SlideShare una empresa de Scribd logo
1 de 17
LEGAL ISSUES IN P2P SHARING AND BIT TORRENT SUCHITRA BAI LEGAL COUNSEL ALTACIT GLOBAL CHENNAI
                   MEANING OF PEER     A peer is one instance of a BitTorrent client running on a computer on the Internet to which other clients connect and transfer data. Usually a peer does not have the complete file, but only parts of it.
                     MEANING OF SEED     A seeder is a peer that has a complete copy of the torrent and still offers it for upload. The more seeders there are, the better the chances of getting a higher download speed. If the seeder seeds the whole copy of the download they should get faster downloads.
           MEANING OF PEER-TO-PEER PEER-TO-PEER (P2P) systems are which allows only mutually trusted peers to participate. This is achieved by using a central server or Direct connect hubs to authenticate clients. Alternatively, users can exchange passwords or cryptographic keys with friends to form a decentralized network. Peer-to-peer systems are often called friend-to-friend (F2F) or group-based systems. Friend-to-friend systems only allow connections between users who know one another. Group-based networks allow any user to connect to any other, and thus they cannot grow in size without compromising their users' privacy.
                 WHAT IS FILE SHARING File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents or electronic books. It may be implemented in a variety of storage, transmission, and distribution models. Common methods are manual sharing using removable media, centralized computer file server installations on computer networks, World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer (P2P) networking.
              IS FILE SHARING ILLEGAL File sharing is not of itself illegal. However, the increasing popularity of the MP3 music format in the late 1990s led to the release and growth of  Napster and other software that aided the sharing of electronic files. This in practice led to a huge growth in illegal file sharing, the sharing of copyright protected files without permission.
                      Is P2P per se unlawful       P2P is not per se unlawful Generally, there will be no infringement of copyright in merely using P2P software. This is because the software is in most cases made available freely by the owners of copyright in circumstances giving rise to an implied license. Of course, if this is not the case then mere use of the software without license may infringe copyright in the software.       Nor will the use of P2P to share files involve a copyright infringement where the owner of copyright in the material being shared has consented to this. For example, academics and students may use P2P to share their work in order that others can provide critical comment. A lecturer might use P2P to make material available to his or her students.       It is the use of P2P to share or trade copyright works without the consent of license of the copyright owner that has the potential to give rise to an action for infringement of copyright. The reason for this – as will be discussed in more details below – is that merely making copyright material available on a server in a form in which it can be accessed by others will, in most cases, amount to an exercise of the copyright owner’s right of “communication to the public” as well as an exercise of the reproduction right (ie in making the electronic copy which is communicated to others)
     Ohio v. Perry, 83 Ohio St. 3d 41, 697                   N.E.2d 624 (Ohio 1998).    Uploading is copying. Downloading is also copying. Unauthorized copying is an unauthorized use that is governed by the copyright laws. Therefore, unauthorized uploading and unauthorized downloading are unauthorized uses governed by the copyright laws
                              DO’S OF P2P Technology has made digital copying easier than ever. But just because advances in technology make it possible to copy music doesn’t mean it’s legal to do so. Here are tips from some record labels on how to enjoy the music while respecting rights of others in the digital world. Stick with these, and you’ll be doing right by the people who created the music. Internet Copying It’s okay to download music from sites authorized by the owners of the copyrighted music, whether or not such sites charge a fee.
DON’T’S OF P2P It’s never okay to download unauthorized music from pirate sites (web or FTP) or peer-to-peer systems. Examples of peer-to-peer systems making unauthorized music available for download include: Kazaa, Grokster, WinMX, LimeWire, Bearshare, Aimster, Morpheus, and Gnutella.  It’s never okay to make unauthorized copies of music available to others (that is, uploading music) on peer-to-peer systems. It’s okay to copy music onto an analog cassette, but not for commercial purposes. It’s also okay to copy music onto special Audio CD-R’s, mini-discs, and digital tapes (because royalties have been paid on them) – but, again, not for commercial purposes. Beyond that, there’s no legal "right" to copy the copyrighted music on a CD onto a CD-R. However, burning a copy of CD onto a CD-R, or transferring a copy onto your computer hard drive or your portable music player, won’t usually raise concerns so long as:  The copy is made from an authorized original CD that you legitimately own The copy is just for your personal use. It’s not a personal use – in fact, it’s illegal – to give away the copy or lend it to others for copying. The owners of copyrighted music have the right to use protection technology to allow or prevent copying.  Remember, it’s never okay to sell or make commercial use of a copy that you make.
WHAT IS BIT TORRENT AND HOW DOES IT WORK ? BitTorrent is a peer-to-peer sharing protocol used for distributing large amounts of data.  BitTorrent protocol allows users to distribute large amounts of data without the heavy demands on their computers that would be needed for standard  Internet hosting. A standard host's servers can easily be brought to a halt if high levels of simultaneous data flow are reached. The protocol works as an alternative data distribution method that makes even small computers (e.g. mobile phones) with low bandwidth capable of participating in large data transfers. First, a user playing the role of file-provider makes a file available to the network. This first user's file is called a seed and its availability on the network allows other users, called peers, to connect and begin to download the seed file. As new peers connect to the network and request the same file, their computer receives a different piece of the data from the seed. Once multiple peers have multiple pieces of the seed, BitTorrent allows each to become a source for that portion of the file. The effect of this is to take on a small part of the task and relieve the initial user, distributing the file download task among the seed and many peers. With BitTorrent, no one computer needs to supply data in quantities which could jeopardize the task by overwhelming all resources, yet the same final result—each peer eventually receiving the entire file—is still reached. After the file is successfully and completely downloaded by a given peer, the peer is able to shift roles and become an additional seed, helping the remaining peers to receive the entire file. This eventual shift from peers to seeders determines the overall 'health' of the file (as determined by the number of times a file is available in its complete form). This distributed nature of BitTorrent leads to a flood like spreading of a file throughout peers. As more peers join the swarm, the likelihood of a successful download increases. Relative to standard Internet hosting, this provides a significant reduction in the original distributor's hardware and bandwidth resource costs. It also provides redundancy against system problems, reduces dependence on the original distributor and provides a source for the file which is generally temporary and therefore harder to trace than when provided by the enduring availability of a host in standard file distribution techniques.
WHAT CONSTITUTES INFRINGEMENT MGM et al v. Grokster et. Al.     "One who distributes a device with the object of promoting its use to infringe copyright...is liable for the resulting acts of infringement by third parties using the device". This was the holding of the United States Supreme Court in a landmark decisions handed on Monday, June 27 in the case of Is the distributor of file-sharing software, which is used for the unauthorized sharing of copyright-protected files, liable for the copyright infringement resulting from such act? The United States Supreme Court answered: Yes, if such distributor took active steps to encourage the infringing use.
      A&M Records, Inc. v. Napster, Inc.,  In 2000, A&M Recordsand several other recording companies sued Napster (A&M Records, Inc. v. Napster, Inc.) for contributory and vicarious copyright infringement under the US Digital Millennium Copyright Act (DMCA). The music industry made the following claims against Napster:         a. That its users were directly infringing the plaintiff's copyright;          b. That Napster was liable for contributory infringement of the plaintiff's copyright; and          c. That Napster was liable for vicarious infringement of the plaintiff's copyright.  Napster lost the case in the District Court and appealed to the U.S. Court of Appeals for the Ninth Circuit. Although the Ninth Circuit found that Napster was capable of commercially significant non-infringing uses, it affirmed the District Court's decision. On remand, the District Court ordered Napster to monitor the activities of its network and to block access to infringing material when notified of that material's location. Napster was unable to do this, and so shut down its service in July 2001. Napster finally declared itself bankrupt in 2002 and sold its assets.
          MGM et al v. Grokster et. Al Twenty-eight movie studios, music companies and other copyright holders, headed by MGM studios, filed suit against Grokster and Streamcast for copyright infringement. Grokster and Streamcast distributed file-sharing software which was used for sharing many copyright-protected music and movie files via peer-to-peer networks.  MGM et. al argued that Grokster and Streamcast are liable for the copyright infringement carried out by the users of their software under a secondary liability theory of "contributory infringement". They moved for damages and an injunction.  The US Supreme Court held on Monday June 27, 2005 that Grokster and Streamcast are liable for copyright infringement caused by the users of the software because they distributed the software with the object of promoting its use for infringing copyright. In doing so they induced the users to infringe the rights.
         REMEDIES FOR INFRINGEMENT CIVIL REMEDIES     A. Injunction     B. Damages or Accounts of Profit.     C. Delivery of Infringing copies and damages           for conversion.
CONTD… CRIMINAL REMEDIES     A. Imprisonment of Accused.     B. Imposition of fine or both.     C. Seizure of Infringing copies and delivery-up of infringing copies.
                               THANK YOU

Más contenido relacionado

La actualidad más candente

2 internet essentials
2 internet essentials2 internet essentials
2 internet essentialschris30931
 
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin, MSISA,CISSP
 
Websites 2007/2010 version
Websites 2007/2010 versionWebsites 2007/2010 version
Websites 2007/2010 versionJohan Koren
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrentSrikanth Vanama
 
The Links that became a Web: The 40-Year-Old Internet and the 20-Year-Old Web
The Links that became a Web:  The 40-Year-Old Internet and the 20-Year-Old WebThe Links that became a Web:  The 40-Year-Old Internet and the 20-Year-Old Web
The Links that became a Web: The 40-Year-Old Internet and the 20-Year-Old WebJohan Koren
 
Internet tools for students
Internet tools for studentsInternet tools for students
Internet tools for studentsBenjamin Garcia
 
Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet ArchDuty
 
Websites 2003 version
Websites 2003 versionWebsites 2003 version
Websites 2003 versionJohan Koren
 

La actualidad más candente (20)

2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
 
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigations
 
Websites 2007/2010 version
Websites 2007/2010 versionWebsites 2007/2010 version
Websites 2007/2010 version
 
the internet
the internetthe internet
the internet
 
fightingdci
fightingdcifightingdci
fightingdci
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
The Links that became a Web: The 40-Year-Old Internet and the 20-Year-Old Web
The Links that became a Web:  The 40-Year-Old Internet and the 20-Year-Old WebThe Links that became a Web:  The 40-Year-Old Internet and the 20-Year-Old Web
The Links that became a Web: The 40-Year-Old Internet and the 20-Year-Old Web
 
Websites
WebsitesWebsites
Websites
 
Internet tools for students
Internet tools for studentsInternet tools for students
Internet tools for students
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Internet Tools
Internet ToolsInternet Tools
Internet Tools
 
Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Internet
InternetInternet
Internet
 
Assignment on internet
Assignment on internetAssignment on internet
Assignment on internet
 
The internet and www
The internet and wwwThe internet and www
The internet and www
 
Illegal File Sharing
Illegal File SharingIllegal File Sharing
Illegal File Sharing
 
Illegal file sharing4
Illegal file sharing4Illegal file sharing4
Illegal file sharing4
 
Websites 2003 version
Websites 2003 versionWebsites 2003 version
Websites 2003 version
 
Net To Web 2003
Net To Web 2003Net To Web 2003
Net To Web 2003
 

Similar a Legal issues in p2 p sharing and bittorent

Similar a Legal issues in p2 p sharing and bittorent (20)

Limewire
LimewireLimewire
Limewire
 
Peer to Peer networks and piracy
Peer to Peer networks and piracyPeer to Peer networks and piracy
Peer to Peer networks and piracy
 
Make useof file-sharing
Make useof file-sharingMake useof file-sharing
Make useof file-sharing
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Polinter10
Polinter10Polinter10
Polinter10
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrent
 
P2p networks
P2p networksP2p networks
P2p networks
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
Peer to peer
Peer to peer Peer to peer
Peer to peer
 

Más de Altacit Global

Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Altacit Global
 
Sexual harassment during work from home
Sexual harassment during work from homeSexual harassment during work from home
Sexual harassment during work from homeAltacit Global
 
Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Altacit Global
 
Returns and refunds consumer protection act
Returns and refunds  consumer protection actReturns and refunds  consumer protection act
Returns and refunds consumer protection actAltacit Global
 
Rights of an unborn child
Rights of an unborn childRights of an unborn child
Rights of an unborn childAltacit Global
 
Grounds for divorce in India
Grounds for divorce in IndiaGrounds for divorce in India
Grounds for divorce in IndiaAltacit Global
 
Surrogacy laws-in-India
Surrogacy laws-in-IndiaSurrogacy laws-in-India
Surrogacy laws-in-IndiaAltacit Global
 
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Altacit Global
 
Requirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemRequirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemAltacit Global
 
Rights of employees under insolvent companies
Rights of employees under insolvent companiesRights of employees under insolvent companies
Rights of employees under insolvent companiesAltacit Global
 
Doctrine of originality copyright
Doctrine of originality copyrightDoctrine of originality copyright
Doctrine of originality copyrightAltacit Global
 
Restoration of lapsed patents in India
Restoration of lapsed patents in IndiaRestoration of lapsed patents in India
Restoration of lapsed patents in IndiaAltacit Global
 
Celebrity rights in India
Celebrity rights in IndiaCelebrity rights in India
Celebrity rights in IndiaAltacit Global
 
Technology Development Board
Technology Development BoardTechnology Development Board
Technology Development BoardAltacit Global
 
Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Altacit Global
 
Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Altacit Global
 
Legality of cryptocurrency in India
Legality of cryptocurrency in IndiaLegality of cryptocurrency in India
Legality of cryptocurrency in IndiaAltacit Global
 

Más de Altacit Global (20)

Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020
 
Sexual harassment during work from home
Sexual harassment during work from homeSexual harassment during work from home
Sexual harassment during work from home
 
Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...
 
Returns and refunds consumer protection act
Returns and refunds  consumer protection actReturns and refunds  consumer protection act
Returns and refunds consumer protection act
 
Rights of an unborn child
Rights of an unborn childRights of an unborn child
Rights of an unborn child
 
Grounds for divorce in India
Grounds for divorce in IndiaGrounds for divorce in India
Grounds for divorce in India
 
Alimony laws in India
Alimony laws in IndiaAlimony laws in India
Alimony laws in India
 
Patent licensing
Patent licensingPatent licensing
Patent licensing
 
Surrogacy laws-in-India
Surrogacy laws-in-IndiaSurrogacy laws-in-India
Surrogacy laws-in-India
 
I r s form w-9
I r s form w-9I r s form w-9
I r s form w-9
 
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
 
Requirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemRequirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft system
 
Rights of employees under insolvent companies
Rights of employees under insolvent companiesRights of employees under insolvent companies
Rights of employees under insolvent companies
 
Doctrine of originality copyright
Doctrine of originality copyrightDoctrine of originality copyright
Doctrine of originality copyright
 
Restoration of lapsed patents in India
Restoration of lapsed patents in IndiaRestoration of lapsed patents in India
Restoration of lapsed patents in India
 
Celebrity rights in India
Celebrity rights in IndiaCelebrity rights in India
Celebrity rights in India
 
Technology Development Board
Technology Development BoardTechnology Development Board
Technology Development Board
 
Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)
 
Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015
 
Legality of cryptocurrency in India
Legality of cryptocurrency in IndiaLegality of cryptocurrency in India
Legality of cryptocurrency in India
 

Último

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Último (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Legal issues in p2 p sharing and bittorent

  • 1. LEGAL ISSUES IN P2P SHARING AND BIT TORRENT SUCHITRA BAI LEGAL COUNSEL ALTACIT GLOBAL CHENNAI
  • 2. MEANING OF PEER A peer is one instance of a BitTorrent client running on a computer on the Internet to which other clients connect and transfer data. Usually a peer does not have the complete file, but only parts of it.
  • 3. MEANING OF SEED A seeder is a peer that has a complete copy of the torrent and still offers it for upload. The more seeders there are, the better the chances of getting a higher download speed. If the seeder seeds the whole copy of the download they should get faster downloads.
  • 4. MEANING OF PEER-TO-PEER PEER-TO-PEER (P2P) systems are which allows only mutually trusted peers to participate. This is achieved by using a central server or Direct connect hubs to authenticate clients. Alternatively, users can exchange passwords or cryptographic keys with friends to form a decentralized network. Peer-to-peer systems are often called friend-to-friend (F2F) or group-based systems. Friend-to-friend systems only allow connections between users who know one another. Group-based networks allow any user to connect to any other, and thus they cannot grow in size without compromising their users' privacy.
  • 5. WHAT IS FILE SHARING File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents or electronic books. It may be implemented in a variety of storage, transmission, and distribution models. Common methods are manual sharing using removable media, centralized computer file server installations on computer networks, World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer (P2P) networking.
  • 6. IS FILE SHARING ILLEGAL File sharing is not of itself illegal. However, the increasing popularity of the MP3 music format in the late 1990s led to the release and growth of Napster and other software that aided the sharing of electronic files. This in practice led to a huge growth in illegal file sharing, the sharing of copyright protected files without permission.
  • 7. Is P2P per se unlawful P2P is not per se unlawful Generally, there will be no infringement of copyright in merely using P2P software. This is because the software is in most cases made available freely by the owners of copyright in circumstances giving rise to an implied license. Of course, if this is not the case then mere use of the software without license may infringe copyright in the software. Nor will the use of P2P to share files involve a copyright infringement where the owner of copyright in the material being shared has consented to this. For example, academics and students may use P2P to share their work in order that others can provide critical comment. A lecturer might use P2P to make material available to his or her students. It is the use of P2P to share or trade copyright works without the consent of license of the copyright owner that has the potential to give rise to an action for infringement of copyright. The reason for this – as will be discussed in more details below – is that merely making copyright material available on a server in a form in which it can be accessed by others will, in most cases, amount to an exercise of the copyright owner’s right of “communication to the public” as well as an exercise of the reproduction right (ie in making the electronic copy which is communicated to others)
  • 8. Ohio v. Perry, 83 Ohio St. 3d 41, 697 N.E.2d 624 (Ohio 1998). Uploading is copying. Downloading is also copying. Unauthorized copying is an unauthorized use that is governed by the copyright laws. Therefore, unauthorized uploading and unauthorized downloading are unauthorized uses governed by the copyright laws
  • 9. DO’S OF P2P Technology has made digital copying easier than ever. But just because advances in technology make it possible to copy music doesn’t mean it’s legal to do so. Here are tips from some record labels on how to enjoy the music while respecting rights of others in the digital world. Stick with these, and you’ll be doing right by the people who created the music. Internet Copying It’s okay to download music from sites authorized by the owners of the copyrighted music, whether or not such sites charge a fee.
  • 10. DON’T’S OF P2P It’s never okay to download unauthorized music from pirate sites (web or FTP) or peer-to-peer systems. Examples of peer-to-peer systems making unauthorized music available for download include: Kazaa, Grokster, WinMX, LimeWire, Bearshare, Aimster, Morpheus, and Gnutella. It’s never okay to make unauthorized copies of music available to others (that is, uploading music) on peer-to-peer systems. It’s okay to copy music onto an analog cassette, but not for commercial purposes. It’s also okay to copy music onto special Audio CD-R’s, mini-discs, and digital tapes (because royalties have been paid on them) – but, again, not for commercial purposes. Beyond that, there’s no legal "right" to copy the copyrighted music on a CD onto a CD-R. However, burning a copy of CD onto a CD-R, or transferring a copy onto your computer hard drive or your portable music player, won’t usually raise concerns so long as: The copy is made from an authorized original CD that you legitimately own The copy is just for your personal use. It’s not a personal use – in fact, it’s illegal – to give away the copy or lend it to others for copying. The owners of copyrighted music have the right to use protection technology to allow or prevent copying. Remember, it’s never okay to sell or make commercial use of a copy that you make.
  • 11. WHAT IS BIT TORRENT AND HOW DOES IT WORK ? BitTorrent is a peer-to-peer sharing protocol used for distributing large amounts of data. BitTorrent protocol allows users to distribute large amounts of data without the heavy demands on their computers that would be needed for standard Internet hosting. A standard host's servers can easily be brought to a halt if high levels of simultaneous data flow are reached. The protocol works as an alternative data distribution method that makes even small computers (e.g. mobile phones) with low bandwidth capable of participating in large data transfers. First, a user playing the role of file-provider makes a file available to the network. This first user's file is called a seed and its availability on the network allows other users, called peers, to connect and begin to download the seed file. As new peers connect to the network and request the same file, their computer receives a different piece of the data from the seed. Once multiple peers have multiple pieces of the seed, BitTorrent allows each to become a source for that portion of the file. The effect of this is to take on a small part of the task and relieve the initial user, distributing the file download task among the seed and many peers. With BitTorrent, no one computer needs to supply data in quantities which could jeopardize the task by overwhelming all resources, yet the same final result—each peer eventually receiving the entire file—is still reached. After the file is successfully and completely downloaded by a given peer, the peer is able to shift roles and become an additional seed, helping the remaining peers to receive the entire file. This eventual shift from peers to seeders determines the overall 'health' of the file (as determined by the number of times a file is available in its complete form). This distributed nature of BitTorrent leads to a flood like spreading of a file throughout peers. As more peers join the swarm, the likelihood of a successful download increases. Relative to standard Internet hosting, this provides a significant reduction in the original distributor's hardware and bandwidth resource costs. It also provides redundancy against system problems, reduces dependence on the original distributor and provides a source for the file which is generally temporary and therefore harder to trace than when provided by the enduring availability of a host in standard file distribution techniques.
  • 12. WHAT CONSTITUTES INFRINGEMENT MGM et al v. Grokster et. Al. "One who distributes a device with the object of promoting its use to infringe copyright...is liable for the resulting acts of infringement by third parties using the device". This was the holding of the United States Supreme Court in a landmark decisions handed on Monday, June 27 in the case of Is the distributor of file-sharing software, which is used for the unauthorized sharing of copyright-protected files, liable for the copyright infringement resulting from such act? The United States Supreme Court answered: Yes, if such distributor took active steps to encourage the infringing use.
  • 13. A&M Records, Inc. v. Napster, Inc., In 2000, A&M Recordsand several other recording companies sued Napster (A&M Records, Inc. v. Napster, Inc.) for contributory and vicarious copyright infringement under the US Digital Millennium Copyright Act (DMCA). The music industry made the following claims against Napster: a. That its users were directly infringing the plaintiff's copyright; b. That Napster was liable for contributory infringement of the plaintiff's copyright; and c. That Napster was liable for vicarious infringement of the plaintiff's copyright. Napster lost the case in the District Court and appealed to the U.S. Court of Appeals for the Ninth Circuit. Although the Ninth Circuit found that Napster was capable of commercially significant non-infringing uses, it affirmed the District Court's decision. On remand, the District Court ordered Napster to monitor the activities of its network and to block access to infringing material when notified of that material's location. Napster was unable to do this, and so shut down its service in July 2001. Napster finally declared itself bankrupt in 2002 and sold its assets.
  • 14. MGM et al v. Grokster et. Al Twenty-eight movie studios, music companies and other copyright holders, headed by MGM studios, filed suit against Grokster and Streamcast for copyright infringement. Grokster and Streamcast distributed file-sharing software which was used for sharing many copyright-protected music and movie files via peer-to-peer networks.  MGM et. al argued that Grokster and Streamcast are liable for the copyright infringement carried out by the users of their software under a secondary liability theory of "contributory infringement". They moved for damages and an injunction. The US Supreme Court held on Monday June 27, 2005 that Grokster and Streamcast are liable for copyright infringement caused by the users of the software because they distributed the software with the object of promoting its use for infringing copyright. In doing so they induced the users to infringe the rights.
  • 15. REMEDIES FOR INFRINGEMENT CIVIL REMEDIES A. Injunction B. Damages or Accounts of Profit. C. Delivery of Infringing copies and damages for conversion.
  • 16. CONTD… CRIMINAL REMEDIES A. Imprisonment of Accused. B. Imposition of fine or both. C. Seizure of Infringing copies and delivery-up of infringing copies.
  • 17. THANK YOU