Stakeholders' dialogue on illegal uploading and downloading:

Slides:



Advertisements
Similar presentations
Technical measures in the context of the Hadopi Law (France)
Advertisements

External Trade 1 5th Global Congress Combating Counterfeiting and Piracy Global and Regional IPR Enforcement Initiatives Luc-Pierre Devigne Head of Intellectual.
P2P Media Summit LA May 2009 Mitchell Edwards CFO & GC BitTorrent, Inc.
© Copyright IBM Corporation 2009 IBM Global Business Services Innovation driving strategic choices for P2P Saul Berman Global & Americas Leader, IBM Strategy.
P2P Market Conference March 2009 Mitchell Edwards CFO & GC BitTorrent, Inc.
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Multivendor Interoperability
© 2009 Sports broadcast piracy: An overview David Price Head of Piracy Intelligence Envisional.
Measuring Online Copyright Infringement Justin Le Patourel Copyright evidence seminar, Friday 13 th September 2013.
Northside I.S.D. Acceptable Use Policy
Current thinking. Subject to change. October 2011 BENEFITS OF BUILDING AN IN-HOUSE CONTENT DISTRIBUTION NETWORK (CDN)
© JANET(UK) 2011 Running a Public Communications Service Andrew Cormack Chief Regulatory Adviser, Janet
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities.
Copyright in the digital age Mark Smith 8 July 2010.
Tackling Online Piracy without Harming Consumer Rights IES - IBBT Workshop Strengthening the European Information Society - Consumers in Media Policy and.
Toolbox Mirror -Overview Effective Distributed Learning.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Networking Components Chad Benedict – LTEC
Raising awareness in relation to copyright – Facing piracy Christian Sommer Chairman of the Board German Federation against Copyright Theft (GVU)
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Surveys of Media Access and Consumer Attitudes on Copyright Mike Palmedo & Jimmy Koo March 2011 Photo (cc) Irish Typepad (bit.ly/huMnIf)
 Internet vs WWW  Pages vs Sites  How the Internet Works  Getting a Web Presence.
Online infringement of copyright - the Digital Economy Act June 2010 Robin Fry.
Since 2007, the sales of Digital Music has increased from 20% to 36%. While this increase is good, the sale of Physical Music (CDs) has fallen from 80%
Net Neutrality and its implications JANVIER NGNOULAYE, PhD. University of Yaounde 1 – Cameroon The African Internet Governance Forum.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Downloading Digital Media
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
Unethical use of Computers and Networks
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
BRIDGING THE DIGITAL DIVIDE A Basic Understanding.
VOD: a new opportunity for independent distributors? Jean-Marie Le Guen NPA Conseil, Europa Distribution Conference, Estoril, Portugal, November 21st 2008.
Technical Measures DISCLAIMER: NO LEGAL STUFF NO FINANCIAL STUFF WE RESPECT DIVERSITY IN BUSINESS SYSTEM, PHILOSOPHY AND.
Company Presentation +1 (657)
Othman Othman M.M., Koji Okamura Kyushu University 1.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Internet Protocol TeleVision
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Operational Circular No 5 Use of CERN Computing Facilities.
MEDIA BY DAVID TEMBO. OBJECTIVES  Description on the current state of the media  Explain in detail Reasons:  File sharing  Piracy  Digital media.
Definition of Internet Piracy Definition of Internet Piracy Internet Piracy The unlawful reproduction and/or distribution of any copyrighted digital file.
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
Cryptography and Network Security
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Earn money by sharing files on P2P networks
IPv6 – The New Technology to Embrace Product Management Group Enterprise Data Product.
Internet Acceptable Use Policy
Anti-Spam Managing Spam with Kerio Connect
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
Enabling Secure Internet Access with TMG
Basic Policy Overview Palo Alto.
Who should be responsible for risks to basic Internet infrastructure?
Background Because of the large amount of copyright infringement and piracy many companies are reaching and claiming that ISPs should be responsible for.
Ethical issues in relation to Copyright
E-safety Parent Workshop
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
ethical issues in business
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
– Communication Technology in a Changing World
Unit# 5: Internet and Worldwide Web
Presentation transcript:

Stakeholders' dialogue on illegal uploading and downloading: Technical measures which can be used to identify and prevent IPR infringement Brussels, 2 June 2010 Jeremy Banks Director of Anti-Piracy jeremy.banks@ifpi.org

Contents Overview Technical Options Choosing The Best Option Conclusion Strictly Privileged and Confidential

Overview IFPI estimates 19 out of 20 music files downloaded online are illegal; 65 % (approx 49 billion) relate to P2P Most ISPs do not take any steps to address music piracy by their customers on P2P networks Whatever the structure of the specific piracy problem, every person that accesses the Internet must do so through an ISP, and each ISP has the capability to exercise certain technical and commercial controls over the traffic that is generated by its own customers Strictly Privileged and Confidential

Technical Options Main Options: URL Blocking/Filtering IP Address Blocking/Filtering Protocol Blocking/Filtering Bandwidth Capping/Shaping Content Blocking/Filtering (Hash or Payload) User Segregation Solutions can be applied at: Network level (all subscribers) Segment level (some subscribers) User level (a subscriber) Strictly Privileged and Confidential

Technical Options Discussions as part of the UK OFCOM MOU; most Options are technically feasible Protocol and Hash filtering independently tested and implemented as part of HADOPI URL / IP Address filtering successfully implemented as part of the UK Internet Watch Foundation process and a number of legal rulings against The Pirate Bay A number of the Options already used by ISPs as part of their day to day traffic and security management Strictly Privileged and Confidential

Technical Options Must not lose site of remaining 35% i.e. non-P2P of the illegal music download problem Most of the same technical Options can be applied to www, news, e-mail, trackers and mobile network traffic to prevent the illegal downloading of music files In addition, non-P2P is ideally suited to the use of site blocking (URL and IP address) as seen with The Pirate Bay Strictly Privileged and Confidential

Choosing The Best Option In the UK - the threat of a sanction is potentially twice as effective than a deterrent notice alone (Harris Interactive, 2009) - whilst receiving a letter concerns 3 out of 4 file sharers, without follow up action its deterrent effect is substantially weakened (Harris Interactive, 2009) - 45% of UK consumers who have pirated online content would definitely stop their activity if a ‘3 strikes’ model was introduced (EMR, 2009) In New Zealand 62% of youths would probably stop accessing illegal movies online if they thought their connection could be terminated (Synovate, 2009) In Hong Kong 82% of respondents said they would be likely to stop downloading unauthorised copies if risk that internet access would be suspended after the implementation of a notice, warning and consequence scenario (APCO Asia, 2009) In France 90% of consumers would stop downloading music from the internet if they received two warnings from their ISP. Among illegal downloaders, 88% would stop (IPSOS, 2008) Strictly Privileged and Confidential

Choosing The Best Option Infringing users receive warning notices followed by an effective deterrent sanction for those who do not stop Research demonstrates that the threat of a sanction is potentially significantly more effective than a deterrent notice alone Sanction needs to go beyond simply blocking P2P infringing activity otherwise users have no incentive to stop. There are several ways to do this, for example a combination of protocol filtering and bandwidth restriction for a predefined period of time Combinations of proven technology allow granulated approach to continue to allow ‘core’ e.g. VoIP, TV services to function but ultimately the simplest/most proportionate course of action is account suspension Strictly Privileged and Confidential

Conclusion Proven technologies exist which allow ISPs to prevent the illegal downloading of music files whilst at the same time allowing their customers to continue to access ‘core’ services Many are already in use by ISPs as part of their day to day traffic and security management Range of Options proven to be technically feasible Strictly Privileged and Confidential

THANK YOU Jeremy Banks Director of Anti-Piracy jeremy.banks@ifpi.org +44-20-7878-6804