Legal Ramifications in the Cloud for Media and Entertainment IP, Privacy, Reliability, Security & Issues Jim Burger Dow Lohnes PLLC.

Slides:



Advertisements
Similar presentations
Internet Service Provider Liability Under U.S. Copyright Law Paula Pinha, Attorney-Advisor U.S. Copyright Office East Africa Regional Seminar on: Copyright.
Advertisements

Digital Assets Presented by Sharon Rivenson Mark, Esq. and Shirley B. Whitenack, Esq. Adapted from Presentation by Catherine A. Seal, Esq.
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Birnhack & Elkin-Koren, Feb Privacy Practices of Israeli Public Web Sites February 2004 Dr. Michael Birnhack & Dr. Niva Elkin-Koren Haifa Center.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
School Law Boot Camp – Part 1.  LEGAL ONE Video LEGAL ONE Video  SMALL GROUP ACTIVITY  ALL GROUPS – ◦ Analyze the Cyberbullying Video Scenario Questions.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
1 Drawbacks of Cloud-Delivered Content for Consumers Privacy, Reliability, Security Issues Jim Burger Dow Lohnes PLLC.
Drawbacks of Cloud-Delivered Content for Consumers.
Intellectual Property Boston College Law School February 4, 2009 Copyright – Indirect, Digital Issues.
Intellectual Property Boston College Law School February 1, 2008 Copyright – Digital Issues.
Intellectual Property Boston College Law School February 1, 2007 Copyright – Digital Issues.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Copyright 2008 The Prinz Law Office. 1 Employee Blogs and Websites: How to Protect Your Company from the Legal Risk of Workers Going Online By Kristie.
How is Ownership of Intellectual Property Defined and Enforced in an Inherently Copyable Medium? Venkat Balasubramani, Focal PLLC September 23, 2011.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Vatera.hu Notice and takedown (NTD) Protocol Gergely SzékelyJanuary 12, 2009 ICTrain 2009 eCommerce Day.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Electronic Records Management: What Management Needs to Know May 2009.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
Infrastructure II commercial relationships Chris Reed Professor of Electronic Commerce Law Centre for Commercial Law Studies 1.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
1 CPTWG MEETING #85 December 8, 2004 Legislative/Regulatory Update Jim Burger CPTWG MEETING #85 December 8, 2004 Legislative/Regulatory.
Viacom v. YouTube: The Future of the Section 512 Safe Harbors? Mary Rasenberger April 2011.
NRCCL (University of Oslo, Faculty of Law) Hyperlinks and search engines(I) Jon Bing Norwegian Research Center for Computers and Law Master Lecture 16.
Digital Millennium Copyright Act of 1998 Jason Fu Andy Lee.
Copyright and the DMCA MM450 Issues in New Media Theory February 17, 2009 Steven L. Baron.
Security considerations for mobile devices in GoRTT
Consumer Drawbacks of Cloud-Delivered Content Privacy, Reliability, Security Issues Jim Burger Dow Lohnes PLLC.
Computer Forensics Principles and Practices
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Cases against Individual File Sharers PowerPoint lecture (please read slides and follow links)
Class 21 Copyright, Winter, 2010 Online Distribution Randal C. Picker Leffmann Professor of Commercial Law The Law School The University of Chicago
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
Chris Reed Professor of Electronic Commerce Law. The perceived problem “If I put my information in the Cloud then I lose all my rights to it” But is this.
What does it all mean?! The 4th Amendment to the U.S. Constitution guarantees freedom from unreasonable search and seizure. This means that law enforcement.
YouTube Background information YouTube is a video sharing website in which users can upload, share, and view videos, created by three former Paypal employees.
Session 7 Compliance failure policy. 1 Contents Part 1: COLP and COFA duties Part 2: What do we have to comply with and why does it matter? Part 3: Compliance.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
Bell Ringer Activity  Pick up a graphic organizer about Social Networking  First, in your own words, explain what social media means to you (be prepared.
Information Management in Retail: A Legal Perspective Chris Hill Barlow Lyde & Gilbert LLP 17 September 2009.
>>APMG 8119: DIGITAL ENTERPRISE REPORT PREPARED FOR: (Mariia, Deepthi, Alexi & Shriram) POSTGRADUATE DIPLOMA IN BUSINESS APMG 8119: DIGITAL ENTERPRISE.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Privacy and Data Breach Issues Kirk Herath, VP, Chief Privacy Officer, Nationwide & Dino Tsibouris, Founding Principal, Tsibouris & Associates.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Group 3 Against the Proposed Amendments to Fed.R.Civ.Proc., Fed.R.Crim.Proc. & Fed.R.Evid.
Chapter 12: Criminal Justice Process ~ The Investigation Objective: Student should be able to correlate how the constitution relates to an investigation.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Chapter 9: Internet Law, Social Media, and Privacy
Cloud computing and government surveillance
Infrastructure II commercial relationships
Internet Service Provider Liability Under U.S. Copyright Law
Name that tune! Raise your hand if you know how to answer BOTH of the questions below. Artist? How does this song relate to what we’re learning today?
Fourth Amendment And Probable Cause.
The Limits of Your “Duty”
School Searches and You
Presentation transcript:

Legal Ramifications in the Cloud for Media and Entertainment IP, Privacy, Reliability, Security & Issues Jim Burger Dow Lohnes PLLC

Introduction Copyright Safe Harbor Issues in Cloud Computing – New Developments Cloud-Based Services: Government Seizure of Cloud Servers and Files Contractual Issues: Privacy, Reliability, Security 2

Copyright Issues in Cloud Computing: Introduction  DMCA Safe Harbor Protects Cloud Service Providers from copyright liability if it follows the rules: o Posts User Generated Content (UGC) “at the direction of the users” o Complies with notice and take down o Termination policy o Does not have “actual knowledge” of infringing content or should have known (“red flag”) o Control and Benefit  Recent Cases Clarified Cloud Providers Responsibility o Although issues of “deduplification,” control/benefit provision, criminal liability remain 3

Posted At the Direction of the User Cloud lockers like YouTube and Veoh manipulate and index UGC – Courts held “at the direction of the user” since processes automatic Second Circuit found transcoding, playback on “watch pages,” and “related video” functions to comply; but sent “syndication” back to trial court. 4

Notice & Takedown Must take down content not a pointer (MP3tunes) Must have and enforce termination policy (MP3tunes) 5

Red Flag Knowledge In Viacom (YouTube) and Veoh, content industry argued cloud provider should have known 2 nd Cir. In YouTube rejected content industry definition, found two types of knowledge: subjective and objective  Subjective – belief doesn’t have to be reasonable  Objective – ISP aware of facts made specific infringement “objectively” obvious to a reasonable person No duty to investigate 6

Deduplification Typical cloud storage technique for efficient storage But in Cablevision (cloud DVR) court found individual user cloud copies saved Cablevision from public performance infringement Federal District Judge in MP3tunes found deleting redundant data not same as using a “master copy,” and does not infringe public performance, as long as copy played back exactly the same as uploaded by the user 7

Cloud-Based Services and the Fourth Amendment Consumer expectation of privacy in the cloud? Physical world – Constitution: people should be secure from unreasonable search Judge must issue a warrant for your home PC; judges confused in the digital world Electronic Communications Privacy Act allows mere subpoena to cloud provider for access to confidential information 6 th Cir. held (for in the cloud) need warrant 8

Megaupload “Clouds” the Issues Feds shut down site and had NZ authorities arrest Kim Dotcom & associates seized $50 Meg Content provided by cloud services “valued” at $500 million Complex criminal issues of first impression  Criminal charges based on court made secondary liability  Conspiracy to commit secondary liability  Extradition issue Legitimate cloud users lose access… 9

3 rd Parties & Megaupload Goodwin (EFF) – allows users (with password) to access Carpathia – pay or re-provision DOJ – we’re done MPAA – don’t let Megaupload access Defense – preserve and allow access 25 Petabytes (a Petabyte =13.3 years of HDTV or 50 LOCs), 1,103 servers, 66 Million users Judge – Parties figure work it out or I will decide 10

Contractual Issues: State Law Where is data physically stored/processed? What state’s law control? E.g., CA law provides more privacy protection Where are your customers? E.g., EU e- Privacy Directive (US-EU Safe Harbor Framework/New Proposed EU Directive) 11

Contractual Issues: Privacy/Reliability Terms Privacy  What are the cloud provider’s obligations to ensure privacy of customer data?  What terms apply to third party access (e.g., notice)? Reliability (SLA)  What are acceptable service levels?  Will the cloud provider have alternative services during scheduled downtime or provide compensatory “credit?” 12

Security/Risk WWhat obligations to ensure security of customer data? DDoes the provider follow national or industry standards for data security? HHow is risk of breach allocated? DDoes the cloud provider have cyber insurance? Exit WWhat is the exit scenario? WWhat obligations does the provider have to find/transition to an alternate provider? Contractual Issues: Security/Exit Terms 13

Contractual Issues – 2011 Developments Live up to security or privacy promises or risk litigation or FTC action FTC increasingly active. Recent settlements with Twitter, Facebook, and Google for allegedly deceptive data and/or privacy policies Dropbox facing two class actions alleging it failed to follow its own privacy and security policies White House Privacy Principles lead to new law? 14

Conclusion 15