Ministry of Culture Training In cooperation with IP Key

Size: px
Start display at page:

Download "Ministry of Culture Training In cooperation with IP Key"

Transcription

1 Ministry of Culture Training In cooperation with IP Key Monday 31 August 2015, Zhengzhou, Henan COPYRIGHT ENFORCEMENT TRENDS IN THE EU & INTERNATIONALLY Overview Part 1 Threats to the creative industries in the digital era Part 2 How to tackle the threats: approach to enforcement ***Break*** Part 3 Countermeasures: different ways to tackle the problem Part 4 Sample cases: Part 5 Cyber Trust Questions 1

2 PART 1 THREATS TO THE CREATIVE INDUSTRIES IN THE DIGITAL ERA Overview 1 Music Industry 2 Games Industry 3 Publishing Industry THREATS TO THE MUSIC INDUSTRY Music industry was the first of the creative industries to come under threat As early as 1999, music piracy exploded with the Napster peer to peer (P2P) service Key cases in the 2000s around the world established key principles as to when the parties involved would be liable Example cases: P2P cases: Napster, Grokster, Kazaa Search/links cases: Yahoo! China, Baidu, Cooper/mp3s4free P2P/BitTorrent cases: The Pirate Bay, IsoHunt Cyberlocker cases: RapidShare, Hotfile, MegaUpload 2

3 THREATS TO THE MUSIC INDUSTRY Today, music industry today still faces many threats From a technology point of view, many threats remain the same as ten years ago Key threats today include: unlicensed websites/download sites these services simply offer illegal music content for download by the consumer the music is downloaded directly from the service operator music search/deep linking services these services collect links to unlicensed music being hosted around the Internet on third party servers users search the services database of links for music they want the music is then downloaded directly from the third party host THREATS TO THE MUSIC INDUSTRY Key threats continued: peer to peer (P2P) services various different P2P technologies exist; most popular today is BitTorrent in a P2P system, files are not on central servers, but held by individual users the P2P service allows users or peers that want a file to find other users that hold the file the file (or at least part of it) is then transferred directly from the peer holding the file to the peer requesting the file in a BitTorrent service, the coordination of the peers requesting the file (known as leechers ) and peers holding the file (known as seeders ) is done by a tracker pirate apps these services can be accessed by downloading apps from smartphone app stores various different versions exist typically, services allow users to download music from their own servers or third party sites technically similar to search/deeplinking services 3

4 THREATS TO THE MUSIC INDUSTRY Key threats continued: cyberlockers at their most simple, cyberlockers are simply file hosting and storage services users upload e.g. music files to the cyberlocker, which is like an online warehouse the cyberlocker stores the file and sends the user a link to the hosted file the user can then very easily distribute the link to the file to other users, for instance by posting on BBS and blog services; no need to distribute the file itself the cyberlockers themselves have limited interfaces and it is not possible to search within a cyberlocker for particular content by using the link, other users download a copy of the file from the cyberlocker cyberlockers are not necessarily liable for infringement but where cyberlocker services induce or encourage users to store commercial, copyright protected content then they can be indirectly liable THREATS TO THE GAMES INDUSTRY Games industry suffers from similar threats to other industries, in particular music and film. Differences in the games industry mean threats impact the games industry differently from, e.g. music and film industries game files can be huge >30GB; a lack of bandwidth means these files simply cannot be distributed as easily as smaller music or film files historically the distribution model for many games has been quite different, with games being played on proprietary games consoles games consoles include technical protection measures (TPMs) that prevent pirate copies of games being played on genuine consoles commercial models may be different, e.g. subscription based games Some threats are particular to the games industry, e.g. TPM circumvention 4

5 THREATS TO THE GAMES INDUSTRY Key threats today include: P2P services technically these services work in an identical manner as they do for other content, e.g. music and film cyberlockers and unlicensed sites again similar to the music industry, cyberlockers are a major problem for the games industry links to pirate games that have been uploaded to the cyberlocker are distributed on the internet, e.g. on BBS and blogs users can download the pirate games by following the links some websites aggregate and offer many links to pirate games and may be acting with the cyberlocker, sharing revenues THREATS TO THE GAMES INDUSTRY Key threats today continued: TPM circumvention technical protection measures (TPMs) are technical measures that prevent users from copying copyright content, including playing pirate copies of games major games publishers and console manufacturers use TPMs to allow only genuine games to be played on their consoles major console manufacturers include: Nintendo, who produce the WiiU and 3DS Sony, who produce the PlayStation PS4 Microsoft, who produce the X Box the most common form of TPM circumvention device allows pirate copies of games to be played on the consoles (these devices are sometimes known as modchips ) the manufacture, distribution and sale of physical devices and software that circumvent TPMs is a huge industry once a user has purchased a console, a TPM circumvention device allows the user to play pirate games that it has downloaded for free 5

6 THREATS TO THE PUBLISHING INDUSTRY The publishing industry faces similar threats to other creative industries, but the most serious threats are quite particular to publishing Differences in the industry mean threats impact the industry differently from other industries, e.g. music physical products, in particular books and magazines are still very popular e books are becoming very popular, but e books typically come with technical protection measures (TPMs) and/or digital rights management systems (DRM) those TPM and DRM systems tend to be attacked ( cracked or hacked ) less that in other industries, e.g. games Some threats are particular to the publishing industry, e.g. the collaboration with licensees in cases of journal piracy THREATS TO THE PUBLISHING INDUSTRY Key threats today include: journal piracy services academic, scientific, technical and medical journal publishers publish thousands of different journals these are typically licensed to institutions, such as universities and libraries, on a subscription basis; a licence gives access to a huge database of current journals and past issues pirate journal service providers collaborate with one or more licensed institutions this allows the service to offer a huge volume of current and past issues of journals the involvement of the institutions is outside the terms of their licence from the publisher articles requested from the service provider are either ed directly to the user or uploaded to the user s account, from where they can be downloaded directly services are often commercial, charging users, but no money goes back to the publishers 6

7 THREATS TO THE PUBLISHING INDUSTRY Key threats continued: document sharing platforms users upload documents to the platform operator uploaded documents are then made available to other users, who search for what they want users can then download the documents they are looking for document sharing platforms operate in various ways commercially document sharing platforms are not necessarily liable for infringement but where the platforms induce or encourage users to upload commercially available, copyright protected content then they can be indirectly liable document sharing platforms are either stand alone or may be one of the services offered by, for instance, larger search providers Key threats continued: e book piracy e books normally contain DRM content and/or TPMs hackers often try to crack the DRM or TPM to allow the hackers easier access to the content and to allow them to distribute the content freely PART 2 HOW TO TACKLE THE THREATS: THE APPROACH TO ENFORCEMENT A structured approach can be taken to analysing infringing services Online infringement generally involves two acts of copyright infringement: infringement of the right of communication to the public infringement of the right of reproduction Need to understand in detail who is responsible for each act Need to understand who benefits from the infringement occurring Often the mastermind is not the primary infringer 7

8 PART 2 HOW TO TACKLE THE THREATS: THE APPROACH TO ENFORCEMENT Relevant legal provisions are same internationally, in Europe and in China: 1. the unlicensed making available to the public of their works WIPO Copyright Treaty 1996, Article 8: Right of communication to the public EU Copyright Directive 2001, Article 3: Right of communication to the public Chinese Copyright Law 1990, Article 10.1(12): Right of communication through an information network 2. the unlicensed reproduction of the work Berne Convention 1886 (1971 edition), Article 9: Right of reproduction EU Copyright Directive 2001, Article 2: Right of reproduction Chinese Copyright Law 1990, Article 10.1(5): Right of reproduction STRUCTURED APPROACH TO ANALYSING INFRINGING SERVICES understand the technology what does the service actually do? where is the infringing content actually being stored? who technically is making the content available to other users to allow them to reproduce it? how is the content reproduced from the storage location to the user? understand the commercial model who is making money from the service and how? simple cash payments? or cash donations? advertising on the site? receiving money from an ISP for generating traffic over their network? who is sharing in that revenue? 8

9 STRUCTURED APPROACH TO ANALYSING INFRINGING SERVICES who is the mastermind? who created the service? who benefits primarily from the service? who are the primary infringers? who is actually making available the content? who is actually reproducing the content what is the involvement of the mastermind in the primary infringer s acts? providing the technology to enable it to happen? actually effecting the infringement? what level of knowledge does the mastermind have? general knowledge that infringement is occurring? anything more detailed? how to evidence the primary acts of infringement and the knowledge and involvement of the mastermind? STRUCTURED APPROACH: EXAMPLE DEEPLINKING/SEARCH SERVICE understand the technology crawlers crawl the internet looking for specific types of files, e.g. mp3 search service analyses the files to determine what the contents are service indexes location of the files and information about their contents the user enters search terms, the service provides relevant results/links the user clicks on the links to download the file at that location understand the commercial model search provider wants to offer attractive content to users to drive traffic to the site to increase the value of advertising shown on the site who is the mastermind? search provider is the mastermind who are the primary infringers? the hosts of the infringing content being made available to users the user who copies the file from the host to his device 9

10 STRUCTURED APPROACH: EXAMPLE DEEPLINKING/SEARCH SERVICE what is the involvement of the mastermind in the primary infringers acts? mastermind/service provider finds likely infringing content on the Internet provides relevant search results with links to the infringing content what level of knowledge does the mastermind have? this is a critical question; showing infringement depends on finding evidence to show the mastermind had sufficient knowledge how likely is it that commercial, copyright content files are being found? how popular is the content being found how is the service advertised? are there charts of popular content being downloaded? is the content categorised to help users search? are search terms for commercial content automatically suggested? how to evidence the primary acts of infringement and the knowledge and involvement of the mastermind? can be challenging; to be covered in the afternoon session PART 3 COUNTERMEASURES: DIFFERENT WAYS TO TACKLE THE PROBLEM It may be very clear that infringement is happening. It may be very difficult to show exactly who is doing what and where that is happening. It may therefore be very difficult to take action to stop it. It may be easier to take action with or against the larger, more stable, more easily identifiable parties that are involved. This may be an innocent party, but one whose involvement means that its has the power to prevent the infringement happening. This can include: the ISPs giving users access to infringing services the payment providers that enable money to be received by infringing services, such as Visa, MasterCard and Paypal the advertisers who support the service by providing revenue a service operator, using content recognition technology to trigger royalty payments 10

11 COUNTERMEASURES: ISPS AND WEBSITE BLOCKING Action with innocent parties able to prevent infringement: ISPs and website blocking Under European law, rightsholders must be able to apply for an injunction against intermediaries whose services are used by a third party to infringe copyright (Article 8(3) of the Information Society Directive 2001/29/EC) In practice this means that ISPs (Internet access providers) can be ordered to block the access of its subscribers to certain infringing websites or services This is now widely used in Europe and elsewhere Mostly used where sites are infringing copyright works. In the UK this has been extended to cases where trade marks have been infringed See later case examples COUNTERMEASURES: PAYMENT SERVICE PROVIDERS Action with innocent parties able to prevent infringement: payment service providers The UK has very strict anti money laundering laws. If a payment service provider becomes aware that it is handling payments that are the proceeds of illegal activity, it can itself be liable unless it stops The UK's City of London Police Intellectual Property Crime Unit (PIPCU) has been very active Widespread support from major credit card companies: VISA, MasterCard and American Express Active support from other major payment service providers, such as Paypal 11

12 COUNTERMEASURES: ADVERTISERS Action with innocent parties able to prevent infringement: advertisers many services survive by making money from advertising; by generating traffic to the sites in order to be to sell advertising at a higher value Often advertisers don t even know their adverts are appearing on infringing services advertisers buy advertising space targeted at a specific audience; often bought from third party specialising in placing adverts who chooses the websites to advertise on in EU and internationally rightsholders and law enforcement agencies work with advertisers first step is to educate advertisers; help them understand they are supporting infringement and may be supporting much more serious criminal activity COUNTERMEASURES: CONTENT RECOGNITION AND FILTERING Measures can also be applied by service providers to prevent infringement occurring and/or to correctly identify when royalties are due Content recognition technology identifies the content of media files. Content recognition service providers have databases of millions works submitted by the music, TV and motion picture industries. By creating fingerprints from the original works, it is possible to match other media files against the originals. Under European law, a court cannot require an ISP to install a filtering system to prevent the illegal copying of files (Scarlet v. SABAM ECJ Case C 70/10, 24 November 2011) though it may be a reasonable measure that a service needs to have in place to avoid liability (see Rapidshare cases below). Many service providers choose to install them to prevent infringing content from being uploaded to or shown on their service and/or to monetise content by sharing advertising revenue, e.g. Facebook, DailyMotion, YouTube 12

13 LIMITATIONS AND EXCEPTIONS: HOW THEY RARELY APPLY Under European Law, there are few limitations or exceptions to the exclusive rights of reproduction and communication to the public. Exceptions to the right of reproduction are only allowed when copies are by a natural person for private use and for ends that are neither directly nor indirectly commercial, on condition that the rightsholders receive fair compensation (Article 5.2(b), Information Society Directive) Exceptions to the right of communication to the public are not permitted at all for private use (Article 5.3, Information Society Directive). So, if a work is reproduced and communicated to the public and: the use of the work is by a private individual, and the rightsholder does not get paid then no exceptions can apply; the rightholders right will be infringed. PART 4: SELECTED CASES In this section we look at four international cases which illustrate recent developments in considering liability and other countermeasures Case 1 Cooper v. Universal Music Australia (the mp3s4free case) considers secondary liability of site operator and hosting ISP Case 2 Rapidshare cases considers secondary liability of cyberlocker operator considers obligations that can be imposed on ISPs to prevent infringement Case 3 UPC Telekabel v. Constantin Film (the Kino.to case) considers the implementation of blocking injunctions Case 4 Nintendo v. PC Box considers the use of TPMs to protect games from piracy 13

14 CASE 1 COOPER V UNIVERSAL MUSIC AUSTRALIA (2006) 156 FCR 380 Facts: Cooper ran a website called mp3s4free, a links site that hosted links to a large amount of infringing music. Cooper allowed users to post links to infringing material, and encouraged users to infringe copyright. Universal Music sued Cooper and the ISP for copyright infringement. Findings: Primary infringements occurred when users followed links from the website to download infringing sound recordings Cooper was liable for authorising those infringements The ISP hosting the site on its servers was also liable The ISP knew the website linked users to infringing material, and could have reasonably prevented the infringements by declining/ceasing to host the site Instead, it agreed to provide free hosting with the intention of attracting business from the third party infringers The director of the ISP was also liable, as he had the requisite knowledge and encouraged the further infringement CASE 2A ATARI V. RAPIDSHARE (2012) & GEMA V. RAPIDSHARE (2013) Facts: Rapidshare was a cyberlocker. Users uploaded content to the site and were given a link to the content which they could then distribute. Rapidshare. At its height, Rapidshare was extremely popular with >100 million users per month. A lot of copyright works, including games and music, were stored on the service. Rapidshare was sued by Atari, the Japanese games publisher, for distribution of the game Alone in the Dark. Rapidshare deleted the specific file but refused to implement additional measures to prevent repeat infringement. Findings: Rapidshare can be liable for infringement (indirect/secondary liability) if it was notified of similar infringements before and failed to implement measures to prevent repeated infringements which could be reasonably expected Reasonable measures could include in the installation of filtering software 14

15 CASE 2B GEMA V. RAPIDSHARE (2013) Facts: Rapidshare was sued by GEMA, the German author s collecting society regarding 4,800 titles that we being stored on the service and downloaded from the service by users using the links. Findings: Rapidshare s business model in itself is not infringing Rapidshare was not directly liable for infringement, but was liable for its involvement (secondary/indirect liability) Rapidshare made attempts to prevent infringement, but these were not enough: terms and conditions forbidding copyright infringement automated interface for rightsholders to take down infringing files an abuse team of 17 people a hash filter that stopped the identical file, but not different files of the same work, being uploaded again CASE 2B GEMA V. RAPIDSHARE (2013) Findings continued: Rapidshare must take on the following obligations: it has to take down the content that was notified to it it has to search on external sites as to whether there are more files being hosted on its servers, including Google, Facebook and Twitter. it also has to prevent similar infringements of the same titles, not just the identical file. In other words, the court confirmed that once taken down, content must stay down, whether uploaded by the same or another person. the obligations are proportionate notwithstanding the potential risk that legal files are being taken down the obligations remain the same regardless of the number of titles 15

16 CASE 3 UPC V. CONSTANTIN ( KINO.TO ) CJEU C 314/12, 24 MARCH 2014 Facts: Kino.to was a website hosting links to unlicensed copies films and TV shows. Kino.to did not host works itself. Works were hosted by and streamed from third party site. Owners of copyright in two films obtained an injunction against UPC, an ISP, requiring the ISP to block access to Kino.to to prevent infringement. The rightsowners relied on the Austrian version of Article 8(3) of the Information Society Directive. UPC appealed. Findings: the court can grant blocking injunctions and it not necessary to specify the exact measures the ISP must take (e.g. DNS and IP blocking), but it may do so measures must prevent access unauthorised content or, at least, make it difficult to access and seriously discourage users from accessing the content measures taken must not unnecessarily deprive users of the possibility of lawfully accessing the information available CASE 3 UPC V. CONSTANTIN ( KINO.TO ) CJEU C 314/12, 24 MARCH 2014 Findings continued: blocking measures do not infringe an ISP s freedom to conduct a business even though they: may have a significant cost may impact on the organisation of the ISP s activities, or may require a complex technical solution. Regarding users, injunctions must be strictly targeted so that they bring an end to the copyright infringement without unnecessarily depriving users of the ISP s services from lawfully accessing information. 16

17 CASE 4 NINTENDO V. PC BOK CJEU CASE C 355/12, 23 JANUARY 2014 Facts: Nintendo sells video games consoles and games to play on them. Nintendo uses technical protection measures (TPMs) to prevent users of its consoles from playing unlicensed copies of its games on its consoles. PC Box marketed devices which circumvented the TPMs in Nintendo consoles. Under European law (Article 6, InfoSoc Directive), it is unlawful to market devices primarily designed to circumvent TPMs. Nintendo sued PC Box. Findings : Nintendo and other console manufacturers can use TPMs to protect their games and the games of other publishers from piracy, and to stop unlicensed copies of their games from being played on their consoles But TPMs must be suitable to prevent infringement of copyright and must not go beyond what is necessary for that purpose Courts must examine TPMs to see if there are alternatives Courts must also examine circumvention devices to determine whether they actually enable legitimate activities, and if so, how much they are used for that SUMMARY OF COPYRIGHT ENFORCEMENT TRENDS: KEY TAKE AWAY POINTS Courts will look very closely at all parties involved in infringement; if they had sufficient knowledge of the ongoing infringements and were sufficiently involved, they may be liable indirect or secondary liability where service providers are liable, they may be required by courts to implement reasonable measures to prevent repeated infringements which could be reasonably expected under European law, where a service provider does not have sufficient knowledge but is in a position to prevent infringement, it can be ordered to take steps to do so, e.g. by blocking access to an infringing website as enforcement directly against operators of services becomes more difficult, courts are more willing to order other service providers, e.g. ISP and payment providers, to implement effective measures in some countries, criminal and administrative authorities will work with or order service providers to do the same 17

18 CYBER TRUST Where there are legitimate services offering copyright content: film, music, games, software etc online, rightsholders in Europe are keen to ensure customers can trust those services Where there are illegal, unlicensed services offering copyright content: online, rightsholders in Europe are keen to ensure that: all online service providers and intermediaries take their share of responsibility for ensuring that their services are not used to facilitate copyright infringement the illegal services that infringe copyright do not enjoy the support of legitimate, trusted brands and service providers, which can make customers trust the services European governments have supported rightsholders by implementing or enabling self regulation and codes of conduct for intermediaries including online service providers, advertisers and payment providers. QUESTIONS? Any questions? 18

19 Thank You! Tim Smith

Intermediary Liability and Website-Blocking in the EU. Jane C. Ginsburg Columbia University School of Law

Intermediary Liability and Website-Blocking in the EU. Jane C. Ginsburg Columbia University School of Law Intermediary Liability and Website-Blocking in the EU Jane C. Ginsburg Columbia University School of Law Moving Parts Rights: 2001 Infosoc Directive Art. 3.2: Making available right Art 8.3: right to injunctive

More information

[TITLE IN CAPS, VERDANA, 32]

[TITLE IN CAPS, VERDANA, 32] [TITLE IN CAPS, VERDANA, 32] On-line piracy, and the intermediaries Joris van Manen FORDHAM meeting New York, April 4th, 2013 On-line counterfeit on the rise Increasing numbers of on-line counterfeit and

More information

HSC: All My Own Work. Copyright. Introduction. Module Outline

HSC: All My Own Work. Copyright. Introduction. Module Outline HSC: All My Own Work Copyright Introduction This module explains copyright and its relevance to students. The Board of Studies NSW gratefully acknowledges permission to quote from and paraphrase information

More information

Copyright Notice: digital images, photographs and the internet

Copyright Notice: digital images, photographs and the internet Copyright Notice: digital images, photographs and the internet Copyright Notice Number: 1/2014 Updated: March 2014 What is a Copyright Notice?... 1 Copyright in images and photographs... 1 The basics...

More information

ETNO Reflection Document on the future of electronic commerce in the internal market and the implementation of the e-commerce Directive

ETNO Reflection Document on the future of electronic commerce in the internal market and the implementation of the e-commerce Directive ETNO Reflection Document on the future of electronic commerce in the internal market and the implementation of the e-commerce Directive November 2010 Executive Summary ETNO welcomes the European Commission

More information

Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment

Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment As requested by the Commerce Select Committee Contents Introduction

More information

The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service

The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service The Role of Internet Service Providers in Stopping Internet Copyright Infringement Jennie Ness Regional IP Attaché U.S. Commercial Service New Means of Distribution Webcasting or Streaming Uploading and

More information

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used

More information

Cloud providers and communication to the public: (joint) liability or safe harbor?

Cloud providers and communication to the public: (joint) liability or safe harbor? Cloud providers and communication to the public: (joint) liability or safe harbor? Jacqueline Seignette ALAI 2012 - Kyoto Cloud models: 1. on demand delivery and cloud access to the same content (itunes,

More information

Geo-blocking, VPNs & Copyright

Geo-blocking, VPNs & Copyright INFORMATION SHEET G127v02 July 2015 Geo-blocking, VPNs & Copyright In this information sheet we give a brief overview of the law as it relates to geo-blocking, virtual private networks (VPNs) and copyright.

More information

AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape

AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape AVCC Australian Vice-Chancellors Committee the council of Australia s university presidents Peer-to-Peer File Sharing: the Legal Landscape November 2003 This work in copyright free to universities and

More information

Internet Service Providers Liability in the Field of Copyright: A Review of Asia-Pacific Copyright Law

Internet Service Providers Liability in the Field of Copyright: A Review of Asia-Pacific Copyright Law Internet Service Providers Liability in the Field of Copyright: A Review of Asia-Pacific Copyright Law WIPO International Seminar on Copyright Jointly organized by WIPO and the Ministry of Culture of Brazil

More information

Alternative Measures and illicit (P2P) file sharing: enforcement issues. Allard Ringnalda Willem Grosheide CIER

Alternative Measures and illicit (P2P) file sharing: enforcement issues. Allard Ringnalda Willem Grosheide CIER Alternative Measures and illicit (P2P) file sharing: enforcement issues Allard Ringnalda Willem Grosheide CIER Outline What are technical measures Why would we need them Three practical enforcement issues

More information

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic

More information

Online Copyright Infringement. Discussion Paper

Online Copyright Infringement. Discussion Paper Online Copyright Infringement Discussion Paper July 2014 Introduction There are a number of factors that contribute to online copyright infringement in Australia. These factors include the availability

More information

2011 COUNTRY WATCH LIST

2011 COUNTRY WATCH LIST The Congressional International Anti-Piracy Caucus Senator Sheldon Whitehouse, Co-Chair Senator Orrin G. Hatch, Co-Chair Congressman Bob Goodlatte, Co-Chair Congressman Adam B. Schiff, Co-Chair 2011 COUNTRY

More information

The Role and Responsibility of Internet Intermediaries in the Field of Copyright and Related Rights

The Role and Responsibility of Internet Intermediaries in the Field of Copyright and Related Rights The Role and Responsibility of Internet Intermediaries in the Field of Copyright and Related Rights Lilian Edwards Professor of E-Governance University of Strathclyde, Glasgow WIPO, June 22 2011 The issues

More information

Private Copying and Fair Compensation:

Private Copying and Fair Compensation: Private Copying and Fair Compensation: An empirical study of copyright levies in Europe Martin Kretschmer Centre for Intellectual Property Policy & Management www.cippm.org.uk Bournemouth University mkretschmer@bournemouth.ac.uk

More information

Copyright Infringement and Enforcement in the US

Copyright Infringement and Enforcement in the US Copyright Infringement and Enforcement in the US A Research Note, November 2011 The U.S. House of Representatives is currently debating the Stop Online Piracy Act (SOPA) the counterpart to the Senate s

More information

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET. ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET GRUR Workshop Brussels March 7, 2007 Michael Keplinger* Overview: 1.

More information

Internet: Copying & Downloading

Internet: Copying & Downloading INFORM ATION SHEET G056v 09 May 2015 Internet: Copying & Downloading This information sheet is for people who want to copy or download material from the Internet or swap and share files online. The purpose

More information

Technical report: An Estimate of Infringing Use of the Internet

Technical report: An Estimate of Infringing Use of the Internet Technical report: An Estimate of Infringing Use of the Internet January 2011 Version 1.8 Envisional Ltd, Betjeman House, 104 Hills Road, Cambridge, CB2 1LQ Telephone: +44 1223 372 400 www.envisional.com

More information

EMI v UPC. THE DECISION AND CONSEQUENCES FOR IRISH ISPs AND COPYRIGHT HOLDERS

EMI v UPC. THE DECISION AND CONSEQUENCES FOR IRISH ISPs AND COPYRIGHT HOLDERS EMI v UPC THE DECISION AND CONSEQUENCES FOR IRISH ISPs AND COPYRIGHT HOLDERS Sally-Anne Hinfey, DFMG Solicitors, IE 1 Introduction EMI v UPC 2 is a particularly controversial intellectual property judgment

More information

BPI response to the Draft Ofcom Annual Plan 2013-14

BPI response to the Draft Ofcom Annual Plan 2013-14 BPI response to the Draft Ofcom Annual Plan 2013-14 Introduction 1. BPI welcomes the opportunity to comment on the planned work of Ofcom in the year 2013-14. BPI will contain its comments to those aspects

More information

PEER-TO-PEER NETWORK

PEER-TO-PEER NETWORK PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Hadopi Research, Studies and Monitoring Department (DREV)

Hadopi Research, Studies and Monitoring Department (DREV) Hadopi Research, Studies and Monitoring Department (DREV) Access to Works on the Internet The situation regarding Internet usage as revealed by the work carried out by the DREV in the context of Hadopi

More information

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including

More information

ISP liability in Denmark

ISP liability in Denmark ISP liability in Denmark Clement Salung Petersen Assistant Professor, PhD Centre for Information and Innovation Law www.ciir.dk Dias 1 A Danish perspective on ISP liability ISP liability Mere conduit,

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

Copyright Law An Introduction

Copyright Law An Introduction Copyright Law An Introduction The following pages outline some basic facts about copyright law and answer various questions, such as 'how long does copyright last?' 'When does infringement occur?'... and

More information

EU Digital Copyright Law and the End-User

EU Digital Copyright Law and the End-User Giuseppe Mazziotti EU Digital Copyright Law and the End-User i Springer Table of contents V List of abbreviations XIX PART I COPYRIGHT AND DIGITISATION 1 1. Introduction 3 1.1. The research question 3

More information

Ringling College of Art and Design

Ringling College of Art and Design Ringling College of Art and Design Plan for Combating the Unauthorized Distribution of Copyrighted Material by Users of the Ringling College of Art and Design Network Version 5 December 2010 12/16/10;

More information

SWITZERLAND PRIORITY RECOMMENDED ACTIONS FOR SWITZERLAND IN 2013

SWITZERLAND PRIORITY RECOMMENDED ACTIONS FOR SWITZERLAND IN 2013 SWITZERLAND INTERNATIONAL INTELLECTUAL PROPERTY ALLIANCE (IIPA) 2013 SPECIAL 301 REPORT ON COPYRIGHT PROTECTION AND ENFORCEMENT Special 301 Recommendation: IIPA recommends that USTR place Switzerland on

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

Peer to Peer File Sharing and Copyright Infringement Policy

Peer to Peer File Sharing and Copyright Infringement Policy Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct

More information

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources

More information

e-pirates of the Digital Age Copyright Issues in Software and Music

e-pirates of the Digital Age Copyright Issues in Software and Music VEA Bringing Learning to Life Program Support Notes e-pirates of the Digital Age Copyright Issues in Software and Music Senior Secondary - TAFE 27mins Teacher Notes by Jorge Viega, B.Sci.(Chemical), Dip.Ed.,Associate

More information

Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES

Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES Web Drive Limited trading is herein referred to as "Web Drive". 1. Definitions a) Web Drive includes its employees and directors.

More information

Websites & Copyright. INFORMATION SHEET G057v12 April 2014. info@copyright.org.au www.copyright.org.au

Websites & Copyright. INFORMATION SHEET G057v12 April 2014. info@copyright.org.au www.copyright.org.au INFORMATION SHEET G057v12 April 2014 Websites & Copyright This information sheet is for web developers, bloggers, website designers, startups, businesses and anyone interested in copyright issues relevant

More information

I. Background information

I. Background information A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries I. Background information 1. Please indicate your role for the purpose

More information

Winny Case. 1.1 Overview of Winny Case On May 31, 2004, various news was reported on the Web including the following item. 1

Winny Case. 1.1 Overview of Winny Case On May 31, 2004, various news was reported on the Web including the following item. 1 Winny Case A P2P Software Copyright Case in Japan Impact on the Information Society and Legal Analysis Takato NATSUI Professor at Meiji University Law Faculty, Tokyo Japan Lawyer at Asuka-Kyowa Law Firm,

More information

IP & IT Bytes. Copyright: website-blocking order against internet service providers

IP & IT Bytes. Copyright: website-blocking order against internet service providers June 2015 IP & IT Bytes First published in the June 2015 issue of PLC Magazine and reproduced with the kind permission of the publishers. Subscription enquiries 020 7202 1200. Copyright: website-blocking

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

The Copyright and Innovation Consultation in Adobe Systems Inc.

The Copyright and Innovation Consultation in Adobe Systems Inc. Adobe Systems Incorporated Response to the Copyright and Innovation Consultation paper for the Department of Jobs, Enterprise and Innovation About Adobe Systems Incorporated Adobe is the global leader

More information

Equipment Needed. Connecting to the Internet

Equipment Needed. Connecting to the Internet All resident students are provided with access to a high-speed Internet connection. Connection to this network is done at the students own risk. The College is not responsible for material viewed or downloaded

More information

Understanding copyright: the theory

Understanding copyright: the theory Understanding copyright: the theory Andrew Braid Licensing and Copyright Compliance The British Library OUTLINE Brief introduction to copyright How copies can be made Recent changes How The British Library

More information

I. Background information

I. Background information A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries I. Background information 1. Please indicate your role for the purpose

More information

Anti-Bribery and Corruption Policy

Anti-Bribery and Corruption Policy Newcrest strictly prohibits bribery and other unlawful or improper payments made to any individual or entity, as outlined in this Anti-Bribery & Corruption Policy. Newcrest's Anti- Bribery & Corruption

More information

What is the legal basis for buying and selling used software licences?

What is the legal basis for buying and selling used software licences? What is the legal basis for buying and selling used software licences? The legal basis for the market in second-hand software is the exhaustion doctrine, or the first sale doctrine, as it is referred to

More information

Online Infringements Report

Online Infringements Report Online Infringements Report September 2013 I. Executive Summary Background The infringement of content, protected by copyright, represents one of the major issues posed to the growth of the copyright industry

More information

Making Money with Downloads

Making Money with Downloads What is Yiyd.com? Yiyd.com is an online file hosting service (such as Rapidshare or Megaupload). Yet Yiyd.com has something that Rapidshare or Megaupload don t offer: they pay you every time someone downloads

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TERMS & CONDITIONS www.tagadab.com INTRODUCTION Tagadab has created this (AUP) for our customers to protect our resources, our customer s resources, and to ensure that Tagadab Ltd

More information

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full

More information

ResNet Guide. Information & Learning Services. Here to support your study and research

ResNet Guide. Information & Learning Services. Here to support your study and research ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

The music industry experience in the online environment. Olivia Regnier Deputy Regional Director Europe IFPI

The music industry experience in the online environment. Olivia Regnier Deputy Regional Director Europe IFPI The music industry experience in the online environment Olivia Regnier Deputy Regional Director Europe IFPI 1 Summary The digital market for music New digital music services The challenge of copyright

More information

A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries

A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries I. Background information 1. Please indicate your role for the purpose

More information

cprax Internet Marketing

cprax Internet Marketing cprax Internet Marketing cprax Internet Marketing (800) 937-2059 www.cprax.com Table of Contents Introduction... 3 What is Digital Marketing Exactly?... 3 7 Digital Marketing Success Strategies... 4 Top

More information

The Truth About Music Licensing in Europe

The Truth About Music Licensing in Europe The Truth About Music Licensing in Europe European consumers today have access to a greater variety of music in different formats and price points than ever before. Online licensing in the music sector

More information

LEAKED ACTA DIGITAL ENFORCEMENT CHAPTER

LEAKED ACTA DIGITAL ENFORCEMENT CHAPTER LEAKED ACTA DIGITAL ENFORCEMENT CHAPTER Frequently Asked Questions 1. Is the Anti-Counterfeiting Trade Agreement (ACTA) only about counterfeiting? No. Counterfeiting involves the production of fake goods

More information

BASIC NOTIONS ABOUT COPYRIGHT AND NEIGHBOURING RIGHTS

BASIC NOTIONS ABOUT COPYRIGHT AND NEIGHBOURING RIGHTS BASIC NOTIONS ABOUT COPYRIGHT AND NEIGHBOURING RIGHTS 1) What is the object of copyright protection? 2) What kind of protection does copyright grant? 3) How can copyright be obtained? Are there any formalities?

More information

ABOUT PHONOGRAPHIC PERFORMANCE LIMITED LICENCE FOR SCHOOLS

ABOUT PHONOGRAPHIC PERFORMANCE LIMITED LICENCE FOR SCHOOLS ABOUT PHONOGRAPHIC PERFORMANCE LIMITED LICENCE FOR SCHOOLS CEFM are the collection agents within the UK schools sector for the Phonographic Performance Limited (PPL). In turn, the PPL administers the performance

More information

CONSULTATION ON LEGISLATIVE OPTIONS TO ADDRESS ILLICIT PEER- TO-PEER (P2P) FILE-SHARING JULY 2008

CONSULTATION ON LEGISLATIVE OPTIONS TO ADDRESS ILLICIT PEER- TO-PEER (P2P) FILE-SHARING JULY 2008 CONSULTATION ON LEGISLATIVE OPTIONS TO ADDRESS ILLICIT PEER- TO-PEER (P2P) FILE-SHARING JULY 2008 2 Consultation document on legislative options to address illicit P2P file-sharing Explanation of the wider

More information

Online Piracy Global Perspective and Trends Panama, April 2012. Mo Ali Head of Internet Anti-piracy Operations mo@ifpi.org

Online Piracy Global Perspective and Trends Panama, April 2012. Mo Ali Head of Internet Anti-piracy Operations mo@ifpi.org Online Piracy Global Perspective and Trends Panama, April 2012 Mo Ali Head of Internet Anti-piracy Operations mo@ifpi.org IFPI IFPI (International Federation of the Phonographic Industry) represents the

More information

Site-blocking Orders in the EU: Justifications and Feasibility

Site-blocking Orders in the EU: Justifications and Feasibility Site-blocking Orders in the EU: Justifications and Feasibility Dr Faye Fangfei Wang Senior Lecturer in Law Brunel University, London Abstract The recent CJEU Site-blocking order (Case C-314/12, 27 March

More information

QUT Intellectual property law and innovation research group

QUT Intellectual property law and innovation research group QUT Intellectual property law and innovation research group Submission to Senate Standing Committee on Legal and Constitutional Affairs on the Copyright Amendment (Online Infringement) Bill 2015. April

More information

17. Computer Programs and Back-ups

17. Computer Programs and Back-ups 17. Computer Programs and Back-ups Contents Summary 365 Back-ups and fair use 365 Exceptions for computer programs 369 Summary 17.1 This chapter discusses exceptions to copyright for computer programs

More information

Music and the Internet. A guide for parents and teachers

Music and the Internet. A guide for parents and teachers Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,

More information

OCI Tracker Benchmark Study Deep Dive Analysis Report

OCI Tracker Benchmark Study Deep Dive Analysis Report OCI Tracker Benchmark Study Deep Dive Analysis Report Prepared for Ofcom By Kantar Media www.kantarmedia.com Contents 1. Key findings... 3 2. Research overview... 6 2.1 Background and objectives... 6 3.

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

MARY WANG & OLIVER GU

MARY WANG & OLIVER GU WELCOME Lead Generation System A Simple System to Build Your Online Money Machine MARY WANG & OLIVER GU GoldenVisionTraining.com WELCOME Lead Generation System 2 NOTICE: You Do NOT Have the Right to Reprint

More information

Department of Education & Early Childhood Development: Copyright Guidelines for Victorian Government Schools

Department of Education & Early Childhood Development: Copyright Guidelines for Victorian Government Schools Department of Education & Early Childhood Development: Copyright Guidelines for Victorian Government Schools Contents 1 Introduction: about the Guidelines... 1 2 Intellectual property and copyright...

More information

IP CRIME HIGHLIGHT REPORT 2013/14

IP CRIME HIGHLIGHT REPORT 2013/14 IP CRIME HIGHLIGHT REPORT 2013/14 2 IP CRIME HIGHLIGHT REPORT 2013/14 IP CRIME GROUP The UK IP Crime Group is comprised of representatives from private sector, enforcement agencies and government departments

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

FAQ s on The Center for Copyright Information And Copyright Alert System

FAQ s on The Center for Copyright Information And Copyright Alert System 1. How significant is online content theft? FAQ s on The Center for Copyright Information And Copyright Alert System Content theft is estimated to cost the U.S. economy $58 billion, 373,000 American jobs

More information

ONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT. Prepared For: DEPARTMENT OF COMMUNICATIONS 24 JUNE 2015

ONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT. Prepared For: DEPARTMENT OF COMMUNICATIONS 24 JUNE 2015 ONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT Prepared For: DEPARTMENT OF COMMUNICATIONS 263103193 24 JUNE 2015 TNS Level 1, 181 Miller Street North Sydney NSW 2060 t +61 2 9563 4200

More information

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening.

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening. Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5 Questions to consider before listening 1. Complete the following mindmap: Piracy 2. How much time do you spend on the

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

Without prejudice to the generality of the foregoing paragraph, The Gallery Tattoo Studio does not warrant that:

Without prejudice to the generality of the foregoing paragraph, The Gallery Tattoo Studio does not warrant that: WEBSITE DISCLAIMER No warranties This website is provided as is without any representations or warranties, express or implied. The Gallery Tattoo Studio makes no representations or warranties in relation

More information

Three short case studies

Three short case studies Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.

More information

Changing Business Models in the Creative Industries: The cases of Television, Computer Games and Music. Executive Summary

Changing Business Models in the Creative Industries: The cases of Television, Computer Games and Music. Executive Summary Changing Business Models in the Creative Industries: The cases of Television, Computer Games and Music Executive Summary This is an independent report commissioned by the Intellectual Property Office (IPO).

More information

The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University

The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University Immaculata University ( IU ) takes a strong stand against unlawful distribution of copyrighted music,

More information

A Week in the Life of the Most Popular BitTorrent Swarms

A Week in the Life of the Most Popular BitTorrent Swarms A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University

More information

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2. THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.

More information

Adults media use and attitudes. Report 2016

Adults media use and attitudes. Report 2016 Adults media use and attitudes Report Research Document Publication date: April About this document This report is published as part of our media literacy duties. It provides research that looks at media

More information

In the Technology-Driven, File Sharing Era, Copyright Protection Remains Alive and Well As a Tool to Combat Active Inducements to Infringe

In the Technology-Driven, File Sharing Era, Copyright Protection Remains Alive and Well As a Tool to Combat Active Inducements to Infringe In the Technology-Driven, File Sharing Era, Copyright Protection Remains Alive and Well As a Tool to Combat Active Inducements to Infringe On June 27, 2005, the Supreme Court in Metro-Goldwyn-Mayer Studios

More information

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview

More information

TERMS OF USE AGREEMENT

TERMS OF USE AGREEMENT TERMS OF USE AGREEMENT Last Updated: October 20, 2010 PLEASE READ THIS TERMS CAREFULLY BEFORE ACCESSING THE WEBSITE I GENERAL 1) The Web Portal MEGA BRAZIL TV is a part of the MEGA LOPES, LLC family of

More information

Florida 4-H Consumer Choices 2010-11 Study Topics. Student Guide. Video Game Systems. Introduction and Background

Florida 4-H Consumer Choices 2010-11 Study Topics. Student Guide. Video Game Systems. Introduction and Background Florida 4-H Consumer Choices 2010-11 Study Topics Student Guide Video Game Systems Introduction and Background Buying a video game system is a big decision that can cost hundreds of dollars, so it is important

More information

Websites: Social Networks, Blogs & Usergenerated

Websites: Social Networks, Blogs & Usergenerated INFORMATION SHEET G108v04 December 2014 Websites: Social Networks, Blogs & Usergenerated Media In this information sheet we give an overview of copyright issues that apply when people operating websites,

More information

EU regulatory framework for e-commerce

EU regulatory framework for e-commerce EU regulatory framework for e-commerce WTO Workshop Geneva, 18 th June 2013 Denis Sparas European Commission Directorate General for Internal Market and Services Outline E-commerce Directive E-commerce

More information

A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries

A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries Questions marked with an asterisk * require an answer to be given.

More information

MovieLabs Specification for Enhanced Content Protection Version 1.0

MovieLabs Specification for Enhanced Content Protection Version 1.0 MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8

Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Carl D. Crowell, OSB No. 982049 email: carl@crowell-law.com Drew P. Taylor, OSB 135974 email: drew@crowell-law.com CROWELL LAW P.O. Box 923 Salem,

More information

Website Blocking Injunctions under EU and US Copyright Law

Website Blocking Injunctions under EU and US Copyright Law Website Blocking Injunctions under EU and US Copyright Law Slow Death of the Global Internet or Emergence of the Rule of National Copyright Law? Lukas Feiler, Ph.D., SSCP Stanford-Vienna Transatlantic

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

Commonwealth Consumer Affairs Advisory Council

Commonwealth Consumer Affairs Advisory Council Submission to Commonwealth Consumer Affairs Advisory Council Subject Issues Paper: App purchases by Australian consumers on mobile and handheld devices Date January 31, 2013 Introduction The Interactive

More information

Website Terms of Use

Website Terms of Use 1. OUR TERMS OF USE Website Terms of Use May 2016 1.1 The website and domain (www.lendingworks.co.uk) and each and every page hosted on this domain (the "Website") is owned and operated by Lending Works

More information

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet

More information