Nintendo Games to which the Respondents circumvention devices
142. The Applicant is also entitled to statutory damages for each of the 3 Header
143. The next question is whether the Respondent has established a special case for
144. Under s. 38.1(1) of the Act, the usual range of statutory remedies for copyright
145. The Respondent does not dispute that its activities are commercial, but cites s.
38.1(3) in support of its argument that an award of statutory damages can be below
146. As in any other affirmative defence in the Act, the Respondent bears the burden
of proving that the exception applies. Subsection 38.1(3) has two required elements.
147. For the following reasons, the Respondent does not establish either.
148. As for the first element, paragraph 38.1(3)(a) requires there to be more than
one work in a single medium. This may apply, for example, to newspapers or
anthologies, where multiple copyrights may exist in a single copied medium. This
does not apply here, as the Applicant asserts only a single copyright in respect of each
149. As for the second element, paragraph 38.1(3)(b) requires the Respondent to
establish that the total award would be grossly out of proportion to the
infringement. To assess proportionality, the Court would need evidence of, inter
- 42 -
alia, the Respondents revenues and profits. If any such evidence existed, it would
plainly have been within the Respondents power to adduce. It did not do so. In the
circumstances, it is reasonable to infer that such evidence either did not exist or
150. Conversely, the Applicant adduced evidence that each video game can take
years and millions of dollars to develop, and that there are 585 copyrighted Nintendo
Games at issue.
151. In view of the foregoing, s. 38.1(3) does not apply. Accordingly, the range of
152. The final step is to determine the measure of statutory damages to be applied to
each work. The Applicant seeks the maximum statutory damage of $20,000 for each
work, while the Respondent submits, based on its one admitted act of copyright
153. Subsection 38.1(5) of the Act provides factors that the Court shall consider in
b. the conduct of the parties before and during the proceedings; and
154. The Applicant has adduced evidence showing that: the Respondent was aware
of the anti-circumvention provisions under the Act and the Applicants efforts to
control unauthorized access to its video games; the Respondent warned customers
they may be banned from the Applicants network for using circumvention devices;
and the Respondent advised customers how to use the devices with certain pirated
video games and how to avoid detection (Applicants Record, pp. 1186-1190, 1201-
1202).
155. The Applicant has also adduced evidence showing that the Respondent deals in
other purported circumvention devices for other platforms and appears to have close
of an industrial scale operation. Indeed, the Respondents websites and social media
promote it as the #1 Modchip Store. There is also evidence that the Respondent is
taking pre-orders for circumvention devices designed for the next generation of the
evidence, this is a bare assertion. There is simply no support for the Respondents
157. The Respondent also submits that the Applicant did not provide it with the
opportunity to cease and desist its activities, and that it has admitted its
wrongdoing.
- 44 -
158. This Court has previously taken a dim view of infringers who attempt to shift
159. Moreover, as of the hearing of this Application, the Respondent had still
adduced no evidence to show that it had ceased its activitiesmore than eight
months after it was served with the Notice of Application. Accordingly, there is no
evidence that a cease and desist letter would have done anything to deter the
160. Finally, the Respondents admission, limited to damages for one act of
161. The evidence is sufficient to establish bad faith and misconduct on the part of
162. The need for deterrence further reinforces that a maximum award of $20,000
163. Damages should be significant enough to deter others who may wish to engage
in similar illicit activities and also to deter the Respondent from resuming such
activities.
164. In respect of the general need for deterrence, Parliament has clearly indicated
specifically the video game industry. TPMs are important tools to protect these
they provide access to entire libraries of copyrighted works while profiting from
others investments.
165. In respect of the specific need to deter the Respondent, there is evidence of
recidivism by the Respondents director Mr. King, who has been involved in similar
activities in the past (Applicants Record, pp. 1203-1205). The Respondents business
circumvention devices for other platforms (Applicants Record, pp. 1193-1198). All
166. In view of the foregoing factors, an award of $20,000 per work is reasonable
and justified. This Court has not previously hesitated to award maximum statutory
(Canada) Inc, 2011 FC 776 at paras 156-158; Microsoft Corp v 9038-3746 Quebec
Inc, 2006 FC 1509 at paras. 112-113; Louis Vuitton Malletiers SA v Yang, 2007 FC
1179 at paras. 18-26; Adobe et al v Thompson, 2012 FC 1219 at paras. 5-8; Twentieth
Century Fox Film Corp v Hernandez, 2013 CarswellNat 6160 (FC) at p. 3). This is
such a case.
TPM circumvention in respect of its 585 Nintendo Games, and of $60,000 for
169. Section 38.1(7) of the Act provides that punitive damages may be awarded even
deterrence, and denunciation (Whiten v Pilot Insurance Co, 2002 SCC 18 at para
Systems Inc v Thompson, 2012 FC 1219, this Court set out certain factors relevant for
171. In this case, the Respondent has shown callous disregard for the Applicants
rights. It is clear from the evidence that the Respondent knowingly and deliberately
sold circumvention devices, and promoted such activities to its customers. Its
- 47 -
activities have gone on for years, and it offers a wide range of circumvention
name. The evidence further suggests the Respondent intends to expand its activities,
to market and sell TPM circumvention devices for the Applicants next generation of
172. The Respondents admissions of wrongdoing are of limited value, since they
are calculated to limit liability rather than address the full nature and extent of its
173. Further, the fact that the Applicant did not issue a cease-and-desist letter to the
no evidence that doing so would have made any difference. Given the nature of the
$1,000,000 is warranted in this case in view of the strong need to deter and denounce
such activities. Such an award is also consistent with the scale of penalties available
175. An injunction is the normal remedy for infringement of copyright. Here, the
Applicant also seeks a wide injunction under s. 39.1(1) of the Act to prohibit the
Respondent from infringing copyright in any other work owned by the Applicant and
from trafficking in any circumvention devices that circumvent the Applicants TPMs.
176. The Applicant has satisfied the burden of showing that the Respondent is likely
177. Thus, the Respondent should be enjoined from infringing any of the
(iv) Delivery up
(v) Costs
179. The Applicant sought elevated costs on the basis that this Application has taken
a significant amount of time, effort, and expense, has been relatively complex in view
of the novelty of the issues raised, the extensive investigative effort required to
uncover the Respondents activities, and to ensure that copyright owners can
effectively seek similar remedies by having costs reflect the reality of intellectual
property enforcement.
- 49 -
180. The Applicant also no longer seeks solicitor-client costs, and takes no issue
181. Given the foregoing, elevated costs under Column V of Tariff B are warranted.
182. In view of the foregoing, the Applicant seeks an order in the form attached as
Schedule A.
_________________________
SMART & BIGGAR
Barristers & Solicitors
1100-150 York Street,
Toronto, ON M5H 3S5
Mark G. Biernacki
Kevin P. Siu
Scott Miller
Jahangir Valiani
Date: 201612__
Docket: T-245-16
BETWEEN:
NINTENDO OF AMERICA INC.
Applicant
and
Respondents
JUDGMENT
SEQUENCE; and
3. The Applicant Nintendo of America Inc. is the owner of copyright in the Nintendo
4. The Respondent, Go Cyber Shopping (2005) Ltd., has infringed the Applicants
5. The Respondent, Go Cyber Shopping (2005) Ltd., has circumvented, offered services to
the public and provided services to circumvent, distributed, offered for sale, and provided
6. The Respondent, Go Cyber Shopping (2005) Ltd., including its officers, directors,
servants, employees, workers, agents, or any other persons under its direction, power, or
for sale or rental, or exhibit in public; possessing for the purpose of selling,
substantial parts thereof or any goods containing said works or substantial parts
thereof;
7. The Respondent, Go Cyber Shopping (2005) Ltd., shall deliver up for destruction, all
possession or control or that may have come into their possession or control that offend
8. The Respondent, Go Cyber Shopping (2005) Ltd., shall pay forthwith to the Applicant,
Justice Act, RSO 1990, c C-43, on the award of statutory damages calculated from
Justice Act, RSO 1990, c C-43, on the award of statutory damages calculated from
Judge