Law & Technology Master Thesis Is “Three Strikes and You're Out”

Total Page:16

File Type:pdf, Size:1020Kb

Law & Technology Master Thesis Is “Three Strikes and You're Out” Law & Technology Master Thesis Is “three strikes and you’re out” an appropriate measure for online copyright infringement? Manpreet Kaur Singh ANR: 328611 Email: [email protected] Thesis Supervisor: S.L. (Sander) Gellaerts Law and Technology, Faculty of Law Tilburg University June 2011 Table of Contents 1. INTRODUCTION ..............................................................................................................................4 1.1 Background .................................................................................................................................... 4 1.2 Research Question ......................................................................................................................... 5 1.3 Methodology ................................................................................................................................. 6 1.4 Intended Outcome ......................................................................................................................... 7 1.5 Thesis Structure ............................................................................................................................. 7 2. RESPONSE TO COPYRIGHT INFRINGEMENT .....................................................................................9 2.1 Introduction ................................................................................................................................... 9 2.2 Copyright Law ................................................................................................................................ 9 2.2.1 Relevance of Copyright Law .................................................................................................... 9 2.2.2 Music, Film and Games Sub-industries .................................................................................. 10 2.2.3 Accurate and Reliable Figures? - Costs of Copyright Infringement ......................................... 12 2.3 History – The copyright journey ................................................................................................... 15 2.3.1 The 15 th Century and 16 th century ......................................................................................... 15 2.3.2 The 17 th Century .................................................................................................................... 17 2.3.3 The 18 th Century .................................................................................................................... 18 2.3.4 The 20 th century onwards ...................................................................................................... 19 2.3.5 EU Copyright Law and US Copyright Law ............................................................................... 20 2.4 Measures to combat copyright infringement ............................................................................... 21 2.4.1 The 4 Modalities – Law, Technology, Social Norms and Market ............................................. 22 2.4.2 [LAW] Notice and Takedown ................................................................................................. 24 2.4.3 [LAW] Litigation .................................................................................................................... 24 2.4.4 [LAW] Graduated Response and Three strikes approach ....................................................... 25 2.4.5 [LAW] ADR System modeled on ICANN’s UDRP...................................................................... 29 2.4.6 [TECHNOLOGY] DRM ............................................................................................................. 29 2.4.7 [SOCIAL NORMS] Education................................................................................................... 31 2.4.8 [MARKET] Business Models ................................................................................................... 31 2.4.9 US and EU – Comparisons and Conclusions ........................................................................... 32 Page 2 of 70 3. ACCESS TO INTERNET ................................................................................................................... 36 3.1 Introduction ................................................................................................................................. 36 3.2 History from then to today: The internet journey ......................................................................... 36 3.3 Internet as a right ........................................................................................................................ 38 3.3.1 Freedom of Expression .......................................................................................................... 38 3.3.2 Freedom of Information ........................................................................................................ 40 3.3.3 Freedom to access information, Human rights declaration – does it translate to a right to internet access? ............................................................................................................................. 40 3.3.4 Is it a right? ........................................................................................................................... 41 3.4 Is right of Access to Internet important in society? ....................................................................... 44 4. PROPORTIONALITY – AN APPROPRIATE MEASURE? ....................................................................... 46 4.1 Introduction ................................................................................................................................. 46 4.2 Determining Appropriateness ...................................................................................................... 46 4.2.1 Proportionality and Subsidiarity ............................................................................................ 46 4.2.2 Examples of Disproportionate and Proportionate damages ................................................... 48 4.3 Back to basics – purpose of copyright law .................................................................................... 51 4.4 Proportionality ............................................................................................................................. 53 4.5 Subsidiarity .................................................................................................................................. 54 4.6 The Future ................................................................................................................................... 55 5. CONCLUSION................................................................................................................................ 57 BIBLIOGRAPHY ................................................................................................................................. 59 Page 3 of 70 1. INTRODUCTION 1.1 Background Copyright is a legal term describing rights given to creators for their artistic and literary works. The original creators of works protected by copyright, and their heirs, have certain basic rights which include the exclusive right to use or authorize others to use the work on agreed terms. The creator of a work can prohibit or authorize the work’s reproduction, its public performance, a recording of it, its broadcasting, its translation or its adaptation. The creator or the owner of the copyright in a work can enforce rights upon evidence of copyright infringement. Many of these creative works protected by copyright require mass distribution, communication and financial investment for their dissemination and therefore the creators often sell their works to individuals or companies in return for payment. The entertainment conglomerate comprising of the film, music and gaming industries as a whole holds a lot of these exclusive rights and are feeling a sense of urgency especially in today’s world in wanting to combat copyright infringement. According to Frances Moore, CEO of the International Federation of the Phonographic Industry (IFPI), an organization that represents the recording industry worldwide, the key statistic published in its report of 2011 summed up the story of recent years – “on one hand, spectacular growth in digital revenues, up more than 1000 per cent in seven years; but on the other hand, the loss of nearly one-third of the value of the entire recorded music industry” 1. The report goes on to state that digital music piracy exists on a vast scale and is growing globally with illegal file-sharing on peer-2-peer (P2P) networks remaining in widespread existence, and alternative forms of illegal distribution such as cyberlockers, illegal streaming services and forums also a serious and growing problem. 2 The industry has employed several methods of reducing copyright infringement such as through education, innovation, and enforcement 3. Litigation has also been at the forefront of the copyright combating saga. For example, the Recording Industry Association of America (RIAA) has been pursuing copyright infringers directly through massive litigation for a 5 year continuous period from 2003 to 2008. 4 Although the judgments have been favorable for the industry, it has been noted that the reputation of the music industry has soured in the eyes of many young users 5 – the very clients that the industry are trying to entice. Was this appropriate? The question of appropriateness
Recommended publications
  • Vrije Universiteit Brussel Surveillance and Regulating Code: an Analysis of Graduated Response in France Meyer, Trisha; Van Aude
    Vrije Universiteit Brussel Surveillance and regulating code: an analysis of graduated response in France Meyer, Trisha; Van Audenhove, Leo Published in: Cyber-surveillance in everyday life: international workshop Publication date: 2011 Document Version: Accepted author manuscript Link to publication Citation for published version (APA): Meyer, T., & Van Audenhove, L. (2011). Surveillance and regulating code: an analysis of graduated response in France. In Cyber-surveillance in everyday life: international workshop General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 04. Oct. 2021 “Cyber-surveillance in Everyday Life” international workshop 12-15 May 2011, University of Toronto Surveillance and regulating code: An analysis of graduated response in France Trisha Meyer & Leo Van Audenhove ABSTRACT This paper analyzes a recent policy initiative in France to deter copyright infringement. In 2009, France passed two laws aimed at fighting online piracy through graduated response, a warning & sanction system.
    [Show full text]
  • Meyer & Van Audenhove
    Vrije Universiteit Brussel The Internet: an open communication network? Studying online copyright enforcement policy from a communication science perspective Meyer, Trisha; Van Audenhove, Leo Published in: IAMCR: Cities, creativity, connectivity Publication date: 2011 Document Version: Accepted author manuscript Link to publication Citation for published version (APA): Meyer, T., & Van Audenhove, L. (2011). The Internet: an open communication network? Studying online copyright enforcement policy from a communication science perspective. In IAMCR: Cities, creativity, connectivity General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 05. Oct. 2021 IAMCR - Communication Policy and Technology (CP&T) section July 13-17, 2011, Istanbul (Turkey) ʻCities, Creativity, Connectivityʼ ʻThe Internet: an open communication network? Studying online copyright enforcement policy from a communication science perspective.ʼ by Trisha Meyer and Leo Van Audenhove ABSTRACT This paper aims to provide a theoretical framework for analyzing the impact of online copyright enforcement policies on the democratic potential of the Internet to be an open communication network.
    [Show full text]
  • Meyer & Van Audenhove
    Vrije Universiteit Brussel The Internet: an open communication network? Studying online copyright enforcement policy from a communication science perspective Meyer, Trisha; Van Audenhove, Leo Published in: IAMCR: Cities, creativity, connectivity Publication date: 2011 Document Version: Accepted author manuscript Link to publication Citation for published version (APA): Meyer, T., & Van Audenhove, L. (2011). The Internet: an open communication network? Studying online copyright enforcement policy from a communication science perspective. In IAMCR: Cities, creativity, connectivity General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 27. Sep. 2021 IAMCR - Communication Policy and Technology (CP&T) section July 13-17, 2011, Istanbul (Turkey) ʻCities, Creativity, Connectivityʼ ʻThe Internet: an open communication network? Studying online copyright enforcement policy from a communication science perspective.ʼ by Trisha Meyer and Leo Van Audenhove ABSTRACT This paper aims to provide a theoretical framework for analyzing the impact of online copyright enforcement policies on the democratic potential of the Internet to be an open communication network.
    [Show full text]
  • Article Surveillance and Regulating Code: an Analysis of Graduated
    Surveillance and Regulating Code: Article An Analysis of Graduated Response in France Trisha Meyer Institute for European Studies and Vrije Universiteit Brussel, Belgium. [email protected] Leo Van Audenhove IBBT-SMIT and Vrije Universiteit Brussel, Belgium. _____________________________________________________________________________________ Abstract This paper analyzes a recent policy initiative in France to deter copyright infringement. In 2009, France passed two laws aimed at fighting online piracy through graduated response, a warning and sanction system. Graduated response depends on surveillance of Internet uses and encourages technological regulation (code), such as Internet filtering and blocking. We analyze the rationales advocated for copyright and the Internet and the argumentation for surveillance and technical protection measures. In the French debate on graduated response, much attention was given to the policy goal, reducing piracy, while the means of reaching the policy goal, surveillance and code, were rarely discussed. Graduated response deals with much more than copyright. It promotes informational control by copyright holders and contributes to the normalization of surveillance and to an increase of centralized control on the Internet. Keywords: Surveillance, Internet regulation, Graduated response, Copyright, France, Policy analysis _____________________________________________________________________________________ Introduction In 2009, France passed two laws aimed at fighting online piracy through graduated
    [Show full text]
  • Enough-Poverty.Pdf
    1586485115-Thurow:Layout 1 4/14/09 1:14 PM Page i ENOUGH 1586485115-Thurow:Layout 1 4/21/09 12:37 PM Page ii Hunger in Africa Based on the 2008 Global Hunger Index for Africa. Compiled by the International Food Policy Research Institute, Concern Worldwide, and Welt Hunger Hilfe, the index combines these indicators: the percentage of people who are under- nourished (estimated); the percentage of children under the age of five who are underweight; and the mortality rate of children under the age of five. The index ranks the countries on a 100-point scale, with 0 being the best score (no hunger). 1586485115-Thurow:Layout 1 4/14/09 1:15 PM Page iii ENOUGH Why the World’s Poorest Starve in an Age of Plenty ROGER THUROW and SCOTT KILMAN With the support of New York 1586485115-Thurow:Layout 1 4/14/09 1:15 PM Page iv Copyright © 2009 by Roger Thurow and Scott Kilman Published in the United States by PublicAffairs™, a member of the Perseus Books Group. All rights reserved. Printed in the United States of America. No part of this book may be reproduced in any manner whatsoever without written permission except in the case of brief quotations embodied in critical articles and reviews. For information, address PublicAffairs, 250 West 57th Street, Suite 1321, New York, NY 10107. PublicAffairs books are available at special discounts for bulk purchases in the U.S. by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 2300 Chestnut Street, Suite 200, Philadelphia, PA 19103, call (800) 810-4145, ext.
    [Show full text]
  • Digital Confidence Securing the Next Wave of Digital Growth
    Digital Confidence Securing the Next Wave of Digital Growth POLICY SERIE S Digital Confidence Securing the Next Wave of Digital Growth übersetzt aus dem Englischen DIGITAL CONFIDENCE: KEY TAKEAWAYS 4 I. EXECUTIVE SUMMARY 7 II. THE NEXT GROWTH WAVE IN DIGITAL LIFE: USAGE, 15 NOT THE NUMBER OF USERS, DRIVES GROWTH 1. Digital Life: Introduction ................................................................................................................................................................... 15 2. Digital Life: A Defining Force in Today’s Economy, Politics, Society, and Education .............................. 16 3. Revenue and Growth Drivers: Content and Advertising, Not Access ................................................................. 23 III. DIGITAL CONFIDENCE: SECURING THE FUTURE GROWTH OF DIGITAL LIFE 27 1. Threats to Digital Life .......................................................................................................................................................................... 27 2. Digital Confidence: Concept and Overview .......................................................................................................................... 28 3. Network Integrity and Quality of Service .............................................................................................................................. 30 4. Privacy and Data Protection ...........................................................................................................................................................
    [Show full text]
  • Vrije Universiteit Brussel Surveillance and Regulating Code: an Analysis of Graduated Response in France Meyer, Trisha; Van Aude
    Vrije Universiteit Brussel Surveillance and regulating code: an analysis of graduated response in France Meyer, Trisha; Van Audenhove, Leo Published in: Surveillance & Society Publication date: 2012 Document Version: Final published version Link to publication Citation for published version (APA): Meyer, T., & Van Audenhove, L. (2012). Surveillance and regulating code: an analysis of graduated response in France. Surveillance & Society, 4(9), 365-377. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 06. Oct. 2021 Surveillance and Regulating Code: Article An Analysis of Graduated Response in France Trisha Meyer Institute for European Studies and Vrije Universiteit Brussel, Belgium. [email protected] Leo Van Audenhove IBBT-SMIT and Vrije Universiteit Brussel, Belgium. _____________________________________________________________________________________ Abstract This paper analyzes a recent policy initiative in France to deter copyright infringement. In 2009, France passed two laws aimed at fighting online piracy through graduated response, a warning and sanction system.
    [Show full text]