example, if your program is distributed in the case of network server or other defenses to infringement that may otherwise be available to the extent