Notice and Takedown in Everyday Practice

Total Page:16

File Type:pdf, Size:1020Kb

Notice and Takedown in Everyday Practice Electronic copy available at: http://ssrn.com/abstract=2755628 Electronic copy available at: http://ssrn.com/abstract=2755628 NOTICE AND TAKEDOWN IN EVERYDAY PRACTICE Jennifer M. Urban, Joe Karaganis & Brianna L. Schofield © 2016 Jennifer M. Urban, Joe Karaganis, and Brianna L. Schofield. This work is licensed under a Creative Commons Attribution 4.0 International License. Jennifer M. Urban is Clinical Professor of Law at the University of California, Berkeley School of Law and Director of the Samuelson Law, Technology & Public Policy Clinic. Joe Karaganis is Vice President at The American Assembly at Columbia University. Brianna L. Schofield is Clinical Teaching Fellow at the Samuelson Law, Technology & Public Policy Clinic at the University of California, Berkeley School of Law. THE TAKEDOWN PROJECT This report is part of the Takedown Project, a global network of researchers studying the role of notice and takedown procedures in addressing conflicts between copyright, privacy, and freedom of expression. More information can be found on the project’s website, http://takedownproject.org. ACKNOWLEDGMENTS AND DISCLOSURES We are deeply grateful to our survey respondents and interviewees for generously contributing their time and expertise, and for candidly sharing their “on the ground” experiences with notice and takedown. This work would not have been possible without both data and funding resources for the coding effort. We thank Adam Holland and Wendy Seltzer of Lumen (formerly Chilling Effects) for facilitating access to the Lumen data, which forms the basis for our quantitative work. We are grateful for funding support from Google Inc. as a gift to The American Assembly and from the Sloan Foundation for its support through the Berkeley Law Digital Library Copyright Project. Neither funder directed our approach in any way, and neither funder reviewed any methods, data, results, or reporting before public release. We are also grateful for Nash Information Services’ in- kind donation of the OpusData database and expert database customization advice. We are indebted to the individuals who have generously lent their time, skill, and expertise to the project: Kristoff Grospe for his assistance with the development and management of the qualitative and quantitative studies; Martyn Joyce for building and maintaining our customized database, coding and querying interfaces, and randomization and search algorithms; Bruce Nash of Nash Information Services for help with database and algorithm design; and Nora Broege of UC Berkeley’s D-Lab for data preparation and statistical analysis. We are very grateful for the detailed and helpful comments on study design, findings, and drafts offered by Annemarie Bridy, Niva Elkin-Koren, Gwen Hinze, Martin Husovec, Deirdre Mulligan, Bill Rosenblatt, and participants in multiple Takedown Project workshops, the 3rd Global Congress on Intellectual Property Rights and the Public Interest, the 4th Global Congress on Intellectual Property Rights and the Public Interest, the 18th Annual Berkeley Center for Law and Technology and Berkeley Technology Law Journal Symposium “The Next Great Copyright Act”, the Department of Commerce Multistakeholder Forum on Improving the Operation of the DMCA Notice and Takedown System, the Chicago-Kent College of Law’s Conference on Empirical Research on Copyright Issues, and the Copyright Society of the USA’s Copyright and Technology Conference. Mistakes are ours alone. We thank the exceptional team of graduate students from the University of California, Berkeley School of Law who manually reviewed takedown requests: Sérgio Alves, Jr.; Christina Farmer; Shaina Hyder; Alicia Intriago; Tigist Kassahun; Shweta Kumar; Leighanna Mixter; Smita Rajmohan; and Kirsty Watkins. Lydia Anderson-Dana provided excellent research assistance in the final stages of the project. EXECUTIVE SUMMARY ..................................................................................................................1 I. INTRODUCTION AND SUMMARY OF FINDINGS .......................................................................7 II. LEGAL BACKGROUND AND NOTICE AND TAKEDOWN’S EXPANDING REACH .......................15 A. Statutory Language and Debating the Allocation of Responsibility ............................... 15 B. Expansion of the DMCA Framework .............................................................................. 19 1. Repurposing Notice and Takedown for Other Problems and Extending it to Tertiary Providers Through Private Agreements ............................. 20 2. The DMCA’s International Reach ............................................................................ 21 III. STUDY 1: OSP AND RIGHTSHOLDER ACCOUNTS OF NOTICE AND TAKEDOWN IN EVERYDAY PRACTICE ...............................................................25 A. Methods ........................................................................................................................... 26 B. A Fundamental Safe Harbor, and a Split in Practice ...................................................... 28 1. Stability Concerns ...................................................................................................... 30 2. Automation and the Professionalization of Notice Sending ..................................... 31 a. Design and Use of Automated Detection Systems .............................................. 34 C. Notice and Takedown in Operation ................................................................................ 36 1. Statutorily Required Statements and the Emergence of Web-Forms ........................ 36 2. Locating Infringing Content: A Complicating Factor ............................................... 38 3. Evaluating the Substance of Claims .......................................................................... 40 4. Counter Notices: Inadequate and Infrequently Used ............................................... 44 5. Repeat Infringer Policies and “Strikes” ...................................................................... 46 6. Transparency Reporting and Public Archiving of Notices ........................................ 49 D. Divergence in Takedown Practice: Moving to DMCA Auto, DMCA Plus, and Beyond .. 52 1. From DMCA Auto to DMCA Plus Enforcement Measures ..................................... 53 a. DMCA Auto Practice .......................................................................................... 54 b. Transitional Practices: Trusted Sender Programs and Direct Takedown Privileges ...54 c. DMCA Plus Practices .......................................................................................... 55 i. Hash-Matching and Site-Wide Removal ...................................................... 56 ii. Fingerprinting and Filtering ........................................................................... 57 iii. Staydown ....................................................................................................... 60 iv. Side Agreements ............................................................................................ 60 2. “Para DMCA” Measures: Site Blocking and Tertiary Providers ................................ 62 a. Site Blocking ........................................................................................................ 62 b. Privately Agreed “Best Practices” for Tertiary Intermediaries ............................. 63 E. Compliance, Competition, and Market Power ................................................................ 64 1. Case Study: SoundLocker .......................................................................................... 66 F. The Role of Search Services ............................................................................................ 67 1. Case Study: The Disproportionate Role of Google Web Search ............................... 70 G. Discussion: Study 1 .......................................................................................................... 73 IV. STUDIES 2 AND 3: QUANTITATIVE ANALYSIS OF TAKEDOWN REQUESTS .............................77 A. Data and Methods ........................................................................................................... 78 1. The Lumen Dataset ................................................................................................... 78 2. Database, Coding Engine, and Sampling Methods ................................................... 80 3. Coding Methods and Data Processing....................................................................... 80 B. Study 2: In Six Months of Lumen Notices, an Automated Onslaught to Google Web Search ........................................................... 81 1. Overall Findings: Automation, Major Senders, and Google Web Search Dominate .. 82 a. Sender Characteristics: Agents Dominate, and a Shift to Movies, Music, and Adult Content Industries .................................................................. 83 i. Third-Party Agents Send the Most Takedown Requests to Google Web Search .. 83 ii. A Major Rise in the Entertainment Industry’s Use of Takedown Requests .. 84 b. Target Site Characteristics: Over Two-Thirds of Requests Refer to Torrent or File Search Sites .................................................... 86 2. Questions of Accuracy and Substantive Judgment ................................................... 87 a. Mistargeting 1: Some Senders Failed to Update Their Algorithms, Continuing to Target Shuttered Sites .................................................................
Recommended publications
  • 512 Comment Holland Bavitz 04 01
    BEFORE THE UNITED STATES COPYRIGHT OFFICE LIBRARY OF CONGRESS COMMENT REGARDING SECTION 512 STUDY DOCKET NO. 2015-7 COMMENT OF ADAM HOLLAND AND CHRISTOPHER T. BAVITZ ADDRESSING QUESTIONS 11, 15, 25, 29, AND 30 (AND ALL QUESTIONS GENERALLY) I. INTRODUCTION. Adam Holland and Christopher T. Bavitz (collectively, “Commenters”) submit this comment pursuant to the United States Copyright Office’s Notice of Inquiry for Section 512 Study.1 Mr. Holland is a Project Coordinator at the Berkman Center for Internet & Society at Harvard University (the “Berkman Center”) and oversees the day-to-day operations of the Center’s Lumen Project (“Lumen”). Professor Bavitz is a faculty co-director of the Berkman Center and the principal investigator for Lumen. Lumen is an independent research project that studies the landscape for online content, including requests to platforms, search engines, and others to remove materials created or uploaded by Internet users using legal or extra-legal theories. Formed in or around 2001 as the Chilling Effects Clearinghouse, the project’s goals are to educate the public; to facilitate research about different kinds of complaints and requests for removal — both legitimate and questionable — that are sent to online publishers and service providers; and to provide as much transparency as possible about the “ecology” of such notices in terms of who sends them, why, and to what effect. Commenters write in order to advance the twin propositions that: (a) data is crucial to informing reasoned policy debates, including debates about policies that govern intermediary liability and obligations to police content online; and (b) transparency is intrinsically related to accountability, oversight, and process and is generally good for the public at large in a society that values free expression.
    [Show full text]
  • Social Media and Democracy : the State of the Field, Prospects for Reform
    Downloaded from https://www.cambridge.org/core. IP address: 170.106.33.19, on 26 Sep 2021 at 08:20:02, subject to the Cambridge Core terms of use, available at https://www.cambridge.org/core/terms. https://www.cambridge.org/core/product/E79E2BBF03C18C3A56A5CC393698F117 Downloaded from https://www.cambridge.org/core. IP address: 170.106.33.19, on 26 Sep 2021 at 08:20:02, subject to the Cambridge Core terms of use, available at https://www.cambridge.org/core/terms. https://www.cambridge.org/core/product/E79E2BBF03C18C3A56A5CC393698F117 Social Media and Democracy Over the last five years, widespread concern about the effects of social media on democracy has led to an explosion in research from different disciplines and corners of academia. This book is the first of its kind to take stock of this emerging multi-disciplinary field by synthesizing what we know, identifying what we do not know and obstacles to future research, and charting a course for the future inquiry. Chapters by leading scholars cover major topics – from disinformation to hate speech to political advertising – and situate recent developments in the context of key policy questions. In addition, the book canvasses existing reform proposals in order to address widely perceived threats that social media poses to democracy. This title is also available as Open Access on Cambridge Core. Nathaniel Persily is the James B. McClatchy Professor of Law at Stanford Law School and the Co-Director of the Stanford Cyber Policy Center and Stanford Project on Democracy and the Internet. His scholarship focuses on the law and technology of democracy.
    [Show full text]
  • Latter-Day Screens
    Latter- day Screens This page intentionally left blank Latter- day Screens GENDER, SEXUALITY, AND MEDIATED MORMONISM Brenda R. Weber duke university press durham and london 2019 © 2019 DUKE UNIVERSITY PRESS. All rights reserved Printed in the United States of Amer i ca on acid- free paper ∞ Designed by Courtney Leigh Baker Typeset in Minion Pro and Helvetica Neue by Westchester Publishing Services Library of Congress Control Number: 2019943713 isbn 9781478004264 (hardcover : alk. paper) isbn 9781478004868 (pbk. : alk. paper) isbn 9781478005292 (ebook) Cover art: Big Love (hbo, 2006–11). Publication of this open monograph was the result of Indiana University’s participation in TOME (Toward an Open Monograph Ecosystem), a col- laboration of the Association of American Universities, the Association of University Presses, and the Association of Research Libraries. TOME aims to expand the reach of long-form humanities and social science scholarship including digital scholarship. Additionally, the program looks to ensure the sustainability of university press monograph publishing by supporting the highest quality scholarship and promoting a new ecology of scholarly publishing in which authors’ institutions bear the publication costs. Funding from Indiana University made it possible to open this publication to the world. This work was partially funded by the Office of the Vice Provost of Research and the IU Libraries. For Michael and Stacey, my North Stars This page intentionally left blank CONTENTS Acknowl edgments ix Past as Prologue. Latter- day Screens and History 1 Introduction. “Well, We Are a Curiosity, Ain’t We?”: Mediated Mormonism ​13 1. Mormonism as Meme and Analytic: Spiritual Neoliberalism, Image Management, and Transmediated Salvation ​49 2.
    [Show full text]
  • U.S. Government Publishing Office Style Manual
    Style Manual An official guide to the form and style of Federal Government publishing | 2016 Keeping America Informed | OFFICIAL | DIGITAL | SECURE [email protected] Production and Distribution Notes This publication was typeset electronically using Helvetica and Minion Pro typefaces. It was printed using vegetable oil-based ink on recycled paper containing 30% post consumer waste. The GPO Style Manual will be distributed to libraries in the Federal Depository Library Program. To find a depository library near you, please go to the Federal depository library directory at http://catalog.gpo.gov/fdlpdir/public.jsp. The electronic text of this publication is available for public use free of charge at https://www.govinfo.gov/gpo-style-manual. Library of Congress Cataloging-in-Publication Data Names: United States. Government Publishing Office, author. Title: Style manual : an official guide to the form and style of federal government publications / U.S. Government Publishing Office. Other titles: Official guide to the form and style of federal government publications | Also known as: GPO style manual Description: 2016; official U.S. Government edition. | Washington, DC : U.S. Government Publishing Office, 2016. | Includes index. Identifiers: LCCN 2016055634| ISBN 9780160936029 (cloth) | ISBN 0160936020 (cloth) | ISBN 9780160936012 (paper) | ISBN 0160936012 (paper) Subjects: LCSH: Printing—United States—Style manuals. | Printing, Public—United States—Handbooks, manuals, etc. | Publishers and publishing—United States—Handbooks, manuals, etc. | Authorship—Style manuals. | Editing—Handbooks, manuals, etc. Classification: LCC Z253 .U58 2016 | DDC 808/.02—dc23 | SUDOC GP 1.23/4:ST 9/2016 LC record available at https://lccn.loc.gov/2016055634 Use of ISBN Prefix This is the official U.S.
    [Show full text]
  • Privacy and Legal Automation: the DMCA As a Case Study
    Privacy and Legal Automation: The DMCA as a Case Study Jonathon W. Penney* 22 STAN. TECH. L. REV. 412 (2019) ABSTRACT Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright through DMCA notices at mass scale. With literally millions of such notices sent daily, this automation has been criticized for causing large scale chilling effects online, yet few empirical studies have examined this issue in depth. This article does so with a mixed-method empirical study synthesizing survey-based findings with an analysis of 500 Google Blogs and 500 Twitter accounts that have received DMCA notices. The findings offer a number of new insights, including evidence for DMCA notice * The author would like to thank Victoria Nash, Urs Gasser, Joss Wright, Ian Brown, David Erdos, Jennifer Urban, Ari Waldman, Eric Goldman, Joe Kariganis, Annemarie Bridy, Niva Elkin-Koren, J. Nathan Matias, Ryan Budish, Kendra Albert, Andy Sellars, Molly Sauter, Derek Bambauer, Ben Zevenbergen, Neil Richards, Daphne Keller, and Jennifer Daskell for comments, advice, and/or suggestions or previous drafts or presentations based thereon.
    [Show full text]
  • The Road to Total Freedom a Sociological Analysis of Scientology
    The Road to Total Freedom A Sociological analysis of Scientology ROY WALLIS The Road to Total Freedom This book is a sociological study of a new quasi-religious movement, Scientology. Its author, Roy Wallis, traces the emergence of this movement as a lay psychotherapy - "Dianetics" and its development into an authoritarian sect. Drawing on formulations in the sociology of religion, he analyses the processes involved and presents a theory to account for the transformation of cult into sect. On the basis of over eighty interviews with members and former members, a typology of the motivations which led individuals to affiliate with the movements is derived, and the processes by which members become further committed to the movement are explored. The reasons which led a proportion of members to defect from the movement are also described. Scientology has been notable for the extent to which is has come into conflict with the state, medical agencies, and individuals critical of its practices. The author turns to the sociology of deviance to provide a model to account for the development of a 'moral crusade'against Scientology and to explain the way in which the movement reacted and adapted to a hostile environment. This study should find a place on courses in Religious Studies, the History of Religion, and the Sociology of Religion. It will be essential material for any attempt to understand the form and place of the new religions in advanced industrial societies. It is also likely to be appropriate material for courses on the Sociology of Social Movements. The controversial nature of the topic of this work may, however, endow it with a market appeal beyond the confines of the academic community.
    [Show full text]
  • Notice and Takedown in Everyday Practice
    NOTICE AND TAKEDOWN IN EVERYDAY PRACTICE Jennifer M. Urban, Joe Karaganis & Brianna L. Schofield © 2016 Jennifer M. Urban, Joe Karaganis, and Brianna L. Schofield. This work is licensed under a Creative Commons Attribution 4.0 International License. Jennifer M. Urban is Clinical Professor of Law at the University of California, Berkeley School of Law and Director of the Samuelson Law, Technology & Public Policy Clinic. Joe Karaganis is Vice President at The American Assembly at Columbia University. Brianna L. Schofield is Clinical Teaching Fellow at the Samuelson Law, Technology & Public Policy Clinic at the University of California, Berkeley School of Law. THE TAKEDOWN PROJECT This report is part of the Takedown Project, a global network of researchers studying the role of notice and takedown procedures in addressing conflicts between copyright, privacy, and freedom of expression. More information can be found on the project’s website, http://takedownproject.org. ACKNOWLEDGMENTS AND DISCLOSURES We are deeply grateful to our survey respondents and interviewees for generously contributing their time and expertise, and for candidly sharing their “on the ground” experiences with notice and takedown. This work would not have been possible without both data and funding resources for the coding effort. We thank Adam Holland and Wendy Seltzer of Lumen (formerly Chilling Effects) for facilitating access to the Lumen data, which forms the basis for our quantitative work. We are grateful for funding support from Google Inc. as a gift to The American Assembly and from the Sloan Foundation for its support through the Berkeley Law Digital Library Copyright Project. Neither funder directed our approach in any way, and neither funder reviewed any methods, data, results, or reporting before public release.
    [Show full text]
  • Latter-Day Screens
    Latter- day Screens This page intentionally left blank Latter- day Screens GENDER, SEXUALITY, AND MEDIATED MORMONISM Brenda R. Weber duke university press durham and london 2019 © 2019 DUKE UNIVERSITY PRESS. This work is licensed under the Creative Commons Attribution- NonCommercial-NoDerivatives 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/4.0/. Printed in the United States of Amer i ca on acid- free paper ∞ Designed by Courtney Leigh Baker Typeset in Minion Pro and Helvetica Neue by Westchester Publishing Services Cataloging-in-Publication Data is available from the Library of Congress. Library of Congress Control Number: 2019943713 isbn 9781478004264 (hardcover : alk. paper) isbn 9781478004868 (pbk. : alk. paper) isbn 9781478005292 (ebook) Cover art: Big Love (hbo, 2006–11). Publication of this open monograph was the result of Indiana University’s participation in TOME (Toward an Open Monograph Ecosystem), a col- laboration of the Association of American Universities, the Association of University Presses, and the Association of Research Libraries. TOME aims to expand the reach of long-form humanities and social science scholarship including digital scholarship. Additionally, the program looks to ensure the sustainability of university press monograph publishing by supporting the highest quality scholarship and promoting a new ecology of scholarly publishing in which authors’ institutions bear the publication costs. Funding from Indiana University made it possible to open this publication to the world. This work was partially funded by the Office of the Vice Provost of Research and the IU Libraries. For Michael and Stacey, my North Stars This page intentionally left blank CONTENTS Acknowl edgments ix Past as Prologue.
    [Show full text]
  • Section 512 of the Digital Millennium Copyright Act: User Experience and User Frustration
    N1_ASP (DO NOT DELETE) 12/28/2017 5:06 PM Section 512 of the Digital Millennium Copyright Act: User Experience and User Frustration Emily M. Asp* ABSTRACT: The DMCA was created at a time when the internet was still relatively new. One of the most important sections of the DMCA is section 512, which provides a safe harbor from liability to internet service providers when their consumers post copyright-infringing material on their websites. Because of section 512, copyright owners who find potentially infringing content on the internet can petition service providers to take down the content. While this has protected many websites and allowed for innovation on the internet, it has been detrimental to consumers. A lack of clarity in the statute combined with dramatic changes in how the internet is accessed and used have created significant problems that go to issues of free speech, privacy, and due process. This Note proposes that Congress amend the DMCA to simplify the language of the statute and to require that service providers give more information to consumers to inform them both of their rights and the nuances of the counter-notification process. While some internet service providers are taking preliminary steps in this direction, the most comprehensive plan has been implemented by P2P file sharing websites. These sites have worked with copyright holders to create a system that promotes knowledge and understanding as well as providing ample time for consumers to correct their behavior prior to removing them from the site entirely. I believe this is the proper approach to bring the law into the 21st century and to protect average consumers.
    [Show full text]
  • Shenanigans (Internet Takedown Edition)
    Utah Law Review Volume 2021 Number 2 Article 1 8-2021 Shenanigans (Internet Takedown Edition) Eugene Volokh UCLA School of Law, [email protected] Follow this and additional works at: https://dc.law.utah.edu/ulr Part of the Communications Law Commons, and the Computer Law Commons Recommended Citation 2021 ULR 237 (2021) This Article is brought to you for free and open access by Utah Law Digital Commons. It has been accepted for inclusion in Utah Law Review by an authorized editor of Utah Law Digital Commons. For more information, please contact [email protected]. SHENANIGANS (INTERNET TAKEDOWN EDITION) Eugene Volokh* TABLE OF CONTENTS I. INTRODUCTION .................................................................................................. 238 II. FORGERIES ....................................................................................................... 244 III. STIPULATED INJUNCTIONS INVOLVING APPARENTLY FAKE DEFENDANTS ... 252 IV. STIPULATED INJUNCTIONS INVOLVING FAKE NOTARIZATIONS .................... 259 V. INJUNCTIONS AGAINST A REAL DEFENDANT WHO IS NOT THE REAL AUTHOR ............................................................................................... 261 VI. DEFAULT JUDGMENTS OBTAINED WITHOUT GENUINE ATTEMPTS ............... 263 AT LOCATING DEFENDANTS ................................................................................. 263 VII. WAG THE DOG INJUNCTIONS: SUING THE COMMENTER, NOT THE AUTHOR ................................................................................................
    [Show full text]
  • Accountability in Algorithmic Copyright Enforcement*
    ACCOUNTABILITY IN ALGORITHMIC COPYRIGHT ENFORCEMENT* Maayan Perel** & Niva Elkin-Koren*** CITE AS: 19 STAN. TECH. L. REV. 473 (2016) ABSTRACT Recent years demonstrate a growing use of algorithmic law enforcement by online intermediaries. Facilitating the distribution of online content, online intermediaries offer a natural point of control for monitoring access to illegitimate content, which makes them ideal partners for performing civil and criminal enforcement. Copyright law has been at the forefront of algorithmic law enforcement since the early 1990s when it conferred safe harbor protection to online intermediaries who remove allegedly infringing content upon notice under the Digital Millennium Copyright Act (DMCA). Over the past two decades, the Notice and Takedown (N&TD) regime has become ubiquitous and embedded in the system design of all major intermediaries: major copyright owners increasingly exploit robots to send immense volumes of takedown requests and major online intermediaries, in response, use algorithms to filter, block, and disable access to allegedly infringing content automatically, with little or no human intervention. Algorithmic enforcement by online intermediaries reflects a fundamental shift in our traditional system of governance. It effectively converges law enforcement and adjudication powers in the hands of a small number of mega platforms, which are profit- maximizing, and possibly biased, private entities. Yet notwithstanding their critical role in shaping access to online content and facilitating public
    [Show full text]
  • Europe's Intermediary Liability Laws and the EU 2016 General Data
    THE RIGHT TOOLS: EUROPE’S INTERMEDIARY LIABILITY LAWS AND THE EU 2016 GENERAL DATA PROTECTION REGULATION Daphne Keller† ABSTRACT The European Union’s (EU) General Data Protection Regulation (GDPR) makes important changes to the “Right to Be Forgotten” established by the Court of Justice of the European Union’s landmark 2014 Google Spain ruling. The GDPR introduces new notice-and- takedown rules for “Right to Be Forgotten” requests that will make deliberate or accidental over-removal of online information far too likely. The new rules give private Internet platforms powerful incentives to erase or delist user-generated content—whether or not that content, or the intermediaries’ processing of the content, actually violates the law. These problems could be mitigated, without threatening the important privacy protections established by the GDPR, through procedural checks and balances in the platforms’ removal operations. This Article details the problematic GDPR provisions, examines the convergence of European data protection and intermediary liability law, and proposes ways that the EU’s own intermediary liability laws can restore balanced protections for privacy and information rights. The Article focuses on the motivations and likely real-world behavior of online platforms. It includes close examinations of: x Whether and how the “Right to Be Forgotten” may apply to user-generated content hosts like Twitter or Facebook; x Free expression provisions in the GDPR; x The GDPR’s extraterritorial reach and consequences for companies outside the EU; x Doctrinal tensions between the EU’s intermediary liability law under the eCommerce Directive and the EU’s data protection law under the 1995 Data Protection Directive and the new GDPR; and x Human rights and fundamental rights laws governing online notice-and-takedown operations.
    [Show full text]