WiredSafety and the DMCA Subpoena March 17, 2003

Slides:



Advertisements
Similar presentations
The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Advertisements

Procedural Safeguards
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
BIE SPECIAL EDUCATION ACADEMY PRESENTERS: JUDY WILEY AND NARCY KAWON I ntroduction to Procedural Safeguards Bureau of Indian Education.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
Protection of privacy for all Students!
 What is the Privacy Rule? The Standards for Privacy of Individually Identifiable Health Information (Privacy Rule) governs the use and disclosure of.
THE RPAC ANNUAL CONFERENCE. OVERVIEW OF THE DMCA: ITS PROMISE AND PITFALLS Jeanne Hamburg.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Presented by Jennifer Coughlin Eugene, Oregon April 10, 2013.
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
What are my child’s rights under the Individuals with Disabilities Education Act? Randy Chapman The Legal Center for People with Disabilities and Older.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Litigation and Procedure Discovery: Overview and Interrogatories Litigation and Procedure.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
1 PROCEDURAL DUE PROCESS. 2 Texas Education Agency provides Notice of Procedural Safeguards Rights of Parents of Students with Disabilities Download this.
Law and Motion. A Motion is an application to the court requesting some kind of relief or court order May be oral or written General types of motions.
JUVENILE COURT: CONTEXT AND OVERVIEW Janet Mason March 8, 2006 Institute of Government UNC at Chapel Hill.
Confidentiality of MH/DD/SA Records Family Court Conference March 9, 2006 Mark Botts School of Government, UNC.
© 2003 Rule 1.9. Duties to Former Clients (a) A lawyer who has formerly represented a client in a matter shall not thereafter represent another person.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Class 7 Internet Privacy Law Your Digital Afterlife.
APPLYING THE CHARTER.   What would society be like if we were allowed to do and say anything we like?  Irony– there are mechanisms in place to ensure.
The Supreme Court at Work
Privacy and Technology in the 21 st Century The Intersection of Privacy Protection and the Enforcement of Law and Intellectual Property and Consumer Rights.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
APPLICATION FOR ACCESS (PAIA) Mandatory protection (which must be refused in terms of Chap 4 subject to S46) DENIAL OF ACCESS (PAIA) Internal Appeal to.
Viacom v. YouTube: The Future of the Section 512 Safe Harbors? Mary Rasenberger April 2011.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
ALIVE: Module 4 ETHICS IN THE REAL WORLD Where does ethical behavior start/stop and legal requirements begin.
Confidentiality and Public Information Act LISD Special Education Department Training SY
707 KAR 1:360 Confidentiality of Information. Section 1: Access Rights 1) An LEA shall permit a parent to inspect and review any education records relating.
Bilingual Students and the Law n Title VI of the Civil Rights Act of 1964 n Title VII of the Elementary and Secondary Education Act - The Bilingual Education.
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
EDSE 539 Special Education Leadership in Schools Parent Rights and Relationships Dispute Resolution Remedies.
Family Educational Rights and Privacy Act (FERPA) Also known as the Buckley Amendment Statute: 20 U.S.C. § 1232(g) Regulations: 34 CFR Part 99.
Privacy and the Civil Commitment Process Allyson K. Tysinger Assistant Attorney General June 4-5, 2008.
Supreme Court civil pre-trial procedures: an overview
Class 21 Copyright, Winter, 2010 Online Distribution Randal C. Picker Leffmann Professor of Commercial Law The Law School The University of Chicago
Calloway County Schools CONFIDENTIALITY TRAINING Protection of Personal Information School Year
Challenges…..to Prevent Persons from Unlawfully Voting and to Protect the Integrity of the Election. Don Wright General Counsel NC State Board of Elections.
Public Access to Election Records Heather Willis Neal Public Access Counselor Circuit Court Clerks’ Conference Circuit Court Clerks’ Conference June 10,
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 ADMINISTRATIVE LAW AND REGULATORY AGENCIES © 2010 Pearson Education, Inc., publishing as.
Confidentiality A Training Without the Video. Laws FERPA (1976) or the Buckley Amendment (1994) IDEA (1991) KY Safe Schools (1998)
1 CONFIDENTIALITY. 2 Requirement Under IDEA 34 CFR Sec (c) All staff collecting or using personally identifiable information in public education.
© COPYRIGHT DICKSTEIN SHAPIRO LLP. ALL RIGHTS RESERVED. Post Grant Proceedings Before the USPTO and Litigation Strategies Under the AIA Panelists:David.
School District Records Lindsay Hale David Wheelus Assistant Attorneys General Open Records Division Views expressed are those of the presenter, do not.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Your Rights! An overview of Special Education Laws Presented by: The Individual Needs Department.
Procedural Safeguards for Parents What Educators Should Know Michelle Mobley NELA Cohort III.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Using Full Faith & Credit to Protect Survivors of Domestic Violence Vicky Ogawa Kimbrell Georgia Legal Service Program based on materials.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
Tomball Independent School District Annual Confidentiality Training
Wyoming Statutes §§ through
Recognition and enforcement of foreign judgments and arbitral awards in Russia Roman Zaitsev, PhD, Partner 05/09/2018.
Education Employment Procedures Law of 2001
Orders of Protection Domestic Violence Legal Clinic
Let’s Begin w/ the Basics
CHALLENGES TO VOTER REGISTRATION APPLICATIONS AND REGISTERED VOTERS
Chapter 43 Administrative Law and Regulatory Agencies
Presentation transcript:

WiredSafety and the DMCA Subpoena March 17, 2003

Note that the legal arguments and some descriptions are substantially curtailed and summarized in this powerpoint and we recommend that you visit Verizon’s site and RIAA’s site to review the pleadings filed and the arguments made This is an important issue, and one that Internet users need to understand. To weigh in on the subject, visit WiredPatrol.org and respond to our confidential poll.

What’s this all about? RIAA (the recording industry trade association) works to protect the copyrights of the recording industry RIAA (the recording industry trade association) works to protect the copyrights of the recording industry RIAA takes various legal actions to stop online music pirating, especially peer-to-peer (P2P) RIAA takes various legal actions to stop online music pirating, especially peer-to-peer (P2P) The DMCA (the U.S. digital copyright law) allows for special expedited methods for finding out who is behind an online address The DMCA (the U.S. digital copyright law) allows for special expedited methods for finding out who is behind an online address RIAA used this method to streamline requests for each of the ISPs to disclose the real names, addresses and telephone numbers behind the online addresses they have identified RIAA used this method to streamline requests for each of the ISPs to disclose the real names, addresses and telephone numbers behind the online addresses they have identified Most of the ISPs complied with the requests and turned over the information requested by RIAA Most of the ISPs complied with the requests and turned over the information requested by RIAA Verizon refused to do so for several reasons, asserting that the law is unconstitutional as applied and that Internet users could be preyed upon by unscrupulous people misusing the system to obtain private information about people online Verizon refused to do so for several reasons, asserting that the law is unconstitutional as applied and that Internet users could be preyed upon by unscrupulous people misusing the system to obtain private information about people online WiredSafety and its family of program and sites joined Verizon in opposition to the broad application of the Section 512(h) subpoena power to help protect Internet users from abuse WiredSafety and its family of program and sites joined Verizon in opposition to the broad application of the Section 512(h) subpoena power to help protect Internet users from abuse

Where does this stand now? RIAA served Verizon with the subpoena RIAA served Verizon with the subpoena Verizon filed a motion contesting the subpoena Verizon filed a motion contesting the subpoena The DC Federal District Court heard argument and decided the case for RIAA and against Verizon The DC Federal District Court heard argument and decided the case for RIAA and against Verizon Verizon asked the court to “stay” the enforcement of the subpoena until they have a chance to appeal the decision. Verizon asked the court to “stay” the enforcement of the subpoena until they have a chance to appeal the decision. We are awaiting the District Court’s decision on the stay We are awaiting the District Court’s decision on the stay If the stay is granted, all parties will proceed to the appeal. If it is denied, Verizon will apply to the appellate court for a stay If the stay is granted, all parties will proceed to the appeal. If it is denied, Verizon will apply to the appellate court for a stay

Our step-by-step guide to understanding what’s going on We’ll explain who the players are... We’ll explain who the players are... We’ll explain who is impacted... We’ll explain who is impacted... We’ll explain the law... We’ll explain the law... We’ll explain the legal arguments... We’ll explain the legal arguments... We’ll explain what this is and what this isn’t about... We’ll explain what this is and what this isn’t about... We’ll explain how you can make your voice heard... We’ll explain how you can make your voice heard...

Who are the players? Verizon, in this case a large national Internet service provider Verizon, in this case a large national Internet service provider RIAA, the Recording Industry Association of America the trade group of the recording industry RIAA, the Recording Industry Association of America the trade group of the recording industry Advocacy and public interest groups, including WiredSafety and its family of sites and programs Advocacy and public interest groups, including WiredSafety and its family of sites and programs Those people whose real identities are being sought by the RIAA for downloading music from P2P services Those people whose real identities are being sought by the RIAA for downloading music from P2P services

Who is impacted? Songwriters, performers, arrangers and the recording studios and producers Songwriters, performers, arrangers and the recording studios and producers Everyone who downloads copyrighted music online without paying for it Everyone who downloads copyrighted music online without paying for it All Internet users All Internet users All Internet Service Providers All Internet Service Providers

What’s the law? The DMCA (The Digital Millennium Copyright Act, 17 U.S.C. ) Section 512(h) Subpoena to identify infringer. (1) Request. A copyright owner or a person authorized to act on the owner's behalf may request the clerk of any United States district court to issue a subpoena to a service provider for identification of an alleged infringer in accordance with this subsection. (2) Contents of request. The request may be made by filing with the clerk-- (A) a copy of a notification described in subsection (c)(3)(A); (B) a proposed subpoena; and (C) a sworn declaration to the effect that the purpose for which the subpoena is sought is to obtain the identity of an alleged infringer and that such information will only be used for the purpose of protecting rights under this title. (3) Contents of subpoena. The subpoena shall authorize and order the service provider receiving the notification and the subpoena to expeditiously disclose to the copyright owner or person authorized by the copyright owner information sufficient to identify the alleged infringer of the material described in the notification to the extent such information is available to the service provider.Section 512(h) Subpoena to identify infringer. (1) Request. A copyright owner or a person authorized to act on the owner's behalf may request the clerk of any United States district court to issue a subpoena to a service provider for identification of an alleged infringer in accordance with this subsection. (2) Contents of request. The request may be made by filing with the clerk-- (A) a copy of a notification described in subsection (c)(3)(A); (B) a proposed subpoena; and (C) a sworn declaration to the effect that the purpose for which the subpoena is sought is to obtain the identity of an alleged infringer and that such information will only be used for the purpose of protecting rights under this title. (3) Contents of subpoena. The subpoena shall authorize and order the service provider receiving the notification and the subpoena to expeditiously disclose to the copyright owner or person authorized by the copyright owner information sufficient to identify the alleged infringer of the material described in the notification to the extent such information is available to the service provider.

Law cont’d: Rules for granting and complying with the Subpoena DMCA Section 512(h) DMCA Section 512(h) (4) Basis for granting subpoena. If the notification filed satisfies the provisions of subsection (c)(3)(A), the proposed subpoena is in proper form, and the accompanying declaration is properly executed, the clerk shall expeditiously issue and sign the proposed subpoena and return it to the requester for delivery to the service provider.(4) Basis for granting subpoena. If the notification filed satisfies the provisions of subsection (c)(3)(A), the proposed subpoena is in proper form, and the accompanying declaration is properly executed, the clerk shall expeditiously issue and sign the proposed subpoena and return it to the requester for delivery to the service provider. (5) Actions of service provider receiving subpoena. Upon receipt of the issued subpoena, either accompanying or subsequent to the receipt of a notification described in subsection (c)(3)(A), the service provider shall expeditiously disclose to the copyright owner or person authorized by the copyright owner the information required by the subpoena, notwithstanding any other provision of law and regardless of whether the service provider responds to the notification. (5) Actions of service provider receiving subpoena. Upon receipt of the issued subpoena, either accompanying or subsequent to the receipt of a notification described in subsection (c)(3)(A), the service provider shall expeditiously disclose to the copyright owner or person authorized by the copyright owner the information required by the subpoena, notwithstanding any other provision of law and regardless of whether the service provider responds to the notification. (6) Rules applicable to subpoena. Unless otherwise provided by this section or by applicable rules of the court, the procedure for issuance and delivery of the subpoena, and the remedies for noncompliance with the subpoena, shall be governed to the greatest extent practicable by those provisions of the Federal Rules of Civil Procedure governing the issuance, service, and enforcement of a subpoena duces tecum(6) Rules applicable to subpoena. Unless otherwise provided by this section or by applicable rules of the court, the procedure for issuance and delivery of the subpoena, and the remedies for noncompliance with the subpoena, shall be governed to the greatest extent practicable by those provisions of the Federal Rules of Civil Procedure governing the issuance, service, and enforcement of a subpoena duces tecum

The Legal Arguments - RIAA DMCA is designed to protect copyright owners from online infringement DMCA is designed to protect copyright owners from online infringement Without this power, Internet users will continue to steal copyrighted materials Without this power, Internet users will continue to steal copyrighted materials Section 512(h) applies to all service providers, whether they are providing storage or access to P2P Section 512(h) applies to all service providers, whether they are providing storage or access to P2P It is constitutional and provides for adequate checks and balances It is constitutional and provides for adequate checks and balances Requiring commencement of a law suit is impractical in all cases and frustrates the purposes of the DMCA Requiring commencement of a law suit is impractical in all cases and frustrates the purposes of the DMCA

Legal Arguments - Verizon DMCA special subpoena was never designed to apply to requests from service providers about their Internet subscribers, only to online services offering storage or hosting DMCA special subpoena was never designed to apply to requests from service providers about their Internet subscribers, only to online services offering storage or hosting Section 512(h) as interpreted by the District Court violates due process under the U.S. Constitution Section 512(h) as interpreted by the District Court violates due process under the U.S. Constitution Public policy requires that the expansive reading of Section 512(h) be curbed to protect user of the Internet from abuse Public policy requires that the expansive reading of Section 512(h) be curbed to protect user of the Internet from abuse

This isn’t about... denying copyright holders their rights denying copyright holders their rights permitting piracy permitting piracy bleeding hearts bleeding hearts opposition to valid laws opposition to valid laws supporting copyright infringement or the unlawful downloading of music supporting copyright infringement or the unlawful downloading of music making it easier for people to violate the law and not be caught making it easier for people to violate the law and not be caught

This is about... Protecting the legal rights of people who haven’t broken the law Protecting the legal rights of people who haven’t broken the law Keeping personal information private unless there is a valid reason to force its disclosure Keeping personal information private unless there is a valid reason to force its disclosure Keeping people safe in cyberspace Keeping people safe in cyberspace Protecting law enforcement’s ability to conduct online investigations Protecting law enforcement’s ability to conduct online investigations Preventing predators from obtaining private information about their victims Preventing predators from obtaining private information about their victims Keeping child molesters from obtaining a child’s address and last name by pretending to be a copyright holder Keeping child molesters from obtaining a child’s address and last name by pretending to be a copyright holder Preventing abuse of process and constitutional safeguards Preventing abuse of process and constitutional safeguards

Want to weigh in on the subject? Respond to the online poll at Respond to the online poll at Visit Verizon’s website Visit Verizon’s website Visit RIAA’s website Visit RIAA’s website (we’ll protect your privacy, check out our privacy policy at the site) (we’ll protect your privacy, check out our privacy policy at the