User-Generated Content (UGC) in Your Games. LittleBigPlanet.

Slides:



Advertisements
Similar presentations
Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
Advertisements

The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Internet Service Provider Liability Under U.S. Copyright Law Paula Pinha, Attorney-Advisor U.S. Copyright Office East Africa Regional Seminar on: Copyright.
Hart District Acceptable Use Policy Acceptable Use Policy.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Game Industry Roundtable Lessons from Video Game Litigation: Enforcing Rights and Avoiding Risks Susan Fahringer Will Rava.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
ISP Liability for Defamation and Copyright Violation Richard Warner.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Copyright Law Boston College Law School February 25, 2003 Rights - Reproduction, Adaptation.
Social Networking in Education Presented by Justin R. Clark.
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
From reporting to empowering Trish Church – Mobile & Broadband Services Safety Manager, Orange UK presentation to Hertfordshire Governors’ Conference 15.
Copyright 2008 The Prinz Law Office. 1 Employee Blogs and Websites: How to Protect Your Company from the Legal Risk of Workers Going Online By Kristie.
Tia Dimou.  The internet is a wonderful resource for people of all ages  Users must be cautious and aware of what information they input  Credit card.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Cyber Crimes.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Digital Millennium Copyright Act (“DMCA”). Common MLS Issue Listing Agent uploads infringing photo –Examples All members republish photo on IDX sites.
Internet regulation National limits of Internet Content.
Best Practices for Online Service Providers The Communications Decency Act and Accusations of Defamation and Other Bad Behavior Marcia Hofmann, Staff Attorney.
Copyright and the DMCA MM450 Issues in New Media Theory February 17, 2009 Steven L. Baron.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The Legal, Safe and Ethical Use of Technology in the Classroom Gabriella Wheeler s
Digital Citizenship Created By: Kelli Stinson June 2011.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Internet Content Liability David S. Bralow CUNY October 15, 2012.
Class 21 Copyright, Winter, 2010 Online Distribution Randal C. Picker Leffmann Professor of Commercial Law The Law School The University of Chicago
Open Innovation and Social Networking Communities: Ownership and Licensing of Intellectual Property Prepared by Sean F. Kane Principal, Kane & Associates.
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Copyright Grace, Ienash, Nick. Copyright - International  Instruments of copyright  World Intellectual Property Organisation and EU Convention on Cybercrime.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
Online Safety Parent Workshop Helping to keep your children safe online.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Intermediary responsibility and safe harbors – why they matter.
Laws and Rules That Govern Internet Safety Ashley Martin.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
Hosting Wide-Area Network Testbeds: Policy Considerations Larry Peterson Princeton University.
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
E-Safety Parent Talk Helping to keep your children safe online.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
E-safety Parent Workshop Helping to keep your children safe online.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
Acceptable Use Policy (Draft)
Surveillance around the world
Chapter 9: Internet Law, Social Media, and Privacy
E-Safety Briefing
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Chapter 10 Cyberlaw, Social Media, and Privacy
Internet Service Provider Liability Under U.S. Copyright Law
Emily Snyder, William Darras, Stephanie Berger
A Gift of Fire Third edition Sara Baase
The Issues with Technology in education
Student User Agreement and Policy 2022
A Gift of Fire Third edition Sara Baase
Presentation transcript:

User-Generated Content (UGC) in Your Games

LittleBigPlanet

Guitar Hero World Tour Music Studio

Xbox Live Community Games

iPhone Apps Store

User-Generated Content (UGC)  UGC in games often appears in one of four ways:  Allowing users to create or upload content in a game  Providing a marketplace for user created games  Providing user communities or other interactive areas  Unintended UGC

Agenda  Enforcement  Privacy  Statutory protections and its limitations  How courts view (or might view) UGC in games Joe Cutler Lisa OratzWill Rava Susan Lyon

Enforcement Joe Cutler

Protecting Against Abuse and Cybercrime  Evolving World of Cybercrime  Hacking  Spamming  Child-Related Crimes (pedophilia, kidnapping, exposure to extreme content)

Preparing to Respond to Platform Abuse  Consider the interaction between computer and console  Consider the logs you create and maintain  Mac Addresses  IP Addresses  Logs of UGC Activity  Filter Logs  Location Logs

Preparing to Respond to Platform Abuse  Consider the danger of console hijacking (botnets)  Consider design and protections for location-based services (handheld devices and proximate messaging)

Responding to Law Enforcement Requests  Review and understand the nature of your platform features under ECPA  Create and maintain a program for responding to law enforcement requests  Don't assume the "official" requests are "legal" requests  Maintain relationships with key law enforcement agencies

Be Prepared  Take time to anticipate attacks  Create and keep appropriate log files  Create a standard procedure for responding to law enforcement requests  Have counsel on-hand that understands your business to challenge burdensome requests  Stay abreast of evolving threats

Privacy Susan Lyon

Images and Likeness  US – Right of Publicity/Invasion of Privacy  EU – EU Directive on Data Protection  Canada – PIPEDA  Australia – Privacy Act

Chang v. Virgin Mobile, USA 16

Privacy, Italian Style

Children's Privacy & Safety  COPPA  Child Porn Reporting  State Child Safety Laws

Canada Regulates Second Life? Commissioned Report  Volume of information available to host  Ability of host to misuse the collected information  Lack of privacy protections within virtual world  Potential for government and private party in-world surveillance

Key Privacy Takeaways  Make clear what is anonymous v. Limited v. Public  Terms of use – rep and warrant model releases obtained  Consider monitoring or offering self reporting for privacy sensitive content  Consider blocking children  Set up processes to comply with child porn reporting requirements

Statutory Protections and their Limitations Lisa Oratz

Content Liability for UGC  Allowing UGC creates a risk of liability for that content  In the US, certain statutory protections are available  DMCA Safe Harbor  Section 230 of Communications Decency Act  Subject to many limitations  Law is still developing in this area – lots of uncertainty

Digital Millennium Copyright Act (DMCA)  Passed in One section creates "safe harbor" for certain activities by online "service provider"  Covers four types of activities  Includes information residing on system or network at direction of users (i.e. passive hosting)  Other activities are transitory communications, system caching and information location tools  Must meet specified conditions

DMCA Safe Harbor  Conditions:  Repeat infringer policy  Accommodate "standard technical measures"  Activity-specific conditions – for certain activities:  Designate an agent  Follow "take down" rules  Remove knowing or apparent infringement  No right and ability to control + direct financial benefit

DMCA Safe Harbor  What is "Right and Ability to Control Infringement?"  Not much law on this  Ability to terminate and delete postings probably ok  Screening of site - may depend on what and how  Only an issue if you also have direct financial benefit

DMCA Safe Harbor  What is a "Direct Financial Benefit?"  Not much law on this  Direct fee for use of infringing content is clear benefit  Advertising on site?  Attracting more users?  Only an issue if you also have right and ability to control

DMCA Safe Harbor  Will the DMCA protect you from liability?  Answer: Maybe  Not if doing more than just hosting content  Converting formats may be ok  Distributing content probably not covered  Not if have knowledge/notice and fail to act  Not if have right and ability to control + direct financial benefit  Not for anything other than copyright (e.g. trademark)

Section 230 of the Communications Decency Act  No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider

Section 230  Three requirements for immunity:  The defendant must be a "provider or user" of an "interactive computer service"  The cause of action asserted by the plaintiff must "treat" the defendant "as the publisher or speaker" of the harmful information at issue  The information must be "provided by another information content provider"  Exception: IP and federal criminal liability

Section 230  The information must be "provided by another information content provider"  Does not apply to content provided by defendant  May not apply if defendant contributes to or is responsible for the development of the content  Selecting or screening content or merely providing tools or minor editing should not be a problem

Section 230  What is too much involvement in content?  Providing questionnaires?  Soliciting content?  Paying for content?  Agency?

Best Practices  Comply with all DMCA safe harbor requirements  Take down anything you know is infringing or illegal  Promptly comply with take down notices  Avoid any financial benefits tied to infringing material  Avoid any manual screening of the site  Consider using automated filtering tools  Minimize handling of or interaction with content

Best Practices  Avoid participating in the development of content the user is posting  When creating a questionnaire, use free-form responses rather than prescripted choices or anything that channels or directs user responses  Avoid encouraging or instructing users to post specific information  Develop policy for dealing with illegal content and reporting child porn

How Courts View (or Might View) UGC in Games Will Rava

Microstar v. Formgen, Inc., 942 F.Supp (S.D.Cal. 1996)

Lewis Galoob Toys, Inc. v. Nintendo of America Inc., 964 F.2d 965 (9th Cir. 1992)

Davidson & Assoc. v. Jung, 422 F.3d 630 (8th Cir. 2005)

MDY Indus., LLC v. Blizzard Entertainment, Inc., 2009 WL (D. Ariz. Jan 28, 2009). Hernandez v. Internet Gaming Entertainment, Case No Civ-Cohn/Snow (S.D. Fla.)

Lessons Learned?  Your customers will always want something more or different  They will create and distribute it  They may not want to pay for it (or get paid for it)  You will have to deal with your customers about it

Questions?  Kirk Soderquist   Joe Cutler   Susan Lyon   Lisa Oratz   Will Rava 