SlideShare a Scribd company logo
INTELLECTUAL PROPERTY IN
CYBERSPACE: HOW IT IS DIFFERENT
AND REGULATED IN THE EU
Prof. dr. Mindaugas Kiškis
mkiskis@mruni.eu / www.kiskis.eu
What is intellectual property (IP) in
cyberspace?
• Traditional forms of IP, which are
transacted (sold/purchased) in
cyberspace (tangible IP)
• Traditional forms of IP, which have
converted into electronic goods
(intangible IP)
• Entirely electronic forms of IP, which
are transacted
(sold/purchased/consumed) only in
cyberspace (intangible IP)
IP in cyberspace is more
susceptible to infringement and
infringement is more dangerous
Three tiers of IP infringement
in cyberspace
Infringements related to tangible IP
• Fake goods
• New platforms for
distribution (retail and
wholesale)
Infringements related to intangible IP
items
• Digital piracy
• Cyber espionage (theft of
know-how and commercial
secrets)
• Spoofing of legitimate sites
/ content (advertising fraud)
• Full digital transactions and
delivery
Novel infringements
• Intermediaries (abettors) of
infringement (Piratebay,
Megaupload)
• Online aggregation of illicit
goods/content/tools (e.g. pay
TV decrypting)
• Theft of virtual items in virtual
worlds
Why IP infringements in cyberspace
are more dangerous?
•Inherently cross-border
•Super scalable
•Very low cost
Responses
• Regulation / criminalization
• Education
• Training
• Are they sufficient ?
Regulation / criminalization
•Directive 2004/48/EC of 29 April 2004 on the
enforcement of intellectual property rights
•23 November 2001 Council of Europe
Convention on Cybercrime (effective 1 July 2004)
•Further initiatives on regulation have stalled
Convention on Cybercrime
• Article 10 – Offences related to infringements of copyright and related
rights
• Criminal liability for the infringement of copyright, where such acts are
committed wilfully, on a commercial scale and by means of a computer
system.
• Criminal liability for the infringement of related rights, where such acts are
committed wilfully, on a commercial scale and by means of a computer
system.
• Article 11 – Attempt and aiding or abetting
• Criminal liability for aiding or abetting the commission of any of the
offences established in accordance with Articles 2 through 10 with intent
that such offence be committed, when committed intentionally.
Legal issues
• Who may / shall initiate the enforcement?
• Commercial purpose / scale as a prerequisite of
infringement
• Legislation is vague and poorly drafted
• Not a serious crime = limited investigation means
• LT experience – omission of neighboring rights
Practical problems
• Difficult and expensive to track / investigate (multiple platforms,
cross-border)
• Difficult expensive enforcement (foreign parties unreachable)
• Non-cooperative users and intermediaries
• Robin Hood infringers (large damage, but no profit to infringer)
• Non-direct profit by perpetrators (advertising, backlinks,
domain/website resales)
Political problems
• Low priority (cost v. benefit; if no/little domestic IP is
infringed, then enforcement benefits mainly foreign
parties)
• Unhelpful public policies (copyright levies are based
on presumption of digital piracy – users feel entitled
to pirated content)
Technological problems
• Development of
sophistication and user-
friendliness of
anonymization/encryption
technologies
• Development of payment
options (premium SMS /
calls, cryptocurrencies)
Case examples
• Megaupload.com (abetting)
• Visosknygos.com (AllBooks)
(pirated digital book portal)
• Aludiski.com (indirect sales)
Thank you!
Prof. dr. Mindaugas Kiškis
mkiskis@mruni.eu / www.kiskis.eu

More Related Content

What's hot

Collisions in the digital paradigm short
Collisions in the digital paradigm short Collisions in the digital paradigm short
Collisions in the digital paradigm short
David Harvey
 
Ethics
EthicsEthics
Ethics
Pinny
 
digital law
digital lawdigital law
digital law
11tsk
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issues
Nickardo Salmon
 
Legal issues concerning social media & publicity
Legal issues concerning social media & publicityLegal issues concerning social media & publicity
Legal issues concerning social media & publicity
Natalie Yap
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Cengage Learning
 

What's hot (20)

Collisions in the digital paradigm short
Collisions in the digital paradigm short Collisions in the digital paradigm short
Collisions in the digital paradigm short
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 
Digital law
Digital lawDigital law
Digital law
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
Ethics
EthicsEthics
Ethics
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
digital law
digital lawdigital law
digital law
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
ECTA - Notification and Takedown in Italy
ECTA - Notification and Takedown in ItalyECTA - Notification and Takedown in Italy
ECTA - Notification and Takedown in Italy
 
I walden
I waldenI walden
I walden
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issues
 
Legal issues concerning social media & publicity
Legal issues concerning social media & publicityLegal issues concerning social media & publicity
Legal issues concerning social media & publicity
 
Fundamental of copy right law
Fundamental of copy right lawFundamental of copy right law
Fundamental of copy right law
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.
 

Similar to Intellectual Property in Cyberspace

Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
Mr Shipp
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
wtidwell
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
Sheetal Verma
 
Please write a against Rebuttal on these points 1 IP laws c.pdf
Please write a against Rebuttal on these points 1 IP laws c.pdfPlease write a against Rebuttal on these points 1 IP laws c.pdf
Please write a against Rebuttal on these points 1 IP laws c.pdf
shreedattaagenciees2
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).ppt
ssuserd26df0
 

Similar to Intellectual Property in Cyberspace (20)

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter5.ppt
Chapter5.pptChapter5.ppt
Chapter5.ppt
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Legal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas AfricaLegal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas Africa
 
ICANN Contract vs National Law
ICANN Contract vs National LawICANN Contract vs National Law
ICANN Contract vs National Law
 
Please write a against Rebuttal on these points 1 IP laws c.pdf
Please write a against Rebuttal on these points 1 IP laws c.pdfPlease write a against Rebuttal on these points 1 IP laws c.pdf
Please write a against Rebuttal on these points 1 IP laws c.pdf
 
Virtual worlds
Virtual worldsVirtual worlds
Virtual worlds
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics Frameworks
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
Whose content? whose revenue? who should be liable for a user's content? jo...
Whose content? whose revenue? who should be liable for a user's content?   jo...Whose content? whose revenue? who should be liable for a user's content?   jo...
Whose content? whose revenue? who should be liable for a user's content? jo...
 
Cyber law
Cyber lawCyber law
Cyber law
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).ppt
 
it act
it actit act
it act
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 

More from Mindaugas Kiskis

Vartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutartiesVartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutarties
Mindaugas Kiskis
 
Išmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbuiIšmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbui
Mindaugas Kiskis
 
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų  kuriamas turinys ir intelektinės nuosavybės teisėsVartotojų  kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisės
Mindaugas Kiskis
 
Iššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybeiIššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybei
Mindaugas Kiskis
 
Teisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėjeTeisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėje
Mindaugas Kiskis
 
Teisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos SąjungojeTeisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos Sąjungoje
Mindaugas Kiskis
 
Features of Canada's Innovation System
Features of Canada's Innovation SystemFeatures of Canada's Innovation System
Features of Canada's Innovation System
Mindaugas Kiskis
 

More from Mindaugas Kiskis (19)

Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigosAsmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
 
Privatumas Lietuvoje 2015 m.
Privatumas Lietuvoje 2015 m.Privatumas Lietuvoje 2015 m.
Privatumas Lietuvoje 2015 m.
 
Lietuvos verslo pasirengimas įgyvendinti GDPR
Lietuvos verslo pasirengimas įgyvendinti GDPRLietuvos verslo pasirengimas įgyvendinti GDPR
Lietuvos verslo pasirengimas įgyvendinti GDPR
 
Legal implications and consequances of GDPR
Legal implications and consequances of GDPRLegal implications and consequances of GDPR
Legal implications and consequances of GDPR
 
How to put intellectual property to a good use in your business?
How to put intellectual property to a good use in your business?How to put intellectual property to a good use in your business?
How to put intellectual property to a good use in your business?
 
Asmens teisės į privatumą apsauga
Asmens teisės į privatumą apsaugaAsmens teisės į privatumą apsauga
Asmens teisės į privatumą apsauga
 
Security and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic CommunicationSecurity and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic Communication
 
Intelektinės nuosavybės inovacijos
Intelektinės nuosavybės inovacijosIntelektinės nuosavybės inovacijos
Intelektinės nuosavybės inovacijos
 
Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)
 
Vartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutartiesVartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutarties
 
Išmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbuiIšmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbui
 
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
 
Creative commons
Creative commonsCreative commons
Creative commons
 
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų  kuriamas turinys ir intelektinės nuosavybės teisėsVartotojų  kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisės
 
Iššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybeiIššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybei
 
Teisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėjeTeisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėje
 
Teisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos SąjungojeTeisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos Sąjungoje
 
Features of Canada's Innovation System
Features of Canada's Innovation SystemFeatures of Canada's Innovation System
Features of Canada's Innovation System
 
Biobankų veiklos įteisinimas Lietuvoje
Biobankų veiklos įteisinimas LietuvojeBiobankų veiklos įteisinimas Lietuvoje
Biobankų veiklos įteisinimas Lietuvoje
 

Recently uploaded

Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 

Recently uploaded (18)

Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Application of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of lawsApplication of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of laws
 
Chambers Global Practice Guide - Corporate M&A 2024 - Canadian M&A
Chambers Global Practice Guide - Corporate M&A 2024 - Canadian M&AChambers Global Practice Guide - Corporate M&A 2024 - Canadian M&A
Chambers Global Practice Guide - Corporate M&A 2024 - Canadian M&A
 
7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf
 
Book review - Amartya Sen's Idea of Justice
Book review - Amartya Sen's Idea of JusticeBook review - Amartya Sen's Idea of Justice
Book review - Amartya Sen's Idea of Justice
 
indian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law studentindian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law student
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
Solidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South AfricaSolidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South Africa
 
Justice Advocates Legal Defence Firm
Justice Advocates Legal Defence FirmJustice Advocates Legal Defence Firm
Justice Advocates Legal Defence Firm
 
Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
 
Charge and its essentials rules Under the CRPC, 1898
Charge and its essentials rules Under the CRPC, 1898Charge and its essentials rules Under the CRPC, 1898
Charge and its essentials rules Under the CRPC, 1898
 

Intellectual Property in Cyberspace

  • 1. INTELLECTUAL PROPERTY IN CYBERSPACE: HOW IT IS DIFFERENT AND REGULATED IN THE EU Prof. dr. Mindaugas Kiškis mkiskis@mruni.eu / www.kiskis.eu
  • 2. What is intellectual property (IP) in cyberspace? • Traditional forms of IP, which are transacted (sold/purchased) in cyberspace (tangible IP) • Traditional forms of IP, which have converted into electronic goods (intangible IP) • Entirely electronic forms of IP, which are transacted (sold/purchased/consumed) only in cyberspace (intangible IP)
  • 3. IP in cyberspace is more susceptible to infringement and infringement is more dangerous
  • 4. Three tiers of IP infringement in cyberspace
  • 5. Infringements related to tangible IP • Fake goods • New platforms for distribution (retail and wholesale)
  • 6. Infringements related to intangible IP items • Digital piracy • Cyber espionage (theft of know-how and commercial secrets) • Spoofing of legitimate sites / content (advertising fraud) • Full digital transactions and delivery
  • 7. Novel infringements • Intermediaries (abettors) of infringement (Piratebay, Megaupload) • Online aggregation of illicit goods/content/tools (e.g. pay TV decrypting) • Theft of virtual items in virtual worlds
  • 8. Why IP infringements in cyberspace are more dangerous? •Inherently cross-border •Super scalable •Very low cost
  • 9. Responses • Regulation / criminalization • Education • Training • Are they sufficient ?
  • 10. Regulation / criminalization •Directive 2004/48/EC of 29 April 2004 on the enforcement of intellectual property rights •23 November 2001 Council of Europe Convention on Cybercrime (effective 1 July 2004) •Further initiatives on regulation have stalled
  • 11. Convention on Cybercrime • Article 10 – Offences related to infringements of copyright and related rights • Criminal liability for the infringement of copyright, where such acts are committed wilfully, on a commercial scale and by means of a computer system. • Criminal liability for the infringement of related rights, where such acts are committed wilfully, on a commercial scale and by means of a computer system. • Article 11 – Attempt and aiding or abetting • Criminal liability for aiding or abetting the commission of any of the offences established in accordance with Articles 2 through 10 with intent that such offence be committed, when committed intentionally.
  • 12. Legal issues • Who may / shall initiate the enforcement? • Commercial purpose / scale as a prerequisite of infringement • Legislation is vague and poorly drafted • Not a serious crime = limited investigation means • LT experience – omission of neighboring rights
  • 13. Practical problems • Difficult and expensive to track / investigate (multiple platforms, cross-border) • Difficult expensive enforcement (foreign parties unreachable) • Non-cooperative users and intermediaries • Robin Hood infringers (large damage, but no profit to infringer) • Non-direct profit by perpetrators (advertising, backlinks, domain/website resales)
  • 14. Political problems • Low priority (cost v. benefit; if no/little domestic IP is infringed, then enforcement benefits mainly foreign parties) • Unhelpful public policies (copyright levies are based on presumption of digital piracy – users feel entitled to pirated content)
  • 15. Technological problems • Development of sophistication and user- friendliness of anonymization/encryption technologies • Development of payment options (premium SMS / calls, cryptocurrencies)
  • 16. Case examples • Megaupload.com (abetting) • Visosknygos.com (AllBooks) (pirated digital book portal) • Aludiski.com (indirect sales)
  • 17. Thank you! Prof. dr. Mindaugas Kiškis mkiskis@mruni.eu / www.kiskis.eu