blog post

Federal Judge Rules AI-Generated Art Can’t Be Copyrighted

In her ruling, DC District Court Judge Beryl A. Howell says that human beings are an “essential part of a valid copyright claim.” This is the latest in a series of court cases seeking to determine if original material generated by AI can be copyrighted under existing law.

The ruling came out last Friday, and the judge was quite clear AI content couldn’t be copyrighted. This case involved a lawsuit against the US Copyright Office after it refused to copyright a work by a person named Stephen Thaler.

In it, Thaler created an AI-generated image with the Creativity Machine algorithm he’d created and sought to copyright the work. So how did Mr. Thaler look to get his AI-generated image copyrighted? Well, according to the case, the image was filed in the copyright process “as a work for hire to the owner of the Creativity Machine.” This would have listed the author as the creator of the work, and Thaler as the artwork’s owner.

But the US Copyright Office flatly rejected the claim multiple times, so Thaler filed suit after the office sent its final rejection last year. With the suit, Thaler claimed that denial of his AI-generated work was “arbitrary, capricious … and not in accordance with the law.”

According to last week’s ruling, the judge didn’t’ share Thaler’s view. In the decision, Judge Howell wrote that copyright has yet to be granted with the “absent of any guiding human hand.” She went on to add that “human authorship is a bedrock requirement of copyright.”

To come to her decision, Judge Howell pointed to a case that saw a woman compile a book from notebooks that she’d filled with “words she believed were dictated to her” by some kind of supernatural “voice.” And that the work itself was worthy of copyright.

Though, the decision wasn’t all doom for creators who use AI to create content. In the ruling, the judge also acknowledged that due to AI, humanity was “approaching new frontiers in copyright,” as more and more artists utilize the technology to create original work.

In the decision, she also went on to write that this would, in the short term, create “challenging questions regarding how much human input is necessary” to copyright AI-created art. She noted that AI models are often trained on pre-existing work which could complicate matters legally.

 

According to Bloomberg Law, Stephen Thaler will seek to appeal his case, and his attorney, Ryan Abbot of Brown Neri Smith & Khan LLP, said, “We respectfully disagree with the court’s interpretation of the Copyright Act.”

With this case and many others, it’s clear that the law is still quite behind in terms of how to react to AI. Earlier this year, a U.S. House Rep out of Massachusetts used ChatGPT to generate a speech to bring attention to the need for Congress to get head-on AI regulation.

The Biden Administration seems to be working on this issue as well in two ways. Directing federal agencies to determine how they could use existing laws to create rules surrounding AI. They also released a road map for AI governance as well.

While I applaud these attempts at clarity, I believe the issue is unresolvable. The facts are that whether sentient or not, machines can produce creative work that is original and was conceived in exactly the same ways humans do when developing new content.

Machines rely on a complex large language model, and a set of algorithms that train them to assume next words or phrasings following preceding words or phrasings, just the way humans do when composing thoughts, pictures or using technology to create art.

The Copyright Act of 1976 was adopted by Congress to avoid having constantly to amend copyright laws to account for the development of new technologies and means of expression, such as still photography, motion pictures, or recordings.

A key principle of copyright law is fair use, which permits limited use of content protected by copyright without permission. Copyright infringement does have some exceptions though, such as fair use.

For specific purposes, such as criticism, commentary, news reporting, or research, fair use permits the use of copyrighted content. It is not always apparent, nevertheless, whether a specific use of copyrighted content falls under the fair use doctrine because it is complicated and fact-specific. Fair use analysis in the context of AI, however, presents fresh difficulties. Large datasets, which frequently include copyrighted works, are used by AI algorithms to train and hone their skills.

Meta’s ChatGPT language model is trained on a sizable text and code dataset. Books, essays, and short stories with copyrights are all included in this dataset. According to Meta, the usage of this copyrighted material by Meta is permissible. However, some authors and publishers have filed lawsuits against Meta, claiming that the usage of their intellectual content by the company violates those rights as stated in the above paragraphs.

The future and development of copyright law depend on what result this litigation brings out. Using copyrighted content to train AI language models will become increasingly common if the courts decide that Meta’s use of it constitutes fair use. The potential copyright infringement could increase as a result, but it could also lead to new and creative applications of AI.

My bet is that the next iteration of the Copyright Act of 1976 will contain no protection for “original” work, because it will be impossible for courts to determine the constitution of original work. As Pablo Picasso famously said, “Good artists copy, great artists steal.”

To which Steve Jobs doubled down by stealing the concept of the Macintosh computer from a similar device that was shown to him at Xerox’s Palo Alto Research Center. Throughout history, great artists, writers and scientists have always confessed that as Hemingway said, ““It would take a day to list everyone I borrowed ideas from, and it was no new thing for me to learn from everyone I could, living or dead. I learn as much from painters about how to write as I do from writers.”

Conclusion? Stop it.

Let AI do what it does, as soon, it will be far more capable than you or I and those “victims” who suffer from our inability to assign attribution to them for their contribution to a particular story or art piece, my advice would be, go create something so magical that in spite of yourself, you will be bound to be remembered for it. Because I know it’s not about the money, it’s about the recognition. And if it is truly great, it will stand the test of time and history.

Author

Steve King

Managing Director, CyberEd

King, an experienced cybersecurity professional, has served in senior leadership roles in technology development for the past 20 years. He has founded nine startups, including Endymion Systems and seeCommerce. He has held leadership roles in marketing and product development, operating as CEO, CTO and CISO for several startups, including Netswitch Technology Management. He also served as CIO for Memorex and was the co-founder of the Cambridge Systems Group.

 

Schedule a Demo with Us!

Fill in the form and we’ll get back to you as soon as possible.

Closing The Education Gap In The Cybersecurity Industry

Our latest resources and blog posts help you stay in touch with what’s happening in the industry. Want even more updates? Sign up for our newsletter!

Learn more about our Course Catalog

Learn more about Masterclasses

Start Your 7-Day FREE Trial!

No Credit Card Needed!

"The Perfect Storm" A Cyber Readiness Tabletop Exercise

"The Perfect Storm" is an immersive thought exercise designed to test and enhance your financial institution's cybersecurity resilience. This exclusive CyberEd.io course simulates a complex and multi-layered cybersecurity attack, challenging participants to respond, communicate, and recover under extreme conditions. Through a series of escalating scenarios, from phishing attacks to DDoS assaults, ransomware infections, and public data leaks, participants will develop critical skills and strategies necessary to safeguard their organization against relentless cyber threats.

Ransomware Defense

This ransomware course is designed for technical defenders. Explore the methods used by bad actors to install ransomware, analyze the latest ransomware variants, identify key ransomware groups, detect early indicators of possible attacks, apply containment, eradication, and recovery best practices, then get other practical tips to establish and maintain comprehensive disaster recovery plans. This course emphasizes practical, actionable steps to defend against ransomware.

Malware Escape!

This thrilling malware attack simulation escape room, encourages tech-teams to work together to thwart common malware attacks, like the one two punch of a botnets releasing ransomware, for example. We don't want to spoil the plot. It's up to your tech team to figure it out!

FFIEC Cybersecurity Assessment Tool Quick Start

This technical guidance course explores the Federal Financial Institutions Examination Council's Cybersecurity Assessment Tool, also known as the FFIEC CAT (pronounced “cat”). This tool is designed to help financial institutions identify their cybersecurity risks and determine their preparedness. In this course, we’ll provide a high-level overview of the CAT, its components, and how it can benefit your institution. Kick off your FFIEC CAT journey today!

Combatting Social Engineering and Insider Threats

Combatting Social Engineering and Insider Threats provides a technical understanding of how social engineering and insider threats effect organizations. The course emphasizes various social engineering tactics, how to recognize and mitigate social engineering threats, the correlation between social engineering and insider threats, and then also practical, actionable steps to enhance the overall security posture of your organization.

Building Secure Architectures for ICS and OT Environments

This course is designed for industrial and critical infrastructure technical leaders and technical professionals responsible for designing secure architectures for ICS and OT environments. Explore communication protocols, securing the process control network, and the Purdue Network Model. Then learn how to implement firewalls, IDS, IPS, other Appliances and access management techniques. Build more secure cybersecurity architectures today!

AI, Machine Learning,
and Cybersecurity

Explore the intersection of AI and cybersecurity in this comprehensive course designed for learners at all levels. Dive into the fundamentals of artificial intelligence and machine learning to understand their applications in combating cyber threats. Learn about ethical considerations and future trends, equipping yourself with the knowledge to navigate and contribute to the evolving landscape of digital security. This course is your pathway to mastering AI-enhanced cybersecurity strategies.

Learn more about
CPE Credits

The Open Web Application Security Project (OWASP)

This fundamental course explores the Open Web Application Security Project (OWASP) and a publication released by the OWASP foundation, called The OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips! Start your Open Web Application Security journey today! 

Learn more about SmartHRM™ Software

Learn more about SmartHRM™ Solution

Learn more about
Custom Content

Blockchain and Cybersecurity

This course is designed specifically for leaders and technicians who need to expand their knowledge in blockchain technology. We explore blockchain's impact, specifically highlighting cybersecurity concerns. We cover foundational concepts such as decentralization, transparency, and immutability, as well as practical applications in regulatory compliance, auditing, and security. Explore types of blockchains—public, private, and consortium—and learn how they are used. Blockchain is here! Prepare today!

The NIST Cybersecurity Framework

This fundamental course delves into the National Institute of Standards and Technology Cybersecurity Framework, or the NIST Cybersecurity Framework, also known as CSF for short. The CSF is a set of best practices and recommendations for organizations to help manage cybersecurity risk. Learn all about the CSF structure, purpose, application across various sectors and how utilizing the CSF Framework can enhance an organization’s security posture.

Payment Card Industry
Data Security Standards (PCI DSS) Compliance

In today's world, data is the lifeblood of organizations, so protecting that data, through various forms of cybersecurity compliance, has become paramount. Payment Card Industry Data Security Standards (PCI DSS) Compliance provides IT professionals with a granular understanding of the requirements and best practices needed to ensure payment card data security compliance as well as links to even more detailed related resources. Learn about payment card industry data security standard compliance today!

Federal Deposit Insurance Corporation (FDIC) Laws and Regulations

This course provides a deep dive into the key cybersecurity laws and regulations that FDIC-supervised institutions must adhere to. With a blend of technical insights and practical guidance, participants will learn to navigate the complex regulatory landscape, implement robust cybersecurity measures, and ensure compliance with FDIC requirements. Make sure your institution stays compliant. Brush up on FDIC Laws and Regulations today!

Certified Information Systems Security Professional (CISSP) Prep Path

The CISSP certification is recognized as the gold standard for IT security professionals. This prep path, spanning 39.75 hours, equips security professionals with in-depth knowledge of advanced security management. Achieving CISSP certification validates expertise in designing, implementing, and managing a best-in-class cybersecurity program​​.

CompTIA Security+ Certification Prep Path

This learning path builds on foundational networking skills to prepare learners for the CompTIA Security+ certification exam, one of the most sought-after entry-level cybersecurity certifications. Through a comprehensive 28.75-hour program, participants will cover essential information security principles across six key exam objectives, including threats, vulnerabilities, cryptography, and risk management.

Artificial Intelligence and Public Policy

With rapid advancements in AI technology, there is an urgent need to establish guidelines and guardrails for safe use and adoption. To address this need, the United States government - in collaboration with multiple private sector organizations - passed the bipartisan Senate Bill 5838 to establish the Congressional AI Task Force. In this CyberEd Session, Bob Ferguson, State of Washington Attorney General, will outline the objectives and structure of the task force, designed to assess the implications of AI technologies and propose informed legislative recommendations.

Learn more about SmartHRM™ Training

Intro to the
Gramm-Leach-Bliley Act

Intro to Gramm-Leach-Bliley Act is tailored specifically for financial sector business professionals who must understand the importance of Gramm-Leach-Bliley Act (GLBA) compliance and its impact on financial sector organizations. Learn how the Gramm-Leach-Bliley Act requires financial institutions to explain information-sharing practices and safeguard sensitive data.

Leading Financial Supply Chain Cybersecurity Teams

Third-party vendors play an essential role in all financial sector operations and supply chains, from payment processors to IT service providers. However, these relationships also introduce potential risks that can threaten the security and integrity of our data and systems. This executive-level course for financial sector business leaders highlights high level strategies all finance leaders need to know about managing third-party vendors and cybersecurity initiatives. Expand your third party vendor and supply chain cybersecurity leadership skills and drive better business impact, for your business today!

National Credit Union Administration (NCUA) Cybersecurity Compliance

National Credit Union Administration Cybersecurity Compliance provides an in-depth exploration of the National Credit Union Administration's cybersecurity regulations and best practices. Participants will learn to identify potential cyber threats, implement robust security measures, ensure compliance with NCUA guidelines, and understand the important role leadership support plays in establishing a strong cybersecurity posture.

Combatting Social Engineering and Insider Threats

Combatting Social Engineering and Insider Threats provides a technical understanding of how social engineering and insider threats effect financial service organizations. The course emphasizes various social engineering tactics, how to recognize and mitigate social engineering threats, the correlation between social engineering and insider threats, and then also practical, actionable steps to enhance the overall security posture of your financial service organization.

Learn more about our team-based solutions!

Masterclass with Kelly Hood

Kelly Hood, a cybersecurity engineer with Optic Cyber Solutions, talks about the NIST cybersecurity framework in this Masterclass, diving into implementation tiers, and framework profiles. Learn how to integrate regulatory requirements into your cybersecurity program today!

Masterclass with Andy Jenkinson

In this Masterclass Cybersec Innovation Partners founder Andy Jenkinson delves into a history of some real-life case studies and significant events which led to our current understanding of Domain Name Systems (DNS). Explore how DNS are misunderstood, how they’re vulnerable and how they can be manipulated by bad actors.

Masterclass with Lynn Peachey

Ransomware attacks are always increasing and we have seen ransomware hit some of the largest organizations and most critical industries, including Colonial Pipeline, for example. Join Lynn Peachey, Director of Business Development at Arete Incident Response, in a cybersecurity insurance focused Masterclass.

Masterclass with Richard Bird

Unravel the complexities of API Cybersecurity in Richard Bird’s API Security Masterclass. While APIs diversify capabilities and services, they simultaneously expand the attack surface for cyber threats. Arm yourself with knowledge and strategies to defend against API threats.

Masterclass with Dr. Nikki Robinson

Explore vulnerability cognition and the future of vulnerability management in this in depth discussion of current challenges in vulnerability management, modern vulnerability management practices, building a vulnerability management program (VMP) and even the psychology of vulnerability management.

Get In Touch!

Leave your details and we will get back to you.