European E-Commerce & Telecommunications Law

Size: px
Start display at page:

Download "European E-Commerce & Telecommunications Law"

Transcription

1 European E-Commerce & Telecommunications Law Lukas Feiler, Ph.D., SSCP Associate, Wolf Theiss Attorneys at Law European E-Commerce & Telecommunications Law, June 1 & 4,

2 European E-Commerce Law Information requirements Unsolicited commercial communication (Spam) ISP Liability European Telecommunications Law Telecommunications 101 Regulatory authorities Data protection & the Data Retention Directive Market regulation Net neutrality European E-Commerce & Telecommunications Law, June 1 & 4,

3 European E-Commerce Law Harmonization by directives (no regulations) Regulation: is binding in its entirety and directly applicable in all Member States Directive: binding upon each Member State & shall leave to the national authorities the choice of form and methods E-Commerce Directive (2000/31/EC) Information requirements Unsolicited commercial communication ISP Liability Distance Selling Directive (97/7/EC) Unsolicited commercial communication Contract law European E-Commerce & Telecommunications Law, June 1 & 4,

4 Scope of the E-Commerce Directive Covers all information society services any service normally provided for remuneration, at a distance, by electronic means and at the individual request of a recipient of services European E-Commerce & Telecommunications Law, June 1 & 4,

5 Scope of the E-Commerce Directive Examples A digital TV broadcasting station? not at the individual request of a recipient A free blog that sells no advertisements? Not provided for remuneration A company s website which is only offered for marketing purposes? Yes, also considered as normally provided for remuneration as it advertises commercial services An online retailer? yes European E-Commerce & Telecommunications Law, June 1 & 4,

6 Information Requirements under the E-Commerce Directive The following information has to be easily, directly and permanently accessible: name of the service provider geographic address at which the service provider is established Contact details, that allow direct and effective communication, including the provider s address trade register in which the service provider is entered and his registration number e.g. number in a commercial register European E-Commerce & Telecommunications Law, June 1 & 4,

7 Information Requirements under the E-Commerce Directive #2 The following information has to be easily, directly and permanently accessible (cont d): Information about the supervisory authority (if any) VAT identification number if the provider is a member of a regulated profession professional body with which it is registered professional title and Member State where granted reference to the applicable professional rules Easily, directly, and permanently accessible e.g. a link at the bottom of each page, named About or Imprint European E-Commerce & Telecommunications Law, June 1 & 4,

8 Information Requirements under the E-Commerce Directive #3 Additional information requirements if contracts can be concluded electronically: technical steps to follow to conclude the contract whether concluded contract will be accessible technical means for identifying & correcting input errors languages offered for the conclusion of the contract relevant codes of conduct to which the provider subscribed Contract terms and general conditions It must be possible to store and reproduce them European E-Commerce & Telecommunications Law, June 1 & 4,

9 Unsolicited Commercial Communication (UCC/Spam) What is Spam? spiced ham How UCC became spam How can a user consent to receiving UCC? Opt-in: UCC may only be sent if prior consent was given Opt-out: UCC may be sent until (implicit) consent is revoked General opt-out: black list of addresses that do not wish to receive any spam European E-Commerce & Telecommunications Law, June 1 & 4,

10 Unsolicited Commercial Communication (UCC/Spam) E-Commerce Directive art. 7 -Spam has to be clearly and unambiguously identifiable as such General opt-out for -spam: natural persons may register themselves in an opt-out register that service providers have to consult regularly Distance Selling Directive art. 9 Opt-in for automatic calling machines & fax: prior consent needed Opt-out for all other means of individual communication (incl. ) European E-Commerce & Telecommunications Law, June 1 & 4,

11 Unsolicited Commercial Communication Summary Fax & automated calling machines Others (e.g. Facebook messages) Opt-in Distance Selling Directive art. 9(1) Opt-out Distance Selling Directive art. 9(2) Distance Selling Directive art. 9(2) General opt-out E-Commerce Directive art. 7(2) European E-Commerce & Telecommunications Law, June 1 & 4,

12 Spamming under U.S. Law CAN-SPAM Act of 2003, 15 U.S.C et seq. Individual opt-out Spammers have to honor opt-out request within 10 business days. 15 U.S.C. 7704(a)(4). General opt-out CAN-SPAM Act called for the FTC to establish a Do-Not- registry However, in 2004, the FTC decided not to implement the registry, arguing that any opt-out list would be abused by spammers is that a valid argument? European E-Commerce & Telecommunications Law, June 1 & 4,

13 Liability of Internet Service Providers under EU Law The E-Commerce Directive provides exemptions from liability for Internet access services (mere conduit) Caching services Hosting services The exemptions apply to all areas of the law, including intellectual property law European E-Commerce & Telecommunications Law, June 1 & 4,

14 Liability Exemption for Internet Access Providers An Internet access provider is not liable for the information transmitted if it (E-Commerce Directive art. 12) does not initiate the transmission; does not select the receiver of the transmission; and does not select or modify the information contained in the transmission. Result: No liability even if Internet access provider has actual knowledge of infringing content European E-Commerce & Telecommunications Law, June 1 & 4,

15 Liability Exemption for Caching Providers A caching provider is not liable for the information temporarily stored if it (E-Commerce Directive art. 13) does not modify the information; complies with conditions on access to the information complies with common rules on updating of the information does not interfere with the lawful use of technology commonly used to obtain data on the use of the information; expeditiously removes information upon obtaining actual knowledge of the fact that the information at the initial source of the transmission has been removed Result: No liability even if caching provider has actual knowledge of infringing content European E-Commerce & Telecommunications Law, June 1 & 4,

16 Liability Exemption for Hosting Providers A hosting provider is not liable for the information stored if it (E-Commerce Directive art. 14) is not aware of facts or circumstances from which the illegal information is apparent; or upon obtaining such awareness acts expeditiously to remove or to disable access to the information Result: Notice and take-down regime European E-Commerce & Telecommunications Law, June 1 & 4,

17 Liability Exemptions for ISPs under U.S. law Communications Decency Act 502, codified at 47 U.S.C. 230 Covers all interactive computer service providers no liability, even if knowledge of the information in question (Zeran v. Am. Online, Inc., 129 F.3d 327 (4th Cir. 1997)) does not apply with regard to any law pertaining to intellectual property Coypright Act 512 similar to the E-Commerce Directive but Hosting provider: willful blindness may constitute knowledge (Viacom Int'l, Inc. v. YouTube, Inc., 676 F.3d 19 (2d Cir. 2012)) No safe harbor for vicarious liability (right and ability to supervise & direct financial interest) European E-Commerce & Telecommunications Law, June 1 & 4,

18 Injunctions Against ISPs E-Commerce Directive art. 12(3), 13(2), and 14(3) all state that the liability exemptions shall not affect the possibility for a court or administrative authority, in accordance with Member States legal systems, of requiring the service provider to terminate or prevent an infringement Injunctive relief is therefore available against ISPs European E-Commerce & Telecommunications Law, June 1 & 4,

19 Website Blocking Injunctions under EU Copyright Law Copyright Directive (2001/29/EC) art. 8(3) provides Member States shall ensure that rightholders are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe a copyright or related right. Case C-324/09, L Oréal SA v. ebay: injunctions are not limited to measures which contribute to bringing infringements to an end but may also cover measures which contribute to preventing further infringements of that kind. European E-Commerce & Telecommunications Law, June 1 & 4,

20 Website Blocking Injunctions under EU Copyright Law Possible Issues Are Internet access providers intermediaries? Case C-557/07, LSG v. Tele2: Yes! Are the Internet access services used by a third party to infringe a copyright? Who uses and who infringes? European E-Commerce & Telecommunications Law, June 1 & 4,

21 Website Blocking Injunctions under EU Copyright Law ECJ Case Law Case C-70/10, Scarlet Extended v. SABAM: injunction that requires active monitoring of all data relating to each customer would violate the fundamental rights of the ISP concerned to conduct its business; of users to receive or impart information; and of users to protection of personal data Is a website blocking injunction a similarly severe interference with fundamental rights? European E-Commerce & Telecommunications Law, June 1 & 4,

22 How to Implement Website Blocking Injunctions Three basic possibilities DNS blocking IP blocking Proxy European E-Commerce & Telecommunications Law, June 1 & 4,

23 Implementing Website Blocking Injunctions DNS Blocking The access provider s DNS server has to be reconfigured Possible circumvention For users: alternative DNS server use IP address For website operators Choose different domain European E-Commerce & Telecommunications Law, June 1 & 4,

24 Implementing Website Blocking Injunctions IP Blocking IP blocking via remote-triggered black hole filtering 1. Configure a static route to Null0 Interface on all Edge Routers (e.g. for /24) 2. At the Triggering Router: configure e.g as next hop for the IP address to be blocked 3. Distribution of the routing information to all Edge Routers via ibgp European E-Commerce & Telecommunications Law, June 1 & 4,

25 Implementing Website Blocking Injunctions IP Blocking #2 Costs for the Internet access provider One-time costs: configuring the edge routers (if not already) Adding a route at the Triggering Router Possible circumvention For users: Directing all traffic via a proxy server For website operators: Changing their IP address Overbreadth One IP address may be used to host multiple unrelated websites European E-Commerce & Telecommunications Law, June 1 & 4,

26 Implementing Website Blocking Injunctions Proxy All traffic is routed over a proxy server It can perform filtering base on URLs or content Problem: encryption Costs for access provider Very high Possible circumvention For users similar to IP blocking European E-Commerce & Telecommunications Law, June 1 & 4,

27 Proportionality of Website Blocking Injunctions revisited Proportionality of the measure to the ISP s fundamental right to conduct its business cost vs. benefit the users fundamental right to protection of personal data Differences between IP/DNS blocking and proxy-based blocking the users fundamental right to receive or impart information IP blocking vs. DNS blocking European E-Commerce & Telecommunications Law, June 1 & 4,

28 Website Blocking Injunctions under EU Copyright Law Nat l Case Law Netherlands: BREIN v. UPC, District Court of The Hague, May 10, 2012, case No : injunction issued (The Pirate Bay) U.K.: Dramatico Entertainment v. British Sky Broadcasting, High Court, May 2, 2012, [2012] EWHC 1152 (Ch.): injunction issued (The Pirate Bay) Austria: Constantin Film v. UPC, Superior Regional Court, Nov. 14, 2011, docket No. 1 R 153/11v: injunction issued ( Finland: IFPI Finland v. Elisa Corp., Helsinki District Court, Oct. 26, 2011, docket No. H 11/20937: injunction issued (The Pirate Bay) Belgium: VZW v. NV Telenet, Andwerpen Court of Appeal, Sept. 26, 2011, docket No. 2011/8314: injunction issued (The Pirate Bay) European E-Commerce & Telecommunications Law, June 1 & 4,

29 Website Blocking Injunctions under EU Copyright Law Nat l Case Law U.K.: Twentieth Century Fox Film Corp. v. BT, High Court, July 28, 2011, [2011] EWHC 1981 (Ch.): injunction issued (newzbin.com) Denmark: Telenor v. IFPI Denmark, Danish Supreme Court, May 27, 2010, docket No. 153/2009: injunction issued (thepiratebay.org) Italy: Bergamo Public Prosecutor's Officer v. Kolmisappi, Italian Supreme Court of Cessation, Sept. 29, 2009, n.49437/09: injunction issued (thepiratebay.org) Denmark: IFPI Denmark v. Tele2, City Court of Copenhagen, Oct. 25, 2006, docket No. F /2006: injunction issued (AllOfMP3.com) European E-Commerce & Telecommunications Law, June 1 & 4,

30 Website Blocking Injunctions under EU Copyright Law Nat l Case Law In the following cases an injunction was denied because Copyright Directive art. 8(3) had not been transposed into national law: Germany: EMI v. Hansenet, Regional Court Cologne, Aug. 31, 2011, docket No. 28 O 362/10 Norway: Nordic Records Norway v. Telenor, Court of Appeal, Feb. 9, 2010, docket No ASK-BORG/04 Ireland: EMI Records v. UPC, Irish High Court, Oct. 11, 2010, [2010] IEHC 377 European E-Commerce & Telecommunications Law, June 1 & 4,

31 Website Blocking Injunctions under EU Copyright Law Nat l Case Law Injunctions issued Austria Belgium Denmark Finland Italy Netherlands U.K. Injunctions denied Germany Ireland Norway (Non-EU-MS) European E-Commerce & Telecommunications Law, June 1 & 4,

32 Website Blocking Injunctions under U.S. Law U.S. Copyright Act 512(j)(1)(B)(ii): A court may grant injunctive relief in the following form: An order restraining the service provider from providing access, by taking reasonable steps specified in the order to block access, to a specific, identified, online location outside the United States. So far, only a single case: Arista Records, Inc. v. AT&T Broadband Corp., No. 1:02CV06554, 2002 WL (S.D.N.Y. Aug. 16, 2002) Plaintiffs sought an injunction against Internet backbone operators to block the Chinese website Listen4Ever Complaint was voluntarily withdrawn European E-Commerce & Telecommunications Law, June 1 & 4,

33 European Telecommunications Law Telecommunications 101 Regulatory authorities Data protection & traffic data retention Market regulation Net neutrality European E-Commerce & Telecommunications Law, June 1 & 4,

34 The History of Telecommunications in the EU Telecommunications providers were typically stateowned monopolies until the 1990s One operator per country until 1990s Was it any different from the situation in the U.S.? Regulation was deemed necessary to create competition Today, multiple telecommunications providers operate in each Member State. However: prices for telecommunications services differ greatly from one Member State to another European E-Commerce & Telecommunications Law, June 1 & 4,

35 Market Comparison: Prices of Mobile Voice Communication Per Minute Source: European Commission, Progress Report on the Single European Electronic Communications Market 2009, COM (2010) 253 final European E-Commerce & Telecommunications Law, June 1 & 4,

36 The EU Regulatory Framework for Telecommunication Framework Directive (2002/21/EC): regulatory authorities and general matters eprivacy Directive (2002/58/EC): privacy issues Universial Service Directive (2002/22/EC): mandatory quality of service Authorisation Directive (2002/20/EC): rules for the authorization of the provision of communications networks Access Directive (2002/19/EC): rules for the sharing of telecommunications facilities Data Retention Directive (2006/24/EC): traffic data retention BEREC Regulation (Reg. No 1211/2009): establishing the Body of European Regulators for Electronic Communications European E-Commerce & Telecommunications Law, June 1 & 4,

37 Telecommunication Defined Electronic communications service (Framework Directive art. 2(c)) a service normally provided for remuneration which consists wholly or mainly in the conveyance of signals on electronic communications networks exclud[ing] services providing, or exercising editorial control over, content Electronic communications network (Framework Directive art. 2(a)) transmission systems and, where applicable, switching or routing equipment and other resources [ ] which permit the conveyance of signals by wire, radio, optical or other electromagnetic means European E-Commerce & Telecommunications Law, June 1 & 4,

38 Examples of Electronic Communications Services? A WiFi hotspot you operate at home (configured for public access)? Not normally provided for remuneration A mail service (e.g. Gmail)? Does not consist wholly or mainly in the conveyance of signals European E-Commerce & Telecommunications Law, June 1 & 4,

39 Examples of Electronic Communications Services? A news website (e.g. nytimes.com)? Services that exercise editorial control over content are excluded Voice over IP (VoIP) services? Only if the VoIP service allows calls from or to the public switched telephone network European E-Commerce & Telecommunications Law, June 1 & 4,

40 Regulatory Authorities National regulatory authorities (Framework Directive art. 3 et seq.) Of primary importance for operators Independent from regulated entities Structural separation from rest of government if Member State retains partial ownership in an operator European Commission Can issue binding opinions to national regulatory authorities in the area of market regulation BEREC (Body of European Regulators for Electronic Communications) Advisory role vis-à-vis the European Commission & national regulatory authorities European E-Commerce & Telecommunications Law, June 1 & 4,

41 Regulatory Authorities #2 European Network and Information Security Agency (ENISA) Non-regulatory agency Only advises the European Commission European E-Commerce & Telecommunications Law, June 1 & 4,

42 Data Protection Confidentiality of Communications Governed by the eprivacy Directive More specific than general Data Protection Directive (95/46/EC) Confidentiality of communications (eprivacy Directive art. 5) Covers all communications and related traffic data all traffic data has to be deleted once it is not needed anymore for billing purposes Confidentiality has to be maintained unless the end-user has freely given his specific and informed consent European E-Commerce & Telecommunications Law, June 1 & 4,

43 Confidentiality of Communications Example In 2007, British Telecom (BT) used a software known as Phorm to monitor the web surfing behavior of its end-users in order to deliver personalized advertisements Users were asked to opt in by declaring that they wanted to participate in a trial that would increase their bandwidth Monitoring violates the confidentiality of communications informed consent necessary but none given European E-Commerce & Telecommunications Law, June 1 & 4,

44 The Data Retention Directive (2006/24/EC) Basic idea: to retain, for at least 6 months, who communicated with whom when and from where Timeline Madrid train bombings in 2004 and London bombings in 2005 Data Retention Directive was adopted on March 15, 2006 To be transposed into national law until Sept. 15, 2007; as regards Internet traffic data until March 15, 2009 Multiple Member States transposed the Directive only after infringement proceedings were initiated by the Commission Germany has still not transposed the Directive European E-Commerce & Telecommunications Law, June 1 & 4,

45 Traffic Data to be Retained General principles Concerns only traffic and location data, not the contents of communication Concerns only data already generated or processed by operators (e.g. no obligation to collect the names and addresses of previously anonymous customers) Data has to be retained for at least 6 months but no more than 2 years Purpose: investigation, detection and prosecution of serious crime, as defined by each Member State in its national law European E-Commerce & Telecommunications Law, June 1 & 4,

46 Traffic Data to be Retained Scope of Covered Fields Data only has to be retained with regard to the following services: 1) Fixed network telephony 2) Mobile telephony 3) Internet access 4) Internet 5) Internet telephony Everything else is not covered! e.g. hosting providers & website operators Why do you think, that is? European E-Commerce & Telecommunications Law, June 1 & 4,

47 Traffic Data to be Retained For fixed network telephony & mobile telephony (incl. text messages) telephone number, name, and address of both parties date and time of the start and end of the communication type of telephone service used (e.g. text message) Plus, for mobile telephony: International Mobile Subscriber Identity (IMSI) International Mobile Equipment Identity (IMEI) Cell ID at the start of the communication In case of pre-paid anonymous mobile telephony services: Date, time & cell ID of initial activation European E-Commerce & Telecommunications Law, June 1 & 4,

48 Traffic Data to be Retained #2 For Internet access services allocated IP address name and address of the subscriber user ID(s) in case of dial-up access: calling telephone number date and time of the log-in and log-off DSL or other end point on the user's side in the case of mobile Internet access cell ID when Internet connection is established European E-Commerce & Telecommunications Law, June 1 & 4,

49 Traffic Data to be Retained #3 Internet service the sender's and the recipient's names, and addresses addresses telephone numbers in case of dial-up access DSL or other end points date and time of the log-in and log-off of the Internet service European E-Commerce & Telecommunications Law, June 1 & 4,

50 Traffic Data to be Retained #4 Internet telephony (VoIP) both parties VoIP addresses names and addresses telephone number (in case of VoIP-to-PSTN or if a dial-up Internet access is used) DSL or other end points on either user's side date and time of the log-in and log-off of the Internet telephony service If a mobile device is used: cell ID at the start of the communication European E-Commerce & Telecommunications Law, June 1 & 4,

51 Who Has to Retain Traffic Data? Providers of publicly available electronic communications services i.e. operators selling their services to end-user Providers of public communications networks i.e. providers who rent out their infrastructure to service providers Such as Internet backbone operators European E-Commerce & Telecommunications Law, June 1 & 4,

52 Who Has to Retain Traffic Data? - Examples A WiFi hotspot somebody operates from his or her home? No; not normally provided for remuneration not a provider of a public communications service Gmail, Hotmail, GMX, Facebook? No; no service that consists wholly or mainly in the conveyance of signals not providers of public communications services An Internet access provider yes A company that operates its own mail server for business purposes (e.g. a law firm)? No; not a public service European E-Commerce & Telecommunications Law, June 1 & 4,

53 Access to Retained Data Access by law enforcement agencies The data is retained for the investigation, detection, and prosecution of serious crime, as defined by each Member State in its national law each Member State regulates access to retained data differently Access by private entities (e.g. copyright holders) Outside the scope of the Data Retention Directive but may be provided for by a Member State (Case C-461/10, Bonnier Audio v Perfect Communication Sweden, Apr. 19, 2012) European E-Commerce & Telecommunications Law, June 1 & 4,

54 Who has to pay for it? Each Member State can decide whether network and service providers can (partly) recover their expenses Result: Distortion of competition between operators established in different Member States European E-Commerce & Telecommunications Law, June 1 & 4,

55 Circumvention Measures How can (and, in fact, do) people prevent the retention of their data? Telephony Use of telephone booths and prepaid mobile phones Internet access Use of a public WiFi access point services Use of a mail service provider that is itself not a provider of a public communications service or network (e.g. Gmail) Plus: communicate only via encrypted mail protocols Use of any messaging service other than Facebook messages, Usenet, IRC, instant messaging software, European E-Commerce & Telecommunications Law, June 1 & 4,

56 Effectiveness of Data Retention How does retained traffic data help us to investigate, detect, and prosecute crime? Investigate/prosecute Dynamic IP addresses are no longer anonymous It can be determined who was at the scene of the crime Video example of geo-tracking Accomplices may be identified more easily (if they were not smart enough) Detect traffic analysis, social network analysis, and data mining European E-Commerce & Telecommunications Law, June 1 & 4,

57 Effectiveness of Data Retention #2 Why data mining does not help in the fight against terror: Assumption data mining system has accuracy of 99% there are 100 real terrorists in the EU s population of 500 million What is the probability that a person identified as a terrorist is, in fact, a terrorist? Not 99% but 0.002% (= 1 in 50,000) Known as the base rate fallacy The prior probability (base rate) is 100 to 500 million System correctly identifies 99% of the terrorists = 99 System incorrectly identifies 1% of the 500 million = 5 million European E-Commerce & Telecommunications Law, June 1 & 4,

58 Proportionality of the Data Retention Directive? Does the government s interest to retain traffic and location data for the purpose of the investigation, detection, and prosecution of crime outweigh the citizens interest in their privacy? To consider How severe is the interference with the fundamental right to privacy? How effective is the data retention? European E-Commerce & Telecommunications Law, June 1 & 4,

59 Future Developments in the Area of Data Retention Legal challenge by Digital Rights Ireland before the ECJ Compliance with the EU Charter of Fundamental Rights? The European Commission has announced plans to revise the Directive European E-Commerce & Telecommunications Law, June 1 & 4,

60 Market Regulation Traditional competition law (anti-trust law) Prohibition of cartels (concerted practices) Merger control Abuse of dominant market position Legal consequences only if dominant position is abused ex post market regulation Ex ante market regulation in telecommunications law Dominant market position in itself creates legal consequences intended to prevent an abuse before it even happens (ex ante) European E-Commerce & Telecommunications Law, June 1 & 4,

61 Ex Ante Market Regulation If an operator has significant market power National Regulatory Authority (NRO) has to impose appropriate obligations (Access Directive art. 8 et seq.) Non-discrimination in relation to interconnection and/or access (art. 10) Accounting separation to make cross-subsidization transparent (art. 11) Permitting other operators to use network facilities (art. 12) Price control (art. 13) If these measures fail to achieve effective competition Disintegration of vertically integrated operators European E-Commerce & Telecommunications Law, June 1 & 4,

62 Ex Ante Market Regulation Who Has Significant Market Power? Step 1: NRAs have to define the relevant market (Framework Directive art. 15) European Commission adopted a Recommendation on Relevant Product and Service Markets Consultation procedure: Commission has veto-power if NRAs do not follow the Recommendation Step 2: NRAs have to perform a market analysis (Framework Directive art. 14, 16) significant market power: operator enjoys a position of economic strength affording it the power to behave independently of competitors, customers and ultimately consumers NRA determination is subject to the Commission s veto-power European E-Commerce & Telecommunications Law, June 1 & 4,

63 Net Neutrality What is Net Neutrality? The principle that all electronic communication passing through a network is treated equally, i.e. independent of 1) content; 2) application; 3) service; 4) device; 5) sender address; and 6) receiver address. Not covered: Offering different bandwidths to users, depending on how much they pay per month (no discrimination of content but of users) European E-Commerce & Telecommunications Law, June 1 & 4,

64 Examples of Interferences with Net Neutrality Peer-to-peer (P2P) downloads are slowed down An Internet access provider blocks services that are in competition with its own services e.g. blocking Skype for mobile phones VoIP is given a higher priority to ensure a high voice quality An Internet access provider only permits one service for a specific type of content e.g. only allows Netflix but no other video-ondemand provider European E-Commerce & Telecommunications Law, June 1 & 4,

65 Net Neutrality Possible Business Models Price differentiation between content providers (option #1) Faster data transfer to the access provider s customers in exchange for special compensation Data transfer to the customers only in exchange for compensation (e.g. exclusivity agreements) Price differentiation between subscribers (option #2) Only those who pay more get access to all services/websites Those who pay less do not get access to, e.g., social networking websites or Skype European E-Commerce & Telecommunications Law, June 1 & 4,

Website Blocking Injunctions under EU and US Copyright Law

Website Blocking Injunctions under EU and US Copyright Law Website Blocking Injunctions under EU and US Copyright Law Slow Death of the Global Internet or Emergence of the Rule of National Copyright Law? Lukas Feiler, Ph.D., SSCP Stanford-Vienna Transatlantic

More information

ISP liability in Denmark

ISP liability in Denmark ISP liability in Denmark Clement Salung Petersen Assistant Professor, PhD Centre for Information and Innovation Law www.ciir.dk Dias 1 A Danish perspective on ISP liability ISP liability Mere conduit,

More information

DOC NO: INFOSOC 53/15 DATE ISSUED: June 2015. Resolution on the open and neutral Internet

DOC NO: INFOSOC 53/15 DATE ISSUED: June 2015. Resolution on the open and neutral Internet DOC NO: INFOSOC 53/15 DATE ISSUED: June 2015 Resolution on the open and neutral Internet Introduction This resolution builds on the TACD net neutrality resolutions of April 2010 1 and June 2014 2, which

More information

[TITLE IN CAPS, VERDANA, 32]

[TITLE IN CAPS, VERDANA, 32] [TITLE IN CAPS, VERDANA, 32] On-line piracy, and the intermediaries Joris van Manen FORDHAM meeting New York, April 4th, 2013 On-line counterfeit on the rise Increasing numbers of on-line counterfeit and

More information

GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION

GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION GUIDELINES FOR THE PROVISION OF INTERNET SERVICE PUBLISHED BY THE NIGERIAN COMMUNICATIONS COMMISSION These Guidelines apply to all Licensees providing Internet access services or any other Internet Protocol

More information

2014 No. ELECTRONIC COMMUNICATIONS. The Data Retention Regulations 2014

2014 No. ELECTRONIC COMMUNICATIONS. The Data Retention Regulations 2014 Draft Regulations laid before Parliament under section 2(5) of the Data Retention and Investigatory Powers Act 2014, for approval by resolution of each House of Parliament. D R A F T S T A T U T O R Y

More information

Privacy in the electronic communication sector: insights from the ISP industry

Privacy in the electronic communication sector: insights from the ISP industry Privacy in the electronic communication sector: insights from the ISP industry Innocenzo Genna Genna Cabinet Bruxelles FIA Conference Ghent, 16 November 2010 The opinions expressed in this presentation

More information

ilinc Legal & Technology Briefs The Liability of Internet Intermediaries In the EU

ilinc Legal & Technology Briefs The Liability of Internet Intermediaries In the EU ilinc Legal & Technology Briefs The Liability of Internet Intermediaries In the EU Many start-ups fulfil an intermediary role within the online environment. These intermediary start-ups offer their users

More information

Online Copyright Infringement. Discussion Paper

Online Copyright Infringement. Discussion Paper Online Copyright Infringement Discussion Paper July 2014 Introduction There are a number of factors that contribute to online copyright infringement in Australia. These factors include the availability

More information

Filtering for Copyright Enforcement in Europe after the Sabam cases

Filtering for Copyright Enforcement in Europe after the Sabam cases Filtering for Copyright Enforcement in Europe after the Sabam cases Stefan Kulk a, Frederik Zuiderveen Borgesius b a PhD Researcher, Centre for Intellectual Property Law (University of Utrecht) s.kulk[at]uu.nl

More information

VoIP Regulation Klaus Nieminen Helsinki University of Technology klaus.nieminen@hut.fi

VoIP Regulation Klaus Nieminen Helsinki University of Technology klaus.nieminen@hut.fi VoIP Regulation Klaus Nieminen Helsinki University of Technology klaus.nieminen@hut.fi Abstract Voice over IP (VoIP) is currently the uppermost telecommunication regulatory question globally. The purpose

More information

Site-blocking Orders in the EU: Justifications and Feasibility

Site-blocking Orders in the EU: Justifications and Feasibility Site-blocking Orders in the EU: Justifications and Feasibility Dr Faye Fangfei Wang Senior Lecturer in Law Brunel University, London Abstract The recent CJEU Site-blocking order (Case C-314/12, 27 March

More information

A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries

A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries Questions marked with an asterisk * require an answer to be given.

More information

Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS

Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS Section 1. Interpretation. 2. Non-application of Act. 3. Obligation to retain data. 4. Data security. 5. Access to data.

More information

Communications Internet Acceptable Use Policy

Communications Internet Acceptable Use Policy Communications Internet Acceptable Use Policy Introduction Xact Associates, LLC dba Xact Communications and its affiliates and subsidiaries ("Xact," "we," or "us") appreciate the opportunity to provide

More information

SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 20, 2011

SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 20, 2011 SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES Updated November 20, 2011 Consistent with FCC regulations, 1 Shidler Telephone Company provides this information about our broadband Internet

More information

DOC NO: INFOSOC 52/14 DATE ISSUED: June 2014. Resolution on the open and neutral Internet

DOC NO: INFOSOC 52/14 DATE ISSUED: June 2014. Resolution on the open and neutral Internet DOC NO: INFOSOC 52/14 DATE ISSUED: June 2014 Resolution on the open and neutral Internet Introduction This resolution builds on the TACD net neutrality resolution of April 2010 1, which called for policies

More information

Privacy Statement. Policy Overview. This Notice tells you our policies regarding:

Privacy Statement. Policy Overview. This Notice tells you our policies regarding: Privacy Statement At Glacier Club Cable TV we take your privacy seriously and we want you to know our policies. This Notice will give you an overview of those policies and how we will apply them in specific

More information

West River Telecom Network Management Practices Policy

West River Telecom Network Management Practices Policy West River Telecom Network Management Practices Policy Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations,

More information

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable

More information

Click here for Explanatory Memorandum

Click here for Explanatory Memorandum Click here for Explanatory Memorandum AN BILLE CUMARSÁIDE (SONRAÍ A CHOIMEÁD) 2009 COMMUNICATIONS (RETENTION OF DATA) BILL 2009 Section 1. Interpretation. Mar a tionscnaíodh As initiated ARRANGEMENT OF

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP

E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP This Practice Note is published by Practical Law Company on its PLC Law Department web

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 19, 2011

POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 19, 2011 POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES Updated November 19, 2011 Consistent with FCC regulations, 1 Pottawatomie Telephone Company provides this information about our broadband

More information

ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive

ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive October 2005 ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive INTRODUCTION 1.- Purpose of the document This document

More information

Parklands internet. Tim King Tim.king@investcope.com 0779 851 7370 (22 Tulip Tree Close)

Parklands internet. Tim King Tim.king@investcope.com 0779 851 7370 (22 Tulip Tree Close) Parklands internet Tim King Tim.king@investcope.com 0779 851 7370 (22 Tulip Tree Close) Please note The content of these slides are an initial proposal, not an offer for service. It is likely that the

More information

Calling All Countries: The VoIP Revolution is Here!

Calling All Countries: The VoIP Revolution is Here! Calling All Countries: The VoIP Revolution is Here! Panel: Sheba Chacko BT Global Services Tony Oliver Microsoft Corporation Andrew Powell Leap Wireless International, Inc. Agenda What is VoIP? Regulating

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

EU regulatory framework for e-commerce

EU regulatory framework for e-commerce EU regulatory framework for e-commerce WTO Workshop Geneva, 18 th June 2013 Denis Sparas European Commission Directorate General for Internal Market and Services Outline E-commerce Directive E-commerce

More information

Network Management Basics

Network Management Basics Updated November 2011 MILLENIUM TELECOM, LLC d/b/a ONESOURCE COMMUNICATIONS BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, 1 OneSource Communications (OneSource) provides this

More information

Cameron Communications Network Management Practices Policy November, 2011. Cameron Communications Network Management Practices Policy Disclosure

Cameron Communications Network Management Practices Policy November, 2011. Cameron Communications Network Management Practices Policy Disclosure Cameron Communications Network Management Practices Policy Disclosure Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TERMS & CONDITIONS www.tagadab.com INTRODUCTION Tagadab has created this (AUP) for our customers to protect our resources, our customer s resources, and to ensure that Tagadab Ltd

More information

SUBSCRIBER PRIVACY NOTICE

SUBSCRIBER PRIVACY NOTICE PRIVACY AND SECURITY NewWave will provide you with a copy of its privacy notice at the time Service is installed, and annually afterwards, or as otherwise permitted by law. Customer can view the most current

More information

JACKSON ENERGY AUTHORITY BROADBAND INTERNET SERVICE DISCLOSURES. Update November 20, 2011

JACKSON ENERGY AUTHORITY BROADBAND INTERNET SERVICE DISCLOSURES. Update November 20, 2011 JACKSON ENERGY AUTHORITY BROADBAND INTERNET SERVICE DISCLOSURES Update November 20, 2011 Consistent with FCC regulations, 1 Jackson Energy Authority ( JEA ) provides this information about our broadband

More information

Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits

Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits Telemarketing, E-mail, and Text Message Marketing: Tips to Avoid Lawsuits LeadsCouncil December 11, 2012 2 pm 3 pm ET Webinar Ari N. Rothman, Esq., Co-Presenter Molly T. Cusson, Esq., Co-Presenter Jonathan

More information

Before the Federal Communications Commission Washington, D.C. 20554 ) ) ) ) ) ) ) ) ) DECLARATORY RULING

Before the Federal Communications Commission Washington, D.C. 20554 ) ) ) ) ) ) ) ) ) DECLARATORY RULING Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of Westfax, Inc. Petition for Consideration and Clarification Rules and Regulations Implementing the Telephone Consumer

More information

Draft Report on OTT services

Draft Report on OTT services Draft Report on OTT services October 2015 Contents 1 Executive Summary... 3 2 Introduction... 6 3 OTT description, definition and taxonomy... 9 3.1 Internet value chain... 9 3.2 Definition of ECS... 11

More information

Intermediary Liability and Website-Blocking in the EU. Jane C. Ginsburg Columbia University School of Law

Intermediary Liability and Website-Blocking in the EU. Jane C. Ginsburg Columbia University School of Law Intermediary Liability and Website-Blocking in the EU Jane C. Ginsburg Columbia University School of Law Moving Parts Rights: 2001 Infosoc Directive Art. 3.2: Making available right Art 8.3: right to injunctive

More information

PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT

PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT Check Plan: Residential Business Installation Cost $45.00 $62.00 Check Plan: 256 Down/128 Up $24.95 $44.95 Monthly 1.544 Down/256 Up $39.95 $49.95 Monthly

More information

NEWWAVE COMMUNICATIONS BROADBAND INTERNET SERVICE DISCLOSURES. Updated October 2012

NEWWAVE COMMUNICATIONS BROADBAND INTERNET SERVICE DISCLOSURES. Updated October 2012 NEWWAVE COMMUNICATIONS BROADBAND INTERNET SERVICE DISCLOSURES Updated October 2012 Consistent with FCC regulations, 1 NewWave Communications provides this information about our broadband Internet access

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

Technical Questions on Data Retention

Technical Questions on Data Retention Technical Questions on Data Retention 1) The list of data in the annex of the proposed Directive on Data retention is practically identical to the information required in the Council draft Framework Decision.

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS EUROPEAN COMMISSION Brussels, 19.4.2011 COM(2011) 222 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

More information

Network Service, Systems and Data Communications Monitoring Policy

Network Service, Systems and Data Communications Monitoring Policy Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring

More information

LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES. Updated September, 2013

LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES. Updated September, 2013 LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES Updated September, 2013 Consistent with FCC regulations, 1 Lake Region Electric Cooperative, Inc. provides this information

More information

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 21.9.2005 COM(2005) 438 final 2005/0182 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the retention of data processed

More information

Acceptable Use Policy for Residential Subscribers

Acceptable Use Policy for Residential Subscribers Acceptable Use Policy for Residential Subscribers Why is Packerland Broadband ( Packerland ) providing this Policy to me? Packerland's goal is to provide its customers with the best residential cable Internet

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE I. INTRODUCTION

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE I. INTRODUCTION UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 1 1 BENNETT HASELTON, et al., Plaintiffs, v. QUICKEN LOANS, INC., et al., Defendants. Case No. C0-RSL FOR PARTIAL SUMMARY JUDGMENT

More information

INTERBEL TELEPHONE COOPERATIVE. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

INTERBEL TELEPHONE COOPERATIVE. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and INTERBEL TELEPHONE COOPERATIVE Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services INTERBEL TELEPHONE COOPERATIVE

More information

RESERVATION TELEPHONE COOPERATIVE BROADBAND INTERNET SERVICE DISCLOSURES

RESERVATION TELEPHONE COOPERATIVE BROADBAND INTERNET SERVICE DISCLOSURES Updated January 2012 RESERVATION TELEPHONE COOPERATIVE BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC regulations, 1 Reservation Telephone Cooperative ( RTC ) provides this information about

More information

NORTHLAND COMMUNICATIONS BROADBAND INTERNET SERVICES NETWORK MANAGEMENT POLICY

NORTHLAND COMMUNICATIONS BROADBAND INTERNET SERVICES NETWORK MANAGEMENT POLICY NORTHLAND COMMUNICATIONS BROADBAND INTERNET SERVICES NETWORK MANAGEMENT POLICY Northland is dedicated to providing high-quality Internet access services consistent with FCC regulations 1. Northland s Broadband

More information

1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data

1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data 1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that

More information

FCC Adopts Controversial Net Neutrality Rules Governing Broadband Internet Access Services

FCC Adopts Controversial Net Neutrality Rules Governing Broadband Internet Access Services January 2011 FCC Adopts Controversial Net Neutrality Rules Governing Broadband Internet Access Services BY CARL W. NORTHROP, MICHAEL LAZARUS & DAVID DARWIN The Federal Communications Commission (the FCC

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

Congestion Management Provider does not employ any congestion management tools, practices and/or software on network traffic.

Congestion Management Provider does not employ any congestion management tools, practices and/or software on network traffic. Hamilton.net, Inc. Network Management Practices Policy Disclosure Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal

More information

User tracking: Scope and Implementation eprivacy Directive Article 5(3)

User tracking: Scope and Implementation eprivacy Directive Article 5(3) User tracking: Scope and Implementation eprivacy Directive Article 5(3) Email Sender & Provider Coalition April 3, 2012 Presented By Karin Retzer 2012 Morrison & Foerster LLP All Rights Reserved mofo.com

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Troy Cablevision, Inc. Subscriber Privacy Policy

Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to

More information

Nebraska Central Telephone Company Nebraska Central Telecom, Inc. Network Management Practices Policy

Nebraska Central Telephone Company Nebraska Central Telecom, Inc. Network Management Practices Policy Nebraska Central Telephone Company Nebraska Central Telecom, Inc. Network Management Practices Policy Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part

More information

Tele-Media Cable Internet Acceptable Use Policy

Tele-Media Cable Internet Acceptable Use Policy Tele-Media Cable Internet Acceptable Use Policy Important Note: Tele-Media may revise this Acceptable Use Policy (the "Policy") from time to time without notice by posting a new version of this document

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance

More information

VoIP and IP-IC Regulatory aspects

VoIP and IP-IC Regulatory aspects VoIP and IP-IC Regulatory aspects Giovanni Santella g.santella@agcom.it What is VoIP? VoIP call scenarios (1) PC-to-PC PC-to-Phone VoIP call scenarios (2) Phone-to-Phone The value chain for the provision

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

Open Internet Policy

Open Internet Policy Open Internet Policy Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Terms and Conditions for Fixed Services Whidbey Telephone Company, dba Whidbey Telecom

More information

The European Electronic Communications Regulation and Markets 11 th Report Frequently Asked Questions

The European Electronic Communications Regulation and Markets 11 th Report Frequently Asked Questions MEMO/06/84 Brussels, 20 February 2006 The European Electronic Communications Regulation and Markets 11 th Report Frequently Asked Questions What is the EU regulatory framework for electronic communications?

More information

The RC Family of Companies Network Management Practices Policy Disclosure

The RC Family of Companies Network Management Practices Policy Disclosure The RC Family of Companies Network Management Practices Policy Disclosure Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of

More information

BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL

BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL BEREC report on IPinterconnection in the context of Net Neutrality BEUC statement Contact: Guillermo Beltra digital@beuc.eu Ref.: X/2012/062-09/08/2012 BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL

More information

EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update. By Stephen H. LaCount, Esq.

EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update. By Stephen H. LaCount, Esq. EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update By Stephen H. LaCount, Esq. Overview The European Union Data Protection Directive 95/46/EC ( Directive ) went effective in

More information

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement: Policy Statement: NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION The following policies apply to mass market broadband Internet services offered by NineStar Connect. NineStar

More information

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

I. Background information

I. Background information A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries I. Background information 1. Please indicate your role for the purpose

More information

I. Background information

I. Background information A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries I. Background information 1. Please indicate your role for the purpose

More information

4-column document Net neutrality provisions (including recitals)

4-column document Net neutrality provisions (including recitals) 4-column document Net neutrality provisions (including recitals) [Text for technical discussions. It does not express any position of the Commission or its services] Proposal for a REGULATION OF THE EUROPEAN

More information

DATA RETENTION. Guidelines for Service Providers

DATA RETENTION. Guidelines for Service Providers DATA RETENTION Guidelines for Service Providers The Attorney-General s Department has prepared this guide to assist industry participants to understand the obligations arising from the Telecommunications

More information

APPLICATION OF THE NEW EU REGULATORY FRAMEWORK TO IP TELEPHONY

APPLICATION OF THE NEW EU REGULATORY FRAMEWORK TO IP TELEPHONY Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) APPLICATION OF THE NEW EU REGULATORY FRAMEWORK TO IP TELEPHONY Paris, March

More information

JUNCTION CONNECTIONS SERVICES AGREEMENT WHOLESALE SIP TRUNKING & CALLING CARD - January 25, 2011

JUNCTION CONNECTIONS SERVICES AGREEMENT WHOLESALE SIP TRUNKING & CALLING CARD - January 25, 2011 JUNCTION CONNECTIONS SERVICES AGREEMENT WHOLESALE SIP TRUNKING & CALLING CARD - January 25, 2011 The customer shall not use this service as their sole call termination service, and shall be advised to

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you. 1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors

More information

ALBANY MUTUAL TELEPHONE S MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION

ALBANY MUTUAL TELEPHONE S MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION ALBANY MUTUAL TELEPHONE S MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION General Policy Statement: The following policies apply to mass market broadband Internet services offered by Albany

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party 11601/EN WP 90 Opinion 5/2004 on unsolicited communications for marketing purposes under Article 13 of Directive 2002/58/EC Adopted on 27 February 2004 This Working

More information

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3 DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC

More information

ACCEPTABLE USAGE POLICY

ACCEPTABLE USAGE POLICY For Sales For Support Call Us At Website sales@usserverhosting.com support@usserverhosting.com +911165025096,+911244059143 www. usserverhosting.com ACCEPTABLE USAGE POLICY Introduction The Acceptable Useage

More information

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 COMMENTS OF THE ALLIANCE FOR TELECOMMUNICATIONS INDUSTRY SOLUTIONS

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 COMMENTS OF THE ALLIANCE FOR TELECOMMUNICATIONS INDUSTRY SOLUTIONS Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of Rules and Regulations Implementing the Telephone Consumer Protection Act of 1991 ) CG Docket No. 02-278 ) ) COMMENTS

More information

GARANTE PER LA PROTEZIONE DEI DATI PERSONALI WHEREAS

GARANTE PER LA PROTEZIONE DEI DATI PERSONALI WHEREAS [doc. web n. 1589969] Spamming: How to Lawfully Email Advertising Messages GARANTE PER LA PROTEZIONE DEI DATI PERSONALI Prof. Stefano Rodotà, President, Prof. Giuseppe Santaniello, Vice-President, Prof.

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

EMI v UPC. THE DECISION AND CONSEQUENCES FOR IRISH ISPs AND COPYRIGHT HOLDERS

EMI v UPC. THE DECISION AND CONSEQUENCES FOR IRISH ISPs AND COPYRIGHT HOLDERS EMI v UPC THE DECISION AND CONSEQUENCES FOR IRISH ISPs AND COPYRIGHT HOLDERS Sally-Anne Hinfey, DFMG Solicitors, IE 1 Introduction EMI v UPC 2 is a particularly controversial intellectual property judgment

More information

Service Protection Under The Provider's Acceptable Use Policy

Service Protection Under The Provider's Acceptable Use Policy Acceptable Use Policy As a provider of Internet access, Internet email, web site hosting, and other Internet related services, Pottawatomie Telephone Company and MBO.net herein after referred to as "the

More information

Congestion Management Provider does not employ any congestion management tools, practices and/or software on network traffic.

Congestion Management Provider does not employ any congestion management tools, practices and/or software on network traffic. Midstate Communications Network Management Practices Policy Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations,

More information

Walnut Telephone Company, Inc. dba/ Walnut Communications Network Management Practices Policy Disclosure

Walnut Telephone Company, Inc. dba/ Walnut Communications Network Management Practices Policy Disclosure Walnut Telephone Company, Inc. dba/ Walnut Communications Network Management Practices Policy Disclosure Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

OLYMPIC COLLEGE POLICY

OLYMPIC COLLEGE POLICY TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,

More information

STOWE COMMUNICATIONS ACCEPTABLE USE POLICY FOR BUSINESS SERVICES HIGH SPEED INTERNET

STOWE COMMUNICATIONS ACCEPTABLE USE POLICY FOR BUSINESS SERVICES HIGH SPEED INTERNET STOWE COMMUNICATIONS ACCEPTABLE USE POLICY FOR BUSINESS SERVICES HIGH SPEED INTERNET Contents 1. Prohibited Uses and Activities 2. Customer Conduct and Features of the Service 3. Network Management and

More information

RezScore SM Privacy Policy

RezScore SM Privacy Policy RezScore SM Privacy Policy Last updated: August 19, 2011 Thank you for using RezScore.com. We are committed to protecting your privacy and, for that reason, we have adopted this Privacy Policy to memorialize

More information

MEMORANDUM THE FCC S 2015 OPEN INTERNET ORDER AND IMPLICATIONS FOR BROADBAND INTERNET ACCESS SERVICE PROVIDERS SAMPLE

MEMORANDUM THE FCC S 2015 OPEN INTERNET ORDER AND IMPLICATIONS FOR BROADBAND INTERNET ACCESS SERVICE PROVIDERS SAMPLE MEMORANDUM THE FCC S 2015 OPEN INTERNET ORDER AND IMPLICATIONS FOR BROADBAND INTERNET ACCESS SERVICE PROVIDERS Introduction On March 12, 2015, the Federal Communications Commission ( FCC or Commission

More information