Content Regulation: Protecting Copyright in the Online Environment Gavin Sutter CCLS, Queen Mary,...
-
Upload
erica-mason -
Category
Documents
-
view
219 -
download
0
Transcript of Content Regulation: Protecting Copyright in the Online Environment Gavin Sutter CCLS, Queen Mary,...
Content Regulation:Content Regulation:Protecting Copyright in the Online Protecting Copyright in the Online
EnvironmentEnvironment
Gavin Sutter
CCLS, Queen Mary, University of London
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Copyright in the Online Copyright in the Online EnvironmentEnvironment
Protection of Copyright on the web Copyright online – the key issues
– Copyright in online content
Online infringement– Linking, framing, peer to peer
Technological Protection of Copyright works– Technologies available– Regulation of those technologies
Is the internet the end of copyright? Alternatives to copyright
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Copyright OnlineCopyright Online
Copyright – What rights does copyright confer?– Right to control copying subject to certain restrictions
Application of copyright to online content– Copyright in text, code, artwork, sound files
Criminal Law– Copyright and alternative laws
Webpage as a compilation of IP Rights– Copyright, TM, databases…– Sui Generis database protection, e.g. web page
EU Directive 96/9/EC on the legal protection of databases
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Protection of Copyright OnlineProtection of Copyright Online
Interests in protection– Rightsholders– Commercial assets in digital form
Internet: threat to copyright Licensing and rights of use Protection in the Courts
– Civil enforcement: litigation– Criminal copyright infringement
Technical protection of copyright works
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Online InfringementOnline Infringement
Ease of online infringements– Primary and secondary infringement
Prevailing internet culture– Shareware, freeware, opensource– Perception online copying is ‘ok’
Nature of computer / online technology– Copying an integral part of use
E.g. storage memory E.g. email user user E.g. accessing web pages online and system caching
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
International Legislative International Legislative ResponseResponse
World Intellectual Property Organisation Treaties (1996)– Copyright Treaty and the Performances and Phonograms
Treaty
US: Digital Millennium Copyright Act (1998)
EU: Directive on Copyright in the Information Society– rights of creators & producers
making available to the public (art. 3) no exhaustion for on-line services (recital 29)
– exemptions & limitations (art. 5) “for the private use of natural person”
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Licensing IssuesLicensing Issues
Express Licensing– Distribution online
E.g. New York Times v Tasini (2001)– ‘click-wrap’ licensing
Valid and enforceable?– Uniform Computer Information Transactions Act (1999),
s. 210 - ‘Massmarket transaction’– e.g. Ticketmaster Corp. v. Tickets.com, Inc., (2000) &
Register.com vVerio (2000) statutory limitations on licence terms
– ‘open source’ licensing E.g. GNU General Public Licence (GPL)
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Licensing Issues IILicensing Issues II
Implied Licence– Nature of the medium
Web, Usenet…
– Scope of licence E.g. Trumpet Software Pty Ltd. v. OzEmail Pty Ltd [1996]
– not to adapt– not to remove notification of ownership & licence terms
– ‘spidering’ creating derivative works Ticketmaster Corp. v. Tickets.com, Inc., (2000), eBay v Bidders
Edge (2000) tort of trespass to goods?
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Usage RightsUsage Rights
Notification of Ownership– Required formalities– Evidential presumptions
E.g. CDPA 1988, s.104
– Public Domain www.creativecommons.org
Permitted Acts– E.g. fair dealing / fair use
Types of activity, e.g. private study Types of defendant, e.g. library
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Peer to Peer Networks & Peer to Peer Networks & Copyright InfringementCopyright Infringement
Online file-sharing of copyright works– What is a “peer to peer” (p2p) network?
MP3s & infringement– What is an mp3?– Scale of the problem:– Google.com search for “mp3”:
30/01/02: 17.1 million hits 15/01/03: 30.3 million hits 28/01/04: 49.3 million hits 08/12/04: 200 million hits 19/01/06: 235 million hits 22/11/06: 741 million hits
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu Centralised (e.g. Napster) Decentralised (e.g. Gnutella)
Peer to Peer Peer to Peer NetworksNetworks
Index Server
Client/Servers Client/Servers
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
P2P in the courtsP2P in the courts
A&M Records, Inc & ors v Napster, Inc (2001)– contributory copyright infringement
• receives knowledge of specific infringing files• knows that such files are available on the system• fails to act to prevent distribution
– vicarious copyright infringement• “has the right and ability to supervise the infringing activity
and also has a direct financial interest in such activities.”
– Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417 (1984): the ‘Betamax’ case
• ‘space-shifting’ or ‘time-shifting’
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
P2P in the Courts IIP2P in the Courts II
Vereniging Buma & Stichting Stemra –v-
KaZaA B.V. – Amsterdam Court of Appeal 28 March 2002– Decentralised p2p network– Minimal centralised service– ‘notice & take-down’ and ability to terminate
accounts– Distinction KaZaA & Napster systems
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
P2P in the courts IIIP2P in the courts III US cases on decentralised p2p, e.g.:
– US: MGM v Grokster 2003 US District Ct for Central District of California, April 2003 “Grokster…[is] not significantly different from companies that sell home videos
or copy machines, both of which can be and are used to infringe copyrights.” Morpheus & KaZaA
2003 – RIAA sues individual infringers– 382 individuals subject of RIAA suits by December 2003– Late 2003 – BPI indicates it is considering same policy– January 26th 2004 – IFPI announces its support for this approach– By July 2006 RIAA has sued “over 20,000” (EFF.org)
October 2004: BPI announces legal action against 28 UK File Sharers– Using KaZaA, Imesh, Grokster, Bearshare and WinMX networks. – Coincides with IFPI Announcement of of 457 new legal actions against
illegal file sharers across six European countries
– BPI’s parental awareness campaign http://www.childnet-int.org/music/
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
MGM v GroksterMGM v Grokster
MGM v Grokster in US Supreme Court – Case No. 04-480, 27 June 2005– Distributors of P2P system liable for copyright
infringement– A radical departure from general trend?– Reference to DRMS
UK: Play Louder MSP– http://www.playloudermsp.com– Broadband subscription to include ‘licence fee’ for
sharing music– Future of this business model?
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Linking & Web PagesLinking & Web Pages
Uniform Resource Locators (URLs)– e.g. http://www.ccls.edu/itlaw– ‘inline link’ for images: <IMG SRC...>
Linking to infringing works– authorising infringement
Universal City Studios, Inc and others v Corley and others SD Cal., August 17, 2000
Links as protected items– Shetland Times v Wills [1997] FSR 604
as a literary work, as a compilation as an item in a cable programme service
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Linking & Web Pages IILinking & Web Pages II ‘Deep links’
– SNC Havas Numerique & SA Cadres On Line v SA Kelijob (2000)
copyright and database infringement
– StepStone v Ofir (2001) database protection
– Perfect 10 v Google – “stolen content sites”
Creating associations– frames
Washington Post Co. v. Total News Inc (1997)
– Meta-tags & ‘wordstuffing’ Road Tech Computer Systems Ltd. v Mandata (May 2000)
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Linking AgreementsLinking Agreements
Copyright & trademark protection– define “prohibited uses”
Validity & enforceability of contract– contract formation issues
Uniform Computer Information Transactions
Act– s. 611 re: access contracts
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Criminal Copyright ICriminal Copyright I UK
– CDPA, s. 107, for making or dealing with infringing articles Copyright, etc. and Trade Marks (Offences and Enforcement)
Act 2002 Marks & Spencer v Craig Cottrell & ors (2001)
US– United States v LaMaccia 871 F. Supp. 535 (D. Mass. 1994)
– No Electronic Theft Act 1997 18 U.S.C § 2319: 5 years imprisonment, $250,000
– Digital Millennium Copyright Act 1998 e.g. Dmitry Sklyarov
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Criminal Copyright IICriminal Copyright II
Council of Europe Convention on Cybercrime (2001)– Article 10
“..where such acts are committed wilfully, on a commercial scale and by means of a computer system.”
EU Directive on Copyright in the Information Society– acts of circumvention– circumvention devices
art. 6(4) making available “the means of benefiting from that exception or limitation”
DMCA (17 U.S.C. § 1201) – e.g. non-profit libraries, archives, educational institutions, law enforcement, encryption
research, filter software
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Copyright in the online world…Copyright in the online world…
…a spent force?
Conceptual difficulties
Scale of online violations
Challenge of detecting and ending violations
How to protect copyright online?– Traditional litigation proceedings….
– …or technological copy-protection mechanisms?
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Traditional legal protection: the Traditional legal protection: the drawbacksdrawbacks
Litigation can be a s-l-o-w process– c/f speed of change in the online world
Reactive, not proactive– ‘Prevention is better than cure’?
Effectiveness of traditional remedies online questionable– Mirror sites– The ‘Paul & Karla’ effect– Yahoo! before the French & US Courts– Time and Expense
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Copy ProtectionCopy Protection
NOT the same thing as copy-prevention– UK European Directive on Copyright
(Computer Programs) Regulations 1992– Copyright, Designs & Patents Act 1988, as
amended Section 50A(1) Section 296A(1)(b)
– CDPA General ‘Fair Use’ provisions Private study, criticism & review, etc..
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu Copy Protection TechnologiesCopy Protection Technologies
Dongles
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu Copy Protection TechnologiesCopy Protection Technologies
Smartcards
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu Copy-protection TechnologiesCopy-protection Technologies
Smartcards
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu Copy-protection TechnologiesCopy-protection Technologies
Smartcards
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Copy-protection TechnologiesCopy-protection Technologies
Serial Copy Management System (SCMS)
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu Copy-protection TechnologiesCopy-protection Technologies
Limitation of hardware systems
Password & Serial Number Protection
–Very common online
–Flexible
–Simple – but insecure?
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Copy-protection TechnologiesCopy-protection Technologies
Labelling Techniques Digital Watermarking:
– NOT a means of controlling copying
– The ‘evidential gap’ in copyright law
– Provides evidence of authorship / origin
– Can be used to prove integrity of whole work
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Copy-protection TechnologiesCopy-protection Technologies
Steganography
‘Hides’ data within a work
Similar to watermarking but
imperceptible
Can be used to provide evidence of:– Authorship
– Integrity of whole work
– Legitimate user
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Copy-protection TechnologiesCopy-protection TechnologiesCan be employed to ‘keep
tabs’ on licensee www.digimarc.com :
the MarcSpider
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Copyright-protection Copyright-protection TechnologiesTechnologies
Can be used to provide evidence of purchaser…and trace infringement
– www.twintone.com
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu Copy-protection TechnologiesCopy-protection Technologies
Watermarking & Steganography
Do NOT restrict or control copying
Evidential use only
Potential deterrent to infringers?
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu Copy-protection TechnologiesCopy-protection Technologies
Encryption “Secure” transmission of a copyright work to the
intended recipient DVDs & ‘Copy-Scramble System’ Not unbreakable: makes infringement impractical,
not impossible Policy question: should such use of encryption
properly be governed by copyright or encryption legislation?
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Copy-protection TechnologiesCopy-protection Technologies
Digital Rights Management systems Anticipated increase in flow of IP online How to best protect IPR? None of technologies already discussed offers complete
online protection What are DRMs?
– Wikipaedia definition http://en.wikipedia.org/wiki/Digital_Rights_Management
– Windows Media DRM http://www.microsoft.com/windows/windowsmedia/drm/
– Authena open source DRM http://authena.org/
ICC
L @
CC
LS.e
duIC
CL
@ C
CLS
.edu
Forthcoming AttractionsForthcoming Attractions The Copyright Directive
– Article 6: Legal protections for copyright-protection technologies
– Artilce 7: Obligations concerning rights-management information
– UK Implementation of the Copyright Directive
Consequences of Breach of Copyright
Copyright –v- Freedom of Expression?
Alternative approaches to copyright