P2P and the Future of Private Copying Peter K

Total Page:16

File Type:pdf, Size:1020Kb

P2P and the Future of Private Copying Peter K Texas A&M University School of Law Texas A&M Law Scholarship Faculty Scholarship 2005 P2P and the Future of Private Copying Peter K. Yu [email protected] Follow this and additional works at: https://scholarship.law.tamu.edu/facscholar Part of the Intellectual Property Law Commons, and the Internet Law Commons Recommended Citation Peter K. Yu, P2P and the Future of Private Copying, 76 U. Colo. L. Rev. 653 (2005). Available at: https://scholarship.law.tamu.edu/facscholar/383 This Article is brought to you for free and open access by Texas A&M Law Scholarship. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Texas A&M Law Scholarship. For more information, please contact [email protected]. P2P AND THE FUTURE OF PRIVATE COPYING PETER K. Yu* TABLE OF CONTENTS INTRODUCTION ..................................................................................... 654 I. THE 2003 COPYRIGHT WARS ......................................................... 658 I. THE FUTURE P2P FILE-SHARING WARS ......................................... 676 A . Dom estic Challenges ............................................................... 676 1. Proliferation of New P2P Technologies ............................ 676 2. Transnational Nature of the Future Copyright Wars ......... 677 3. Increased Political Alienation of the Recording Industry. 679 4. Counterattacks and Setbacks ............................................. 685 B. InternationalChallenges ......................................................... 686 1. Heightened Tension Between the United States and Less Developed Countries ................................................. 686 2. Severe Criticisms of U.S. Copyright Policy in Foreign C ountries ........................................................................... 690 3. Diversion of Public Attention from Domestic Copyright Issues ................................................................................. 693 C. P2PFile-Sharing Wars in OtherIndustries ............................ 695 III. EIGHT MODEST PROPOSALS ........................................................... 698 A . Mass Licensing ........................................................................ 698 * Copyright © 2005 Peter K. Yu. All Rights Reserved. Associate Professor of Law & Director, Intellectual Property & Communications Law Program, Michigan State University College of Law; Adjunct Professor of Telecommunication, Information Studies and Media & Faculty Associate, James H. and Mary B. Quello Center for Telecommunication Management & Law, College of Communication Arts & Sciences, Michigan State University. Earlier ver- sions of this Article were presented in the Sixth FuturTech Conference at the University of Michigan Business School, the ITU Telecom Asia 2004 Forum organized by the International Telecommunication Union in Busan, Korea, the Fifth Annual Quello Communications Policy & Law Symposium in Washington, D.C., the LawTechTalk Series at the University of Hong Kong Faculty of Law, and the First Annual Intellectual Property and Communications Law and Policy Scholars Roundtable at Michigan State University College of Law. The article was also delivered as a public lecture for the Intellectual Property Department of the Government of Hong Kong Special Administrative Region. The Author thanks the participants of these events, in particular Adam Candeub, Cindy Cohn, Shubha Ghosh, Debora Halbert, Robert Heverly, Matt Jackson, Jay Kesan, Michael Landau, Lyrissa Lidsky, Michael Madison, Adam Mossoff, Susan Scafidi, Mitch Singer, and Katherine Strandburg, for their valuable comments and suggestions. He also expresses his appreciation and gratitude to Alexander Kanous and Jade Zuege for excellent research and editorial assistance and Richard Miller and the staff of the UNIVERSITY OF COLORADO LAW REVIEW for their thoughtful and thorough editing. UNIVERSITY OF COLORADO LAW REVIEW (Vol. 76 B. Compulsory Licensing ............................................................. 704 C. Voluntary Collective Licensing................................................ 712 D . Voluntary Contribution............................................................ 715 E. Technological Protection......................................................... 721 F. Copyright Law Revision ........................................................... 727 G. Administrative Dispute Resolution Proceeding....................... 730 H. Alternative Compensation........................................................ 732 I. The Argument for a Range of Solutions ................................... 739 IV. RETHINKING THE UNAUTHORIZED COPYING PROBLEM ................. 744 A. The Battle Between Humans and Machines............................. 746 B. Imaginary World War III ......................................................... 750 C. The Conquest of Generation Y ................................................. 756 C ON CLU SION ......................................................................................... 763 INTRODUCTION Two thousand and three was the year of recording industry litiga- tion. For the first time, the industry filed lawsuits against individual end- users whom it suspected of illegally trading music. In April, the major record labels filed high-profile lawsuits against four college students who ran file-sharing engines that allowed fellow students to download copy- righted songs. 1 Five months later, the Recording Industry Association of America ("RIAA"), the trade group that represents the five major labels and other smaller member companies, launched frill-fledged battles against individuals suspected of swapping music without authorization via peer-to-peer ("P2P") networks, 2 such as Grokster, iMesh, KaZaA, and Morpheus. Hundreds of lawsuits were filed,3 thousands of subpoe- nas were issued, 4 and countless people-innocent or otherwise- received the trade group's notorious cease-and-desist letters. 5 These 1. Frank Ahrens, 4 Students Sued over Music Sites, WASH. POST, Apr. 4, 2003, at El; Jon Healey, Students Hit with Song PiracyLawsuits, L.A. TIMES, Apr. 4, 2003, at C 1. 2. P2P networks are computer networks that allow individual end-users to communicate with each other without using a centralized server. For a brief discussion of the operation of P2P networks, see Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 380 F.3d 1154, 1158-60 (9th Cir.), cert. granted, 125 S. Ct. 686 (2004). See generally PEER-TO-PEER: HARNESSING THE BENEFITS OF A DISRUPTIVE TECHNOLOGY (Andy Oram ed., 2001) [herein- after PEER-TO-PEER]. 3. Amy Harmon, 261 Lawsuits Filed on Music Sharing, N.Y. TIMES, Sept. 9, 2003, at Al [hereinafter Harmon, 261 Lawsuits Filed]. 4. SBC Online Music Case Moved to Washington, L.A. TIMES, Dec. 2, 2003, at C3 (re- porting that the RIAA has issued thousands of subpoenas since spring 2003). 5. Declan McCullagh, RIAA Apologizes for Erroneous Letters, CNET NEWS.COM (May 13, 2003), at http://news.com.com/2100-1025-1001319.html; see also Declan McCullagh; RIAA Apologizes for Threatening Letter, CNET NEWS.COM (May 12, 2003), at http://news. 2005] P2P AND THE FUTURE OF PRIVATE COPYING strong-arm tactics have alienated many of the industry's customers and political supporters6 and, to some extent, have backfired by driving unau- thorized copying underground. 7 Digital piracy remains rampant today, and billions of music files are traded every month. 8 Since the beginning of the P2P file-sharing controversy, com- 9 mentators have discussed the radical expansion of copyright law, the recording industry's controversial enforcement tactics, 10 the need for new legislative and business models, 11 the changing social com.com/2100-1025-1001095.html. For a discussion of take-down notices, see infra text ac- companying notes 35-46. 6. See Peter K. Yu, The Copyright Divide, 25 CARDOZO L. REV. 331, 442-43 (2003). 7. See id. at 443. 8. See generally Peter K. Yu, The EscalatingCopyright Wars, 32 HOFSTRA L. REV. 907 (2004) [hereinafter Yu, EscalatingCopyright Wars]. 9. See, e.g., LAWRENCE LESSIG, THE FUTURE OF IDEAS: THE FATE OF THE COMMONS IN A CONNECTED WORLD (2001) (lamenting how the recent expansion of intellectual property laws have stifled creativity and innovation); JESSICA LITMAN, DIGITAL COPYRIGHT (2001) (detailing the expansion of copyright laws in the past two centuries); SIVA VAIDHYANATHAN, COPYRIGHTS AND COPYWRONGS: THE RISE OF INTELLECTUAL PROPERTY AND How IT THREATENS CREATIVITY (2001) [hereinafter VAIDHYANATHAN, COPYRIGHTS AND COPYWRONGS] (describing how the increasing corporate control over the use of software, digital music, images, films, books and academic materials has steered copyright law away from its original design to promote creativity and cultural vibrancy); James Boyle, The Second Enclosure Movement and the Construction of the Public Domain, LAW & CONTEMP. PROBS., Winter/Spring 2003, at 33 [hereinafter Boyle, The Second Enclosure Movement] (describing the recent expansion of intellectual property laws as "the second enclosure movement"). 10. See, e.g., Sonia K. Katyal, The New Surveillance, 54 CASE W. RES. L. REV. 297 (2003). 11. See, e.g., COMM. ON INTELLECTUAL PROP. RIGHTS AND THE EMERGING INFO. INFRASTRUCTURE, NAT'L RESEARCH COUNCIL, THE DIGITAL DILEMMA: INTELLECTUAL PROPERTY IN THE INFORMATION AGE 79-83 (2000) [hereinafter DIGITAL DILEMMA] (discuss- ing the business models and technological protection mechanisms that can be used to address the digital piracy problem); WILLIAM W. FISHER III, PROMISES
Recommended publications
  • International Survey on Private Copying
    International Survey on Private Copying For more information contact WIPO at www.wipo.int Law & Practice 2 012 World Intellectual Property Organization 34, chemin des Colombettes 2012 International Survey on Private Copying – Law & Practice P.O. Box 18 CH-1211 Geneva 20 Switzerland Telephone: +4122 338 91 11 Fax: +4122 733 54 28 WIPO Publication No. 1037E ISBN 978-92-805-2271-6 International Survey on Private Copying Law & Practice 2012 Acknowledgement and thanks for front cover illustrations (Image of headphones courtesy of: www.publicdomainpictures.net/view-image.php?image=2133&picture=headphones by Anna Langova and all other images courtesy of www.copyright-free-images.com) Table of Contents EXECUTIVE SUMMARY 2 1. REVENUES PER CAPITA 12 2. TARIFFS ON BLANK CARRIERS 13 3. TARIFFS ON DEVICES (ALL THE AMOUNTS IN THIS REPORT ARE IN EUROS [€].) 14 4. AUSTRIA 15 5. BELGIUM 20 6. BULGARIA 25 7. BURKINA FASO 30 8. CANADA 33 9. CROATIA 37 10. CZECH REPUBLIC 41 11. CZECH REPUBLIC 45 12. DENMARK 48 13. FINLAND 51 14. FRANCE 56 15. GERMANY 61 16. GREECE 65 17. HUNGARY 69 18. ITALY 74 19. JAPAN 80 20. LATVIA 86 21. LITHUANIA 90 22. NETHERLANDS 97 23. NORWAY 102 24. PARAGUAY 104 25. POLAND 107 26. PORTUGAL 112 International Survey on Private Copying 27. ROMANIA 114 28. RUSSIA 118 29. SLOVAKIA 121 Law & Practice 2012 30. SLOVENIA 124 31. SPAIN 127 32. SWEDEN 132 33. SWITZERLAND 136 34. TURKEY 141 1 35. UNITED STATES OF AMERICA 144 Executive Summary 1. Introduction The present Survey represents a collection of key data on private copying compensation systems around the world.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Peer-To-Peer Software and Use of NRC Computers to Process SUNSI Frequently Asked Questions
    Peer-to-Peer Software and Use of NRC Computers to Process SUNSI Frequently Asked Questions 1. What is peer-to-peer software? Peer-to-peer, or P2P, file-sharing systems provide users with the ability to share files on their computers with other people through the Internet. The most popular P2P software is free and is used to share music, movies, and games, and for Instant Messaging. 2. Why is P2P a problem? P2P software provides the capability for users to access files on other users’ computers beyond those intended for sharing (i.e., music). For example, if you have P2P software on your computer and you also do your own tax preparation on your computer and store a copy of the tax return on your hard drive, other people anywhere in the world may be able to access the files containing your tax return. 3. Have sensitive government files been obtained through the use of P2P? Yes. There are documented incidents where P2P software was used to obtain sensitive government information when peer-to-peer software was installed on a government or home computer. 4. Is someone obtaining sensitive information the only threat? No. P2P can also make it easier for computer viruses and other malicious software to be installed on your computer without your knowledge. 5. Have other Federal agencies adopted similar policies? Yes, other Federal agencies have adopted similar policies. The Office of Management and Budget wrote the requirements for government-wide adoption in 2004. Additionally, due to the increased awareness of the P2P threat that has arisen since 2004, DOT, DHS, DOE, DOD, and other agencies have issued specific P2P policies.
    [Show full text]
  • ARK​ ​​Whitepaper
    ARK Whitepaper ​ ​​ A Platform for Consumer Adoption ​ ​ ​ ​ ​ ​ ​ ​ v.1.0.3 The ARK Crew ARK Whitepaper v.1.0.3 ​ ​ ​ ​ ​ ​ ​ ​ Table Of Contents ​ ​ ​ ​ Overview………………………………………………………………...……………………………….……………….………………………………………………………….….3 ​ Purpose of this Whitepaper………………………………………………………………………………………………………………………..….……….3 ​ ​ ​ ​ ​ ​ ​ Why?…………………………………………………………………………………………………………………….…………………………………………………….…………..4 ​ ​ ARK…………………………………………………………………………………………………….……………….…………………………………………………………………..5 ​ ​ ARK IS………………………………………………………………………………………………....……………….………………………………………………………………..5 ​ ​ ​ ​ ARK: Technical Details……………………………………….…….…..…………………………...……………….………………...…………………………...6 ​ ​ ​ ​ ​ ​ - Delegated Proof of Stake…………………………….……………...………………………….……………………………………….………...…...6 ​ ​​ ​ ​ ​ ​ ​ ​ ​ - Hierarchical Deterministic (HD) Wallets ​ ​​ ​ ​ ​ ​ ​ ​ (BIP32)…………………………………………………….....…………………..…..8 ​ - Fees……………………………………………………………………………………………………………….……………….…...………………………………..……...8 ​ ​​ ​ - ARK Delegates and Delegate Voting.…………………………………………………………………………………...………………….9 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ - Bridged Blockchains (SmartBridges)....................………………………………………………………………….………...…….10 ​ ​​ ​ ​ ​ ​ ​ - POST ARK-TEC Token Distribution …………………..…………………………………….………………….………..……..…..……….11 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ - Testnet Release……………………………………………….…………………………………………………………………….………...….....12 ​ ​ ​ And Beyond?…………………………………………………………………….………...……………………………………….………………………...……….…12 ​ ​ ​ ​ Addendum 1: ARK IS…(Cont.)...……..……..…………....…..………...………………………………………...………………………......……12
    [Show full text]
  • Trail's End Rewards
    Get more YESSES with the TRAIL’S END REWARDS New Trail’s End App EARN BIGGER REWARDS THAN EVER BEFORE Accept cash and credit cards (FREE CREDIT CARD PROCESSING), BUY THE PRIZE(S) YOU WANT WITH AN AMAZON.COM GIFT CARD track sales and inventory, and sign up for available storefronts. TO REDEEM YOUR AMAZON.COM GIFT CARD, SCOUTS MUST HAVE A REGISTERED TRAIL’S END ACCOUNT. SEE MORE PRIZES AT REWARDS.TRAILS-END.COM The App for All the Ways You Sell! Sell REWARD IDEAS: 2018 TOP SELLERS $3,500 Storefronts Door-to-Door Online At Work Local Businesses $88,073 $88,017 Earn a $225 Beck Mason Amazon.com Gift Card Virginia Michigan BONUS LEVEL $ TRAIL’S END SCHOLARSHIP PROGRAM REWARD IDEAS: Sell $2,500 of qualifying Trail’s End products in any calendar year and have 6% of $80,000 your total sales count towards your own Trail’s End Scholarship. Once enrolled, 6% of your sales each year will go towards the scholarship. You only have to hit the $2,500 minimum one time. Visit www.trails-end.com/scholarship for full Download Register Set Your Goal Start Selling $60,000 program details. Sell REWARD IDEAS: $40,000 FAMILY VACATION! $2,500 KEEP GOING! + + Earn a $150 FREE SHIPPING on EVERY online order! Hotels.com Uber New Amazon.com Gift Card $20,000 Gift Card Gift Card Luggage Set Sell REWARD IDEAS: NO LIMIT $1,500 Reach friends and family far away by sharing your personalized Scout Sell above $15,000 and earn 8% of your total sales in Earn a $75 fundraising page from the app via email, text, and social media.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • RIVERSIDE COMMUNITY COLLEGE DISTRICT FOUNDATION Gift Acceptance Policy I. Introduction the Riverside Community College District
    RIVERSIDE COMMUNITY COLLEGE DISTRICT FOUNDATION Gift Acceptance Policy I. Introduction The Riverside Community College District Foundation is a private non-profit organization whose mission is to raise private philanthropic funding for the benefit of the Riverside Community College District (RCCD) and its Colleges. The Foundation is responsible for the solicitation and management of private gifts to RCCD. This policy is designed to help facilitate the gift-giving process and to provide guidance to the entire RCCD community, outside advisors who assist in the gift planning process and to prospective donors who wish to make gifts to the Foundation. II. General Policies A. All gifts to the Foundation will comply with IRS requirements governing nonprofit 501(c)(3) corporations. In addition, the Foundation utilizes the standards and guidelines set forth by the Council for Advancement in Support of Fundraising (CASE). B. Any formal solicitation of gifts to the Foundation will be made only by or in consultation with an authorized representative of the Foundation, including Foundation staff and members of the RCCD Foundation Board Directors. C. Only the Executive Director of the Foundation, or his/her designee, is permitted to accept gifts on behalf of the Foundation. All gift activity will be reported and reviewed regularly by the RCCD Foundation Finance Committee. D. The Foundation may reject any gift that it determines is inconsistent with the mission, goals or objectives of the Foundation, the District or Colleges, or if the gift is determined to not be in the best interests of the Foundation to accept. E. Donors should be strongly encouraged to seek the advice of independent legal and tax counsel in all matters pertaining to gifts to the Foundation.
    [Show full text]
  • Olympian Exchange
    LINUXUSER Apollon File Sharing with Apollon and GiFT OLYMPIAN EXCHANGE The operators of the popular Internet-based file sharing network, Kazaa, only provide software for Windows systems, but the GiFT project brings www.sxc.hu Kazaa support to Linux. BY CARSTEN SCHNOBER azaa [1], the popular Internet- Kazaa makes it difficult for the Linux rent version. Box 1 describes how to add based file sharing network, has community to join the network, as the plugins. Kthe biggest user-base and offers peer-to-peer software Kazaa provides is GiFT is not a client program but a its users the widest range of services. So restricted to Microsoft operating sys- background daemon. When launched, it far, Kazaa has owed its popularity to tems. opens a connection to the P2P networks, Windows users – possibly due to the The GiFT project [2] now has a Linux- providing a gateway to local programs. prominence of illegal copies of expen- based plugin for users who want to The KDE program Apollon [8] uses the sive software packages, which are use- share files worldwide via Kazaa. The GiFT daemon and gives users a GUI for less to most Linux users. Additionally, plugin implements the Fasttrack protocol easy access to the file sharing platforms. used by Kazaa and additionally supports Installation the Gnutella [3] file The Arkollon program installs the Apol- sharing network. At the lon GUI and GiFT, including plugins for same time, OpenFast- track provides an alter- Table 1: Required Packages native to Kazaa. There RPM Debian is another plugin for zlib-devel zlib1g-dev the Ares network [4], libtool libltdl3-dev and the GiFT home- db-devel libdb4.2-dev page also refers to plu- libmagic-devel libmagic-dev gins for Napster [5], libvorbis-devel libvorbis-dev Soulseek [6] and E- imagemagick-devel libmagick-dev Donkey [7], which are qt3-devel libqt3-mt-dev incomplete or no qt3-devel-tools qt3-dev-tools kdelibs3-devel kdelibs4-dev Figure 1: Arkollon installs Apollon automatically.
    [Show full text]
  • Dat - Distributed Dataset Synchronization and Versioning
    Dat - Distributed Dataset Synchronization And Versioning Maxwell Ogden, Karissa McKelvey, Mathias Buus Madsen April 2017, Code for Science Abstract cloud storage services which fixes many issues with broken links but rely on proprietary code and services Dat is a protocol designed for syncing folders of data, requiring users to store their data on centralized cloud even if they are large or changing constantly. A crypto- infrastructure which has implications on cost, transfer graphically secure register of changes to the data over speeds, vendor lock-in and user privacy. time is used to ensure dataset versions are distributed Distributed file sharing tools can become faster as as exact copies of exact versions. Any byte range files become more popular, removing the bandwidth of any version of any file can be efficiently streamed bottleneck and making file distribution cheaper. They from a Dat repository over a network connection. Con- also use link resolution and discovery systems which sumers can choose to fully or partially replicate the can prevent broken links meaning if the original source contents of a remote Dat repository, and can also goes offline other backup sources can be automatically subscribe to live changes. Dat uses built-in public key discovered. However these file sharing tools today are cryptography to encrypt network traffic, allowing it not supported by Web browsers, do not have good to make certain privacy and security guarantees. A privacy guarantees, and do not provide a mechanism group of Dat clients can connect to each other to form for updating files without redistributing a new dataset a public or private decentralized network to exchange which could mean entire redownloading data you al- data amognst each other in a swarm.
    [Show full text]
  • Applications: G
    Applications: G This chapter contains the following sections: • G4, on page 5 • GACP, on page 6 • Gaia Online, on page 7 • Game Center, on page 8 • Game Front, on page 9 • Game Informer, on page 10 • GamerCom, on page 11 • GAMERSKY, on page 12 • GameSpot, on page 13 • GameSpy, on page 14 • GameStop, on page 15 • GameTrailers, on page 16 • Ganglia, on page 17 • Ganji, on page 18 • Gantter, on page 19 • Garmin, on page 20 • Gateway, on page 21 • Gawker, on page 22 • Gazprom Media, on page 23 • Gbridge, on page 24 • gdomap, on page 25 • GDS DataBase, on page 26 • GearBest, on page 27 • Geewa, on page 28 • Geico, on page 29 • generic audio/video, on page 30 • Genesis PPP, on page 31 • Genie, on page 32 • Genieo, on page 33 • Genieo Web Filter, on page 34 • GENRAD, on page 35 • Gfycat, on page 36 Applications: G 1 Applications: G • GG, on page 37 • GG Media, on page 38 • GGP, on page 39 • Ghaneely, on page 40 • GIFSoup.com, on page 41 • giFT, on page 42 • Giganews, on page 43 • ginad, on page 44 • GIOP, on page 45 • GIPHY, on page 46 • GISMETEO, on page 47 • GIST, on page 48 • GitHub, on page 49 • Gizmodo, on page 50 • GKrellM, on page 51 • Glide, on page 52 • Globo, on page 53 • Glympse, on page 54 • Glype, on page 55 • Glype Proxy, on page 56 • Gmail, on page 57 • Gmail attachment, on page 58 • GMTP, on page 59 • GMX Mail, on page 60 • GNOME, on page 61 • GNU Generation Foundation NCP 678, on page 62 • GNU Project, on page 63 • Gnucleus, on page 64 • GnucleusLAN, on page 65 • Gnutella, on page 66 • Gnutella2, on page 67 • GO.com, on page
    [Show full text]
  • Rethinking Private Copyinc in the Digital Age: an Analysis of the Canadian Approach to Music
    RETHINKING PRIVATE COPYINC IN THE DIGITAL AGE: AN ANALYSIS OF THE CANADIAN APPROACH TO MUSIC BY John Davidson A thesis submitted in conformity with the requirements for the degree of Master of Laws Graduate Department of the Faculty of Law University of Toronto O By John Davidson 2001 National Library Bibliothèque nationale du Canada Acquisitions and Acquisitions et Bibliogmphic Services services bibliographiques 395 Wellington Street 395. rue Wellington mwa ON K1A ON4 OtlawaON K1AW canada Canada The author has granted a non- L'auteur a accordé une licence non exclusive licence allouwing the exclusive permettant à la National Library of Cana&. to Biblothèque nationale du Canada de reproduce, loan, distribute 9r seil reproduire, prêter, distribuer ou copies of diis thesis in microform, vendre des copies de cette îhèse sous paper or electronic formats. la forme de microfiche/fïlm, de reproduction sur papier ou sur format électronique. The author retains ownership of the L'auteur conserve la propriété du copyright in this thesis. Neither the droit d'auteur qui protège cette thèse. thesis nor substantial extracts fkom it Ni la thése ni des extraits substantiels may be printed or otherwise de celle-ci ne doivent être imprimés reproduced without the author's ou autrement reproduits sans son permission. autorisation. RETHINKING PRIVATE COPYING IN THE DIGITAL AGE: AN ANALYSIS OF THE CANADIAN APPROACH TO MUSIC John Davidson B.Comm. (U. Syd.), LL.B. (Hons.) (U. Syd.) Admitted to Practice Law in New South Wales, Australia Master of Laws Faculty of Law University of Toronto 200 1 ABSTRACT Digital technotogy and the Internet in particular have fundamentally altered the dynamics of private copying.
    [Show full text]
  • Private Copying and Fair Compensation: an Empirical Study of Copyright Levies in Europe
    Private Copying and Fair Compensation: An empirical study of copyright levies in Europe Martin Kretschmer Centre for Intellectual Property Policy & Management www.cippm.org.uk Bournemouth University [email protected] WIPO, 15 February 2012 EC levy definition (2006) A private copying levy is a form of indirect remuneration for right holders, based on the premise that some acts of private copying cannot be licensed for practical purposes by the relevant right holders. A copyright levy is typically attached to certain products (equipment or blank media) that can serve to reproduce audio, audio-visual and textual material such as music, films or books. Policy context ESRC Fellowship at UK IPO (2010/11) – UK: What position on EU wide regulation? – UK: Can a private copying exception be introduced without providing compensation? Limitations and exceptions – Are exceptions just a response to market failure? – What activities should be possible without permission? – If without permission, requirement to pay? Empirical approach: If we don’t know how a “regulated” market works, we can’t intervene. Levy history in the EU – 1965: Germany UrhG §53 – 2001: Info Soc Directive (“fair compensation”) – 2006: EC recommendation (almost) – October 2010: ECJ Padawan (“uniform interpretation”, “calculation based on harm”) – May 2011: EC announces “comprehensive legislative action” regarding private copying levies (+ “mediator”) – August 2011: UK commitment to introduce private copying exception without compensation (“Hargreaves”) – [Norway], Finland,
    [Show full text]