In both the EU and US, there are safe harbour provisions in place that should, under certain conditions, provide online service providers (OSPs) with immunity in the case of intellectual property infringement by third parties. However, the significant litigation against OSPs demonstrates that the safe harbour provisions are neither effective nor efficient. By providing OSPs with immunity against third party liability, safe harbour provisions contribute to a climate where the behaviour of OSPs is dominated by short-term business interests which are conducive neither to the enforcement of intellectual property rights by the OSPs nor to legal certainty for proprietors, internet users and OSPs alike.
The precondition for invoking safe harbour provisions, that one remain passive and only act reactively, leads to wilful blindness, although OSPs are best positioned to filter infringing use of content proactively. This article therefore asserts that the safe harbour provisions must be replaced by strict intermediary liability. As will be pointed out below, this transition is not as dramatic as it seems.
Safe harbours provisions were drafted at a moment when OSPs, as social media, still needed to be developed. They do not protect proprietors against infringement. Moreover, the protection of OSPs against liability is an illusion. If one extrapolates the development in filter technology one can see that advocating safe harbour provisions has become a rearguard battle and that implementation of strict liability for OSPs is inescapable.
This document provides an overview of copyright protection for computer programs and software under Irish and EU law. Some key points covered include:
- Copyright automatically protects original software and computer programs without any formal registration. Protection lasts for the author's lifetime plus 70 years.
- While ideas and functionality cannot be copyrighted, the specific code and expression can be. Reproducing all or substantial parts of a program is infringement.
- Employers own the copyright for works created by employees within the scope of their employment.
- Temporary copies made during normal use of a program, such as loading into RAM, are allowed under copyright law. Other provisions address error correction, backup copies, and caching.
- Reverse engineering
This document discusses computer fraud and forgery legislation in Ireland. It covers deception of machines, key cases like Davies v Flackett, and the recommendations of the 2002 Law Commission report that led to updates in legislation. The Fraud Act of 2006 was passed to address situations where deception was used to obtain services from a machine, rather than just money or property. The new laws close loopholes around fraudulently accessing electronic services like legal databases.
The document discusses national and international responses to cybercrime. It provides background on computer fraud statistics in the UK and Ireland. It discusses early cases of unauthorized computer access in the UK, including R v Gold & Schifreen, and how this led to the Computer Misuse Act of 1990. It then covers the Council of Europe Cybercrime Convention, which aims to harmonize cybercrime laws. Ireland has signed this convention. The document also discusses recommendations and guidelines from organizations like the OECD concerning cybersecurity policies and information sharing.
Thank you for the insightful discussion. Here are a few thoughts on balancing security and privacy:
- With new technologies come new challenges and opportunities. An open dialogue between all stakeholders is important to navigate these issues responsibly.
- Both security and privacy are important values, and reasonable people can disagree on where to draw the lines. There are good-faith arguments on multiple sides.
- Strong encryption and anonymity tools are critical for human rights defenders and dissidents in repressive regimes. However, they can also be misused to harm others or violate the law.
- Governments have a duty to protect citizens, but also have historically overreached in ways that erode trust and civil liberties. New policies should be narrowly targeted
The document summarizes the legal and contractual complexities that arise for video on demand (VoD) platforms operating in India. It notes that India allows foreign investment in VoD platforms and the acquisition of content from abroad, but negotiations over rights, subtitles/translations, digital rights management, and other issues are complicated by the lack of established standards in India. It also outlines India's censorship laws and laws regarding pornography/obscenity/sedition that apply to VoD platforms but are outdated, leading platforms to assume relaxed enforcement will continue. The fragmented Indian VoD market is primed for rapid growth but also consolidation in the future.
Electronic Transactions Law - Lecture 3: contractsCaroline B Ncube
This document discusses electronic contracts under South African law. It covers:
1) The essential requirements for a valid contract and how they apply to electronic contracts.
2) The reception theory which determines when electronic contracts are formed based on when messages are sent and received.
3) Different types of online agreements like shrinkwrap, clickwrap, and browsewrap contracts and when their terms can be considered binding.
4) Automated transactions under the Electronic Communications and Transactions Act and situations where agreements formed through electronic agents may not be enforceable.
This document provides an overview of cyber law in India. It summarizes the Information Technology Act 2000, which provides the legal framework for electronic commerce and digital signatures. It outlines some key sections of the act related to digital signatures, cyber crimes, data privacy, penalties, and amendments made in 2008. Examples of cyber crimes in India are also briefly described. The summary is intended to convey the high-level purpose and scope of cyber law in India according to this document.
Jurisdictional Issues In Internet DisputesTalwant Singh
This document discusses various jurisdictional issues that arise in internet disputes. It covers different approaches taken by courts around the world in determining jurisdiction for online disputes. Issues around applicable law and enforcing foreign judgments are also examined. Several suggestions are proposed to address jurisdictional uncertainty for cross-border internet transactions, including developing uniform internet laws or alternative dispute resolution mechanisms, but each approach faces challenges in implementation.
This document provides an overview of copyright protection for computer programs and software under Irish and EU law. Some key points covered include:
- Copyright automatically protects original software and computer programs without any formal registration. Protection lasts for the author's lifetime plus 70 years.
- While ideas and functionality cannot be copyrighted, the specific code and expression can be. Reproducing all or substantial parts of a program is infringement.
- Employers own the copyright for works created by employees within the scope of their employment.
- Temporary copies made during normal use of a program, such as loading into RAM, are allowed under copyright law. Other provisions address error correction, backup copies, and caching.
- Reverse engineering
This document discusses computer fraud and forgery legislation in Ireland. It covers deception of machines, key cases like Davies v Flackett, and the recommendations of the 2002 Law Commission report that led to updates in legislation. The Fraud Act of 2006 was passed to address situations where deception was used to obtain services from a machine, rather than just money or property. The new laws close loopholes around fraudulently accessing electronic services like legal databases.
The document discusses national and international responses to cybercrime. It provides background on computer fraud statistics in the UK and Ireland. It discusses early cases of unauthorized computer access in the UK, including R v Gold & Schifreen, and how this led to the Computer Misuse Act of 1990. It then covers the Council of Europe Cybercrime Convention, which aims to harmonize cybercrime laws. Ireland has signed this convention. The document also discusses recommendations and guidelines from organizations like the OECD concerning cybersecurity policies and information sharing.
Thank you for the insightful discussion. Here are a few thoughts on balancing security and privacy:
- With new technologies come new challenges and opportunities. An open dialogue between all stakeholders is important to navigate these issues responsibly.
- Both security and privacy are important values, and reasonable people can disagree on where to draw the lines. There are good-faith arguments on multiple sides.
- Strong encryption and anonymity tools are critical for human rights defenders and dissidents in repressive regimes. However, they can also be misused to harm others or violate the law.
- Governments have a duty to protect citizens, but also have historically overreached in ways that erode trust and civil liberties. New policies should be narrowly targeted
The document summarizes the legal and contractual complexities that arise for video on demand (VoD) platforms operating in India. It notes that India allows foreign investment in VoD platforms and the acquisition of content from abroad, but negotiations over rights, subtitles/translations, digital rights management, and other issues are complicated by the lack of established standards in India. It also outlines India's censorship laws and laws regarding pornography/obscenity/sedition that apply to VoD platforms but are outdated, leading platforms to assume relaxed enforcement will continue. The fragmented Indian VoD market is primed for rapid growth but also consolidation in the future.
Electronic Transactions Law - Lecture 3: contractsCaroline B Ncube
This document discusses electronic contracts under South African law. It covers:
1) The essential requirements for a valid contract and how they apply to electronic contracts.
2) The reception theory which determines when electronic contracts are formed based on when messages are sent and received.
3) Different types of online agreements like shrinkwrap, clickwrap, and browsewrap contracts and when their terms can be considered binding.
4) Automated transactions under the Electronic Communications and Transactions Act and situations where agreements formed through electronic agents may not be enforceable.
This document provides an overview of cyber law in India. It summarizes the Information Technology Act 2000, which provides the legal framework for electronic commerce and digital signatures. It outlines some key sections of the act related to digital signatures, cyber crimes, data privacy, penalties, and amendments made in 2008. Examples of cyber crimes in India are also briefly described. The summary is intended to convey the high-level purpose and scope of cyber law in India according to this document.
Jurisdictional Issues In Internet DisputesTalwant Singh
This document discusses various jurisdictional issues that arise in internet disputes. It covers different approaches taken by courts around the world in determining jurisdiction for online disputes. Issues around applicable law and enforcing foreign judgments are also examined. Several suggestions are proposed to address jurisdictional uncertainty for cross-border internet transactions, including developing uniform internet laws or alternative dispute resolution mechanisms, but each approach faces challenges in implementation.
This document discusses theories of cyberspace regulation proposed by Lawrence Lessig. Lessig argues that four factors regulate behavior in cyberspace: norms, markets, law, and code (or architecture). Code plays a particularly important role as it determines what actions are possible or impossible. Lessig proposes reforms to copyright law and policies promoting open code to balance control and innovation on the internet. Critics argue surveillance should also be considered a form of regulation and that "architecture" is a more accurate term than "code." The document examines issues around balancing control, privacy, and innovation in cyberspace.
This document discusses how courts determine jurisdiction over businesses operating online. It explains that courts use the concept of "minimum contacts" to determine if a business has purposefully established connections with a state. The more interactive a website is and the more commercial transactions it conducts, the more likely courts are to find jurisdiction. The "Zippo sliding scale" evaluates websites on a spectrum from passive to highly interactive. Repeated sales, targeted marketing, and other substantial contacts increase the risk of courts finding jurisdiction in foreign states. State long-arm statutes and consent clauses can also give courts jurisdiction over out-of-state online businesses.
This document provides an introduction to electronic contracting under South African law. It discusses key concepts like the requirements for a valid contract, the Electronic Communications and Transactions Act, and when electronic contracts are formed. It also covers types of electronic contracts like shrinkwrap and clickwrap agreements, and issues around standard terms and conditions in electronic contracts, including cases that address incorporating terms by reference and enforcing exemption clauses.
This document provides an overview of creating and operating a virtual law office (VLO). It discusses how a VLO utilizes secure, web-based software to allow attorneys and clients to communicate and conduct legal work online. The document outlines some of the key benefits of a VLO for both clients and attorneys, such as increased access to legal services, lower overhead costs, and greater flexibility. It also examines how state bar associations and the ABA are addressing the ethics of online legal services. Overall, the document serves as an introductory guide for attorneys interested in establishing and appropriately managing a virtual law practice.
electronic transactions law lecture series: lecture 1 introductionCaroline B Ncube
This document provides an overview of electronic transactions law. It begins by discussing different terms used to describe this area of law such as cyberlaw, e-commerce law, and internet law. It then defines electronic transactions and the key concepts of electronic communications and data messages in the Electronic Communications and Transactions Act. The document outlines the main technologies used in electronic transactions and different types of transactions and the legal issues they raise. It also discusses the development of South Africa's e-commerce policy framework and relevant domestic and international laws governing electronic transactions.
Whether legal jurisdiction is able to check cyber-crime where there are no territorial borders and even where the criminal does not have any physical presence in the forum
This document discusses the definition, essential elements, and validity of e-contracts under Indian law. It defines an e-contract as any contract formed through electronic means like email. The key points are:
1. The Indian Contract Act and Information Technology Act recognize the validity of e-contracts and electronic communications/records as legally binding.
2. Essential elements of a valid contract like offer, acceptance, consideration must be present in e-contracts for them to be enforceable.
3. E-contracts can be formed via websites through clickwrap/browsewrap/shrinkwrap agreements or via email exchange. The postal rule of acceptance applies to email.
4. Electronic records and digital signatures have evidentiary
this is a presentation on electronic contracts. this will be helpful in the study of various types of contract in the law. this topic is also there in the BBA course. in legal environment - 2
LEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASEanthony4web
The document discusses legal strategies for Indian BPO companies in light of recent court cases. It recommends that BPO companies comply with both Indian and foreign laws to limit liability and increase business. Specifically, companies should conduct cyber legal due diligence to demonstrate exercising "all due diligence" under Indian law. Careful contract negotiation is also important to protect intellectual property rights and appropriately limit liability.
This document discusses cyber or online contracts. It defines a cyber-contract as one created through communications over computer networks, whether entirely through email exchanges showing offer and acceptance, or a combination of electronic and other means. The key elements of a valid contract - offer, acceptance, consideration, and consent - still apply to online contracts. Digital signatures can verify the identity of parties to an online contract by encrypting messages with public and private keys. This allows confirmation that a message has not been altered and verifies the sender. Overall, the document outlines how traditional contract law elements can be applied to agreements made electronically.
Jurisdictional issues of e commerce and consumer protectionAkshay Sharma
This document provides an overview of e-commerce in India. It discusses the growth of e-commerce, e-contracts, jurisdiction issues, the role of international bodies and frameworks, consumer protection, and a case study on Flipkart's Big Billion Sale. The document outlines the classification of e-commerce, essential elements of e-contracts, challenges regarding cross-border transactions and determining applicable law, and issues around intellectual property rights, digital goods/services, contracts with minors, and taxation in e-commerce. It also examines frameworks established by bodies like UNCITRAL and OECD and initiatives in India to regulate e-commerce and protect consumers.
Law of E-Commerce & Contractual Obligation in India
Definition of E-Commerce
E-Commerce v. E-Business
Definition of Commerce
Contracts & Business done Online
[1] Criminal and regulatory laws have varying territorial reach depending on factors like location of users, activity type, and targeted locations.
[2] Civil liability also has cross-border implications regarding applicable substantive laws, adjudicative jurisdiction of courts, and choice of applicable law depending on concepts like territoriality of laws and targeting.
[3] Investigatory powers of law enforcement investigating online crimes have unclear territorial scope, raising issues around direct orders to disclose data versus mutual legal assistance treaties. Comity between jurisdictions is an important consideration.
This document discusses electronic contracts (e-contracts) under Indian law. It defines essential elements of valid contracts including offer, acceptance, consideration, and intention to create legal relations. Key provisions of the Information Technology Act relating to attribution of electronic records and time/place of communication are summarized. Different types of e-contracts like shrink wrap and click wrap agreements are described. Sample clauses from real e-contracts for email services, domain purchase, online share trading, and online shopping are provided to illustrate common purposes and sub-parts of e-contracts. Finally, the document outlines the legal framework for secure e-contracts covering different business and legal phases of the contracting process.
The document discusses several pieces of legislation related to e-commerce. The Fair Trade Act protects consumers from misrepresentation online. The Interstate Commerce Act regulates transportation of goods across state lines. The E-Privacy Act protects individual privacy in cyberspace. The Millennium Digital Commerce Act makes electronically signed contracts valid. The Telecommunications Act aims to keep the internet an unfettered free market. Accessibility legislation like Section 508 requires websites be accessible to those with disabilities.
(1) The Electronic Transactions Act was enacted to regulate electronic records and digital signatures by providing them legal validity and recognition.
(2) Key terms like electronic form, electronic record, digital signature, originator, addressee etc. are defined to have the same meaning when used in reference to electronic records as they would have in reference to physical documents.
(3) The act provides for legal recognition of electronic records and digital signatures by establishing them as valid alternatives to physical documents signed using handwritten signatures when prevailing law requires written, printed or signed records.
Presentation by Egya Kwamena Jallow to African Security Dialogue and ResearchAmos Anyimadu
The document discusses proposed legislation on computer related crimes in Ghana. It outlines challenges in prosecuting such crimes under existing laws. New bills aim to address this by recognizing electronic transactions and evidence. They also establish offenses for fraudulent electronic fund transfers and unauthorized computer access. While a step forward, the bills don't include penalties and most offenses are summary. More needs to be done to deter crimes, including improving detection tools and education for police on financial computer crimes.
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
This document discusses the liability of Internet Service Providers (ISPs) for illegal downloads of copyrighted material by users. It notes that while individual downloaders can be held directly liable, the liability of intermediaries like ISPs is less clear. The document analyzes safe harbor provisions in Indian law that exempt ISPs from liability if they were unaware of infringing content or exercised due diligence in removing it after receiving notice. It also discusses a 1995 U.S. case where an ISP could still potentially face contributory liability for failing to remove infringing content even after receiving notice. The key issue addressed is determining the appropriate scope of ISP liability to curb piracy while not overburdening them as mere conduits
Anti-circumvention and ISP liability provisions in Free Trade Agreements.blogzilla
The document discusses anti-circumvention provisions and ISP liability in US and EU free trade agreements. It notes that US FTAs include anti-circumvention and ISP liability rules similar to the DMCA and EU directives. Critics argue these provisions shift the balance too far towards copyright holders, limit access to information for developing countries, and could harm development. ISP liability in FTAs provides limitations similar to safe harbors in the DMCA and ECD, but some argue some recent FTAs go too far for developing nations.
This document discusses theories of cyberspace regulation proposed by Lawrence Lessig. Lessig argues that four factors regulate behavior in cyberspace: norms, markets, law, and code (or architecture). Code plays a particularly important role as it determines what actions are possible or impossible. Lessig proposes reforms to copyright law and policies promoting open code to balance control and innovation on the internet. Critics argue surveillance should also be considered a form of regulation and that "architecture" is a more accurate term than "code." The document examines issues around balancing control, privacy, and innovation in cyberspace.
This document discusses how courts determine jurisdiction over businesses operating online. It explains that courts use the concept of "minimum contacts" to determine if a business has purposefully established connections with a state. The more interactive a website is and the more commercial transactions it conducts, the more likely courts are to find jurisdiction. The "Zippo sliding scale" evaluates websites on a spectrum from passive to highly interactive. Repeated sales, targeted marketing, and other substantial contacts increase the risk of courts finding jurisdiction in foreign states. State long-arm statutes and consent clauses can also give courts jurisdiction over out-of-state online businesses.
This document provides an introduction to electronic contracting under South African law. It discusses key concepts like the requirements for a valid contract, the Electronic Communications and Transactions Act, and when electronic contracts are formed. It also covers types of electronic contracts like shrinkwrap and clickwrap agreements, and issues around standard terms and conditions in electronic contracts, including cases that address incorporating terms by reference and enforcing exemption clauses.
This document provides an overview of creating and operating a virtual law office (VLO). It discusses how a VLO utilizes secure, web-based software to allow attorneys and clients to communicate and conduct legal work online. The document outlines some of the key benefits of a VLO for both clients and attorneys, such as increased access to legal services, lower overhead costs, and greater flexibility. It also examines how state bar associations and the ABA are addressing the ethics of online legal services. Overall, the document serves as an introductory guide for attorneys interested in establishing and appropriately managing a virtual law practice.
electronic transactions law lecture series: lecture 1 introductionCaroline B Ncube
This document provides an overview of electronic transactions law. It begins by discussing different terms used to describe this area of law such as cyberlaw, e-commerce law, and internet law. It then defines electronic transactions and the key concepts of electronic communications and data messages in the Electronic Communications and Transactions Act. The document outlines the main technologies used in electronic transactions and different types of transactions and the legal issues they raise. It also discusses the development of South Africa's e-commerce policy framework and relevant domestic and international laws governing electronic transactions.
Whether legal jurisdiction is able to check cyber-crime where there are no territorial borders and even where the criminal does not have any physical presence in the forum
This document discusses the definition, essential elements, and validity of e-contracts under Indian law. It defines an e-contract as any contract formed through electronic means like email. The key points are:
1. The Indian Contract Act and Information Technology Act recognize the validity of e-contracts and electronic communications/records as legally binding.
2. Essential elements of a valid contract like offer, acceptance, consideration must be present in e-contracts for them to be enforceable.
3. E-contracts can be formed via websites through clickwrap/browsewrap/shrinkwrap agreements or via email exchange. The postal rule of acceptance applies to email.
4. Electronic records and digital signatures have evidentiary
this is a presentation on electronic contracts. this will be helpful in the study of various types of contract in the law. this topic is also there in the BBA course. in legal environment - 2
LEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASEanthony4web
The document discusses legal strategies for Indian BPO companies in light of recent court cases. It recommends that BPO companies comply with both Indian and foreign laws to limit liability and increase business. Specifically, companies should conduct cyber legal due diligence to demonstrate exercising "all due diligence" under Indian law. Careful contract negotiation is also important to protect intellectual property rights and appropriately limit liability.
This document discusses cyber or online contracts. It defines a cyber-contract as one created through communications over computer networks, whether entirely through email exchanges showing offer and acceptance, or a combination of electronic and other means. The key elements of a valid contract - offer, acceptance, consideration, and consent - still apply to online contracts. Digital signatures can verify the identity of parties to an online contract by encrypting messages with public and private keys. This allows confirmation that a message has not been altered and verifies the sender. Overall, the document outlines how traditional contract law elements can be applied to agreements made electronically.
Jurisdictional issues of e commerce and consumer protectionAkshay Sharma
This document provides an overview of e-commerce in India. It discusses the growth of e-commerce, e-contracts, jurisdiction issues, the role of international bodies and frameworks, consumer protection, and a case study on Flipkart's Big Billion Sale. The document outlines the classification of e-commerce, essential elements of e-contracts, challenges regarding cross-border transactions and determining applicable law, and issues around intellectual property rights, digital goods/services, contracts with minors, and taxation in e-commerce. It also examines frameworks established by bodies like UNCITRAL and OECD and initiatives in India to regulate e-commerce and protect consumers.
Law of E-Commerce & Contractual Obligation in India
Definition of E-Commerce
E-Commerce v. E-Business
Definition of Commerce
Contracts & Business done Online
[1] Criminal and regulatory laws have varying territorial reach depending on factors like location of users, activity type, and targeted locations.
[2] Civil liability also has cross-border implications regarding applicable substantive laws, adjudicative jurisdiction of courts, and choice of applicable law depending on concepts like territoriality of laws and targeting.
[3] Investigatory powers of law enforcement investigating online crimes have unclear territorial scope, raising issues around direct orders to disclose data versus mutual legal assistance treaties. Comity between jurisdictions is an important consideration.
This document discusses electronic contracts (e-contracts) under Indian law. It defines essential elements of valid contracts including offer, acceptance, consideration, and intention to create legal relations. Key provisions of the Information Technology Act relating to attribution of electronic records and time/place of communication are summarized. Different types of e-contracts like shrink wrap and click wrap agreements are described. Sample clauses from real e-contracts for email services, domain purchase, online share trading, and online shopping are provided to illustrate common purposes and sub-parts of e-contracts. Finally, the document outlines the legal framework for secure e-contracts covering different business and legal phases of the contracting process.
The document discusses several pieces of legislation related to e-commerce. The Fair Trade Act protects consumers from misrepresentation online. The Interstate Commerce Act regulates transportation of goods across state lines. The E-Privacy Act protects individual privacy in cyberspace. The Millennium Digital Commerce Act makes electronically signed contracts valid. The Telecommunications Act aims to keep the internet an unfettered free market. Accessibility legislation like Section 508 requires websites be accessible to those with disabilities.
(1) The Electronic Transactions Act was enacted to regulate electronic records and digital signatures by providing them legal validity and recognition.
(2) Key terms like electronic form, electronic record, digital signature, originator, addressee etc. are defined to have the same meaning when used in reference to electronic records as they would have in reference to physical documents.
(3) The act provides for legal recognition of electronic records and digital signatures by establishing them as valid alternatives to physical documents signed using handwritten signatures when prevailing law requires written, printed or signed records.
Presentation by Egya Kwamena Jallow to African Security Dialogue and ResearchAmos Anyimadu
The document discusses proposed legislation on computer related crimes in Ghana. It outlines challenges in prosecuting such crimes under existing laws. New bills aim to address this by recognizing electronic transactions and evidence. They also establish offenses for fraudulent electronic fund transfers and unauthorized computer access. While a step forward, the bills don't include penalties and most offenses are summary. More needs to be done to deter crimes, including improving detection tools and education for police on financial computer crimes.
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
This document discusses the liability of Internet Service Providers (ISPs) for illegal downloads of copyrighted material by users. It notes that while individual downloaders can be held directly liable, the liability of intermediaries like ISPs is less clear. The document analyzes safe harbor provisions in Indian law that exempt ISPs from liability if they were unaware of infringing content or exercised due diligence in removing it after receiving notice. It also discusses a 1995 U.S. case where an ISP could still potentially face contributory liability for failing to remove infringing content even after receiving notice. The key issue addressed is determining the appropriate scope of ISP liability to curb piracy while not overburdening them as mere conduits
Anti-circumvention and ISP liability provisions in Free Trade Agreements.blogzilla
The document discusses anti-circumvention provisions and ISP liability in US and EU free trade agreements. It notes that US FTAs include anti-circumvention and ISP liability rules similar to the DMCA and EU directives. Critics argue these provisions shift the balance too far towards copyright holders, limit access to information for developing countries, and could harm development. ISP liability in FTAs provides limitations similar to safe harbors in the DMCA and ECD, but some argue some recent FTAs go too far for developing nations.
El Acta de derechos de autor digitales del milenio (en inglés Digital Millennium Copyright Act o DMCA) es una ley de copyright (derechos de reproducción) de Estados Unidos que implementa dos tratados del año 1996 de la Organización Mundial de la Propiedad Intelectual (OMPI). Esta ley sanciona, no sólo la infracción de los derechos de reproducción en sí, sino también la producción y distribución de tecnología que permita sortear las medidas de protección del copyright (comúnmente conocidas como DRM); además incrementa las penas para las infracciones al derecho de autor en Internet.
Por su parte, la Directiva 2001/29/CE del Parlamento Europeo y el Consejo del 22 de mayo de 2001 sobre la armonización de ciertos aspectos del derecho de autor y derechos relacionados en la sociedad de la información de la Unión Europea, conocida comúnmente como Directiva de la Unión Europea sobre derecho de autor (o EUCD, del inglés European Union Copyright Directive) es una directiva europea que se transpone en el Tratado de la OMPI sobre Derecho de Autor de 1996.
Chapter 11 laws and ethic information securitySyaiful Ahdan
This document provides an overview of key concepts regarding law and ethics in information security. It discusses the differences between laws and ethics, and how policies function similarly to laws within an organization. Several major US laws are outlined, including those covering general computer crimes, privacy, identity theft, export and espionage, copyright, and financial reporting. International agreements and professional organizations relevant to information security ethics are also mentioned. The document aims to help readers understand the legal and ethical responsibilities for information security practitioners.
This document discusses cybercrime legislation and substantive criminal law provisions related to cybercrimes. It summarizes key parts of the Council of Europe's Convention on Cybercrime and the EU's directives on illegal access, illegal interception of data, computer misuse, and denial of service attacks. It examines cases from the UK related to unauthorized access by authorized users and discusses how legislation addresses dual-use tools and botnet crimes.
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
In compliance with the Budapest Convention, the CCA has recognised almost all the cyber-crime offences that are provided in the convention. Mere fact that the legal system recognises certain cyber-offences or that it provides a special mechanism to conduct investigations does not render the legislative framework effective. For the legislative framework to be considered effective, it should be capable of achieving the objective for which it was established. Accordingly, the effectiveness of the contemporary legislative framework shall be assessed based on its success in identifying and preventing cyber-crimes, conducting investigations, enforcing the enacted laws and in protecting human rights and liberties which are the objectives behind the enforcement of the cyber-crime legislative framework.
cyber crime in india and law related to cyber crimeSumedhaBhatt2
1. The Information Technology Act, 2000 provides the legal framework for electronic governance and commerce in India by recognizing electronic records and digital signatures.
2. The Act created various authorities and defined cyber crimes and offenses related to hacking, publishing obscene content, and more that are punishable by fines and imprisonment of up to 10 years.
3. Network service providers are not held liable for third-party content but must exercise due diligence. The Act aims to prevent cyber crimes while supporting the growth of e-commerce.
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Terrance Tong
China’s recent cybersecurity laws have been cited by the government as internet and personal data protection milestones, while being viewed with suspicion by foreign multinationals as potentially increasing compliance costs. The one certain thing is that the Chinese government
is succeeding in exercising more control and oversight over cyberspace.
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...Evangeline
The document discusses proposals for a "reverse notice and takedown" system to enable fair uses of copyrighted works protected by technological protection measures (TPMs). It proposes that a fair user could notify a copyright owner of intent to make a fair use circumvention, and if the owner does not respond or allow it, the user could seek a declaratory judgment to enable the fair use. This aims to balance copyright owners' rights with the public interest in fair uses, as required by copyright law but not fully accomplished by the anti-circumvention provisions of the DMCA.
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
This document discusses cyber law and cybercrime from legal perspectives under several sections. It begins by defining cybercrime in two categories: restrictive sense involving computer crime and general sense involving computer-related crime. It then outlines examples of cybercrimes such as unauthorized access, computer damage, sabotage, and espionage. The document also examines the legal landscape around cybercrime internationally, looking at laws and frameworks in regions like Asia-Pacific, Canada, the US, EU, and Africa. It discusses the reasons for and provisions of India's Information Technology Act 2000, including some weaknesses. Overall, the document provides an overview of cybercrime definitions, international cyber law approaches, and the context and key aspects of India's cyber law.
The document discusses cybercrime and computer misuse laws in the UK. It summarizes key pieces of legislation like the Computer Misuse Act of 1990, which created three new computer-related offenses. The Act aims to address issues like unauthorized access to computer material, systems, or modification of content. The document also discusses offenses related to hacking, viruses, fraud, and issues around existing laws not fully covering computer-related crimes.
This document discusses intellectual property law challenges in the age of internet and converging technologies. It notes that the balance of rights between copyright owners, internet service providers, consumers, and other stakeholders is difficult to maintain as technology advances faster than legal developments. It also examines issues around regulating converged media and the need for coordinated intellectual property legislation to address digital copyright issues raised by new communication technologies. The document surveys IP laws and regulations globally to analyze challenges and solutions around protecting multimedia content, software, and websites in the internet era.
In Rem Injunctions: Case of Website BlockingMartin Husovec
This document discusses website blocking injunctions in the EU that allow right holders to seek injunctions against internet access providers to block access to websites hosting infringing content. While internet providers are typically not directly liable, they are seen as being in the best position technically to stop infringements. The document outlines the legal basis for these "in rem" injunctions and questions whether they improperly extend property rights without regard for the website operators' rights or potential for abuse. Industry representatives argue these injunctions can damage businesses even when intermediaries are not liable. In conclusion, the document suggests that if this new injunction paradigm is legitimate, limitations should be placed both on rights' scope and their enforcement scope.
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
This document summarizes a report from the ABA Section of Intellectual Property Law's Committee 711 on Online Security & E-Privacy. The committee did not propose any resolutions in its second year. It is planning a CLE seminar on data breach notification for an upcoming ABA conference. The document then summarizes a subcommittee report on spyware that discusses defining spyware and existing federal spyware laws, including the Wiretap Act and Computer Fraud and Abuse Act. It notes there was no consensus to propose a resolution on spyware legislation.
The document discusses the Cybercrime Prevention Act of 2012 in the Philippines. It begins with background on the "I LOVE YOU" computer virus in 2000 that prompted the first cybercrime law. It then summarizes key aspects of RA 10175, including punishable cybercrimes, penalties, enforcement authorities, and international cooperation provisions. Examples are given of types of cybercrimes prosecuted under the act such as identity theft, cyberbullying, and an online sexual exploitation case. The document provides an overview of the Philippine government's efforts to address cybercrime through laws and law enforcement agencies.
This document discusses intellectual property rights (IPR) enforcement and digital rights management (DRM) in the context of copyright protection online. It notes the challenges of regulating copyright in the digital environment due to attributes like plasticity, transmissibility and processibility of digital content. While DRM aims to curb piracy by embedding ownership data, mere prevention is not enough - enforcement is also needed. The document analyzes issues around jurisdiction, liability and balancing author/user interests regarding fair use. It recommends a cautious approach for India that considers economic circumstances and affordable access to knowledge, rather than strict DRM adherence seen in developed countries.
This slide is a guide to the Cyber Law regime in India. It covers up the IT Act 200 in a simple childish approach.
Shankey Gupta
Advocate
Cyber Law & Forensic Consultant.
www.shivamgupta.com
Online Enforcement of IP Rights by Injunctions Against ISPs: The English Cour...Victoria Sievers
On Wednesday 6 July 2016 the English Court of Appeal (CoA) handed down its decision in Cartier
International AG & Others -v- British Sky Broadcasting Limited & Others [2016] EWCA Civ 658
(Cartier). This was an appeal from the 2014 High Court ruling of Mr. Justice Arnold (Arnold J) in favour
of the Claimant trademark owners and his findings that the English courts had jurisdiction to grant
injunctions against internet service providers (ISPs) forcing them to take steps to block their customers
from accessing websites whose content infringed trademark rights. For reasons summarised below, the
CoA dismissed the appeal and therefore upheld Arnold J’s original decision. Thus, the door remains open
for trademark owners to seek this type of relief from the English courts.
Similar to Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict Liability in Sight (2014) 9(2) JIPLP 148-155 (20)
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaintsseoglobal20
Our company bridges the gap between registered users and experienced advocates, offering a user-friendly online platform for seamless interaction. This platform empowers users to voice their grievances, particularly regarding online consumer issues. We streamline support by utilizing our team of expert advocates to provide consultancy services and initiate appropriate legal actions.
Our Online Consumer Legal Forum offers comprehensive guidance to individuals and businesses facing consumer complaints. With a dedicated team, round-the-clock support, and efficient complaint management, we are the preferred solution for addressing consumer grievances.
Our intuitive online interface allows individuals to register complaints, seek legal advice, and pursue justice conveniently. Users can submit complaints via mobile devices and send legal notices to companies directly through our portal.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
Corporate Governance : Scope and Legal Frameworkdevaki57
CORPORATE GOVERNANCE
MEANING
Corporate Governance refers to the way in which companies are governed and to what purpose. It identifies who has power and accountability, and who makes decisions. It is, in essence, a toolkit that enables management and the board to deal more effectively with the challenges of running a company.
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedPROF. PAUL ALLIEU KAMARA
To ensure the integrity of financial systems and combat illicit financial activities, understanding AML (Anti-Money Laundering) compliance regulations is crucial for financial institutions and businesses. AML compliance regulations are designed to prevent money laundering and the financing of terrorist activities by imposing specific requirements on financial institutions, including customer due diligence, monitoring, and reporting of suspicious activities (GitHub Docs).
Business law for the students of undergraduate level. The presentation contains the summary of all the chapters under the syllabus of State University, Contract Act, Sale of Goods Act, Negotiable Instrument Act, Partnership Act, Limited Liability Act, Consumer Protection Act.
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfSunsetWestLegalGroup
The immediate step is an intelligent choice; don’t procrastinate. In the aftermath of the crash, taking care of yourself and taking quick steps can help you protect yourself from significant injuries. Make sure that you have collected the essential data and information.
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict Liability in Sight (2014) 9(2) JIPLP 148-155
1. Electronic copy available at: http://ssrn.com/abstract=2479190
Sinking the Safe Harbour With the Legal Certainty of Strict Liability in Sight
Danny Friedmann1
In both the EU and U.S., there are safe harbour provisions
Introduction
2
in place that should,
under certain conditions, provide online service providers (OSPs)3
The prerequisites of the safe harbour provisions to remain passive and only act
reactively, lead to willful blindness, although OSPs are best positioned to proactively
filter infringing use of content. Therefore this article asserts that the safe harbour
provisions must be substituted by strict intermediary liability. As will be pointed out
below, this transition is not as dramatic as it seems.
immunity in case of
intellectual property infringement by third parties. However, the massive litigation cases
against OSPs demonstrate that the safe harbour provisions are not effective nor efficient.
By providing OSPs immunity of third party liability, safe harbour provisions contribute
to a climate where the behaviour of OSPs is dominated by short term business interests,
which are not conducive for the enforcement of intellectual property rights by the OSPs,
nor for the legal certainty of proprietors, internet users and OSPs alike.
4
1
Danny Friedmann, PhD Cand. (submitted August 30, 2013), Faculty of Law, Chinese University of Hong
Kong. The author is grateful for comments of the anonymous referee.
2
For example in the EU; Directive 2000/31/EC of the European Parliament and of the Council of June 8,
2000 on certain legal aspects of information society services, in particular electronic commerce, in the
Internal Market (E-Commerce Directive) and in the U.S.; Digital Millennium Copyright Act codified in 17
USC § 512, effective October 28, 1998 (DMCA).
3
With the online service provider (OSP) is meant an intermediary that is called an internet society service
in the E-Commerce Directive and service provider in the DMCA.
4
Infra Chapter 7, this transition might not be as dramatic as one might expect.
Safe harbour provisions were drafted at a moment when OSPs such as social
media, still needed to be developed. They do not protect proprietors against infringement.
Moreover, the protection of OSPs against liability is an illusion.
If one extrapolates the development in filter technology one can see that
advocating safe harbour provisions has become a rearguard battle and that
implementation of strict liability for OSPs is ineluctable.
2. Electronic copy available at: http://ssrn.com/abstract=2479190
Chapter 1 provides the reason why the safe harbour provisions do not connect well to the
current problems;
Chapter 2 demonstrates the inability of safe harbour provisions to enforce proprietors’
intellectual property rights;
Chapter 3 shows why the safe harbour provisions are inadequate to provide legal
immunity to OSPs;
Chapter 4 elaborates on the neutrality prerequisite for OSPs to be eligible for the
exemption of liability;
Chapter 5 explicates the different schools of thought on the duty of care;
Chapter 6 deals with the different degrees of monitoring obligations;
Chapter 7 demonstrates the less than dramatic implications of the strict liability regime
for OSPs.
Chapter 1 Mismatch of law and legal needs
It is not surprising that the safe harbour provisions do not match with the needs of
OSPs, proprietors and internet users:5
the safe harbour provisions in the DMCA,6
Lanham Act7
and in the E-Commerce Directive8
were all drafted around the millennium
at a time when electronic commerce was perceived as “embryonic and fragile”,9
and
internet auctions and social media were just a fledgling phenomenon. Legislators on both
sides of the Atlantic assumed that limiting the liability of OSPs in case of intellectual
property infringements would “ensure that the efficiency of the internet [would] continue
to improve and that the variety and quality of services on the internet [would] continue to
expand.”10
5
There is a “legal lag” between legislation and the legal challenges.
Soon the development of e-commerce proofed to be robust and user-generated
content on social media started to blossom. If one compares legislations with safe harbour
6
Exemption of secondary liability in case of copyright infringements: DMCA, supra note 3.
7
Exemption of secondary liability in case of trademark infringements: Article 32(2) Lanham Act, as
codified into 15 U.S.C. § 1114(2) 2000.
8
Exemption of secondary liability in case of all kinds of infringements, including copyright and trademark
infringements: Article 14(1) E-Commerce Directive involves hosting sites, infra note 25.
9
“[T]he embryonic state of electronic commerce, policies should be crafted with care and with due
recognition of its fragile and evolving nature.” A Wyckoff & A Colecchia, ‘The Economic and Social
Impact of Electronic Commerce’, OECD (1998) 12.
10
Viacom Int’l Inc. v YouTube, Inc., 718 F. Supp. 2d 514, 519 (S.D.N.Y. 2010). Quoting The Senate
Committee on the Judiciary Report, S. REP. NO. 105-190 (1998) 8.
3. provisions for secondary liability of copyright infringement with Hong Kong that does
not have these yet, it is interesting to note that also in Hong Kong the foreseen problems
never seem to have materialised.11
The first prerequisite is that an OSP has no actual knowledge,
Chapter 2 Not solving the problems for proprietors
Two of the prerequisites OSPs have to comply with in order to be eligible for the
safe harbour provisions work against the interests of proprietors.
12
nor is aware of
facts or circumstances that infringing activity is apparent.13
And in case it obtains such
knowledge or awareness it must expeditiously remove or disable access to such content.14
This has contributed to wilful ignorance by OSPs, which led to user-generated content
that is infringing copyright and trademark rights on a massive scale15
The two prerequisites are strong disincentives for OSPs to seriously monitor for
infringing content. On the one hand it would force them to expeditiously remove or
(see Chapter 3 “Not
protecting OSPs from legal conflicts”).
The second prerequisite is that OSPs should act neutrally in relation to content
uploaded by third parties, for example user-generated content on social media or internet
auctions. However, this is in conflict with OSPs’ desire to harness technology to further
their entrepreneurial interests (see Chapter 4 “Neutral hosting or activist” under “Wilful
blindness”).
11
Infra note 101.
12
Article 14(1)(a) E-Commerce Directive: “the provider does not have actual knowledge of illegal activity
or information and, as regards claims for damages, is not aware of facts or circumstances from which the
illegal activity or information is apparent.” and 17 § USC512 (c)(1)(A)(i): “does not have actual knowledge
that the material or an activity using the material on the system or network is infringing.”
13
Article 14(1)(a) E-Commerce Directive, id. and 17 § USC512 (c)(1)(A)(ii): “in the absence of such
actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent.”
14
Article 14(1)(b) E-Commerce Directive, supra note 3: “the provider, upon obtaining such knowledge or
awareness, acts expeditiously to remove or to disable access to the information.” See also Recital 46 of the
Preamble to the E-Commerce Directive.
17 § USC512 (c)(1)(A)(iii): “upon obtaining such knowledge or awareness, acts expeditiously to remove,
or disable access to, the material.”
15
The overview Google provides in its Transparency Report of the number of copyright removal requests it
receives (18.7 million per month) provides an indication of the scale of problem of intellectual property
infringing content OSPs face. Available at: http://www.google.com/transparencyreport/removals/copyright/
(accessed September 23, 2013).
4. disable access to infringing but popular content, which is not in their interest.16
Jurisprudence below will show that courts narrowly interpret actual knowledge or
awareness of facts or circumstances by the OSPs, while they broadly interpret the OSPs’
activities as neutral. This led to a situation whereby proprietors that have already notified
OSPs about certain direct infringers or certain infringements, are forced to continue to
notify OSPs about infringing content. Given the massive scale of the infringements, the
proprietors’ burden to monitor and request for removals can be onerous.
Chapter 3 Not protecting OSPs from legal conflicts
On the
other hand seriously monitoring content, although the OSPs could be best positioned to
engage in this activity, would be perceived as exceeding the neutrality of merely hosting.
Safe harbour provisions offer not only no legal certainty to proprietors, but also
no safety to OSPs. One can distinguish three reasons. First they are still being sued by
proprietors.17
Direct infringers are difficult to trace,
Second, a recurring claim against OSPs that is articulated louder as
technology evolves, is the accusation that they wilfully turn a blind eye towards the
infringements that are happening on their servers. Third, the OSPs should unnaturally
restrict themselves against activist behaviour, stifling their entrepreneurial spirit, while
their neutrality is still being disputed.
The first and second reason will be elaborated below. The third reason will be dealt with
in Chapter 4 “Neutral hosting or activist”.
Still being sued
18
16
A poignant example can be found in the emails of Jawed Karim with the founders of YouTube, which
include the statement of YouTube’s lead product manager that “probably 75-80% of our views come from
copyrighted material” Viacom Int’l v YouTube, Inc., No. 10-3270 (2d Cir.), J.A., vol. II, 47. And that “over
70%” of the most viewed/most discussed/top favorites/top rated video lists were or contained or have
copyrighted material. Viacom Int’l v YouTube, Inc., No. 10-3270 (2d Cir.), J.A., vol. I, 857. G Dickson,
‘Viacom v. YouTube: Second Circuit Plumbs the Depths of the DMCA Safe Harbor’(2011) 20 NYSBA
BRIGHT IDEAS 10, 10.
or if this is possible, they might be located
in a jurisdiction where it is difficult, or not economically feasible to litigate. Or when
they are in the right jurisdiction, they might have insufficient financial resources, or it
17
Infra notes 20 and 21.
18
Anonymity can exacerbate problems with tracing direct infringing users.
5. might not be desirable to sue one’s potential customers.19
This has meant that proprietors
have filed law suits against OSPs to try to recover their damages; for example social
media site YouTube, has been a regular defendant against the claim of secondary liability
for copyright infringement on both sides of the Atlantic,20
and so was internet auction
eBay in regard to secondary liability for trademark infringement.21
OSPs can incur the risk of being accused of wilful ignorance. In the U.S. the
common law doctrine of wilful blindness occurs when someone suspects wrongdoing and
deliberately fails to investigate.
Wilful blindness
22
Then again, wilful blindness is limited by Hard Rock
Café’s standard to only be able to “understand what a reasonably prudent person would
understand” and not impose any care of duty that goes beyond that requirement.23
The
concept “facts or circumstances” from which “illegal activity”24
or “illegal activity or
information”25
becomes apparent is also called “a red flag”,26
19
Filing a lawsuit against a customer or potential customer can have averse effect on the target market.
20
A U.S. example of a secondary liability claim for copyright infringement against a social media is
Viacom International, Inc. v YouTube, Inc., No. 07 Civ. 2103, 2010 WL 2532404 (S.D.N.Y 2010). A
European equivalent of this case, is LG Hamburg 8. Zivilkammer, 308 O 27/09 (2010), but contrary to the
US case in Germany the claim was successful and YouTube was held liable for the infringing content by
third parties.
21
A U.S. example of a secondary liability claim for trademark infringement against an internet auction is
Tiffany Inc. v eBay, Inc., 576 F. Supp. 2d 463, 527 (S.D.N.Y. 2008). Examples in the EU include the
French cases and the Belgian case. In France: Hermès v eBay, Troyes High Court (June 4, 2008), Docket
No. 06/0264 and the LV v eBay cases, which were actually four cases (Parfums Christian Dior et autres /
eBay Inc, eBay International AG, Tribunal de commerce de Paris 1ère chambre B Jugement du 30 juin
2008. Louis Vuitton Malletier / eBay Inc., eBay International AG, Tribunal de commerce de Paris 1ère
chambre B Jugement du 30 juin 2008. Christian Dior Couture / eBay Inc., eBay International AG, Tribunal
de commerce de Paris 1ère chambre B Jugement du 30 juin 2008. In these French cases the claim against
the internet auction was successful. In the comparable Belgian case Lancôme Parfums et Beaute v eBay
Int’l AG, Tribunal de Commerce de Bruxelles, July 31, 2008, the claim was not succesful.
22
Hard Rock Café Licensing Corp. v Concession Services Inc. (Hard Rock Café), 955 F.2d 1143, 1149
(7th
Cir. 1992).
23
Id.
by which is meant that if
24
17 USC § 512(c)(1)(A)(ii), supra note 13.
25
Article 14(1)(a) E-Commerce Directive, supra note 12
26
“In determining whether the service provider was aware of a ‘‘red flag,’’ the subjective awareness of the
service provider of the facts or circumstances in question must be determined. However, in deciding
whether those facts or circumstances constitute a ‘‘red flag’’—in other words, whether infringing activity
would have been apparent to a reasonable person operating under the same or similar circumstances— an
objective standard should be used.” Thomas Bliley, Committee on Commerce, submitted the following
report to the Committee of the Whole U.S. House of Representatives, together with additional views to
accompany H.R. 2281 (1998) 53.
6. the OSP comes across these it must pay special attention to it and act, otherwise the
exemption of intermediary liability will be lifted.
Another problem is that because of the fear to fall outside the exemption of
liability some OSPs uncritically remove content after mistaken or bad faith complaints,27
One can observe a trend in jurisprudence of courts broadly interpreting eligibility
and neutrality. First, unlike the DMCA, under the E-Commerce Directive it was not
obvious to include internet reference services such as Google AdWords as an OSP, that
is, under certain circumstances, eligible for liability exemption.
which can have chilling effects to creativity, and potentially render the OSPs liable for
breaching the terms of service with the user.
Courts determine whether an OSP falls within the exemption of secondary
liability by distinguishing the lack of enforcement of the OSP as wilful or deliberate
ignorance from true ignorance. However, with ever faster evolving technology it is
increasingly difficult to maintain no-scienter. In fact, the tipping point of omniscience has
already reached spam and virus filter technologies.
Chapter 4 Neutral hosting or activist
28
However, in the case of
Google France and Google,29
27
Uncritical removal of mistaken or bad faith complaints has nothing to do with filtering, which is
distinguishing infringing from non-infringing material. Timothy Lee, “Warner Bros: we issued takedowns
for files we never saw, didn't own copyright to”, Ars Technica, November 10, 2011, available at:
Advocate General Maduro opined that “[t]here is nothing
in the wording of the definition of information society services to exclude its application
to the provision of hyperlinks and search engines, that is to say, to Google’s search
http://arstechnica.com/tech-policy/news/2011/11/warner-admits-it-issues-takedowns-for-files-it-hasnt-
looked-at.ars (accessed August 18, 2013).
28
The E-commerce Directive gives three categories of internet society services, that are eligible for liability
exemption: Article 12 “Mere conduit”, Article 13 “Caching” and Article 14 “Hosting” of the E-Commerce
Directive. In the U.S. the DMCA has a comparable system, but has an extra category for reference services;
17 USC § 512(a) Transitory Digital Network Communications; 17 USC § 512(b) System caching; 17 USC
§ 512(c) Information Residing on Systems or Networks At Direction of Users; 17 USC § 512(d)
Information Location Tools. Supra note 3
29
Case C-236/08 Google France SARL and Google Inc. v Louis Vuitton Malletier SA, Case (C-237/08)
Google France SARL v Viaticum SA and Luteciel SARL and Case C-238/08 Google France SARL v Centre
national de recherche en relations humaines (CNRRH) SARL and Others, Joined cases C-236 to C-239
(Google France and Google), Judgment of the CJEU, March 23, 2010.
7. engine and AdWords.”30
The CJEU in Google France and Google also concluded that
AdWords features all of the elements of the information society service definition.31
The Advocate General construed Article 15(1) E-Commerce Directive,32
not only
as preventing Member States from imposing on OSPs an obligation to generally monitor
the information carried or hosted, or actively to verify its legality, but also as the
expression of the principle that OSPs which seek to benefit from a liability exemption
should remain neutral as regards the information they carry or host.33
The Advocate General made a distinction between natural and sponsored results
of Google’s reference service. According to the Advocate General, natural results of the
search engine are a product of automatic algorithms,34
because: “Google has an interest –
even a pecuniary interest – in displaying the more relevant sites to the internet user;
however, it does not have an interest in bringing any specific site to the internet user’s
attention.”35
Since this is not the case with Google AdWords, the Advocate General
deems AdWords not a neutral information vehicle: “Google has a direct interest in
internet users clicking on the ads’ links (as opposed to the natural results presented by the
search engine).”36
Edwards pointed out that Google’s natural results are not
unmanipulated, and therefore their neutrality can be questioned too.37
The CJEU
considered, however, that “in order to establish whether the liability of a referencing
service provider may be limited under Article 14 E-Commerce Directive,38
30
Joined cases C-236 to C-238 Google France and Google, Opinion of Advocate General, September 22,
2009, para. 131.
it is necessary
to examine whether the role played by that service provider is neutral, in the sense that its
conduct is merely technical, automatic and passive, pointing to a lack of knowledge or
31
Google France and Google, CJEU judgment, supra note 29, para. 110.
32
Article 15 E-Commerce: “No general obligation to monitor (1) Member States shall not impose a general
obligation on providers, when providing the services covered by Articles 12 [Mere conduit], 13 [Caching]
and 14 [Hosting], to monitor the information which they transmit or store, nor a general obligation actively
to seek facts or circumstances indicating illegal activity.”
33
Google France and Google, Opinion of the Advocate General, supra note 30, para. 143.
34
Id., para. 144.
35
Id.
36
Id., para. 145.
37
Lilian Edwards, “Stuck in ‘Neutral’? Google, AdWords and the E-Commerce Directive Immunities”,
SCL The IT Community, available at: http://www.scl.org/site.aspx?i=ed14010 (accessed August 17, 2013).
38
Article 14 E-Commerce Directive, supra notes 12 and 13.
8. control of the data which it stores”,39
based on Recital 42 of the Preamble to the E-
Commerce Directive.40
However, the CJEU held that the payment terms and general information
provided by Google and which are under Google’s control,41
cannot deprive Google of
the exemptions from liability provided for in the E-Commerce Directive.42
The
relationship between keywords selected and the search terms entered by an internet user
is not sufficient of itself to justify the view that Google has knowledge of, or control over,
the data entered into its system by advertisers and stored in memory on its server.43
The CJEU held that the role played by Google in the drafting of the commercial
message which accompanies the advertising link or in the establishment or selection of
keywords might not be neutral,44
but leaves that decision to national courts.45
The CJEU was asked a similar question in L’Oréal and Others:46
whether eBay is
neutral because eBay instructed its clients in the drafting of advertisements and
monitored the contents of the listings. Advocate General Jääskinen stated that “I would
find it surreal that if eBay intervenes and guides the contents of listings in its system with
various technical means, it would by that fact be deprived of the protection of Article 14
regarding storage of information uploaded by the users.”47
The Advocate General in L’Oréal and Others doubted whether Recital 42 of the
Preamble to the E-Commerce Directive concerns hosting services.48
39
Google France and Google, CJEU judgment, supra note
The Advocate
General opined that it is not possible to sketch out parameters of a business model that
would fit perfectly to the hosting exemption: instead one should focus on the type of
29, para. 114.
40
Id., para. 113. Recital 42 of the Preamble to the E-Commerce Directive: “The exemptions from liability
established in this Directive cover only cases where the activity of the information society service provider
is limited to the technical process of operating and giving access to a communication network over which
information made available by third parties is transmitted or temporarily stored, for the sole purpose of
making the transmission more efficient; this activity is of a mere technical, automatic and passive nature,
which implies that the information society service provider has neither knowledge of nor control over the
information which is transmitted or stored.”
41
Google France and Google, CJEU judgment, supra note 29 para. 115.
42
Id., para. 116.
43
Id., para. 117.
44
Id., para. 118.
45
Id., para. 119.
46
Case C-324/09 L’Oréal SA and Others v eBay International AG and Others, (L’Oréal and Others),
Judgment of CJEU, July 12, 2011.
47
Case C-324/09 L’Oréal and Others, Opinion of the Advocate General, December 9, 2010, para. 146.
48
Id., para. 140. Recital 42 of the Preamble to the E-Commerce Directive, supra note 40.
9. activity, where it is clear that certain activities are exempt from liability, “all others are
not and remain in the ‘normal’ liability regimes of the Member States, such as damages
liability and criminal law liability.”49
According to the CJEU “[w]here the operator of an internet auction has provided
assistance which entails, in particular, optimising the presentation of the offers for sale in
question or promoting those offers, it must be considered not to have taken a neutral
position between the customer-seller concerned and potential buyers but to have played
an active role of such a kind as to give it knowledge of, or control over, the data relating
to those offers for sale. In such cases it cannot rely on the exemption from liability
referred to in Article 14(1) E-Commerce Directive.”
Therefore, the Advocate General argued that the
hosting exception does not exempt eBay from any potential liability it may incur in the
context of its use of a paid internet referencing service.
50
Whether this was so, the referring
court has to decide for itself.51
In Google France and Google52
and in L’Oréal and Others,53
Lessig made clear in his book CODE,
the Advocates
General wanted to grant an exemption of liability to the extent that the OSP’s conduct
falls within the activity of hosting. The CJEU argued that internet reference service
providers such as Google AdWords and eBay when they are drafting and suggesting
promotional texts might not be neutral, but let this decision to the national courts.
54
49
Id., para. 149.
that code, or digital architecture, shapes
law. But one can argue it also shapes infringements. If one assumes that the algorithms of
an OSP to optimise the transactions between a third party and internet users, were merely
technical, automatic and passive, but have the result that they induce infringements, the
OSP has the option to fix this problem in the algorithms under their control after it
becomes aware of the problem. However, the practice shows that OSPs, instead of
structurally solving existent problems, seem to prefer to only remove or disable access
50
L’Oréal and Others, CJEU, supra note 46, para. 116. Article 14(1) E-Commerce Directive, supra notes
12 and 13.
51
Id., para. 117.
52
Supra note 29.
53
Supra note 46.
54
L Lessig, Code and Other Laws of Cyberspace (1999).
10. after each single notice and takedown request,55
Based on Section 512(c)(1)(A)(i)-(ii) DMCA
out of fear to fall outside the liability
exemption of the safe harbour provisions.
Chapter 5 Schools of thought on duty of care
56
in the U.S., and Recital 46 of the
Preamble to the E-Commerce Directive57
and Article 14(1)(a) E-Commerce Directive58
in the EU, OSPs with actual knowledge, or if they are aware of facts or circumstances
that infringing activity is apparent, should expeditiously remove or disable access to such
information. Otherwise their exemption of intermediary liability will be lifted. These
provisions are a disincentive for OSPs to monitor infringements by third parties on their
servers. This is amplified by Section 512(m)(1) DMCA59
in the U.S., and Recital 47 of
the Preamble to the E-Commerce Directive60
and Article 15 E-Commerce Directive61
in
the EU that prohibit the imposition of a general obligation on OSPs to monitor the
information which they store. Beside this legislation, courts made the argument that
monitoring their servers is technologically impossible,62
burdensome and too costly63
55
In Viacom Int’l v YouTube, Inc., supra note
for
16, ultimately the Second Circuit held that YouTube’s
obligation did not go further than removing individually identified infringements. “The Football
Association also cited examples of works that had been the subject of several takedown notices but that
reappear on YouTube’s website with alarming regularity. That should be a red flag, it argued, telling the
court that the DMCA should not merely facilitate the “endless whack-a-mole” process of takedown notices
that only deal with single clips when YouTube’s own records tell it how often a particular work has been
the subject of a takedown notice.” Dickson, supra note 16, at 12.
56
17 § 512(c)(1)(A)(i) supra note 12 and 17 § 512(c)(1)(A)(ii) supra note 13.
57
Recital 46 of the Preable to the E-Commerce Directive.
58
Article 14(1)(a) E-Commerce Directive, supra note 12.
59
Even though an OSP is aware of pervasive intellectual property infringement, “however, flagrant and
blatant”, this does not impose liability on the OSP, because it “furnishes at most a statistical estimate of a
chance any particular posting is infringing (…).”Viacom Int’l Inc. v YouTube, Inc., supra note 10.
17 USC § 512(m): “Protection of Privacy.— Nothing in this section shall be construed to condition the
applicability of subsections (a) through (d) on— (1) a service provider monitoring its service or
affirmatively seeking facts indicating infringing activity, except to the extent consistent with a standard
technical measure complying with the provisions of subsection (i).”
60
Recital 47 of the Preamble to the E-Commerce Directive: “Member States are prevented from imposing a
monitoring obligation on service providers only with respect to obligations of a general nature; this does
not concern monitoring obligations in a specific case and, in particular, does not affect orders by national
authorities in accordance with national legislation.”
61
Supra note 32.
62
The Court of Appeal in Leeuwarden’s statement “[t]hat a filter to compare pictures well still has to be
invented” demonstrates that the court is not aware of technical possibilities already available. Interestingly,
the Netherlands Organisation of Applied Scientific Research (TNO) was not able to explain that a further
distinction can be made within an automatic selection of pictures of similar chairs. Stokke v Marktplaats,
Gerechtshof Leeuwarden, 107.001.948/01, BW6296, May 22, 2012, para. 8.7.
11. OSPs, and would make their business models unfeasible.64
In the EU, Article 3
Enforcement Directive includes these arguments for prohibiting effective enforcement.65
In 2012, in Stokke v Marktplaats,
However, the obligation to filter will be increased concomitant with the progress of filter
technology. Therefore it is ineluctable that filter technology will bridge the gap between
the safe harbour and strict liability for OSPs.
66
the Dutch Court of Appeal in Leeuwarden
weighed the pecuniary disadvantages for the proprietor Stokke of having to outsource the
monitoring and notification process for infringements on the internet auction and those of
the internet auction to filter in such a way that repeat infringements will be prevented.
The Court of Appeal reasoned that since Stokke had to spend € 700, per year, and
adaption of the internet auction’s system to filter its servers, would cost a multitude of €
700, per year, that the proportionality principle of Article 3(2) Enforcement Directive,67
would preclude that the internet auction needed to adapt its system.68
In the U.S., although the DMCA does not require OSPs to take affirmative action
to monitor infringing material,
However, the Court
of Appeal seems to have forgotten that if one wants to make an economic trade-off, one
should realise that not only Stokke but a multitude of other proprietors have to bear the
costs of monitoring and notifying the internet auction. If this would have been taken into
account, the equation would have looked different.
69
63
Ginsburg wrote a contrario that “the more reliable and less burdensome the filter, the more likely courts
are to favor its implementation.“ JC Ginsburg, ‘Separating the Sony Sheep From the Grokster Goats:
Reckoning the Future Business Plans of Copyright-Dependent Technology Entrepreneurs’(2008) 50 ARIZ.
L. REV. 577, 587.
64
“Applying this doctrine to a host provider like RICARDO or eBay, that opens a platform for an internet
auction, leads to the conclusion that there can be no ex ante examination of any infringing content of the
vendors may want to put up for sale. If the host provider was expected to screen and control any contents
before it is offered on the internet, this would clearly mean the end of such a business model.” Bornkamm
J, ‘E-Commerce Directive vs. IP Rights Enforcement – Legal Balance Achieved’ (2007) GRUR INT’L 642.
65
Article 3 Directive 2004/48/EC of the European Parliament and of the Council of April 29, 2004 on the
enforcement of intellectual property rights (Enforcement Directive): “Member States shall provide for the
measures, procedures and remedies necessary to ensure the enforcement of the intellectual property rights
covered by this Directive. (1): fair and equitable and shall not be unnecessarily complicated or costly, or
entail unreasonable time-limits or unwarranted delays. (2) Those measures, procedures and remedies shall
also be effective, proportionate and dissuasive and shall be applied in such a manner as to avoid the
creation of barriers to legitimate trade and to provide for safeguards against their abuse.”
monitoring consistent with a standard technical measure
66
Stokke v Marktplaats, supra note 62
67
Supra note 65.
68
Stokke v Marktplaats, supra note 62, para. 10.5.
69
Viacom Int’l Inc. v YouTube, Inc., supra note 10, at 524.
12. as stated in Section 512(i)(2) DMCA70
is required to be eligible for the liability
exemption. However, such a standard for monitoring infringements does not exist.71
In 2009, in L’Oréal v eBay Justice Arnold of the High Court of England and
Wales was “not entirely clear if English law is fully compliant with the requirements of
Article 11 Enforcement Directive.72
Justice Arnold referred some questions to the CJEU
for a preliminary ruling, which included the request for guidance on Article 14 E-
Commerce Directive as a defence for OSPs,73
and on the scope of relief of which Article
11 Enforcement Directive requires National courts to grant.74
Especially the third
sentence of Article 11 Enforcement Directive75
is relevant: “Member States shall also
ensure that right holders are in a position to apply for an injunction against intermediaries
whose services are used by a third party to infringe an intellectual property right, without
prejudice to Article 8(3) of Directive 2001/29/EC.” Judge Arnold explained that although
there is a European Directive harmonising the liability of OSPs, there is none
harmonising intermediary liability in case of intellectual property infringements.76
Even though an OSP that meets the criteria of Article 14(1) E-Commerce
Directive77
so that it is exempted from liability, it can still be required to filter, based on
Article 14(3) E-Commerce Directive,78
70
17 USC § 512(i)(2): “Definition.— As used in this subsection, the term “standard technical measures”
means technical measures that are used by copyright owners to identify or protect copyrighted works and—
(A) have been developed pursuant to a broad consensus of copyright owners and service providers in an
open, fair, voluntary, multi-industry standards process; (B) are available to any person on reasonable and
nondiscriminatory terms; and (C) do not impose substantial costs on service providers or substantial
burdens on their systems or networks.”
71
A ‘best available technology standard’ of filtering was suggested by Helman and Parchomovsky, but
remains elusive. L Helman & G Parchomovsky, ‘The Best Available Technology Standard’(2011) 111
COLUM. L. REV. 1194.
72
L’Oréal S.A. and others v eBay International A.G. and others [2009] EWHC 1094 (Ch), para. 477.
Article 11 Enforcement Directive: “Injunctions: Member States shall ensure that, where a judicial decision
is taken finding an infringement of an intellectual property right, the judicial authorities may issue against
the infringer an injunction aimed at prohibiting the continuation of the infringement. Where provided for by
national law, non-compliance with an injunction shall, where appropriate, be subject to a recurring penalty
payment, with a view to ensuring compliance. Member States shall also ensure that rightholders are in a
position to apply for an injunction against intermediaries whose services are used by a third party to
infringe an intellectual property right, without prejudice to Article 8(3) of Directive 2001/29/EC.”
73
L’Oréal S.A. and others v eBay International A.G. and others [2009] EWHC 1094 (Ch), para. 481(v).
74
Id.
which promulgates that Member States’ legal
75
Supra note 72.
76
L’Oréal S.A. and others v eBay International A.G. and others [2009] EWHC 1094 (Ch), para. 1.
77
Supra notes 12 and 13.
78
Id.
13. systems can require the service provider to terminate or prevent an infringement or
establishing procedures governing the removal or disabling of access to information.
Between 2005 and 2008 the German Federal Court of Justice79
has demonstrated
in Internet Auction I,80
II81
and III82
that even though an OSP falls within the safe
harbour against intermediary liability of § 10 Sentence 1 Telemediagesetz,83
which is
Germany’s implementation of Article 14(1) E-Commerce Directive,84
it can still be held
liable based on so called Störerhaftung.85
The “Störerhaftung” could be interpreted as the
German implementation of the third sentence of Article 11 Enforcement Directive,86
which prescribes that member states shall ensure that proprietors are in a position to
apply for an injunction against intermediaries whose services are used by a third party to
infringe intellectual property.87
Consequence of this “interferer liability”, which excludes
the possibility of criminal enforcement or compensation of damages,88
is that a
preventive injunction against the intermediary can still be issued. When pointed by a
rights holder to a clearly recognisable infringement, the intermediary should not only
immediately stop the specific infringement, but also take fundamental precautions to
safeguard that no further corresponding infringement will take place. By applying
Störerhaftung based on Article 11 Enforcement Directive,89
the Federal Court of Justice
demonstrated that the safe harbour provision of Article 14(1) E-Commerce Directive90
79
Bundesgerichtshof (BGH), Federal Court of Justice is the highest court in the system of general, i.e. civil
and criminal jurisdiction in Germany.
80
Internet Auction Case I ZR 304/01 I, [2005] ETMR 25, March 11, 2004..
81
Internet Auction II Case I ZR 35/04, [2007] ETMR 70, April 17, 2007.
82
Internet Auction III Case I ZR 73/05 [2008] April 30, 2008.
83
§ 10 Sentence 1 Telemediagesetz = § 11 Satz 1 Teledienstegesetz 2001.
does not guarantee any safety for OSPs.
84
Supra notes 12 and 13.
85
Interferer liability is a specific German doctrine codified in Section 823 German Civil Code (Liability in
damages) and Section 1004 German Civil Code Right (Right to satisfaction of the possessor). German Civil
Code (Bürgerlichen Gesetzbuches), January 2, 2002.
86
Supra note 72.
87
Id.
88
If someone, intentionally or negligently harms the property of someone else, and causality can be
established to the infringement of a protected right he can be subject to an injunction. Although fault need
to be proven for a compensation claim or intent in case of criminal enforcement, it is not needed for an
injunction. A Rühmkorf, ‘eBay on the European Playing Field: A Comparative Case Analysis of L’Oréal v
eBay’ (2009) 6 SCRIPTed 695.
89
Supra note 72.
90
Supra notes 12 and 13.
14. Chapter 6 What degrees of monitoring obligations are prescribed?
Different jurisprudence demonstrates that the prescribed degree of monitoring has
led to divergent views. One can distinguish two groups of monitoring obligations: before
and after any notification of infringement. The latter group can be divided into the
following monitoring obligations to prevent further infringements:91
- In case the identity of the infringer is known and the identity of the goods that are being
infringed are known. This degree of monitoring is suggested by the Advocate General in
L’Oréal v eBay.92
- In case the kind of infringement is known. This can provide clues of how to prevent
similar infringements. For example, as mentioned in the Internet Auction cases,
This seems arbitrary, since it would not address known infringers who
infringe a slightly different copyright or trademark; nor would it address a repeat
infringer operating under a different name.
- In case the identity of the infringer or his internet protocol address is known. This
would enable to check whether the known infringer has changed his ways for the good.
93
one
could monitor watches that were offered as new Rolex hours, under a certain price. Or
obviously keywords that Google AdWords suggested, such as “imitation” or “copy”, in
combination with the trademark Louis Vuitton, as was established in Google France and
Google.94
However, the most effective and efficient monitoring is pre-upload filtering,
which is based on comparing trademark or copyright information with information stored
by rights holders in a database. Also in case of internet auctions, the authentication of
products can be checked via unique identity numbers. Bornkamm clarified that the E-
Commerce Directive95
prohibits the imposition of such an ex ante duty to monitor.96
91
“[O]nce a right has been infringed, the host provider may be required not only to terminate the
infringement but also to prevent further infringements (ex post situation). Injunctive relief as to further
infringements would therefore not be ruled out.” Bornkamm, supra note 64, at 643.
92
L’Oréal and Others, Opinion of the Advocate General, supra note 47, para. 182.
93
Supra notes 80, 81 and 82.
94
Google France and Google, supra note 29, para. 101.
95
Supra note 3.
96
“The directive would expressly prohibit the imposition of any duty to monitor the
information stored on their site prior to the committing of the tort (ex ante situation).” Bornkamm, supra
note 64, at 643.
15. Justice Arnold came up with a comprehensive list of ways eBay Europe could
monitor more effectively.97
However, he also made it clear that these measures are not
necessarily a legal obligation to eBay Europe.98
The argument that attaching strict liability to OSPs would make their services not
sustainable can be refuted by referring to several thriving industries including photo
finishers,
Chapter 7 Implications of strict liability
99
book sellers, newsstands and computer software retailers,100
that are held
strictly liable for the infringing works they distribute. If one would implement a strict
liability regime to OSPs one does not need to enter entirely uncharted waters: Hong Kong
still lacks any safe harbour provisions for secondary liability for OSPs, and the OSPs in
the Special Administrative Region seem not to have experienced any adverse effects.101
97
“I am in no doubt that it would be possible for eBay Europe to do more than they currently do. For
example, it would appear to be possible for eBay Europe to take some or all of the following steps,
although some would be more technically challenging and costly than others: (i) filter listings before they
are posted on the Site; (ii) use additional filters, including filters to detect listings of testers and other not-
for-sale products and unboxed products; (iii) filter descriptions as well as titles; (iv) require sellers to
disclose their names and addresses when listing items, at least when listing items in a manner which
suggests that they are selling in the course of trade; (v) impose additional restrictions on the volumes of
high risk products, such as fragrances and cosmetics, that can be listed at any one time; (vi) be more
consistent in their policies, for example regarding sales of unboxed products; (vii) adopt policies to combat
types of infringement which are not presently addressed, and in particular the sale of non-EEA goods
without the consent of the trade mark owners; (viii) take greater account of negative feedback, particularly
feedback concerning counterfeits; (ix) apply sanctions more rigorously; and (x) be more rigorous in
suspending accounts linked to those of users whose accounts have been suspended (although it is fair to say
that the evidence is that eBay Europe have recently improved their performance in this regard). Arnold J.
writes in L’Oréal S.A. and others v eBay International A.G. and others, supra note 72, para. 77.
98
Arnold J, id.
99
Olan Mills, Inc. v Linn Photo Co., 23 F.3d 1345 (8th Cir. 1994).
100
Ronald H. Brown and Bruce A. Lehman, ‘Intellectual Property And The National Information
Infrastructure The Report Of The Working Group On Intellectual Property Rights’(1995) USPTO, 116.
101
By definition a safe harbour is a provision of a statute or a regulation that specifies that certain conduct
will be deemed not to violate a given rule. It is in other words an exception to the rule. Hong Kong still
adheres to the rule, namely strict liability for OSPs in regard to intellectual property infringements. Despite,
that there have not been any salient cases of Hong Kong OSPs being sued for intermediary liability in
connection with intellectual property infringements, yet, the Special Administrative Region is considering
to implement limitations to intermediary liability for copyright infringement as part of the amendment of
the Copyright Ordinance; Copyright (Amendment) Bill 2011. Although the safe harbour provisions, if
implemented, will be supported by a non-statutory Code of Practice for OSPs, which sets out practical
guidelines and procedures, and can be changed more easily than a statute. The public has been consulted on
each of the two drafts of the Code of Practice for OSPs. Consultation on Draft Code of Practice for the
reference of Online Service Providers (8 August 2011 to 9 September 2011, LC Paper No. CB(1)750/11-
12(02). Second Public Consultation on the draft Code of Practice for Online Service Providers to Section
88I of the Copyright Ordinance (Cap. 528) (31 January 2012 to 2 March 2012). The progress of the
Copyright (Amendment) Bill 2011 can be followed at the site of the Intellectual Property Department hong
16. Does strict liability harm the innovativeness or creativity of OSPs, as Zittrain
implied?102
Strict liability would have the additional advantage that OSPs do not have to give
away the personal information of their users, thereby protecting their privacy. OSPs could
decide their own sanctions against infringers and repeat infringers, giving them a fee,
restricting or slowing down their access, blocking their account or raising their awareness
by letting them complete a tutorial.
Not necessarily: legal certainty about the exact boundaries of the OSPs’
conduct can lay bare enormous creative energy. OSPs would take into account the strict
liability, therefore effective and efficient ways to filter against intellectual property
infringements would be just another factor by which an OSP can distinguish itself in
competition with other OSPs.
103
Kong here:
OSPs are in the best position to filter. They can integrate the enforcement of
intellectual property into the set up of their activities. This potentially makes the
intellectual property enforcement by the OSPs the most cost-efficient. Therefore it is
preferable, after a reasonable transition period, to abolish the safe harbour provisions and
implement strict liability to OSPs, and increase legal certainty for all parties involved.
http://www.ipd.gov.hk/eng/intellectual_property/copyright/copyright_2011_bill.htm (available
September 23, 2013).
102
“Gated communities offer a modicum of safety and stability to residents as well as a manager to
complain to when something goes wrong. But from a generative standpoint, these moated paradises can
become prisons. Their confinement is less than obvious, because what they block is not escape but
generative possibility: the ability of outsiders to offer code and services to users, and the corresponding
opportunity of users and producers to influence the future without a regulator’s permission.” JL Zittrain,
The Future of the Internet – And How to Stop It (Yale University Press 2008) 165.
103
One can doubt the effectiveness of eBay’s tutorials, L’Oréal S.A. and others v eBay International A.G.
and others, supra note 72: fourth defendant completed six tutorials, para. 112; fifth defendant completed
four tutorials, para. 137; sixth defendant completed seven tutorials, para. 169.