SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Andrés Guadamuz SCRIPT – University of Edinburgh The Evolving Role of Intermediaries: The Challenge of Regulating Their Liability
[Insert Apology]
"The Internet is a worldwide network of computers that contains millions of pages of information. Users are cautioned that many of these pages include offensive and inappropriate material. In general, it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an email address on the internet may lead to receipt of unsolicited e-mail containing offensive content. A user accessing the internet does so at his/her own risk. Hotel X and its affiliates are not responsible for material viewed or downloaded by users from the internet."   Wifi at my hotel
Internet Service Provider (ISP) Online services Google Facebook Twitter User generated content sites Blogger YouTube Flickr Internet café Hotel University Workplace Restaurants What is an Intermediary?
Early history
Are intermediaries liable for content placed by their Customers?
Compuserve was a Bulletin Board Service, a dial-in pre WWW system.  Defamation case. Compuserve hosted forums managed by a third party.  Rumorville, a newsletter provider, posted defamatory content against Cubby Inc, who sued for libel and unfair competition.  United States District Court for the Southern District of New York which held that Internet service providers were subject to traditional defamation law for their hosted content. This ruling set the stage for various similar intermediary cases in the U.S. Cubby v Compuserve (1991)
An unknown person, purporting to be Dr Laurence Godfrey, a lecturer in physics, mathematics and computer science based in London , made a defamatory posting which appeared on Demon's news server in the UK .  The posting could be read by Demon's customers.  When Mr Godfrey asked Demon to remove the posting (having explained that it was a forgery), Demon did not do so.  The court found that up until receiving notification of the existence of the allegedly defamatory posting, Demon could not have had sufficient reason to suspect that it was not made by Mr Godfrey. However, from the point that actual knowledge was received, the defence was no longer available. Godfrey v Demon (1999)
Liguecontre le racisme et l'antisémitisme (LICRA) complained that Yahoo! were allowing their online auction service to be used for the sale of memorabilia from the Nazi period. These facts were not contested during the case. The defense rested on the fact that these auctions were conducted under the jurisdiction of the United States. It was claimed that there were no technical means to prevent French residents from participating in these auctions, at least without placing the company in financial difficulty and compromising the existence of the Internet. The defendants noted    1. that their servers were located on US territory,    2. that their services were primarily aimed at US residents,    3. that the First Amendment to the United States Constitution guarantees freedom of speech and expression, and that any attempt to enforce a judgment in the United States would fail for unconstitutionality. As such, they contended that the French court was incompetent to hear the case. LICRA v. Yahoo! (2000)
Limiting Intermediary Liability
Article 10. Limitations and Exceptions (1) Contracting Parties may, in their national legislation, provide for limitations of or exceptions to the rights granted to authors of literary and artistic works under this Treaty in certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. (2) Contracting Parties shall, when applying the Berne Convention, confine any limitations of or exceptions to rights provided for therein to certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. WIPO Copyright Treaty 1996
§ 512. Limitations on liability relating to material online (Safe Harbor) (a) Transitory Digital Network Communications. […] (b) System Caching. […] (g) Replacement of Removed or Disabled Material and Limitation on Other Liability.—  (1) No liability for taking down generally.— Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider’s good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing.  Digital Millennium Copyright Act 1998
Article 12. "Mere conduit" 1. Where an information society service is provided that consists of the transmission in a communication network of information provided by a recipient of the service, or the provision of access to a communication network, Member States shall ensure that the service provider is not liable for the information transmitted, on condition that the provider: (a) does not initiate the transmission; (b) does not select the receiver of the transmission; and (c) does not select or modify the information contained in the transmission. E-Commerce Directive (2000/31/EC)
Article 5. Exceptions and limitations 1. Temporary acts of reproduction referred to in Article 2, which are transient or incidental [and] an integral and essential part of a technological process and whose sole purpose is to enable: (a) a transmission in a network between third parties by an intermediary, or (b) a lawful use of a work or other subject-matter to be made, and which have no independent economic significance, shall be exempted from the reproduction right provided for in Article 2. Info Soc Directive (2001/29/EC)
Notice and TakeDown Regime
Intermediary Liability Redux
Grumblings about status quo
Case brought in 2007 U.S. TV channel Viacom sued YouTube (hence Google) for copyright infringement of videos uploaded by their customers. YouTube argued that most videos on YouTube are non-infringing, and they will take-down content (Safe Harbor). Case dismissed early 2010. Viacom v YouTube
The Belgian Society of Authors, Composers, and Publishers (Sabam) sued ISP Tiscali (later Scarlet).  Sabamwanted Tiscali to install filtering software in its network which would allegedly curb illicit filesharing in P2P networks. The first ruling in the District Court of Brussels agreed with the claimants based entirely on expert reports about the feasibility of deploying filtering systems. Appealed. Court of appeals referred to European Court of Justice (ECJ) specifically on question of injunctive relief against intermediaries. Sabam v Tiscali (2007-Present)
In 2007, Irish Recorded Music Association (IRMA) members sued Eircom, the largest broadband provider in Ireland, over alleged illegal file sharing by subscribers.  IRMA had previously demanded that Eircominstall content filters or take other steps to block IRMA's copyrighted music from being shared, but they did not comply. Parties settled out of court in January 2009. As a result, Eircom agreed to implement a three-strikes system, where alleged infringers will be detected by the record companies, IP addresses notified to Eircom, and users disconnected (after warnings) by Eircom. In August 2009 Eircom began filtering PirateBay.org to mixed results.  Irish Recording Music Association (IRMA) v Eircom (2007-2009)
iiNet is an Australian internet provider, which was sued by Australian film producer Roadshow Films, part of the Village Roadshow conglomerate, and several Holywood studios. Test case for new ISP liability.  The question at the heart of the proceedings was whether an ISP is to be held liable for the copyright infringement committed by its customers. The judge accurately identified that the case hinged on two simple questions.   Have the iiNet customers infringed copyright directly?  Yes.   Has iiNetauthorised the copyright infringement of its users by failing to take steps to stop it from happening? No. Under appeal. Roadshow Films v iiNet (2010)
Disconnection, Graduated Responses and Three Strikes
“Haute Autorité pour la diffusion des oeuvres et la protection des droitssur Internet ” (2009) Troubled passage through parliament.  In June 2009 French Constitutional Court extended freedom of expression to include “freedom to access the internet”. New graduated response passed in Parliament. Warning stage Investigations by rightholders’ accredited agents  Rightholders can put their cases  The HADOPI examines the facts (swiftly) Disconnection phase:  Only court can disconnect (up to one month) HADOPI maintains list of banned subscribers HADOPI
Adopted in July 2009. Article 133bis of the Korean Copyright Act. Allows the Korean Copyright Commission to recommend ISPs to suspend the accounts of repeat file sharing offenders (as adjudged by the Commission) for six months.  Users' email accounts are not to be suspended. 30,000 notices have been sent (by September 2010). No person has been disconnected (yet). South Korea
Will establish a multi-tiered obligation for intermediaries.  ISP are under obligations to:  monitor user activity; Provide content owners with lists of copyright infringers; notify users of infringement reports; limit Internet access (slow down connection) Finally, the ISP will disconnect user. Costs are shared between ISP and content owner. Appeals procedure. Specifics of the regime are under review by the telecommunications regulator (OFCOM). Digital Economy Act (2010)
New trade agreement negotiated initially in secret between US, EU, Canada, South Korea, Japan, NZ, Australia, and others. Initially was supposed to include three strikes. Seriously watered-down due to political pressure in several countries (particularly Canada and Europe). Intermediary positions are now considerably lower. Maintains notice-and-take-down regimes to a large extent.  Anti-Counterfeiting Trade Agreement (ACTA)
Does it work?
Some emerging issues
The coming Cyberwar
The Great Intermediary War?
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Laws governing the internet service provider & there rights and liabilities
Laws governing the internet service provider & there rights and liabilitiesLaws governing the internet service provider & there rights and liabilities
Laws governing the internet service provider & there rights and liabilitiesGaurav Chordia
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Dr. Prashant Vats
 
Professional ethics for legal person
Professional ethics for legal personProfessional ethics for legal person
Professional ethics for legal personRavi Lakhani
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspacePanjab University
 
Movable Property in Private International Law
Movable Property in Private International LawMovable Property in Private International Law
Movable Property in Private International Lawcarolineelias239
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Contracts in Private International Law
Contracts in Private International LawContracts in Private International Law
Contracts in Private International Lawcarolineelias239
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 

Was ist angesagt? (20)

Laws governing the internet service provider & there rights and liabilities
Laws governing the internet service provider & there rights and liabilitiesLaws governing the internet service provider & there rights and liabilities
Laws governing the internet service provider & there rights and liabilities
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
UNCITRAL_BY_AVINASH_MURKUTE
UNCITRAL_BY_AVINASH_MURKUTEUNCITRAL_BY_AVINASH_MURKUTE
UNCITRAL_BY_AVINASH_MURKUTE
 
Professional ethics for legal person
Professional ethics for legal personProfessional ethics for legal person
Professional ethics for legal person
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Uncitral model law
Uncitral model lawUncitral model law
Uncitral model law
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
Movable Property in Private International Law
Movable Property in Private International LawMovable Property in Private International Law
Movable Property in Private International Law
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Contracts in Private International Law
Contracts in Private International LawContracts in Private International Law
Contracts in Private International Law
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Online defamation
Online defamationOnline defamation
Online defamation
 

Andere mochten auch

Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISPJaya Kamnani
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider pptPutri Sanuria
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Providerhazirma
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Gaurav Chordia
 
Internet service provider
Internet service providerInternet service provider
Internet service providerloizazeptania
 
AIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP PresentationAIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP PresentationmarkASsantiago
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
ISP business plan
ISP business plan ISP business plan
ISP business plan ontor omi
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systemsVishal Singh
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Andere mochten auch (19)

Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
 
Isp
IspIsp
Isp
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Isp
IspIsp
Isp
 
ISP
ISPISP
ISP
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider
 
CH6
CH6CH6
CH6
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
 
AIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP PresentationAIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP Presentation
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
ISP business plan
ISP business plan ISP business plan
ISP business plan
 
E Payment
E PaymentE Payment
E Payment
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
 
ISP
ISPISP
ISP
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Ähnlich wie Internet Service Provider Liability

SCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawSCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawChris Marsden
 
Liberalization Intellectual Property Rights
Liberalization  Intellectual Property RightsLiberalization  Intellectual Property Rights
Liberalization Intellectual Property Rightslkipenis
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
March 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the USMarch 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the USCobaltSophie
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...beamatinet
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
Floundering towards EU information law
Floundering towards EU information lawFloundering towards EU information law
Floundering towards EU information lawblogzilla
 
Developments in intermediary liability
Developments in intermediary liabilityDevelopments in intermediary liability
Developments in intermediary liabilityAndres Guadamuz
 
Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet Emma Hart
 
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...LawScienceTech
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction PrimerGraham Smith
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the LawDavid Phillips
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...FIA2010
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)GrittyCC
 
Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V EsBrian Rowe
 
2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law ReviewGraham Smith
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liabilityEmily Laidlaw
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi lawsbsookman
 
International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014Giovanni Maria Riccio
 

Ähnlich wie Internet Service Provider Liability (20)

SCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawSCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet Law
 
Liberalization Intellectual Property Rights
Liberalization  Intellectual Property RightsLiberalization  Intellectual Property Rights
Liberalization Intellectual Property Rights
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
March 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the USMarch 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the US
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Floundering towards EU information law
Floundering towards EU information lawFloundering towards EU information law
Floundering towards EU information law
 
Developments in intermediary liability
Developments in intermediary liabilityDevelopments in intermediary liability
Developments in intermediary liability
 
Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet
 
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V Es
 
2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
 
International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014
 

Mehr von Andres Guadamuz

Do androids dream of electric copyright?
Do androids dream of electric copyright?Do androids dream of electric copyright?
Do androids dream of electric copyright?Andres Guadamuz
 
Metaverse: Some regulatory musings
Metaverse: Some regulatory musingsMetaverse: Some regulatory musings
Metaverse: Some regulatory musingsAndres Guadamuz
 
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...Andres Guadamuz
 
The Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse RebornThe Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse RebornAndres Guadamuz
 
Understanding the NFT Ecosystem
Understanding the NFT Ecosystem Understanding the NFT Ecosystem
Understanding the NFT Ecosystem Andres Guadamuz
 
Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)Andres Guadamuz
 
Ceci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-landCeci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-landAndres Guadamuz
 
Contratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativasContratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativasAndres Guadamuz
 
Ai and copyright: the way forward
Ai and copyright: the way forwardAi and copyright: the way forward
Ai and copyright: the way forwardAndres Guadamuz
 
AI Copyright international perspective
AI Copyright international perspectiveAI Copyright international perspective
AI Copyright international perspectiveAndres Guadamuz
 
Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?Andres Guadamuz
 
Cyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmaresCyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmaresAndres Guadamuz
 
All watched over machines of loving grace amsterdam
All watched over machines of loving grace  amsterdamAll watched over machines of loving grace  amsterdam
All watched over machines of loving grace amsterdamAndres Guadamuz
 
All watched over machines of loving grace
All watched over machines of loving graceAll watched over machines of loving grace
All watched over machines of loving graceAndres Guadamuz
 
Ready player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASISReady player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASISAndres Guadamuz
 
Ai, data and big data: ownership and protection
Ai, data and big data: ownership and protectionAi, data and big data: ownership and protection
Ai, data and big data: ownership and protectionAndres Guadamuz
 

Mehr von Andres Guadamuz (20)

Do androids dream of electric copyright?
Do androids dream of electric copyright?Do androids dream of electric copyright?
Do androids dream of electric copyright?
 
Distinctive brands game
Distinctive brands gameDistinctive brands game
Distinctive brands game
 
AI Copyright Authorship
AI Copyright AuthorshipAI Copyright Authorship
AI Copyright Authorship
 
Metaverse: Some regulatory musings
Metaverse: Some regulatory musingsMetaverse: Some regulatory musings
Metaverse: Some regulatory musings
 
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
 
The Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse RebornThe Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse Reborn
 
Understanding the NFT Ecosystem
Understanding the NFT Ecosystem Understanding the NFT Ecosystem
Understanding the NFT Ecosystem
 
Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)
 
Ceci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-landCeci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-land
 
Contratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativasContratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativas
 
Ai and copyright: the way forward
Ai and copyright: the way forwardAi and copyright: the way forward
Ai and copyright: the way forward
 
FALL: or Dodge in Hell
FALL: or Dodge in HellFALL: or Dodge in Hell
FALL: or Dodge in Hell
 
AI Copyright international perspective
AI Copyright international perspectiveAI Copyright international perspective
AI Copyright international perspective
 
Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?
 
Copyright and Art
Copyright and ArtCopyright and Art
Copyright and Art
 
Cyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmaresCyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmares
 
All watched over machines of loving grace amsterdam
All watched over machines of loving grace  amsterdamAll watched over machines of loving grace  amsterdam
All watched over machines of loving grace amsterdam
 
All watched over machines of loving grace
All watched over machines of loving graceAll watched over machines of loving grace
All watched over machines of loving grace
 
Ready player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASISReady player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASIS
 
Ai, data and big data: ownership and protection
Ai, data and big data: ownership and protectionAi, data and big data: ownership and protection
Ai, data and big data: ownership and protection
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

Internet Service Provider Liability

  • 1. Andrés Guadamuz SCRIPT – University of Edinburgh The Evolving Role of Intermediaries: The Challenge of Regulating Their Liability
  • 3. "The Internet is a worldwide network of computers that contains millions of pages of information. Users are cautioned that many of these pages include offensive and inappropriate material. In general, it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an email address on the internet may lead to receipt of unsolicited e-mail containing offensive content. A user accessing the internet does so at his/her own risk. Hotel X and its affiliates are not responsible for material viewed or downloaded by users from the internet."  Wifi at my hotel
  • 4. Internet Service Provider (ISP) Online services Google Facebook Twitter User generated content sites Blogger YouTube Flickr Internet café Hotel University Workplace Restaurants What is an Intermediary?
  • 6. Are intermediaries liable for content placed by their Customers?
  • 7. Compuserve was a Bulletin Board Service, a dial-in pre WWW system. Defamation case. Compuserve hosted forums managed by a third party. Rumorville, a newsletter provider, posted defamatory content against Cubby Inc, who sued for libel and unfair competition. United States District Court for the Southern District of New York which held that Internet service providers were subject to traditional defamation law for their hosted content. This ruling set the stage for various similar intermediary cases in the U.S. Cubby v Compuserve (1991)
  • 8. An unknown person, purporting to be Dr Laurence Godfrey, a lecturer in physics, mathematics and computer science based in London , made a defamatory posting which appeared on Demon's news server in the UK . The posting could be read by Demon's customers. When Mr Godfrey asked Demon to remove the posting (having explained that it was a forgery), Demon did not do so. The court found that up until receiving notification of the existence of the allegedly defamatory posting, Demon could not have had sufficient reason to suspect that it was not made by Mr Godfrey. However, from the point that actual knowledge was received, the defence was no longer available. Godfrey v Demon (1999)
  • 9. Liguecontre le racisme et l'antisémitisme (LICRA) complained that Yahoo! were allowing their online auction service to be used for the sale of memorabilia from the Nazi period. These facts were not contested during the case. The defense rested on the fact that these auctions were conducted under the jurisdiction of the United States. It was claimed that there were no technical means to prevent French residents from participating in these auctions, at least without placing the company in financial difficulty and compromising the existence of the Internet. The defendants noted 1. that their servers were located on US territory, 2. that their services were primarily aimed at US residents, 3. that the First Amendment to the United States Constitution guarantees freedom of speech and expression, and that any attempt to enforce a judgment in the United States would fail for unconstitutionality. As such, they contended that the French court was incompetent to hear the case. LICRA v. Yahoo! (2000)
  • 11. Article 10. Limitations and Exceptions (1) Contracting Parties may, in their national legislation, provide for limitations of or exceptions to the rights granted to authors of literary and artistic works under this Treaty in certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. (2) Contracting Parties shall, when applying the Berne Convention, confine any limitations of or exceptions to rights provided for therein to certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. WIPO Copyright Treaty 1996
  • 12. § 512. Limitations on liability relating to material online (Safe Harbor) (a) Transitory Digital Network Communications. […] (b) System Caching. […] (g) Replacement of Removed or Disabled Material and Limitation on Other Liability.— (1) No liability for taking down generally.— Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider’s good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing. Digital Millennium Copyright Act 1998
  • 13. Article 12. "Mere conduit" 1. Where an information society service is provided that consists of the transmission in a communication network of information provided by a recipient of the service, or the provision of access to a communication network, Member States shall ensure that the service provider is not liable for the information transmitted, on condition that the provider: (a) does not initiate the transmission; (b) does not select the receiver of the transmission; and (c) does not select or modify the information contained in the transmission. E-Commerce Directive (2000/31/EC)
  • 14. Article 5. Exceptions and limitations 1. Temporary acts of reproduction referred to in Article 2, which are transient or incidental [and] an integral and essential part of a technological process and whose sole purpose is to enable: (a) a transmission in a network between third parties by an intermediary, or (b) a lawful use of a work or other subject-matter to be made, and which have no independent economic significance, shall be exempted from the reproduction right provided for in Article 2. Info Soc Directive (2001/29/EC)
  • 18. Case brought in 2007 U.S. TV channel Viacom sued YouTube (hence Google) for copyright infringement of videos uploaded by their customers. YouTube argued that most videos on YouTube are non-infringing, and they will take-down content (Safe Harbor). Case dismissed early 2010. Viacom v YouTube
  • 19. The Belgian Society of Authors, Composers, and Publishers (Sabam) sued ISP Tiscali (later Scarlet). Sabamwanted Tiscali to install filtering software in its network which would allegedly curb illicit filesharing in P2P networks. The first ruling in the District Court of Brussels agreed with the claimants based entirely on expert reports about the feasibility of deploying filtering systems. Appealed. Court of appeals referred to European Court of Justice (ECJ) specifically on question of injunctive relief against intermediaries. Sabam v Tiscali (2007-Present)
  • 20. In 2007, Irish Recorded Music Association (IRMA) members sued Eircom, the largest broadband provider in Ireland, over alleged illegal file sharing by subscribers. IRMA had previously demanded that Eircominstall content filters or take other steps to block IRMA's copyrighted music from being shared, but they did not comply. Parties settled out of court in January 2009. As a result, Eircom agreed to implement a three-strikes system, where alleged infringers will be detected by the record companies, IP addresses notified to Eircom, and users disconnected (after warnings) by Eircom. In August 2009 Eircom began filtering PirateBay.org to mixed results. Irish Recording Music Association (IRMA) v Eircom (2007-2009)
  • 21. iiNet is an Australian internet provider, which was sued by Australian film producer Roadshow Films, part of the Village Roadshow conglomerate, and several Holywood studios. Test case for new ISP liability.  The question at the heart of the proceedings was whether an ISP is to be held liable for the copyright infringement committed by its customers. The judge accurately identified that the case hinged on two simple questions.  Have the iiNet customers infringed copyright directly?  Yes.  Has iiNetauthorised the copyright infringement of its users by failing to take steps to stop it from happening? No. Under appeal. Roadshow Films v iiNet (2010)
  • 23. “Haute Autorité pour la diffusion des oeuvres et la protection des droitssur Internet ” (2009) Troubled passage through parliament. In June 2009 French Constitutional Court extended freedom of expression to include “freedom to access the internet”. New graduated response passed in Parliament. Warning stage Investigations by rightholders’ accredited agents Rightholders can put their cases The HADOPI examines the facts (swiftly) Disconnection phase: Only court can disconnect (up to one month) HADOPI maintains list of banned subscribers HADOPI
  • 24. Adopted in July 2009. Article 133bis of the Korean Copyright Act. Allows the Korean Copyright Commission to recommend ISPs to suspend the accounts of repeat file sharing offenders (as adjudged by the Commission) for six months. Users' email accounts are not to be suspended. 30,000 notices have been sent (by September 2010). No person has been disconnected (yet). South Korea
  • 25. Will establish a multi-tiered obligation for intermediaries. ISP are under obligations to: monitor user activity; Provide content owners with lists of copyright infringers; notify users of infringement reports; limit Internet access (slow down connection) Finally, the ISP will disconnect user. Costs are shared between ISP and content owner. Appeals procedure. Specifics of the regime are under review by the telecommunications regulator (OFCOM). Digital Economy Act (2010)
  • 26. New trade agreement negotiated initially in secret between US, EU, Canada, South Korea, Japan, NZ, Australia, and others. Initially was supposed to include three strikes. Seriously watered-down due to political pressure in several countries (particularly Canada and Europe). Intermediary positions are now considerably lower. Maintains notice-and-take-down regimes to a large extent. Anti-Counterfeiting Trade Agreement (ACTA)