Copyright in the EU: The Infosoc Directive: TPMs, ACPs and RMI Turin, October 2011 Dr E Derclaye University of Nottingham.

Slides:



Advertisements
Similar presentations
Business Strategies in Digital Rights Management Eric Baron University of Connecticut School of Law May 2007.
Advertisements

Draft JORUM Depositor Licence By Emanuella Giavarra LLM Chambers of Prof. Mark Watson-Gandy Amsterdam and London
Copyright and the EU Directive By Emanuella Giavarra LLM Chambers of Prof. Mark Watson-Gandy Amsterdam and London
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
COPYRIGHT, LIBRARIES AND THE EUROPEAN UNION Libraries in EU Conference, Lodz, 24 June 2004 Charles Oppenheim
Interface between patent and sui generis systems of protection of plant varieties The 1978 UPOV Act does not allow both systems to be applied to the same.
Dr Estelle Derclaye, Associate Professor and Reader in Intellectual Property Law, University of Nottingham IPI/BLACA seminar, 21/10/2009.
San Cannon Federal Reserve Board IASSIST 2010
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
1 Support for the coherent development of policies This document is purely provisional, and only reflects preliminary options from Commission services.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
The Digital Millennium Copyright Act (DMCA) Claire Stewart MM450 February 14, 2006.
Implementing the EUCD: Legal Protection of Technological Measures iLaw Eurasia, Tallinn Urs Gasser, Berkman Center for Internet & Society December 15,
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
Text/Data Mining Potential Legal Issues Naomi Korn IP Consultant Disclaimer: The contents of this presentation are for general advice.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Legal Protection of Copy- protection Mechanisms & Rights Management Information Martina Gillen Law Department, Reading University
WIPO Copyright Sector 1.  Fundamental or constitutional rights or public interest: freedom of speech, access to information, right for education, enjoyment.
Ioannis Iglezakis Intellectual Property Part II. Open source software Open-source software is computer software whose source code is available under a.
New copyright challenges for the users digital works Dragutin Nemec Library of the Faculty of law in Zagreb LIBRARIES IN THE DIGITAL AGE (LIDA) 2007.
Right to use copyright protected research and other materials Pirjo Kontkanen NUAS seminar Forskning – Arkiv - Forskning Legal Counsel / Research.
Legal Protection of Software and Databases Jennifer Pierce.
Copyright dilemma: Access right over databases of raw information? Gemma Minero, Lecturer in Law, Universidad Autónoma de Madrid.
COPYRIGHT & THE WEB LIS Information Technologies – Dr. Gilok Choi Pratt Institute, School of Information & Library Science Spring, 2009 By Diane.
Decompilation 1 Software Copyright Oren Bracha, Summer 2015.
CS110: Computers and the Internet Intellectual Property.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Overview +Recap +Legal framework - points of interest +Next steps +Questions.
NRCCL (University of Oslo, Faculty of Law) Hyperlinks and search engines(I) Jon Bing Norwegian Research Center for Computers and Law Master Lecture 16.
Ioannis Iglezakis Infosociety Directive. Objectives of the Directive on the harmonisation of certain aspects of copyright and related rights in the information.
Digital Copyright and Management of Rights in the Digital Environment Giancarlo F. Frosio.
Copyright for Teachers Certain Aspects of the German Copyright Law September 17, 2011 Stefan Lüft, CMS Hasche Sigle, Munich.
The Development of Copyright within the European Union By Harald von Hielmcrone Head of Research, State and University Library of Aarhus. Danish representative.
Teaching Strategies that Work: Copyright, Fair Use and Digital Learning Renee Hobbs Workshop for the Association of College and Research Libraries April.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
The law on Intermediary Liability in India
Copyright Laws & Regulations. Copyright © Texas Education Agency, All rights reserved. 22 A.Title 17 of U. S. Code 1. Protection provided by law.
American University Washington, 10 June 2014 Marrakesh Treaty – Ceiling or Window to Open Sky? Prof. Dr. Martin Senftleben VU University Amsterdam Bird.
 Copyright Collective - Not for profit company  Established 1988 by PANZ in response to copyright abuse  Jointly owned PANZ/NZSA  Member of IFRRO.
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Trans-Pacific Partnership Agreement (TPP)
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 8 Intellectual.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
E-information and Copyright in Botswana: the Library Exception By KGOMOTSO F. RADIJENG Law Librarian (University of Botswana)
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
PATENTS, INTEGRATED CIRCUITS, AND INDUSTRIAL DESIGNS Presented By: Navdeep World Trade Organization.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
Software and databases: Lex specialis for acts of communication to the public? Estelle Derclaye Professor of Intellectual Property law, University of Nottingham.
IP and the working archive Issues arising from the use of Mass Observation Elizabeth Dunn Gaby Hardwicke - Solicitors & Trade Mark Attorneys.
AU Washington, PIJIP 12 September 2012 Fair Use and Fair Dealing: A European Perspective Prof. Dr. Martin Senftleben VU University Amsterdam Bird & Bird,
Copyright © 2010 South-Western Legal Studies in Business, a part of South-Western Cengage Learning. and the Legal Environment, 10 th edition by Richard.
Purchasing Rights on line Domenico Sindico Turin Master of Law in Intellectual Property WIPO / UNIVERSITY OF TURIN.
Petroula Vantsiouri Doctoral Candidate in Law Cantab - LL.M. Harvard.
Copyright Laws & Regulations
Intellectual Property and Cyber Piracy
DMCA § 2012 and Education Paul D. Callister, JD, MSLIS
Prof. Dr. Martin Senftleben VU University Amsterdam
Computer Law th class: Open Source.
Sub-Regional Meeting for ASEAN Countries on the Marrakesh Treaty and the Production and Exchange of Accessible Books by the World Intellectual Property.
Chapter 9 Internet Law and Intellectual Property
What is Digital Right Management’s Role in Modern Education System’s Play? —A Comparative Research of DRM System’s Influence in.
INTELLECTUAL PROPERTY RIGHTS (IPR) IN FP7
Christoph Spennemann, Legal Expert
International Copyright Legal Framework
ARTICLE 16 OF REGULATION (EC) 1083/2006
Professor of Intellectual Property law, University of Nottingham
Presentation transcript:

Copyright in the EU: The Infosoc Directive: TPMs, ACPs and RMI Turin, October 2011 Dr E Derclaye University of Nottingham

WIPO treaties 1996 Origin of ACPs & RMI: Art. 11 WCT & 18 WPPT Implementation in art. 6 & 7 InfoSoc Directive Three levels of protection: – Copyright – TPMs – legal protection of TPM = ACPs Difficulty: copyright’s balance (level 1) can be jeopardised by the legal protection (level 3) of TPMs (level 2) 2(c) E. Derclaye

Examples of TPMs ID+ password Encryption – ex: DVD CSS Watermarking Rights language: e.g. the machine code states that the work cannot be printed or printed more than once etc. (e.g. pdf: see file, properties) DRM = complete chain of protection and rights management; have several functions (e.g. stock the work on a server, licence negotiation, making the work safe, perceive and distribute payment/royalties to owner) DRM use several TPMs e.g. watermarking and encryption 3(c) E. Derclaye

Double protection regime Art. 7 software Directive and art. 6 InfoSoc Directive -> see s. 296 and 296Z ff CDPA Why? Fear of reopening the decompilation debate? Art. 7(c) Directive: Little interpretation (recitals, TP, literature) 4(c) E. Derclaye

Art. 7 Software Directive Only the commercialisation of circumvention equipment is prohibited Only aim = reduces protection – ex: software has a lawful aim but can also, subsidiarily, neutralise TPM is not covered by the prohibition => sufficient to give a lawful function to the circumvention device to escape the prohibition The law is not very efficient – provision easily overridden but… 5(c) E. Derclaye

Sony v Ball Defendant knew or had reason to believe that his Messiah 2 chips would be used to make infringing copies when he sold them in the UK => he infringed Sony's rights Defendant infringed s.296(2)(b) by publishing information on a website intended to enable or assist persons to circumvent the copy- protection system 6(c) E. Derclaye

Sony v Ball Sony's copy protection system was designed to prevent all uses of non-PAL games on PAL consoles (…). The sole purpose of the Messiah2 chip was to circumvent this. Section 296ZD created a tort of strict liability (restated in Nintendo v Playables, 2010): it is a breach, for example, to advertise for sale any device, component, product or service primarily designed, produced, adapted or performed of the purpose of enabling or facilitating the circumvention of TPM 7(c) E. Derclaye

Sony v Ball Nothing in the wording of the copy-protection provisions requires the copy protection system to be on the software rather than the hardware. There is nothing in the definition of either "technical device" or "technological measure" which limits where the device or measure should be. Restated in Nintendo v Playables (2010) 8(c) E. Derclaye

Nintendo v Playables “The section restricts acts in relation to“means the sole intended purpose of which is to facilitate the unauthorised removal or circumvention of the technical device”. The focus of this requirement is on circumvention. The fact that a device may be used for a purpose which does not involve infringement of copyright does not mean that the sole intended purpose is not the unauthorised circumvention of a technical device.” The requirement of knowledge is general. “It is not necessary to show (a) that the defendant knew any particular program was to be copied or (b) that the means would only be used for making infringing copies”. Broad interpretation => s. 296 is not that weak… 9(c) E. Derclaye

Art. 6 InfoSoc Directive - structure Para 1: obligation of appropriate protection against circumvention of TPMs Para 2: obligation of appropriate protection against acts preparing the circumvention: manufacture, sale… Para 3: definition of TPM and effective TPMs = the only ones that are protected Para 4: mechanism to ensure the respect of copyright exceptions 10(c) E. Derclaye

Definition of TPM Art. 6§3: “TPM means any technology, device or component that, in the normal course of its operation, is designed to prevent or restrict acts, in respect of works or other subject-matter, which are not authorised by the right holder of any copyright or any right related to copyright as provided for by law or the sui generis right provided for in Chapter III of Directive 96/9/EC.” 11(c) E. Derclaye

Definition of TPM Exclusions: – elements (works or not) belonging to the public domain (a contrario) – software: see above Inclusions: – acts covered by exceptions – Access acts 12(c) E. Derclaye

Definition of effectiveness “Technological measures shall be deemed "effective" where the use of a protected work or other subject-matter is controlled by the right holders through application of an access control or protection process, such as encryption, scrambling or other transformation of the work or other subject- matter or a copy control mechanism, which achieves the protection objective.” 13(c) E. Derclaye

Prohibition Technological protection measures (TPMs), art. 6 §1&2: Member States must provide for the legal protection of TPMs, i.e. prevent the circumvention of effective TPM which the person concerned carries out knowingly or with reasonable grounds to know that s/he is circumventing the TPM & activities primarily designed or produced to circumvent TPMs (ACDs) 14(c) E. Derclaye

Safeguard of the exceptions Consumers feared that art. 6 could create a technical monopoly over all use of copyright works, lawful as well as unlawful. This is because, if a TPM is introduced which blocks all copying and it is unlawful to do anything about this, this means not only that right owners could technically prevent copying permitted by exceptions or where the term of copyright has expired but that, in addition, it would actually be unlawful to do anything about this. Consequence: users could not benefit from exceptions 15(c) E. Derclaye

Art. 6(4) “Member States should promote voluntary measures taken by right holders, including the conclusion and implementation of agreements between right holders and other parties concerned, to accommodate achieving the objectives of certain specific exceptions or limitations provided for in national law.” In the absence of such voluntary measures or agreements, Member States are obliged to take appropriate measures to ensure that right holders provide beneficiaries of such exceptions or limitations with appropriate means of benefiting from them. NB: The provisions of the first and second subparagraphs shall not apply to works or other subject-matter made available to the public on agreed contractual terms in such a way that members of the public may access them from a place and at a time individually chosen by them. 16(c) E. Derclaye

Only 7 exceptions safeguarded I.e. Article 5(2)(a), (2)(c), (2)(d), (2)(e), (3)(a), (3)(b) or (3)(e) (disabled, teaching, research, public security...), so not all – most prominent example = exception for review and criticism 17(c) E. Derclaye

RMI – art. 7 InfoSoc Directive Much less controversial than art. 6: legal protection against the removal or alteration of any electronic RMI and the diffusion of protected material from which the RMI has been removed or altered by any person doing so knowingly Art. 7.2: definition of RMI : any information provided by right holders which identifies: – the subject-matter protected – the author or any other right holder – information about the terms and conditions of use of the protected subject-matter and – any numbers or codes representing that information – Ex: logos, icons, hyperlinks, © notice, ISBN 18(c) E. Derclaye