SlideShare a Scribd company logo
1 of 33
Online Intermediaries and Liability
for Copyright Infringement
Lilian Edwards
and
Charlotte Waelde
AHRC Centre for Intellectual Property and Technology
Law
University of Edinburgh
Introductory themes and issues
Who are online intermediaries?
– Traditional, newer and “P2P”
Why have immunities for intermediaries?
– Policy factors
– Changes since P2P explosion
Copyright liability issues
Types of “general” immunity regimes
– Notice and take down (NTD)
Immunity and “P2P” intermediaries
Suing copyright infringer not intermediary
– Private copying – when downloading is legal?
– Disclosure and anonymity issues
Alternatives to suing intermediaries or infringers
Conclusions
On line intermediaries
“Traditional” =
– Internet Access Providers (IAPs)
– Internet Service Providers (ISPs) eg AOL
– Hosts/”portals” eg BBC, NY Times, Yahoo!
E.g. US Communications Decency Act 1996 s 230(c)– “Provider..
Of an interactive computer service”
Intended to protect ISPs, also applied to websites and moderator
of website, but NOT to EBay as distributor not publisher of
content (Grace v Ebay, 2004)
Eg, Singapore Electronic Transaction Act 1998, India IT Act 2000
both refer to “network service providers”
Newer online intermediaries
•On-line sellers/distributors of goods/services
•On-line auction sites
•Aggregators eg RSS readers
•Price comparison engines
•Search engines
•Universities & digitised archives
•Chat-rooms, fora, eGroups
•“Web logs” or blogs
•Mobile phone communications providers
EC E-Commerce Directive 2000
Art 2(a) - Information Society Service Providers (ISSPs) (see Arts 12-15)
Provider of an “information society service” defined as “any service normally
provided for remuneration, at a distance, by means of electronic equipment for
the processing (including digital compression) and storage of data, and at the
individual request of a recipient of a service.” Recipient is user, natural/legal
person.
Much wider than traditional ISP sector
Non-commercial? Search engines? Universities?
Services provided not WHOLLY at a distance? eg, tele-employer
P2P intermediaries??
P2P intermediaries
1. Centralised index P2P intermediaries eg first Napster
2. De-centralised model eg Grokster/KaZaA – user nodes, super-nodes
3. BitTorrent – files downloaded in chunks, every downloader also uploader –
hubs point to torrent files, tracker sites point to users. eXeem is eg P2P
implementation.
4. Freenet – encrypted files, also chunked, anonymised users.
5. “Open source” intermediaries eg BitTorrent – cf proprietary intermediaries,
eg, Napster, KaZaA.
Copyright intermediary worries
•Early cases – Scientology texts etc
•Caching
•P2P liability for illicit downloading of songs, video
•Hyperlinking liability (cf DMCA and ECD)
Policy issues around “general”
intermediary liability
•Policy/law often driven by libel/porn cases not copyright
•Early cases exclusively re ISPs, analogy to h/c publishers
•ISPs seen as identifiable targets with “deep pockets”, while original content
providers often anonymous, unlocatable, no resources, & (re copyright) bad PR
to sue your own customers
•ISPs transmit/host/publish huge amounts content, some dynamic, most out of
contractual control
•In practice, unable to monitor/check all this material, plus undesirable in terms
of privacy
•Thus, in toto, seen as subject to unmanageable burden if made liable as
ordinary publishers are for content provided by others
Policy outcomes to c 2000
•But - public interest in a flourishing ISP sector for public/commercial reasons
•States furthermore saw ISPs as natural gatekeepers to Internet – able to help
control porn, spam, etc
•Hence, immunities needed so that ISP could exert some though not total
control over 3rd party content without becoming liable for it – statutory reversal
of Prodigy case, which had encouraged “head in sand” approach.
•US CDA 1996 s 230 (c) eg gave ISPs total immunity in respect of content
provided by another party
•Later instruments – DMCA, ECD etc – gave less total immunity (see on)
But later policy factors emerge..
•ISPs/intermediaries took advantage of immunities granted but did NOT on
whole (tho cf BT Internet) take on voluntary monitoring/filtering role. Tendency
to see self as neutral businesses, not censors or state agents.
•On-line industry mainstreamed – less worry that liability would put it out of
business, cause off-shoring
•Interests of “victims” given short shrift compared to immunity for intermediaries
– esp IP rightsholders.
•Exponential growth in P2P music piracy
•Tacit knowledge that broadband as consumer business model based heavily
on illegal downloading
•MIPI, Australia, April 05 “There can be no doubt that the ISP industry's dirty
little secret is how much revenue they derive from the traffic in unauthorised
sound recordings.”
Legal regimes for intermediary
liability - 1
“Total liability”
– China etc – state censorship arm
– Original Australian Broadcasting Amendment Services (On Line
Services) Act 1999, re porn only – amended
“No Liability” or “Total immunity”
– US CDA 1996 c 230 (c) re publication libellous, obscene,
negligently misstating content not copyright: “No provider or
user of an interactive computer service shall be treated as the
publisher or speaker of any information provided by another
content provider“
– Problems – no incentive for ISP/host to pay any attention to
rights of victims, even on explicit notice – see Zeran v AOL ,
1997.
Legal regimes for intermediary
liability 2 – limited liability
Compromise. Encourages self regulation by intermediary.
US DMCA (copyright only) and EC ECD (“horizontal”) both espouse
functionality immunities for online intermediaries
“Mere conduit” immunity
“Caching” immunity
“Hosting” immunity. Most controversial. Main issue is notice and take down
(NTD)
“Linking/informational or locational tools” immunity – found in DMCA but not in
ECD. Is linking liability something that would logically extend to P2P
intermediaries as well?
Do P2P intermediaries have benefit of these regimes at all? Apparently not in
US: see Napster, Aimster later. EU? Lack of linking liability provision in ECD
makes it unlikely.
Notice and take down
•Essence of limited liability regimes is that intermediary is immune from liability
as host/publisher unless receives constructive or actual notice of illegality.
•Both ECD and DMCA then demand “expedient” take-down (what is
“expedient?”)
•Key issue: how far does NTD operate as privatised censorship and invade
public domain? Does intermediary have any incentive to check validity of
claim?
•Oxford “mystery shopper” found no incentive to investigate. Dutch research
found 70% take down without enquiry by Dutch ISPs of public domain text.
•DMCA does help by demanding rightsholder authorisation of take down, and
good faith pledge - not found in ECD
•DMCA also provides safe harbor to intermediary against breach of contract
claims by site taken down – not in ECD
Put-back and public scrutiny
•If evidence true, are there ways to safeguard NTD against unfairly repressing
public domain/fair use/fair dealing?
•Put-back in DMCA in practice rarely used – C&Ds tend to be accepted/settled,
due to superior firepower.
•Could a body like Internet Watch Foundation usefully adjudicate copyright
take-down requests? Unlikely – see EC Rightswatch research.
•Oxford research suggests criteria for self regulatory decisions, such as
transparency, public accountability, audit, independence, independent appeals
mechanism. Also suggest accreditation by sector regulator as fair system.
P2P intermediaries
1. Centralised index P2P intermediaries eg first Napster
2. De-centralised model eg Grokster/KaZaA – user nodes, super-nodes
3. BitTorrent – files downloaded in chunks, every downloader also uploader –
hubs point to torrent files, tracker sites point to users. eXeem is eg P2P
implementation.
4. Freenet – encrypted files, also chunked, anonymised users.
5. “Open source” intermediaries eg BitTorrent – cf proprietary intermediaries,
eg, Napster, KaZaA.
Copyright liability and P2P intermediaries
•Can P2P intermediaries be held to be liable for infringement of copyright by
their users?
•Varying standards:
•US – contributory and vicarious liability
•Canada and Australia – authorisation of infringement
•Netherlands – general tort law?
Contributory and vicarious liability
– the US
Direct infringement by primary user
•Contributory: knowledge of the infringement and material contribution
•Vicarious: right and ability to supervise and financial benefit
But – substantial non-infringing uses
Sony Betamax case
•Staple article of commerce doctrine
•Sale of copying equipment does not constitute contributory infringement if it is
used or capable of substantial non infringing uses
Napster
• Napster had actual knowledge of infringing uses through provision
of centralised server.
• Where there is actual knowledge, it is irrelevant that the product is
capable of substantial non-infringing uses
• Material contribution to user infringement through provision of site
and facilities
• Centralised architecture gave it the right and ability to supervise
and control users
• Tried to develop a filter to stop the movement of infringing files…
Aimster
•Architecture decentralised – Aimster had no copies on its servers - information
as to location of files on computers of users.
•Aimster software searched for files
•Communications encrypted
•Used for substantial non-infringing uses – but no evidence (burden of proof on
defendant)
•Merely being capable of substantial non-infringing uses not enough
•Consider ability of & costs to service provider in preventing infringement by
users
•Wilful blindness (encryption) amounts to knowledge of infringement
Grokster
Decentralised system:
Each user maintains an index only of files to be made available to other users
•Capable of substantial non-infringing uses
•No control over users so no vicarious liability
•Could not know of infringement at time when it occurred
•Constructive knowledge enough if lacking substantial non-infringing uses, but
actual knowledge of specific infringement needed if there are substantial non-
infringing uses
Grokster in the Supreme Court
29th March 2005
Does a defendant invoking the Sony defence have to show that the technology is capable of, or
actually does, support substantial non-infringing uses?
Petitioners' Argument
Under the Sony rule, Grokster should be found liable: unauthorised copying of works was "the only
significant use of Grokster"
Even if there were non-infringing uses – these were dwarfed by infringing uses: look at the proportion
of legitimate to illegitimate uses.
Grokster should be excused only if the business model was not substantially related to infringement
(see also Government support of Petitioners - the developer should show that it is "not involved in a
business significantly related to copyright infringement.")
Have reasonable steps been taken to deter infringement?
On relying on the actual inducement test "These companies already operate in the shadows," "The
paper trail won't exist next time."
Respondents' Argument
Sony decision important to protect innovation
Grokster software is clearly within rubric of "substantial noninfringing uses." (Cf Aimster which found
no substantial noninfringing uses of a P2P file sharing program)
Grokster not liable under ‘wilful ignorance’- never in possession of information regarding how its
software is used.
The technology was structured in such a way that the developers had
nothing to do with the users once they obtained the software.
Safe Harbor
•Transitory communications – transmitting/routing or providing connections for
materials through system or network
•System caching – intermediate and temporary storage of material
•Information location tools – referring/linking to an online location containing
infringing material
Proviso – where there is knowledge prevent the use of the service by repeat
infringers
NTD regime not satisfactory as a regime of protection for P2P intermediaries
•Napster – attempts resulted in closure
•Aimster – said it did not know what users were doing – but included tutorials
•Grokster – not considered in detail – could not know of uses at time at which
they took place - control had been ceded to users
Netherlands
Buma/Stemra v KaZaA
KaZaA not liable for copyright infringement in relation to works swapped
between its users
•‘The provider of [P2P] file sharing software as the one in issue cannot itself be
held liable for infringement of copyright. The provider may in certain
circumstances be liable for a wrongful act’
•‘a service provider …may… be [required] to take adequate measures when
the service provider is notified of the fact that one of the users of its computers
system is committing copyright infringements..’
Requiring what? Termination of a users account? Takedown?
But where control is ceded to the user and there is no further involvement from
the provider?
Canada
Authorisation of infringement (sanction, approve or countenance)
Could royalties be collected from ISPs in Canada for downloading by users?
Did the ISPs authorise the infringement?
•‘a person does not authorise infringement by authorising the mere use of
equipment that could be used to infringe copyright. Courts should presume
that a person who authorises an activity does so only so far as it is in
accordance with the law…’
•‘an ISP is entitled to presume that its facilities will be used in accordance with
the law’.
Could be rebutted by knowledge – e.g. notice of infringing posting and ‘failure
to take it down’.
But where control is ceded to the user and there is no further involvement from
the provider?
Australia – KaZaA litigation
Moorhouse test – sanction approve countenance or permit
‘inactivity or indifference exhibited by acts of commission or omission’ might be
enough
Must know – or have reason to suspect that infringing activity would take place
•‘a person who has under his control the means by which an infringement of
copyright may be committed…and who makes it available to other persons,
knowing, or having reason to suspect, that it is likely to be used for the purpose
of committing an infringement, and omitting to take reasonable steps to limit its
use to legitimate purposes, would authorise any infringement that resulted from
its use’
What might this require P2P intermediaries to do? Would warnings be enough
– as with photocopier notices?
But where control is ceded to the user and there is no further involvement from
the provider?
Architectural differences – crucial
Napster – knowledge and technically capable of removal
KaZaA and Grokster – no knowledge at time of infringing activities and no way
of stopping those infringements
Notice and architecture
Downloaders
•Downloading/making private copies is not unlawful in all jurisdictions:
•Canada – a levy system ‘all private copying is now exempt subject to a
corresponding right of remuneration’
•France – downloading films and music from the internet, copying onto CDs
and sharing ‘with a few friends’ – not commercial use. How many friends?
Downloaders and uploaders
•BitTorrent – downloading and uploading – who to sue?
Uploaders
Many individuals been sued – many of whom have settled.
Suing downloaders and uploaders
Hiding the infringers
Freenet – users remain anonymous through its architecture and makes process of
identification hard
Identifying the infringers
Should disclosure be mandated by courts? Pre litigation? Standard of evidence?
Where is the balance between privacy and disclosure?
How much evidence of infringement should be required to justify disclosure?
UK – Totalise v Motley Fool (libel) – court ordered disclosure notwithstanding data
protection. BPI action – 28 individuals disclosed
US – DMCA s 512(h) – empowers ISP to disclose ‘notwithstanding any other rule of law’;
Cf. Dendrite v John Doe No. 3. – (libel) plaintiff must show winning case before
disclosure would be mandated; RIAA v Verizon – DMCA procedure does not apply where
ISP acts a conduit
Canada - BMG v John Doe – ‘the public interests in favour of disclosure must outweigh
the legitimate privacy concerns’
Hiding and Identifying the infringers
Unresolved issues
•Actual or constructive knowledge?
•When is knowledge relevant?
•How much positive action should be taken?
•What of wilful blindness?
•What is meant by authorisation?
•Relevance of actual or potentially non-infringing uses?
•What happens where users are downloaders and uploaders?
•Decentralised anonymised systems make identification problematic
•Who is liable for open source systems?
•NTD regimes not helpful or relevant
Alternative solutions?
•Levies
Giving up on copyright; majority pay for minority; double pay where DRM; not
intended to compensate for unlawful use; loss of control; administrative
problems; ignores market;
Better than more regulation where enforcement is impossible; administration
could be managed; deploy technology to collect levies?
•Digital Rights Management
Complex contractual matrices; fair use/dealing; capable of circumvention
•Active inducement theory
The inducement is likely to be hidden – Grokster "These companies already
operate in the shadows," "The paper trail won't exist next time."
•Join the club
Managed downloading sites
•Shaping the technology?
Balancing the interests
•Intermediaries; content providers; rights holders; technology developers; public
interest
•Time for a change in emphasis?
•From limited liability NTD to…?
For more information:
http://www.law.ed.ac.uk/ahrb
Email: itandip@ed.ac.uk
AHRC Research Centre for Studies in Intellectual Property and Technology
Law
School of Law
University of Edinburgh
Old College
Edinburgh EH8 9YL

More Related Content

Similar to wipo_iis_05_ledwards_cwaelde (1).ppt

Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate ResponsibilityCharles Mok
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the LawDavid Phillips
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends Endcode_org
 
Protecting Your Intellectual Property and your Brand
Protecting Your Intellectual Property and your BrandProtecting Your Intellectual Property and your Brand
Protecting Your Intellectual Property and your BrandNow Dentons
 
Client presentation
Client presentationClient presentation
Client presentationzleste
 
Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Hannah Rudman
 
New media and co-regulation Bangkok TMPC
New media and co-regulation Bangkok TMPCNew media and co-regulation Bangkok TMPC
New media and co-regulation Bangkok TMPCChris Marsden
 
legal aspects in e marketing
legal aspects in e marketinglegal aspects in e marketing
legal aspects in e marketingSHIVANI SINGH
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?Lilian Edwards
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.pptKISHOYIANKISH
 
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer Meeting
Privacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer MeetingPrivacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer Meeting
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer MeetingNayakStrategies
 
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...Kevin O'Shea
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement PrioritiesTrustArc
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internetipoque
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 

Similar to wipo_iis_05_ledwards_cwaelde (1).ppt (20)

Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
From isp liability to isp cooperation international developments from us dm...
From isp liability to isp cooperation   international developments from us dm...From isp liability to isp cooperation   international developments from us dm...
From isp liability to isp cooperation international developments from us dm...
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 
Whose content? whose revenue? who should be liable for a user's content? jo...
Whose content? whose revenue? who should be liable for a user's content?   jo...Whose content? whose revenue? who should be liable for a user's content?   jo...
Whose content? whose revenue? who should be liable for a user's content? jo...
 
Protecting Your Intellectual Property and your Brand
Protecting Your Intellectual Property and your BrandProtecting Your Intellectual Property and your Brand
Protecting Your Intellectual Property and your Brand
 
Client presentation
Client presentationClient presentation
Client presentation
 
Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.
 
New media and co-regulation Bangkok TMPC
New media and co-regulation Bangkok TMPCNew media and co-regulation Bangkok TMPC
New media and co-regulation Bangkok TMPC
 
legal aspects in e marketing
legal aspects in e marketinglegal aspects in e marketing
legal aspects in e marketing
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer Meeting
Privacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer MeetingPrivacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer Meeting
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer Meeting
 
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
66 keith kupferschmid_presentation
66 keith kupferschmid_presentation66 keith kupferschmid_presentation
66 keith kupferschmid_presentation
 

Recently uploaded

如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 

Recently uploaded (20)

如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 

wipo_iis_05_ledwards_cwaelde (1).ppt

  • 1.
  • 2. Online Intermediaries and Liability for Copyright Infringement Lilian Edwards and Charlotte Waelde AHRC Centre for Intellectual Property and Technology Law University of Edinburgh
  • 3. Introductory themes and issues Who are online intermediaries? – Traditional, newer and “P2P” Why have immunities for intermediaries? – Policy factors – Changes since P2P explosion Copyright liability issues Types of “general” immunity regimes – Notice and take down (NTD) Immunity and “P2P” intermediaries Suing copyright infringer not intermediary – Private copying – when downloading is legal? – Disclosure and anonymity issues Alternatives to suing intermediaries or infringers Conclusions
  • 4. On line intermediaries “Traditional” = – Internet Access Providers (IAPs) – Internet Service Providers (ISPs) eg AOL – Hosts/”portals” eg BBC, NY Times, Yahoo! E.g. US Communications Decency Act 1996 s 230(c)– “Provider.. Of an interactive computer service” Intended to protect ISPs, also applied to websites and moderator of website, but NOT to EBay as distributor not publisher of content (Grace v Ebay, 2004) Eg, Singapore Electronic Transaction Act 1998, India IT Act 2000 both refer to “network service providers”
  • 5. Newer online intermediaries •On-line sellers/distributors of goods/services •On-line auction sites •Aggregators eg RSS readers •Price comparison engines •Search engines •Universities & digitised archives •Chat-rooms, fora, eGroups •“Web logs” or blogs •Mobile phone communications providers
  • 6. EC E-Commerce Directive 2000 Art 2(a) - Information Society Service Providers (ISSPs) (see Arts 12-15) Provider of an “information society service” defined as “any service normally provided for remuneration, at a distance, by means of electronic equipment for the processing (including digital compression) and storage of data, and at the individual request of a recipient of a service.” Recipient is user, natural/legal person. Much wider than traditional ISP sector Non-commercial? Search engines? Universities? Services provided not WHOLLY at a distance? eg, tele-employer P2P intermediaries??
  • 7. P2P intermediaries 1. Centralised index P2P intermediaries eg first Napster 2. De-centralised model eg Grokster/KaZaA – user nodes, super-nodes 3. BitTorrent – files downloaded in chunks, every downloader also uploader – hubs point to torrent files, tracker sites point to users. eXeem is eg P2P implementation. 4. Freenet – encrypted files, also chunked, anonymised users. 5. “Open source” intermediaries eg BitTorrent – cf proprietary intermediaries, eg, Napster, KaZaA.
  • 8. Copyright intermediary worries •Early cases – Scientology texts etc •Caching •P2P liability for illicit downloading of songs, video •Hyperlinking liability (cf DMCA and ECD)
  • 9. Policy issues around “general” intermediary liability •Policy/law often driven by libel/porn cases not copyright •Early cases exclusively re ISPs, analogy to h/c publishers •ISPs seen as identifiable targets with “deep pockets”, while original content providers often anonymous, unlocatable, no resources, & (re copyright) bad PR to sue your own customers •ISPs transmit/host/publish huge amounts content, some dynamic, most out of contractual control •In practice, unable to monitor/check all this material, plus undesirable in terms of privacy •Thus, in toto, seen as subject to unmanageable burden if made liable as ordinary publishers are for content provided by others
  • 10. Policy outcomes to c 2000 •But - public interest in a flourishing ISP sector for public/commercial reasons •States furthermore saw ISPs as natural gatekeepers to Internet – able to help control porn, spam, etc •Hence, immunities needed so that ISP could exert some though not total control over 3rd party content without becoming liable for it – statutory reversal of Prodigy case, which had encouraged “head in sand” approach. •US CDA 1996 s 230 (c) eg gave ISPs total immunity in respect of content provided by another party •Later instruments – DMCA, ECD etc – gave less total immunity (see on)
  • 11. But later policy factors emerge.. •ISPs/intermediaries took advantage of immunities granted but did NOT on whole (tho cf BT Internet) take on voluntary monitoring/filtering role. Tendency to see self as neutral businesses, not censors or state agents. •On-line industry mainstreamed – less worry that liability would put it out of business, cause off-shoring •Interests of “victims” given short shrift compared to immunity for intermediaries – esp IP rightsholders. •Exponential growth in P2P music piracy •Tacit knowledge that broadband as consumer business model based heavily on illegal downloading •MIPI, Australia, April 05 “There can be no doubt that the ISP industry's dirty little secret is how much revenue they derive from the traffic in unauthorised sound recordings.”
  • 12. Legal regimes for intermediary liability - 1 “Total liability” – China etc – state censorship arm – Original Australian Broadcasting Amendment Services (On Line Services) Act 1999, re porn only – amended “No Liability” or “Total immunity” – US CDA 1996 c 230 (c) re publication libellous, obscene, negligently misstating content not copyright: “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another content provider“ – Problems – no incentive for ISP/host to pay any attention to rights of victims, even on explicit notice – see Zeran v AOL , 1997.
  • 13. Legal regimes for intermediary liability 2 – limited liability Compromise. Encourages self regulation by intermediary. US DMCA (copyright only) and EC ECD (“horizontal”) both espouse functionality immunities for online intermediaries “Mere conduit” immunity “Caching” immunity “Hosting” immunity. Most controversial. Main issue is notice and take down (NTD) “Linking/informational or locational tools” immunity – found in DMCA but not in ECD. Is linking liability something that would logically extend to P2P intermediaries as well? Do P2P intermediaries have benefit of these regimes at all? Apparently not in US: see Napster, Aimster later. EU? Lack of linking liability provision in ECD makes it unlikely.
  • 14. Notice and take down •Essence of limited liability regimes is that intermediary is immune from liability as host/publisher unless receives constructive or actual notice of illegality. •Both ECD and DMCA then demand “expedient” take-down (what is “expedient?”) •Key issue: how far does NTD operate as privatised censorship and invade public domain? Does intermediary have any incentive to check validity of claim? •Oxford “mystery shopper” found no incentive to investigate. Dutch research found 70% take down without enquiry by Dutch ISPs of public domain text. •DMCA does help by demanding rightsholder authorisation of take down, and good faith pledge - not found in ECD •DMCA also provides safe harbor to intermediary against breach of contract claims by site taken down – not in ECD
  • 15. Put-back and public scrutiny •If evidence true, are there ways to safeguard NTD against unfairly repressing public domain/fair use/fair dealing? •Put-back in DMCA in practice rarely used – C&Ds tend to be accepted/settled, due to superior firepower. •Could a body like Internet Watch Foundation usefully adjudicate copyright take-down requests? Unlikely – see EC Rightswatch research. •Oxford research suggests criteria for self regulatory decisions, such as transparency, public accountability, audit, independence, independent appeals mechanism. Also suggest accreditation by sector regulator as fair system.
  • 16. P2P intermediaries 1. Centralised index P2P intermediaries eg first Napster 2. De-centralised model eg Grokster/KaZaA – user nodes, super-nodes 3. BitTorrent – files downloaded in chunks, every downloader also uploader – hubs point to torrent files, tracker sites point to users. eXeem is eg P2P implementation. 4. Freenet – encrypted files, also chunked, anonymised users. 5. “Open source” intermediaries eg BitTorrent – cf proprietary intermediaries, eg, Napster, KaZaA.
  • 17. Copyright liability and P2P intermediaries •Can P2P intermediaries be held to be liable for infringement of copyright by their users? •Varying standards: •US – contributory and vicarious liability •Canada and Australia – authorisation of infringement •Netherlands – general tort law?
  • 18. Contributory and vicarious liability – the US Direct infringement by primary user •Contributory: knowledge of the infringement and material contribution •Vicarious: right and ability to supervise and financial benefit But – substantial non-infringing uses Sony Betamax case •Staple article of commerce doctrine •Sale of copying equipment does not constitute contributory infringement if it is used or capable of substantial non infringing uses
  • 19. Napster • Napster had actual knowledge of infringing uses through provision of centralised server. • Where there is actual knowledge, it is irrelevant that the product is capable of substantial non-infringing uses • Material contribution to user infringement through provision of site and facilities • Centralised architecture gave it the right and ability to supervise and control users • Tried to develop a filter to stop the movement of infringing files…
  • 20. Aimster •Architecture decentralised – Aimster had no copies on its servers - information as to location of files on computers of users. •Aimster software searched for files •Communications encrypted •Used for substantial non-infringing uses – but no evidence (burden of proof on defendant) •Merely being capable of substantial non-infringing uses not enough •Consider ability of & costs to service provider in preventing infringement by users •Wilful blindness (encryption) amounts to knowledge of infringement
  • 21. Grokster Decentralised system: Each user maintains an index only of files to be made available to other users •Capable of substantial non-infringing uses •No control over users so no vicarious liability •Could not know of infringement at time when it occurred •Constructive knowledge enough if lacking substantial non-infringing uses, but actual knowledge of specific infringement needed if there are substantial non- infringing uses
  • 22. Grokster in the Supreme Court 29th March 2005 Does a defendant invoking the Sony defence have to show that the technology is capable of, or actually does, support substantial non-infringing uses? Petitioners' Argument Under the Sony rule, Grokster should be found liable: unauthorised copying of works was "the only significant use of Grokster" Even if there were non-infringing uses – these were dwarfed by infringing uses: look at the proportion of legitimate to illegitimate uses. Grokster should be excused only if the business model was not substantially related to infringement (see also Government support of Petitioners - the developer should show that it is "not involved in a business significantly related to copyright infringement.") Have reasonable steps been taken to deter infringement? On relying on the actual inducement test "These companies already operate in the shadows," "The paper trail won't exist next time." Respondents' Argument Sony decision important to protect innovation Grokster software is clearly within rubric of "substantial noninfringing uses." (Cf Aimster which found no substantial noninfringing uses of a P2P file sharing program) Grokster not liable under ‘wilful ignorance’- never in possession of information regarding how its software is used. The technology was structured in such a way that the developers had nothing to do with the users once they obtained the software.
  • 23. Safe Harbor •Transitory communications – transmitting/routing or providing connections for materials through system or network •System caching – intermediate and temporary storage of material •Information location tools – referring/linking to an online location containing infringing material Proviso – where there is knowledge prevent the use of the service by repeat infringers NTD regime not satisfactory as a regime of protection for P2P intermediaries •Napster – attempts resulted in closure •Aimster – said it did not know what users were doing – but included tutorials •Grokster – not considered in detail – could not know of uses at time at which they took place - control had been ceded to users
  • 24. Netherlands Buma/Stemra v KaZaA KaZaA not liable for copyright infringement in relation to works swapped between its users •‘The provider of [P2P] file sharing software as the one in issue cannot itself be held liable for infringement of copyright. The provider may in certain circumstances be liable for a wrongful act’ •‘a service provider …may… be [required] to take adequate measures when the service provider is notified of the fact that one of the users of its computers system is committing copyright infringements..’ Requiring what? Termination of a users account? Takedown? But where control is ceded to the user and there is no further involvement from the provider?
  • 25. Canada Authorisation of infringement (sanction, approve or countenance) Could royalties be collected from ISPs in Canada for downloading by users? Did the ISPs authorise the infringement? •‘a person does not authorise infringement by authorising the mere use of equipment that could be used to infringe copyright. Courts should presume that a person who authorises an activity does so only so far as it is in accordance with the law…’ •‘an ISP is entitled to presume that its facilities will be used in accordance with the law’. Could be rebutted by knowledge – e.g. notice of infringing posting and ‘failure to take it down’. But where control is ceded to the user and there is no further involvement from the provider?
  • 26. Australia – KaZaA litigation Moorhouse test – sanction approve countenance or permit ‘inactivity or indifference exhibited by acts of commission or omission’ might be enough Must know – or have reason to suspect that infringing activity would take place •‘a person who has under his control the means by which an infringement of copyright may be committed…and who makes it available to other persons, knowing, or having reason to suspect, that it is likely to be used for the purpose of committing an infringement, and omitting to take reasonable steps to limit its use to legitimate purposes, would authorise any infringement that resulted from its use’ What might this require P2P intermediaries to do? Would warnings be enough – as with photocopier notices? But where control is ceded to the user and there is no further involvement from the provider?
  • 27. Architectural differences – crucial Napster – knowledge and technically capable of removal KaZaA and Grokster – no knowledge at time of infringing activities and no way of stopping those infringements Notice and architecture
  • 28. Downloaders •Downloading/making private copies is not unlawful in all jurisdictions: •Canada – a levy system ‘all private copying is now exempt subject to a corresponding right of remuneration’ •France – downloading films and music from the internet, copying onto CDs and sharing ‘with a few friends’ – not commercial use. How many friends? Downloaders and uploaders •BitTorrent – downloading and uploading – who to sue? Uploaders Many individuals been sued – many of whom have settled. Suing downloaders and uploaders
  • 29. Hiding the infringers Freenet – users remain anonymous through its architecture and makes process of identification hard Identifying the infringers Should disclosure be mandated by courts? Pre litigation? Standard of evidence? Where is the balance between privacy and disclosure? How much evidence of infringement should be required to justify disclosure? UK – Totalise v Motley Fool (libel) – court ordered disclosure notwithstanding data protection. BPI action – 28 individuals disclosed US – DMCA s 512(h) – empowers ISP to disclose ‘notwithstanding any other rule of law’; Cf. Dendrite v John Doe No. 3. – (libel) plaintiff must show winning case before disclosure would be mandated; RIAA v Verizon – DMCA procedure does not apply where ISP acts a conduit Canada - BMG v John Doe – ‘the public interests in favour of disclosure must outweigh the legitimate privacy concerns’ Hiding and Identifying the infringers
  • 30. Unresolved issues •Actual or constructive knowledge? •When is knowledge relevant? •How much positive action should be taken? •What of wilful blindness? •What is meant by authorisation? •Relevance of actual or potentially non-infringing uses? •What happens where users are downloaders and uploaders? •Decentralised anonymised systems make identification problematic •Who is liable for open source systems? •NTD regimes not helpful or relevant
  • 31. Alternative solutions? •Levies Giving up on copyright; majority pay for minority; double pay where DRM; not intended to compensate for unlawful use; loss of control; administrative problems; ignores market; Better than more regulation where enforcement is impossible; administration could be managed; deploy technology to collect levies? •Digital Rights Management Complex contractual matrices; fair use/dealing; capable of circumvention •Active inducement theory The inducement is likely to be hidden – Grokster "These companies already operate in the shadows," "The paper trail won't exist next time." •Join the club Managed downloading sites •Shaping the technology?
  • 32. Balancing the interests •Intermediaries; content providers; rights holders; technology developers; public interest •Time for a change in emphasis? •From limited liability NTD to…?
  • 33. For more information: http://www.law.ed.ac.uk/ahrb Email: itandip@ed.ac.uk AHRC Research Centre for Studies in Intellectual Property and Technology Law School of Law University of Edinburgh Old College Edinburgh EH8 9YL