SlideShare une entreprise Scribd logo
1  sur  17
INTELLECTUAL PROPERTY IN
CYBERSPACE: HOW IT IS DIFFERENT
AND REGULATED IN THE EU
Prof. dr. Mindaugas Kiškis
mkiskis@mruni.eu / www.kiskis.eu
What is intellectual property (IP) in
cyberspace?
• Traditional forms of IP, which are
transacted (sold/purchased) in
cyberspace (tangible IP)
• Traditional forms of IP, which have
converted into electronic goods
(intangible IP)
• Entirely electronic forms of IP, which
are transacted
(sold/purchased/consumed) only in
cyberspace (intangible IP)
IP in cyberspace is more
susceptible to infringement and
infringement is more dangerous
Three tiers of IP infringement
in cyberspace
Infringements related to tangible IP
• Fake goods
• New platforms for
distribution (retail and
wholesale)
Infringements related to intangible IP
items
• Digital piracy
• Cyber espionage (theft of
know-how and commercial
secrets)
• Spoofing of legitimate sites
/ content (advertising fraud)
• Full digital transactions and
delivery
Novel infringements
• Intermediaries (abettors) of
infringement (Piratebay,
Megaupload)
• Online aggregation of illicit
goods/content/tools (e.g. pay
TV decrypting)
• Theft of virtual items in virtual
worlds
Why IP infringements in cyberspace
are more dangerous?
•Inherently cross-border
•Super scalable
•Very low cost
Responses
• Regulation / criminalization
• Education
• Training
• Are they sufficient ?
Regulation / criminalization
•Directive 2004/48/EC of 29 April 2004 on the
enforcement of intellectual property rights
•23 November 2001 Council of Europe
Convention on Cybercrime (effective 1 July 2004)
•Further initiatives on regulation have stalled
Convention on Cybercrime
• Article 10 – Offences related to infringements of copyright and related
rights
• Criminal liability for the infringement of copyright, where such acts are
committed wilfully, on a commercial scale and by means of a computer
system.
• Criminal liability for the infringement of related rights, where such acts are
committed wilfully, on a commercial scale and by means of a computer
system.
• Article 11 – Attempt and aiding or abetting
• Criminal liability for aiding or abetting the commission of any of the
offences established in accordance with Articles 2 through 10 with intent
that such offence be committed, when committed intentionally.
Legal issues
• Who may / shall initiate the enforcement?
• Commercial purpose / scale as a prerequisite of
infringement
• Legislation is vague and poorly drafted
• Not a serious crime = limited investigation means
• LT experience – omission of neighboring rights
Practical problems
• Difficult and expensive to track / investigate (multiple platforms,
cross-border)
• Difficult expensive enforcement (foreign parties unreachable)
• Non-cooperative users and intermediaries
• Robin Hood infringers (large damage, but no profit to infringer)
• Non-direct profit by perpetrators (advertising, backlinks,
domain/website resales)
Political problems
• Low priority (cost v. benefit; if no/little domestic IP is
infringed, then enforcement benefits mainly foreign
parties)
• Unhelpful public policies (copyright levies are based
on presumption of digital piracy – users feel entitled
to pirated content)
Technological problems
• Development of
sophistication and user-
friendliness of
anonymization/encryption
technologies
• Development of payment
options (premium SMS /
calls, cryptocurrencies)
Case examples
• Megaupload.com (abetting)
• Visosknygos.com (AllBooks)
(pirated digital book portal)
• Aludiski.com (indirect sales)
Thank you!
Prof. dr. Mindaugas Kiškis
mkiskis@mruni.eu / www.kiskis.eu

Contenu connexe

Tendances

Collisions in the digital paradigm short
Collisions in the digital paradigm short Collisions in the digital paradigm short
Collisions in the digital paradigm short David Harvey
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackersHarsh Sharma
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerceHimanshu Pathak
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyWillislwhite12
 
Ethics
EthicsEthics
EthicsPinny
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual PropertyNazrul Islam
 
digital law
digital lawdigital law
digital law11tsk
 
ECTA - Notification and Takedown in Italy
ECTA - Notification and Takedown in ItalyECTA - Notification and Takedown in Italy
ECTA - Notification and Takedown in ItalyMariano Cunietti
 
Copyright in video
Copyright in videoCopyright in video
Copyright in videoBob182003
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issuesNickardo Salmon
 
Legal issues concerning social media & publicity
Legal issues concerning social media & publicityLegal issues concerning social media & publicity
Legal issues concerning social media & publicityNatalie Yap
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Santosh Sigdel
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Hannah Rudman
 

Tendances (20)

Collisions in the digital paradigm short
Collisions in the digital paradigm short Collisions in the digital paradigm short
Collisions in the digital paradigm short
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 
Digital law
Digital lawDigital law
Digital law
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
Ethics
EthicsEthics
Ethics
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
digital law
digital lawdigital law
digital law
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
ECTA - Notification and Takedown in Italy
ECTA - Notification and Takedown in ItalyECTA - Notification and Takedown in Italy
ECTA - Notification and Takedown in Italy
 
I walden
I waldenI walden
I walden
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issues
 
Legal issues concerning social media & publicity
Legal issues concerning social media & publicityLegal issues concerning social media & publicity
Legal issues concerning social media & publicity
 
Fundamental of copy right law
Fundamental of copy right lawFundamental of copy right law
Fundamental of copy right law
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.
 

Similaire à Intellectual Property in Cyberspace

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 
Legal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas AfricaLegal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas AfricaDayo Ogunyemi
 
ICANN Contract vs National Law
ICANN Contract vs National LawICANN Contract vs National Law
ICANN Contract vs National LawBlacknight
 
Please write a against Rebuttal on these points 1 IP laws c.pdf
Please write a against Rebuttal on these points 1 IP laws c.pdfPlease write a against Rebuttal on these points 1 IP laws c.pdf
Please write a against Rebuttal on these points 1 IP laws c.pdfshreedattaagenciees2
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan kabir Solicitor
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaAPNIC
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptssuserd26df0
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesRoshelleBonDacara
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERARoshelleBonDacara
 

Similaire à Intellectual Property in Cyberspace (20)

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter5.ppt
Chapter5.pptChapter5.ppt
Chapter5.ppt
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Legal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas AfricaLegal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas Africa
 
ICANN Contract vs National Law
ICANN Contract vs National LawICANN Contract vs National Law
ICANN Contract vs National Law
 
Please write a against Rebuttal on these points 1 IP laws c.pdf
Please write a against Rebuttal on these points 1 IP laws c.pdfPlease write a against Rebuttal on these points 1 IP laws c.pdf
Please write a against Rebuttal on these points 1 IP laws c.pdf
 
Virtual worlds
Virtual worldsVirtual worlds
Virtual worlds
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics Frameworks
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
Whose content? whose revenue? who should be liable for a user's content? jo...
Whose content? whose revenue? who should be liable for a user's content?   jo...Whose content? whose revenue? who should be liable for a user's content?   jo...
Whose content? whose revenue? who should be liable for a user's content? jo...
 
Cyber law
Cyber lawCyber law
Cyber law
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).ppt
 
it act
it actit act
it act
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 

Plus de Mindaugas Kiskis

Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigosAsmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigosMindaugas Kiskis
 
Privatumas Lietuvoje 2015 m.
Privatumas Lietuvoje 2015 m.Privatumas Lietuvoje 2015 m.
Privatumas Lietuvoje 2015 m.Mindaugas Kiskis
 
Lietuvos verslo pasirengimas įgyvendinti GDPR
Lietuvos verslo pasirengimas įgyvendinti GDPRLietuvos verslo pasirengimas įgyvendinti GDPR
Lietuvos verslo pasirengimas įgyvendinti GDPRMindaugas Kiskis
 
Legal implications and consequances of GDPR
Legal implications and consequances of GDPRLegal implications and consequances of GDPR
Legal implications and consequances of GDPRMindaugas Kiskis
 
How to put intellectual property to a good use in your business?
How to put intellectual property to a good use in your business?How to put intellectual property to a good use in your business?
How to put intellectual property to a good use in your business?Mindaugas Kiskis
 
Asmens teisės į privatumą apsauga
Asmens teisės į privatumą apsaugaAsmens teisės į privatumą apsauga
Asmens teisės į privatumą apsaugaMindaugas Kiskis
 
Security and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic CommunicationSecurity and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic CommunicationMindaugas Kiskis
 
Intelektinės nuosavybės inovacijos
Intelektinės nuosavybės inovacijosIntelektinės nuosavybės inovacijos
Intelektinės nuosavybės inovacijosMindaugas Kiskis
 
Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Mindaugas Kiskis
 
Vartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutartiesVartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutartiesMindaugas Kiskis
 
Išmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbuiIšmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbuiMindaugas Kiskis
 
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...Mindaugas Kiskis
 
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų  kuriamas turinys ir intelektinės nuosavybės teisėsVartotojų  kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisėsMindaugas Kiskis
 
Iššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybeiIššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybeiMindaugas Kiskis
 
Teisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėjeTeisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėjeMindaugas Kiskis
 
Teisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos SąjungojeTeisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos SąjungojeMindaugas Kiskis
 
Features of Canada's Innovation System
Features of Canada's Innovation SystemFeatures of Canada's Innovation System
Features of Canada's Innovation SystemMindaugas Kiskis
 
Biobankų veiklos įteisinimas Lietuvoje
Biobankų veiklos įteisinimas LietuvojeBiobankų veiklos įteisinimas Lietuvoje
Biobankų veiklos įteisinimas LietuvojeMindaugas Kiskis
 

Plus de Mindaugas Kiskis (19)

Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigosAsmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
Asmens duomenų apsaugos teisiniai aspektai ir duomenų valdytojo pareigos
 
Privatumas Lietuvoje 2015 m.
Privatumas Lietuvoje 2015 m.Privatumas Lietuvoje 2015 m.
Privatumas Lietuvoje 2015 m.
 
Lietuvos verslo pasirengimas įgyvendinti GDPR
Lietuvos verslo pasirengimas įgyvendinti GDPRLietuvos verslo pasirengimas įgyvendinti GDPR
Lietuvos verslo pasirengimas įgyvendinti GDPR
 
Legal implications and consequances of GDPR
Legal implications and consequances of GDPRLegal implications and consequances of GDPR
Legal implications and consequances of GDPR
 
How to put intellectual property to a good use in your business?
How to put intellectual property to a good use in your business?How to put intellectual property to a good use in your business?
How to put intellectual property to a good use in your business?
 
Asmens teisės į privatumą apsauga
Asmens teisės į privatumą apsaugaAsmens teisės į privatumą apsauga
Asmens teisės į privatumą apsauga
 
Security and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic CommunicationSecurity and confidentiality of Advocate-Client Electronic Communication
Security and confidentiality of Advocate-Client Electronic Communication
 
Intelektinės nuosavybės inovacijos
Intelektinės nuosavybės inovacijosIntelektinės nuosavybės inovacijos
Intelektinės nuosavybės inovacijos
 
Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)Cybercrime in Lithuania (2011)
Cybercrime in Lithuania (2011)
 
Vartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutartiesVartotojų teisė atsisakyti nuotolinės sutarties
Vartotojų teisė atsisakyti nuotolinės sutarties
 
Išmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbuiIšmaniųjų prietaisų naudojimas darbui
Išmaniųjų prietaisų naudojimas darbui
 
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
NUO MAIKLO DŽEKSONO IKI PIRATŲ KRANTO: TRUMPA ŠIUOLAIKINĖS INTELEKTINĖS NUOSA...
 
Creative commons
Creative commonsCreative commons
Creative commons
 
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų  kuriamas turinys ir intelektinės nuosavybės teisėsVartotojų  kuriamas turinys ir intelektinės nuosavybės teisės
Vartotojų kuriamas turinys ir intelektinės nuosavybės teisės
 
Iššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybeiIššūkiai intelektinei nuosavybei
Iššūkiai intelektinei nuosavybei
 
Teisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėjeTeisiniai iššūkiai vartotojams elektroninėje erdvėje
Teisiniai iššūkiai vartotojams elektroninėje erdvėje
 
Teisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos SąjungojeTeisė į mokslą Europos Sąjungoje
Teisė į mokslą Europos Sąjungoje
 
Features of Canada's Innovation System
Features of Canada's Innovation SystemFeatures of Canada's Innovation System
Features of Canada's Innovation System
 
Biobankų veiklos įteisinimas Lietuvoje
Biobankų veiklos įteisinimas LietuvojeBiobankų veiklos įteisinimas Lietuvoje
Biobankų veiklos įteisinimas Lietuvoje
 

Dernier

昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 

Dernier (20)

昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 

Intellectual Property in Cyberspace

  • 1. INTELLECTUAL PROPERTY IN CYBERSPACE: HOW IT IS DIFFERENT AND REGULATED IN THE EU Prof. dr. Mindaugas Kiškis mkiskis@mruni.eu / www.kiskis.eu
  • 2. What is intellectual property (IP) in cyberspace? • Traditional forms of IP, which are transacted (sold/purchased) in cyberspace (tangible IP) • Traditional forms of IP, which have converted into electronic goods (intangible IP) • Entirely electronic forms of IP, which are transacted (sold/purchased/consumed) only in cyberspace (intangible IP)
  • 3. IP in cyberspace is more susceptible to infringement and infringement is more dangerous
  • 4. Three tiers of IP infringement in cyberspace
  • 5. Infringements related to tangible IP • Fake goods • New platforms for distribution (retail and wholesale)
  • 6. Infringements related to intangible IP items • Digital piracy • Cyber espionage (theft of know-how and commercial secrets) • Spoofing of legitimate sites / content (advertising fraud) • Full digital transactions and delivery
  • 7. Novel infringements • Intermediaries (abettors) of infringement (Piratebay, Megaupload) • Online aggregation of illicit goods/content/tools (e.g. pay TV decrypting) • Theft of virtual items in virtual worlds
  • 8. Why IP infringements in cyberspace are more dangerous? •Inherently cross-border •Super scalable •Very low cost
  • 9. Responses • Regulation / criminalization • Education • Training • Are they sufficient ?
  • 10. Regulation / criminalization •Directive 2004/48/EC of 29 April 2004 on the enforcement of intellectual property rights •23 November 2001 Council of Europe Convention on Cybercrime (effective 1 July 2004) •Further initiatives on regulation have stalled
  • 11. Convention on Cybercrime • Article 10 – Offences related to infringements of copyright and related rights • Criminal liability for the infringement of copyright, where such acts are committed wilfully, on a commercial scale and by means of a computer system. • Criminal liability for the infringement of related rights, where such acts are committed wilfully, on a commercial scale and by means of a computer system. • Article 11 – Attempt and aiding or abetting • Criminal liability for aiding or abetting the commission of any of the offences established in accordance with Articles 2 through 10 with intent that such offence be committed, when committed intentionally.
  • 12. Legal issues • Who may / shall initiate the enforcement? • Commercial purpose / scale as a prerequisite of infringement • Legislation is vague and poorly drafted • Not a serious crime = limited investigation means • LT experience – omission of neighboring rights
  • 13. Practical problems • Difficult and expensive to track / investigate (multiple platforms, cross-border) • Difficult expensive enforcement (foreign parties unreachable) • Non-cooperative users and intermediaries • Robin Hood infringers (large damage, but no profit to infringer) • Non-direct profit by perpetrators (advertising, backlinks, domain/website resales)
  • 14. Political problems • Low priority (cost v. benefit; if no/little domestic IP is infringed, then enforcement benefits mainly foreign parties) • Unhelpful public policies (copyright levies are based on presumption of digital piracy – users feel entitled to pirated content)
  • 15. Technological problems • Development of sophistication and user- friendliness of anonymization/encryption technologies • Development of payment options (premium SMS / calls, cryptocurrencies)
  • 16. Case examples • Megaupload.com (abetting) • Visosknygos.com (AllBooks) (pirated digital book portal) • Aludiski.com (indirect sales)
  • 17. Thank you! Prof. dr. Mindaugas Kiškis mkiskis@mruni.eu / www.kiskis.eu