12,001 research outputs found

    Global Cyber Intermediary Liability: A Legal & Cultural Strategy

    Get PDF
    This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediariesโ€™ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some level of injunctive relief, intermediaries operate in a largely unregulated environment. Part III looks at what we can learn from other countries. The cleanest intermediary country, Finland, and the worst country, Lithuania, were selected in order to explore the causes for the differences between country performances. The section examines the remarkable distinctions between national cultures to explain differences in national cybercrime rates. Part III.A of this Article argues that the criminal code laws do not account for the difference in host and ISP performances between Finland and Lithuania. There are few differences in the codified laws pertaining to cybercrime between these countries. Instead, it is Finlandโ€™s cultural and business environments that appear to drive its cybercrime ranking. Part IV suggests reforms to shift a countryโ€™s culture to make it less prone to corruption. However, changing a culture takes time so Part IV also proposes a private law scheme in which intermediaries are unable to wave the โ€œflag of immunity,โ€ as they do now. The guiding philosophy for this proposal is that harmed parties should be permitted to recover damages directly from โ€œbadโ€ intermediaries

    An empirical study of unfair terms in online auction contracts in the UK: Evidence for the need for better enforcement mechanisms

    Get PDF
    This paper studies the terms of 28 online auction sites. It uncovers that, in this industry, unfair terms are common. The paper focusses on a small number of clauses but conclusively shows that enforcement in the UK is insufficient. The reasons for this insufficiency are explored and solutions proposed

    ISPsโ€™ Duty of Care in Copyright Infringement

    Get PDF
    This dissertation discussed the ISPโ€™s duty of care in copyright infringement. The duty hereon refers to the ISPโ€™s legal obligation to take care of the influence of the provided service on the protection of othersโ€™ copyright. The duty is divided into three sub-categories: the duty of general prevention, the duty of assistance in specific infringement and the duty to deal with repeated infringement. In order to provide a comprehensive and systematic explanation of the duty, four main aspects are logically discussed: the background, the status quo, the justification, and the specific application. In addition to the traditional mechanism of notice and take down, it is asserted that the ISP should play a more active role in dealing with the usersโ€™ online infringement. In particular, the ISP should be imposed on a legal obligation to keep neutral actually and to have general control of the infringing activities through their service. Thereby, the application of the filtering technologies should not be refused as a whole, but should be limited from the perspective of the purpose, the scope as well as the efficacy. Accordingly, the fundamental orientation of the Proposal for a Directive of the European Parliament and of the Council on Copyright in the Digital Single Market is supported by this dissertation. At the same time, it is recommended to adopt the application of the duty of general prevention on the ISPs providing platforms instead of recognizing the service itself as communicating to the public

    Recommendation for Mongolia

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๋ฒ•๊ณผ๋Œ€ํ•™ ๋ฒ•ํ•™๊ณผ, 2019. 2. ๋ฐ•์ค€์„.์ดˆ๋ก ์„œ๋น„์Šค์ œ๊ณต์ž์˜ ์ €์ž‘๊ถŒ ๊ด€๋ จ ์ฑ…์ž„์— ๊ด€ํ•œ ๋น„๊ต๋ฒ•์  ์—ฐ๊ตฌ: ๋ชฝ๊ณจ์„ ์œ„ํ•œ ์ œ์•ˆ์„ ์œ„ํ•˜์—ฌ ์šฐ๋ฆฌ๋Š” ์ง€๊ธˆ ์ธํ„ฐ๋„ท ์—†์ด๋Š” ์–ด๋ ค์›€์„ ๊ฒช๋Š” ๋…ํŠนํ•œ ํ™˜๊ฒฝ์— ์‚ด๊ณ  ์žˆ๋‹ค. ์ธํ„ฐ๋„ท์€ ์šฐ๋ฆฌ์—๊ฒŒ ๋ฌธํ•™ ์ฐฝ์ž‘ ๋ฐ ๋ฐฐํฌ, ์ง€์‹ ์ „๋‹ฌ ๋“ฑ ๋‹ค๋ฅธ ๋งŽ์€ ํ™œ๋™์— ๊ฐœ์ธ์ ์œผ๋กœ ์ฐธ์—ฌํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐํšŒ๋ฅผ ์ œ๊ณตํ•œ๋‹ค. ์ธํ„ฐ๋„ท ๊ฐœ๋ฐœ ์ดˆ๊ธฐ ๋•Œ๋Š” ์ฃผ์š” ์Ÿ์ ์€ ๋งŽ์€ ์‚ฌ๋žŒ๋“ค์—๊ฒŒ ์ ‘๊ทผ์„ฑ์„ ์ตœ๋Œ€ํ•œ ํ—ˆ์šฉํ•˜๋Š”๋ฐ ๊ด€ํ•œ ๊ฒƒ์ด์—ˆ์ง€๋งŒ ์š”์ฆ˜์€ ๋ณด๋‹ค ์•ˆ์ „ํ•œ ํ™˜๊ฒฝ์„ ๊ตฌ์ถ•ํ•˜๊ณ  ์ €์ž‘๊ถŒ ์†Œ์œ ์ž, ์ธํ„ฐ๋„ท ์‚ฌ์šฉ์ž ๋ฐ ์ธํ„ฐ๋„ท ์„œ๋น„์Šค ๊ณต๊ธ‰์ž์ธ ์„ธ๊ฐ€์ง€ ๋‹ค๋ฅธ ์ด์ต์„ ํ‰๋“ฑํ•˜๊ฒŒ ๋ณดํ˜ธํ•˜๋Š” ๊ฒƒ์„ ๊ฐ•ํ™”ํ•˜๊ณ  ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ, ์ธํ„ฐ๋„ท์˜ ๋ถ€์ •์  ์‚ฌ์šฉ์œผ๋กœ ์ธํ•ด ๋ฐœ์ƒํ•˜๊ณ  ์žˆ๋Š” ๋ช…์˜ˆ ํ›ผ์†, ๋ชจ์š•, ๊ฐœ์ธ ์ •๋ณด์˜ ๋ถˆ๋ฒ• ์‚ฌ์šฉ, ์ €์ž‘๊ถŒ์นจํ•ด ๋“ฑ์˜ ์—ฌ๋Ÿฌ ์‚ฌ์ด๋ฒ„ ๋ฒ”์ฃ„ ์ค‘์— ์‚ฌ์ด๋ฒ„ ํ™˜๊ฒฝ์—์„œ์˜ ์ €์ž‘๊ถŒ์นจํ•ด ๋ฌธ์ œ๋ฅผ ๊ฐ•์กฐํ•˜๊ณ , ์ด์šฉ์ž์ƒ์‚ฐ์ฝ˜ํ…์ธ ์™€ ๊ด€๋ จํ•˜์—ฌ ์„œ๋น„์Šค์ œ๊ณต์ž์˜ ์ฑ…์ž„ ๋˜๋Š” ์ฑ…์ž„ ๋ฉด์ œ์— ๋Œ€ํ•œ ๋ฒ•์  ๊ทœ์ œ๋ฅผ ์ฃผ์ œ๋กœ ์‚ผ์•˜๋‹ค. ์„œ๋น„์Šค์ œ๊ณต์ž์˜ ์ฑ…์ž„ ๋˜๋Š” ์˜๋ฌด์— ๊ด€ํ•ด ์ €์ž‘๊ถŒ๋ฒ•์ƒ ์ƒ๊ฒจ๋‚œ ์ตœ๊ทผ ๋ณ€ํ™”๋ฅผ ๋ฐ˜์˜ํ•˜๊ธฐ ์œ„ํ•ด ์—ฌ๋Ÿฌ ๊ตญ๊ฐ€๋“ค์—์„œ ๊ฐ์ž์˜ ์ €์ž‘๊ถŒ๋ฒ• ๊ฐœ์ •์•ˆ์ด ๋…ผ์˜๋˜๊ณ  ์žˆ๋‹ค. ๋˜ํ•œ ์„œ๋น„์Šค์ œ๊ณต์ž์˜ ์ฑ…์ž„๋ฉด์ œ์— ๋Œ€ํ•œ ๊ทœ์ œ์˜ ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ๊ฐœ๋…์ด ์žˆ์œผ๋ฉฐ ๋งŽ์€ ํ•™์ˆ ๋…ผ๋ฌธ๊ณผ ๊ธฐ์‚ฌ์—์„œ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์—์„œ์˜ ์ €์ž‘๊ถŒ ์นจํ•ด์™€ ๊ด€๋ จํ•˜์—ฌ ์‚ฌ์ด๋ฒ„ ์‹ ๊ณ ์ ‘์ˆ˜, ์ €์ž‘๊ถŒ ์นจํ•ด ์ €์ž‘๋ฌผ ๋ฐ ์ •๋ณด ์‚ญ์ œ์˜ ๊ทœ์ •์˜ ํšจ๊ณผ๋ฅผ ํ‰๊ฐ€ํ–ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด ๋ฌธ์ œ์— ๋Œ€ํ•œ ๊ณตํ†ต๋œ ์ž…์žฅ์€ ์—†์œผ๋ฉฐ ๋ฒ•์  ํ™˜๊ฒฝ์—์„œ ์ €์ž‘๊ถŒ ๋ณด์œ ์ž, ์ธํ„ฐ๋„ท ์‚ฌ์šฉ์ž ๋ฐ ์ธํ„ฐ๋„ท ์„œ๋น„์Šค ๊ณต๊ธ‰์ž์˜ ์ด์ต์„ ๊ท ํ˜• ์žก๋Š”๋ฐ ์—ฌ์ „ํžˆ ์–ด๋ ค์›€์„ ๊ฒช๊ณ  ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์—์„œ์˜ ์ €์ž‘๊ถŒ ์นจํ•ด์— ๊ด€๋ จ๋œ ๊ตญ์ œ๋ฒ• ๋ฐ ๊ทœ์ œ ๊ฒฝํ—˜์˜ ์กฐ์‚ฌ๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ๋ชฝ๊ณจ์€ (1) ํ˜„ํ–‰ ์ €์ž‘๊ถŒ๋ฒ•์„ ๊ฐœ์ •ํ•˜๊ณ  ์ธํ„ฐ๋„ท ์„œ๋น„์Šค ๊ณต๊ธ‰์ž์— ๋Œ€ํ•œ ๊ทœ์ œ๋ฅผ ๋„์ž…ํ• ์ง€ ์—ฌ๋ถ€, (2) ๋ฏธ๊ตญ๊ณผ ํ•œ๊ตญ์˜ ๊ฒฝํ—˜์„ ํ†ตํ•ด ์˜จ๋ผ์ธ ์ €์ž‘๊ถŒ ์นจํ•ด์— ๊ด€ํ•œ ๋‹ค๋ฅธ ๊ตญ๊ฐ€์˜ ๊ฒฝํ—˜์„ ์–ด๋–ป๊ฒŒ ๋ฐฐ์šฐ๊ณ  ๋ฐ˜์˜ ํ•  ์ˆ˜ ์žˆ๋Š”์ง€, (3) ์ง€๊ธˆ์˜ ์ €์ž‘๊ถŒ ์‹œ์Šคํ…œ์— ์–ด๋Š ์ •๋„๊นŒ์ง€ ํ•ฉ๋ฒ•์  ์ด์‹์„ ํ•  ์ˆ˜ ์žˆ๋Š”์ง€ ํƒ๊ตฌํ•˜๊ธฐ ์œ„ํ•œ ๊ฒƒ์ด๋‹ค. ์ธํ„ฐ๋„ท์€ ๋” ์ด์ƒ ์˜ํ†  ๊ฒฝ๊ณ„์— ๋ฌถ์—ฌ ์žˆ์ง€ ์•Š๊ธฐ ๋•Œ๋ฌธ์— ์ €์ž‘๊ถŒ ์นจํ•ด ๋ฌธ์ œ๋Š” ๋ชจ๋“  ๊ตญ๊ฐ€์— ์ ์šฉ๋˜๋ฏ€๋กœ ์ด ๋ฌธ์ œ์— ๋Œ€ํ•ด ๋‹ค๋ฅธ ๊ตญ๊ฐ€์— ๋Œ€ํ•œ ๋‹ค์–‘ํ•œ ์ ‘๊ทผ๋ฒ•์„ ์กฐ์‚ฌ ๋˜๋Š” ์—ฐ๊ตฌํ•˜๋ฉด์„œ ๋น„๊ตํ•˜๋Š” ๊ฒƒ์ด ๋งค์šฐ ์ค‘์š”ํ•˜๋‹ค. ๋ณธ ์—ฐ๊ตฌ์˜ ์ด๋Ÿฌํ•œ ๋ชฉ์ ์„ ์œ„ํ•ด, ์ด ๋…ผ๋ฌธ์—์„œ๋Š” ๊ฐ€์žฅ ๋Œ€ํ‘œ์ ์ธ ๊ตญ๊ฐ€์ธ ๋ฏธ๊ตญ, ๊ทธ๋ฆฌ๊ณ  ๋ฏธ๊ตญ๊ณผ ์œ ๋Ÿฝ์˜ ์ ‘๊ทผ๋ฒ•์„ ์ผ๋ถ€์”ฉ ์ฑ„์šฉํ•œ ํ•œ๊ตญ์˜ ๊ฐ ๊ฒฝํ—˜์— ๋Œ€ํ•œ ๊ณ ์ฐฐ์„, ์ฃผ๋กœ ์„œ๋น„์Šค์ œ๊ณต์ž์˜ ์ฑ…์ž„์ œํ•œ ๋ฐ ๊ทธ๋Ÿฐ ์ œํ•œ์˜ ์ „์ œ์š”๊ฑด์œผ๋กœ์„œ ๋ฒ•์ ์˜๋ฌด๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ์ง„ํ–‰ํ•˜์˜€๋‹ค. ์ด ์—ฐ๊ตฌ์˜ 3 ์žฅ์—์„œ๋Š” ๊ฐ ๊ตญ๊ฐ€์˜ ์ธํ„ฐ๋„ท ์„œ๋น„์Šค ์ œ๊ณต ์—…์ฒด์™€ ๊ด€๋ จ๋œ ๋ฒ•์  ์†Œ์†ก ๋ฐ ๋ฒ•์›์—์„œ ํŒ๊ฒฐ์ด ๋‚œ ์†Œ์†ก ์‚ฌ๊ฑด์„ ์กฐ์‚ฌํ•˜์˜€๋‹ค. ์ธํ„ฐ๋„ท ์„œ๋น„์Šค์ œ๊ณต์ž์˜ ์ฑ…์ž„์˜ ๋Œ€ํ•œ ๋ฌธ์ œ๋Š” ๊ทธ๋“ค์˜ ํ™œ๋™๊ณผ ์ œ๊ณตํ•˜๋Š” ์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ์ง์ ‘ ๋˜๋Š” ๊ฐ„์ ‘์ ์œผ๋กœ ์ €์ž‘๊ถŒ ๋ณด์œ ์ž์˜ ๋…์ ์  ๊ถŒ๋ฆฌ๋ฅผ ์นจํ•ดํ•˜๋Š” ์ฝ˜ํ…์ธ ๋ฅผ ํ†ตํ•ด ์ƒ์„ฑ๋œ๋‹ค. ๋”ฐ๋ผ์„œ ์‚ฌ์šฉ์ž์ƒ์‚ฐ์ฝ˜ํ…์ธ ์˜ ์ง์ ‘๊ณผ ๊ฐ„์ ‘์  ๋ฒ•์  ์ฑ…์ž„์˜ ์„ฑ๊ฒฉ์„ ์—ฐ๊ตฌํ•˜๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•˜๋‹ค. ์ด์™€ ๊ด€๋ จ ํ•˜์—ฌ ์—ฐ๊ตฌ์˜ ์ฒซ ๋ฒˆ์งธ ์žฅ์—์„œ ์ž‘์„ฑ๋œ ์ด์šฉ์ž๊ฐ€ ๋งŒ๋“  ์ฝ˜ํ…์ธ ์˜ ๋ฒ•์  ๊ฐœ๋…, ๋‘ ๋ฒˆ์งธ ์žฅ์—์„œ ์ง์ ‘๊ณผ ๊ฐ„์ ‘์  ์ฑ…์ž„์˜ ๋Œ€ํ•œ ๊ฐœ๋…์„ ๊ฐ„๋‹จํ•˜๊ฒŒ ์‚ดํŽด ๋ดค๋‹ค. ์ด ์—ฐ๊ตฌ์˜ 5 ์žฅ์€ ํ˜„์žฌ ๋ชฝ๊ณจ์˜ ๋ฒ•์  ๊ทœ์ œ ์ฒด๊ณ„๋ฅผ ํ•ด์„ํ•˜๊ณ  ํ˜„์žฌ ๊ทœ์ œ ์ฒด์ œ์˜ ๋ช‡ ๊ฐ€์ง€ ๋‹จ์ ์„ ์ œ์‹œํ•˜์˜€๋‹ค. ๊ฒฐ๋ก ์ ์œผ๋กœ ์ด ๋…ผ๋ฌธ์€ ์ง€๊ธˆ ๊นŒ์ง€ ๋ชฝ๊ณจ์—์„œ ์˜จ๋ผ์ธ ์ €์ž‘๊ถŒ ์นจํ•ด์— ๋Œ€ํ•œ ์ธํ„ฐ๋„ท ์ค‘๊ฐœ์ž์˜ 2์ฐจ์  ์ฑ…์ž„์— ๊ด€ํ•œ ๋ฌธ์ œ๋ฅผ ์ œ๊ธฐํ•˜๋Š” ์‚ฌ๋ก€์— ์ง๋ฉดํ•˜์ง€๋Š” ์•Š์•˜์ง€๋งŒ, ๊ฐ€๊นŒ์šด ๋ฏธ๋ž˜์— ๋ชฝ๊ณจ ์ •๋ถ€๊ฐ€ ์ฑ…์ž„์ œํ•œ ๋ฒ•์ œ๋ฅผ ์ฑ„ํƒ ํ•  ํ•„์š”์„ฑ์ด ๋†’๋‹ค๊ณ  ๊ฒฐ๋ก  ์ง€์—ˆ๋‹ค. ๋˜ํ•œ, ์ €์ž‘๊ถŒ ์นจํ•ด์— ๋Œ€ํ•œ ์ €์ž‘๊ถŒ๋ถ€์—ฌ์ž์˜ ์š”์ฒญ์— ๋”ฐ๋ผ ์ €์ž‘๊ถŒ ์นจํ•ด ์ฝ˜ํ…์ธ ๋ฅผ ์‚ญ์ œํ•˜๋Š” ๊ฒƒ๊ณผ ๊ด€๋ จ๋œ ํˆฌ๋ช…ํ•˜๊ณ  ํšจ๊ณผ์ ์ธ ๋ฒ•์  ์กฐ์น˜๋ฅผ ๋งˆ๋ จํ•˜๋Š” ๊ฒƒ์„ ์ ๊ทน์ ์œผ๋กœ ๊ณ ๋ คํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค๊ณ  ๋ณธ๋‹ค. ์ฃผ์š”์–ด: ์ด์šฉ์ž ์ƒ์‚ฐ ์ฝ˜ํ…์ธ , ๊ฐ„์ ‘ ์ฑ…์ž„, ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„ ์ €์ž‘๊ถŒ ์นจํ•ด, ์ธํ„ฐ๋„ท ์„œ๋น„์Šค ์ œ๊ณต ์—…์ฒด, ์ €์ž‘๊ถŒ ์ œํ•œ, ์ง€์  ์žฌ์‚ฐ๊ถŒ ํ•™๋ฒˆ: 2016-22111Abstract A Comparative Study on Intermediary Liabilities for Copyright Infringement: Recommendation for Mongolia Itgeltugs Altansukh College of Law The Graduate School of Seoul National University This is such an extraordinary period in the history of humankind, giving nearly all people a self-thought that I would no longer live without Internet. It is undeniable to say that Internet gives us a bundle of chances and opportunities to engage directly in the creation of works and dissemination of knowledge. At the same time, it has become a home for variety of illegal and misappropriate conducts in a way that our previous generations could not even imagine. While at first it was the main concern how to proliferate the Internet as reachable as possible to many people, nowadays the main concerns towards Internet are how we could make Internet a safer environment for all of us, and how to strike a fair balance among legal interests of copyright holders, internet users and online intermediaries. Having noted that there are many other aspects affected by the misuse of Internet, including online defamation, misuse of personal information, cybercrimes, etc., this thesis highlights the issue of copyright infringement in the digital world, and aims to study the legal regime of intermediary liabilities for copyright infringement. More narrowly, many countries have considered amending their copyright law as to include recent developments made to the copyright world with respect to online intermediaries liabilities and responsibilities for copyright infringement. In addition, there have been varying viewpoints as to the usefulness of the adoption of statutory immunity for intermediary liabilities, and many literature studies have evaluated the effectiveness of notice and takedown procedures in relation to the conducts of online copyright infringement. Yet, there is no harmonization over these issues and many countries still face hurdles in the solution on finding a fair balance between the competing rights of copyright owners, intermediaries and individuals. With respect to this global trend, this thesis aims at studying (1) whether Mongolia needs to revise its current copyright law and adopt the limitation to online intermediaries liabilities(2) how it can learn and reflect other countries experiences regarding online copyright infringement, namely from the U.S. and South Korean experiencesand (3) to what extent legal transplantation could be made to the current copyright system. What is more, as Internet is more like borderless and online copyright infringement does not leave any country outside the flow, it is crucial to study different approaches of different countries addressing same particular issue. For the purpose of this thesis, it will offer an insight to the experience of the United States as a main representative country, and of the Republic of Korea, as a country with a mixed legal environment reflecting both the United States and European approaches, by mainly focusing on the legal framework of limitation of intermediary liabilities and statutory obligations as prerequisite condition to the limitation. Chapter 3 of the thesis provides a study of each countrys legal framework and case studies in relation to the online intermediaries respectively. The issue of intermediary liability arises because either of their own activities or the users contents appeared on their platforms that prejudice the copyright holders exclusive rights. Hence, it is worth to study the user-generated content from a copyright perspective and the legal characteristics of allegation of secondary liability. For this reason, Chapter 1 of the thesis will touch upon the concept of user-generated content from a copyright perspective and the Chapter 2 of the thesis will discuss the legal concept of secondary liability in brief. Chapter 5 of the thesis studies and analyzes the current copyright system of Mongolia and reveal some shortcomings regarding the current regulation as measure against online copyright infringement. All in all, this thesis concludes that even though Mongolia has not yet faced with any challenging cases that arise a question of secondary liability of an internet intermediary for online copyright infringement, there is high prospect of the necessity of adopting a safe harbor regime in the near future. Furthermore, along with the safe harbor regime, a clear and effective legal framework for the notice and takedown of unauthorized works is highly sought for consideration. Keyword: user-generated content, secondary liability, online copyright infringement, internet intermediary, copyright limitations and exceptions, intellectual property Student Number: 2016-22111TABLE OF CONTENTS INTRODUCTION 1 GENERAL ASPECTS OF USER-GENERATED CONTENT 1.1. The Notion of User-Generated Content 1.1.1. The Definition of a User and the User-Generated Content 1.1.2. Types of User-Generated Content in the Copyright Context 1.2. Users Right 1.3. The Current State of User-Generated Content in the Legal Context 1.4. Conclusion to the Chapter 2 GENERAL ASPECTS OF INTERMEDIARY LIABILITIES 2.1. Copyright Infringement 2.1.1. Direct and Indirect Infringement 2.1.2. Indirect Infringement in the United States i) Vicarious Infringement ii) Contributory Infringement iii) Inducement Theory 2.1.3. Indirect Infringement in China 2.2. Internet Intermediary 2.3. Secondary Liability of Internet Intermediaries 3 A COMPARATIVE STUDY ON INTERMEDIARY LIABILITIES 3.1. The Legal Framework of Intermediary Liabilities in the United States 3.1.1. The Necessity to Adopt the Digital Millennium Copyright Act (DMCA) 3.1.2. Regulations of the DMCA 3.1.3. Eligibility Requirements for Safe Harbor Protection 3.1.4. UGC Service Providers Safe Harbor under 512(c) 3.1.5. Notable Cases i) Viacom Intl, Inc. v. YouTube, Inc. ii) Capitol Records, LLC v. Vimeo, LLC iii) Lenz v. Universal Music Corp. iv) BMG Rights Management LLC v. Cox Communications, Inc. 3.1.6. Conclusion to the U.S. Part 3.2. The Legal Framework of Intermediary Liabilities in Korea 3.2.1. Statutory Regulations regarding Intermediary Liabilities for Copyright Infringement 3.2.2. Online Service Providers Liability under the Korean Copyright Act 3.2.3. Government and Public Institutions in charge of Online Copyright Infringement 3.2.4. Notable Cases regarding the Online Service Providers Liability 3.2.5. Conclusion to the Korean Part 4 THE LEGAL FRAMEWORK OF ONLINE COPYRIGHT PROTECTION IN MONGOLIA 4.1. Legal System of Mongolia and Copyright Protection 4.1.1. The Mongolian Legal System 4.1.2. Intellectual Property Protection in Mongolia 4.1.3. Law of Mongolia on Copyright and Related Rights 4.1.4. Current Status of Enforcement of Copyright Protection 4.2. Regulations regarding Internet Service Providers 4.2.1. Under the Law on Copyright and Related Rights 4.2.2. General Terms and Conditions of Digital Content Service Regulation 4.3. Secondary Liability Concept in Mongolia 4.3.1. Under Civil Law 4.3.2. Under Criminal Law 4.4. Conclusion to the Chapter 5 RESEARCH RESULT, RECOMMENDATION AND CONCLUSION 5.1. Research Result 5.1.1. Necessity of Devising a Regime of Intermediary Liability in the Mongolian Copyright System i. The Regime of Intermediary Liability in Mongolia on an International Scale of Global Trend ii. Risk of Legal Action Against ISPs for a Third Partys Direct Copyright Infringement 5.1.2. Advantages over Disadvantages of Adopting a Conditional Immunity Regime for ISPs 5.2. Recommendations 5.2.1. Adoption of Vertical Approach 5.2.2. Abolishment of Digital Copyright Regulation 5.2.3. Adoption of a Clear and Transparent Notice and Takedown Scheme 5.2.4. Other Possible Aspects to Consider from the U.S. and South Korean Experiences 5.3. Conclusion BIBLIOGRAPHY ABSTRACT IN KOREANMaste

    Fashion Forward: The Need for a Proactive Approach to the Counterfeit Epidemic

    Get PDF
    In the last two decades, the overall activity of the counterfeit market has expanded and risen 10,000 percent. This dramatic shift corresponds to growth of the Internet, which has unified the fascination of obtaining cheap, illegitimate goods with the efficiency of a mouse click. With the expected continued inflation of the counterfeit market comes a host of new concerns, namely, how to determine who is responsible for the distribution of these knockoffs, and who should be ordained to limit them in the marketplace. In both the United States and the European Union, however, outdated laws produce a mรฉlange of inadequate solutions to these issues. This Note examines these burden structures currently in place by the United States and EU States, and argues that the laws are insufficient, from both a cost and a pragmatic perspective. It concludes, therefore that the increase in the global counterfeit market demands a heightened standard of care from intermediaries than currently required by law and practice

    Making the private public: Regulating content moderation under Chinese law

    Get PDF
    With the expansion of digital economy, tackling illegal online content is an increasingly challenging task. China implemented a dual-track legal mechanism on content moderation, whereby it exempts general monitoring obligations of intermediaries under private law while imposing monitoring obligations under public law. In recent years, major platforms exercise much stronger control over flow of information, regardless of more serious consequences that impact the fundamental rights of users. Meanwhile, a series of Chinese court rulings have shown that these divergent attitudes towards monitoring obligations under public and private law have given rise to legal conflicts that may deprive intermediaries of their legitimate immunity, undermining the stability and efficiency of the safe harbor rule. Furthermore, the lack of adequate legal safeguards against the risk of abusing automatic content filtering technology might transform the internet into a digital panopticon. To redraw boundaries between monitoring obligations under private and public law, future Chinese legislation should not only provide clearer clarification on the scope of monitoring, but also include a provision prohibiting general monitoring obligations in private law. To provide legal predictability for affected parties and flexibility for future technological developments, a Good Samaritan clause should be introduced in Cybersecurity Law by learning from the substance of Article 7 of the DSA

    THE NEW RIGHT OF COMMUNICATION THROUGH THE INFORMATION NETWORK IN THE PEOPLEโ€™S REPUBLIC OF CHINA

    Get PDF
    While China has not joined the World Intellectual Property Organisation (WIPO) Copyright Treaty (WCT) or the WIPO Performances and Phonograms Treaty (WPPT), China amended its Copyright Law in 2001 in accordance with Article 8 of the WCT and Articles 10 and 14 of the WPPT. As a result, a new exclusive right of communication through the information network (hereafter referred to as the โ€˜right of network communicationโ€™) was introduced into the Copyright Law 1990 (amended 2001) for the benefit of copyright owners and performers and producers of sound and video recordings. The adoption of the right of network communication has raised the level of copyright protection as required by Article 8 of the WCT and Articles 10 and 14 of the WPPT. Consequently, uploading a work or recording onto a website for unauthorised distribution through the Internet will infringe the copyright owner, producer and performerโ€™s (if the recording embodies the performance) right of network communication, unless the distribution constitutes fair use. However, since the provision on the right of network communication in the Copyright Law has a liberal application, more needs to be done to properly apply this right in complicated cases. In addition, the new technologies and business models appearing in China bring new challenges which call for clarification on the meaning of the network communication right, and either creating or improving provisions in the Copyright Law. For example, when a website provides hyperlinks to infringing MP3 files, or โ€˜piratedโ€™ sites containing a number of infringing files, will the website operator be directly responsible for infringing the right of network communication, or for indirectly contributing to the infringing act done by the linked sites? Moreover, if the copyright owner sues the website providing the hyperlinks, but does not give a written notice warning it of the infringing nature of the linked files or sites in advance, can the court determine that the website has actual knowledge of the infringing act occurring on the linked site? There are no clear answers to these questions in the Copyright Law. To deal with these new challenges the State Council drated the Regulation on the Protection of the Right of Communication through the Information Network (โ€˜Communication Right Regulationโ€™),1 and the Supreme Court is trying to give interpretations on the right of network communication in specific cases. Nevertheless there are still disputes over the application of this new right. The competing interest groups, which include major record labels and the Internet industry, have opposing views, which makes it difficult for new legislation and judicial interpretation. This paper explores the nature of the new right of network communication in China and discusses its relationship with other exclusive rights, in particular the right of reproduction and the right of distribution. This paper also identifies the hotly debated questions in relation to applying the right of network communication and attempts to provide answers. In addition, the paper provides a proposal to introduce specific provisions of indirect copyright infringement and insights on the judicial test that should be applied by the courts in determining an act of indirect infringement

    THE NEW RIGHT OF COMMUNICATION THROUGH THE INFORMATION NETWORK IN THE PEOPLEโ€™S REPUBLIC OF CHINA

    Get PDF
    While China has not joined the World Intellectual Property Organisation (WIPO) Copyright Treaty (WCT) or the WIPO Performances and Phonograms Treaty (WPPT), China amended its Copyright Law in 2001 in accordance with Article 8 of the WCT and Articles 10 and 14 of the WPPT. As a result, a new exclusive right of communication through the information network (hereafter referred to as the โ€˜right of network communicationโ€™) was introduced into the Copyright Law 1990 (amended 2001) for the benefit of copyright owners and performers and producers of sound and video recordings. The adoption of the right of network communication has raised the level of copyright protection as required by Article 8 of the WCT and Articles 10 and 14 of the WPPT. Consequently, uploading a work or recording onto a website for unauthorised distribution through the Internet will infringe the copyright owner, producer and performerโ€™s (if the recording embodies the performance) right of network communication, unless the distribution constitutes fair use. However, since the provision on the right of network communication in the Copyright Law has a liberal application, more needs to be done to properly apply this right in complicated cases. In addition, the new technologies and business models appearing in China bring new challenges which call for clarification on the meaning of the network communication right, and either creating or improving provisions in the Copyright Law. For example, when a website provides hyperlinks to infringing MP3 files, or โ€˜piratedโ€™ sites containing a number of infringing files, will the website operator be directly responsible for infringing the right of network communication, or for indirectly contributing to the infringing act done by the linked sites? Moreover, if the copyright owner sues the website providing the hyperlinks, but does not give a written notice warning it of the infringing nature of the linked files or sites in advance, can the court determine that the website has actual knowledge of the infringing act occurring on the linked site? There are no clear answers to these questions in the Copyright Law. To deal with these new challenges the State Council drated the Regulation on the Protection of the Right of Communication through the Information Network (โ€˜Communication Right Regulationโ€™),1 and the Supreme Court is trying to give interpretations on the right of network communication in specific cases. Nevertheless there are still disputes over the application of this new right. The competing interest groups, which include major record labels and the Internet industry, have opposing views, which makes it difficult for new legislation and judicial interpretation. This paper explores the nature of the new right of network communication in China and discusses its relationship with other exclusive rights, in particular the right of reproduction and the right of distribution. This paper also identifies the hotly debated questions in relation to applying the right of network communication and attempts to provide answers. In addition, the paper provides a proposal to introduce specific provisions of indirect copyright infringement and insights on the judicial test that should be applied by the courts in determining an act of indirect infringement

    Beyond Section 230: Liability, Free Speech, and Ethics on Global Social Networks

    Get PDF
    • โ€ฆ
    corecore