SlideShare a Scribd company logo
Chile’s Law 20,435 on Intellectual Property


Implications Abroad for Chile’s Internet Service
          Provider Liability Limitations


                A Policy Analysis for
   The Government of Chile, Ministry of Foreign Affairs

                      Conducted by:
                     Z’leste Wanner
     Advisor on International Communications Policy
               zleste.wanner@gmail.com
Objective

 Analyze Chapter III, Articles 85L-U on ISP Liability

 Identify Strengths and Weaknesses

 Discuss Conflict with US re US-Chile FTA

 Propose Recommendations

 Discuss Implications for International Relations
Importance of ISP Liability Provision

 Rampant piracy in Chile – facilitated through ISPs
    400 million songs downloaded illegally annually
    Chile 18th in world in terms of P2P unauthorized file sharing

 ISPs can cooperate in fight against piracy

 ISP liability provision a requirement of the US-Chile FTA
Chapter III, Articles 85L-U
2 Fundamental Principles of Policy:

1. ISPs should cooperate in the fight against digital piracy, the policy
   defines legal mechanisms requiring them to do so, (eg block or
   takedown infringing content upon notification of its existence

2. ISPs should not be directly liable for what users do (eg upload
   or download music illegally) if they meet certain conditions
   established according to the nature of the service provided by the
   ISP (ie providers of access, host or reference sites on the Internet)
Distinguishing Feature: Article Ñ
ISP not liable if removes content upon becoming “aware” of it

ISP “aware” upon receipt of court notification

         “The service provider shall be deemed to have actual knowledge when
a competent court of justice, in conformity with the procedure set forth in Article 85
Q, has ordered that the data be removed or access to it be disabled and the
service provider, legally served, does not comply expeditiously with such order.”

                                                         (Ley Núm. 20.435, Article Ñ)

Foundation: Chilean Constitution protection of individual rights to due process

ISPs cannot block unilaterally under its own judgment without judicial review
Distinguishing Feature: Article Q
Notice + Notice - Chile                      Notice and Takedown – US

Rights holder informs court of copyright     Rights holder sends notice to ISP of
infringement                                 copyright infringement

Court reviews case and sends                 ISP complies, takes down infringing
notification to ISP                          content

ISP notifies user within 5 working days      User can counter-notice alleged
                                             infringement, and if ruled in favor, ISP
Can counter-petition the claim               must restore content in 2 weeks

Benefit: Petition for takedown more likely   Problem: Incentive for ISP to take down
to be substantiated and accurate, less       faster, more work for ISP, censorship
work for ISP, censorship less likely         more likely
Strengths                               Weaknesses
 protection of individual expression by      dependency on the courts makes
  limiting rights holders and ISPs from        process slow and less efficient
  regulating or censoring internet users
                                              limited incentive for ISPs to
 well balanced: rights of rights holders,     cooperate with takedowns or
                                               pass along notifications
  ISPs, internet users
                                              burden on copyright holders to
 explicit limitation of ISP from actively     involve courts, requires financial
  patrolling its users, ensuring greater       resources
  privacy protection and less disruption
  to internet, ISPs                           creators do not feel the system
                                               adequately protects their
 judicial review component keeps Chile        interests, time lost through
  in compliance with its commitments to        judicial review results in
  its Constitution and the ACHR related        significant losses in illegal
                                               downloads where large quantity
  to individual rights and rights to due       can be pirated in a very short
  process                                      amount of time
US Critique of Chile’s ISP Policy
 Priority Watch List for failure to comply with FTA

 IIPA: Chile’s policy on ISP liability, “notice plus notice” architecture is
  “ineffective”
    does not act a deterrent because there is no threat of real consequences if
     the ISP does not comply with forwarding the notice
    inadequate for dealing with P2P file sharing
    “actual knowledge” is dependent on a court order and does not establish
     voluntary cooperation between rights holders and ISPs

 IIPA: Chile’s policy is too lenient on ISPs and users and does not
  establish an effective system to fight piracy
Recommendations
 Retain provision of judicial review prior to notification of copyright infringement
  must be retained in the policy
    Maintain protections guaranteed by Constitution related to individual rights & due process
    Lead the way for other Latin American countries that will adopt ISP liability provisions and
     subject to the same constraints of the American Convention on Human RIghts

 Create stronger legal incentives or penalties for ISPs to comply with the
  infringement notification requirement
    Elect a body to be charged with enforcing compliance with sending notices, such as the
     Department of Intellectual Property Rights
    incentivize ISPs to participate and ensure a faster, more efficient process

 Execute stronger enforcement of Intellectual Property Rights

 Increase education about intellectual property protection among the population
Implications for Foreign Relations

 Consequence:
    Souring relations with the US
    Continued presence on Priority Watch List
    Potential reputation as bad trading partner

 Opportunities:
    International leader in ISP liability regulation
    More flexible IP regime facilitates trade relations with other countries
     with different regimes
    Stance in Trans Pacific Partnership trade agreement negotiations,
     which would include a significantly more stringent chapter on ISP
     liability provisions

More Related Content

What's hot

Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
MarkFredderickAbejo
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
Himanshu Jawa
 
E commerce law
E commerce lawE commerce law
E commerce law
dyan ubales
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
Abraham Vergis
 
Contract for the web
Contract for the webContract for the web
Contract for the web
Massa Critica
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
Jonan Momo
 
Academic letter re changes in surveillance law
Academic letter re changes in surveillance lawAcademic letter re changes in surveillance law
Academic letter re changes in surveillance law
Andrew Murray
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky
 
Mobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael HanleyMobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael Hanley
Sara Quinn
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider Liability
Andres Guadamuz
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
JulainaMehraj
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2
Kenny Boddye
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
Aldrin SuperGo
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
Geritt Contillo
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
Alison - Free Online Learning
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
Shahid Jamal Tubrazy
 
Understanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange AgreementsUnderstanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange Agreements
DoubleHorn
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
aleenia23
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
Gautam GR
 

What's hot (20)

Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
E commerce law
E commerce lawE commerce law
E commerce law
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
Contract for the web
Contract for the webContract for the web
Contract for the web
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Academic letter re changes in surveillance law
Academic letter re changes in surveillance lawAcademic letter re changes in surveillance law
Academic letter re changes in surveillance law
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
Mobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael HanleyMobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael Hanley
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider Liability
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Understanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange AgreementsUnderstanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange Agreements
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 

Similar to Client presentation

Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
KenfoxLaw
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).ppt
ssuserd26df0
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
Raunaq Jaiswal
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdf
Riley Claire
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Ben Allen
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
lilianedwards
 
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann
 
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
ovento
 
Cyber Liability Coverage in the Marketplace with Dan Cotter
Cyber Liability Coverage in the Marketplace with Dan CotterCyber Liability Coverage in the Marketplace with Dan Cotter
Cyber Liability Coverage in the Marketplace with Dan Cotter
ButlerRubin
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Ip innovations congress
Ip innovations   congressIp innovations   congress
Ip innovations congress
Lawrence Wang
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
lilianedwards
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
lilianedwards
 
Ip innovations congress
Ip innovations   congressIp innovations   congress
Ip innovations congress
DanaHalevyRozner
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
Charles Mok
 
Group 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxGroup 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptx
StephenQuijano3
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
ButlerRubin
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
William Tanenbaum
 
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
FSR Communications and Media
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
David Phillips
 

Similar to Client presentation (20)

Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).ppt
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdf
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
 
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
 
Cyber Liability Coverage in the Marketplace with Dan Cotter
Cyber Liability Coverage in the Marketplace with Dan CotterCyber Liability Coverage in the Marketplace with Dan Cotter
Cyber Liability Coverage in the Marketplace with Dan Cotter
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Ip innovations congress
Ip innovations   congressIp innovations   congress
Ip innovations congress
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Ip innovations congress
Ip innovations   congressIp innovations   congress
Ip innovations congress
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
Group 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxGroup 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptx
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Client presentation

  • 1. Chile’s Law 20,435 on Intellectual Property Implications Abroad for Chile’s Internet Service Provider Liability Limitations A Policy Analysis for The Government of Chile, Ministry of Foreign Affairs Conducted by: Z’leste Wanner Advisor on International Communications Policy zleste.wanner@gmail.com
  • 2. Objective  Analyze Chapter III, Articles 85L-U on ISP Liability  Identify Strengths and Weaknesses  Discuss Conflict with US re US-Chile FTA  Propose Recommendations  Discuss Implications for International Relations
  • 3. Importance of ISP Liability Provision  Rampant piracy in Chile – facilitated through ISPs  400 million songs downloaded illegally annually  Chile 18th in world in terms of P2P unauthorized file sharing  ISPs can cooperate in fight against piracy  ISP liability provision a requirement of the US-Chile FTA
  • 4. Chapter III, Articles 85L-U 2 Fundamental Principles of Policy: 1. ISPs should cooperate in the fight against digital piracy, the policy defines legal mechanisms requiring them to do so, (eg block or takedown infringing content upon notification of its existence 2. ISPs should not be directly liable for what users do (eg upload or download music illegally) if they meet certain conditions established according to the nature of the service provided by the ISP (ie providers of access, host or reference sites on the Internet)
  • 5. Distinguishing Feature: Article Ñ ISP not liable if removes content upon becoming “aware” of it ISP “aware” upon receipt of court notification “The service provider shall be deemed to have actual knowledge when a competent court of justice, in conformity with the procedure set forth in Article 85 Q, has ordered that the data be removed or access to it be disabled and the service provider, legally served, does not comply expeditiously with such order.” (Ley Núm. 20.435, Article Ñ) Foundation: Chilean Constitution protection of individual rights to due process ISPs cannot block unilaterally under its own judgment without judicial review
  • 6. Distinguishing Feature: Article Q Notice + Notice - Chile Notice and Takedown – US Rights holder informs court of copyright Rights holder sends notice to ISP of infringement copyright infringement Court reviews case and sends ISP complies, takes down infringing notification to ISP content ISP notifies user within 5 working days User can counter-notice alleged infringement, and if ruled in favor, ISP Can counter-petition the claim must restore content in 2 weeks Benefit: Petition for takedown more likely Problem: Incentive for ISP to take down to be substantiated and accurate, less faster, more work for ISP, censorship work for ISP, censorship less likely more likely
  • 7. Strengths Weaknesses  protection of individual expression by  dependency on the courts makes limiting rights holders and ISPs from process slow and less efficient regulating or censoring internet users  limited incentive for ISPs to  well balanced: rights of rights holders, cooperate with takedowns or pass along notifications ISPs, internet users  burden on copyright holders to  explicit limitation of ISP from actively involve courts, requires financial patrolling its users, ensuring greater resources privacy protection and less disruption to internet, ISPs  creators do not feel the system adequately protects their  judicial review component keeps Chile interests, time lost through in compliance with its commitments to judicial review results in its Constitution and the ACHR related significant losses in illegal downloads where large quantity to individual rights and rights to due can be pirated in a very short process amount of time
  • 8. US Critique of Chile’s ISP Policy  Priority Watch List for failure to comply with FTA  IIPA: Chile’s policy on ISP liability, “notice plus notice” architecture is “ineffective”  does not act a deterrent because there is no threat of real consequences if the ISP does not comply with forwarding the notice  inadequate for dealing with P2P file sharing  “actual knowledge” is dependent on a court order and does not establish voluntary cooperation between rights holders and ISPs  IIPA: Chile’s policy is too lenient on ISPs and users and does not establish an effective system to fight piracy
  • 9. Recommendations  Retain provision of judicial review prior to notification of copyright infringement must be retained in the policy  Maintain protections guaranteed by Constitution related to individual rights & due process  Lead the way for other Latin American countries that will adopt ISP liability provisions and subject to the same constraints of the American Convention on Human RIghts  Create stronger legal incentives or penalties for ISPs to comply with the infringement notification requirement  Elect a body to be charged with enforcing compliance with sending notices, such as the Department of Intellectual Property Rights  incentivize ISPs to participate and ensure a faster, more efficient process  Execute stronger enforcement of Intellectual Property Rights  Increase education about intellectual property protection among the population
  • 10. Implications for Foreign Relations  Consequence:  Souring relations with the US  Continued presence on Priority Watch List  Potential reputation as bad trading partner  Opportunities:  International leader in ISP liability regulation  More flexible IP regime facilitates trade relations with other countries with different regimes  Stance in Trans Pacific Partnership trade agreement negotiations, which would include a significantly more stringent chapter on ISP liability provisions