Copyright Enforcement and the InternetPDF电子书下载
- 电子书积分:13 积分如何计算积分?
- 作 者:
- 出 版 社:Aspen Publications
- 出版年份:2010
- ISBN:9789041133465;9041133461
- 页数:354 页
Part Ⅰ European Union and International Policies 1
Part Ⅰ The EU Enforcement Directive 2004/48/EC as a Tool for Copyright Enforcement&Jorg Reinbothe 3
Ⅰ. Introduction: The Background for the EU Enforcement Directive 3
A. Enforcement Legislation in the Context of EU Harmonization and the Fight against Piracy 3
B. Enforcement in the WIPO Conventions and in the TRIPs Agreement 4
C. External and Internal Enforcement: The Layers of Regulatory Measures 5
D. The Enforcement Directive in the Context of the Acquis Communautaire 6
1. The Rationale for Horizontal Enforcement Legislation in the EU 7
2. Gaps in Enforcement Rules 8
3. The Accession of Ten New Member States Created a Momentum 8
E. Preparatory Steps Undertaken by the European Commission 8
F. The Main Objectives of the Enforcement Directive 9
Ⅱ. The Directive 2004/48/EC on the Enforcement of Intellectual Property Rights in Detail 9
A. From the Commission Proposal to the Adoption of the Directive 9
B. The Contents of the Enforcement Directive 10
1. The Structure of the Directive as Adopted 10
2. Subject Matter and Scope (Articles 1 and 2) 11
3. General Obligation (Article 3) 13
4. Beneficiaries of Sanctions and Remedies ('Persons Entitled to Apply for the Application of the Measures, Procedures and Remedies'), Article 4 13
5. Presumption of Authorship or Ownership (Article 5) 14
6. Evidence (Articles 6 and 7) 14
7. Right of Information (Article 8) 15
8. Provisional and Precautionary Measures (Article 9) 17
9. Sanctions: Corrective Measures (Article 10) 18
10. Sanctions: Injunctions (Article 11) 18
11. Sanctions: Alternative Measures (Article 12) 19
12. Sanctions: Damages (Article 13) 19
13. Legal Costs (Article 14), Publication of Judicial Decisions (Article 15) 20
14. 'Sanctions by Member States': Criminal Sanctions (Article 16) 21
15. Codes of Conduct (Article 17) 22
16. Assessment (Article 18) 23
17. Exchange of Information and Correspondents (Article 19) 23
Ⅲ. Summary and Evaluation of the Enforcement Directive 23
Ⅳ. The Way Forward 24
A. Piracy as a Continuing Threat 24
B. Other Initiatives Taken since 2004 24
C. Conclusion on the Perspectives 27
Part Ⅰ Where Is ACTA Taking Us? Policies and Politics&Luc Pierre Devigne, Pedro Velasco-Martins & Alexandra lliopoulou 29
Ⅰ. Counterfeiting and Piracy Keep Increasing: The Problem and Its Dimensions 29
Ⅱ. Fighting against Counterfeiting and Piracy from the EU Perspective 30
A. Protecting IPR Worldwide Is a Key Trade Priority 30
B. The Current Legal Framework for IP Enforcement in the EU 31
Ⅲ. The Anti-Counterfeiting Trade Agreement 33
A. Why Do We Need a New International Agreement on IP Enforcement? 33
B. The Launch of Negotiations on the ACTA 34
C. The Three Pillars of ACTA 35
1. International Cooperation between Enforcement Authorities 35
2. Adoption of Best Practices 35
3. Improved Legal Framework on IPR Enforcement 36
a. Civil Enforcement 37
b. Border Measures 37
c. Criminal Enforcement 38
d. Special Requirements Related to Rights Management Technology and the Internet 39
Ⅳ. The ACTA Negotiating Process 39
A. Transparency 39
Ⅴ. Next Step of the ACTA Negotiations 40
Ⅵ. Conclusion 41
Part Ⅰ Copyright Enforcement in the Digital Era and Private International Law Issues&Paul L.C. Torremans 43
Ⅰ. Introduction 43
Ⅱ. Right and Contract 44
A. The Distinction 44
B. Transferability 45
C. Entitlement 47
Ⅲ. The Law Applicable to the Copyright Contract 54
A. The Law is Chosen by the Parties 55
B. The Applicable Law in the Absence of Choice 55
C. Article 4 Rome I Regulation Applied in Practice 57
D. Interim Conclusion 61
Ⅳ. Respect for National Copyright and Copyright Contract Law?9 62
Ⅴ. Conclusion 63
Part Ⅰ The Global System of Copyright Enforcement: Regulations, Policies and Politics&Michael D. Taylor 65
Ⅰ. Introduction 65
Ⅱ. Multilateral Level 68
A. The World Intellectual Property Organization (WIPO) 68
Ⅲ. The World Trade Organization: TRIPs Agreement 72
Ⅳ. The World Customs Organization 75
Ⅴ. Interpol 77
Ⅵ. The Group of Eight 78
Ⅶ. Multilateral Level 81
A. The Anti-Counterfeiting Trade Agreement 81
Ⅷ. Regional Level 89
A. The European Union 89
B. EC Regulation 1383/2003 89
C. Directive 2004/48/EC (IPRED) 90
D. A Proposed Directive on Criminal Measures (IPRED2) 91
E. The NAFTA 92
F. The Asia-Pacific Economic Cooperation (APEC) 94
G. The Association of South East Asian Nations (ASEAN) 96
H. The European Free Trade Association 97
Ⅸ. Bilateral Level 97
A. Preferential Trade and Investment Agreements (PTIAs) 97
B. FTAs: US 98
C. FTAs: EU 101
D. FTAs: EFTA 103
E. Bilateral Investment Treaties 104
F. Bilateral IP Instruments 105
1. US-EU IPR Working Group 105
2. EU-US Action Strategy for the Enforcement of IPRs 106
3. US-China 106
a. The MOU on the Protection of Intellectual Property 106
4. US-China Joint Commission on Commerce and Trade 107
5. Industry and Government Cooperation 108
6. Industry Initiatives 108
Ⅹ. Recommendations and Conclusion 110
Part Ⅱ The Role of Internet Service Providers 117
Part Ⅱ File-Sharing and the Role of Intermediaries in the Marketplace: National, European Union and International Developments&Maria Mercedes Frabboni 119
Ⅰ. Introduction 119
Ⅱ. Intermediaries: Access Providers and Platform Providers 121
Ⅲ. The Problem from an Economic Perspective 123
A. The Copyright Framework: Exclusiveness and Its Boundaries 123
B. Effects 125
Ⅳ. Regulation 126
A. Copyright: International and Regional Answers to Internet-Based Activities 126
B. Rules on E-Commerce and Their Applicability to Intermediaries 128
Ⅴ. The Role of Intermediaries in the Individuals' Exercise of Fundamental Rights and Freedoms 130
A. Promusicae v. Telefdnica 130
1. Delivery of Information Concerning Internet Traffic 130
2. Fundamental Rights: Property versus Privacy 132
B. Negotiated Solutions and Administrative Enforcement 133
1. United Kingdom: the Potential for a Voluntary Code of Practice 133
2. The 'Warning and Termination' Approach: Examples of National Implementation 136
3. Comment 138
Ⅵ. Platforms Providers 139
A. Platforms and Infringement: Different Implications of Different Technologies 140
B. Pirate Bay 141
1. The Decision 142
2. Policy Comment 144
Ⅶ. Comments and Conclusion 145
Part Ⅱ The 'Graduated Response' in France: Is It the Good Reply to Online Copyright Infringements?&Alain Strowel 147
Ⅰ. The French Laws on the 'Graduated Response" 148
A. The 'Graduated Response' in a Nutshell 149
B. Data Protection Issues 151
C. A New Monitoring Obligation at the Core of the 'Graduated Response' 152
D. Cooperation of Access Providers 152
Ⅱ. Comparison between the 'Graduated Response' and Other Internet-Related Enforcement Systems 155
Ⅲ. Internet Access is a Fundamental Right Rooted in the Freedom of Expression 154
A. Freedom of Expression Protects Internet Access 155
B. The Right to Access the Internet, as Protected by Freedom of Expression, Can Be Limited 156
Ⅳ. A Few Concluding Remarks on the 'Graduated Response' 158
A. Is the 'Graduated Response' a New Form of Access Control? 158
B. Is the 'Graduated Response' a Workable Reply that Can Become the Norm? 159
Part Ⅱ The Chase: The French Insight into the 'Three Strikes' System&Valerie-Laure Benabou 163
Ⅰ. The Prey: The Partial Failure of Other Solutions against Wild P2P 164
A. Locking P2P 'Upstream' by Technical Means 164
B. Middlestream Approach with Reluctant Intermediaries 165
1. Offensive Strategy against File-Sharing Software Industry 165
2. Cooperative Strategy with Internet Service Providers 166
C. Downstream Strategy: Targeting the Public 168
Ⅱ. The Trap: Mechanism of the French Law 170
A. Duty to Ensure that Access Is Not Used for Copyright Infringement: Duty to Monitor the Connection 171
B. Detection and Warnings Sent to the Subscriber 173
C. Suspension of Internet Access and Others Sanctions 175
Ⅲ. Tally? 179
Part Ⅱ User-Generated Content Sites and Section 512 of the US Copyright Act&Jane C. Ginsburg 183
Ⅰ. Introduction 183
Ⅱ. The Statutory Notice-and-Take-Down Safe Harbour 186
A. 'Service Provider' 187
B. 'Storage at the Direction of a User' 188
C. Statutory Conditions for Limitation on Liability: Knowledge or Awareness 190
D. Statutory Conditions for Limitation on Liability: Direct Financial Benefit 193
E. Statutory Conditions for Limitation on Liability: Right and Ability to Control Infringing Activity 196
Ⅲ. Conclusion 197
Part Ⅱ Data Protection, Secrecy of Communications and Copyright: Conflicts and Convergences - The Example of Promusicae v. Telefonica&Irini A. Stamatoudi 199
Ⅰ. Introduction 199
Ⅱ. ISPs, IP Addresses and File Sharing 201
Ⅲ. The Example of Promusicae v. Telefonica 204
A. Historical Background 204
B. Relevant Legal Provisions 205
C. Outcome and Open Questions 213
D. Conclusions 221
Ⅳ. National Experiences 223
Ⅴ. Conclusions 231
Part Ⅱ Criminal Liability on the Internet&Dimitris Kioupis 233
Ⅰ. Introduction: Old Problems and Modern Developments 233
Ⅱ. Copyright Infringement and Criminal Liability 237
A. Criminal Acts Committed through P2P Networks 241
B. Third-Party Criminal Liability 243
C. Collecting Digital Evidence 249
Ⅲ. Conclusion 253
Part Ⅲ New Models and Alternative Solutions 255
Part Ⅲ Protection of 'DRM' under the WIPO 'Internet Treaties': Interpretation, Implementation and Application&Dr Mihaly Ficsor 257
Ⅰ. Introduction 257
Ⅱ. The Provisions of the Internet Treaties on the Two Constituting Elements of DRM Systems (TPMS and RMI) and the Key Issues of Their Interpretation, Implementation and Application 258
A. Introductory Remarks 258
B. Technological Protection Measures (TPMs) 258
1. Treaty Provisions on TPMs 258
2. '[A]dequate legal protection…against…circumvention': The Treaty Obligations Extend to Provide Protection against 'Preparatory Acts' 259
3. '[T]echnological measures that are used…in connection with…exercise of rights… and that restrict acts': The Treaty Obligations to Provide Adequate Protection Cover both 'Access-Control' and 'Copy-Control' TPMs 264
4. '[T]echnological measures that are used by [authors] [performers or producers of phonograms]':The Treaty Obligations also Cover TPMs Applied by Successors in Title and Licensees of Authors, Performers and Producers of Phonograms, Respectively 268
5. '[E]ffective Technological Measures': Infallibility Is Not a Criterion of Effectiveness 270
6. '[I]n Connection with the Exercise of Their Rights…and That Restricts Acts…Which Are Not Authorized by [the Authors] [the Performers or the Producers of Phonograms] Concerned': The Treaty Obligations to Provide Adequate Protection against Circumvention Are Not Reduced to Acts Linked to Infringements; at the Same Time, They Do Not Result in a New 'Access Right' Alien to the Copyright Paradigm 281
7. '[I]n connection with the exercise of their rights…and that restrict acts…which are not…permitted by law': It Is Necessary (and Possible) to Establish Adequate Balance between the Protection of TPMs and the Applicability of Exceptions and Limitations 287
8. '[T]echnological measures that are used by [authors][performers or producers of phonograms] in connection with the exercise of their rights [under this Treaty or the Berne Convention] [under this Treaty] and that restrict acts, in respect of their [works][performances or phonograms]': The Anticircumvention Provisions Do Not Apply to Productions Not Qualifying as Works, Performances or Phonograms neither to Those that Are in the Public Domain 293
9. 'Effective legal remedies': The Same Kinds of Remedies Are Needed as in the Case of Infringements and, in Respect of Commercial 'Preparatory Acts', as in the Case of Piracy on a Commercial Scale 296
C. Rights Management Information (RMI) 297
1. Treaty Provisions on RMI; Their Interpretation and Implementation 297
2. Application of RMI as Part of DRM Systems along with TPMs or Alone 299
Ⅲ. Conclusions 300
Part Ⅲ Codes of Conduct and Copyright Enforcement in Cyberspace&P. Bernt Hugenholtz 303
Ⅰ. Introduction 303
Ⅱ. Typology of Self-regulation 304
A. Advantages and Disadvantages of Self-regulation 306
B. Legal Nature and Normative Effect of Codes of Conduct 308
C. Self-regulation in Cyberspace 309
Ⅲ. Background Copyright Law 311
Ⅳ. Codes of Conduct on Copyright Enforcement 314
A. An Assortment of Codes 314
B. Assessment 316
Ⅴ. Conclusions 319
Part Ⅲ Vox Pop: Public Participation in Canadian Copyright Law&Ysolde Gendreau 321
Ⅰ. Judicial or Quasi-judicial Process 322
Ⅱ. Legislative Amendments 326
Bibliography 331
Index 343
- 《美英报刊阅读教程 中级精选本 第5版=READING COURSE IN AMERICAN & BRITISH NEWS PUBLICATIONS (INTERMEDIATE LEVEL)》端木义万主编 2019
- 《优雅黑白灰 摄影技术流 最超值的摄影技法书》(英)大卫·泰勒 2012
- 《从甲骨文到 E-Publications 跨越三千年的中国出版》肖东发主编 2009
- 《.NET & XML Magazine 2002-2003 中文精华合集 第1辑》国际技术期刊合集编委会编译 2004
- 《Java Pro 2002-2003中文精华合集 第1辑》国际技术期刊合集编委会编译 2004
- 《EUROPEAN FEDERATION OF CORROSION PUBLICATIONS NUMBER 41 CORROSION BY CARBON AND NITROGEN METAL DUSTI》CARBURISATION AND NITRIDATION 2007
- 《RAP PUBLICATIONS CATALOGUE 2010 TO 2011》 2012
- 《ENERGY AND THE PROCESS INDUSTRIES IMECHE CONFERENCE PUBLICATIONS 1985-6》 1985
- 《POWER PLANTS FOR OFFSHORE PLATFORMS I MECH E CONFERENCE PUBLICATIONS 1981-11》 1981
- 《DIRECT DIGITAL CONTROL FOR POWER PLANT I MECH E CONFERENCE PUBLICATIONS 1982-10》 1982