Copyright and Shared Networking Technologies
Total Page:16
File Type:pdf, Size:1020Kb
Copyright and Shared Networking Technologies By Gaetano Dimita A Thesis Submitted for the Degree of Doctor of Philosophy Queen Mary, University of London 2010 1 I confirm that the work presented in the thesis is my own and all references are cited accordingly. I accept that the College has the right to use plagiarism detection software to check the electronic version of the thesis. Gaetano Dimita 2 Abstract The technological zeitgeist has transformed the social-cultural, legal and commercial aspects of society today. Networking technologies comprise one of the most influential factors in this. Although this transformation can be discounted as a mere historical phenomenon dating back to the advent of the printing press, empirical data concerning usage of these technologies shows that there has been a radical shift in the ability to control the dissemination of copyright works. Networking technologies allow, in an unprecedented manner, user-initiated activities including perfect replications, instantaneous dissemination, and abundant storage. They are immune to technological attempts to dismantle them, and impervious to legal attempts to control and harness them. They affect a global audience, which in turn, undermine at negligible costs, the legal and business parameters of copyright owners. The problem is whether it will now be possible to establish a copyright framework which balances the interests of the following groups: (a) copyright owners in their control of the dissemination of their works; (b) authors demanding remuneration for the exploitation of their works; (c) users wishing to consume works with clear immunity guidelines using networked technologies; (d) technologists striving to continuously innovate without legal and policy restrictions. Copyright law is not a mechanism for preserving the status quo or a particular business model. It is, as suggested above, a reflection of the needs and interests of authors, copyright owners, entertainment industries, users and technologists. This thesis examines whether the balance between these actors can be achieved and, if so, how it can be implemented within international, regional and national copyright laws. It finds that a balance can be struck; but that this balance should be aligned along three key concepts: user integrity; technological innovation; and authors‘ and owners‘ remuneration. The proposal is that the optimal method for achieving this triptych is the introduction and global implementation of a reasonable and unobtrusive system of remuneration. 3 Table of Contents Abstract ...…………..…………..................................................................................................... p. 3 Table of Content …………………………………………………………………………..……. p. 4 Table of Figures …………………………………………………………………………………. p. 8 Table of Abbreviations ………………………………………………………………………….. p. 9 Acknowledgements ………………………………….………………………………………….. p. 11 Introduction Problem Review …………..…..……………..………….………………………......................... p. 12 Objective and Scope of the Study ……………………………………………………………….. p. 15 Methodology, Sources and Limitations …………………………………………………………. p. 17 Chapters Outline ………………………………………………………………………………… p. 18 Chapter One - A History of Decreasing Control over Dissemination 1.1 - Introduction …………………………….………………………………………………….. p. 20 1.2 – Printing Press …..…………………………………………………..................................... p. 20 1.3 – Phonograph Machine & Broadcasting ……………............................................................. p. 23 1.4 – User-Accessible Copying Technologies ………….………………...…………………….. p. 24 1.5 – The Digital Revolution ……...……….…………………………..……………………….. p. 28 1.6 – Origins of Networking Technologies ……………………………...……………………… p. 29 1.7 - Web1.0 & Pre-File-Sharing Technologies …….................................................................... p. 31 1.8 – Conclusion ………………………………………………………………………………… p. 32 Chapter Two - An Introduction to Networking Technologies 2.1 – Introduction ………………………………………………………...................................... p. 34 2.2 – Peer-to-Peer File-Sharing ……………………………………….………………………… p. 34 2.2.1 – ‗Generations‘ ……………………………………………………………………. p. 35 2.2.1.1 – Centralised File List ……………………………………………………. p. 35 2.2.1.2 – Gnutella/Fast Track ……………………………………………………. p. 36 2.2.1.3 – BitTorrent ……………………………………………………………… p. 37 2.2.1.4 – Private Networks ………………………………………………………. p. 38 2.2.2 – Softwares ………………………………………………………………………… p. 38 2.2.2.1– Napster ………………………………………………………..………… p. 38 2.2.2.2 – Aimster …………………………………………………………............. p. 39 2.2.2.3 – Kazaa ……………………………………………..…………….............. p. 39 2.2.2.4 – File Rogue, WinMX (WinNY), Soribada, & Kuro …..…….…………. p. 40 2.2.2.5 – Morpheus (Grokster) ……………….………………………………….. p. 42 2.2.2.6 – eMule …………………………………....….......................................... p. 42 2.2.2.7 – LimeWire ……………………………………………………................ p. 43 2.2.2.8 - BitTorrent ……………………………………….…............................... p. 43 2.2.2.9 – WASTE, OneSwarm, Tor & Torrent Privacy .……………………...…. p. 46 2.3 – Web2.0 ……………………………………………………..…………………………….. p. 48 2.3.1 – Semantic Web ……………………………………………………………........... p. 49 2.3.2 – User-Generated Content (UGC) ………………………….................................... p. 49 2.3.2.1 – Wikis …………………………………………………………………… p. 51 2.3.2.2 – Content-sharing sites ………………………………………………….. p. 51 2.3.2.3 – Social-Networks …………....................................................................... p. 53 2.3.3 – Virtual Worlds ………………………………………………………………….. p. 54 2.4 - Future Synergies ………………………………………………………………………….. p. 55 2.4.1 – Broadband ……….……………………………………………………………… p. 55 2.4.2 – Cloud Computing ………………………………………………………………. p. 56 2.5 – Conclusion ………………………………………………………………………………. p. 57 Chapter Three - Contextualising Networking Technologies within Copyright Law 3.1 – Introduction …………………………………..…………………………………………… p. 58 3.1.1 – Moral Rights …………………………………………………………….….…… p. 60 3.1.2 – Reproduction Right …………………………………………………………..…. p. 60 3.1.3 – Communication to the Public & On-Demand Making Available Right ............... p. 62 3.1.4 – Distribution Right …………………………………………………………..…… p. 63 4 3.1.5 – Other Rights ………………………………………………………………..…… p. 64 3.1.6 – Infringement ….………………………………………………………………… p. 64 3.1.7 – Limitations, Exceptions and Defences ………………………………………..… p. 65 3.1.8 – Jurisdiction and Applicable Law ……………………………………………….. p. 66 3.2 – The Users ………………………………………………………………………………… p. 67 3.2.1 – Infringement by Copying …………….………………………………………… p. 68 3.2.2 – Infringement by Communicating to the Public (including Making Available and Distribution) ........................................................................................................ p. 69 3.2.3 – Limitations and Exceptions ……………………………………………………… p. 70 3.2.4 – Stealth Technologies, Privacy Shields and Counterattacks ……………………… p. 71 3.2.5 – Nationals Approaches ……………………………………………………………. p. 73 3.2.5.1 – UK ……………………………………………………………………… p. 73 3.2.5.2 – US ………..……………………………………….................................. p. 76 3.2.5.3 – France …………………………………………….................................. p. 80 3.2.5.4 – Germany …………………………………………….............................. p. 82 3.2.5.5 – Italy …………………………………………………………………….. p. 83 3.2.5.6 – Spain …………………………………………………………………… p. 84 3.2.5.7 – Canada …………………………………………………………............ p. 85 3.2.6 – User Status ……………………………………………………………………… p. 86 3.3 – The Facilitators: Software Provider ……..……………….………..................................... p. 87 3.3.1 – Potential Defences …………….………………………………............................ p. 91 3.3.2 – Dodging Lawsuits ………………………………………………………………. p. 92 3.3.3 - Nationals Approaches ……………………………………………………............ p. 93 3.3.3.1 – UK ……………………………………………………………………… p. 93 3.3.3.2 – US ………………………………………………................................... p. 95 3.3.3.3 – France …………………………………………..................................... p. 96 3.3.3.4 – Germany ……………………………………………............................. p. 97 3.3.3.5 – Australia ……………………………………………………………….. p. 97 3.3.4 – Software Provider Status ………………………………………………………… p. 98 3.4 – The Facilitators: Intermediaries .…..……………………………….……………………… p. 99 3.4.1 – Definition ………………………………………………………………………… p. 99 3.4.1.1 - Internet Access Providers ……………………………………………….. p. 100 3.4.1.2 – Online Service Providers ………………………………………………. p. 101 3.4.1.3 – Communication Network Providers …………………………………… p. 101 3.4.2 – Disclosure of Personal Data …………………………………………………….. p. 102 3.4.2.1 – EU ……………………………………………………………………... p. 102 3.4.2.2 – US ……………………………………………………………………… p. 103 3.4.3 – Potential Defences ..……………………………………………………………… p. 103 3.4.4 – Take-Down Notice ………………………………………………………………. p. 105 3.4.5 – User-Generated-Content License ……………………………………................... p. 105 3.4.6 – National Approaches …………………………………………………………….. p. 106 3.4.6.1 – UK ……………………………………………………………………… p. 106 3.4.6.2 – US ………………………………………………................................... p. 108 3.4.6.3 – France …………………………………………...................................... p. 110 3.4.6.4 – Germany ……………………………………………............................. p. 112 3.4.6.5 – Belgium ………………………………………………………………… p. 112 3.4.6.6 - Italy ……………………………………………………………………… p. 113 3.4.6.7 – Spain ……………………………………………………………………. p. 114 3.4.6.8 - Sweden ………………………………………………………………….. p. 114 3.4.6.9 – Australia ……………………………………………............................... p. 115 3.4.6.10 – Canada …………………………………………………........................ p. 116 3.4.6.11 – Iceland ………………………………………………………………… p. 117 3.4.7 – Intermediaries Status …………………………………………………………….. p. 117 3.6 – Conclusion