{"id":3413,"date":"2020-11-29T21:16:12","date_gmt":"2020-11-29T21:16:12","guid":{"rendered":"https:\/\/www.dekuzu.com\/en\/?p=3413"},"modified":"2020-11-29T21:16:15","modified_gmt":"2020-11-29T21:16:15","slug":"landscape-section-512-operates","status":"publish","type":"post","link":"https:\/\/www.dekuzu.com\/en\/2020\/11\/landscape-section-512-operates.html","title":{"rendered":"Technological Changes Since the 1990s Have Changed the Landscape in which Section 512 Operates"},"content":{"rendered":"\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">The technology that allows copyright owners to distribute content directly to consumers\u2019 living rooms via streaming services also enables new forms of piracy: streaming of unlicensed content and stream-ripping \u2013 that is, using software to make an unlicensed copy of streamed content that would otherwise be licensed.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\"><!--more--><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">The cloud also presents new challenges for combating piracy. Cyberlockers, for instance, enable a user to upload content \u2013 with or without the copyright owner\u2019s permission \u2013 that they can then access remotely or share with others; cyberlockers, because they are not routinely indexed by search crawlers, can be much more difficult for copyright owners to monitor for infringing activity than publicly searchable P2P networks.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">With the growth of internet use, some argue that the backbone of the section 512 safe harbors \u2013 the notice-and-takedown system \u2013 has been overwhelmed by the sheer scale of notices of infringement being sent. The increased volume of notices put additional burdens on the rightsholders who sent them and on the OSPs who must respond to them under their safe harbor requirements.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Additionally, many rightsholders argue that the scale of notices sent makes section 512(g)\u2019s requirement of court action to contest a counter-notice infeasible, especially coupled with the ten-day deadline to file suit following a counter-notice. Moreover, the volume of notices demonstrates that the notice-and-takedown system does not effectively remove infringing content from the internet; it is, at best, a game of whack-a-mole.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Further, the use of automated notice-generating technologies, which ease copyright owners\u2019 monitoring for infringing content and facilitate more rapid response, raise concerns related to speech.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">As does the length of time mandated for \u201cput back\u201d &#8211; with both politically sensitive and timely content, the delay can leave a user in a position where their counter-notice prevails and the content is put back up, but the audience for that content has moved on.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Finally, rightsholders say that other developments that obscure the identity of internet users have further complicated the notice-and-takedown process and, more generally, copyright enforcement online. These take two forms. The first is technologies that anonymize user data or mask the location of hosting services.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">These include reverse proxy services that sit between the internet and the web servers that make up the internet, forwarding requests from internet users to web servers and collecting responses from those web servers so that web servers never communicate directly with internet users.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">The second development comes from new foreign laws that limit how OSPs may use and share user information. Though there may be technological reasons for anonymizing data or masking location or important policy considerations that support increasing internet user privacy, these business and policy decisions tip the balance away from copyright owners by making it more difficult for them to identify infringers.<\/span><\/p>\n<h2 style=\"text-align: center;\"><a href=\"https:\/\/www.dekuzu.com\/en\/docs\/section-512-full-report.pdf\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\"><strong>Past Efforts to Address Changes to the Online Landscape<\/strong><\/span><\/a><\/h2>\n<h3 style=\"text-align: center;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\"><strong>Voluntary Agreements Adopted by the Marketplace<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Since the enactment of section 512, stakeholders have acknowledged perceived gaps in the enforcement framework for online infringement that cannot be addressed by legislative action. Stakeholders have thus developed a range of voluntary initiatives to address online infringement, from best practices to formal, binding agreements. These initiatives can be unilateral or can involve a collaborative effort among several parties across industries.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Congress has acknowledged the important role that voluntary initiatives and agreements can play in the online environment. Stakeholders likewise note that such agreements offer the advantage of allowing parties \u201cto learn from the marketplace what is working and what is not&#8230;, to modify the agreement that resulted in the drafting of section 512 &#8230; and learn from experience.\u201d<\/span><\/p>\n<h4 style=\"text-align: center;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\"><strong>Best Practices<\/strong><\/span><\/h4>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Several stakeholder groups have developed and implemented industry best practices for addressing online infringement. Payment processors and advertising networks, in particular, have utilized best practices in an effort to cut off payments and advertising revenues for web services offering infringing material, by using \u201cfollow the money\u201d strategies that are \u201caimed at cutting off the supply of revenue flowing to rogue sites.\u201d<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">These initiatives generally began as best practice statements that provided guidelines for conducting business and have evolved into more robust programs. While some stakeholders acknowledge the benefits of best practices guidelines, they also comment on the limitations, including the limited scope of influence and the lack of any force of law.<\/span><\/p>\n<h5 style=\"text-align: center;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\"><strong>Formal Agreements<\/strong><\/span><\/h5>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Formal agreements between various parties generally develop out of the best practices. While these agreements do not have the force of law, they do further emphasize the commitment to a shared goal in facilitating the operations within the notice-and-takedown framework.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">The Copyright Office has found during the Study, however, that these formal agreements traditionally have not included small creators and individual users in their creation and implementation, limiting the success of these agreements in some cases.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 14pt;\">Formal agreements between rightsholders and OSPs have taken the form of graduated response systems. Used most frequently for P2P networks, graduated response systems address online infringement by requiring an OSP to take a series of steps with respect to a user when it detects that that user has engaged in infringing activity.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The technology that allows copyright owners to distribute content directly to consumers\u2019 living rooms via streaming services also enables new forms of piracy: streaming of unlicensed content and stream-ripping \u2013 that is, using software to make an unlicensed copy of<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/www.dekuzu.com\/en\/2020\/11\/landscape-section-512-operates.html\">Continue reading<span class=\"screen-reader-text\">Technological Changes Since the 1990s Have Changed the Landscape in which Section 512 Operates<\/span><\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,5,29,43,44,7,6,4,18,21,36,13,24],"tags":[],"class_list":["post-3413","post","type-post","status-publish","format-standard","hentry","category-safe-harbor","category-copyright","category-digital","category-digital-environment","category-dmca","category-enforcement","category-intellectual-property","category-internet","category-law","category-law-review","category-online-platforms","category-research","category-telecom","entry"],"_links":{"self":[{"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/posts\/3413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/comments?post=3413"}],"version-history":[{"count":1,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/posts\/3413\/revisions"}],"predecessor-version":[{"id":3414,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/posts\/3413\/revisions\/3414"}],"wp:attachment":[{"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/media?parent=3413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/categories?post=3413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dekuzu.com\/en\/wp-json\/wp\/v2\/tags?post=3413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}