Intermediary Liability & Gatekeeping Protecting Platforms for Freedom of Expression These slides were compiled by CDT in December 2012. They may be freely.

Slides:



Advertisements
Similar presentations
The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Advertisements

Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Armand Racine Consultant Chemicals Branch
Update on ISPM 15 IPPC Secretariat June 2012.
The use of Trademarks on the Internet: Problems and solutions Trademark owners perspective Marques cyberspace team September 2012.
Freedom of Speech (Part 3)
Net Neutrality, What Else? Wim Nauwelaerts Partner Hunton & Williams.
CHAPTER 4 E-ENVIRONMENT
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Human Trafficking and Slavery: A Global Problem
Module 7 Slide 1 NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 7 Enforcement.
Credit Reporting: What’s the role for the state? Fredes Montes Financial Infrastructure The World Bank.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Intellectual Property Boston College Law School February 4, 2009 Copyright – Indirect, Digital Issues.
MEDIA LAW Copenhagen University SESSION 10 Dirk VOORHOOF Ghent University (->contact)
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
FREEDOM OF EXPRESSION Salanieta Tamanikaiwaimaro (Sala T) - FIJI Controversy Conflict Who determines the balance??? Ethics.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
COPYRIGHT, LEGAL ISSUES & TAKEDOWN. 2 Work priorities Orphan Works ALRC review Copyright and the Digital Economy Creative Commons licenses Legal.
Standards and Guidelines for Web Page Publishing December 9, 2009.
HUMAN RIGHTS BASED APPROACH See Me Brewing Lab Cathy Asante.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Vatera.hu Notice and takedown (NTD) Protocol Gergely SzékelyJanuary 12, 2009 ICTrain 2009 eCommerce Day.
PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
ALAI Congress 2012 Kyoto, October 18, 2012 Breathing Space for Cloud-Based Business Models Prof. Dr. Martin Senftleben VU University Amsterdam Bird & Bird,
NRCCL (University of Oslo, Faculty of Law) Hyperlinks and search engines(I) Jon Bing Norwegian Research Center for Computers and Law Master Lecture 16.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Amicus Legal Consultants THE DEPLOYMENT OF SPECIAL INVESTIGATIVE MEANS IN PROACTIVE ANTI-CORRUPTION INVESTIGATIONS.
Best Practices for Online Service Providers The Communications Decency Act and Accusations of Defamation and Other Bad Behavior Marcia Hofmann, Staff Attorney.
Stephanie Muchai ARTICLE 19 KENYA Presentation for: “Bloggers Responsible And Ethical Use Of Online Freedom In The Election Period”
Norwegian Social Research Digital freedom for persons with disabilities: social regulation and redistribution in Europe and the US Dr Rune Halvorsen.
Michael Coonan Content Assessment International Training Program Melbourne, September 2006 Strategies for regulating online content.
What is Copyright? Copyright is a form of intellectual property protection granted under Indian law to the creators of original works of authorship such.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Social and Professional Issues in IT Roshan Chitrakar.
The law on Intermediary Liability in India
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Copyright for Book Artists Ariadni Athanassiadis Kyma Professional Corporation CBBAG, Ottawa December 11, 2013.
Victims Rights and the Standing of victims in criminal procedures Focus in judicial cooperation lies traditionally on the investigating authorities and.
The Internet of Things and Consumer Protection
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Overview of ONC Report to Congress on Health Information Blocking Presented to the Health IT Policy Committee, Task Force on Clinical, Technical, Organizational,
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
NGO/Associations Law- Benchmarks for a law that meets International Standards/Principles March 2010.
Intermediary responsibility and safe harbors – why they matter.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
The Internet and freedom of expression law Training workshop on media and freedom of expression law.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Protection of Personal Information Act An Analysis on the impact.
LESSONS FOR THE INDIAN LIABILITY FRAMEWORK. ACTUAL KNOWLEDGE ● Addressed intermediaries taking on an adjudicatory role and deciding on which content to.
Surveillance around the world
A trust-based framework for the data-driven economy
Online platforms Brussels, September 2016.
European actions.
Data Protection principles
The activity of Art. 29. Working Party György Halmos
Prof. Dr. Martin Senftleben Vrije Universiteit Amsterdam
Securing free and fair European elections
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
Presentation transcript:

Intermediary Liability & Gatekeeping Protecting Platforms for Freedom of Expression These slides were compiled by CDT in December They may be freely used or copied, with or without attribution, so long as their substantive content is not modified. They may also be used or copied in modified form, but versions with substantive modifications may not be attributed to CDT.

Defining “Internet intermediaries”  Platforms and conduits for expression, A2K, association, and commerce ISPsWeb hosts Search engines Any website that enables user commentary Registrars Registries DNS providersCloud computingCDNs Payment intermediaries

 Platforms and conduits for expression, A2K, association, and commerce  Essential for all Internet communication  Focal point for content regulation, social policy questions Defining “Internet intermediaries”

 What role should intermediaries play in advancing public policy goals?  What is the scope of their liability for user activity?  Should they take a more active role in policing user activity? Example policy areas: copyright enforcement, safeguarding national security, defamation & hate speech, protecting children, addressing illegal content Policy questions

 Global trend – governments and private entities want to enlist intermediaries to solve problems, address unlawful content  Direct liability and gatekeeping obligations  For legitimate purposes or as a pretext for censorship  But Internet and its intermediaries are general purpose; facilitate both: AND Why intermediaries?

 Intermediaries are risk-averse; fear of liability limits willingness to create platforms, allow user content  Self-censorship impacts controversial topics most  Many platforms would cease to exist if faced with too much liability risk or burdensome monitoring obligations In 60 seconds, over: 200,000 photos source 72 hours of video source 275,000 tweets source FOE flourishes where intermediary gatekeeping is minimized

 Privacy - Intermediaries may monitor and collect user data  Chilling effect on FOE  Can become a powerful and often nontransparent tool for censorship FOE flourishes where intermediary gatekeeping is minimized

 “No one should be liable for content on the Internet of which they are not the author, unless they have either adopted that content as their own or refused to obey a court order to remove that content.” 2005 Special Rapporteurs’ Joint Declaration on Int’l Mechanisms for Promoting Freedom of Expression source source  “(a) No one who simply provides technical Internet services such as providing access, or searching for, or transmission or caching of information, should be liable for content generated by others, which is disseminated using those services, as long as they do not specifically intervene in that content or refuse to obey a court order to remove that content, where they have the capacity to do so (‘mere conduit principle’). (b) Consideration should be given to insulating fully other intermediaries, including those mentioned in the preamble, from liability for content generated by others under the same conditions as in paragraph 2(a). At a minimum, intermediaries should not be required to monitor user-generated content and should not be subject to extrajudicial content takedown rules which fail to provide sufficient protection for freedom of expression (which is the case with many of the ‘notice and takedown’ rules currently being applied).” 2011 Special Rapporteurs’ Joint Declaration on Freedom of Expression and the Internet sourcesource FOE flourishes where intermediary gatekeeping is minimized

 Legal risk discourages innovation in new user-generated content models  Legal risk entrenches existing market players  Legal risk slows development of domestic Internet industries  Creates bad environment for investment Slows development of a country’s Internet economy Economic case for intermediary protections

 Broad immunity  e.g., US’s “Section 230” – immunity for wide range of content-based claims  Conditional safe harbor from liability  e.g., US DMCA for copyright; EU E-Commerce Directive for broader range  Limits liability as long as intermediary lacks specific knowledge and meets certain requirements  Requirements can vary by type of intermediary – “mere conduit,” data cache, content host, search engine Models for Protecting Intermediaries

 Chile & Canada  Intermediaries are held liable for third-party copyright infringement if they do not comply with a takedown order issued by a court. Notice-forwarding requirement.  India  Modeled on E-Commerce Directive, but 2012 regulations cast doubt on effectiveness of protections  Thailand  Computer Crimes Act – extends liability for unlawful activities to service providers that intentionally “support” or “consent” to them. Data-retention requirement.  China  Imposes liability and self-monitoring requirements for 3 rd party content at nearly every layer – content creator, content host, access provider Other National Approaches

 Clear guidance about what is valid “notice”  Must be highly specific to ensure targeted response  Sufficient evidence or legal attestations of illegality  Required actions must be narrowly tailored and proportionate  Safeguards are necessary to mitigate risk of abuse Principles for “Notice and Action”  Penalties for unjustified notice  Appeals system and due process  Transparency  Flexibility for service providers

 Required actions should not create an ongoing duty to monitor  No “notice and stay down”  Required “actions” must be appropriate for type of service  For example, notice-and-block for ISPs raises much more serious issues of proportionality  Actions that result in content takedown should be limited to contexts where illegality is straightforward  Compare defamation to copyright Principles for “Notice and Action”

 Governments may seek to impose direct requirements to prevent or punish illegal content  Believe intermediaries are well-positioned to take action  But obligations can impose severe costs on FOE and privacy, and undermine the certainty and benefits of liability protections Direct Gatekeeping Obligations

 Website blocking  Technical approaches vary and can have very overbroad impacts  Can be costly  Domain seizures  Can be overbroad; raises difficult jurisdictional questions  In US, concerns about due process  Licensing and Content Regulation  Carry-over from mass media regulation; limits opportunities for online expression  Warning or Punishing individual users  E.g. “graduated response” or notice-forwarding requirements  Can provide educational function, but punitive actions raise due process concerns Direct Gatekeeping Obligations

 Does the law protect intermediaries from criminal or civil liability for third-party activity?  If yes:  What kinds of intermediaries qualify for protection?  What kinds of legal claims does the law apply to?  How does the intermediary qualify for protection? For example:  By transmitting without modification or selection of content (“mere conduit”)?  No direct financial benefit?  Take “action” upon notice – remove or block content, pass on notice, retain data, suspend user? Key questions for analyzing national law I  No actual knowledge?

 Does the law make clear that intermediaries may not be compelled to actively monitor and police user activity?  Does the law place affirmative obligations on intermediaries?  How burdensome? What will be the effect on investment?  How will users’ FOE and A2K rights be affected?  Are there procedural protections for FOE? Recourse in case of mistakes?  Is there risk of overbroad impact? Key questions for analyzing national law II

If the law takes a “notice and takedown” approach:  Who can provide notice? For what kinds of alleged offenses?  What form must notice take?  How quickly must content be taken down?  Are there safeguards against abuse?  Transparency  Appeals and due process  Penalties for unjustified notice Key questions for analyzing national law III

 User-empowerment tools – users control their content choices  Key is user control, not central mandates  Increased coordination and enforcement against posters of illegal content (rather than intermediaries)  Requires strong rule-of-law and due process to protect right to anonymity Alternatives: How to address illegal content?

 Voluntary actions by intermediaries  More flexible than gov’t mandates, but vulnerable to procedural abuses  Must avoid “end run” around limits on state action  Must be transparent and inclusive in development  “Follow the money”  Focus on business relationships behind illegal content, rather than unaffiliated Internet intermediaries  Avoids technical problems of approaches focused on communications intermediaries  Powerful tool, but pose risk to FOE if used against controversial but lawful sites Alternatives: How to address illegal content?

 CDT, Shielding the Messengers: Protecting Platforms for Expression and Innovation, December 2012Shielding the Messengers: Protecting Platforms for Expression and Innovation  In-depth examination of intermediary liability protections and alternatives  CDT Advocacy Toolkit with additional papers and resourcesAdvocacy Toolkit Additional resources