The struggle in online copyright enforcement : problems and prospects / Sandra V. I. Schmitz.
2015
K1420.5 .S364 2015 (Map It)
On loan from Cellar, due 02. Nov 2016
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Title
The struggle in online copyright enforcement : problems and prospects / Sandra V. I. Schmitz.
Published
Baden-Baden : Nomos ; Oxford : Hart Publishing, 2015.
Call Number
K1420.5 .S364 2015
Edition
1 edition.
ISBN
9783848724284 (hd. bd.)
3848724286 (hd. bd.)
9781509905669
1509905669
3848724286 (hd. bd.)
9781509905669
1509905669
Description
800 pages ; 23 cm.
Other Standard Identifiers
9783848724284
System Control No.
(OCoLC)938790856
Bibliography, etc. Note
Includes bibliographical references.
Record Appears in
Table of Contents
Introduction
21
A.
Defining Copyright
22
B.
Defining Copyright Enforcement
23
C.
Problem: When Copyright and Technology Clash
24
I.
Ordinary Users Easily Become Infringers
25
II.
Changed Concept of Ownership
27
III.
Do Consumers Understand the System and Vice Versa?
29
D.
Research Topic: Copyright Enforcement on the Internet
30
E.
Macrolevel Approaches to Fight Online Copyright Infringements
32
I.
Unilateral or Multilateral Enforcement: Strengthening Enforcement within and outside of National Borders
33
II.
Multilateral: Proposal for New Trade Agreement ACTA
34
III.
United States: SOPA and PIPA - Initiatives to Strengthen Enforcement Globally
37
IV.
EU: IPRED2
40
V.
Copyright Enforcement in the EU: No Uniform Approach in Member States
42
F.
Limits of the Research
43
G.
Terminology
44
H.
Sources
45
I.
Outline of the Research
45
First Chapter
Legal and Technological Background
49
A.
Status Quo - or How Did We Get to Where We Are Today?
49
I.
Copyright in a Digitalised World
49
1.
Short History of Copyright and Copyright Enforcement in the Offline World
49
2.
Copyright Challenges in an Online Environment
56
a.
Technological Progress
56
b.
Failure of Technological Protection Measures
58
c.
Lack of Understanding Intellectual Property Rights
60
d.
User-Generated Content and a Participatory Internet
65
e.
Necessity to Reform Copyright Law?
68
3.
Scope of Online Copyright Infringement
68
a.
Difficulties in Determining the Scope of Online Copyright Infringements
69
b.
Impact of Illegal Downloads on Sales Figures
74
II.
History of File-Sharing: From Peer-to-Peer Technology to Sharehosting and Streaming
77
1.
Peer-to-Peer File-sharing
77
2.
File Hosting Services
82
3.
USENET
83
4.
Streaming
84
5.
File-Sharing as of Today
85
III.
Existing Model Regimes for Online Intermediary Liability
87
1.
Early Responses to File-Sharing: Legal Action against the Innovators
87
2.
Development of Limited Liability
98
a.
Leading Model Regimes Relating to Intellectual Property
99
aa.
US Digital Millennium Copyright Act
99
bb.
E-Commerce Directive 2000/31/EC
105
cc.
US and EU Regimes: Similarities and Deficits
110
b.
Necessity to Go Beyond Notice and Take down
113
B.
Technological and Legal Challenges of Online Copyright Enforcement
115
I.
Technological Challenges
116
1.
Technological Context
116
a.
Evolution of the Internet in a Nutshell
116
b.
IP Address Allocation
119
c.
Domain Name System
119
2.
Difficulties to Identify an Infringer That Result from Technology as such
120
a.
"On the Internet, Nobody Knows You're a Dog"
121
b.
Dynamic IP Addresses
121
c.
Anonymous Web Browsing
124
3.
Difficulties to Delete or Block Access
126
4.
Role of Technology in the Assessment of Interferences with Fundamental Rights
128
II.
Legal Challenges: The Fundamental Rights at Stake
129
1.
Sources of Fundamental Rights
130
a.
International Level: The International Bill of Human Rights
131
aa.
Universal Declaration of Human Rights
132
bb.
International Covenant on Civil and Political Rights and the International Covenant on Economic, Social and Cultural Rights
132
b.
European Union Level: The European Convention for the Protection of Human Rights and Fundamental Freedoms, and the Charter of Fundamental Rights of the European Union
133
aa.
European Convention for the Protection of Human Rights and Fundamental Freedoms
134
bb.
Charter of Fundamental Rights of the European Union
136
cc.
Relationship between the Convention and the Charter
137
2.
Fundamental Rights of User at Stake
141
a.
Freedom of Expression in the Form of Freedom to Seek, Impart and Receive Information
141
aa.
Freedom of Expression in General
141
bb.
Right to Receive and Seek Information
145
cc.
Right to Impart Information
148
dd.
Right to Internet Access
149
ee.
Justification of Interference
152
b.
Privacy Rights
156
aa.
Privacy Rights in General
157
bb.
Right to Respect for Family and Private Life
159
cc.
Right to the Confidentiality of Communications
163
dd.
Right to Protection of Personal Data
165
ee.
Justification of Interference
168
c.
Procedural Rights
171
aa.
Right to a Fair Trial
171
bb.
Presumption of Innocence and Right of Defence
175
cc.
Principles of Legality and Proportionality of Criminal Offences and Penalties
177
dd.
Ne Bis in Idem Rule
180
3.
Fundamental Rights of Internet Service Providers at Stake
181
a.
Freedom to Conduct Business
181
b.
Freedom of Expression
184
4.
Fundamental Rights of the Intellectual Property Rights Owners
184
a.
Right to Intellectual Property
185
b.
Right to an Effective Remedy
190
5.
In Brief: The Balancing of Fundamental Rights
191
Second Chapter
User-Targeted Responses
195
A.
Peer-to-Peer File-Sharer as the Addressee of Enforcement Measures
195
I.
Idea of Enforcement in Peer-to-Peer File-Sharing Networks
195
II.
Peer-to-Peer File-Sharing: Scope, Specific Functioning and Consequences
197
1.
Peer-to-Peer File-Sharing Networks in General
198
2.
Third Generation of Peer-to-Peer File Sharing Networks
202
3.
Peer-to-Peer File-Sharing in Numbers
206
4.
Copyright-Infringing Act
207
a.
Uploading Regularly Goes Along with Downloading
208
b.
Parts of a Protected Work Enjoy Protection
209
c.
Non-Applicability of the Private Copying Exception
214
5.
Explaining the Demand for Enforcement Schemes Focussing on Peer-to-Peer Networks
216
III.
Technological Challenges in Detecting and Identifying File-Sharers
217
1.
In General: Collecting Digital Evidence
218
2.
Necessary Evidence
222
3.
Identifiable
222
a.
Copyright Infringement
223
b.
IP Address
225
4.
Identifier
228
a.
How Data Is Harvested
228
b.
Reliability of Data Harvesting/Evidence
231
aa.
Manipulation of File-Sharing Clients
232
bb.
Mistimed and Mismatched Logs
234
cc.
Misreporting by Trackers
235
dd.
Problems Belonging to the Sphere of the Subscriber: Unsecured Computers and Wi-Fi Connections
235
c.
Evasion of Detection: Migration to (More) Secure Peer-to-Peer Networks
236
aa.
Anonymous Peer-to-Peer Networks
236
bb.
Friends-to-Friends Networks
238
cc.
VPN Clients, Proxies and TOR
239
d.
Burden of Proof
240
IV.
Resume
242
B.
National Enforcement Measures Against Users
243
I.
Legal Framework under European Union Law
243
1.
Copyright Law Providing for Remedies against and Sanctions of Individual End-Users
244
a.
IPR Enforcement Directive 2004/48/EC
245
b.
Information Society Directive 2001/29/EC
248
c.
EU Telecoms Reform Package
251
d.
Rome II Regulation
254
2.
Data Protection Law and Information Rights
255
a.
Data Protection Directive 95/46/EC
255
b.
E-Privacy Directive 2002/58/EC
258
c.
Data Retention Directive 2006/24/EC
260
aa.
Scope of Application of the Data Retention Directive
261
bb.
Declaration of the Invalidity of the Data Retention Directive: Joined cases C-293/12 and C-594/12 Digital Rights Ireland and Seitlinger and Others
263
3.
Liability Exemption for Access Providers under the E- Commerce Directive 2000/31
266
4.
Relevant Jurisprudence of the CJEU
268
a.
Disclosure of Traffic Data: C-275/06 Promusicae
268
b.
Disclosure of Traffic Data to Third Parties: C-557/07 LSG-Gesellschaft zur Wahrnehmung von Leistungsschutzrechten
270
c.
Legitimacy of National Disclosure Legislation: C-461/10 Bonnier Audio v Perfect Communication Sweden
272
d.
Prohibition of General Monitoring Duty: C-70/10 Scarlet Extended v SABAM
275
e.
Practical Impact of the Decisions
276
II.
Copyright Enforcement in Member States through Criminal Sanctions: Graduated Response Schemes
277
1.
France: the Graduated Response Scheme of the HADOPI Laws
279
a.
Copyright Enforcement in France in General
279
aa.
Origin of Copyright in France
279
bb.
Private Copying Exception
281
cc.
Enforcement of Intellectual Property Rights upon Initiative of the Rights-Holder
283
b.
Setting the Framework for a Graduated Response Scheme
284
aa.
Loi Relative au Droit d'Auteur et aux Droits Voisins dans la Société de l'Information - Loi DADVSI
285
bb.
Loi Favorisant la Diffusion et la Protection de la Création sur Internet - Loi HADOPI I
287
cc.
Loi Relative à la Protection Pénale de la Propriété Littéraire et Artistique sur Internet - Loi HADOPI II
294
dd.
Summary
297
c.
Outline and Functioning of the Current Graduated Response Scheme
297
aa.
Missions and Powers of HADOPI
298
bb.
How the Graduated Response Scheme Works
299
1.
Gathering of Information of Infringements
299
2.
Warning Procedure
303
3.
Consequences: Referral to the Prosecutor's Office and Criminal Proceedings
306
d.
Status quo
312
aa.
Graduated Response Scheme in Numbers
312
bb.
Unsatisfying Results of HADOPI
315
e.
Sustainable Model Regime? The Order of 8 July 2013 and the Lescure Rapport
319
2.
UK: The Graduated Response Scheme of the DEA 2010
323
a.
Copyright Enforcement in the UK in General
324
aa.
Origins of Copyright in the UK
324
bb.
Fair Dealing Exception
325
cc.
Enforcement of IP Rights upon Initiative of the Rights-Holder
325
b.
Paving the Way for a Future Graduated Response Scheme
327
aa.
Digital Britain Report
328
bb.
Digital Economy Act
329
cc.
Regulatory Codes that Accompany the Digital Economy Act
333
1.
Online Infringement of Copyright Initial Obligations Code
333
2.
Online Infringement of Copyright (Initial Obligations) (Sharing of Costs) Order
336
3.
Technical Obligations Code
336
dd.
Summary
337
c.
Outline and Functioning of the Graduated Response Scheme
337
aa.
Role of the Ofcom
338
bb.
How the Graduated Response Scheme (should) Work
338
1.
Gathering of Information of Infringements
339
2.
Warnings: Applicant, Content and Proceedings
341
3.
Consequences
345
d.
Status Quo
347
e.
DEA's Future in Limbo
351
3.
Graduated Response Schemes: Concerns Relating to Technology and Fundamental Rights
356
a.
Dealing with Technological Matters
356
aa.
Identifiable
357
1.
Determination of a Copyright Infringement
357
2.
Fact that IP Address Identification Does Not Necessarily Identify the Actual Infringer
358
bb.
Identifier
361
1.
Concerns in Relation to Reliability of Data
361
2.
Responses to Evasion of Detection
362
cc.
Enforcement of Internet Suspension or Restriction
362
dd.
No Prescribed Standard for Securing Internet Access
363
b.
Compliance of the Graduated Response Schemes With Secondary EU Law
364
aa.
Compliance of Graduated Response Schemes with Secondary EU Law in General
364
bb.
Compliance of the Data Processing with Secondary EU Law
369
1.
Questions of Applicability of Data Protection Law: IP Address as Personal Data
369
2.
Processing of Data
379
3.
Disclosure of Personal Data
385
4.
Processing of Sensitive Data
386
cc.
Compliance of Internet Suspension or Restriction Orders with Secondary EU Law
387
dd.
Compliance of Cost-Sharing with Secondary EU Law
389
c.
Conformity with the Fundamental Rights of Internet Users
391
aa.
Sanctions Interfering with a User's Right to Freedom to Expression in the Form of Freedom to Seek, Impart and Receive Information
391
1.
Interference
393
2.
Justification of Interference
395
bb.
Collecting and Processing of Communications and Personal Data Interfering with Privacy Rights
399
1.
Interference with the Right to Respect for Family and Private Life
399
2.
Interference with the Right to the Confidentiality of Communications
401
3.
Interference with the Right to the Protection of Personal Data
403
4.
Justification
404
5.
In Specific: Data Retention Requirements for Access Providers
409
cc.
Interferences with Procedural Rights
410
1.
Right to a Fair Trial
411
2.
Presumption of Innocence
414
3.
Principles of Legality and Proportionality of Criminal Offences and Penalties
415
d.
Conformity with the Fundamental Rights of Internet Service Providers
416
aa.
Freedom to Conduct Business of Traditional Access Providers
416
bb.
Freedom to Conduct Business of Providers of Free Wi-Fi Services
418
cc.
Freedom to Conduct Business of Commercial Wi-Fi Operators
420
dd.
UK Graduated Response Scheme Violates the Rights of Access Providers
420
e.
Achieving a Fair Balance of the Contravening Interests
421
III.
Copyright Enforcement in Member States Through Private Litigation
425
1.
Germany: Abmahnungen
427
a.
Legal Framework for Private Copyright Enforcement in Germany
429
aa.
Liability for Copyright Infringements
429
1.
Direct, Contributory and Vicarious Liability
430
2.
Storerhaftung: Liability as a Disturber
432
3.
Application of the Liability Concepts to the Subscriber of an IP Address
435
bb.
Remedies for Copyright Infringement
441
1.
Damages
442
2.
Cease and Desist
443
cc.
Information Rights
445
dd.
Abmahnung
446
b.
Outline and Functioning of Pre-Litigation Settlement
448
aa.
Gathering of Information on Infringements
448
bb.
Disclosure Orders
449
cc.
Pre-Litigation Correspondence: Request to Cease and Desist and Claim for Damages
451
c.
Status Quo: How Abmahungen (almost) Became a Profitable Tool for Rights-holders
455
aa.
Information Requests Are not Thoroughly Assessed
456
bb.
Narrow Interpretation of "Non-Complex" Cases
460
cc.
Optimisation of Pre-Litigation Correspondence
460
dd.
False Allegations - The Redtube.com Case
463
d.
Steps Taken to Prevent that "Piracy Turns into Profit"
464
2.
UK: Out of Court Settlement by Pre-Litigation Letters: A fundamentally Different Approach?
468
a.
In Brief: Legal Framework for Private Copyright Enforcement in the UK
469
aa.
Service of Disclosure Orders in the UK - Right to Information and Norwich Pharmacal orders
469
bb.
Remedies for Copyright Infringement in the UK
474
b.
Lessons Learned from Germany: The Phenomenon of Cease and Desist Letters in the UK and Speculative Invoicing
476
aa.
Introducing the Antipiracy Industry in the UK
476
bb.
History of Speculative Invoicing in the UK
478
cc.
Putting the Rule to the Test: Piracy Cannot Be Turned into Profit
486
1.
Golden Eye v Telefonica UK: Facts of the Case
486
2.
Conditions for Granting Norwich Pharmacal Relief in Relation to Peer-to-Peer File-Sharing Cases and Speculative Invoicing
489
3.
Establishment of Genuine Intent to Seek Redress for Arguable Wrongs
490
4.
Disclosure Order Must be Necessary to Pursue Redress
492
5.
Proportionality of a Disclosure Order
492
6.
Control of the litigation
495
dd.
Summary
495
ee.
UK Application Departs from the German Approach
497
3.
Pre-Litigation Letters: Concerns Relating to Technology and Fundamental Rights
498
a.
Dealing with Technological Matters
499
aa.
IP Address Subscribers Must Not be Equalled with Actual Infringers
500
bb.
Obligations to Secure a Wi-Fi Connection under Private Law
501
cc.
Concerns in Relation to Reliability of Data
502
b.
Compliance of Information Disclosure with Secondary EU Law
503
c.
Conformity with the Fundamental Rights of Internet Users
506
aa.
Collecting of Personal Data Interfering with Privacy Rights
506
bb.
Disclosure of Personal Data Interfering with Privacy Rights
507
cc.
Right to Fair Trial of Alleged Infringers
512
d.
Achieving a Fair Balance of the Contravening Interests
513
Third Chapter
Content- or Intermediary-Targeted Responses
517
A.
Online Intermediaries as the Addressees of Enforcement Measures
517
I.
Idea of Enforcement via Online Intermediaries
517
II.
Services and Activities of Online Intermediaries that Are Targeted: Scope, Specific Functioning and Consequences
524
1.
File-Hosting Services, Indexing Sites and Link Directories
525
2.
Streaming
528
3.
File Hosting and Streaming Websites in Numbers
532
4.
Copyright-Infringing Act
535
a.
Legality of the Provision of File Hosting Services
535
b.
Illegality of Making Available Links to the General Public
536
c.
(Il)Legality of Unauthorised Streaming
536
d.
(Il)Legality of Consumption of Streams
540
5.
Reasons for Targeting these Services
543
III.
Technological Challenges
546
1.
Filtering and Blocking Techniques
546
a.
Internet Protocol Address Blocking
547
b.
Domain Name System Name Blocking
548
c.
Uniform Resource Locator Site Blocking
551
d.
Deep Packet Inspection-Based Blocking
552
e.
Hybrid Systems - The Example of CleanFeed
553
2.
Circumvention Tools
556
a.
Circumvention Tools available to Website Operators
557
aa.
Change of IP Address and/or Additional Domain Names
557
bb.
Proxy Services, Anonymising Services and Virtual Private Networking
558
cc.
Mirroring
559
b.
Circumvention Tools available to Users
559
aa.
Encryption
560
bb.
Proxy Services, Anonymising Services and Virtual Private Networking
560
c.
Efficiency of Blocking
562
IV.
Resume
563
B.
Enforcement Measures Directed at Intermediaries
565
I.
EU Legal Framework
566
1.
Liability of Intermediaries in General: The E- Commerce Directive 2000/31
567
2.
Copyright Law Providing for Injunctions
569
a.
Information Society Directive 2001/29/EC
570
b.
IPR Enforcement Directive 2004/48/EC
571
c.
Data Protection Framework: E-Privacy Directive 2002/58
574
3.
Relevant Jurisprudence of the CJEU
574
a.
Injunctions in General: Case C-324/09 L'Oréal v eBay
575
b.
Injunctions against Access Providers: Case C-70/10 Scarlet Extended v SABAM
581
c.
Injunctions against Host Providers: Case C-360/10 SABAM v Netlog
583
d.
Injunctions Specifying the Means of Access Blocking: Case C-314/12 UPC Telekabel Wien v Constantin Film Verleih
585
e.
Summary of the Case Law of the CJEU
589
4.
Jurisprudence of the ECtHR
592
a.
Access Blocking: Yildirim v Turkey
592
b.
Criminal Liability of Intermediaries: Neij and Sunde Kolmisoppi v Sweden
594
c.
Civil Liability of Intermediaries: Delfi v Estonia
597
d.
Summary of the Case-Law of the ECtHR
600
II.
Enforcement upon Initiative of Administrative Authorities
602
1.
France: No Competence of Administrative Authorities to Order Access Blocking to Illegal Materials
602
2.
Germany: Regional Initiatives and Legislative Attempts to Provide for Access Blocking Have Limited Success
606
a.
"Düsseldorfer Sperrverfügungen"
606
b.
Fate of the "Zugangserschwerungsgesetz"
611
c.
No Positive Future for Access Blocking by Administrative Authorities in Germany
614
3.
UK: The Fate of the Website Blocking Provisions of the DEA 2010
616
a.
Legal Framework foreseen in the DEA 2010
616
b.
Sections 17 and 18 of the DEA 2010: Unnecessary?
617
4.
Resume: No Blocking of Copyright Infringing Content to Be Ordered by Administrative Authorities
620
III.
Enforcement upon Initiative of the Rights-holders via Access Providers
621
1.
UK: Injunctions to Block Access against Access Providers
622
a.
Legal Framework: Section 97A CDPA 1988
622
b.
Setting the Precedent: Twentieth Century Fox v BT
622
aa.
Excursus: From NewzBinl (Twentieth Century Fox v NewzBin) to NewzBin2 (Twentieth Century Fox v BT)
623
bb.
Injunctions against BT in NewzBin2
628
c.
Applying the Precedent
631
d.
Injunctions under Section 97A CDPA 1988: A Pyrrhic Victory for Copyright Owners
635
2.
Germany: No Injunctions against Access Providers
639
3.
Access Blocking by Access Providers: Concerns relating to Technology and Fundamental Rights
643
a.
Technological Concerns in Relation to Access Blocking
643
b.
Compliance with Secondary EU Law
646
c.
Conformity with Fundamental Rights of Internet Users
647
aa.
Interference with Users' Rights to Seek, Receive and Impart Information
647
bb.
Interference with the Users' Privacy Rights
653
d.
Conformity with Fundamental Rights of Access Providers
654
e.
Striking a Fair Balance between the Contravening Interests
657
IV.
Enforcement upon Initiative of the Rights-Holders via Host Providers
664
1.
Germany: Obligations of Host Providers to Prevent Similar Infringements
665
a.
Legal Framework
665
aa.
Telemediengesetz
666
bb.
Störerhaftung
667
cc.
Scope of Monitoring Duties of Host Providers
670
b.
Liability of File-Hosting Services in General
676
c.
Notice and Stay-Down: Scope of Specific Monitoring Duties of File-Hosting Services
678
d.
Extensive Monitoring in Practice
684
2.
France
688
a.
Legal Framework: Loi pour la confiance dans l'économie numerique
688
b.
Scope of Any Blocking Obligation: Take down and Stay Down?
692
c.
Limits of Notice and Take down and the Shift to Content Blocking by Search Engines
696
3.
Host Provider Obligations: Concerns Relating to Technology and Fundamental Rights
700
a.
Dealing with Technological Matters: The Difficulties to Identify Similar or Identical Infringements
700
b.
Compliance with Secondary EU Law
702
c.
Conformity with Fundamental Rights of Host Providers
705
aa.
Freedom to Pursue Business and Property Rights
705
bb.
Right to Impart Information Created by Third Parties
708
d.
Extensive Monitoring and a Fair Balance of Rights
709
General Conclusions
719
A.
Problems Encountered in Copyright Enforcement
720
I.
Copyright Enforcement on the Internet is a Struggle to Find the Right Target
720
II.
Copyright Enforcement on the Internet Puts Disproportionate Weight on Intellectual Property Rights
722
III.
Copyright Enforcement Discourages Innovation and Creativity
725
IV.
Copyright Enforcement on the Internet Targets End-Users Rather than Commercial Infringers
726
V.
No Evidence of Effectiveness of Current Initiatives
728
VI.
Access Blocking is Playing Cat and Mouse
729
B.
Prospects
730
I.
German Cease and Desist Letter Regime: Not so Bad as it May Seem
730
II.
Search Engines as Law Enforcement Officers: Limiting Visibility of Illegal Materials
732
III.
Promising Alternative: Follow the Money
733
IV.
In Parallel: Protecting Copyright and Users
737
1.
In Specific: Remove Obstacles to the Provision of Cross-Border Digital Content Services
738
2.
In Specific: Education of Users and Promotion of Legal Offers
741
V.
Exciting Time with Pitfalls
744
List of References
747
Table of Cases
789