Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.genuity.com The DMCA after 1000 days; an ISP’s perspective David Bowie Operations Security.

Similar presentations


Presentation on theme: "Www.genuity.com The DMCA after 1000 days; an ISP’s perspective David Bowie Operations Security."— Presentation transcript:

1 www.genuity.com The DMCA after 1000 days; an ISP’s perspective David Bowie Operations Security

2 www.genuity.com Agenda Background DMCA after 1000 days Some Operational Challenges What we have recently seen in the backbone Questions

3 www.genuity.com Genuity Created from BBN’s Internet Service at the time of GTE/Bell Atlantic merger Backbone: AS-1 Over 20,000 miles of fiber in the US Over 3,000 IP routers managed Over 5000 business customers Over 1,000,000 DSL subscribers on our backbone in US for AOL, Verizon,and other customers 12 Web Hosting Data Centers Worldwide

4 www.genuity.com Who am I David Bowie, Mgr, Network Abuse, in OPSec –OPSec is the primary infrastructure & customer security contact –Complaints: SPAM, DoS, etc –Incident Management –Subpoena processing –Copyright infringement

5 www.genuity.com What is the DMCA? The Digital Millennium Copyright Act (DMCA) was signed into law by President Clinton on October 28, 1998. Implements two 1996 World Intellectual Property Organization (WIPO) treaties: –The WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty. The DMCA also addresses a number of other significant copyright-related issues. A complete understanding of any provision of the DMCA requires reference to the text of the legislation itself.

6 www.genuity.com What the DMCA is not Does not change the definition of Fair Use. Does not change the need to register works with the copyright office. Does not require ISPs to monitor for copyright violations. Does not require manufacturers to design their products to respond to any particular technological measure. (Section 1201(c)(3)).

7 www.genuity.com The DMCA is divided into 5 titles Title I, the “WIPO Copyright and Performances and Phonograms Treaties Implementation Act of 1998,” implements the WIPO treaties. Title II, the “Online Copyright Infringement Liability Limitation Act,” creates limitations on the liability of online service providers for copyright infringement when engaging in certain types of activities. Title III, the “Computer Maintenance Competition Assurance Act,” creates an exemption for making a copy of a computer program by activating a computer for purposes of maintenance or repair. Title IV contains six miscellaneous provisions, relating to the functions of the Copyright Office, distance education, the exceptions in the Copyright Act for libraries and for making ephemeral recordings, “webcasting” of sound recordings on the Internet, and the applicability of collective bargaining agreement obligations in the case of transfers of rights in motion pictures. Title V, the “Vessel Hull Design Protection Act,” creates a new form of protection for the design of vessel hulls.

8 www.genuity.com ISPs are interested in Title II Title II added section 512 to the Copyright Act addressing 4 categories of conduct: 1.Transitory communications; 2.System caching; 3.Storage of information on systems or networks at direction of users; 4.Information location tools.

9 www.genuity.com What does the DMCA consider an ISP? A “service provider” is broadly defined in section 512(k)(l)(B) as “a provider of online services or network access, or the operator of facilities therefor.”

10 www.genuity.com DMCA safe harbor To be eligible for any of the limitations, a service provider must meet two overall conditions: (1)it must adopt and reasonably implement a policy of terminating in appropriate circumstances the accounts of subscribers who are repeat infringers; and (2)it must accommodate and not interfere with “standard technical measures.” (Section 512(i)). “Standard technical measures” are defined as measures that copyright owners use to identify or protect copyrighted works.

11 www.genuity.com Title II limitations to liability The provider must not have actual knowledge of the infringing activity. If the provider has the right and ability to control the infringing activity, it must not receive a financial benefit directly attributable to the infringing activity. Upon receiving proper notification of claimed infringement, the provider must expeditiously take down or block access to the material. Section 512(c)

12 www.genuity.com The Gotcha In addition, a service provider must have filed with the Copyright Office a designation of an agent to receive notifications of claimed infringement.

13 www.genuity.com Exposure under the DMCA The court has discretion to reduce or remit damages in cases of innocent violations, where the violator proves that it was not aware and had no reason to believe its acts constituted a violation. (Section 1203(c)(5)(A)). Special protection is given to nonprofit libraries, archives and educational institutions, which are entitled to a complete remission of damages in these circumstances. (Section 1203(c)(5)(B)). Nonprofit libraries, archives and educational institutions are entirely exempted from criminal liability. (Section 1204(b)).

14 www.genuity.com Actions under Title II (Section 512(c)(3)). Under the notice and takedown procedure, a copyright owner submits a notification under penalty of perjury, including a list of specified elements, to the service provider’s designated agent. –Failure to comply substantially with the statutory requirements means that the notification will not be considered in determining the requisite level of knowledge by the service provider. If, upon receiving a proper notification, the service provider promptly removes or blocks access to the material identified in the notification, the provider is exempt from monetary liability. In addition, the provider is protected from any liability to any person for claims based on its having taken down the material. (Section 512(g)(1)).

15 www.genuity.com Reality of the DMCA Copyright holders are relying on corporate and professional groups to fulfill the DMCA reporting requirements. The safe harbor essentially applies if you ‘do the right thing’. (Whether you’re registered or not.) The law places the burden of proof and notification on the copyright holder. Aside from spam, this represents the largest number of email complaints received.

16 www.genuity.com Who complains the loudest? antipiracy@unistudios.com –Universal City Studios mpaa@copyright.org –Motion Picture Association of America, Inc. copyright@bsa.org –Business Software Alliance These 3 addresses comprise over 90% of the copyright complaints received by Genuity.

17 www.genuity.com What we have seen in the backbone recently The amount of Spam is up –Complainants are more vocal –Bulk email products are more sophisticated Subpoena Processing is flat –Child porn reports are increasing Pennsylvania law requiring blocking by ISP’s –Copyright/DMCA are skyrocketing Attacks are up a tad –Still, most DoS is against IRC servers –Lots of old worms from unpatched systems –The amount of time between a vulnerability discovery and exploit is nearing 0.

18 www.genuity.com Expected Future Trends More Copyright/DMCA issues LEAs will begin to focus on the data networks –More Title 3’s, more subpoenas. SPAM will increase

19 www.genuity.com Thank You dbowie@genuity.com


Download ppt "Www.genuity.com The DMCA after 1000 days; an ISP’s perspective David Bowie Operations Security."

Similar presentations


Ads by Google