SlideShare a Scribd company logo
1 of 31
Andrés Guadamuz SCRIPT – University of Edinburgh The Evolving Role of Intermediaries: The Challenge of Regulating Their Liability
[Insert Apology]
"The Internet is a worldwide network of computers that contains millions of pages of information. Users are cautioned that many of these pages include offensive and inappropriate material. In general, it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an email address on the internet may lead to receipt of unsolicited e-mail containing offensive content. A user accessing the internet does so at his/her own risk. Hotel X and its affiliates are not responsible for material viewed or downloaded by users from the internet."   Wifi at my hotel
Internet Service Provider (ISP) Online services Google Facebook Twitter User generated content sites Blogger YouTube Flickr Internet café Hotel University Workplace Restaurants What is an Intermediary?
Early history
Are intermediaries liable for content placed by their Customers?
Compuserve was a Bulletin Board Service, a dial-in pre WWW system.  Defamation case. Compuserve hosted forums managed by a third party.  Rumorville, a newsletter provider, posted defamatory content against Cubby Inc, who sued for libel and unfair competition.  United States District Court for the Southern District of New York which held that Internet service providers were subject to traditional defamation law for their hosted content. This ruling set the stage for various similar intermediary cases in the U.S. Cubby v Compuserve (1991)
An unknown person, purporting to be Dr Laurence Godfrey, a lecturer in physics, mathematics and computer science based in London , made a defamatory posting which appeared on Demon's news server in the UK .  The posting could be read by Demon's customers.  When Mr Godfrey asked Demon to remove the posting (having explained that it was a forgery), Demon did not do so.  The court found that up until receiving notification of the existence of the allegedly defamatory posting, Demon could not have had sufficient reason to suspect that it was not made by Mr Godfrey. However, from the point that actual knowledge was received, the defence was no longer available. Godfrey v Demon (1999)
Liguecontre le racisme et l'antisémitisme (LICRA) complained that Yahoo! were allowing their online auction service to be used for the sale of memorabilia from the Nazi period. These facts were not contested during the case. The defense rested on the fact that these auctions were conducted under the jurisdiction of the United States. It was claimed that there were no technical means to prevent French residents from participating in these auctions, at least without placing the company in financial difficulty and compromising the existence of the Internet. The defendants noted    1. that their servers were located on US territory,    2. that their services were primarily aimed at US residents,    3. that the First Amendment to the United States Constitution guarantees freedom of speech and expression, and that any attempt to enforce a judgment in the United States would fail for unconstitutionality. As such, they contended that the French court was incompetent to hear the case. LICRA v. Yahoo! (2000)
Limiting Intermediary Liability
Article 10. Limitations and Exceptions (1) Contracting Parties may, in their national legislation, provide for limitations of or exceptions to the rights granted to authors of literary and artistic works under this Treaty in certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. (2) Contracting Parties shall, when applying the Berne Convention, confine any limitations of or exceptions to rights provided for therein to certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. WIPO Copyright Treaty 1996
§ 512. Limitations on liability relating to material online (Safe Harbor) (a) Transitory Digital Network Communications. […] (b) System Caching. […] (g) Replacement of Removed or Disabled Material and Limitation on Other Liability.—  (1) No liability for taking down generally.— Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider’s good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing.  Digital Millennium Copyright Act 1998
Article 12. "Mere conduit" 1. Where an information society service is provided that consists of the transmission in a communication network of information provided by a recipient of the service, or the provision of access to a communication network, Member States shall ensure that the service provider is not liable for the information transmitted, on condition that the provider: (a) does not initiate the transmission; (b) does not select the receiver of the transmission; and (c) does not select or modify the information contained in the transmission. E-Commerce Directive (2000/31/EC)
Article 5. Exceptions and limitations 1. Temporary acts of reproduction referred to in Article 2, which are transient or incidental [and] an integral and essential part of a technological process and whose sole purpose is to enable: (a) a transmission in a network between third parties by an intermediary, or (b) a lawful use of a work or other subject-matter to be made, and which have no independent economic significance, shall be exempted from the reproduction right provided for in Article 2. Info Soc Directive (2001/29/EC)
Notice and TakeDown Regime
Intermediary Liability Redux
Grumblings about status quo
Case brought in 2007 U.S. TV channel Viacom sued YouTube (hence Google) for copyright infringement of videos uploaded by their customers. YouTube argued that most videos on YouTube are non-infringing, and they will take-down content (Safe Harbor). Case dismissed early 2010. Viacom v YouTube
The Belgian Society of Authors, Composers, and Publishers (Sabam) sued ISP Tiscali (later Scarlet).  Sabamwanted Tiscali to install filtering software in its network which would allegedly curb illicit filesharing in P2P networks. The first ruling in the District Court of Brussels agreed with the claimants based entirely on expert reports about the feasibility of deploying filtering systems. Appealed. Court of appeals referred to European Court of Justice (ECJ) specifically on question of injunctive relief against intermediaries. Sabam v Tiscali (2007-Present)
In 2007, Irish Recorded Music Association (IRMA) members sued Eircom, the largest broadband provider in Ireland, over alleged illegal file sharing by subscribers.  IRMA had previously demanded that Eircominstall content filters or take other steps to block IRMA's copyrighted music from being shared, but they did not comply. Parties settled out of court in January 2009. As a result, Eircom agreed to implement a three-strikes system, where alleged infringers will be detected by the record companies, IP addresses notified to Eircom, and users disconnected (after warnings) by Eircom. In August 2009 Eircom began filtering PirateBay.org to mixed results.  Irish Recording Music Association (IRMA) v Eircom (2007-2009)
iiNet is an Australian internet provider, which was sued by Australian film producer Roadshow Films, part of the Village Roadshow conglomerate, and several Holywood studios. Test case for new ISP liability.  The question at the heart of the proceedings was whether an ISP is to be held liable for the copyright infringement committed by its customers. The judge accurately identified that the case hinged on two simple questions.   Have the iiNet customers infringed copyright directly?  Yes.   Has iiNetauthorised the copyright infringement of its users by failing to take steps to stop it from happening? No. Under appeal. Roadshow Films v iiNet (2010)
Disconnection, Graduated Responses and Three Strikes
“Haute Autorité pour la diffusion des oeuvres et la protection des droitssur Internet ” (2009) Troubled passage through parliament.  In June 2009 French Constitutional Court extended freedom of expression to include “freedom to access the internet”. New graduated response passed in Parliament. Warning stage Investigations by rightholders’ accredited agents  Rightholders can put their cases  The HADOPI examines the facts (swiftly) Disconnection phase:  Only court can disconnect (up to one month) HADOPI maintains list of banned subscribers HADOPI
Adopted in July 2009. Article 133bis of the Korean Copyright Act. Allows the Korean Copyright Commission to recommend ISPs to suspend the accounts of repeat file sharing offenders (as adjudged by the Commission) for six months.  Users' email accounts are not to be suspended. 30,000 notices have been sent (by September 2010). No person has been disconnected (yet). South Korea
Will establish a multi-tiered obligation for intermediaries.  ISP are under obligations to:  monitor user activity; Provide content owners with lists of copyright infringers; notify users of infringement reports; limit Internet access (slow down connection) Finally, the ISP will disconnect user. Costs are shared between ISP and content owner. Appeals procedure. Specifics of the regime are under review by the telecommunications regulator (OFCOM). Digital Economy Act (2010)
New trade agreement negotiated initially in secret between US, EU, Canada, South Korea, Japan, NZ, Australia, and others. Initially was supposed to include three strikes. Seriously watered-down due to political pressure in several countries (particularly Canada and Europe). Intermediary positions are now considerably lower. Maintains notice-and-take-down regimes to a large extent.  Anti-Counterfeiting Trade Agreement (ACTA)
Does it work?
Some emerging issues
The coming Cyberwar
The Great Intermediary War?
Questions?

More Related Content

What's hot

Rule against perpetuity
Rule against perpetuityRule against perpetuity
Rule against perpetuity
Sunit Kapoor
 
Sources of hindu law
Sources of hindu lawSources of hindu law
Sources of hindu law
badhon11-2104
 

What's hot (20)

Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Legitimacy, Legitimation and Adoption under Private International Law
Legitimacy, Legitimation and Adoption under Private International LawLegitimacy, Legitimation and Adoption under Private International Law
Legitimacy, Legitimation and Adoption under Private International Law
 
Law of Crimes-I ( LLB -205)
 Law of Crimes-I  ( LLB -205)  Law of Crimes-I  ( LLB -205)
Law of Crimes-I ( LLB -205)
 
Contracts in Private International Law
Contracts in Private International LawContracts in Private International Law
Contracts in Private International Law
 
Burden of proof
Burden of proofBurden of proof
Burden of proof
 
tulk v moxhay
tulk v moxhaytulk v moxhay
tulk v moxhay
 
DIFFERENCE BETWEEN TAX AND FEES
DIFFERENCE BETWEEN TAX AND FEESDIFFERENCE BETWEEN TAX AND FEES
DIFFERENCE BETWEEN TAX AND FEES
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Laws governing the internet service provider & there rights and liabilities
Laws governing the internet service provider & there rights and liabilitiesLaws governing the internet service provider & there rights and liabilities
Laws governing the internet service provider & there rights and liabilities
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
Rule against perpetuity
Rule against perpetuityRule against perpetuity
Rule against perpetuity
 
Transfer of property act, 1882
Transfer of property act, 1882Transfer of property act, 1882
Transfer of property act, 1882
 
Sources of hindu law
Sources of hindu lawSources of hindu law
Sources of hindu law
 
Rules of statutary interpretation PPT By Rajashree J Jawale
Rules of statutary interpretation PPT By Rajashree J JawaleRules of statutary interpretation PPT By Rajashree J Jawale
Rules of statutary interpretation PPT By Rajashree J Jawale
 
HISTORICAL JURISPRUDENCE.pptx
HISTORICAL JURISPRUDENCE.pptxHISTORICAL JURISPRUDENCE.pptx
HISTORICAL JURISPRUDENCE.pptx
 
Lentin Commission Report
Lentin Commission ReportLentin Commission Report
Lentin Commission Report
 
Duty of advocates towards court
Duty of advocates towards courtDuty of advocates towards court
Duty of advocates towards court
 
Notes on Taxation law
Notes on Taxation lawNotes on Taxation law
Notes on Taxation law
 
Prevention of corruption act 1988 & Lokpal act 2013
Prevention of corruption act 1988 & Lokpal act 2013Prevention of corruption act 1988 & Lokpal act 2013
Prevention of corruption act 1988 & Lokpal act 2013
 
BAR COUNCILs
BAR COUNCILsBAR COUNCILs
BAR COUNCILs
 

Viewers also liked

Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
Putri Sanuria
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
Raunaq Jaiswal
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider
hazirma
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.
Gaurav Chordia
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
loizazeptania
 
AIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP PresentationAIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP Presentation
markASsantiago
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
Vishal Singh
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Viewers also liked (19)

Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
 
Isp
IspIsp
Isp
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Isp
IspIsp
Isp
 
ISP
ISPISP
ISP
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider
 
CH6
CH6CH6
CH6
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
 
AIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP PresentationAIM Global Nigeria ISP Presentation
AIM Global Nigeria ISP Presentation
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
ISP business plan
ISP business plan ISP business plan
ISP business plan
 
E Payment
E PaymentE Payment
E Payment
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
 
ISP
ISPISP
ISP
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Internet Service Provider Liability

Liberalization Intellectual Property Rights
Liberalization  Intellectual Property RightsLiberalization  Intellectual Property Rights
Liberalization Intellectual Property Rights
lkipenis
 
March 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the USMarch 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the US
CobaltSophie
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
David Phillips
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
Emily Laidlaw
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
bsookman
 

Similar to Internet Service Provider Liability (20)

SCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet LawSCL Marsden Introduction to Internet Law
SCL Marsden Introduction to Internet Law
 
Liberalization Intellectual Property Rights
Liberalization  Intellectual Property RightsLiberalization  Intellectual Property Rights
Liberalization Intellectual Property Rights
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
March 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the USMarch 5, 2013 Webinar - ISP Liability in Europe and in the US
March 5, 2013 Webinar - ISP Liability in Europe and in the US
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Floundering towards EU information law
Floundering towards EU information lawFloundering towards EU information law
Floundering towards EU information law
 
Developments in intermediary liability
Developments in intermediary liabilityDevelopments in intermediary liability
Developments in intermediary liability
 
Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet Article 13 - What the 'Upload Filter' means for the Internet
Article 13 - What the 'Upload Filter' means for the Internet
 
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...Leaving the European Safe Harbor... sailing towards algorithmic content regul...
Leaving the European Safe Harbor... sailing towards algorithmic content regul...
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V Es
 
2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review2015 Internet and ECommerce Law Review
2015 Internet and ECommerce Law Review
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
 
International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014International Summer School on Cyber Law - Moscow - July 2014
International Summer School on Cyber Law - Moscow - July 2014
 

More from Andres Guadamuz

More from Andres Guadamuz (20)

Inteligencia Artificial, Propiedad Intelectual, y ODS
Inteligencia Artificial, Propiedad Intelectual, y ODSInteligencia Artificial, Propiedad Intelectual, y ODS
Inteligencia Artificial, Propiedad Intelectual, y ODS
 
Do androids dream of electric copyright?
Do androids dream of electric copyright?Do androids dream of electric copyright?
Do androids dream of electric copyright?
 
Distinctive brands game
Distinctive brands gameDistinctive brands game
Distinctive brands game
 
AI Copyright Authorship
AI Copyright AuthorshipAI Copyright Authorship
AI Copyright Authorship
 
Metaverse: Some regulatory musings
Metaverse: Some regulatory musingsMetaverse: Some regulatory musings
Metaverse: Some regulatory musings
 
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
These are not the Apes you’re looking for: Why copyright and NFTs don’t work ...
 
The Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse RebornThe Web of Time: The Metaverse Reborn
The Web of Time: The Metaverse Reborn
 
Understanding the NFT Ecosystem
Understanding the NFT Ecosystem Understanding the NFT Ecosystem
Understanding the NFT Ecosystem
 
Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)Non-fungible tokens (NFTs)
Non-fungible tokens (NFTs)
 
Ceci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-landCeci n’est pas une pipe: Adventures in NFT-land
Ceci n’est pas une pipe: Adventures in NFT-land
 
Contratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativasContratos inteligentes en las industrias creativas
Contratos inteligentes en las industrias creativas
 
Ai and copyright: the way forward
Ai and copyright: the way forwardAi and copyright: the way forward
Ai and copyright: the way forward
 
FALL: or Dodge in Hell
FALL: or Dodge in HellFALL: or Dodge in Hell
FALL: or Dodge in Hell
 
AI Copyright international perspective
AI Copyright international perspectiveAI Copyright international perspective
AI Copyright international perspective
 
Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?Do Androids Dream of Electric Copyright?
Do Androids Dream of Electric Copyright?
 
Copyright and Art
Copyright and ArtCopyright and Art
Copyright and Art
 
Cyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmaresCyber-dystopianism: The Internet seen through the lens of nightmares
Cyber-dystopianism: The Internet seen through the lens of nightmares
 
All watched over machines of loving grace amsterdam
All watched over machines of loving grace  amsterdamAll watched over machines of loving grace  amsterdam
All watched over machines of loving grace amsterdam
 
All watched over machines of loving grace
All watched over machines of loving graceAll watched over machines of loving grace
All watched over machines of loving grace
 
Ready player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASISReady player cat: Internet regulation in the OASIS
Ready player cat: Internet regulation in the OASIS
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Internet Service Provider Liability

  • 1. Andrés Guadamuz SCRIPT – University of Edinburgh The Evolving Role of Intermediaries: The Challenge of Regulating Their Liability
  • 3. "The Internet is a worldwide network of computers that contains millions of pages of information. Users are cautioned that many of these pages include offensive and inappropriate material. In general, it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an email address on the internet may lead to receipt of unsolicited e-mail containing offensive content. A user accessing the internet does so at his/her own risk. Hotel X and its affiliates are not responsible for material viewed or downloaded by users from the internet."  Wifi at my hotel
  • 4. Internet Service Provider (ISP) Online services Google Facebook Twitter User generated content sites Blogger YouTube Flickr Internet café Hotel University Workplace Restaurants What is an Intermediary?
  • 6. Are intermediaries liable for content placed by their Customers?
  • 7. Compuserve was a Bulletin Board Service, a dial-in pre WWW system. Defamation case. Compuserve hosted forums managed by a third party. Rumorville, a newsletter provider, posted defamatory content against Cubby Inc, who sued for libel and unfair competition. United States District Court for the Southern District of New York which held that Internet service providers were subject to traditional defamation law for their hosted content. This ruling set the stage for various similar intermediary cases in the U.S. Cubby v Compuserve (1991)
  • 8. An unknown person, purporting to be Dr Laurence Godfrey, a lecturer in physics, mathematics and computer science based in London , made a defamatory posting which appeared on Demon's news server in the UK . The posting could be read by Demon's customers. When Mr Godfrey asked Demon to remove the posting (having explained that it was a forgery), Demon did not do so. The court found that up until receiving notification of the existence of the allegedly defamatory posting, Demon could not have had sufficient reason to suspect that it was not made by Mr Godfrey. However, from the point that actual knowledge was received, the defence was no longer available. Godfrey v Demon (1999)
  • 9. Liguecontre le racisme et l'antisémitisme (LICRA) complained that Yahoo! were allowing their online auction service to be used for the sale of memorabilia from the Nazi period. These facts were not contested during the case. The defense rested on the fact that these auctions were conducted under the jurisdiction of the United States. It was claimed that there were no technical means to prevent French residents from participating in these auctions, at least without placing the company in financial difficulty and compromising the existence of the Internet. The defendants noted 1. that their servers were located on US territory, 2. that their services were primarily aimed at US residents, 3. that the First Amendment to the United States Constitution guarantees freedom of speech and expression, and that any attempt to enforce a judgment in the United States would fail for unconstitutionality. As such, they contended that the French court was incompetent to hear the case. LICRA v. Yahoo! (2000)
  • 11. Article 10. Limitations and Exceptions (1) Contracting Parties may, in their national legislation, provide for limitations of or exceptions to the rights granted to authors of literary and artistic works under this Treaty in certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. (2) Contracting Parties shall, when applying the Berne Convention, confine any limitations of or exceptions to rights provided for therein to certain special cases that do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author. WIPO Copyright Treaty 1996
  • 12. § 512. Limitations on liability relating to material online (Safe Harbor) (a) Transitory Digital Network Communications. […] (b) System Caching. […] (g) Replacement of Removed or Disabled Material and Limitation on Other Liability.— (1) No liability for taking down generally.— Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider’s good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing. Digital Millennium Copyright Act 1998
  • 13. Article 12. "Mere conduit" 1. Where an information society service is provided that consists of the transmission in a communication network of information provided by a recipient of the service, or the provision of access to a communication network, Member States shall ensure that the service provider is not liable for the information transmitted, on condition that the provider: (a) does not initiate the transmission; (b) does not select the receiver of the transmission; and (c) does not select or modify the information contained in the transmission. E-Commerce Directive (2000/31/EC)
  • 14. Article 5. Exceptions and limitations 1. Temporary acts of reproduction referred to in Article 2, which are transient or incidental [and] an integral and essential part of a technological process and whose sole purpose is to enable: (a) a transmission in a network between third parties by an intermediary, or (b) a lawful use of a work or other subject-matter to be made, and which have no independent economic significance, shall be exempted from the reproduction right provided for in Article 2. Info Soc Directive (2001/29/EC)
  • 18. Case brought in 2007 U.S. TV channel Viacom sued YouTube (hence Google) for copyright infringement of videos uploaded by their customers. YouTube argued that most videos on YouTube are non-infringing, and they will take-down content (Safe Harbor). Case dismissed early 2010. Viacom v YouTube
  • 19. The Belgian Society of Authors, Composers, and Publishers (Sabam) sued ISP Tiscali (later Scarlet). Sabamwanted Tiscali to install filtering software in its network which would allegedly curb illicit filesharing in P2P networks. The first ruling in the District Court of Brussels agreed with the claimants based entirely on expert reports about the feasibility of deploying filtering systems. Appealed. Court of appeals referred to European Court of Justice (ECJ) specifically on question of injunctive relief against intermediaries. Sabam v Tiscali (2007-Present)
  • 20. In 2007, Irish Recorded Music Association (IRMA) members sued Eircom, the largest broadband provider in Ireland, over alleged illegal file sharing by subscribers. IRMA had previously demanded that Eircominstall content filters or take other steps to block IRMA's copyrighted music from being shared, but they did not comply. Parties settled out of court in January 2009. As a result, Eircom agreed to implement a three-strikes system, where alleged infringers will be detected by the record companies, IP addresses notified to Eircom, and users disconnected (after warnings) by Eircom. In August 2009 Eircom began filtering PirateBay.org to mixed results. Irish Recording Music Association (IRMA) v Eircom (2007-2009)
  • 21. iiNet is an Australian internet provider, which was sued by Australian film producer Roadshow Films, part of the Village Roadshow conglomerate, and several Holywood studios. Test case for new ISP liability.  The question at the heart of the proceedings was whether an ISP is to be held liable for the copyright infringement committed by its customers. The judge accurately identified that the case hinged on two simple questions.  Have the iiNet customers infringed copyright directly?  Yes.  Has iiNetauthorised the copyright infringement of its users by failing to take steps to stop it from happening? No. Under appeal. Roadshow Films v iiNet (2010)
  • 23. “Haute Autorité pour la diffusion des oeuvres et la protection des droitssur Internet ” (2009) Troubled passage through parliament. In June 2009 French Constitutional Court extended freedom of expression to include “freedom to access the internet”. New graduated response passed in Parliament. Warning stage Investigations by rightholders’ accredited agents Rightholders can put their cases The HADOPI examines the facts (swiftly) Disconnection phase: Only court can disconnect (up to one month) HADOPI maintains list of banned subscribers HADOPI
  • 24. Adopted in July 2009. Article 133bis of the Korean Copyright Act. Allows the Korean Copyright Commission to recommend ISPs to suspend the accounts of repeat file sharing offenders (as adjudged by the Commission) for six months. Users' email accounts are not to be suspended. 30,000 notices have been sent (by September 2010). No person has been disconnected (yet). South Korea
  • 25. Will establish a multi-tiered obligation for intermediaries. ISP are under obligations to: monitor user activity; Provide content owners with lists of copyright infringers; notify users of infringement reports; limit Internet access (slow down connection) Finally, the ISP will disconnect user. Costs are shared between ISP and content owner. Appeals procedure. Specifics of the regime are under review by the telecommunications regulator (OFCOM). Digital Economy Act (2010)
  • 26. New trade agreement negotiated initially in secret between US, EU, Canada, South Korea, Japan, NZ, Australia, and others. Initially was supposed to include three strikes. Seriously watered-down due to political pressure in several countries (particularly Canada and Europe). Intermediary positions are now considerably lower. Maintains notice-and-take-down regimes to a large extent. Anti-Counterfeiting Trade Agreement (ACTA)