Baker & McKenzie Presentation (E2.0)


Published on

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Baker & McKenzie Presentation (E2.0)

  1. 1. Legal Issues Web 2.0 / User Generated Content Identifying and minimising key legal risks Enterprise 2.0 - Wednesday 13 August 2008 Allison Manvell, Baker & McKenzie, Sydney
  2. 2. Overview <ul><li>Key differences to other online publications </li></ul><ul><li>Main areas of risk: </li></ul><ul><ul><li>Potential protection from liability - intermediaries? </li></ul></ul><ul><ul><li>Practical steps to mitigate risk </li></ul></ul>Privacy UGC: potential content problems - copyright, defamation, illegal content, trade marks, misleading and deceptive conduct, contempt, obscenity, privacy
  3. 3. Key differences <ul><li>Publication mechanism </li></ul><ul><li>Jurisdiction </li></ul>Control of content - User Generated Content
  4. 4. A. Identify key risks B. Identify (and allocate) responsibility Protection for intermediaries? “Safe Harbour”? “Innocent dissemination”?
  5. 5. <ul><li>Terms of Use </li></ul><ul><li>Disclaiming responsibility? Accepting responsibility? </li></ul><ul><li>Ownership of content </li></ul><ul><li>Monitoring? </li></ul><ul><li>Education / awareness </li></ul>C. Practical steps to mitigate risk
  6. 6. 1) Privacy <ul><li>Privacy Act 1988 (Cth) regulates organisations’ dealings with personal information </li></ul><ul><li>Limited exceptions, for example: </li></ul><ul><ul><li>employee records </li></ul></ul><ul><ul><li>media </li></ul></ul><ul><ul><li>small business </li></ul></ul><ul><li>NPPs </li></ul><ul><li>Enforcement </li></ul>
  7. 7. 1) Privacy <ul><li>Hot Topic: </li></ul><ul><ul><li>Draft Voluntary Information Security Breach Notification Guide </li></ul></ul><ul><ul><li>ALRC review of Australian Privacy Law </li></ul></ul><ul><ul><li>NSW Review </li></ul></ul><ul><li>Consider other relevant areas – eg Workplace Surveillance </li></ul>
  8. 8. 2) Copyright <ul><li>Ownership of uploaded content </li></ul><ul><li>Direct copyright infringement </li></ul><ul><li>Authorisation of copyright infringement </li></ul><ul><li>Applicability of “safe harbour” provisions (Part V, Division 2AA of the Copyright Act 1968 (Cth)) </li></ul><ul><li>Carriage service providers / ISPs - not content providers </li></ul>
  9. 9. 3) Defamation <ul><li>Each person who contributes to publication of defamatory material, or authorises it, is potentially liable for its publication </li></ul><ul><li>Innocent dissemination - s32 Defamation Act 2005 (NSW) </li></ul><ul><ul><li>Defendant published the material in capacity as subordinate distributor </li></ul></ul><ul><ul><li>Defendant did not know, nor ought reasonably have known, that the material was defamatory </li></ul></ul><ul><ul><li>Lack of knowledge not due to negligence </li></ul></ul>
  10. 10. <ul><li>Subordinate distributor: </li></ul><ul><ul><li>Not the “first or primary distributor” </li></ul></ul><ul><ul><li>Not the author or originator </li></ul></ul><ul><ul><li>Did not have capacity to exercise editorial control over the content or its publication, before it was first published </li></ul></ul><ul><li>Effective control </li></ul><ul><li>Generally strict application by courts in “traditional” media scenario </li></ul>3) Defamation
  11. 11. 4) “Content” regulation / Classification <ul><li>Broadcasting Services Act 1992 (Cth) - Schedule 7: Content Services </li></ul><ul><li>Exceptions? </li></ul><ul><li>Commercial content service? </li></ul><ul><li>Dealing with complaints / enforcement </li></ul><ul><li>IIA Code </li></ul>
  12. 12. 5) Other risks <ul><li>Obscenity / offensive material </li></ul><ul><li>Trade Marks </li></ul><ul><li>Illegal material </li></ul><ul><li>Misleading and deceptive conduct </li></ul><ul><li>Contempt </li></ul>
  13. 13. Risk management <ul><li>Know your service / identify particular content risks </li></ul><ul><li>Appropriately contract with suppliers </li></ul><ul><li>Have your own terms dealing with what end users can and cannot do with content and giving you the right (not the obligation) to remove content and take appropriate action </li></ul><ul><li>Prohibit upload of illegal/infringing content & obtain warranties from end users </li></ul>
  14. 14. Risk management <ul><li>Ownership of content? </li></ul><ul><li>Limiting availability / quantity of content available publicly </li></ul><ul><li>Segregation of content </li></ul><ul><li>Education </li></ul><ul><li>Stay on top of new developments </li></ul>
  15. 15. For further information <ul><li>Adrian Lawrence </li></ul><ul><li>Ph: +61 2 8922 5204 </li></ul><ul><li>E: </li></ul><ul><li>Allison Manvell </li></ul><ul><li>Ph: +61 2 8922 5251 </li></ul><ul><li>E: </li></ul>? ? ?