SlideShare a Scribd company logo
1 of 7
Download to read offline
Internet Content,
    Licensing and Enforcement
              Keith Kupferschmid
Vice President, Intellectual Property Policy & Enforcement
Software & Information Industry Association (SIIA)

                         Before

          Society of Scholarly Publishing
               November 17, 2004




                  Who is SIIA?
  • The principal international trade
    association for the software code and
    information content industry

  • Formed by the merger of the Software
    Publishers Association (SPA) and the
    Information Industry Association (IIA)

  • Over 600 current members




                 SIIA Members




                                                             1
SIIA Anti-Piracy Program
 • Mission:

   Since 1988, the mission has been to
   reduce software piracy by taking a
   balanced approach that includes
   legislation, education and
   enforcement.




               Enforcement
 • Over 50 companies grant SIIA
   authority to investigate and settle
   claims of copyright infringement on
   their behalf.

 • On a case-by-case basis, members
   grant authority to litigate on their
   behalf.




   How Does SIIA’s Anti-Piracy
        Program Work?
• About 120 reports a month
  – AP Hotline: 800-388-7478
  – Website: www.siia.net/piracy
  – Email: piracy@siia.net
• About 200 corporate cases
• Thousand of DMCA cease
  and desist letters a day




                                          2
Who is Liable for
       Content Piracy?
If an organization is using illegal
copies of content, the organization
may face a civil suit for damages and
any profits attributable to the pirated
content.
(e.g., Lowry Reports v. Legg Mason)




                                          3
Types of Content Piracy
    • Corporate Piracy
    • Internet Piracy
        – Auction Site Piracy
        – Bulletin Board Services & News Groups
        – FTP Sites, Warez, IRC
        – Peer-to- Peer
        – Live Data Feed Piracy




                   Combating Piracy
    • Law

    • Technology

    • Education

    • New Business Models and Contracts




       Combating Piracy – the Law
            US Copyright Act
TITLE 17 OF THE US CODE:
•   Automatically protects content from the moment of its creation

•   Gives the copyright holder the exclusive rights to reproduce and
    distribute the copyrighted work

•   Provides for penalties
    – civil penalties up to $150,000 per title infringed
    – criminal penalties up to $250,000 per title infringed and jail terms of
      up to five years




                                                                                4
Pending Anti-Piracy Legislation
• H.R. 3632, Anti-Counterfeiting Legislation

• S. 2560, the Induce Act

• S. 2237, the PIRATE Act of 2004

• H.R. 4077, the Piracy Deterrence and
  Education Act




Combating Piracy - Technology

• Technology
  – Access Control Technologies
  – Copy Controls Technologies
  – Tracking and Usage Technologies


• Digital Rights Management
  – embedded electronic licensing technology (e.g.
    FLEXlm)
  – use tracking and usage technologies (e.g.,
    SAMSuite)




 Combating Piracy - Education
• Certified Software Manager Course

• Educational Tools

• Videos
  – A Shared Set of Values
  – It Could Have Been So Easy




                                                     5
3 Key Questions for
              Enterprises

1. Do I have a problem with content piracy?
2. What is the likelihood that I will be
   caught?
3. How do I protect my organization from
   the illegal copying by our employees?




        Do I Have A Problem?
 –   Have you ever sent an article to someone?
        – Did you check on rights to do so
 –   Do you think that any employee has ever sent
     or posted content?
        – outside the company/outside your
          license
 –   Does your company have any disgruntled
     former employees who might report your
     company?

       Every company has a problem!




     What Is The Likelihood That
         I Will Be Caught?
 – Software piracy now versus 16 years ago
 – Public understanding of risk of music piracy
 – If caught, what will I pay in damages?
        –Penalties under copyright law
        –Lowry Reports v. Legg Mason

  This is a question of risk assessment




                                                    6
How Do I Protect My
  Organization From Illegal
 Copying By Our Employees?
• Educate your employees

• Become Content Compliant




     For More Information:
 Software & Information Industry Association
     1090 Vermont Ave, NW, Sixth Floor
          Washington, D.C. 20005
         Phone: +1 (202) 289-7442
• World Wide Web: www.siia.net
• Email: keithk@siia.net

                Thank You




                                               7

More Related Content

What's hot

Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracymsjasmin
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Small Business Trends
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Laws and policies that Help fight Cybercrime - PAD 747
Laws and policies that Help fight Cybercrime - PAD 747Laws and policies that Help fight Cybercrime - PAD 747
Laws and policies that Help fight Cybercrime - PAD 747jmanishor
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 

What's hot (20)

Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracy
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Laws and policies that Help fight Cybercrime - PAD 747
Laws and policies that Help fight Cybercrime - PAD 747Laws and policies that Help fight Cybercrime - PAD 747
Laws and policies that Help fight Cybercrime - PAD 747
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 

Viewers also liked (7)

186 sspcc4 b_meyer
186 sspcc4 b_meyer186 sspcc4 b_meyer
186 sspcc4 b_meyer
 
90 paulis
90 paulis90 paulis
90 paulis
 
Scott class learning 2011
Scott class learning 2011Scott class learning 2011
Scott class learning 2011
 
248 brenneman
248 brenneman248 brenneman
248 brenneman
 
215 byrne.ppt
215 byrne.ppt215 byrne.ppt
215 byrne.ppt
 
251 carpenter
251 carpenter251 carpenter
251 carpenter
 
Hildegard Von Bingen
Hildegard Von BingenHildegard Von Bingen
Hildegard Von Bingen
 

Similar to 66 keith kupferschmid_presentation

Similar to 66 keith kupferschmid_presentation (20)

IPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptxIPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptx
 
it act
it actit act
it act
 
E commerce
E commerce E commerce
E commerce
 
Hackers
HackersHackers
Hackers
 
Movie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfMovie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdf
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issues
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).ppt
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.ppt
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 

More from Society for Scholarly Publishing

04142015 ssp webinar_theworldisflatforscholarlypublishing_caitlinmeadows
04142015 ssp webinar_theworldisflatforscholarlypublishing_caitlinmeadows04142015 ssp webinar_theworldisflatforscholarlypublishing_caitlinmeadows
04142015 ssp webinar_theworldisflatforscholarlypublishing_caitlinmeadowsSociety for Scholarly Publishing
 
04142015 ssp webinar_theworldisflatforscholarlypublishing_bruceheterick
04142015 ssp webinar_theworldisflatforscholarlypublishing_bruceheterick04142015 ssp webinar_theworldisflatforscholarlypublishing_bruceheterick
04142015 ssp webinar_theworldisflatforscholarlypublishing_bruceheterickSociety for Scholarly Publishing
 

More from Society for Scholarly Publishing (20)

10052016 ssp seminar2_newsham
10052016 ssp seminar2_newsham10052016 ssp seminar2_newsham
10052016 ssp seminar2_newsham
 
10052016 ssp seminar2_rivera
10052016 ssp seminar2_rivera10052016 ssp seminar2_rivera
10052016 ssp seminar2_rivera
 
10052016 ssp seminar2_pesanelli
10052016 ssp seminar2_pesanelli10052016 ssp seminar2_pesanelli
10052016 ssp seminar2_pesanelli
 
10052016 ssp seminar2_harley
10052016 ssp seminar2_harley10052016 ssp seminar2_harley
10052016 ssp seminar2_harley
 
10042016 ssp seminar1_session4_myers
10042016 ssp seminar1_session4_myers10042016 ssp seminar1_session4_myers
10042016 ssp seminar1_session4_myers
 
10042016 ssp seminar1_session4_demers
10042016 ssp seminar1_session4_demers10042016 ssp seminar1_session4_demers
10042016 ssp seminar1_session4_demers
 
10042016 ssp seminar1_session4_cochran
10042016 ssp seminar1_session4_cochran10042016 ssp seminar1_session4_cochran
10042016 ssp seminar1_session4_cochran
 
10042016 ssp seminar1_session3_stanley
10042016 ssp seminar1_session3_stanley10042016 ssp seminar1_session3_stanley
10042016 ssp seminar1_session3_stanley
 
10042016 ssp seminar1_session3_ranganathan
10042016 ssp seminar1_session3_ranganathan10042016 ssp seminar1_session3_ranganathan
10042016 ssp seminar1_session3_ranganathan
 
10042016 ssp seminar1_session3_odike
10042016 ssp seminar1_session3_odike10042016 ssp seminar1_session3_odike
10042016 ssp seminar1_session3_odike
 
10042016 ssp seminar1_session3_cochran
10042016 ssp seminar1_session3_cochran10042016 ssp seminar1_session3_cochran
10042016 ssp seminar1_session3_cochran
 
10042016 ssp seminar1_session2_walker
10042016 ssp seminar1_session2_walker10042016 ssp seminar1_session2_walker
10042016 ssp seminar1_session2_walker
 
10042016 ssp seminar1_session2_ivins
10042016 ssp seminar1_session2_ivins10042016 ssp seminar1_session2_ivins
10042016 ssp seminar1_session2_ivins
 
10042016 ssp seminar1_session2_holland
10042016 ssp seminar1_session2_holland10042016 ssp seminar1_session2_holland
10042016 ssp seminar1_session2_holland
 
10042016 ssp seminar1_session1_stanley
10042016 ssp seminar1_session1_stanley10042016 ssp seminar1_session1_stanley
10042016 ssp seminar1_session1_stanley
 
10042016 ssp seminar1_session1_keane
10042016 ssp seminar1_session1_keane10042016 ssp seminar1_session1_keane
10042016 ssp seminar1_session1_keane
 
10042016 ssp seminar1_session1_ivins
10042016 ssp seminar1_session1_ivins10042016 ssp seminar1_session1_ivins
10042016 ssp seminar1_session1_ivins
 
10042016 ssp seminar1_session1_asadilari
10042016 ssp seminar1_session1_asadilari10042016 ssp seminar1_session1_asadilari
10042016 ssp seminar1_session1_asadilari
 
04142015 ssp webinar_theworldisflatforscholarlypublishing_caitlinmeadows
04142015 ssp webinar_theworldisflatforscholarlypublishing_caitlinmeadows04142015 ssp webinar_theworldisflatforscholarlypublishing_caitlinmeadows
04142015 ssp webinar_theworldisflatforscholarlypublishing_caitlinmeadows
 
04142015 ssp webinar_theworldisflatforscholarlypublishing_bruceheterick
04142015 ssp webinar_theworldisflatforscholarlypublishing_bruceheterick04142015 ssp webinar_theworldisflatforscholarlypublishing_bruceheterick
04142015 ssp webinar_theworldisflatforscholarlypublishing_bruceheterick
 

66 keith kupferschmid_presentation

  • 1. Internet Content, Licensing and Enforcement Keith Kupferschmid Vice President, Intellectual Property Policy & Enforcement Software & Information Industry Association (SIIA) Before Society of Scholarly Publishing November 17, 2004 Who is SIIA? • The principal international trade association for the software code and information content industry • Formed by the merger of the Software Publishers Association (SPA) and the Information Industry Association (IIA) • Over 600 current members SIIA Members 1
  • 2. SIIA Anti-Piracy Program • Mission: Since 1988, the mission has been to reduce software piracy by taking a balanced approach that includes legislation, education and enforcement. Enforcement • Over 50 companies grant SIIA authority to investigate and settle claims of copyright infringement on their behalf. • On a case-by-case basis, members grant authority to litigate on their behalf. How Does SIIA’s Anti-Piracy Program Work? • About 120 reports a month – AP Hotline: 800-388-7478 – Website: www.siia.net/piracy – Email: piracy@siia.net • About 200 corporate cases • Thousand of DMCA cease and desist letters a day 2
  • 3. Who is Liable for Content Piracy? If an organization is using illegal copies of content, the organization may face a civil suit for damages and any profits attributable to the pirated content. (e.g., Lowry Reports v. Legg Mason) 3
  • 4. Types of Content Piracy • Corporate Piracy • Internet Piracy – Auction Site Piracy – Bulletin Board Services & News Groups – FTP Sites, Warez, IRC – Peer-to- Peer – Live Data Feed Piracy Combating Piracy • Law • Technology • Education • New Business Models and Contracts Combating Piracy – the Law US Copyright Act TITLE 17 OF THE US CODE: • Automatically protects content from the moment of its creation • Gives the copyright holder the exclusive rights to reproduce and distribute the copyrighted work • Provides for penalties – civil penalties up to $150,000 per title infringed – criminal penalties up to $250,000 per title infringed and jail terms of up to five years 4
  • 5. Pending Anti-Piracy Legislation • H.R. 3632, Anti-Counterfeiting Legislation • S. 2560, the Induce Act • S. 2237, the PIRATE Act of 2004 • H.R. 4077, the Piracy Deterrence and Education Act Combating Piracy - Technology • Technology – Access Control Technologies – Copy Controls Technologies – Tracking and Usage Technologies • Digital Rights Management – embedded electronic licensing technology (e.g. FLEXlm) – use tracking and usage technologies (e.g., SAMSuite) Combating Piracy - Education • Certified Software Manager Course • Educational Tools • Videos – A Shared Set of Values – It Could Have Been So Easy 5
  • 6. 3 Key Questions for Enterprises 1. Do I have a problem with content piracy? 2. What is the likelihood that I will be caught? 3. How do I protect my organization from the illegal copying by our employees? Do I Have A Problem? – Have you ever sent an article to someone? – Did you check on rights to do so – Do you think that any employee has ever sent or posted content? – outside the company/outside your license – Does your company have any disgruntled former employees who might report your company? Every company has a problem! What Is The Likelihood That I Will Be Caught? – Software piracy now versus 16 years ago – Public understanding of risk of music piracy – If caught, what will I pay in damages? –Penalties under copyright law –Lowry Reports v. Legg Mason This is a question of risk assessment 6
  • 7. How Do I Protect My Organization From Illegal Copying By Our Employees? • Educate your employees • Become Content Compliant For More Information: Software & Information Industry Association 1090 Vermont Ave, NW, Sixth Floor Washington, D.C. 20005 Phone: +1 (202) 289-7442 • World Wide Web: www.siia.net • Email: keithk@siia.net Thank You 7