SlideShare a Scribd company logo
Slide 1




             Digital Copyright Technology
                   Policy Challenges
                                                        Bill Rosenblatt
                                           GiantSteps Media Technology Strategies
                                                  billr@giantstepsmts.com
                                                  bill @ i t t       t
                                                   www.giantstepsmts.com
                                                         212 956 1045

    © 2010
             GiantSteps
             Media Technology Strategies
                                                               1
Slide 2


                     The Background
              Digital Content is E
              Di it l C t t i Everywhere
                                    h
              Places
                   – User generated content sites
                   – File sharing networks
                   – “Warez” sites
                      Warez”
                   – Search engines
                   – Email
              Much of it is unauthorized copyrighted work
                                            py g
                   – E-book market growth draws more attention
                   – Especially with 3 incompatible major platforms

    © 2010
               GiantSteps
               Media Technology Strategies
                                             2
Slide 3


                     The Background
             Fronts i th I f i
             F t in the Infringement B ttl
                                    t Battle
                                             Legal
                                             Economic
                                             Behavioral
                                             Technical




    © 2010
              GiantSteps
              Media Technology Strategies
                                                  3
Slide 4


          Technical Responses to Infringement

     DRM a/k/a TPMs – proactive protection of digital content
     Filtering – gatekeeping of © content in networks and websites
     Secondary Liability – going after those who enable
      infringement through technology
     Free riding – addressing behaviors of search engines, blogs
                                                    engines blogs,
      etc. that use © content for their own benefit




    © 2010
             GiantSteps
             Media Technology Strategies
                                           4
Slide 5


          Technical Protection Measures/DRM

              Technology: used in e-books by most major publishers
                                   e-
                    – 3 major DRMs: Amazon, Adobe, Apple
              Covered in DMCA (17 USC 1201(a))
                    – C i i li h ki and t ffi ki i h ki t l
                      Criminalizes hacking d trafficking in hacking tools
                    – Result of agreement between telcos and media cos in early 1990s
              Key issues
                    – Liability is on hacker, not supplier of technology
                    – Lack of statutory exemptions for Fair Use and other use cases
                    – Lack of clarity over standard of “effectiveness” of DRM
                                                         effectiveness”
              Not an active area public policy now
                    – Was hot in the post-Napster era (2002-4)
                                     post-            (2002-
                    – Current area is video – “Selectable Output Control”
                                                                 Control”


    © 2010
               GiantSteps
               Media Technology Strategies
                                                    5
Slide 6


              Secondary Infringement Liability

       Who is liable when someone uses content w/o authorization?
             – Direct infringement: the actual uploader/downloader
                                               uploader/downloader
             – Secondary: aiding and abetting infringement (tools, services),
               or “looking the other way” for financial benefit
                                     way”
       17 USC 512 (DMCA) provides for takedown notices
             – Service providers can take content down in order to avoid liability
       M di industry wants to require service providers t take more steps t
        Media i d t          t t    i      i       id to t k          t    to
        filter unauthorized content
             – Viacom v. YouTube – in process
             – UMG v. Veoh – decided for Veoh in district court
       Technologies and costs are at issue
             – Proactive (filtering, DRM) vs. reactive (takedown notices) technologies
                         (        g,    ) vs.          (                )         g
             – Who pays – content owner or service provider?
    © 2010
                   GiantSteps
                   Media Technology Strategies
                                                      6
Slide 7


    Content Identification Technologies for
                    Filtering
                    Filt i
              Fingerprinting
                – Examining “plain” files to determine content identity
                              plain”
                – Various technologies for music and video
                – Leading vendor for text: Attributor
                – Used primarily by news publishers
              Watermarking
                – Reading hidden p -embedded codes in files
                         g        pre-
                                  pre
                – Not applicable to text content
                – Widely used for still images
                – S i providers e.g. Pi S
                  Service     id          PicScout
    © 2010
                 GiantSteps
                 Media Technology Strategies
                                               7
Slide 8


                                               Filtering Initiatives

           Video industry self-regulation attempt failed
                           self-
              – UGC Principles, 2007
           “Progressive response” a/k/a “Three strikes, you’re out” legislation
                         response”                       you’ out”
              – F
                France, Singapore, S K
                        Si         S. Korea
           Litigation
              – Morpheus file-sharing case in US, under appeal
                         file-
              – SABAM (music licensing) v. Scarlet (ISP) case in Belgium
           Efforts to include mandatory filtering in national broadband plan




    © 2010
                 GiantSteps
                 Media Technology Strategies
                                                          8
Slide 9


                FCC v. Brand X Decision (2005)

      Telcos exempt from content liability
             – © Infringement (and libel, fraud, etc.)
             – “Just the wires” – no ability to control content
                         wires”
      Telcos also run Internet services
             – Verizon
             – AT&T
      D i i said th t I t
       Decision id that Internet services are diff
                               t     i        different b t
                                                      t beasts
             – Not subject to common carrier liability exemptions
             – Therefore telcos can control content on their ISPs w/o risking loss of exemptions
      This frees telcos to control content on ISPs
             – Copyright filtering – doing it in exchange for content licenses
             – Net neutrality


    © 2010
                   GiantSteps
                   Media Technology Strategies
                                                      9
Slide 10


                                               Free Riding

     Book publishing – Google settlement
     News publishing
             – N litigation so f …
               No liti ti       far…
                                far
             – Associated Press hNews tagging technology
             – Antitrust inquiry in Germany
             – Dormant technology standards initiative (ACAP)
     Will become bigger issue as more news publishers put
      up pay walls

    © 2010
                 GiantSteps
                 Media Technology Strategies
                                                    10
Slide 11


     Consumer Concerns over Technologies

              DRMs
                           – Lack of interoperability (platform lock-in)
                                                                lock-in)
                           – Various technical glitches
              Filtering technologies
                           – False positives
                           – Due process, presumption of innocence
                                 process
                           – Network performance
              Free riding
                           – Negotiations taking place without consumer input
              Fair Use – applies to all of the above
                           – Of special concern in scholarly publishing
    © 2010
             GiantSteps
             Media Technology Strategies
                                                    11
Slide 12




                                           Bill Rosenblatt
                                           GiantSteps Media Technology Strategies
                                           billr@giantstepsmts.com
                                           212 956 1045
                                           www.giantstepsmts.com
                                              py g             gy
                                           copyrightandtechnology.com

    © 2010
             GiantSteps
             Media Technology Strategies
                                                              12

More Related Content

What's hot

The War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital EconomyThe War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital EconomyAdam Thierer
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010dixieyeager
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014dixieyeager
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaEddan Katz
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi lawsbsookman
 
Michael Demont DMCA Research Paper
Michael Demont DMCA Research PaperMichael Demont DMCA Research Paper
Michael Demont DMCA Research PaperMichael Demont
 
Video piracy and its Impact on indian film industry
Video piracy and its Impact on indian film industryVideo piracy and its Impact on indian film industry
Video piracy and its Impact on indian film industryVivek Dhupdale
 
Jornada CÚbicS: Social TV: People, Devices and Networks - Marie-José Montpetit
Jornada CÚbicS: Social TV: People, Devices and Networks - Marie-José MontpetitJornada CÚbicS: Social TV: People, Devices and Networks - Marie-José Montpetit
Jornada CÚbicS: Social TV: People, Devices and Networks - Marie-José MontpetitCREA CCMA
 
Ppt perkembangan-teknologi-informasi-abad-21-08-1996
Ppt perkembangan-teknologi-informasi-abad-21-08-1996Ppt perkembangan-teknologi-informasi-abad-21-08-1996
Ppt perkembangan-teknologi-informasi-abad-21-08-1996Ricky Gaskinz
 
Future Internet Enterprise Systems
Future Internet Enterprise Systems Future Internet Enterprise Systems
Future Internet Enterprise Systems ictseserv
 
Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...Hari Rajagopalan
 
Audiovisual Content Exploitation at FIA 15042010 NISV
Audiovisual Content Exploitation at FIA 15042010 NISVAudiovisual Content Exploitation at FIA 15042010 NISV
Audiovisual Content Exploitation at FIA 15042010 NISVroelandordelman.nl
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceGareth Niblett
 
Brian pickering introduction to seserv - seserv se workshop june 2012
Brian pickering   introduction to seserv - seserv se workshop june 2012Brian pickering   introduction to seserv - seserv se workshop june 2012
Brian pickering introduction to seserv - seserv se workshop june 2012ictseserv
 

What's hot (20)

The War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital EconomyThe War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital Economy
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Cyber and influence
Cyber and influenceCyber and influence
Cyber and influence
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 acta
 
From isp liability to isp cooperation international developments from us dm...
From isp liability to isp cooperation   international developments from us dm...From isp liability to isp cooperation   international developments from us dm...
From isp liability to isp cooperation international developments from us dm...
 
Jailbreaking OK'd by Librarian
Jailbreaking OK'd by LibrarianJailbreaking OK'd by Librarian
Jailbreaking OK'd by Librarian
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
 
Michael Demont DMCA Research Paper
Michael Demont DMCA Research PaperMichael Demont DMCA Research Paper
Michael Demont DMCA Research Paper
 
Video piracy and its Impact on indian film industry
Video piracy and its Impact on indian film industryVideo piracy and its Impact on indian film industry
Video piracy and its Impact on indian film industry
 
Jornada CÚbicS: Social TV: People, Devices and Networks - Marie-José Montpetit
Jornada CÚbicS: Social TV: People, Devices and Networks - Marie-José MontpetitJornada CÚbicS: Social TV: People, Devices and Networks - Marie-José Montpetit
Jornada CÚbicS: Social TV: People, Devices and Networks - Marie-José Montpetit
 
Ppt perkembangan-teknologi-informasi-abad-21-08-1996
Ppt perkembangan-teknologi-informasi-abad-21-08-1996Ppt perkembangan-teknologi-informasi-abad-21-08-1996
Ppt perkembangan-teknologi-informasi-abad-21-08-1996
 
Future Internet Enterprise Systems
Future Internet Enterprise Systems Future Internet Enterprise Systems
Future Internet Enterprise Systems
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...
 
What is DRM?
What is DRM? What is DRM?
What is DRM?
 
Audiovisual Content Exploitation at FIA 15042010 NISV
Audiovisual Content Exploitation at FIA 15042010 NISVAudiovisual Content Exploitation at FIA 15042010 NISV
Audiovisual Content Exploitation at FIA 15042010 NISV
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
 
CAPS at infoday
CAPS at infodayCAPS at infoday
CAPS at infoday
 
Brian pickering introduction to seserv - seserv se workshop june 2012
Brian pickering   introduction to seserv - seserv se workshop june 2012Brian pickering   introduction to seserv - seserv se workshop june 2012
Brian pickering introduction to seserv - seserv se workshop june 2012
 

Similar to Policy Challenges Around Digital Copyright

Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhoveimec.archive
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldforumdavignon
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Paolo Nesi
 
E commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.comE commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.comTop Grade Papers
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia filesApurva Vyas
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Thương mại di động M-Commerce
Thương mại di động M-CommerceThương mại di động M-Commerce
Thương mại di động M-CommerceCat Van Khoi
 
Content Opportunities in Revolutionary Times
Content Opportunities in Revolutionary TimesContent Opportunities in Revolutionary Times
Content Opportunities in Revolutionary TimesJohn Mancini
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?Lilian Edwards
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarElyssa Durant
 
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...Gerd Leonhard
 

Similar to Policy Challenges Around Digital Copyright (20)

The Trajectory Of DRM Technologies
The Trajectory Of DRM TechnologiesThe Trajectory Of DRM Technologies
The Trajectory Of DRM Technologies
 
Automating Notice And Takedown
Automating Notice And TakedownAutomating Notice And Takedown
Automating Notice And Takedown
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhove
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital world
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
Drm
DrmDrm
Drm
 
E commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.comE commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.com
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia files
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Digital rights management
Digital rights managementDigital rights management
Digital rights management
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Thương mại di động M-Commerce
Thương mại di động M-CommerceThương mại di động M-Commerce
Thương mại di động M-Commerce
 
Content Opportunities in Revolutionary Times
Content Opportunities in Revolutionary TimesContent Opportunities in Revolutionary Times
Content Opportunities in Revolutionary Times
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels Cyberwar
 
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
Gerd Leonhard International Economic Forum St Petersburg 2008 Future Of Copyr...
 

More from GiantSteps Media Technology Strategies

Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?GiantSteps Media Technology Strategies
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisGiantSteps Media Technology Strategies
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...GiantSteps Media Technology Strategies
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of CanberraGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...GiantSteps Media Technology Strategies
 

More from GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Policy Challenges Around Digital Copyright

  • 1. Slide 1 Digital Copyright Technology Policy Challenges Bill Rosenblatt GiantSteps Media Technology Strategies billr@giantstepsmts.com bill @ i t t t www.giantstepsmts.com 212 956 1045 © 2010 GiantSteps Media Technology Strategies 1
  • 2. Slide 2 The Background Digital Content is E Di it l C t t i Everywhere h  Places – User generated content sites – File sharing networks – “Warez” sites Warez” – Search engines – Email  Much of it is unauthorized copyrighted work py g – E-book market growth draws more attention – Especially with 3 incompatible major platforms © 2010 GiantSteps Media Technology Strategies 2
  • 3. Slide 3 The Background Fronts i th I f i F t in the Infringement B ttl t Battle  Legal  Economic  Behavioral  Technical © 2010 GiantSteps Media Technology Strategies 3
  • 4. Slide 4 Technical Responses to Infringement  DRM a/k/a TPMs – proactive protection of digital content  Filtering – gatekeeping of © content in networks and websites  Secondary Liability – going after those who enable infringement through technology  Free riding – addressing behaviors of search engines, blogs engines blogs, etc. that use © content for their own benefit © 2010 GiantSteps Media Technology Strategies 4
  • 5. Slide 5 Technical Protection Measures/DRM  Technology: used in e-books by most major publishers e- – 3 major DRMs: Amazon, Adobe, Apple  Covered in DMCA (17 USC 1201(a)) – C i i li h ki and t ffi ki i h ki t l Criminalizes hacking d trafficking in hacking tools – Result of agreement between telcos and media cos in early 1990s  Key issues – Liability is on hacker, not supplier of technology – Lack of statutory exemptions for Fair Use and other use cases – Lack of clarity over standard of “effectiveness” of DRM effectiveness”  Not an active area public policy now – Was hot in the post-Napster era (2002-4) post- (2002- – Current area is video – “Selectable Output Control” Control” © 2010 GiantSteps Media Technology Strategies 5
  • 6. Slide 6 Secondary Infringement Liability  Who is liable when someone uses content w/o authorization? – Direct infringement: the actual uploader/downloader uploader/downloader – Secondary: aiding and abetting infringement (tools, services), or “looking the other way” for financial benefit way”  17 USC 512 (DMCA) provides for takedown notices – Service providers can take content down in order to avoid liability  M di industry wants to require service providers t take more steps t Media i d t t t i i id to t k t to filter unauthorized content – Viacom v. YouTube – in process – UMG v. Veoh – decided for Veoh in district court  Technologies and costs are at issue – Proactive (filtering, DRM) vs. reactive (takedown notices) technologies ( g, ) vs. ( ) g – Who pays – content owner or service provider? © 2010 GiantSteps Media Technology Strategies 6
  • 7. Slide 7 Content Identification Technologies for Filtering Filt i  Fingerprinting – Examining “plain” files to determine content identity plain” – Various technologies for music and video – Leading vendor for text: Attributor – Used primarily by news publishers  Watermarking – Reading hidden p -embedded codes in files g pre- pre – Not applicable to text content – Widely used for still images – S i providers e.g. Pi S Service id PicScout © 2010 GiantSteps Media Technology Strategies 7
  • 8. Slide 8 Filtering Initiatives  Video industry self-regulation attempt failed self- – UGC Principles, 2007  “Progressive response” a/k/a “Three strikes, you’re out” legislation response” you’ out” – F France, Singapore, S K Si S. Korea  Litigation – Morpheus file-sharing case in US, under appeal file- – SABAM (music licensing) v. Scarlet (ISP) case in Belgium  Efforts to include mandatory filtering in national broadband plan © 2010 GiantSteps Media Technology Strategies 8
  • 9. Slide 9 FCC v. Brand X Decision (2005)  Telcos exempt from content liability – © Infringement (and libel, fraud, etc.) – “Just the wires” – no ability to control content wires”  Telcos also run Internet services – Verizon – AT&T  D i i said th t I t Decision id that Internet services are diff t i different b t t beasts – Not subject to common carrier liability exemptions – Therefore telcos can control content on their ISPs w/o risking loss of exemptions  This frees telcos to control content on ISPs – Copyright filtering – doing it in exchange for content licenses – Net neutrality © 2010 GiantSteps Media Technology Strategies 9
  • 10. Slide 10 Free Riding  Book publishing – Google settlement  News publishing – N litigation so f … No liti ti far… far – Associated Press hNews tagging technology – Antitrust inquiry in Germany – Dormant technology standards initiative (ACAP)  Will become bigger issue as more news publishers put up pay walls © 2010 GiantSteps Media Technology Strategies 10
  • 11. Slide 11 Consumer Concerns over Technologies  DRMs – Lack of interoperability (platform lock-in) lock-in) – Various technical glitches  Filtering technologies – False positives – Due process, presumption of innocence process – Network performance  Free riding – Negotiations taking place without consumer input  Fair Use – applies to all of the above – Of special concern in scholarly publishing © 2010 GiantSteps Media Technology Strategies 11
  • 12. Slide 12 Bill Rosenblatt GiantSteps Media Technology Strategies billr@giantstepsmts.com 212 956 1045 www.giantstepsmts.com py g gy copyrightandtechnology.com © 2010 GiantSteps Media Technology Strategies 12