Online Copyright Infringement Liability Limitation Act

From Wikipedia, the free encyclopedia
Online Copyright Infringement Liability Limitation Act
Great Seal of the United States
Long titleTo amend title 17, United States Code, to implement the World Intellectual Property Organization Copyright Treaty and Performances and Phonograms Treaty, and for other purposes, as part of the Digital Millennium Copyright Act.
Acronyms (colloquial)OCILLA
NicknamesDMCA 512; Safe Harbor
Enacted bythe 105th United States Congress
EffectiveOctober 28, 1998
Citations
Public lawPub. L. 105-304
Statutes at Large112 Stat. 2860 (1998)
Codification
Acts amendedCopyright Act of 1976
Titles amended17 (Copyrights)
U.S.C. sections created17 U.S.C. §§ 512
Legislative history
  • Introduced in the House of Representatives as H.R. 2281 by Howard Coble (R-NC) on July 29, 1997
  • Committee consideration by House Judiciary Committee (Subcommittee on Courts and Intellectual Property); House Commerce Committee (Subcommittee on Telecommunications, Trade, and Consumer Protection)
  • Passed the House on August 4, 1998 (voice vote)
  • Passed the Senate on September 17, 1998 (unanimous consent)
  • Reported by the joint conference committee on October 8, 1998; agreed to by the Senate on October 8, 1998 (unanimous consent) and by the House on October 12, 1998 (voice vote)
  • Signed into law by President Bill Clinton on October 28, 1998
Major amendments
None

The Online Copyright Infringement Liability Limitation Act (OCILLA) is United States federal law that creates a conditional 'safe harbor' for online service providers (OSP), a group which includes Internet service providers (ISP) and other Internet intermediaries, by shielding them for their own acts of direct copyright infringement (when they make unauthorized copies) as well as shielding them from potential secondary liability for the infringing acts of others. OCILLA was passed as a part of the 1998 Digital Millennium Copyright Act (DMCA) and is sometimes referred to as the "Safe Harbor" provision or as "DMCA 512" because it added Section 512 to Title 17 of the United States Code. By exempting Internet intermediaries from copyright infringement liability provided they follow certain rules, OCILLA attempts to strike a balance between the competing interests of copyright owners and digital users.

Overview[edit]

The 1998 DMCA was the U.S. implementation of the 1996 WIPO Copyright Treaty (WCT) directive to "maintain a balance between the rights of authors and the larger public interest, particularly education, research and access to information"[1] when updating copyright norms for the digital age. In the context of Internet intermediaries, OCILLA attempts to strike this balance by immunizing OSP's for copyright liability stemming from their own acts of direct copyright infringement (as primary infringers of copyright), as well as from the acts of their users (as secondary infringers of copyright), provided that OSP's comply with two general requirements protecting the rights of authors.

First, the OSP must "adopt and reasonably implement a policy" of addressing and terminating accounts of users who are found to be "repeat infringers."[2] Second, the OSP must accommodate and not interfere with "standard technical measures."[3] "Standard technical measures" are defined as measures that copyright owners use to identify or protect copyrighted works, that have been developed pursuant to a broad consensus of copyright owners and service providers in an open, fair and voluntary multi-industry process, are available to anyone on reasonable nondiscriminatory terms, and do not impose substantial costs or burdens on service providers.

OSPs may qualify for one or more of the Section 512 safe harbors under § 512(a)-(d), for immunity from copyright liability stemming from: transmitting,[4] caching,[5] storing,[6] or linking[7] to infringing material. An OSP who complies with the requirements for a given safe harbor is not liable for money damages, but may still be ordered by a court to perform specific actions such as disabling access to infringing material.

In addition to the two general requirements listed above, all four safe harbors impose additional requirements for immunity. The safe harbor for storage of infringing material under § 512(c) is the most commonly encountered because it immunizes OSPs such as YouTube that might inadvertently host infringing material uploaded by users.

Taken as a whole, OCILLA's passage represented a victory for telecom and Internet related industry groups over powerful copyright interests who had wanted service providers to be held strictly liable for the acts of their users. However, copyright owners also obtained concessions. In addition to the general and specific preconditions on the created immunity, OCILLA requires OSP's seeking an immunity to designate an agent to whom notices of copyright infringement can be sent,[8] and to disclose information about those users who are allegedly infringers.[9]

Safe harbor provision for online storage - § 512(c)[edit]

Section 512(c) applies to OSPs that store infringing material. In addition to the two general requirements that OSPs comply with standard technical measures and remove repeat infringers, § 512(c) also requires that the OSP: 1) not receive a financial benefit directly attributable to the infringing activity, 2) not be aware of the presence of infringing material or know any facts or circumstances that would make infringing material apparent, and 3) upon receiving notice from copyright owners or their agents, act expeditiously to remove or disable access to the purported infringing material.

Direct financial benefit[edit]

An OSP must "not receive a financial benefit directly attributable to the infringing activity" to qualify for § 512(c) protection. However, it is not always easy to determine what qualifies as a direct financial benefit under the statute.

One example of an OSP that did receive a direct financial benefit from infringing activity was Napster. In A&M Records, Inc. v. Napster, Inc.,[10] the court held that copyrighted material on Napster's system created a "draw" for customers which resulted in a direct financial benefit because Napster's future revenue was directly dependent on increases in user-base. Conversely, in Ellison v. Robertson,[11] the court held that AOL did not receive a direct financial benefit when a user stored infringing material on its server because the copyrighted work did not "draw" new customers. AOL neither "attracted [nor] retained…[nor] lost…subscriptions" as a result of the infringing material.

Knowledge of infringing material[edit]

To qualify for the § 512(c) safe harbor, the OSP must not have actual knowledge that it is hosting infringing material or be aware of facts or circumstances from which infringing activity is apparent. It is clear from the statute and legislative history that an OSP has no duty to monitor its service or affirmatively seek infringing material on its system.[12] However, the statute describes two ways in which an OSP can be put on notice of infringing material on its system: 1) notice from the copyright owner, known as notice and take down, and 2) the existence of "red flags."

This is advantageous for OSPs because OCILLA's clear process allows them to avoid making decisions about whether or not material is actually infringing. Such decisions can be complex both because it is difficult to determine whether the copyright has expired on a material without access to complete information such as publication date, and because even copyrighted material can be used in some cases under the doctrine of fair use, the applicability of which is difficult to evaluate.

Instead of making a complex legal determination, OCILLA allows OSPs to avoid liability provided they comply with the terms of the statute, regardless of the validity of any claim of infringement.

Notice from copyright owner[edit]

The first way an OSP can be put on notice is through the copyright holder's written notification of claimed infringement to the OSP's designated agent. This must[13] include the following:

(i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
(ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.
(iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.
(iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.
(v) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
(vi) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

See 512(a) and (h) below if the information is not stored on the system of the OSP but is instead on a system connected to the Internet through it, like a home or business computer connected to the Internet. Legal liability may result if access to material is disabled or identity disclosed in this case.

If a notice which substantially complies with these requirements is received the OSP must expeditiously remove or disable access to the allegedly infringing material.[14] So long as the notice substantially complies with clauses (ii), (iii), and (iv) the OSP must seek clarification of any unclear aspects.[15]

In Perfect 10, Inc. v. CCBill LLC, the Ninth Circuit held that the properly constructed notice must exist in one communication.[16] A copyright owner cannot "cobble together adequate notice from separately defective notices" because that would unduly burden the OSP.

While not required for safe harbor protection, the OSP can implement a counter notification process to avoid legal liability to its own customer as a result of taking down the material:[17][18] After the notice has been complied with the OSP must take reasonable steps to promptly notify the alleged infringer of the action.[19] Note that the OSP is not prohibited from doing so in advance, only required to do so afterward. If there is a counter notification from the alleged infringer, the OSP must respond appropriately to it. Restoring the removed allegedly infringing material in compliance with this process does not cause liability of the OSP for copyright infringement of the material.[20]

There is a common practice of providing a link to legal notices at the bottom of the main web page of a site.[21] It may be prudent, though it is not required by the provisions of section 512 of the copyright law, to include the designated agent information on the page the legal link goes to, in addition to any other places where it is available. As long as the site gives reasonable notice that there is a method of compliance, that should be sufficient. Once again, the courts have not ruled on the technicalities of posting of these notices.

Red flags[edit]

The second way that an OSP can be put on notice that its system contains infringing material, for purposes of section 512(d), is referred to the "red flag" test.[12] The "red flag" test stems from the language in the statute that requires that an OSP not be "aware of facts or circumstances from which infringing activity is apparent."[22]

The "red flag" test contains both a subjective and an objective element. Subjectively, the OSP must have knowledge that the material resides on its system. Objectively, the "infringing activity would have been apparent to a reasonable person operating under the same or similar circumstances."[12]

Take down and put back provisions[edit]

Takedown example[edit]

Here's an example of how the takedown procedures would work:

  1. Alice puts a video with a copy of Bob's song on her YouTube.
  2. Bob, searching the Internet, finds Alice's copy.
  3. Charlie, Bob's lawyer, sends a letter to YouTube's designated agent https://web.archive.org/web/20160304110304/http://www.copyright.gov/onlinesp/agents/y/youtubellc.pdf registered with the Copyright Office including:
    1. Contact information
    2. The name of the song that was copied
    3. The URL of the copied song
    4. A statement that he has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
    5. A statement that the information in the notification is accurate
    6. A statement that, under penalty of perjury, Charlie is authorized to act for the copyright holder
    7. A written signature
  4. YouTube takes the video down.
  5. YouTube tells Alice that they have taken the video down and that her channel has a copyright strike.
  6. Alice now has the option of sending a counter-notice to YouTube, if she feels the video was taken down unfairly. The notice includes
    1. Contact information
    2. Identification of the removed video
    3. A statement under penalty of perjury that Alice has a good faith belief the material was mistakenly taken down
    4. A statement consenting to the jurisdiction of Alice's local US Federal District Court, or, if outside the US, to a US Federal District Court in any jurisdiction in which YouTube is found.
    5. her signature
  7. If Alice does file a valid counter-notice, YouTube notifies Bob, then waits 10-14 business days for a lawsuit to be filed by Bob.
  8. If Bob does not file a lawsuit, then YouTube may put the material back up.

Interpretation[edit]

Preemption of state law[edit]

Even if a copyright holder does not intend to cause anything other than the removal of allegedly infringing material, compliance with the DMCA's procedures nonetheless may result in disruption of a contractual relationship: by sending a letter, the copyright holder can effectuate the disruption of ISP service to clients. If adherence to the DMCA's provisions simultaneously subjects the copyright holder to state tort law liability, state and federal law may conflict. Depending on the facts of the case, federal law may preempt state law i.e. there will be no liability for state law claims resulting from compliance with federal law.[23]

Effect of delay in response[edit]

The other issue to keep in mind is that the delay in responding may not amount to a significant amount of damages and someone who has had their material removed by the § 512 procedure late may be more than satisfied with the result; it is much less expensive than filing a copyright infringement suit in federal court that might revolve around a minor technicality of the law. Indeed, one of the purposes of this section was to remove a large number of potential infringement suits from the courts when the facts revolving around infringement were basically undisputed and the damages could be minimized within a short period without the intervention of a US federal district court judge. A copyright holder may be more than happy to know that the material has been taken down for the minor fee of having a lawyer draft a compliant "take down" notice rather than the costs of drafting, filing, serving and prosecuting a federal copyright infringement action.

Other defenses for OSPs[edit]

Another law, the federal Communications Decency Act (CDA) still protects the ISP from liability for content provided by third parties (see below). Even if a removal is found not to be "expeditious" within the meaning of the law and the so-called "safe harbor" under the DMCA is lost, in certain circumstances, the OSP may still be protected. Through these two laws there are ways to balance the ISP's intent to assist with the protection of third-party copyright and the desire to preserve good customer relations. There is also a question of the infringement that is placed by a third party being an issue of negligence or another tort on the part of the OSP. If the OSP takes steps considered reasonable or is found not to have a duty of care to police potential infringers on the site, then the infringement may be considered "innocent" from the point of view of the ISP and the infringer may still be held to be the liable party which posts the infringing work or works.

Common misunderstandings[edit]

It is sometimes stated that the ISP needs to give the alleged infringer ten days' notice before acting. This is incorrect. The ISP must act expeditiously. The ten-day period refers to the counter notification procedure described in Section 512(g) after the infringing material has been removed, offering them an opportunity to counter the allegations presented to the ISP not during the stage of the so-called "take down" procedure.

It is sometimes suggested that content must be taken down before notifying the person who provided it. That is also not required, so long as the removal is expeditious. A large connectivity provider with many ISP customers would not be acting reasonably by disconnecting a whole ISP if it received a takedown notice for a web site hosted by that ISP on behalf of one of its customers. The law appears to allow the necessary flexibility to deal reasonably with relaying takedown requests to handle such situations.

Other safe harbor provisions[edit]

§ 512(a) Transitory Network Communications Safe Harbor[edit]

Section 512(a) protects service providers who are passive conduits from liability for copyright infringement, even if infringing traffic passes through their networks. In other words, provided the infringing material is being transmitted at the request of a third party to a designated recipient, is handled by an automated process without human intervention, is not modified in any way, and is only temporarily stored on the system, the service provider is not liable for the transmission.

The key difference in scope between this section, transitory network communications under 512(a), and caches, websites and search engine indexes under 512(b), 512(c) and 512(d) respectively, relates to the location of the infringing material. The other subsections create a conditional safe harbor for infringing material that resides on a system controlled by the OSP. For material that was temporarily stored in the course of network communications, this subsection's safe harbor additionally applies even for networks not under the OSP's control.

§ 512(b) System Caching Safe Harbor[edit]

Section 512(b) protects OSPs who engage in caching (i.e., creating copies of material for faster access) if the caching is conducted in standard ways, and does not interfere with reasonable copy protection systems. This Section applies to the proxy and caching servers used by ISPs and many other providers.

If the cached material is made available to end users, the system provider must follow the Section 512(c) takedown and put back provisions. Note that this provision only applies to cached material originated by a third party, not by the provider itself. Also, the content of the material must not be modified as a result of the caching process.

§ 512(d) Information Location Tools Safe Harbor[edit]

Section 512(d) eliminates copyright liability for an OSP who links users, through a tool such as a web search engine, to an online location that contains infringing material, provided that the OSP does not know the material is infringing.

There are several other conditions for this immunity to apply. Once the OSP becomes aware that the material is infringing, it must promptly disable access to it. Also, the OSP must follow Section 512(c)'s takedown and put-back provisions. Finally, where the OSP can control the infringing activity, the OSP must not derive any financial benefit through providing the link.

Other provisions[edit]

§ 512(e) Limitation on Liability of Nonprofit Educational Institutions[edit]

Section 512(e) protects nonprofit educational institutions from liability for the actions of faculty and graduate student employees who place infringing material online. For the immunity to apply the materials must not be course materials for a course taught by the faculty or graduate student employee, and the institution must not have received more than two infringement notifications about the same individual, during the preceding 3 years. Also, the institution must distribute informational materials about US copyright laws to all the users of its network.

Universities across the country have been forced to adapt to the Digital Millennium Copyright Act (DMCA) regulations. The Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), who are the major representatives of the music and movie industries, are the main organizations who have been enforcing the copyright laws the strongest. This started in 2003 as they began to track down the heaviest peer-to-peer users and seek lawsuit against them.[24] Most Universities today have set in rules to follow the strict guidelines of the DMCA.[25] Offenders are issued subpoenas and disciplinary actions are taken to identify and disable the issue. Fortunately for the colleges, the liability of Internet service providers is limited under section 512 of the Copyright Act.

§ 512(f) Misrepresentations[edit]

Section 512(f) deters false claims of infringement by imposing liability on anyone who makes such claims, for the damages suffered by other parties as a result of the OSP's reliance on the false claim, and for associated legal fees.

This provision has been used in cases such as Online Policy Group v. Diebold, Inc.,[23] where an electronic voting technology firm was sanctioned for knowingly issuing meritless notices of infringement to ISPs, and more recently Lenz v. Universal, 801 F.3d 1126 (2015).

§ 512(h) Identify infringers[edit]

Section 512(h) contains provisions that allow a copyright owner to force an OSP to reveal identifying information about the user who allegedly infringed the owner's copyright, through the use of a subpoena issued by a federal court at the owner's request.

Part (h)(2)(A) requires that the owner's request include "a copy of a notification described in subsection (c)(3)(A)" (a takedown notice, see above). Note that 512(c)(3)(A)(iii) states that the notice must identify the allegedly infringing material that is to be removed and must provide reasonably sufficient information for the service provider to locate the material residing on its system. The owner must also swear that any information obtained through the subpoena will only be used for the purpose of protecting its rights under Section 512.

If the OSP is served with such a subpoena after or at the same time as a valid takedown notice, under Part (h)(2)(A) it must expeditiously provide the information required by the subpoena.

In 2003, the Recording Industry Association of America (RIAA) appeared to be seeking subpoenas and serving takedown notices which did not comply with these requirements, notably using the subpoena provisions for 512(a) situations, which do not provide for them.

On 20 December 2003, the DSL ISP Verizon prevailed on appeal in its case seeking to prevent the use of this section for transitory network communications, the decision reversing a court order to supply customer details.[26] The appeal decision accepted the argument that the key distinction was the location of the files, with this section applying only when the material is stored on equipment controlled by the OSP. However, in response, RIAA member labels turned to a different method to acquire their desired information. They began suing multiple "Doe" defendants at a time and issuing third-party discovery subpoenas to ISPs for the customer details.

On 6 October 2003 Charter Communications became the first cable Internet provider to challenge the RIAA use of this provision,[27] when it filed for a motion to quash the subpoenas to obtain the identities of 150 of its customers. Although Charter Communications initially lost this motion and was forced to turn over the identities of the requested customers, a later appeal ruled that the motion to quash should have been upheld.[28]

§ 512(i) Conditions for Eligibility[edit]

Section 512(i) outlines the general requirements for a grant of immunity. Online service providers must reasonably implement a policy "that provides for the termination in appropriate circumstances" of "repeat infringers", must inform their users of this policy, and must accommodate standard copy protection systems.

This passage has historically been open to interpretation, as it does not specify any minimum standards that a repeat infringer policy must adhere to, and only specifies that users must be informed of its existence. In 2018, the Ninth Circuit Court of Appeals ruled that a repeat infringer policy did not necessarily need to be documented and publicized (as long as users are informed of its presence), and that a website owner's efforts to moderate and manually ban repeat infringers on a case-by-case basis was sufficiently reasonable.[29][30]

§ 512(j) Injunctions[edit]

Section 512(j) describes the forms of injunctive (i.e., court order) relief available to copyright holders. Even though OSPs have immunity from monetary damages under Section 512, they may be compelled by copyright holders, in appropriate situations, to stop providing access to infringing material or to terminate the account of a particular infringer.

§ 512(k) Definitions[edit]

Section 512(k) defines "service provider" and "monetary relief."

§ 512(l) Other Defenses Available[edit]

Section 512(l) notes that a service provider's ineligibility for a safe harbor from monetary damages under this section does not affect the validity of any other legal defenses that may be applicable (notably the CDA, although it isn't specifically identified).

§ 512(m) Protection of Privacy[edit]

Section 512(m) notes that OSPs retain the protections of parts (a) through (d) even if they don't monitor their service looking for infringing activity, as long as they comply Section 512(i)'s general requirements relating to the institution of account termination policies for infringers and accommodation of copy protection systems. Furthermore, OSP's are not required to remove or disable access to material if doing so would break another law.

§ 512(n) Independent Construction of Safe Harbors[edit]

Section 512(n) states that the limitations on liability in parts (a), (b), (c) and (d) apply independently. Hence, the fact that an OSP qualifies for a limitation on liability under one subsection has no impact on whether the OSP qualifies for a limitation under a different subsection. This is because subsections (a), (b), (c), and (d) describe separate and distinct functions.

Criticism[edit]

By 2008, experience with the safe harbor provisions showed them to be reasonably effective.[31][32] Copyright holders have the incentive to monitor Internet sites for offending material, and to send ISPs notifications where appropriate, of material that should be taken down. ISPs have incentive to cooperate with copyright holders and terminate the accounts of repeat infringers on pain of forfeiting the safe harbor created by OCILLA. At the same time, copyright holders are deterred from improperly sending out notices by provisions that make them liable for resulting damages, and also by bad publicity.

That is not to say that OCILLA functions perfectly in practice. There are three main areas of criticism that pertain to the OCILLA provision of the DMCA: improper removal of content, ineffective counter-notice procedure, and the rise of Web2.0 and new technologies that call into question the equity and effectiveness of the safe harbor provision. In 2020 the United States Copyright Office published a study examining the impact of Section 512 of the DMCA. The study found that the safe harbor provision is unbalanced and not in line with what the original lawmakers intended with the passing of the DMCA in 1998.[33]

Improper removal of content[edit]

There is evidence that ISPs tend to quickly take down allegedly infringing content on request by copyright holders, in situations where the content is actually non-infringing and should be preserved, sometimes known as aggressive copyright claims.[34][35] This may be because ISPs have much more to lose by forfeiting their safe harbor than by angering a user whose content is improperly removed.

Notices can be flawed in several ways. Many fail to follow the requirements of the statute. Others ask for material to be taken down for reasons such as trademark infringement and defamation that are unrelated to copyright infringement.[36] While the courts appear willing to punish copyright holders who file wrongful claims, some experts say it's troubling how easy it is for the DMCA to be invoked for false claims.[37]

Ineffective counter-notice procedure[edit]

There is evidence of problems with the counter-notice procedure, arising from its complexity and also because ISPs are not required to inform users of its existence. Filing a counter-notice can be a lengthy, expensive process that doesn't guarantee the content will not be flagged again as infringing content.

This may result from the inherent imbalance in prerequisites for the original complaint and the counter-notice. To get content removed, a copyright holder need only claim a good-faith belief that neither he nor the law has authorized the use. Copyright holders are not subject to penalties for perjury. In contrast, to get access to content re-enabled, the uploader of the allegedly infringed content must claim a good-faith belief under penalty of perjury that the material was mistakenly taken down. This allows for copyright holders to send out take-down notices without incurring much liability; to get the content back up, the recipients need to expend considerably more resources. Section 512(f) makes the sender of an invalid claim liable for the damages resulting from the content's improper removal, including legal fees, but that remedy is not always practical.

Furthermore, ISPs tend to remove allegedly offending material immediately, while there is a 10- to 14-day delay before the ISP re-enables access in response to a counter-notice. For example, if a website advertised an upcoming labor protest outside BlameCo, BlameCo could send a DMCA notice to the site's ISP alleging copyright infringement of their name or logo a week before the protest. The site would then be disabled; even if the site's owners immediately filed a counter-notice, access would not be re-enabled until after the protest, too late to be useful.

ISP's may also disregard counter-notices. Section 512(g) of the DMCA shields an ISP from liability to its customer for a DMCA takedown, if the ISP restores removed content following a counter-notice. In practice, however, an ISP may disregard the counter-notice, and instead rely on its own terms of service to shield itself from liability to its customer. For example, since April 2013, YouTube refuses to restore some counter-noticed content, citing an agreement YouTube made with third-party music content owners.[38][39]

Additionally, there is no public record of takedown requests and counter-notices. This prevents the public from seeing how the process is used. (Chilling Effects has tried to make up for this shortcoming, but, so far, few OSPs besides Google submit their takedown notices.)

Web 2.0 and new technologies[edit]

There have been recent claims[40] that the DMCA-embedded concepts of direct financial benefit, interference with standard technical measures, and the legislative red flag test for identifying infringing material are significantly challenged by the explosion of user-generated content unleashed by Web 2.0 technologies.

Web 2.0 has enhanced the ease of access to copyrighted works by introducing new and alternative electronic platforms in which information can be shared publicly.[41] Recognizing the challenge that Web 2.0 presents, many OSPs have implemented programs that automatically scan every upload for potential infringing activity. At the same time, there is evidence that such programs are not enough. Web 2.0's platforms are significantly altered by the amount of content generated by millions users, which creates extreme difficulty for the OSPs to monitor their own platforms for infringing content.[42]

Related laws[edit]

The European Union's Electronic Commerce directive, Article 14, contains limited liability provisions for online hosts which provide the legal basis for notice and takedown in the EU. France's Digital Economy Law ("Loi relative à l'économie numérique") is an example of an implementation of this directive, as is Finland's "Laki tietoyhteiskunnan palvelujen tarjoamisesta."

In Korea, the analogous law is Section 102 (Limitation of OSP Liabilities) and Section 103 (Takedown) of Copyright Law of Korea.

In Taiwan, Republic of China, the analogous law is Chapter VI-1 of the Copyright Act.[43]

See also[edit]

Related US laws
Other

References[edit]

  1. ^ 1996 WIPO Copyright Treaty Text
  2. ^ "17 U.S. Code § 512 - Limitations on liability relating to material online". LII / Legal Information Institute. Retrieved 2020-07-06.
  3. ^ 17 U.S.C. § 512(i)(1)(B)
  4. ^ 17 U.S.C. § 512(a)
  5. ^ 17 U.S.C. § 512(b)
  6. ^ 17 U.S.C. § 512(c)
  7. ^ 17 U.S.C. § 512(d)
  8. ^ 17 U.S.C. § 512(C)(2)
  9. ^ 17 U.S.C. § 512(h)(5)
  10. ^ A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (9th Cir. 2001). Archived 2008-04-09 at the Wayback Machine
  11. ^ Ellison v. Robertson, 357 F.3d 1072 (9th Cir. 2004). Archived 2009-11-28 at the Wayback Machine
  12. ^ a b c H.R. Rep. No. 105-551, at 53 (1998).
  13. ^ 17 U.S.C. § (512(c)(3)(A)(i-vi))
  14. ^ 17 U.S.C. § 512(c)(1)(C)
  15. ^ 17 U.S.C. § 512(c)(3)(B)(ii)
  16. ^ Perfect 10, Inc. v. CCBill, LLC, 488 F.3d 1102, 1113 (9th Cir. 2007).
  17. ^ 17 U.S.C. § 512(g)(1)
  18. ^ Bridy, Annemarie and Keller, Daphne (31 March 2016) U.S. Copyright Office Section 512 Study: Comments in Response to Notice of Inquiry. p. 29
  19. ^ 17 U.S.C. § 512(g)(2)(A)
  20. ^ 17 U.S.C. § 512(g)(4)
  21. ^ Reid, Amanda (2021). "Readability, Accessibility, and Clarity: An Analysis of DMCA Repeat Infringer Policies". Jurimetrics. 61 (4): 1–37. SSRN 3921231.
  22. ^ 17 U.S.C. § 512(c)(1)(A)(ii)
  23. ^ a b Online Policy Group v. Diebold, 337 F. Supp. 2d 1195 (N.D. Cal. 2004).
  24. ^ "Copyright, Peer-to-Peer File Sharing and DMCA Subpoenas". Nacua Notes. 6 November 2003. Archived from the original on 30 October 2004. Retrieved 23 May 2016.
  25. ^ "University Administrative Interests in Copyright". Copyright Crash Course. 2007.
  26. ^ Case documents EFF Archive of RIAA v. Verizon documents Archived 2008-09-04 at the Wayback Machine, Verizon's Previous Legal Briefs and Court Rulings.
  27. ^ Stefanie Olsen, Charter files suit against RIAA CNET News (Oct. 6, 2003).
  28. ^ In re: Charter Commc'ns, Inc. Subpoena Enforcement Matter Archived 2007-09-29 at the Wayback Machine (8th Cir. 2005).
  29. ^ "Repeat Infringer Policy Doesn't Have to Be Spelled Out, Appeals Court Rules". TorrentFreak. 2018-03-24. Retrieved 2018-04-09.
  30. ^ Zimmerman, Mitchell. "Your DMCA Safe Harbor Questions Answered" (PDF). Fenwick. Fenwick & West LLP. Retrieved 5 August 2017.
  31. ^ Pamela Samuelson et al., A Reverse Notice and Takedown Regime to Enable Fair Uses of Technically Protected Copyrighted Works, 22 Berkeley Tech. L.J. 981, 993 (2007).
  32. ^ 10 Years Later, Misunderstood DMCA is the Law That Saved the Web, Wired (Oct. 2008).
  33. ^ "Section 512 Study | U.S. Copyright Office". www.copyright.gov. Retrieved 2020-11-20.
  34. ^ Julian Sanchez, Google's DMCA takedowns leaving Blogger users high and dry, Ars Technica (Mar. 8, 2009).
  35. ^ Nate Anderson, Scientology fights critics with 4,000 DMCA takedown notices, Ars Technica (Sep. 8, 2008).
  36. ^ Ahrens, Green, McSherry and Stoltz; [1] Archived 2014-03-22 at the Wayback Machine, Center for Internet & Society Stanford Law School and Electronic Frontier Foundation (November 13, 2013).
  37. ^ Barker, Diane M. (2005). "Defining the Contours of the Digital Millennium Copyright Act: The Growing Body of Case Law Surrounding the DMCA". Berkeley Technology Law Journal. 20 (1): 47–63. ISSN 1086-3818. JSTOR 24117481.
  38. ^ McKay, Patrick (April 4, 2013). "YouTube Refuses to Honor DMCA Counter-Notices". Fair Use Tube.org. Retrieved July 23, 2013.
  39. ^ "Videos removed or blocked due to YouTube's contractual obligations". YouTube Help. April 2, 2013. Retrieved July 23, 2013.
  40. ^ Brandon Brown, Fortifying the Safe Harbors: Reevaluating the DMCA in a Web 2.0 World, 23 Berkeley Tech. L.J. 437, 438 (2008).
  41. ^ Diaz, Veronica; Miltrano, Tracy; Christoph, Kathy. "Copyright, Fair Use, and Teaching and Learning Innovation in a Web 2.0 World" (PDF). Educause. EDUCAUSE Center for Applied Research. Archived from the original (PDF) on 7 February 2014. Retrieved 5 August 2017.
  42. ^ Brown, Brandon (2008). "Fortifying the Safe Harbors: Reevaluating the DMCA in a Web 2.0 World". Berkeley Technology Law Journal. 23 (1): 437–467. ISSN 1086-3818. JSTOR 24118312.
  43. ^ Ministry of Justice (Republic of China): Chapter VI-1 Limitations on Liability for Internet Service Providers of the Copyright Act

External links[edit]

General[edit]

Using OCILLA[edit]

Case law[edit]