Copyright JNT Association 2010-1JANET Briefing, 20 th Jan, 20111 Digital Economy Act 2010 Andrew Cormack Chief Regulatory Adviser, JANET(UK)

Slides:



Advertisements
Similar presentations
Technical measures in the context of the Hadopi Law (France)
Advertisements

The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
External Trade 1 5th Global Congress Combating Counterfeiting and Piracy Global and Regional IPR Enforcement Initiatives Luc-Pierre Devigne Head of Intellectual.
Radia Perlman Intel Labs
Finnish Customs Customer Management
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Illustration collectées par Jean Burdy - 8/09/20111.
Beyond the Numbering Conventions the regulation of numbering from July 2003 Nicholas Good 1 July 2002.
EU Remedies Directives Update Florence Gregg figpc ltd, M:
Law and the legal system
Planning for a multi ability running session A working brief Peg Wiseman 2011.
Tradition innovation Online Branding Kate Legg Solicitor.
Copyright © 2005 Department of Computer Science CPSC 641 Winter Self-Similarity in WAN Traffic A subsequent paper established the presence of network.
VoIP - Australian Regulatory Practice and Directions Duncan MacAuslan Task Coordinator - VoIP ITP Training September 2006.
Copyright JNT Association NIRAN Awareness Day Regional Networks as Partners in JANET Bob Day Chief Technology Officer
© JANET(UK) 2011 Running a Public Communications Service Andrew Cormack Chief Regulatory Adviser, Janet
Kevin Sharp Customer Engagement Manager Janet, Public Access & The Cloud.
Andrew Cormack Chief Regulatory Adviser, Access Management and Security WG.
HSC08 Conference Report to YHAUC by Sean Fisher. HSC08 Conference Thanks to YHAUC for the opportunity to attend Views and opinions expressed are my own.
Freedom of Information Act 2000 and the PCT Audit Procedure Background: The Act was passed in November The Act will be fully in force by January.
Planning, Research and Institutional Effectiveness July 13, /13/20111PRIE Dashboard Modul 1.
Inclusion-Exclusion Selected Exercises
Open Access in CCSF Report to Telecommunications Commission December 20, 1999.
Copyright JNT Association Striking a Balance: Privacy and Legal Issues in Network Management Andrew Cormack Chief Regulatory Adviser, UKERNA
New TSA standards - What do they mean for involving customers Yvonne Davies Scrutiny & Empowerment Partners 2 nd February 2012.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
CIPA Update. FOR SCHOOLS – By July 1, 2012, amend your existing Internet safety policy (if you have not already done so) to provide for the education.
1 The 7 layer OSI model Sending an . 2 The seven layers.
IMPLICATIONS FOR UNIVERSITY POLICY BL, JISC & MLA BRIEFING, 29/6/2010 Professor Charles Oppenheim
Chapter 1: Computer Networks IB 300: Advanced Computer Sciences. Professor: Nabil Elmjati.
What is it and why should I care?
Copyright JNT Association 2009NorduNET, 18 th September Protecting Privacy in Global Networks Andrew Cormack Chief Regulatory Adviser, JANET(UK)
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Saumil Shah IEOR 190G 3/19/08.  Vonage is a VoIP(voice over IP) company that provides telephone service via a broadband connection.  In order to use.
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
Online infringement of copyright - the Digital Economy Act June 2010 Robin Fry.
Digital Millennium Copyright Act (“DMCA”). Common MLS Issue Listing Agent uploads infringing photo –Examples All members republish photo on IDX sites.
Presentation to Senior Management MiFID for Senior Managers Introduction These slides introduce the big changes for senior management from MiFID.
ADVANCES WITH SECURING AND PROTECTING LAND RIGHTS FROM A GENDER PERSPECTIVE: Promoting gender equitable and participatory decision- making processes on.
Copyright Seminar: InternetNZ’s Point of View 25 May 2010.
No Recourse to Public Funds 30 April The Scheme –The scheme is intended for victims of Domestic Violence (DV) who were previously admitted to,
InternetNZ Seminar Copyright (Infringing File Sharing) Amendment Bill ISP Perspective David Diprose May 2010.
Universal service: designation and specific conditions Ritu Manhas Policy Adviser.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
Presented by: Jody and Kenneth1 Copyright and Other Legal Issues in Distance Education Presented by Jody & Kenneth.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Boston New York San Francisco Washington, DC Woods Hole Oceanographic Institute Understanding Intellectual Property June 4, 2008.
E-Safety Parent Talk Helping to keep your children safe online.
Course Pack Production at HKIEd HKIEd Library 20 Jun 2013.
Group E - Enrico Costanza Sam Holder, Jonathan Stephens-Jones, Joseph Buckingham, Crispin Clark, Benjamin Dixon Creative Commons, Open Source, Open Movements.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Consumer rights when subscribing to an internet service.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Stop in the Name of Law Kimberlee Weatherall. Stop in the Name of Law Kimberlee Weatherall.
What Does GDPR mean for you
The Internet Networks This icon indicates the slide contains activities created in Flash. These activities are not editable. For more detailed instructions,
The Internet Networks This icon indicates the slide contains activities created in Flash. These activities are not editable. For more detailed instructions,
The Strategic Content Alliance
Canadian Navigable Waters Act
How Laws Are Made.
Karst Government Actions Regulation Project Initiation
Regulating the Digital Economy
Scrutiny. Net Officers Meeting - 3rd October 2017
Presentation transcript:

Copyright JNT Association JANET Briefing, 20 th Jan, Digital Economy Act 2010 Andrew Cormack Chief Regulatory Adviser, JANET(UK)

Copyright JNT Association JANET Briefing, 20 th Jan, How the Act works Now (actually, mid-2011) –Rightsholders send notices to ISPs –ISPs pass (some) notices to Subscribers –ISPs count notices per Subscriber Maybe in 2012 (if Minister decides) –ISP limits access for high-count Subscribers Maybe some time (if Minister decides) –Courts may order blocking of internet locations Details left to secondary legislation

Copyright JNT Association JANET Briefing, 20 th Jan, Definitions “ISP” –Provides internet access (mainly), and –Allocates IP address –Under agreement –With subscriber “Subscriber” –Receives service from ISP –But not “as a communications provider” “Communications Provider” (Comms.Act 2003) –Establishes, maintains or operates a network –Network = system transmitting electrical/magnetic/e-m signals

Copyright JNT Association JANET Briefing, 20 th Jan, Which means? House = Subscriber (probably) University? School? JANET? Gov’t & Ofcom aware of problem –Minister admitted confusion in Parliament! –But don’t seem to have power to decide  Plan seems to be... –See where rights holders send notices (=ISP) –See where recipients forward them (=Subsc.) –Appeal if anyone doesn’t like it 

Copyright JNT Association JANET Briefing, 20 th Jan, Ofcom draft Code Identifies seven “Qualifying ISPs” –Fixed line providers >400K subscribers Rights holders also have to Qualify –By registering in advance –And paying in advance too Consultation closed July

Copyright JNT Association JANET Briefing, 20 th Jan, Can’t we do better? JANET AUP already requires –Grant access to network responsibly –Receive reports of AUP breaches –Educate those responsible for breaches So they don’t do it again! Similar to “ISP” role, in fact Already do it (much) better than them

Copyright JNT Association JANET Briefing, 20 th Jan, JANET sites should... Manage network access –Expect users to authenticate –Limit damage that unauthenticated can do Keep IP => User records (≥3 months) Receive and deal with breach reports –Process, tools, policy, enforcement –See JANET Factsheet Educate users

Copyright JNT Association JANET Briefing, 20 th Jan, Additional complications What if IP owner doesn’t know users? –E.g. LEA owns IP; School knows users –E.g. Outsourced filtering service How to deliver infringement notices? Either/both –Keep number of infringements very low –Have agreement/process to forward notices

Copyright JNT Association JANET Briefing, 20 th Jan, JANET should... Persuade regulators –Process already working well –Alternatives would be worse For copyright protection And for purposes of network & customers Work with rights holders on processes –Current process recognised as good –(Low-cost) improvements may be possible

Copyright JNT Association JANET Briefing, 20 th Jan, ?