Cyber Piracy: Can File Sharing Be Regulated Without Impeding the Digital Revolution?

Total Page:16

File Type:pdf, Size:1020Kb

Cyber Piracy: Can File Sharing Be Regulated Without Impeding the Digital Revolution? CYBER PIRACY: CAN FILE SHARING BE REGULATED WITHOUT IMPEDING THE DIGITAL REVOLUTION? Thesis submitted for the degree of Doctor of Philosophy at the University of Leicester Michael Robert Filby School of Law University of Leicester May 2012 Cyber Piracy: Can File Sharing be Regulated without Impeding the Digital Revolution? Abstract This thesis explores regulatory mechanisms of managing the phenomenon of file sharing in the online environment without impeding key aspects of digital innovation, utilising a modified version of Lessig’s modalities of regulation to demonstrate significant asymmetries in various regulatory approaches. After laying the foundational legal context, the boundaries of future reform are identified as being limited by extra-jurisdictional considerations, and the regulatory direction of legal strategies to which these are related are linked with reliance on design-based regulation. The analysis of the plasticity of this regulatory form reveals fundamental vulnerabilities to the synthesis of hierarchical and architectural constraint, that illustrate the challenges faced by the regulator to date by countervailing forces. Examination of market-based influences suggests that the theoretical justification for the legal regulatory approach is not consistent with academic or policy research analysis, but the extant effect could impede openness and generational waves of innovation. A two-pronged investigation of entertainment industry-based market models indicates that the impact of file sharing could be mitigated through adaptation of the traditional model, or that informational decommodification could be harnessed through a suggested alternative model that embraces the flow of free copies. The latter model demonstrates how the interrelationships between extant network effects and sub-model externalities can be stimulated to maximise capture of revenue without recourse to disruption. The challenges of regulating community- based norms are further highlighted where the analysis submits that the prevalence of countervailing forces or push-back from the regulated act as an anti-constraint to hierarchical and design-based regulation, due to an asymmetry between legal, architectural and traditional market-based approaches, and effective control of the file sharing community. This thesis argues that file sharing can be regulated most efficaciously by addressing this asymmetry through alternative market-based strategies. This can be influenced through extending hierarchical regulation to offer alternative legal and norm-based models that complement, rather than disrupt, the community-based norms of file sharing. Thesis submitted for the degree of Doctor of Philosophy at the University of Leicester Michael Robert Filby May 2012 2 Acknowledgements This thesis is dedicated to my parents, Alan and Patricia Filby, whose unending support has made this endeavour possible. Many thanks go to Barbara Bogusz of the School of Law, University of Leicester for her expertise and assistance in the writing of this thesis in her capacity as project supervisor. 3 Table of Contents Abstract ................................................................................................................ 2 Acknowledgements .............................................................................................. 3 Chapter One: Introduction ................................................................................ 8 Introduction ............................................................................................................................... 8 Methodology ........................................................................................................................... 11 Theoretical Basis ................................................................................................................. 11 Research Techniques ........................................................................................................... 14 Key Terms ............................................................................................................................... 16 Research Overview ................................................................................................................. 18 Hypothesis ........................................................................................................................... 18 Thesis Structure ................................................................................................................... 19 Chapter Two: The Legal Regulation and Hierarchical Control of File Sharing ............................................................................................................... 26 Introduction ............................................................................................................................. 26 The Origins of Statutory Copyright ........................................................................................ 26 The Copyright, Designs and Patents Act 1988: Civil or Criminal? ........................................ 29 Commercial Scale ............................................................................................................... 29 The Threshold of Prejudicial Affect .................................................................................... 32 Applying Legal Regulation to Individual Non-Commercial File Sharers .............................. 42 Site Blocking ....................................................................................................................... 42 Direct Action against Alleged Infringers through Speculative Invoicing ........................... 45 The Digital Economy Act 2010: Increasing the Ease of Enforcement ................................... 51 The International Framework of Intellectual Property Protection .......................................... 58 The Influence of Extra-Jurisdictional Authorities in UK Regulation ..................................... 65 Mapping Legal Regulatory Approaches ................................................................................. 73 Conclusion: Mapping Legal Approaches onto the Regulatory Spectrum ............................... 79 Figure 1: UK and US Legal and Hierarchical Approaches on the Regulatory Spectrum .. 79 Chapter Three: Regulating with Design-Based Code on the Physical and Logical Layers ............................................................................................ 82 Introduction ............................................................................................................................. 82 Regulation Applied to the Institutional Ecology through Layering ........................................ 83 4 Regulating the Logical Protocols and Architecture of the Internet ......................................... 86 Transposing Physical Architecture as Regulation to the Networked Environment ................ 90 Using the Law to Enforce Regulation by Code....................................................................... 92 The First Generation: Napster ............................................................................................ 92 The Second Generation: Gnutella and FastTrack-based Networks .................................... 93 The Third Generation: BitTorrent ...................................................................................... 95 Figure 2: Tracker Querying ................................................................................................ 96 Figure 3: Uploading to and Downloading from the Swarm ............................................... 97 Figure 4: BitTorrent File Distribution ................................................................................ 98 Using Code to Enforce Regulation by the Law..................................................................... 101 Using Code to Circumvent Surveillance and Detection ........................................................ 103 Who is Infringing? ............................................................................................................ 104 What is the Infringement? ................................................................................................. 110 Where is the Infringement Taking Place? ......................................................................... 112 Using Code to Circumvent Enforcement .............................................................................. 113 Site Blocking ..................................................................................................................... 113 Technical Measures: Throttling / Disconnection .............................................................. 117 The Threat of Plasticity to Design-Based Influence ............................................................. 118 Conclusion: Mapping Design-Based Approaches onto the Regulatory Spectrum ................ 125 Figure 5: Design-Based Approaches and Constraint on the Regulatory Spectrum ......... 125 Chapter Four: Market and Competition-Based Approaches to Regulating File Sharing .................................................................................. 128 Introduction ........................................................................................................................... 128 The Decommodification of Informational Property.............................................................. 130 Impeding the Gale of Creative Destruction .........................................................................
Recommended publications
  • Ben Adamson 7242107 Phd Thesis Final Submission Sep 2017
    IP in the Corridors of Power A study of lobbying, its impact on the development of intellectual property law, and the implications for the meaning of democracy A thesis submitted to the University of Manchester for the degree of Doctor of Philosophy in the Faculty of Humanities 2017 Ben Adamson School of Law Contents Title Page 1 Contents 2 Table of Abbreviations 7 Abstract 8 Declaration 9 Copyright Statement 10 Acknowledgements 11 Chapter 1: Introduction 13 1. What is Lobbying? 15 2. Setting the Scene 16 3. Core Themes 20 3.1 A Model of Democracy 20 3.2 The Importance of Stakeholder Input 21 3.3 Equality of Access and Influence 22 4. A Matter of Method 23 4.1 Quality vs. Quantity 24 4.2 Why Case Studies? 25 4.3 Gathering Data 27 4.4 Style and Substance 28 4.5 Objectivity and Subjectivity – The Balance of Fairness 29 4.6 Questions by Design 30 4.7 Confidentiality & Anonymity 31 5. Thesis Outline 32 Chapter 2: Conceptions of Governance and Democracy: A 34 Contemporary Model of Democracy 2 1. Governance 34 1.1 Definitions of Governance 39 1.2 Complexity and Multiple Actors 45 1.3 Relationships Between Actors & Policy Networks 49 1.4 Policy Networks in the EU Context 58 1.5 Conclusions on Governance 60 2. Democracy 62 2.1 Classical Models of Democracy 63 2.2 Organisations as Citizens? 69 2.3 Pluralism 75 2.4 A Minimal Role for the State? 82 2.5 Participation By All? 84 2.6 Towards A Working Model? 88 2.7 Wealth and Equality 89 2.8 Wealth, Equality and Lobbying 97 2.9 MPs: Delegates or Trustees? 101 2.10 All Party Groups 102 2.11 Who to Lobby? 102 2.12 Opening Up Access 104 2.13 The Media 105 2.14 Digital Media and Participation 107 2.15 Concluding Remarks 110 3.
    [Show full text]
  • “Site Blocking” to Reduce Online Copyright Infringement
    “Site Blocking” to reduce online copyright infringement A review of sections 17 and 18 of the Digital Economy Act The Department for Culture, Media and Sport has redacted some parts of this document where it refers to techniques that could be used to circumvent website blocks. There is a low risk of this information being useful to people wanting to bypass or undermine the Internet Watch Foundation‟s blocks on child sexual abuse images. The text in these sections has been blocked out. Advice Date: 27 May 2011 1 Contents Section Page 1. Executive summary 3 2. Introduction 9 3. Understanding how the internet operates 17 4. Blocking sites 26 5. Effectiveness of Section 17 & 18 46 6. Conclusion 50 Annex Page 1 Technical Glossary 52 2 Whois domain privacy service output 54 Section 1 1. Executive summary The Secretary of State has asked Ofcom to consider a number of questions related to the blocking of sites to reduce online copyright infringement. The Secretary of State for Culture, Media and Sport has asked Ofcom to report on certain technical matters relating to sections 17 and 18 of the Digital Economy Act 2010 (DEA). Sections 17 and 18 provide the Secretary of State with the power to grant the Courts the ability to require service providers, including internet service providers (ISPs) and other intermediaries, to prohibit access to sites on the internet that are found to be infringing copyright. Specifically, we have been asked to consider the following questions: Is it possible for internet service providers to block site access? Do
    [Show full text]
  • Digital Economy Bill [HL]
    Digital Economy Bill [HL] EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Department for Business, Innovation and Skills and the Department for Culture, Media and Sport, are published separately as HL Bill 1—EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Lord Mandelson has made the following statement under section 19(1)(a) of the Human Rights Act 1998: In my view the provisions of the Digital Economy Bill [HL] are compatible with the Convention rights. HL Bill 1 54/5 Digital Economy Bill [HL] CONTENTS General duties of OFCOM 1 General duties of OFCOM 2 OFCOM reports on infrastructure, internet domain names etc 3 OFCOM reports on media content Online infringement of copyright 4 Obligation to notify subscribers of reported infringements 5 Obligation to provide infringement lists to copyright owners 6 Approval of code about the initial obligations 7 Initial obligations code by OFCOM in the absence of an approved code 8 Contents of initial obligations code 9 Progress reports 10 Obligations to limit internet access: assessment and preparation 11 Obligations to limit internet access 12 Code by OFCOM about obligations to limit internet access 13 Contents of code about obligations to limit internet access 14 Enforcement of obligations 15 Sharing of costs 16 Interpretation and consequential provision 17 Power to amend copyright provisions Powers in relation to internet domain registries 18 Powers in relation to internet domain registries 19 Appointment of manager of internet domain registry 20 Application to court to alter constitution
    [Show full text]
  • You(Tube), Me, and Content ID: Paving the Way for Compulsory Synchronization Licensing on User-Generated Content Platforms Nicholas Thomas Delisa
    Brooklyn Law Review Volume 81 | Issue 3 Article 8 2016 You(Tube), Me, and Content ID: Paving the Way for Compulsory Synchronization Licensing on User-Generated Content Platforms Nicholas Thomas DeLisa Follow this and additional works at: https://brooklynworks.brooklaw.edu/blr Part of the Intellectual Property Law Commons, and the Internet Law Commons Recommended Citation Nicholas T. DeLisa, You(Tube), Me, and Content ID: Paving the Way for Compulsory Synchronization Licensing on User-Generated Content Platforms, 81 Brook. L. Rev. (2016). Available at: https://brooklynworks.brooklaw.edu/blr/vol81/iss3/8 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Law Review by an authorized editor of BrooklynWorks. You(Tube), Me, and Content ID PAVING THE WAY FOR COMPULSORY SYNCHRONIZATION LICENSING ON USER- GENERATED CONTENT PLATFORMS INTRODUCTION Ever wonder about how the law regulates your cousin’s wedding video posted on her YouTube account? Most consumers do not ponder questions such as “Who owns the content in my video?” or “What is a fair use?” or “Did I obtain the proper permission to use Bruno Mars’s latest single as the backing track to my video?” These are important questions of law that are answered each day on YouTube1 by a system called Content ID.2 Content ID identifies uses of audio and visual works uploaded to YouTube3 and allows rights holders to collect advertising revenue on that content through the YouTube Partner Program.4 It is easy to see why Content ID was implemented—300 hours of video are uploaded to YouTube per minute.5 Over six billion hours of video are watched each month on YouTube (almost an hour for every person on earth),6 and it is unquestionably the most popular streaming video site on the Internet.7 Because of the staggering amount of content 1 See A Guide to YouTube Removals,ELECTRONIC fRONTIER fOUND., https://www.eff.org/issues/intellectual-property/guide-to-youtube-removals [http://perma.cc/ BF4Y-PW6E] (last visited June 6, 2016).
    [Show full text]
  • Digital Economy Act 2010: Copyright
    Digital Economy Act 2010: copyright Standard Note: SN/HA/5515 Last updated: 28 June 2013 Author: Philip Ward Section Home Affairs The Digital Economy Act 2010 received Royal Assent at the very end of the last Parliament. Sections 3 to 18 of the Act cover online infringement of copyright. Several provisions have proved controversial and have not yet been implemented. Section 17 grants the Secretary of State a power to bring in regulations for the blocking of infringing websites. The present Government has indicated that it does not intend to use this power. Copyright owners have brought successful court actions against infringing websites under existing laws. The Government is proceeding with implementation of an “initial obligations code” (allowed for under section 11 of the Act). Under the proposed system, an internet service provider would send a warning letter to a customer detected downloading copyright material for free from the internet. If the infringing activity continued, two follow-up letters would be sent. Once the third letter was dispatched, the customer’s download history could be released to the owners of the copyrighted material, enabling legal action to be initiated against the infringer. However, the copyright owner would first have to gain a court order to determine the identity of the filesharer, as the download history provided would be anonymised. Customers thus accused would be able to file an appeal for £20, which would be refunded if the appeal were successful. The proposed notification system has survived the challenge of a judicial review instigated by BT and TalkTalk. Ofcom has conducted public consultations on the draft code and on the allocation of costs for administering the regime.
    [Show full text]
  • Better Protecting BBC Financial Independence an Exploratory Report for the BBC Trust
    Better protecting BBC financial independence An exploratory report for the BBC Trust Martin Moore King’s College London January 2016 The Policy Institute at King’s About the Policy Institute at King’s The Policy Institute at King’s College London acts as a hub, linking insightful research with rapid, relevant policy analysis to stimulate debate, inform and shape future policy agendas. Building on King’s central London location at the heart of the global policy conversation, our vision is to enable the translation of academic research into policy and practice by facilitating engagement between academic, business and policy communities around current and future policy needs. We combine the academic excellence of King’s with connectedness of a think tank and the professionalism of a consultancy. Moore, M., Better protecting BBC financial independence: an exploratory report for the BBC Trust, Centre for the Study of Media, Communication and Power, the Policy Institute at King’s College London, January 2016. About the author Martin Moore Dr Martin Moore is a Senior Research Fellow and Director of the Centre for the Study of Media, Communication and Power at the Policy Institute at King’s College London. He has twenty years experience working across the UK media, in the commercial sector, the third sector and in academia. 1 Preface This report was commissioned by the BBC Trust in order to explore ways to better protect the BBC’s financial independence beyond Charter Renewal. The ideas presented in the report are derived from ten interviews with expert sources conducted for the study in October and November 2015, supplemented by relevant publicly available information.
    [Show full text]
  • Online Infringement of Copyright and the Digital Economy Act 2010: Draft Initial Obligations Code Communications Consumer Panel Consultation Response
    Online Infringement of Copyright and the Digital Economy Act 2010: Draft Initial Obligations Code Communications Consumer Panel Consultation Response 1. Introduction The Communications Consumer Panel (the Panel) is an independent panel of experts established under the Communications Act 2003. Its role is to influence Ofcom, Government, the EU and service and equipment providers, so that the communications interests of consumers and citizens are protected and promoted. The Panel pays particular attention to the needs of older people and people with disabilities, to the needs of people in rural areas and people on low incomes, and to the needs of small businesses, which face many of the same problems as individual consumers. The Panel is made up of part-time members with a balance of expertise in consumer issues in the communications sector. There are members representing the interests of consumers in Scotland, Wales, Northern Ireland and England. Panel Members are appointed by Ofcom, subject to approval by the relevant Secretaries of State. They are appointed in accordance with Nolan principles and are eligible for re-appointment. The Panel is assisted by a small advisory team. 2. Background The Panel noted during its discussions about the Digital Britain Final report in 2009 that debates around online copyright infringement appeared to be dominated by the interests of copyright holders (rights holders) and internet service providers (ISPs). Communications Consumer Panel Consultation Response: Online Infringement of Copyright and the Digital Economy Act 2010: Draft Initial Obligations Code The Panel emphasised the need for consumer bodies to be properly involved in the debate when it responded to the last Government’s June 2009 consultation on legislation to address illegal peer-to-peer file-sharing.
    [Show full text]
  • Making Copyright Work for Creative Upstarts
    2015] 1021 MAKING COPYRIGHT WORK FOR CREATIVE UPSTARTS Sean Pager* INTRODUCTION Imagine you are a singer in a rock band. You are working hard to make a living, playing gigs, and waiting for that big break. Then one day, you are listening to the radio, and you are thrilled to hear one of your songs being played. Your excitement turns abruptly into anger, as you realize that your song is being played as part of a car commercial. You never approved this. So, you call up the car dealership to protest and demand that they pay you. But they brush you off, saying you should be grateful to get free pub- licity for your music. What to do? You cannot afford a lawyer, and even if you could, the cost of litigating this case in federal court dwarfs any license fee you might recover in damages.1 You never registered your copyrights in the song, so you are not eligible for statutory damages or attorney fees.2 And you cannot file a claim in state small claims court because copyright cases are subject to exclusive federal jurisdiction.3 Frustrated at your lack of recourse, you decide to quit music and go to law school instead.4 The point of this simple story is that the standard theory of copyright incentives comes with an Achilles heel. This theory justifies giving exclu- sive rights to authors because doing so will encourage them to create and * J.D. 1998, U.C. Berkeley Boalt Hall School of Law; A.B. 1989, Harvard University; LL.M.
    [Show full text]
  • COPYRIGHT and BUSINESS MODELS in the EARLY EIGHTEENTH CENTURY Isabellaalexanderf
    ALL CHANGE FOR THE DIGITAL ECONOMY: COPYRIGHT AND BUSINESS MODELS IN THE EARLY EIGHTEENTH CENTURY IsabellaAlexanderf TABLE OF CONTENTS I. INTRODUCTION: ANALOGUE AND DIGITAL WORLDS........ 1351 II. THE ECONOMY AND THE BOOK TRADE IN THE EIGHTEENTH CENTURY............................ 1354 III. THE PASSAGE OF THE STATUTE OF ANNE AND CHANGES IN ECONOMIC CONTROL OF THE BOOK TRADE .............. .............................. 1356 IV. PARTIAL TAKING AND THE STATUTE OF ANNE.................... 1362 V. THE FIRST CASES ............................. ...... 1368 VI. CONCLUSION ..............................................1377 I. INTRODUCTION: ANALOGUE AND DIGITAL WORLDS In 1998, the United States Congress labelled the current era the "digital millennium" when it passed a copyright act of that title.' Eleven years later, the United Kingdom echoed that language when the Department for Culture, Media and Sport published the Digital Britain Report in June 2009.2 The Report examines the country's communications infrastructure, public sector broadcasting, broadband access and take-up. It also addresses the effect of digitization on the "creative content industries," wherein lies its specific relevance to the law of copyright. In light of the Report, the © 2010 Isabella Alexander. t Newton Trust Lecturer in Law, University of Cambridge, Beachcroft LLP Fellow in Law and Director of Studies in Law, Robinson College, Cambridge. All errors are of course my own, but I am grateful to H. Tom:s G6mez-Arostegui for advice and assistance in researching the eighteenth century material, as well as helpful comments on the draft. 1. Digital Millennium Copyright Act, Pub. L. No. 105-304, 112 Stat. 2860 (1998). 2. DEP'T FOR CULTURE, MEDIA & SPORT & DEP'T FOR Bus. INNOVATION & SKILLS, DIGITAL BRITAIN FINAL REPORT, Cm 7650 (2009) [hereinafter DIGITAL BRITAIN FINAL REPORT], available at http://www.culture.gov.uk/images/publications/digitalbritain-final report-jun09.pdf.
    [Show full text]
  • COMMERCIAL Install the Customer Data
    Issue 70, May 2010 marketing advice and support to its franchisee and by failing to COMMERCIAL install the customer data. MGB Printing and Design Ltd v Kall Kwik UK Ltd This case adds nothing new to the law on negligence. [2010] EWHC 624 (QB) However, it highlights that a franchisor may owe its franchisee MGB Printing and Design (MGB) entered negotiations to a duty of care that exists separately from its contractual purchase an existing printing franchise with the franchisor, Kall obligations under the franchise agreement. In such a situation, Kwik UK Ltd (Kall Kwik). It became clear that the current exclusion and limitation of liability clauses in respect of pre- franchisee’s premises required refitting. Kall Kwik advised contractual statements and discussions, designed to prevent that this would cost between £10,000 and £20,000; £15,000 claims in misrepresentation, will not be of use. Care must thus was therefore included in the relevant cash flow document. be taken by franchisors when advising any potential franchisee, Kall Kwik also advised MGB that historical client data stored before entering into agreements. by the existing franchisee would be installed on MGB’s computers before the business launch. MGB made clear that it Handelsgesellschaft Heinrich Heine GmbH v would not purchase the franchise without this and Kall Kwik Verbraucherzentrale Nordrhein-Westfalen eV 15 C- confirmed that the installation would happen. 511/08 April 2010 (Unreported) Heine, a German mail-order company, had standard terms and The parties duly entered into a franchise agreement. MGB also conditions of sale that the consumer would pay a standard flat- entered into a sale and purchase agreement with the current rate of EUR4.95 for delivery costs and that this would not be franchisee.
    [Show full text]
  • United Kingdom
    FREEDOM ON THE NET 2014 United Kingdom 2013 2014 Population: 64.1 million Internet Freedom Status Free Free Internet Penetration 2013: 90 percent Social Media/ICT Apps Blocked: No Obstacles to Access (0-25) 2 2 Political/Social Content Blocked: No Limits on Content (0-35) 6 6 Bloggers/ICT Users Arrested: No Violations of User Rights (0-40) 15 16 TOTAL* (0-100) 23 24 Press Freedom 2014 Status: Free * 0=most free, 100=least free Key Developments: May 2013 – May 2014 • Filtering mechanisms, particularly child-protection filters enabled on all household and mobile connections by default, inadvertently blocked legitimate online content (see Limits on Content). • The Defamation Act, which came into effect on 1 January 2014, introduced greater legal protections for intermediaries and reduced the scope for “libel tourism,” while proposed amendments to the Contempt of Court Act may introduce similar protections for intermediaries in relation to contempt of court (see Limits on Content and Violations of User Rights). • New guidelines published by the Director of Public Prosecutions in June 2013 sought to limit offenses for which social media users may face criminal charges. Users faced civil penalties for libel cases, while at least two individuals were imprisoned for violent threats made on Facebook and Twitter (see Violations of User Rights). • In April 2014, the European Court of Justice determined that EU rules on the mass retention of user data by ISPs violated fundamental privacy and data protection rights. UK privacy groups criticized parliament for rushing through “emergency” legislation to maintain the practice in July, while failing to hold a public debate on the wider issue of surveillance (see Violations of User Rights).
    [Show full text]
  • Digital Economy Act Appeals Process
    Digital Economy Act Online Copyright Infringement Appeals Process Options for Reducing Costs The Department for Culture, Media and Sport has redacted some sections of this document as they refer to on-going policy development. The text in these sections has been blocked out. Contents Section Page Executive summary 2 Introduction 6 The cost drivers of the appeals process 8 Options for reducing the costs of the appeals process 14 Annex Page 1. International perspective 21 2. Digital Economy Act appeals grounds and determinations 26 3. Cost scenarios for the introduction by Government of an appeals fee 27 4. Comparisons to other appeals schemes 33 1 Section 1 Executive summary The online infringement of copyright provisions inserted into the Communications Act 2003 by the Digital Economy Act, 2010 place an initial obligation on internet service providers (ISPs), when informed by Copyright Owners, to notify subscribers of their unlawful behaviour by generating Copyright Infringement Reports (“CIRs”). It also requires that ISPs maintain records of the most frequent offenders, with a view to allowing Copyright Owners to take targeted legal action against these infringers. The Act gives Ofcom duties to draw up and enforce a code of practice to regulate the initial obligations imposed on ISPs. This Code must confer on internet subscribers the right to bring appeals relating to allegations of online copyright infringement and to acts or omissions under the code. Ofcom must also establish an independent Appeals Body to determine such appeals and sets out the minimum grounds for appeal. In the light of these functions, and with a view to ensuring effective implementation, DCMS has asked Ofcom to assess the likely cost and level of appeals under the existing proposals and advise on whether a subscriber fee might be needed in order to deter frivolous appeals, and how frivolous appeals could be avoided without the introduction of a fee.
    [Show full text]