Take-down Notice Workshop Take-down notice process in a nutshell  The take-down notice process is a mechanism for members of the public to notify an ISP.

Slides:



Advertisements
Similar presentations
The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
DISPUTES & INVESTIGATIONS ECONOMICS FINANCIAL ADVISORY MANAGEMENT CONSULTING Joining LinkedIn How to Register, Follow Navigant & Join the Conversation.
IMPLICATIONS FOR UNIVERSITY POLICY BL, JISC & MLA BRIEFING, 29/6/2010 Professor Charles Oppenheim
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
2015 Workshop Permanent Status and Promotion Policy and Procedures Overview.
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
UNFCCC How to address DOE Liability in context of PoA: Perspective of a Project Developer 8 th May 2011 Gareth Phillips Chairman, Project Developer Forum.
What do I need to know?.   Instant Messages  Social Networking.
Engaging with Planning Agents Reform of the Planning System 30 April 2015.
Copyright Myths. "If it doesn't have a copyright notice, it's not copyrighted." This was true in the past, but today almost all major nations follow the.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Designing user studies February.
HSC: All My Own Work Copyright.
Service Definer Roles NHS e-Referral Service
» Teaching an online class, what takes up most of your time?
Social Media and Recordkeeping Allegra Huxtable Manager Government Recordkeeping Tasmanian Archive and Heritage Office.
S ELECTION OF WEB HOST AND WEB PAGE SYSTEM. W EB HOST stores all the pages of your website and makes them available to computers connected to the Internet.
Recruitment and Selection Directive 01/10 Replaces Directive 03/09 Jennifer Lyons, Craig Powell, Bianca Murch, Sally Campbell.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
CONTINUING LEGAL EDUCATION committed to lifelong learning LAW SOCIETY OF SOUTH AFRICA CLE INTERACTIVE SATELLITE SEMINAR THE NEW E-WORLD OF BUSINESS IN.
Standards experts. Accreditation solutions. Andrea Spencer Coordinator, WTO/NAFTA Enquiry Point (Canada) TBT Special Meeting on Procedures for Information.
Manga Group Implementing and observing a networking community Ashleigh Banh Danny D’Cruz Anna Masters Sangheon Park.
Christopher Boam Counsel for Internet & Global Ecommerce MCI, Inc., International Affairs on behalf of WITSA The World Information Technology and Services.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Service Charters [Nome del progetto] [Nome del relatore]
RSC London 11 May 2011 e-Safety Your Legal Duties 1.
Amy Scott, eMarketing Manager Deborah Moldrich, Contact Service Centre Manager Social UWS.
ALAI Congress 2012 Kyoto, October 18, 2012 Breathing Space for Cloud-Based Business Models Prof. Dr. Martin Senftleben VU University Amsterdam Bird & Bird,
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
Digital Millennium Copyright Act (“DMCA”). Common MLS Issue Listing Agent uploads infringing photo –Examples All members republish photo on IDX sites.
Enhancement of participation of local stakeholders, key to success of CDM projects: Current rules and procedures under the CDM Fatima-Zahra Taibi, UNFCCC.
Canada’s Anti Spam Legislation. What is CASL? CASL was intended to combat negative online behaviour  spam  phishing  malware  spyware  It will create.
Professional Values and Basic Business Legislation.
Local Assessment of Code of Conduct Complaints. 2 Background  On 08 May 2008 – the local assessment of Code of Conduct complaints was implemented due.
UK Wide Core Skills & Training Framework Findings of 2 nd Stage Consultation and Implications for Development of the Framework.
©2006 Richard Watson Todd Publishing in international refereed journals Richard Watson Todd.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
DEPARTMENT OF COMMERCE MULTISTAKEHOLDER FORUM IMPROVING THE OPERATION OF THE DMCA NOTICE AND TAKEDOWN SYSTEM FIRST PUBLIC MEETING March 20, 2014.
FAQs about the new regulatory framework Lucy Rhodes
The law on Intermediary Liability in India
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Shipperless & Unregistered site working group Recommendations to address the Unregistered Sites Collectively establish & execute activities to correct.
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
© 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Check 21 Implementation ICBA Check 21 Audio Conference Series Viveca Y. Ware ICBA February 17, 2004.
Legal Issues. Overview Standard Contract Terms of Social Networking Sites Government Content on a Third-Party Site Competitive Procurement Issues First.
Copyright Infringement Committing copyright infringement could lead to a very angry client and very angry designer (of the original work). 1.
Look for directories that include categories relevant to your site's topic. Some may require a reciprocal link in exchange for your listing, while those.
Forums, Blogs, Wikis, and Voicethreads 21 st Century Collaboration Tools.
Local Assessment of Code of Conduct Complaints. Background  On 08 May 2008 – the local assessment of Code of Conduct complaints was implemented due to.
2015 AAUW CALIFORNIA ELECTION One Member, One Vote.
Ian F. C. Smith Writing a Conference Paper. 2 Disclaimer This is mostly opinion. Suggestions are incomplete. There are other strategies.
Trans-Pacific Partnership Agreement (TPP)
HSC: All My Own Work What is copyright and what does it protect? How does it relate to me?
Messages 1. Outline Fields of an Subject line One point per The expected response Be a good correspondent Final tips 2.
Copyright Laws Dodge City Public Schools November 2013 Compiled By: 6-12 Academic Coaches and DCHS Librarian Approved By: 6-12 Administrators.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Copyright and Fair Use Website Permissions. What is Copyright? A copyright is a form of protection provided by the laws of the US to authors of “original.
ESTATE AGENCY AFFAIRS BOARD UPDATE ON THE AUCTION ALLIANCE vs. ESTATE AGENCY AFFAIRS BOARD LEGAL MATTER 01 st March
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
Open Meetings Open Records and Ethics Training Member Training.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
AFFILIATE TERMS OF SERVICE
process and procedures for assessments
Cyber Issues Facing Medical Practice Managers
MODULE B - PROCESS SUBMODULES B1. Organizational Structure
Sponsor Ballot Comment Resolution
Presentation transcript:

Take-down Notice Workshop Take-down notice process in a nutshell  The take-down notice process is a mechanism for members of the public to notify an ISP about alleged unlawful content on their network.  If the service provider acts expeditiously to remove or disable access to that content, then the service provider has limited liability for that content.

History of the TDN process (1/3) Set out in Chapter XI of the Electronic Communications and Transactions Act (ECTA) ECTA deals primarily with making electronic communications functionally equivalent to written communications. Chapter XI is tacked on, almost as an afterthought – none of the 18 objects of the Act related to this chapter. Unlike similar legislation in other countries, ECTA limits the protections provided to members of an Industry Representative Body recognized by the Minister.

History of the TDN process (2/3) Section 71 says that an IRB may only be recognized if: 1. Members are subject to a code of conduct 2. Membership is subject to adequate criteria 3. The IRB has a code of conduct of adequate standards 4. The IRB is capable of monitoring and enforcing its code. ECTA was assented to on 31 July 2002 ISPA applied for recognition later that year.

History of the TDN process (3/3) There was then a 4½ year wait, until on 14 December 2006, Guidelines for Recognition of Industry Representative Bodies of Information System Service Providers was published. These guidelines represented significant scope creep. However, most of the problem requirements were “preferred” and not “mandatory”. ISPA amended its Code four times in 2007 and Finally, on 20 May 2009, ISPA was officially recognized as an IRB by the Minister.

ISPA's role (1/2) ISPA's Code requires that:  Members have an internal TDN process  Members respond expeditiously to TDNs  (Members appoint ISPA as their TDN agent) What does the ISPA Secretariat team do?  1. Check if the target is an ISPA member  2. Check that all the required information for a TDN has been provided.

ISPA's role (2/2) What does the ISPA Secretariat team do?  3. Sanity checks: Is the content hosted on the target ISP's network? Is the content still there? Is the requested remedial action technically feasible?  4. Send the TDN to the ISPA member  5. Monitor the response and provide feedback to the complainant. What does ISPA not do?  1. Assess the validity of the complainant's allegations of unlawful activity.

What does the target ISP do? (1/2) Upon receipt of a TDN from ISPA, confirm receipt (hopefully). If the target of the TDN is another ISPA member, a redirect of the TDN can be requested. Make contact with their client (the TDN target) giving them some options, which are usually:  1. Remove the targeted content.  2. Indemnify the ISP against liability An ISP will sometimes remove the content themselves, usually if their client fails to respond to their communications.

What does the target ISP do? (2/2) An ISP will sometimes also reject a TDN without consulting their client (e.g. a take-down against a bank's web site). Whatever the ISP decides to do, they must notify ISPA. Important tips for ISPs:  Make sure your terms and conditions give you the right to deal adequately with a TDN.  Be aware that you do not have to accept a TDN, you are entitled to reject the request.  If in doubt, ask ISPA for help.

The target's point of view ISPA does not have any direct contact with the target of a TDN and only communicates with the relevant ISPA member. Each ISP chooses exactly how to deal with their clients. ECTA does not give the target any opportunity to respond to the TDN. Yes, this is a problem!  This is at odds with international practice.  It is a problem with ECTA, not ISPA!

Three tips for lodging a successful TDN Make sure the content is hosted on a network belonging to an ISPA member. Make sure that you identify the content as accurately as possible – give the specific page or link to each copyright image, not the whole web site. Make sure that you are requesting sensible remedial action.  Good: Disable access to the offending web page.  Bad: Order the ISP to transfer the web site's domain to me.

Irritating take-down notices Anything quoting the DMCA Take-downs targeted at ISPA itself Take-downs which conflate ISPA's code with the take-down notice process Take-downs which make veiled threats that failing to do exactly what is requested means that ISPA (or the ISP) will magically become liable for all kinds of damages.

Some specific types of TDN Copyright content (most common)  Copyright images or text taken from other web sites without permission  Web site designers who haven't been paid Use of a trademark without permission Libelous comments or hate speech  Message boards, forum comments, blog posts  Sometimes devolve into tit-for-tat battles Domain name disputes (not the right process)

Some statistics from 2013 (1/2) Total TDNs lodged with ISPA: 133 Rejected: 64 (48%)  8: target not an ISPA member  17: content did not exist/was already removed  39: invalid notice, ECTA requirements not met Accepted: 69 (52%)  54: content was removed or blocked (78%)  13: rejected by the ISP  2: withdrawn by the complainant

Some statistics from 2013 (2/2) Types of TDNs  65% copyright or trademark infringement  12% defamation, harassment, libel, hate speech, or privacy  17% fraud, malware, phishing sites  6% other (false advertising, incorrect information)

Some statistics from 2013 (2/2) Types of TDNs  65% copyright or trademark infringement  17% fraud, malware, phishing sites  12% defamation, harassment, libel, hate speech, or privacy  6% other (false advertising, incorrect information)

The future? ECT Amendment Bill  Published for comment on 26 October 2012  Seems to have stalled since then. Key proposed changes:  IRB deemed to be recognized one year after application if the Minister fails to respond  Provides for a right to reply to a take-down, but erroneously gives this right to the target ISP instead of the “owner” of the content.  Requires that the complainant give “due consideration” to the response and may then issue a “final” take-down notice.

The end Thanks! Questions?