SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
PRIVACY AND COPYRIGHT
                                      ENFORCEMENT
                                                           Eddan Katz
                                 International Affairs Director, Electronic Frontier Foundation

                               31st International Conference of Data Protection Authorities and
                                                    Privacy Commissioners
                                                         Madrid, Spain
                                                      November 4, 2009




Wednesday, December 29, 2010                                                                      1
Introduction
                Thank you for the conference organizers to include topic

                Thank you for staying so late.

                Cut through the thick layers of euphemism

                don’t want to turn the Internet into a big broadcast channel

                95% of traffic is piracy

                     we don’t have money to sue 8 million people

                     turn fundamental rights upside down in order to make it safe for the
                     entertainment industry



Wednesday, December 29, 2010                                                                2
Justifications for Copyright

                Incentives for creation and dissemination of works

                US Constitution: To promote the Progress of Science and useful Arts, by securing for
                limited Times to Authors and Inventors the exclusive Right to their respective
                Writings and Discoveries.

                Statute of Anne. (1710) An Act for the Encouragement of Learning, by Vesting the
                Copies of Printed Books in the Authors or Purchasers of such Copies, during the
                Times therein mentioned.

                Access to Knowledge - intersection of innovation and development




Wednesday, December 29, 2010                                                                           3
What is different now?

                copyright traditionally didn’t include the user. it was general public dissemination.

                in the digital age, there is a direct connection with a consumer

                     DRM & Kindle

                copyright enforcement into private spaces & throughout communications networks

                right to read anonymously




Wednesday, December 29, 2010                                                                            4
Intellectual Privacy


                first amendment - democratic self-governance

                     freedom to think as you will and to speak as you think (Brandeis, Whitney v. CA)

                closer to mind - stream of consciousness

                the connections between thoughts. fleeting thoughts - done on a search engine.




Wednesday, December 29, 2010                                                                            5
Pervasively Distributed
                               Copyright Enforcement
             justification for its pervasive reach in a permanent state of crisis.

             set of coordinated processes for authorizing flows of information

             invades, disrupts, and casually rearranges the boundaries of personal

             spaces and of the intellectual and cultural activities played out within those spaces.

             perceive constraint and standardization as natural attributes of the information

             environment control over intellectual consumption and communication away from
             individuals and independent technology vendors and toward purveyors of copyrighted
             entertainment goods.

             darknet digital samizdat actually reinforces the discipline and standardization of the


Wednesday, December 29, 2010                                                                          6
Ongoing Norm-Setting

                ISP cases.

                Three Strikes Laws

                Telecom Package

                Google Book Search Settlement

                Anti-Counterfeiting Trade Agreement



Wednesday, December 29, 2010                          7
Promusicae v. Telefonica

                ruling = not a requirement for ISPs to hand over customer
                data in civil proceedings

                     it should be taken to mean that there is no mandatory
                     disclosure and that privacy precedes copyright

                got the entertainment companies to push for legislation




Wednesday, December 29, 2010                                                 8
College van Burgemeester v.
                           Rijkeboer
                College van burgemeester en wethouders van Rotterdam v M. E. E. Rijkeboer [Case
                C-553/07, 22 December 2008]. In trying to balance data retention and data
                protection obligations, the Court said that "[t]he right of a data subject to
                manipulate his personal data, and to request their rectification, erasure and blocking,
                is one of the essential aspects of Directive 95/46. Recitals 38 and 40 in the preamble
                to the directive illustrate that view, not only because they confirm the importance of
                the right of access but also because of the link that right constitutes between the
                information which the data subject has and the processing of that
                information. Indeed, for the rights conferred in Article 12 to be practicable, it is
                necessary to rely on a number of fundamental principles since, otherwise, the
                safeguards referred to in the article would be rendered ineffective. Recital 41 in the
                preamble to the directive expresses it with great clarity, stating that 'any person
                must be able to exercise the right of access to data relating to him which are being
                processed, in order to verify in particular the accuracy of the data and the lawfulness
                of the processing'. [Par. 28] 



Wednesday, December 29, 2010                                                                              9
Google Book Search
                                   Settlement
                Protection Against Disclosure

                     not disclose to govt. or third party without warrant

                     notify user when transferring to others

                     not provide books purchased to credit card company

                Limited Tracking

                     searching and preview doesn’t require registration

                     not connect Google Book Search with other Google services

                     allow anonymous search

                     purge logging information




Wednesday, December 29, 2010                                                     10
Google Book Search, cont’d.

                User Control
                     allow control of other computers
                     bookshelves
                Transparency and Enforceability
                     robust, easy to read privacy provisions
                     reader privacy commitment has to be legally enforceable.
                     watermarks does not contain identifying information
                     publish number of requests




Wednesday, December 29, 2010                                                    11
Telecom Package

                HADOPI-ism

                Amendment 138 - Prior Ruling.

                History - 2nd Reading - copyright enforcement.

                Bono Report Amendment

                vote for 138 twice.



Wednesday, December 29, 2010                                     12
Amendment 138

                Amending Recital 3a adopted in 2nd reading:

            Recognising that the Internet is essential for education and for the exercise of freedom
            of expression and access to information, any restriction imposed on the access and/or
            use of the Internet should be in accordance with the general principles of Community
            law, notably in accordance with the European Convention of Human Rights and the
            Charter of Fundamental Rights of the European Union. In particular, end-users’ access
            to electronic communications services should not be suspended without prior ruling by
            the judicial authorities without prejudice to the competence of a Member State to
            determine in line with its own constitutional order and with fundamental rights
            appropriate procedural safeguards assuring due process.




Wednesday, December 29, 2010                                                                           13
EDPS Opinion - Telecom
                                     Package
                [EDPS Comments on Some Issue in the Review of Directive 2002/22/EC (Universal Service) (16 Feb.
                2009): http://www.edps.europa.eu/EDPSWEB/webdav/shared/Documents/Consultation/Comments/
                2009/09-02-16_Comments_ePrivacy_EN.pdf] In Par. 15, the EDPS makes clear "that it would not be allowed for
                Internet Service Providers to cut subscribers’ Internet connections on the basis of mere alleged copyright
                infringements made by private sector organizations." The EDPS also made clear that he "considers that
                Amendment 138 and Article 32a of the Universal Service Directive provide for a balanced wording by
                emphasizing fundamental rights. The need to safeguard such rights is particularly important in the context of
                these Directives which, as pointed out above, lay the grounds for the creation of "three strikes approach
                mechanisms" entailing broad, systematic surveillance of individuals’ use of the Internet." [Par. 21] 

                The EDPS lays out the Plan B fundamental rights protections that could serve as an authoritative guide to the
                priorities of fundamental rights more specifically in the rewording, describing that "[t]he combination of Articles
                21.4a and 33.2a and Recitals 12c, 14b and 25 of the Universal Service Directive probably ensure that any
                cooperation mechanism has to (1) respect the protection of privacy and personal data of individuals; (2) avoid
                the systematic monitoring of Internet usage and (3) respect due process, meaning that it is up to authorities, by
                applying due process, not to copyright holders or Internet Service Providers, to determine whether content is
                lawful or not." He concludes: "However, it would have been preferable if Amendment 138 and Article 32a had
                been accepted by the Council insofar as they would have strengthened these safeguards." [Par. 22]




Wednesday, December 29, 2010                                                                                                         14
Three Strikes Laws

                Vigilante justice - Internet Access Termination

                     France, South Korea, Italy, New Zealand, UK

                Graduated Response - riposte graduee

                     military strategy (invented Mc Namara during the Cold War to fight Russian nuke menace)

                     educational notice

                     how to secure your wireless connection if not you.

                Temporary suspension of account - Digital Guillotine. Digital Ostracism

                     not general scanning for other materials

                     facing data protection problems




Wednesday, December 29, 2010                                                                                  15
ACTA

                Internet Provisions being negotiated today
                Increased ISP liability.
                introduce duty to monitor/filter
                must implement a notice and takedown regime
                increased standard for criminal copyright
                change the definition of piracy and counterfeiting
                anti-circumvention provisions
                     there’s an exception for private data. but there are no tools.




Wednesday, December 29, 2010                                                          16
The Priority of Privacy

                under attack by automated systems for copyright
                enforcement

                about the systematic reorientation of our expectations of
                privacy and the infrastructure of dissemination




Wednesday, December 29, 2010                                                17

Más contenido relacionado

Destacado

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Eddankatz 31intl dpa_copyrightprivacy_slides

  • 1. PRIVACY AND COPYRIGHT ENFORCEMENT Eddan Katz International Affairs Director, Electronic Frontier Foundation 31st International Conference of Data Protection Authorities and Privacy Commissioners Madrid, Spain November 4, 2009 Wednesday, December 29, 2010 1
  • 2. Introduction Thank you for the conference organizers to include topic Thank you for staying so late. Cut through the thick layers of euphemism don’t want to turn the Internet into a big broadcast channel 95% of traffic is piracy we don’t have money to sue 8 million people turn fundamental rights upside down in order to make it safe for the entertainment industry Wednesday, December 29, 2010 2
  • 3. Justifications for Copyright Incentives for creation and dissemination of works US Constitution: To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries. Statute of Anne. (1710) An Act for the Encouragement of Learning, by Vesting the Copies of Printed Books in the Authors or Purchasers of such Copies, during the Times therein mentioned. Access to Knowledge - intersection of innovation and development Wednesday, December 29, 2010 3
  • 4. What is different now? copyright traditionally didn’t include the user. it was general public dissemination. in the digital age, there is a direct connection with a consumer DRM & Kindle copyright enforcement into private spaces & throughout communications networks right to read anonymously Wednesday, December 29, 2010 4
  • 5. Intellectual Privacy first amendment - democratic self-governance freedom to think as you will and to speak as you think (Brandeis, Whitney v. CA) closer to mind - stream of consciousness the connections between thoughts. fleeting thoughts - done on a search engine. Wednesday, December 29, 2010 5
  • 6. Pervasively Distributed Copyright Enforcement justification for its pervasive reach in a permanent state of crisis. set of coordinated processes for authorizing flows of information invades, disrupts, and casually rearranges the boundaries of personal spaces and of the intellectual and cultural activities played out within those spaces. perceive constraint and standardization as natural attributes of the information environment control over intellectual consumption and communication away from individuals and independent technology vendors and toward purveyors of copyrighted entertainment goods. darknet digital samizdat actually reinforces the discipline and standardization of the Wednesday, December 29, 2010 6
  • 7. Ongoing Norm-Setting ISP cases. Three Strikes Laws Telecom Package Google Book Search Settlement Anti-Counterfeiting Trade Agreement Wednesday, December 29, 2010 7
  • 8. Promusicae v. Telefonica ruling = not a requirement for ISPs to hand over customer data in civil proceedings it should be taken to mean that there is no mandatory disclosure and that privacy precedes copyright got the entertainment companies to push for legislation Wednesday, December 29, 2010 8
  • 9. College van Burgemeester v. Rijkeboer College van burgemeester en wethouders van Rotterdam v M. E. E. Rijkeboer [Case C-553/07, 22 December 2008]. In trying to balance data retention and data protection obligations, the Court said that "[t]he right of a data subject to manipulate his personal data, and to request their rectification, erasure and blocking, is one of the essential aspects of Directive 95/46. Recitals 38 and 40 in the preamble to the directive illustrate that view, not only because they confirm the importance of the right of access but also because of the link that right constitutes between the information which the data subject has and the processing of that information. Indeed, for the rights conferred in Article 12 to be practicable, it is necessary to rely on a number of fundamental principles since, otherwise, the safeguards referred to in the article would be rendered ineffective. Recital 41 in the preamble to the directive expresses it with great clarity, stating that 'any person must be able to exercise the right of access to data relating to him which are being processed, in order to verify in particular the accuracy of the data and the lawfulness of the processing'. [Par. 28]  Wednesday, December 29, 2010 9
  • 10. Google Book Search Settlement Protection Against Disclosure not disclose to govt. or third party without warrant notify user when transferring to others not provide books purchased to credit card company Limited Tracking searching and preview doesn’t require registration not connect Google Book Search with other Google services allow anonymous search purge logging information Wednesday, December 29, 2010 10
  • 11. Google Book Search, cont’d. User Control allow control of other computers bookshelves Transparency and Enforceability robust, easy to read privacy provisions reader privacy commitment has to be legally enforceable. watermarks does not contain identifying information publish number of requests Wednesday, December 29, 2010 11
  • 12. Telecom Package HADOPI-ism Amendment 138 - Prior Ruling. History - 2nd Reading - copyright enforcement. Bono Report Amendment vote for 138 twice. Wednesday, December 29, 2010 12
  • 13. Amendment 138 Amending Recital 3a adopted in 2nd reading: Recognising that the Internet is essential for education and for the exercise of freedom of expression and access to information, any restriction imposed on the access and/or use of the Internet should be in accordance with the general principles of Community law, notably in accordance with the European Convention of Human Rights and the Charter of Fundamental Rights of the European Union. In particular, end-users’ access to electronic communications services should not be suspended without prior ruling by the judicial authorities without prejudice to the competence of a Member State to determine in line with its own constitutional order and with fundamental rights appropriate procedural safeguards assuring due process. Wednesday, December 29, 2010 13
  • 14. EDPS Opinion - Telecom Package [EDPS Comments on Some Issue in the Review of Directive 2002/22/EC (Universal Service) (16 Feb. 2009): http://www.edps.europa.eu/EDPSWEB/webdav/shared/Documents/Consultation/Comments/ 2009/09-02-16_Comments_ePrivacy_EN.pdf] In Par. 15, the EDPS makes clear "that it would not be allowed for Internet Service Providers to cut subscribers’ Internet connections on the basis of mere alleged copyright infringements made by private sector organizations." The EDPS also made clear that he "considers that Amendment 138 and Article 32a of the Universal Service Directive provide for a balanced wording by emphasizing fundamental rights. The need to safeguard such rights is particularly important in the context of these Directives which, as pointed out above, lay the grounds for the creation of "three strikes approach mechanisms" entailing broad, systematic surveillance of individuals’ use of the Internet." [Par. 21]  The EDPS lays out the Plan B fundamental rights protections that could serve as an authoritative guide to the priorities of fundamental rights more specifically in the rewording, describing that "[t]he combination of Articles 21.4a and 33.2a and Recitals 12c, 14b and 25 of the Universal Service Directive probably ensure that any cooperation mechanism has to (1) respect the protection of privacy and personal data of individuals; (2) avoid the systematic monitoring of Internet usage and (3) respect due process, meaning that it is up to authorities, by applying due process, not to copyright holders or Internet Service Providers, to determine whether content is lawful or not." He concludes: "However, it would have been preferable if Amendment 138 and Article 32a had been accepted by the Council insofar as they would have strengthened these safeguards." [Par. 22] Wednesday, December 29, 2010 14
  • 15. Three Strikes Laws Vigilante justice - Internet Access Termination France, South Korea, Italy, New Zealand, UK Graduated Response - riposte graduee military strategy (invented Mc Namara during the Cold War to fight Russian nuke menace) educational notice how to secure your wireless connection if not you. Temporary suspension of account - Digital Guillotine. Digital Ostracism not general scanning for other materials facing data protection problems Wednesday, December 29, 2010 15
  • 16. ACTA Internet Provisions being negotiated today Increased ISP liability. introduce duty to monitor/filter must implement a notice and takedown regime increased standard for criminal copyright change the definition of piracy and counterfeiting anti-circumvention provisions there’s an exception for private data. but there are no tools. Wednesday, December 29, 2010 16
  • 17. The Priority of Privacy under attack by automated systems for copyright enforcement about the systematic reorientation of our expectations of privacy and the infrastructure of dissemination Wednesday, December 29, 2010 17