SlideShare a Scribd company logo
1 of 31
Andrés Guadamuz SCRIPT – University of Edinburgh The Evolving Role of Intermediaries: The Challenge of Regulating Their Liability
[Insert Apology]
"The Internet is a worldwide network of computers that contains millions of pages of information. Users are cautioned that many of these pages include offensive and inappropriate material. In general, it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an email address on the internet may lead to receipt of unsolicited e-mail containing offensive content. A user accessing the internet does so at his/her own risk. Hotel X and its affiliates are not responsible for material viewed or downloaded by users from the internet."   Wifi at my hotel
Internet Service Provider (ISP) Online services Google Facebook Twitter User generated content sites Blogger YouTube Flickr Internet café Hotel University Workplace Restaurants What is an Intermediary?
Early history
Are intermediaries liable for content placed by their Customers?
Compuserve was a Bulletin Board Service, a dial-in pre WWW system.  Defamation case. Compuserve hosted forums managed by a third party.  Rumorville, a newsletter provider, posted defamatory content against Cubby Inc, who sued for libel and unfair competition.  United States District Court for the Southern District of New York which held that Internet service providers were subject to traditional defamation law for their hosted content. This ruling set the stage for various similar intermediary cases in the U.S. Cubby v Compuserve (1991)
An unknown person, purporting to be Dr Laurence Godfrey, a lecturer in physics, mathematics and computer science based in London , made a defamatory posting which appeared on Demon's news server in the UK .  The posting could be read by Demon's customers.  When Mr Godfrey asked Demon to remove the posting (having explained that it was a forgery), Demon did not do so.  The court found that up until receiving notification of the existence of the allegedly defamatory posting, Demon could not have had sufficient reason to suspect that it was not made by Mr Godfrey. However, from the point that actual knowledge was received, the defence was no longer available. Godfrey v Demon (1999)
Liguecontre le racisme et l'antisémitisme (LICRA) complained that Yahoo! were allowing their online auction service to be used for the sale of memorabilia from the Nazi period. These facts were not contested during the case. The defense rested on the fact that these auctions were conducted under the jurisdiction of the United States. It was claimed that there were no technical means to prevent French residents from participating in these auctions, at least without placing the company in financial difficulty and compromising the existence of the Internet. The defendants noted    1. that their servers were located on US territory,    2. that their services were primarily aimed at US residents,    3. that the First Amendment to the United States Constitution guarantees freedom of speech and expression, and that any attempt to enforce a judgment in the United States would fail for unconstitutionality. As such, they contended that the French court was incompetent to hear the case. LICRA v. Yahoo! (2000)
Limiting Intermediary Liability
Article 10. Limitations and Exceptions (1) Contracting Parties may, in their national legislation, provide for limitations of or exceptions to the rights granted to authors of literary and artistic works under this Treaty in certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. (2) Contracting Parties shall, when applying the Berne Convention, confine any limitations of or exceptions to rights provided for therein to certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. WIPO Copyright Treaty 1996
§ 512. Limitations on liability relating to material online (Safe Harbor) (a) Transitory Digital Network Communications. […] (b) System Caching. […] (g) Replacement of Removed or Disabled Material and Limitation on Other Liability.—  (1) No liability for taking down generally.— Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider’s good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing.  Digital Millennium Copyright Act 1998
Article 12. "Mere conduit" 1. Where an information society service is provided that consists of the transmission in a communication network of information provided by a recipient of the service, or the provision of access to a communication network, Member States shall ensure that the service provider is not liable for the information transmitted, on condition that the provider: (a) does not initiate the transmission; (b) does not select the receiver of the transmission; and (c) does not select or modify the information contained in the transmission. E-Commerce Directive (2000/31/EC)
Article 5. Exceptions and limitations 1. Temporary acts of reproduction referred to in Article 2, which are transient or incidental [and] an integral and essential part of a technological process and whose sole purpose is to enable: (a) a transmission in a network between third parties by an intermediary, or (b) a lawful use of a work or other subject-matter to be made, and which have no independent economic significance, shall be exempted from the reproduction right provided for in Article 2. Info Soc Directive (2001/29/EC)
Notice and TakeDown Regime
Intermediary Liability Redux
Grumblings about status quo
Case brought in 2007 U.S. TV channel Viacom sued YouTube (hence Google) for copyright infringement of videos uploaded by their customers. YouTube argued that most videos on YouTube are non-infringing, and they will take-down content (Safe Harbor). Case dismissed early 2010. Viacom v YouTube
The Belgian Society of Authors, Composers, and Publishers (Sabam) sued ISP Tiscali (later Scarlet).  Sabamwanted Tiscali to install filtering software in its network which would allegedly curb illicit filesharing in P2P networks. The first ruling in the District Court of Brussels agreed with the claimants based entirely on expert reports about the feasibility of deploying filtering systems. Appealed. Court of appeals referred to European Court of Justice (ECJ) specifically on question of injunctive relief against intermediaries. Sabam v Tiscali (2007-Present)
In 2007, Irish Recorded Music Association (IRMA) members sued Eircom, the largest broadband provider in Ireland, over alleged illegal file sharing by subscribers.  IRMA had previously demanded that Eircominstall content filters or take other steps to block IRMA's copyrighted music from being shared, but they did not comply. Parties settled out of court in January 2009. As a result, Eircom agreed to implement a three-strikes system, where alleged infringers will be detected by the record companies, IP addresses notified to Eircom, and users disconnected (after warnings) by Eircom. In August 2009 Eircom began filtering PirateBay.org to mixed results.  Irish Recording Music Association (IRMA) v Eircom (2007-2009)
iiNet is an Australian internet provider, which was sued by Australian film producer Roadshow Films, part of the Village Roadshow conglomerate, and several Holywood studios. Test case for new ISP liability.  The question at the heart of the proceedings was whether an ISP is to be held liable for the copyright infringement committed by its customers. The judge accurately identified that the case hinged on two simple questions.   Have the iiNet customers infringed copyright directly?  Yes.   Has iiNetauthorised the copyright infringement of its users by failing to take steps to stop it from happening? No. Under appeal. Roadshow Films v iiNet (2010)
Disconnection, Graduated Responses and Three Strikes
“Haute Autorité pour la diffusion des oeuvres et la protection des droitssur Internet ” (2009) Troubled passage through parliament.  In June 2009 French Constitutional Court extended freedom of expression to include “freedom to access the internet”. New graduated response passed in Parliament. Warning stage Investigations by rightholders’ accredited agents  Rightholders can put their cases  The HADOPI examines the facts (swiftly) Disconnection phase:  Only court can disconnect (up to one month) HADOPI maintains list of banned subscribers HADOPI
Adopted in July 2009. Article 133bis of the Korean Copyright Act. Allows the Korean Copyright Commission to recommend ISPs to suspend the accounts of repeat file sharing offenders (as adjudged by the Commission) for six months.  Users' email accounts are not to be suspended. 30,000 notices have been sent (by September 2010). No person has been disconnected (yet). South Korea
Will establish a multi-tiered obligation for intermediaries.  ISP are under obligations to:  monitor user activity; Provide content owners with lists of copyright infringers; notify users of infringement reports; limit Internet access (slow down connection) Finally, the ISP will disconnect user. Costs are shared between ISP and content owner. Appeals procedure. Specifics of the regime are under review by the telecommunications regulator (OFCOM). Digital Economy Act (2010)
New trade agreement negotiated initially in secret between US, EU, Canada, South Korea, Japan, NZ, Australia, and others. Initially was supposed to include three strikes. Seriously watered-down due to political pressure in several countries (particularly Canada and Europe). Intermediary positions are now considerably lower. Maintains notice-and-take-down regimes to a large extent.  Anti-Counterfeiting Trade Agreement (ACTA)
Does it work?
Some emerging issues
The coming Cyberwar
The Great Intermediary War?
Questions?

More Related Content

What's hot

Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Concept and object of limitation
Concept and object of limitationConcept and object of limitation
Concept and object of limitationMADHUBALA SOLANKI
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Pleadings and its essentials
Pleadings and its essentialsPleadings and its essentials
Pleadings and its essentialsWajid Ali Kharal
 
Jurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionJurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionAkshay Sharma
 
Specific relief act.ppt
Specific relief act.pptSpecific relief act.ppt
Specific relief act.pptAmaresh Patel
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Composition of Arbitral Tribunal.
Composition of Arbitral Tribunal.Composition of Arbitral Tribunal.
Composition of Arbitral Tribunal.Bhargav Dangar
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
R.K, Anand vs. Registrar, Delhi High Court.
R.K, Anand vs. Registrar, Delhi High Court.R.K, Anand vs. Registrar, Delhi High Court.
R.K, Anand vs. Registrar, Delhi High Court.TreesaSunil
 

What's hot (20)

Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Concept and object of limitation
Concept and object of limitationConcept and object of limitation
Concept and object of limitation
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Cpc
CpcCpc
Cpc
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Pleadings and its essentials
Pleadings and its essentialsPleadings and its essentials
Pleadings and its essentials
 
Jurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protectionJurisdictional issues of e commerce and consumer protection
Jurisdictional issues of e commerce and consumer protection
 
Specific relief act.ppt
Specific relief act.pptSpecific relief act.ppt
Specific relief act.ppt
 
CRPC PPT
CRPC PPTCRPC PPT
CRPC PPT
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Commission order 26
Commission order 26Commission order 26
Commission order 26
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Composition of Arbitral Tribunal.
Composition of Arbitral Tribunal.Composition of Arbitral Tribunal.
Composition of Arbitral Tribunal.
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
R.K, Anand vs. Registrar, Delhi High Court.
R.K, Anand vs. Registrar, Delhi High Court.R.K, Anand vs. Registrar, Delhi High Court.
R.K, Anand vs. Registrar, Delhi High Court.
 

Viewers also liked

Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISPJaya Kamnani
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider pptPutri Sanuria
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Providerhazirma
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Gaurav Chordia
 
Internet service provider
Internet service providerInternet service provider
Internet service providerloizazeptania
 
AIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP PresentationAIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP PresentationmarkASsantiago
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
ISP business plan
ISP business plan ISP business plan
ISP business plan ontor omi
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systemsVishal Singh
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Viewers also liked (19)

Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
 
Isp
IspIsp
Isp
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Isp
IspIsp
Isp
 
ISP
ISPISP
ISP
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider
 
CH6
CH6CH6
CH6
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
 
AIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP PresentationAIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP Presentation
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
ISP business plan
ISP business plan ISP business plan
ISP business plan
 
E Payment
E PaymentE Payment
E Payment
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
 
ISP
ISPISP
ISP
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Internet Service Provider Liability

SCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawSCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawChris Marsden
 
Liberalization Intellectual Property Rights
Liberalization  Intellectual Property RightsLiberalization  Intellectual Property Rights
Liberalization Intellectual Property Rightslkipenis
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
March 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the USMarch 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the USCobaltSophie
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...beamatinet
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
Floundering towards EU information law
Floundering towards EU information lawFloundering towards EU information law
Floundering towards EU information lawblogzilla
 
Developments in intermediary liability
Developments in intermediary liabilityDevelopments in intermediary liability
Developments in intermediary liabilityAndres Guadamuz
 
Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet Emma Hart
 
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...LawScienceTech
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction PrimerGraham Smith
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the LawDavid Phillips
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...FIA2010
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)GrittyCC
 
Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V EsBrian Rowe
 
2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law ReviewGraham Smith
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liabilityEmily Laidlaw
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi lawsbsookman
 
International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014Giovanni Maria Riccio
 

Similar to Internet Service Provider Liability (20)

SCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawSCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet Law
 
Liberalization Intellectual Property Rights
Liberalization  Intellectual Property RightsLiberalization  Intellectual Property Rights
Liberalization Intellectual Property Rights
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
March 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the USMarch 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the US
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Floundering towards EU information law
Floundering towards EU information lawFloundering towards EU information law
Floundering towards EU information law
 
Developments in intermediary liability
Developments in intermediary liabilityDevelopments in intermediary liability
Developments in intermediary liability
 
Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet
 
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V Es
 
2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
 
International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014
 

More from Andres Guadamuz

Inteligencia Artificial, Propiedad Intelectual, y ODS
Inteligencia Artificial, Propiedad Intelectual, y ODSInteligencia Artificial, Propiedad Intelectual, y ODS
Inteligencia Artificial, Propiedad Intelectual, y ODSAndres Guadamuz
 
Do androids dream of electric copyright?
Do androids dream of electric copyright?Do androids dream of electric copyright?
Do androids dream of electric copyright?Andres Guadamuz
 
Metaverse: Some regulatory musings
Metaverse: Some regulatory musingsMetaverse: Some regulatory musings
Metaverse: Some regulatory musingsAndres Guadamuz
 
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...Andres Guadamuz
 
The Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse RebornThe Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse RebornAndres Guadamuz
 
Understanding the NFT Ecosystem
Understanding the NFT Ecosystem Understanding the NFT Ecosystem
Understanding the NFT Ecosystem Andres Guadamuz
 
Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)Andres Guadamuz
 
Ceci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-landCeci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-landAndres Guadamuz
 
Contratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativasContratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativasAndres Guadamuz
 
Ai and copyright: the way forward
Ai and copyright: the way forwardAi and copyright: the way forward
Ai and copyright: the way forwardAndres Guadamuz
 
AI Copyright international perspective
AI Copyright international perspectiveAI Copyright international perspective
AI Copyright international perspectiveAndres Guadamuz
 
Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?Andres Guadamuz
 
Cyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmaresCyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmaresAndres Guadamuz
 
All watched over machines of loving grace amsterdam
All watched over machines of loving grace  amsterdamAll watched over machines of loving grace  amsterdam
All watched over machines of loving grace amsterdamAndres Guadamuz
 
All watched over machines of loving grace
All watched over machines of loving graceAll watched over machines of loving grace
All watched over machines of loving graceAndres Guadamuz
 
Ready player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASISReady player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASISAndres Guadamuz
 

More from Andres Guadamuz (20)

Inteligencia Artificial, Propiedad Intelectual, y ODS
Inteligencia Artificial, Propiedad Intelectual, y ODSInteligencia Artificial, Propiedad Intelectual, y ODS
Inteligencia Artificial, Propiedad Intelectual, y ODS
 
Do androids dream of electric copyright?
Do androids dream of electric copyright?Do androids dream of electric copyright?
Do androids dream of electric copyright?
 
Distinctive brands game
Distinctive brands gameDistinctive brands game
Distinctive brands game
 
AI Copyright Authorship
AI Copyright AuthorshipAI Copyright Authorship
AI Copyright Authorship
 
Metaverse: Some regulatory musings
Metaverse: Some regulatory musingsMetaverse: Some regulatory musings
Metaverse: Some regulatory musings
 
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
 
The Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse RebornThe Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse Reborn
 
Understanding the NFT Ecosystem
Understanding the NFT Ecosystem Understanding the NFT Ecosystem
Understanding the NFT Ecosystem
 
Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)
 
Ceci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-landCeci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-land
 
Contratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativasContratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativas
 
Ai and copyright: the way forward
Ai and copyright: the way forwardAi and copyright: the way forward
Ai and copyright: the way forward
 
FALL: or Dodge in Hell
FALL: or Dodge in HellFALL: or Dodge in Hell
FALL: or Dodge in Hell
 
AI Copyright international perspective
AI Copyright international perspectiveAI Copyright international perspective
AI Copyright international perspective
 
Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?
 
Copyright and Art
Copyright and ArtCopyright and Art
Copyright and Art
 
Cyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmaresCyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmares
 
All watched over machines of loving grace amsterdam
All watched over machines of loving grace  amsterdamAll watched over machines of loving grace  amsterdam
All watched over machines of loving grace amsterdam
 
All watched over machines of loving grace
All watched over machines of loving graceAll watched over machines of loving grace
All watched over machines of loving grace
 
Ready player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASISReady player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASIS
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Internet Service Provider Liability

  • 1. Andrés Guadamuz SCRIPT – University of Edinburgh The Evolving Role of Intermediaries: The Challenge of Regulating Their Liability
  • 3. "The Internet is a worldwide network of computers that contains millions of pages of information. Users are cautioned that many of these pages include offensive and inappropriate material. In general, it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an email address on the internet may lead to receipt of unsolicited e-mail containing offensive content. A user accessing the internet does so at his/her own risk. Hotel X and its affiliates are not responsible for material viewed or downloaded by users from the internet."  Wifi at my hotel
  • 4. Internet Service Provider (ISP) Online services Google Facebook Twitter User generated content sites Blogger YouTube Flickr Internet café Hotel University Workplace Restaurants What is an Intermediary?
  • 6. Are intermediaries liable for content placed by their Customers?
  • 7. Compuserve was a Bulletin Board Service, a dial-in pre WWW system. Defamation case. Compuserve hosted forums managed by a third party. Rumorville, a newsletter provider, posted defamatory content against Cubby Inc, who sued for libel and unfair competition. United States District Court for the Southern District of New York which held that Internet service providers were subject to traditional defamation law for their hosted content. This ruling set the stage for various similar intermediary cases in the U.S. Cubby v Compuserve (1991)
  • 8. An unknown person, purporting to be Dr Laurence Godfrey, a lecturer in physics, mathematics and computer science based in London , made a defamatory posting which appeared on Demon's news server in the UK . The posting could be read by Demon's customers. When Mr Godfrey asked Demon to remove the posting (having explained that it was a forgery), Demon did not do so. The court found that up until receiving notification of the existence of the allegedly defamatory posting, Demon could not have had sufficient reason to suspect that it was not made by Mr Godfrey. However, from the point that actual knowledge was received, the defence was no longer available. Godfrey v Demon (1999)
  • 9. Liguecontre le racisme et l'antisémitisme (LICRA) complained that Yahoo! were allowing their online auction service to be used for the sale of memorabilia from the Nazi period. These facts were not contested during the case. The defense rested on the fact that these auctions were conducted under the jurisdiction of the United States. It was claimed that there were no technical means to prevent French residents from participating in these auctions, at least without placing the company in financial difficulty and compromising the existence of the Internet. The defendants noted 1. that their servers were located on US territory, 2. that their services were primarily aimed at US residents, 3. that the First Amendment to the United States Constitution guarantees freedom of speech and expression, and that any attempt to enforce a judgment in the United States would fail for unconstitutionality. As such, they contended that the French court was incompetent to hear the case. LICRA v. Yahoo! (2000)
  • 11. Article 10. Limitations and Exceptions (1) Contracting Parties may, in their national legislation, provide for limitations of or exceptions to the rights granted to authors of literary and artistic works under this Treaty in certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. (2) Contracting Parties shall, when applying the Berne Convention, confine any limitations of or exceptions to rights provided for therein to certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. WIPO Copyright Treaty 1996
  • 12. § 512. Limitations on liability relating to material online (Safe Harbor) (a) Transitory Digital Network Communications. […] (b) System Caching. […] (g) Replacement of Removed or Disabled Material and Limitation on Other Liability.— (1) No liability for taking down generally.— Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider’s good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing. Digital Millennium Copyright Act 1998
  • 13. Article 12. "Mere conduit" 1. Where an information society service is provided that consists of the transmission in a communication network of information provided by a recipient of the service, or the provision of access to a communication network, Member States shall ensure that the service provider is not liable for the information transmitted, on condition that the provider: (a) does not initiate the transmission; (b) does not select the receiver of the transmission; and (c) does not select or modify the information contained in the transmission. E-Commerce Directive (2000/31/EC)
  • 14. Article 5. Exceptions and limitations 1. Temporary acts of reproduction referred to in Article 2, which are transient or incidental [and] an integral and essential part of a technological process and whose sole purpose is to enable: (a) a transmission in a network between third parties by an intermediary, or (b) a lawful use of a work or other subject-matter to be made, and which have no independent economic significance, shall be exempted from the reproduction right provided for in Article 2. Info Soc Directive (2001/29/EC)
  • 18. Case brought in 2007 U.S. TV channel Viacom sued YouTube (hence Google) for copyright infringement of videos uploaded by their customers. YouTube argued that most videos on YouTube are non-infringing, and they will take-down content (Safe Harbor). Case dismissed early 2010. Viacom v YouTube
  • 19. The Belgian Society of Authors, Composers, and Publishers (Sabam) sued ISP Tiscali (later Scarlet). Sabamwanted Tiscali to install filtering software in its network which would allegedly curb illicit filesharing in P2P networks. The first ruling in the District Court of Brussels agreed with the claimants based entirely on expert reports about the feasibility of deploying filtering systems. Appealed. Court of appeals referred to European Court of Justice (ECJ) specifically on question of injunctive relief against intermediaries. Sabam v Tiscali (2007-Present)
  • 20. In 2007, Irish Recorded Music Association (IRMA) members sued Eircom, the largest broadband provider in Ireland, over alleged illegal file sharing by subscribers. IRMA had previously demanded that Eircominstall content filters or take other steps to block IRMA's copyrighted music from being shared, but they did not comply. Parties settled out of court in January 2009. As a result, Eircom agreed to implement a three-strikes system, where alleged infringers will be detected by the record companies, IP addresses notified to Eircom, and users disconnected (after warnings) by Eircom. In August 2009 Eircom began filtering PirateBay.org to mixed results. Irish Recording Music Association (IRMA) v Eircom (2007-2009)
  • 21. iiNet is an Australian internet provider, which was sued by Australian film producer Roadshow Films, part of the Village Roadshow conglomerate, and several Holywood studios. Test case for new ISP liability.  The question at the heart of the proceedings was whether an ISP is to be held liable for the copyright infringement committed by its customers. The judge accurately identified that the case hinged on two simple questions.  Have the iiNet customers infringed copyright directly?  Yes.  Has iiNetauthorised the copyright infringement of its users by failing to take steps to stop it from happening? No. Under appeal. Roadshow Films v iiNet (2010)
  • 23. “Haute Autorité pour la diffusion des oeuvres et la protection des droitssur Internet ” (2009) Troubled passage through parliament. In June 2009 French Constitutional Court extended freedom of expression to include “freedom to access the internet”. New graduated response passed in Parliament. Warning stage Investigations by rightholders’ accredited agents Rightholders can put their cases The HADOPI examines the facts (swiftly) Disconnection phase: Only court can disconnect (up to one month) HADOPI maintains list of banned subscribers HADOPI
  • 24. Adopted in July 2009. Article 133bis of the Korean Copyright Act. Allows the Korean Copyright Commission to recommend ISPs to suspend the accounts of repeat file sharing offenders (as adjudged by the Commission) for six months. Users' email accounts are not to be suspended. 30,000 notices have been sent (by September 2010). No person has been disconnected (yet). South Korea
  • 25. Will establish a multi-tiered obligation for intermediaries. ISP are under obligations to: monitor user activity; Provide content owners with lists of copyright infringers; notify users of infringement reports; limit Internet access (slow down connection) Finally, the ISP will disconnect user. Costs are shared between ISP and content owner. Appeals procedure. Specifics of the regime are under review by the telecommunications regulator (OFCOM). Digital Economy Act (2010)
  • 26. New trade agreement negotiated initially in secret between US, EU, Canada, South Korea, Japan, NZ, Australia, and others. Initially was supposed to include three strikes. Seriously watered-down due to political pressure in several countries (particularly Canada and Europe). Intermediary positions are now considerably lower. Maintains notice-and-take-down regimes to a large extent. Anti-Counterfeiting Trade Agreement (ACTA)