SlideShare a Scribd company logo
1 of 31
Andrés Guadamuz SCRIPT – University of Edinburgh The Evolving Role of Intermediaries: The Challenge of Regulating Their Liability
[Insert Apology]
"The Internet is a worldwide network of computers that contains millions of pages of information. Users are cautioned that many of these pages include offensive and inappropriate material. In general, it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an email address on the internet may lead to receipt of unsolicited e-mail containing offensive content. A user accessing the internet does so at his/her own risk. Hotel X and its affiliates are not responsible for material viewed or downloaded by users from the internet."   Wifi at my hotel
Internet Service Provider (ISP) Online services Google Facebook Twitter User generated content sites Blogger YouTube Flickr Internet café Hotel University Workplace Restaurants What is an Intermediary?
Early history
Are intermediaries liable for content placed by their Customers?
Compuserve was a Bulletin Board Service, a dial-in pre WWW system.  Defamation case. Compuserve hosted forums managed by a third party.  Rumorville, a newsletter provider, posted defamatory content against Cubby Inc, who sued for libel and unfair competition.  United States District Court for the Southern District of New York which held that Internet service providers were subject to traditional defamation law for their hosted content. This ruling set the stage for various similar intermediary cases in the U.S. Cubby v Compuserve (1991)
An unknown person, purporting to be Dr Laurence Godfrey, a lecturer in physics, mathematics and computer science based in London , made a defamatory posting which appeared on Demon's news server in the UK .  The posting could be read by Demon's customers.  When Mr Godfrey asked Demon to remove the posting (having explained that it was a forgery), Demon did not do so.  The court found that up until receiving notification of the existence of the allegedly defamatory posting, Demon could not have had sufficient reason to suspect that it was not made by Mr Godfrey. However, from the point that actual knowledge was received, the defence was no longer available. Godfrey v Demon (1999)
Liguecontre le racisme et l'antisémitisme (LICRA) complained that Yahoo! were allowing their online auction service to be used for the sale of memorabilia from the Nazi period. These facts were not contested during the case. The defense rested on the fact that these auctions were conducted under the jurisdiction of the United States. It was claimed that there were no technical means to prevent French residents from participating in these auctions, at least without placing the company in financial difficulty and compromising the existence of the Internet. The defendants noted    1. that their servers were located on US territory,    2. that their services were primarily aimed at US residents,    3. that the First Amendment to the United States Constitution guarantees freedom of speech and expression, and that any attempt to enforce a judgment in the United States would fail for unconstitutionality. As such, they contended that the French court was incompetent to hear the case. LICRA v. Yahoo! (2000)
Limiting Intermediary Liability
Article 10. Limitations and Exceptions (1) Contracting Parties may, in their national legislation, provide for limitations of or exceptions to the rights granted to authors of literary and artistic works under this Treaty in certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. (2) Contracting Parties shall, when applying the Berne Convention, confine any limitations of or exceptions to rights provided for therein to certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. WIPO Copyright Treaty 1996
§ 512. Limitations on liability relating to material online (Safe Harbor) (a) Transitory Digital Network Communications. […] (b) System Caching. […] (g) Replacement of Removed or Disabled Material and Limitation on Other Liability.—  (1) No liability for taking down generally.— Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider’s good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing.  Digital Millennium Copyright Act 1998
Article 12. "Mere conduit" 1. Where an information society service is provided that consists of the transmission in a communication network of information provided by a recipient of the service, or the provision of access to a communication network, Member States shall ensure that the service provider is not liable for the information transmitted, on condition that the provider: (a) does not initiate the transmission; (b) does not select the receiver of the transmission; and (c) does not select or modify the information contained in the transmission. E-Commerce Directive (2000/31/EC)
Article 5. Exceptions and limitations 1. Temporary acts of reproduction referred to in Article 2, which are transient or incidental [and] an integral and essential part of a technological process and whose sole purpose is to enable: (a) a transmission in a network between third parties by an intermediary, or (b) a lawful use of a work or other subject-matter to be made, and which have no independent economic significance, shall be exempted from the reproduction right provided for in Article 2. Info Soc Directive (2001/29/EC)
Notice and TakeDown Regime
Intermediary Liability Redux
Grumblings about status quo
Case brought in 2007 U.S. TV channel Viacom sued YouTube (hence Google) for copyright infringement of videos uploaded by their customers. YouTube argued that most videos on YouTube are non-infringing, and they will take-down content (Safe Harbor). Case dismissed early 2010. Viacom v YouTube
The Belgian Society of Authors, Composers, and Publishers (Sabam) sued ISP Tiscali (later Scarlet).  Sabamwanted Tiscali to install filtering software in its network which would allegedly curb illicit filesharing in P2P networks. The first ruling in the District Court of Brussels agreed with the claimants based entirely on expert reports about the feasibility of deploying filtering systems. Appealed. Court of appeals referred to European Court of Justice (ECJ) specifically on question of injunctive relief against intermediaries. Sabam v Tiscali (2007-Present)
In 2007, Irish Recorded Music Association (IRMA) members sued Eircom, the largest broadband provider in Ireland, over alleged illegal file sharing by subscribers.  IRMA had previously demanded that Eircominstall content filters or take other steps to block IRMA's copyrighted music from being shared, but they did not comply. Parties settled out of court in January 2009. As a result, Eircom agreed to implement a three-strikes system, where alleged infringers will be detected by the record companies, IP addresses notified to Eircom, and users disconnected (after warnings) by Eircom. In August 2009 Eircom began filtering PirateBay.org to mixed results.  Irish Recording Music Association (IRMA) v Eircom (2007-2009)
iiNet is an Australian internet provider, which was sued by Australian film producer Roadshow Films, part of the Village Roadshow conglomerate, and several Holywood studios. Test case for new ISP liability.  The question at the heart of the proceedings was whether an ISP is to be held liable for the copyright infringement committed by its customers. The judge accurately identified that the case hinged on two simple questions.   Have the iiNet customers infringed copyright directly?  Yes.   Has iiNetauthorised the copyright infringement of its users by failing to take steps to stop it from happening? No. Under appeal. Roadshow Films v iiNet (2010)
Disconnection, Graduated Responses and Three Strikes
“Haute Autorité pour la diffusion des oeuvres et la protection des droitssur Internet ” (2009) Troubled passage through parliament.  In June 2009 French Constitutional Court extended freedom of expression to include “freedom to access the internet”. New graduated response passed in Parliament. Warning stage Investigations by rightholders’ accredited agents  Rightholders can put their cases  The HADOPI examines the facts (swiftly) Disconnection phase:  Only court can disconnect (up to one month) HADOPI maintains list of banned subscribers HADOPI
Adopted in July 2009. Article 133bis of the Korean Copyright Act. Allows the Korean Copyright Commission to recommend ISPs to suspend the accounts of repeat file sharing offenders (as adjudged by the Commission) for six months.  Users' email accounts are not to be suspended. 30,000 notices have been sent (by September 2010). No person has been disconnected (yet). South Korea
Will establish a multi-tiered obligation for intermediaries.  ISP are under obligations to:  monitor user activity; Provide content owners with lists of copyright infringers; notify users of infringement reports; limit Internet access (slow down connection) Finally, the ISP will disconnect user. Costs are shared between ISP and content owner. Appeals procedure. Specifics of the regime are under review by the telecommunications regulator (OFCOM). Digital Economy Act (2010)
New trade agreement negotiated initially in secret between US, EU, Canada, South Korea, Japan, NZ, Australia, and others. Initially was supposed to include three strikes. Seriously watered-down due to political pressure in several countries (particularly Canada and Europe). Intermediary positions are now considerably lower. Maintains notice-and-take-down regimes to a large extent.  Anti-Counterfeiting Trade Agreement (ACTA)
Does it work?
Some emerging issues
The coming Cyberwar
The Great Intermediary War?
Questions?

More Related Content

What's hot

Domain name and trade dispute
Domain name and trade disputeDomain name and trade dispute
Domain name and trade dispute
Saravanan A
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
Ristya Anditha
 
Cybersquattingand its remedies
Cybersquattingand its remediesCybersquattingand its remedies
Cybersquattingand its remedies
Altacit Global
 
Microsoft power point domain and cyber squatting [compatibility mode]
Microsoft power point   domain and cyber squatting [compatibility mode]Microsoft power point   domain and cyber squatting [compatibility mode]
Microsoft power point domain and cyber squatting [compatibility mode]
sanjeev kumar chaswal
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 

What's hot (20)

Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Domain name and trade dispute
Domain name and trade disputeDomain name and trade dispute
Domain name and trade dispute
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 
Trademark infringement and passing off remedies
Trademark infringement and passing off remediesTrademark infringement and passing off remedies
Trademark infringement and passing off remedies
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Cybersquattingand its remedies
Cybersquattingand its remediesCybersquattingand its remedies
Cybersquattingand its remedies
 
Traditional vs E-contract
Traditional vs E-contractTraditional vs E-contract
Traditional vs E-contract
 
Microsoft power point domain and cyber squatting [compatibility mode]
Microsoft power point   domain and cyber squatting [compatibility mode]Microsoft power point   domain and cyber squatting [compatibility mode]
Microsoft power point domain and cyber squatting [compatibility mode]
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Copyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in CyberspaceCopyright Law and Trademark Law in Cyberspace
Copyright Law and Trademark Law in Cyberspace
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 

Viewers also liked

Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
Putri Sanuria
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
Raunaq Jaiswal
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider
hazirma
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.
Gaurav Chordia
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
loizazeptania
 
AIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP PresentationAIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP Presentation
markASsantiago
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
Vishal Singh
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Viewers also liked (19)

Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
 
Isp
IspIsp
Isp
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Isp
IspIsp
Isp
 
ISP
ISPISP
ISP
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider
 
CH6
CH6CH6
CH6
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
 
AIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP PresentationAIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP Presentation
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
ISP business plan
ISP business plan ISP business plan
ISP business plan
 
E Payment
E PaymentE Payment
E Payment
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
 
ISP
ISPISP
ISP
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Internet Service Provider Liability

Liberalization Intellectual Property Rights
Liberalization  Intellectual Property RightsLiberalization  Intellectual Property Rights
Liberalization Intellectual Property Rights
lkipenis
 
March 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the USMarch 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the US
CobaltSophie
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
David Phillips
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
Emily Laidlaw
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
bsookman
 

Similar to Internet Service Provider Liability (20)

SCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawSCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet Law
 
Liberalization Intellectual Property Rights
Liberalization  Intellectual Property RightsLiberalization  Intellectual Property Rights
Liberalization Intellectual Property Rights
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
March 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the USMarch 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the US
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Floundering towards EU information law
Floundering towards EU information lawFloundering towards EU information law
Floundering towards EU information law
 
Developments in intermediary liability
Developments in intermediary liabilityDevelopments in intermediary liability
Developments in intermediary liability
 
Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet
 
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V Es
 
2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
 
International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014
 

More from Andres Guadamuz

More from Andres Guadamuz (20)

Inteligencia Artificial, Propiedad Intelectual, y ODS
Inteligencia Artificial, Propiedad Intelectual, y ODSInteligencia Artificial, Propiedad Intelectual, y ODS
Inteligencia Artificial, Propiedad Intelectual, y ODS
 
Do androids dream of electric copyright?
Do androids dream of electric copyright?Do androids dream of electric copyright?
Do androids dream of electric copyright?
 
Distinctive brands game
Distinctive brands gameDistinctive brands game
Distinctive brands game
 
AI Copyright Authorship
AI Copyright AuthorshipAI Copyright Authorship
AI Copyright Authorship
 
Metaverse: Some regulatory musings
Metaverse: Some regulatory musingsMetaverse: Some regulatory musings
Metaverse: Some regulatory musings
 
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
 
The Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse RebornThe Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse Reborn
 
Understanding the NFT Ecosystem
Understanding the NFT Ecosystem Understanding the NFT Ecosystem
Understanding the NFT Ecosystem
 
Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)
 
Ceci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-landCeci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-land
 
Contratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativasContratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativas
 
Ai and copyright: the way forward
Ai and copyright: the way forwardAi and copyright: the way forward
Ai and copyright: the way forward
 
FALL: or Dodge in Hell
FALL: or Dodge in HellFALL: or Dodge in Hell
FALL: or Dodge in Hell
 
AI Copyright international perspective
AI Copyright international perspectiveAI Copyright international perspective
AI Copyright international perspective
 
Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?
 
Copyright and Art
Copyright and ArtCopyright and Art
Copyright and Art
 
Cyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmaresCyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmares
 
All watched over machines of loving grace amsterdam
All watched over machines of loving grace  amsterdamAll watched over machines of loving grace  amsterdam
All watched over machines of loving grace amsterdam
 
All watched over machines of loving grace
All watched over machines of loving graceAll watched over machines of loving grace
All watched over machines of loving grace
 
Ready player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASISReady player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASIS
 

Recently uploaded

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Internet Service Provider Liability

  • 1. Andrés Guadamuz SCRIPT – University of Edinburgh The Evolving Role of Intermediaries: The Challenge of Regulating Their Liability
  • 3. "The Internet is a worldwide network of computers that contains millions of pages of information. Users are cautioned that many of these pages include offensive and inappropriate material. In general, it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an email address on the internet may lead to receipt of unsolicited e-mail containing offensive content. A user accessing the internet does so at his/her own risk. Hotel X and its affiliates are not responsible for material viewed or downloaded by users from the internet."  Wifi at my hotel
  • 4. Internet Service Provider (ISP) Online services Google Facebook Twitter User generated content sites Blogger YouTube Flickr Internet café Hotel University Workplace Restaurants What is an Intermediary?
  • 6. Are intermediaries liable for content placed by their Customers?
  • 7. Compuserve was a Bulletin Board Service, a dial-in pre WWW system. Defamation case. Compuserve hosted forums managed by a third party. Rumorville, a newsletter provider, posted defamatory content against Cubby Inc, who sued for libel and unfair competition. United States District Court for the Southern District of New York which held that Internet service providers were subject to traditional defamation law for their hosted content. This ruling set the stage for various similar intermediary cases in the U.S. Cubby v Compuserve (1991)
  • 8. An unknown person, purporting to be Dr Laurence Godfrey, a lecturer in physics, mathematics and computer science based in London , made a defamatory posting which appeared on Demon's news server in the UK . The posting could be read by Demon's customers. When Mr Godfrey asked Demon to remove the posting (having explained that it was a forgery), Demon did not do so. The court found that up until receiving notification of the existence of the allegedly defamatory posting, Demon could not have had sufficient reason to suspect that it was not made by Mr Godfrey. However, from the point that actual knowledge was received, the defence was no longer available. Godfrey v Demon (1999)
  • 9. Liguecontre le racisme et l'antisémitisme (LICRA) complained that Yahoo! were allowing their online auction service to be used for the sale of memorabilia from the Nazi period. These facts were not contested during the case. The defense rested on the fact that these auctions were conducted under the jurisdiction of the United States. It was claimed that there were no technical means to prevent French residents from participating in these auctions, at least without placing the company in financial difficulty and compromising the existence of the Internet. The defendants noted 1. that their servers were located on US territory, 2. that their services were primarily aimed at US residents, 3. that the First Amendment to the United States Constitution guarantees freedom of speech and expression, and that any attempt to enforce a judgment in the United States would fail for unconstitutionality. As such, they contended that the French court was incompetent to hear the case. LICRA v. Yahoo! (2000)
  • 11. Article 10. Limitations and Exceptions (1) Contracting Parties may, in their national legislation, provide for limitations of or exceptions to the rights granted to authors of literary and artistic works under this Treaty in certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. (2) Contracting Parties shall, when applying the Berne Convention, confine any limitations of or exceptions to rights provided for therein to certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. WIPO Copyright Treaty 1996
  • 12. § 512. Limitations on liability relating to material online (Safe Harbor) (a) Transitory Digital Network Communications. […] (b) System Caching. […] (g) Replacement of Removed or Disabled Material and Limitation on Other Liability.— (1) No liability for taking down generally.— Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider’s good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing. Digital Millennium Copyright Act 1998
  • 13. Article 12. "Mere conduit" 1. Where an information society service is provided that consists of the transmission in a communication network of information provided by a recipient of the service, or the provision of access to a communication network, Member States shall ensure that the service provider is not liable for the information transmitted, on condition that the provider: (a) does not initiate the transmission; (b) does not select the receiver of the transmission; and (c) does not select or modify the information contained in the transmission. E-Commerce Directive (2000/31/EC)
  • 14. Article 5. Exceptions and limitations 1. Temporary acts of reproduction referred to in Article 2, which are transient or incidental [and] an integral and essential part of a technological process and whose sole purpose is to enable: (a) a transmission in a network between third parties by an intermediary, or (b) a lawful use of a work or other subject-matter to be made, and which have no independent economic significance, shall be exempted from the reproduction right provided for in Article 2. Info Soc Directive (2001/29/EC)
  • 18. Case brought in 2007 U.S. TV channel Viacom sued YouTube (hence Google) for copyright infringement of videos uploaded by their customers. YouTube argued that most videos on YouTube are non-infringing, and they will take-down content (Safe Harbor). Case dismissed early 2010. Viacom v YouTube
  • 19. The Belgian Society of Authors, Composers, and Publishers (Sabam) sued ISP Tiscali (later Scarlet). Sabamwanted Tiscali to install filtering software in its network which would allegedly curb illicit filesharing in P2P networks. The first ruling in the District Court of Brussels agreed with the claimants based entirely on expert reports about the feasibility of deploying filtering systems. Appealed. Court of appeals referred to European Court of Justice (ECJ) specifically on question of injunctive relief against intermediaries. Sabam v Tiscali (2007-Present)
  • 20. In 2007, Irish Recorded Music Association (IRMA) members sued Eircom, the largest broadband provider in Ireland, over alleged illegal file sharing by subscribers. IRMA had previously demanded that Eircominstall content filters or take other steps to block IRMA's copyrighted music from being shared, but they did not comply. Parties settled out of court in January 2009. As a result, Eircom agreed to implement a three-strikes system, where alleged infringers will be detected by the record companies, IP addresses notified to Eircom, and users disconnected (after warnings) by Eircom. In August 2009 Eircom began filtering PirateBay.org to mixed results. Irish Recording Music Association (IRMA) v Eircom (2007-2009)
  • 21. iiNet is an Australian internet provider, which was sued by Australian film producer Roadshow Films, part of the Village Roadshow conglomerate, and several Holywood studios. Test case for new ISP liability.  The question at the heart of the proceedings was whether an ISP is to be held liable for the copyright infringement committed by its customers. The judge accurately identified that the case hinged on two simple questions.  Have the iiNet customers infringed copyright directly?  Yes.  Has iiNetauthorised the copyright infringement of its users by failing to take steps to stop it from happening? No. Under appeal. Roadshow Films v iiNet (2010)
  • 23. “Haute Autorité pour la diffusion des oeuvres et la protection des droitssur Internet ” (2009) Troubled passage through parliament. In June 2009 French Constitutional Court extended freedom of expression to include “freedom to access the internet”. New graduated response passed in Parliament. Warning stage Investigations by rightholders’ accredited agents Rightholders can put their cases The HADOPI examines the facts (swiftly) Disconnection phase: Only court can disconnect (up to one month) HADOPI maintains list of banned subscribers HADOPI
  • 24. Adopted in July 2009. Article 133bis of the Korean Copyright Act. Allows the Korean Copyright Commission to recommend ISPs to suspend the accounts of repeat file sharing offenders (as adjudged by the Commission) for six months. Users' email accounts are not to be suspended. 30,000 notices have been sent (by September 2010). No person has been disconnected (yet). South Korea
  • 25. Will establish a multi-tiered obligation for intermediaries. ISP are under obligations to: monitor user activity; Provide content owners with lists of copyright infringers; notify users of infringement reports; limit Internet access (slow down connection) Finally, the ISP will disconnect user. Costs are shared between ISP and content owner. Appeals procedure. Specifics of the regime are under review by the telecommunications regulator (OFCOM). Digital Economy Act (2010)
  • 26. New trade agreement negotiated initially in secret between US, EU, Canada, South Korea, Japan, NZ, Australia, and others. Initially was supposed to include three strikes. Seriously watered-down due to political pressure in several countries (particularly Canada and Europe). Intermediary positions are now considerably lower. Maintains notice-and-take-down regimes to a large extent. Anti-Counterfeiting Trade Agreement (ACTA)