InternetNZ Seminar Copyright (Infringing File Sharing) Amendment Bill ISP Perspective David Diprose May 2010.

Slides:



Advertisements
Similar presentations
Copyright JNT Association JANET Briefing, 20 th Jan, Digital Economy Act 2010 Andrew Cormack Chief Regulatory Adviser, JANET(UK)
Advertisements

Freedom of Information Act 2000 and the PCT Audit Procedure Background: The Act was passed in November The Act will be fully in force by January.
Cracking the Code: how codes of conduct can promote translators’ professional development Janet Fraser FCIL FHEA FITI
Copyright Law Change APrIGF “International Law Enforcement” Track.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Last Topic - Administrative Tribunals
Documenting Disciplinary Issues
Implementing the new Workload Policy Heads of School Workshop April 2010.
Chapter 9 The Performance Interview. © 2009 The McGraw-Hill Companies, Inc. All rights reserved. Chapter Summary New Visions for New Organizations Preparing.
It is about the website(Named as Reddit.com), which becames the No. 1 Social bookmarking website in the Year of Now many of you must be thinking.
PPA 502 – Program Evaluation Lecture 5b – Collecting Data from Agency Records.
Bills and the legislative process
300 years of British copyright Saskia Walzel Policy Advocate - Consumer Focus.
INTERNET and CODE OF CONDUCT
© 2006 Thomson-Wadsworth. Learning Objectives State the purpose of employee discipline. List common reasons why employees are disciplined. Identify the.
Workplace Harassment What Supervisors Need to Know.
Workplace Harassment What Employees Need to Know.
Andrew, Lachlan and Han ONLINE PIRACY.  Copyright infringement, or ‘piracy’, is the unauthorized use of works under copyright, infringing the copyright.
Scenario testing Tor Stålhane. Scenario testing – 1 There are two types of scenario testing. Type 1 – scenarios used as to define input/output sequences.
Westland Helicopters is an AgustaWestland Company.
How does the BAT Procedure work? A Guide to Arbitration Procedures before the Basketball Arbitral Tribunal (BAT)
| 1 ODR CASE STUDY Center for Copyright Information - Independent Review Process Diana N. Didia ODR 2015 | Pace Law School June 5, 2015.
DEALING WITH HARASSMENT AND ABUSE COMPLAINTS Lt (NL) James Smith VANCOUVER ISLAND DIVISION.
Chapter 9 The Performance Interview
Online infringement of copyright - the Digital Economy Act June 2010 Robin Fry.
1 Freedom of Information (Scotland) Act 2002 A strategic view.
Copyright © 2008 Japan Network Information Center JPNIC's review of IPv4 address transfer  Izumi Okutani  Japan Network Information.
Copyright  2010 Pearson Education Canada / J A McLachlan Chapter Nine Making Ethical Decisions.
Serious Accident Investigation REPORTS. Lesson 12 Objectives Use a template to correctly fill out a 24-Hour Preliminary Report and list all the steps.
Marketing Ethics and Social Responsibility
CcTLD/ICANN Contract for Services (Draft Agreements) A Comparison.
Copyright Seminar: InternetNZ’s Point of View 25 May 2010.
Anti-Spam update Unsolicited Electronic Messages Bill and ISP Spam Code of Practice 2 February 2006 Keith Davidson Executive Director.
D&D Mailing Services Print Post Analysis September D&D Mailing Services Melbourne and Sydney Response to Australia Post Printpost Changes – Proposed.
Draft Policy Standardize IP Reassignment Registration Requirements ARIN XXVI 6 October, 2010 – Atlanta, Georgia Chris Grundemann.
Process of a Bill Parliamentary Law Making – Legislative Process © The Law Bank Parliamentary Law Making Process of a bill 1.
Copyright © 2007 Jiro Tamura. All rights reserved. 1 Japanese Telecommunication Industry - Competition Policy and Enforcement - Jiro Tamura Keio University.
Data Protection and Records Management. Key Responsibilities - Record Management Keep Information Accurate Disclose only if compatible with purpose for.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Branch Chairs' Day 1 July 2010 Supporting and Overseeing Volunteers Marianne Wyles, Institute Secretary Rebecca Emmott, Assistant Institute Secretary Cheryl.
Internet Censorship Alex Lipp. The Bills in Congress PIPA — the Senate bill originally called the Protect IP Act. SOPA — the Stop Online Piracy Act —
© Copyright Licensing Agency Limited 2007 CLA Licence for NHS England.
Federal Legislation and Higher Education Digital Millennium Copyright Act Compliance and Education Networking 2003 Copyright 2003 Tracy Mitrano.
The Legislative Process – How Laws Are Made
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Local Assessment of Code of Conduct Complaints. Background  On 08 May 2008 – the local assessment of Code of Conduct complaints was implemented due to.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Article 28(2) USD Introduction. The Problem Fraud and Misuse scale Evolving risks Impact on end users –Direct financial impact –Direct inconvenience Indirect.
ISPs as gatekeepers: a.nz community response Presented by Rick Shera,
Performance Management of Staff Disciplinary Process Richard Walsh Manager – Human Resources.
Business Project Nicos Rodosthenous PhD 08/10/2013 1
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Tripartite Declaration of Principles concerning Multinational Enterprises and Social Policy (MNE Declaration) Multinational enterprises and social policy.
Unit 5 Managing labour relations in the workplace.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
CAP169 02/04/09. 2 Today  Agree Terms of Reference  Timetable going forward  Discussion of Part 1 and Part 2 Finalise and agree  Discussion of Part.
BELL RINGER  What are you concerned about most for the PowerPoint?  What is one question you still have about the PowerPoint?
1 ETNS Pricing & Interconnection Interconnect tariff models Market introduction of European Numbers Serving to Service Network relationship Possible Service.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
DMCA Compliance: Adapting Strategies to Hit a Moving Target Jeff Gimbel
Social Studies 9.  Unit 1 focuses on the structure of the Canadian federal government. This includes: ◦ The separation and division of powers within.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CENTER FOR LEGAL CIVIC INITIATIVES. SURVEY Monitoring of courts’ decisions on trafficking Monitored bodies: District Courts of Tirana, Shkodra and Vlora.
Stop in the Name of Law Kimberlee Weatherall. Stop in the Name of Law Kimberlee Weatherall.
Prepared by Rand E Winters, Jr. ASR Senior Auditor October 2014
Marcus Claridge Director Energy and Water October 2017
Switchover from Teledeposit to VIRTUAL TERMINAL Moneris Solutions
National Notification Authority
Presentation transcript:

InternetNZ Seminar Copyright (Infringing File Sharing) Amendment Bill ISP Perspective David Diprose May 2010

Introduction I’ve been asked to present an ISP perspective I work for Vodafone, we are a member of ISPANZ, I lead the TCF copyright policy working party But I’m not officially representing any of these organisations I intend to cover the following points: – ISP involvement in copyright – New amendment - education is key – ISP role - identifying the infringer – Further refinement needed – The bigger picture

ISP involvement in copyright Copyright infringement is an issue between copyright ownwer & infringers - ISPs are not much more than a conduit - we’d rather not be involved The internet can be used for all sorts of purposes, good & bad - our services can be involved in all sorts of illegal activities, not just copyright infringement Internationally there has often been real conflict between copyright owners & ISPs – witness the situation with iiNet in Australia In NZ we have taken a more co-operative approach; we worked closely with copyright owners when drafting the earlier TCF code of practice

New Amendment – education is key We think the new infringing file sharing amendment is a significant improvement over the previous attempt The TCF had significant input to the MED on how this would work & we are generally happy with the role we have to play We strongly support the main purpose being educational We believe that doing this well will make a real difference to the scale of the problem In fact many of us would prefer that all we had to do was identify alleged infringers & forward educational notices The rest of what we are required to do is much more work & will involve a very real cost to our businesses

ISP role - identifying the infringer We recognise that often we are the only party that can identify alleged infringers & generally accept that as a fair & reasonable role to play It is similar to assisting the police identify suspected offenders in other areas of law breaking We are required to keep records that match IP addresses to the customers that used them at any given point in time; so we can correctly pass on the appropriate notice But we are also required to identify repeat infringement – this will either be significant system development or alternatively intensive manual reporting & analysis This will be a very real cost to our businesses & it has been recognised that we should be reimbursed for that

Further refinement needed There are still a few details we think need to be improved… Implementation timeframe too short Must retain cost-recovery fees Need industry standard templates for all notices Termination is pointless & is complicated by term contracts & bundles Do we have to record infringements per copyright owner or aggregate for all? What records do we have to keep?

The bigger picture Education is the key to deal with widespread small scale infringement Punitive action should only be necessary for serious large scale infringement What is really needed is a 21 st century online content distribution model that better balances the interests of copyright owners & end-users, thus minimising the need for copyright abuse