Strategies for Reducing Digital Piracy

Strategies for Reducing Digital Piracy

THE INFORMAtiON TECHNOLOGY & INNOVAtiON FOUNDAtiON Steal These Policies: Strategies for Reducing Digital Piracy BY DANIEL CASTRO, RICHARD BENNETT AND SCOTT ANDES | DECEMBER 2009 We need to open a broad Executive Summary dialogue that engages all stakeholders, including he rise of broadband Internet access and cheap storage, along government, content with the growth of digital content, has enabled digital pi- owners, website racy to flourish around the world. Piracy enables the unau- operators, technolog y T thorized distribution of music, movies, television programs, software, developers, and ISPs video games, books, photos, and periodicals quickly and easily, to the and other intermediaries, on how to improve the detriment of creative artists and legitimate rights holders. These prac- global response to piracy. tices threaten not only the robust production of digital content in the future, but U.S. jobs in the present. Unfortunately, many advocates, believing that information should be free, would have government not only turn a blind eye to digital piracy, but actively tie the hands of companies who seek to limit digital piracy. This report makes the case that digital piracy is a serious problem with significant ramifica- tions for the U.S. economy, that a number of approaches, including technical solutions such as content identification, are needed to reduce piracy, and that governments should support legitimate industry ef- forts to reduce digital piracy, including those that focus on the revenue streams of those engaging in piracy. There is no “silver bullet” that will solve controls such as locks, closed-circuit the piracy problem—no single technical TV, and anti-theft packaging as well or legislative proposal will completely as a government-funded system of law solve such a complex issue—but there enforcement, digital piracy requires a are many “lead bullets” that can help coordinated approach. Much of this ef- reduce piracy. Just as preventing theft fort will likely come from industry, but ITIF in the offline world requires a combi- government has an important role to nation of industry-backed technical play in protecting the intellectual prop- erty of copyright holders as a strong legal system is the As the leading global producer of digital content, the bedrock of commerce in both the digital and analog impact of piracy on the United States is substantial, world. In addition, government should not preclude with U.S. companies annually losing billions of dollars those impacted by digital piracy, including copyright and eliminating or never creating tens of thousands holders and ISPs, from taking steps to limit digital pi- of jobs. Although piracy is a serious problem in the racy. United States, it is even more serious in many other parts of the world, especially emerging markets. The Not every effort to reduce digital piracy should be em- Business Software Alliance found, for example, that braced, of course, but there should be no doubt that although software piracy declined or remained the efforts clearly directed at digital piracy can be and same in over eighty percent of countries, global piracy usually are different from the over-broad, ineffective still increased by 3 percent in 2008 because of rapidly methods that are often held up for criticism. In fact expanding growth in PC ownership in high piracy re- there are many technologies available to confront digi- gions such as Asia and Eastern Europe. tal piracy that are cost-effective and only impinge on the “freedom” to steal. Much more can and should Digital piracy will never be completely stamped out, be done to limit digital piracy and we need to open a but it can be dramatically reduced. To do so, though, broad dialogue that engages all stakeholders, including requires the implementation of a wide array of means, government, content owners, website operators, tech- including education of consumers, a range of technical nology developers, and ISPs, on how to improve the solutions, and of course, more aggressive enforcement global response to the problem of piracy. Toward that of the legal rights of copyright holders. end, this report recommends that policymakers: To change social behavior, some content owners have Support, rather than impede, anti-piracy inno- tried to educate users on the impact of piracy through vation, including the development of new marketing campaigns. These tactics work in parallel technical means. with efforts to provide users legal means to access con- tent, such as developing new forms of distribution like Encourage coordinated industry action to take the iTunes store or Hulu. steps to fight digital piracy, including steps like ISP implementation of graduated response sys- Technical controls, including digital rights manage- tems. ment (DRM), network management, and content identification systems, can also be used to make piracy More actively pursue international frameworks more difficult. DRM technology prevents unauthor- and action to protect intellectual property, in- ized use, such as enforcing licensing requirements on cluding digital content. software or preventing content from being duplicated. Network management techniques, including bit caps Widespread piracy over the Internet seriously harms and traffic shaping, can help reduce piracy and at the artists, the famous and struggling alike, who create same time the load on broadband networks, reduc- content, as well as the technicians who produce it. It ing costs and improving the quality of Internet access ultimately also hurts law-abiding consumers who must for the vast majority of law-abiding broadband users. pay higher prices for content, enjoy less content, or pay Content identification systems recognize copyrighted higher prices for Internet access to compensate for content so that copyright owners can take steps to re- the costs of piracy. Moreover, digital piracy not only duce digital piracy. Using these systems, copyrighted results in the unauthorized distribution of content, it content can be detected by automated means if oth- hurts the ability of content producers to create legiti- ers try to share it on filesharing networks or websites. mate business models for selling digital content; as the The technology can be deployed at various locations, saying goes, “It’s hard to compete with free.” While including on peer computers on file sharing networks, many companies have rallied to the challenge and cre- on the servers of user-generated content websites, ated compelling businesses to sell content legally, on on consumer electronics, and at the ISP level as data the whole, digital content is more profitable to distrib- passes through networks into and out of network end- ute illegally than legally and always will be. points. THE INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | DECEMBER 2009 PAGE II Some advocacy groups aligned with the information Supreme Court made clear that owners of applications commons movement have condemned the use of many or services designed to enable file sharing of copy- of these technical controls largely because they believe righted content could be held liable for infringement that copyright holders should have fewer rights and by third-parties. Some individuals establishing such that piracy is not a problem. They argue that such tools piracy tools or websites have responded by trying to are ineffective, costly and destructive to the rights of find shelter to continue this activity in countries with Internet users. These criticisms, however, are flawed weak enforcement regimes. and inaccurate. Anti-piracy solutions, including con- tent identification technology such as watermarking Content owners have also begun to send notices of and fingerprinting, are mature, highly accurate and copyright infringement to Internet users so they be- widely available. The cost of these systems varies by come aware that they are responsible for their actions implementation, but if the benefit in reduced piracy online and can take steps to prevent unauthorized use, outweighs the cost of implementation, then it makes such as securing a wireless router or supervising a teen- strategic sense to use the technology. These systems ager, before facing more serious consequences for mis- can easily be implemented with safeguards to ensure use. Content owners can identify individual Internet user privacy and protect free speech while still protect- users suspected of illegal file sharing and then ask the ing the rights of copyright owners. user’s ISP forward on the notice to the user. ISPs can provide a graduated response to continued violations These advocates also express fears that anti-piracy of copyrighted content by the same user, by providing measures would somehow violate the Internet archi- additional warnings, and incremental punishment, up tecture. The Internet architecture is no more friendly to and including a termination of the service. A num- to piracy than to law-abiding uses; the Internet was de- ber of countries, including France, the United King- signed to serve as a testbed for experimentation with dom, South Korea, and Taiwan have implemented or legitimate network applications, protocols, and ser- are in the process of implementing this type of “three vices, not as a monument to technology as it existed strikes” system with safeguards in place to ensure citi- at a particular moment in time. If the Internet has a zens’ rights are protected. Such legal regimes and co- central principle, it is one of continual improvement. operative agreements

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    33 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us