SlideShare une entreprise Scribd logo
1  sur  73
Internet intermediaries liability:
         the road ahead
    IPR University Center seminar, Helsinki,
                 April 26, 2012

                  Cédric Manara, PhD
      Associate Professor of Law, EDHEC Business School
               <www.cedricmanara.com/english>
Definition
 ―Internet intermediaries bring together or
  facilitate transactions between third parties
  on the Internet.
 They give access to, host, transmit and
  index content, products and services
  originated by third parties on the Internet
  or provide Internet-based services to third
  parties‖
  • OECD, The economic and social role of
    internet intermediaries, 2010

                                                  2
More concretely
 Intermediaries reduce
  •   search
  •   transaction
  •   communication
  •   investment & operating
 costs




                               3
Who?
 [Electricity provider]
 Internet Access Providers
    • Elisa, TeliaSonera, DNA, Finnet…
    • Libraries / Companies / Administration / Universities…
 Registries / Registrars
 Internet Service Providers (hosts)
    • Search tools
    • Transactions tools
        ─ Visa, MasterCard, PayPal
    • Amateur platforms
        ─ Forums, blogs, wikis
    • Commercial platforms
        ─ eBay, Huuto.net…
    • Generative platforms
        ─ open: YouTube, SL…
        ─ v. proprietary: Facebook, App Store

                                                               4
What?
 Trademark
 (commercial)
  reputation
 Copyright             D. Ardia, An empirical
                        study of intermediary
 Business secrets      immunity under section
                        230 of the
 False stock           Communications
                        Decency Act, 2010
  information
 Privacy / Personal
  data
 Hate speech
 (Child) pornography
                                                 5
It’s not (only) about IP!




D. Ardia, An empirical study of intermediary immunity under section 230 of the Communications Decency Act, 2010   6
D. Ardia, An empirical
study of intermediary
immunity under section
230 of the
Communications
Decency Act, 2010
                         7
What?
            At stake                Legal system
   Trademark                   USA
                                 • U.S.C.. 1125 (d) (2) (D)
   Copyright                      (ii)
   Defamation                   • US Copyright Act, Section
   Business secrets               512 (c)
                                 • Communications Decency
   False financial                Act, 230
    information                  • Communications Decency
                                   Act, 223
   Rights of personality,
    personal data               EU
                                 • EC/31/2000 (art. 12-15)
   Hate speech                  • Directive 2011/92/EU on child
   Child pornography              pornography (Dec. 13, 2011)

                                                                   8
ISP: Legal categories (EU)
 Transmission of information
  • mere conduit
 Caching
  • Intermediate storage to accelerate data
    transmission
 Hosting
  • Storage of information
 Other (?)
  • Search engines
                                              9
Outline
   Principle: exemption of liability [1]
   From principle to practice [2]
   Towards surveillance? [3]
   Future developments [4]




                                            10
1. Principle:
Exemption of liability




                         11
ISP: Legal categories &
             regimes
        Categories               Directive 2000/31/EC
 Transmission of               Article 12
  information
   • mere conduit
 Caching                       Article 13
   • Intermediate storage to
     accelerate data
     transmission
 Hosting                       Article 14
   • Storage of information
 Other                         n/a

                                                        12
Why a specific liability
           regime?
 Needed for the smooth functioning of the
  internal market
  • No data heaven
  • Enables development of cross-border
    services and prevents distortions of
    competition




                                             13
Rationale
 Exemptions from liability cover only cases
  where the activity of the ISP is limited to
  • the technical process of operating
  • and giving access to a communication
    network over which
     – information made available by third parties is
        – transmitted
        – or temporarily stored,
     – for the sole purpose of making the transmission
       more efficient

                                                         14
Rationale (bis)
 This activity is of a mere
  • technical,
  • automatic
  • and passive nature
 which implies that the information society
  service provider has neither
  • knowledge of
  • nor control over
 the information which is transmitted or
  stored                                       15
Limitations
       of the liability of ISPs
 Conditions
  • Duty to act, under certain circumstances, with a
    view to preventing or stopping illegal activities
  • They have to act expeditiously to remove or to
    disable access to the information concerned
  • This does not affect the possibility of
    administrative or judicial injunctions




                                                        16
Mere conduit
                          (article 12)
 No liability for the information transmitted in a
  communication network on condition that the provider:
   • does not initiate the transmission
   • does not select the receiver of the transmission, and
   • does not select or modify the information contained in the transmission


 This extends to the automatic, intermediate and transient
  storage of the information transmitted in so far as this
  takes place for the sole purpose of carrying out the
  transmission in the communication network, and
  provided that the information is not stored for any period
  longer than is reasonably necessary for the
  transmission.
                                                                               17
Caching
                               (article 13)
 A service provider is not liable for the automatic, intermediate and
  temporary storage of that information, performed for the sole
  purpose of making more efficient the information‘s onward
  transmission to other recipients of the service upon their request, on
  condition that the provider
    •   does not modify the information;
    •   complies with conditions on access to the information;
    •   complies with rules regarding the updating of the information, specified in a
        manner widely recognized and used by industry;
    •   does not interfere with the lawful use of technology, widely recognized and used
        by industry, to obtain data on the use of the information; and
    •   acts expeditiously to remove or to disable access to the information it has stored
        upon obtaining actual knowledge of the fact that the information at the initial
        source of the transmission has been removed from the network, or access to it
        has been disabled, or that a court or an administrative authority has ordered
        such removal or disablement.


                                                                                             18
Hosting
                                (article 14)
 The provider of storage of information is not liable for the information
  stored at the request of a recipient of the service, on condition that
  the provider
    •   does not have actual knowledge of illegal activity or information and
    •   is not aware of facts or circumstances from which the illegal activity or
        information is apparent; or
 or
    •   upon obtaining such knowledge or awareness, acts expeditiously to remove or to
        disable access to the information.


 Exemption does not apply when the recipient of the service is acting
  under the authority or the control of the provider.




                                                                                         19
Legal issues in a nutshell
 Hosting providers will not be held liable in
  cases they
  • unknowingly (?)                            1
 host
  • illegal material (?)
                                               2
 provided they
  • act in an (undefined) expeditious way      3
  • after having received (undefined) actual
    knowledge of the infringement              4
                                                   20
1
      "Actual knowledge"…
 …of the allegedly infringing material?
 …or of the illegality of the material?
 It is unclear what an authority would consider
  sufficient to provide ―actual‖ knowledge
     – Except in Finland (upon notification… but only for ©)
 ~12 years after the adoption of the
  legislation, we still wonder whether a
  notification or formal legal order for removal
  would be considered adequate
  • except in States where guidelines for notification
    exist

                                                               21
Recent case in UK
 An allegation of defamation
  does not constitute actual notice of
  unlawful activity
  • ―It cannot be right that any provider is required, in
    the light of the strict terms of Regulation 19 [
    Art. 14], to take [complainant’s notification] at face
    value. Clearly more is required for a provider to
    acquire a sufficient state of knowledge to be
    deprived of the statutory protection‖
     – Tamiz v Google [2012] EWHC 449 (QB) (Mar. 2, 2012)


                                                             22
Case study
 Dec. 2010: a Wikileaks mirror is hosted in
  France
 The French ISP discovers it in the press
 Does it have to take it down?
 The ISP itself went before courts to know
  what it must do!



                                               23
2
           "Illegal material"…
   …to the eyes of the rights owner?
   …to the eyes of someone else?
   …to the opinion of the hosting provider?
   contrary to
    • State laws
       – which one?
    • or to any private rule?



                                               24
3
Act in an "expeditious way"?
 Within
  • Minutes?
  • Hours?
  • Days?




                               25
4
                  "notice"?
 Formalities
  • Example of France
     – Wikipedia (CFI, Oct. 29, 2007)
     – Amen (Court of cassation, Feb. 17, 2011)
  • In practice, providers have their own rules &
    procedures
     – Not always transparent though




                                                    26
2. From principle to
      practice




                       27
28
29
Lessons learned
'when in doubt, take it down‘
• remov material that doesn‘t violate the law




                                                30
31
Lessons learned
 Private intermediaries are risk averse
  • 'when in doubt, take it down‘
  • remove material that doesn‘t violate the law




                                                   32
Selection of cases
   France
   Germany
   Italy
   Spain




                              33
Germany
 Federal Supreme Court, April 19, 2007
  • eBay
    – an online auction platform may be liable for
      trademark infringement caused by the seller‘s
      offers under the concept of liability as a ―disturber‖
      (―Störer‖)
       – the defendant not only has to delete the specific offers
         whenever its attention is drawn to a trademark
         infringement
       – but also is obliged to take (specific) action to prevent
         further infringing offers [ discussed below at § 3]


                                                                    34
Italy
 Milan Tribunal, April 16, 2010
  • Italy v. Google (‗Vivi Down‘ case)
  • 3 Google executives
     – acquitted with regard to the charge of defamation
     – convicted for violating data protection in
       connection with the on-line posting of a video
       showing a disabled person being bullied and
       insulted




                                                           35
Spain
 Court of Madrid, September 20, 2010
  • Telecinco v. YouTube
  • A video sharing platform is a hosting provider
  • it is exempted from liability for the copyright
    infringement committed by its users




                                                      36
France
 Court of cassation, February 17, 2011
  • DailyMotion (YouTube-like)
  • Fuzz (Digg-like)
  • Amen




                                          37
Across the EU:
 Conflicting caselaw
 Lack of legal certainty




                            38
EU
 CJEU, March 23, 2010, C-236/08 to C-
  238/08, Vuitton v. Google
  • A referencing service provider
    – stores information supplied by the advertiser
    – transmits information from the advertiser, over a
      communications network accessible to internet
      users and stores
    – holds in memory on its server, certain data, such
      as the keywords selected by the advertiser, the
      advertising link and the accompanying commercial
      message, as well as the address of the
      advertiser‘s site                                   39
EU [2]
 In order to establish whether the liability of
  a referencing service provider may be
  limited under Article 14 of Directive
  2000/31, it is necessary
  • to examine whether the role played by that
    service provider is neutral,
     – in the sense that its conduct is merely technical,
       automatic and passive, pointing to a lack of
       knowledge or control of the data which it stores
 Is it a concept sufficiently clear to be
  interpreted in a homogeneous way?                         40
L’Oréal v. eBay
          C-324/09, July 12, 2011
 § 115
  • the mere fact that the operator of an online
    marketplace
     – stores offers for sale on its server,
     – sets the terms of its service,
     – is remunerated for that service
     – and provides general information to its customers
  • cannot have the effect of denying it the
    exemptions from liability provided for by
    Directive 2000/31
                                                           41
L’Oréal v. eBay
 § 116
  • [If] the operator has provided assistance which
    entails,
     – in particular, optimizing the presentation of the offers for sale
       in question or promoting those offers,
  • it must be considered
     – not to have taken a neutral position between the customer-
       seller concerned and potential buyers
     – but to have played an active role of such a kind as to give it
       knowledge of, or control over, the data relating to those offers
       for sale.
  • It cannot then rely, in the case of those data, on the
    exemption from liability referred to in Article 14
                                                                           42
L’Oréal v. eBay
 In the absence of an active role, subsidiary
  question:
  • Did the hosting provider have ‗actual
    knowledge of illegal activity or information‘?
  • Is the hosting provider ‗aware of facts or
    circumstances from which the illegal activity
    or information is apparent‘?
  • If a diligent economic operator would have
    realized that the content in question is
    unlawful  Liability if no action
                                                     43
New questions
 Does a notice related to a posting in
  particular equates to ‗flagging‘ its author?
 The Court has not elaborated on how an
  ISP can obtain "actual knowledge"




                                                 44
Ladies & gentlemen, please
          welcome…
 Bono
 Ten for the Next Ten, New-York Times, Jan. 2, 2010




                                                       45
   Intellectual Property Developers
   Caution! The only thing protecting the movie and TV industries from the fate
    that has befallen music and indeed the newspaper business is the size of
    the files. The immutable laws of bandwidth tell us we‘re just a few years
    away from being able to download an entire season of ―24‖ in 24 seconds.
    Many will expect to get it free.
   A decade‘s worth of music file-sharing and swiping has made clear that the
    people it hurts are the creators — in this case, the young, fledgling
    songwriters who can‘t live off ticket and T-shirt sales like the least
    sympathetic among us — and the people this reverse Robin Hooding
    benefits are rich service providers, whose swollen profits perfectly mirror the
    lost receipts of the music business.
   We‘re the post office, they tell us; who knows what‘s in the brown-paper
    packages? But we know from America‘s noble effort to stop child
    pornography, not to mention China‘s ignoble effort to suppress online
    dissent, that it’s perfectly possible to track content. Perhaps movie
    moguls will succeed where musicians and their moguls have failed so
    far, and rally America to defend the most creative economy in the
    world, where music, film, TV and video games help to account for nearly 4
    percent of gross domestic product.

                                                                                      46
3. Towards surveillance?




                           47
Directive 2000/31/EC,
             Article 15
 Member States shall not impose a general
  obligation on providers,
     – when providing the services covered by Articles
       12, 13 and 14,
 to monitor the information which they
  transmit or store,
 nor a general obligation actively to seek
  facts or circumstances indicating illegal
  activity
                                                         48
Moving from ex post reaction to ex ante action…




                                         49
50
L’Oréal v. eBay
 Can a court order online service providers to take
  measures to prevent future infringements of intellectual
  property?
      – Article 11 of Directive 2004/48
 Courts are ―able to order [an intermediary] to take
  measures which contribute, not only to bringing to an
  end infringements of those rights […], but also to
  preventing further infringements […].
 Those injunctions must be effective, proportionate,
  dissuasive and must not create barriers to legitimate
  trade‖ (§ 144)


                                                             51
Cases C-70/10, SABAM v. Scarlet
 & C-360/10, SABAM v. Netlog
 European legal framework precludes a national court from
  issuing an injunction against a hosting service provider which
  requires it to install a system for filtering
    • all electronic communications passing via its services [Scarlet]
    • all or most of the information which is stored on its servers by its
      service users [Netlog]
    • which applies indiscriminately to all of those users
    • as a preventative measure
    • exclusively at its expense, and
    • for an unlimited period
 which is capable of identifying electronic files containing musical,
  cinematographic or audio-visual work in respect of which the
  applicant for the injunction claims to hold intellectual property
  rights, with a view to preventing those works from being made
  available to the public in breach of copyright
                                                                             52
Challenges to the
           2000 Directive
 These cases raise the same issue:
  • can injunctions apply to
     – future,
     – unspecified
  • infringements?
 L‘Oréal: the Court finds the injunctions
  proportionate
 SABAM: the Court finds them
  incompatible
                                             53
Ex ante applications?
 Belgium
  • Belgacom & Telenet must block access to The Pirate
    Bay
       – Antwerpen, September 26, 2011
 UK
  • Blocking access to newzbin.com, "a general obligation
    to monitor, but rather a specific and limited one‖
       – [2011] EWHC 1981 (Ch) & [2011] EWHC 2714 (Ch)
 Finland
  • Elisa must block access to The Pirate Bay
       – Helsinki District Court, Oct. 26, 2011

                                                            54
Ex post applications?
 Netherlands
  • XS4ALL and Ziggo must block access to The Pirate
    Bay
     – Hague, Jan. 11, 2012
 Germany
  • A Hamburg Court ruled that RapidShare has to
    proactively filter the files uploaded by its users
     – with respect to a list of 4,000 files
     – March 14, 2012




                                                         55
Removing is not enough
 ―when a website is successfully removed
  from a host server, it reappears very easily
  under another name‖




                                                 56
"Streisand effect"
 Online phenomenon in which an attempt
  to hide or remove a piece of information
  has the consequence of publicizing the
  information more widely
  • Named after American entertainer Barbra
    Streisand, whose 2003 attempt to suppress
    photographs of her residence inadvertently
    generated further publicity
     – http://en.wikipedia.org/wiki/Streisand_effect


                                                       57
France, March 29, 2012




                         58
HIDE, OR FIGHT?


 Removal  Effect

Enforcement  Cause




                      59
4. Future developments




                         60
What the SABAM cases
     brought to the debate
 Fair balance with fundamental rights
  • of the ISPs: freedom to conduct a business
     – article 16 of the Charter
  • of ISPs‘s users: right to protection of their
    personal data and their freedom to receive or
    impart information
     – articles 8 and 11 of the Charter




                                                    61
 COM (2011) 942 at § 3.1
  • « provide clarification, for example concerning
    the liability of intermediary internet providers »
  • Action: « The Commission will ensure that the
    Electronic Commerce Directive [is] correctly
    applied »




                                                         62
Issues
 Abuse
   • ISPs opt for the least costly and most legally secure
     option
 Neutrality
   • intermediaries have had little if any interest in
     adopting devolved law enforcement roles
 Private police
   • They increasingly feel obliged to do so as a result of
     either government pressure or legal uncertainty
     created by (often) unclear legal provisions
      – VeRO
      – Content ID
          – INA / Signature


                                                              63
Notice & take down
 Low cost, distributed, privatized
  censorship by private companies
 Based on business interests
 Failure to ensure an adequate balance
  results in restrictions on freedom of
  expression




                                          64
65
Where are we going to?
 2000: Basis for notice and takedown
  procedures
 2011 (consultation): fragmentation of NTD
  procedures throughout the EU
 2013: regulation of NTDs?




                                              66
Working Paper “Online services, including
    e-commerce, in the Single Market”

 Requirements for the notice
 Possibility to submit a counter-notice by the
  alleged infringer
 Timeframe for blocking or taking down the
  unlawful content
 Liability for providing wrongful notices or for
  taking down or blocking legal content
 Role of the intermediary as a ―private judge‖
 Efficiency of a notice and take down procedure

                                                    67
12+ years to
 Re-invent due process
 … or introduce it?

 What we may also need: a European
  version of ChillingEffects.org




                                      68
69
70
It’s not only about commerce!




                                71
Beyond the EU borders
 Global war against intermediaries?
  • ACTA
  • Trans-Pacific Partnership
    – narrows down the legal definition of ISPs
    – imposes a specific behavior
  • SOPA / PIPA (US)




                                                  72
Recent trends

 Domain names seizure
  • (Wikileaks &) Megaupload examples
  • I.C.E. « Operation in Our Sites »
 Eradicate pointers
  • Google after the Pirate Bay?
 Why not… follow the money?
  • Visa, MasterCard or PayPal are also
    intermediaries!

                                          73

Contenu connexe

Tendances

Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction PrimerGraham Smith
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Tim Hsieh
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Frameworkanthonywong
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Gaurav Chordia
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V EsBrian Rowe
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet DisputesTalwant Singh
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
electronic transactions law lecture series: lecture 1 introduction
electronic transactions law lecture series: lecture 1 introductionelectronic transactions law lecture series: lecture 1 introduction
electronic transactions law lecture series: lecture 1 introductionCaroline B Ncube
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 

Tendances (20)

Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V Es
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
electronic transactions law lecture series: lecture 1 introduction
electronic transactions law lecture series: lecture 1 introductionelectronic transactions law lecture series: lecture 1 introduction
electronic transactions law lecture series: lecture 1 introduction
 
Net nutrality
Net nutralityNet nutrality
Net nutrality
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 

En vedette

Enseigner le droit en anglais en France
Enseigner le droit en anglais en FranceEnseigner le droit en anglais en France
Enseigner le droit en anglais en FranceCedric Manara
 
Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?Cedric Manara
 
Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012Cedric Manara
 
Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Cedric Manara
 
Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche Cedric Manara
 
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?Cedric Manara
 
Comparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .deComparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .deCedric Manara
 
Droit des marques & Big Data
Droit des marques & Big DataDroit des marques & Big Data
Droit des marques & Big DataCedric Manara
 
Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)Cedric Manara
 
Brève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligneBrève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligneCedric Manara
 
Online trading ppt
Online trading ppt Online trading ppt
Online trading ppt petkarshwt
 

En vedette (11)

Enseigner le droit en anglais en France
Enseigner le droit en anglais en FranceEnseigner le droit en anglais en France
Enseigner le droit en anglais en France
 
Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?Attacking the money supply to fight against online illegal content ?
Attacking the money supply to fight against online illegal content ?
 
Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012Actualités du droit des noms de domaine - Juillet 2012
Actualités du droit des noms de domaine - Juillet 2012
 
Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?Internet Intermediaries - Does one definition fit all ?
Internet Intermediaries - Does one definition fit all ?
 
Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche Droit des marques et referencement sur les moteurs de recherche
Droit des marques et referencement sur les moteurs de recherche
 
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
Lutte contre les contenus illicites en ligne : frapper au portefeuille ?
 
Comparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .deComparaison entre les noms de domaine en .fr et les noms de domaine en .de
Comparaison entre les noms de domaine en .fr et les noms de domaine en .de
 
Droit des marques & Big Data
Droit des marques & Big DataDroit des marques & Big Data
Droit des marques & Big Data
 
Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)Le referencement (marques, internet, reseaux sociaux)
Le referencement (marques, internet, reseaux sociaux)
 
Brève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligneBrève histoire de la résolution des litiges en ligne
Brève histoire de la résolution des litiges en ligne
 
Online trading ppt
Online trading ppt Online trading ppt
Online trading ppt
 

Similaire à Internet Intermediaries Liability

Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Draft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataDraft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataRenato Monteiro
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller SolicitorBrian Miller, Solicitor
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Brian Miller, Solicitor
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issuesISPABelgium
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.pptsheryl90
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortzitnewsafrica
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...Brian Miller, Solicitor
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)AltheimPrivacy
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 

Similaire à Internet Intermediaries Liability (20)

Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Draft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal DataDraft Bill on the Protection of Personal Data
Draft Bill on the Protection of Personal Data
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issues
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Final projet
Final  projetFinal  projet
Final projet
 
Ecommerce Chap 10
Ecommerce Chap 10Ecommerce Chap 10
Ecommerce Chap 10
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 

Plus de Cedric Manara

Les noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internetLes noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internetCedric Manara
 
Propriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociauxPropriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociauxCedric Manara
 
Exception pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeuException pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeuCedric Manara
 
Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?Cedric Manara
 
Attaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti onlineAttaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti onlineCedric Manara
 
Les enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheursLes enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheursCedric Manara
 
Sites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiementSites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiementCedric Manara
 
Les noms de domaine après la fin du monde
Les noms de domaine après la fin du mondeLes noms de domaine après la fin du monde
Les noms de domaine après la fin du mondeCedric Manara
 
L'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delàL'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delàCedric Manara
 
Sexe, internet et droit
Sexe, internet et droitSexe, internet et droit
Sexe, internet et droitCedric Manara
 
Le droit des noms de domaine
Le droit des noms de domaineLe droit des noms de domaine
Le droit des noms de domaineCedric Manara
 
Le droit de l'information existe-t-il ?
Le droit de l'information existe-t-il ?Le droit de l'information existe-t-il ?
Le droit de l'information existe-t-il ?Cedric Manara
 
Protecting assets on social media. The example of trademarks
Protecting assets on social media. The example of trademarksProtecting assets on social media. The example of trademarks
Protecting assets on social media. The example of trademarksCedric Manara
 
Efficacité et limites du recours au droit sur les médias sociaux
Efficacité et limites du recours au droit sur les médias sociauxEfficacité et limites du recours au droit sur les médias sociaux
Efficacité et limites du recours au droit sur les médias sociauxCedric Manara
 
La visibilité des enseignants-chercheurs sur internet
La visibilité des enseignants-chercheurs sur internetLa visibilité des enseignants-chercheurs sur internet
La visibilité des enseignants-chercheurs sur internetCedric Manara
 
Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?Cedric Manara
 
Moderniser la directive e-commerce ?
Moderniser la directive e-commerce ?Moderniser la directive e-commerce ?
Moderniser la directive e-commerce ?Cedric Manara
 
Copyright versus search tools?
Copyright versus search tools?Copyright versus search tools?
Copyright versus search tools?Cedric Manara
 
IDN & UDRP : tour d'horizon des litiges relatifs aux noms de domaine internat...
IDN & UDRP : tour d'horizon des litiges relatifs aux noms de domaine internat...IDN & UDRP : tour d'horizon des litiges relatifs aux noms de domaine internat...
IDN & UDRP : tour d'horizon des litiges relatifs aux noms de domaine internat...Cedric Manara
 

Plus de Cedric Manara (20)

Les noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internetLes noms des personnes publiques en droit de l'internet
Les noms des personnes publiques en droit de l'internet
 
Propriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociauxPropriete intellectuelle et reseaux sociaux
Propriete intellectuelle et reseaux sociaux
 
Exception pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeuException pedagogique : le e learning hors-jeu
Exception pedagogique : le e learning hors-jeu
 
Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?Dirigeants : comment gerer sa reputation en ligne ?
Dirigeants : comment gerer sa reputation en ligne ?
 
Attaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti onlineAttaccare le forniture di denaro per combattere i contenuti illeciti online
Attaccare le forniture di denaro per combattere i contenuti illeciti online
 
Les enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheursLes enjeux de la e-reputation pour les enseignants-chercheurs
Les enjeux de la e-reputation pour les enseignants-chercheurs
 
Sites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiementSites de distribution illégale, noms de domaine et intermédiaires de paiement
Sites de distribution illégale, noms de domaine et intermédiaires de paiement
 
Les noms de domaine après la fin du monde
Les noms de domaine après la fin du mondeLes noms de domaine après la fin du monde
Les noms de domaine après la fin du monde
 
L'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delàL'exception culturelle : acte 2 et au-delà
L'exception culturelle : acte 2 et au-delà
 
Sexe, internet et droit
Sexe, internet et droitSexe, internet et droit
Sexe, internet et droit
 
Le droit des noms de domaine
Le droit des noms de domaineLe droit des noms de domaine
Le droit des noms de domaine
 
Le droit de l'information existe-t-il ?
Le droit de l'information existe-t-il ?Le droit de l'information existe-t-il ?
Le droit de l'information existe-t-il ?
 
Protecting assets on social media. The example of trademarks
Protecting assets on social media. The example of trademarksProtecting assets on social media. The example of trademarks
Protecting assets on social media. The example of trademarks
 
Efficacité et limites du recours au droit sur les médias sociaux
Efficacité et limites du recours au droit sur les médias sociauxEfficacité et limites du recours au droit sur les médias sociaux
Efficacité et limites du recours au droit sur les médias sociaux
 
La visibilité des enseignants-chercheurs sur internet
La visibilité des enseignants-chercheurs sur internetLa visibilité des enseignants-chercheurs sur internet
La visibilité des enseignants-chercheurs sur internet
 
Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?
 
Moderniser la directive e-commerce ?
Moderniser la directive e-commerce ?Moderniser la directive e-commerce ?
Moderniser la directive e-commerce ?
 
Copyright versus search tools?
Copyright versus search tools?Copyright versus search tools?
Copyright versus search tools?
 
Le livre numerique
Le livre numeriqueLe livre numerique
Le livre numerique
 
IDN & UDRP : tour d'horizon des litiges relatifs aux noms de domaine internat...
IDN & UDRP : tour d'horizon des litiges relatifs aux noms de domaine internat...IDN & UDRP : tour d'horizon des litiges relatifs aux noms de domaine internat...
IDN & UDRP : tour d'horizon des litiges relatifs aux noms de domaine internat...
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Internet Intermediaries Liability

  • 1. Internet intermediaries liability: the road ahead IPR University Center seminar, Helsinki, April 26, 2012 Cédric Manara, PhD Associate Professor of Law, EDHEC Business School <www.cedricmanara.com/english>
  • 2. Definition  ―Internet intermediaries bring together or facilitate transactions between third parties on the Internet.  They give access to, host, transmit and index content, products and services originated by third parties on the Internet or provide Internet-based services to third parties‖ • OECD, The economic and social role of internet intermediaries, 2010 2
  • 3. More concretely  Intermediaries reduce • search • transaction • communication • investment & operating  costs 3
  • 4. Who?  [Electricity provider]  Internet Access Providers • Elisa, TeliaSonera, DNA, Finnet… • Libraries / Companies / Administration / Universities…  Registries / Registrars  Internet Service Providers (hosts) • Search tools • Transactions tools ─ Visa, MasterCard, PayPal • Amateur platforms ─ Forums, blogs, wikis • Commercial platforms ─ eBay, Huuto.net… • Generative platforms ─ open: YouTube, SL… ─ v. proprietary: Facebook, App Store 4
  • 5. What?  Trademark  (commercial) reputation  Copyright D. Ardia, An empirical study of intermediary  Business secrets immunity under section 230 of the  False stock Communications Decency Act, 2010 information  Privacy / Personal data  Hate speech  (Child) pornography 5
  • 6. It’s not (only) about IP! D. Ardia, An empirical study of intermediary immunity under section 230 of the Communications Decency Act, 2010 6
  • 7. D. Ardia, An empirical study of intermediary immunity under section 230 of the Communications Decency Act, 2010 7
  • 8. What? At stake Legal system  Trademark  USA • U.S.C.. 1125 (d) (2) (D)  Copyright (ii)  Defamation • US Copyright Act, Section  Business secrets 512 (c) • Communications Decency  False financial Act, 230 information • Communications Decency Act, 223  Rights of personality, personal data  EU • EC/31/2000 (art. 12-15)  Hate speech • Directive 2011/92/EU on child  Child pornography pornography (Dec. 13, 2011) 8
  • 9. ISP: Legal categories (EU)  Transmission of information • mere conduit  Caching • Intermediate storage to accelerate data transmission  Hosting • Storage of information  Other (?) • Search engines 9
  • 10. Outline  Principle: exemption of liability [1]  From principle to practice [2]  Towards surveillance? [3]  Future developments [4] 10
  • 12. ISP: Legal categories & regimes Categories Directive 2000/31/EC  Transmission of  Article 12 information • mere conduit  Caching  Article 13 • Intermediate storage to accelerate data transmission  Hosting  Article 14 • Storage of information  Other  n/a 12
  • 13. Why a specific liability regime?  Needed for the smooth functioning of the internal market • No data heaven • Enables development of cross-border services and prevents distortions of competition 13
  • 14. Rationale  Exemptions from liability cover only cases where the activity of the ISP is limited to • the technical process of operating • and giving access to a communication network over which – information made available by third parties is – transmitted – or temporarily stored, – for the sole purpose of making the transmission more efficient 14
  • 15. Rationale (bis)  This activity is of a mere • technical, • automatic • and passive nature  which implies that the information society service provider has neither • knowledge of • nor control over  the information which is transmitted or stored 15
  • 16. Limitations of the liability of ISPs  Conditions • Duty to act, under certain circumstances, with a view to preventing or stopping illegal activities • They have to act expeditiously to remove or to disable access to the information concerned • This does not affect the possibility of administrative or judicial injunctions 16
  • 17. Mere conduit (article 12)  No liability for the information transmitted in a communication network on condition that the provider: • does not initiate the transmission • does not select the receiver of the transmission, and • does not select or modify the information contained in the transmission  This extends to the automatic, intermediate and transient storage of the information transmitted in so far as this takes place for the sole purpose of carrying out the transmission in the communication network, and provided that the information is not stored for any period longer than is reasonably necessary for the transmission. 17
  • 18. Caching (article 13)  A service provider is not liable for the automatic, intermediate and temporary storage of that information, performed for the sole purpose of making more efficient the information‘s onward transmission to other recipients of the service upon their request, on condition that the provider • does not modify the information; • complies with conditions on access to the information; • complies with rules regarding the updating of the information, specified in a manner widely recognized and used by industry; • does not interfere with the lawful use of technology, widely recognized and used by industry, to obtain data on the use of the information; and • acts expeditiously to remove or to disable access to the information it has stored upon obtaining actual knowledge of the fact that the information at the initial source of the transmission has been removed from the network, or access to it has been disabled, or that a court or an administrative authority has ordered such removal or disablement. 18
  • 19. Hosting (article 14)  The provider of storage of information is not liable for the information stored at the request of a recipient of the service, on condition that the provider • does not have actual knowledge of illegal activity or information and • is not aware of facts or circumstances from which the illegal activity or information is apparent; or  or • upon obtaining such knowledge or awareness, acts expeditiously to remove or to disable access to the information.  Exemption does not apply when the recipient of the service is acting under the authority or the control of the provider. 19
  • 20. Legal issues in a nutshell  Hosting providers will not be held liable in cases they • unknowingly (?) 1  host • illegal material (?) 2  provided they • act in an (undefined) expeditious way 3 • after having received (undefined) actual knowledge of the infringement 4 20
  • 21. 1 "Actual knowledge"…  …of the allegedly infringing material?  …or of the illegality of the material?  It is unclear what an authority would consider sufficient to provide ―actual‖ knowledge – Except in Finland (upon notification… but only for ©)  ~12 years after the adoption of the legislation, we still wonder whether a notification or formal legal order for removal would be considered adequate • except in States where guidelines for notification exist 21
  • 22. Recent case in UK  An allegation of defamation does not constitute actual notice of unlawful activity • ―It cannot be right that any provider is required, in the light of the strict terms of Regulation 19 [ Art. 14], to take [complainant’s notification] at face value. Clearly more is required for a provider to acquire a sufficient state of knowledge to be deprived of the statutory protection‖ – Tamiz v Google [2012] EWHC 449 (QB) (Mar. 2, 2012) 22
  • 23. Case study  Dec. 2010: a Wikileaks mirror is hosted in France  The French ISP discovers it in the press  Does it have to take it down?  The ISP itself went before courts to know what it must do! 23
  • 24. 2 "Illegal material"…  …to the eyes of the rights owner?  …to the eyes of someone else?  …to the opinion of the hosting provider?  contrary to • State laws – which one? • or to any private rule? 24
  • 25. 3 Act in an "expeditious way"?  Within • Minutes? • Hours? • Days? 25
  • 26. 4 "notice"?  Formalities • Example of France – Wikipedia (CFI, Oct. 29, 2007) – Amen (Court of cassation, Feb. 17, 2011) • In practice, providers have their own rules & procedures – Not always transparent though 26
  • 27. 2. From principle to practice 27
  • 28. 28
  • 29. 29
  • 30. Lessons learned 'when in doubt, take it down‘ • remov material that doesn‘t violate the law 30
  • 31. 31
  • 32. Lessons learned  Private intermediaries are risk averse • 'when in doubt, take it down‘ • remove material that doesn‘t violate the law 32
  • 33. Selection of cases  France  Germany  Italy  Spain 33
  • 34. Germany  Federal Supreme Court, April 19, 2007 • eBay – an online auction platform may be liable for trademark infringement caused by the seller‘s offers under the concept of liability as a ―disturber‖ (―Störer‖) – the defendant not only has to delete the specific offers whenever its attention is drawn to a trademark infringement – but also is obliged to take (specific) action to prevent further infringing offers [ discussed below at § 3] 34
  • 35. Italy  Milan Tribunal, April 16, 2010 • Italy v. Google (‗Vivi Down‘ case) • 3 Google executives – acquitted with regard to the charge of defamation – convicted for violating data protection in connection with the on-line posting of a video showing a disabled person being bullied and insulted 35
  • 36. Spain  Court of Madrid, September 20, 2010 • Telecinco v. YouTube • A video sharing platform is a hosting provider • it is exempted from liability for the copyright infringement committed by its users 36
  • 37. France  Court of cassation, February 17, 2011 • DailyMotion (YouTube-like) • Fuzz (Digg-like) • Amen 37
  • 38. Across the EU:  Conflicting caselaw  Lack of legal certainty 38
  • 39. EU  CJEU, March 23, 2010, C-236/08 to C- 238/08, Vuitton v. Google • A referencing service provider – stores information supplied by the advertiser – transmits information from the advertiser, over a communications network accessible to internet users and stores – holds in memory on its server, certain data, such as the keywords selected by the advertiser, the advertising link and the accompanying commercial message, as well as the address of the advertiser‘s site 39
  • 40. EU [2]  In order to establish whether the liability of a referencing service provider may be limited under Article 14 of Directive 2000/31, it is necessary • to examine whether the role played by that service provider is neutral, – in the sense that its conduct is merely technical, automatic and passive, pointing to a lack of knowledge or control of the data which it stores  Is it a concept sufficiently clear to be interpreted in a homogeneous way? 40
  • 41. L’Oréal v. eBay C-324/09, July 12, 2011  § 115 • the mere fact that the operator of an online marketplace – stores offers for sale on its server, – sets the terms of its service, – is remunerated for that service – and provides general information to its customers • cannot have the effect of denying it the exemptions from liability provided for by Directive 2000/31 41
  • 42. L’Oréal v. eBay  § 116 • [If] the operator has provided assistance which entails, – in particular, optimizing the presentation of the offers for sale in question or promoting those offers, • it must be considered – not to have taken a neutral position between the customer- seller concerned and potential buyers – but to have played an active role of such a kind as to give it knowledge of, or control over, the data relating to those offers for sale. • It cannot then rely, in the case of those data, on the exemption from liability referred to in Article 14 42
  • 43. L’Oréal v. eBay  In the absence of an active role, subsidiary question: • Did the hosting provider have ‗actual knowledge of illegal activity or information‘? • Is the hosting provider ‗aware of facts or circumstances from which the illegal activity or information is apparent‘? • If a diligent economic operator would have realized that the content in question is unlawful  Liability if no action 43
  • 44. New questions  Does a notice related to a posting in particular equates to ‗flagging‘ its author?  The Court has not elaborated on how an ISP can obtain "actual knowledge" 44
  • 45. Ladies & gentlemen, please welcome…  Bono  Ten for the Next Ten, New-York Times, Jan. 2, 2010 45
  • 46. Intellectual Property Developers  Caution! The only thing protecting the movie and TV industries from the fate that has befallen music and indeed the newspaper business is the size of the files. The immutable laws of bandwidth tell us we‘re just a few years away from being able to download an entire season of ―24‖ in 24 seconds. Many will expect to get it free.  A decade‘s worth of music file-sharing and swiping has made clear that the people it hurts are the creators — in this case, the young, fledgling songwriters who can‘t live off ticket and T-shirt sales like the least sympathetic among us — and the people this reverse Robin Hooding benefits are rich service providers, whose swollen profits perfectly mirror the lost receipts of the music business.  We‘re the post office, they tell us; who knows what‘s in the brown-paper packages? But we know from America‘s noble effort to stop child pornography, not to mention China‘s ignoble effort to suppress online dissent, that it’s perfectly possible to track content. Perhaps movie moguls will succeed where musicians and their moguls have failed so far, and rally America to defend the most creative economy in the world, where music, film, TV and video games help to account for nearly 4 percent of gross domestic product. 46
  • 48. Directive 2000/31/EC, Article 15  Member States shall not impose a general obligation on providers, – when providing the services covered by Articles 12, 13 and 14,  to monitor the information which they transmit or store,  nor a general obligation actively to seek facts or circumstances indicating illegal activity 48
  • 49. Moving from ex post reaction to ex ante action… 49
  • 50. 50
  • 51. L’Oréal v. eBay  Can a court order online service providers to take measures to prevent future infringements of intellectual property? – Article 11 of Directive 2004/48  Courts are ―able to order [an intermediary] to take measures which contribute, not only to bringing to an end infringements of those rights […], but also to preventing further infringements […].  Those injunctions must be effective, proportionate, dissuasive and must not create barriers to legitimate trade‖ (§ 144) 51
  • 52. Cases C-70/10, SABAM v. Scarlet & C-360/10, SABAM v. Netlog  European legal framework precludes a national court from issuing an injunction against a hosting service provider which requires it to install a system for filtering • all electronic communications passing via its services [Scarlet] • all or most of the information which is stored on its servers by its service users [Netlog] • which applies indiscriminately to all of those users • as a preventative measure • exclusively at its expense, and • for an unlimited period  which is capable of identifying electronic files containing musical, cinematographic or audio-visual work in respect of which the applicant for the injunction claims to hold intellectual property rights, with a view to preventing those works from being made available to the public in breach of copyright 52
  • 53. Challenges to the 2000 Directive  These cases raise the same issue: • can injunctions apply to – future, – unspecified • infringements?  L‘Oréal: the Court finds the injunctions proportionate  SABAM: the Court finds them incompatible 53
  • 54. Ex ante applications?  Belgium • Belgacom & Telenet must block access to The Pirate Bay – Antwerpen, September 26, 2011  UK • Blocking access to newzbin.com, "a general obligation to monitor, but rather a specific and limited one‖ – [2011] EWHC 1981 (Ch) & [2011] EWHC 2714 (Ch)  Finland • Elisa must block access to The Pirate Bay – Helsinki District Court, Oct. 26, 2011 54
  • 55. Ex post applications?  Netherlands • XS4ALL and Ziggo must block access to The Pirate Bay – Hague, Jan. 11, 2012  Germany • A Hamburg Court ruled that RapidShare has to proactively filter the files uploaded by its users – with respect to a list of 4,000 files – March 14, 2012 55
  • 56. Removing is not enough  ―when a website is successfully removed from a host server, it reappears very easily under another name‖ 56
  • 57. "Streisand effect"  Online phenomenon in which an attempt to hide or remove a piece of information has the consequence of publicizing the information more widely • Named after American entertainer Barbra Streisand, whose 2003 attempt to suppress photographs of her residence inadvertently generated further publicity – http://en.wikipedia.org/wiki/Streisand_effect 57
  • 58. France, March 29, 2012 58
  • 59. HIDE, OR FIGHT? Removal  Effect Enforcement  Cause 59
  • 61. What the SABAM cases brought to the debate  Fair balance with fundamental rights • of the ISPs: freedom to conduct a business – article 16 of the Charter • of ISPs‘s users: right to protection of their personal data and their freedom to receive or impart information – articles 8 and 11 of the Charter 61
  • 62.  COM (2011) 942 at § 3.1 • « provide clarification, for example concerning the liability of intermediary internet providers » • Action: « The Commission will ensure that the Electronic Commerce Directive [is] correctly applied » 62
  • 63. Issues  Abuse • ISPs opt for the least costly and most legally secure option  Neutrality • intermediaries have had little if any interest in adopting devolved law enforcement roles  Private police • They increasingly feel obliged to do so as a result of either government pressure or legal uncertainty created by (often) unclear legal provisions – VeRO – Content ID – INA / Signature 63
  • 64. Notice & take down  Low cost, distributed, privatized censorship by private companies  Based on business interests  Failure to ensure an adequate balance results in restrictions on freedom of expression 64
  • 65. 65
  • 66. Where are we going to?  2000: Basis for notice and takedown procedures  2011 (consultation): fragmentation of NTD procedures throughout the EU  2013: regulation of NTDs? 66
  • 67. Working Paper “Online services, including e-commerce, in the Single Market”  Requirements for the notice  Possibility to submit a counter-notice by the alleged infringer  Timeframe for blocking or taking down the unlawful content  Liability for providing wrongful notices or for taking down or blocking legal content  Role of the intermediary as a ―private judge‖  Efficiency of a notice and take down procedure 67
  • 68. 12+ years to  Re-invent due process  … or introduce it?  What we may also need: a European version of ChillingEffects.org 68
  • 69. 69
  • 70. 70
  • 71. It’s not only about commerce! 71
  • 72. Beyond the EU borders  Global war against intermediaries? • ACTA • Trans-Pacific Partnership – narrows down the legal definition of ISPs – imposes a specific behavior • SOPA / PIPA (US) 72
  • 73. Recent trends  Domain names seizure • (Wikileaks &) Megaupload examples • I.C.E. « Operation in Our Sites »  Eradicate pointers • Google after the Pirate Bay?  Why not… follow the money? • Visa, MasterCard or PayPal are also intermediaries! 73