1.
The graduated response system and online surveillance ^
Under the graduated response policy, there are two basic surveillance methods. First, copyright holders may cooperate directly with Internet Service Providers (ISPs) in monitoring of their subscribers activities – this type of monitoring involves deep packet inspection (DPI)10. In case where such cooperation is not possible, a less intrusive solution is being used – copyright holders hire third party entities to monitor the Internet, usually selected webpages or file sharing networks. In 2011, the Court of Justice of the European Union confirmed that in the European Union ISPs cannot be required to adopt general filtering systems on their networks in order to prevent copyright infringement11. Currently the European graduated response systems are based on the second model, the American «six-strike» policy does not involve DPI-based surveillance either. After obtaining an Internet Protocol (IP) address of a user allegedly infringing copyright, copyright holders are able to establish which ISP provides services to a particular user. The ISP is capable of identifying the user of the particular address at a particular time, who otherwise would remain anonymous for a copyright holder. The principle underlying the graduated response system is that sanctions should escalate as infractions increase12 or persist.
2.
Foundations of the graduated response system ^
2.1.
Monitoring of users’ online behaviour ^
2.2.
Capture of users’ IP addresses ^
2.3.
Collection of users’ data ^
3.
Less intrusive measures and alternatives to graduated response ^
3.1.
Public interest information ^
3.2.
Notice-and-notice ^
3.3.
Targeted monitoring ^
4.
Conclusions ^
5.
References ^
Article 29 Working Party, Working document on data protection issues related to intellectual property rights (WP 104) adopted on 18 January 2005.
Bendrath, Ralf, Global technology trends and national regulation: Explaining Variation in the Governance of Deep Packet Inspection, http://userpage.fu-berlin.de/~bendrath/Paper_Ralf-Bendrath_DPI_v1-5.pdf, last accessed 20 December 2013 (2009).
Bridy, Annemarie, Graduated Response American Style: «Six Strikes» Measured Against Five Norms, Fordham Intellectual Property, Media & Entertainment Law Journal, Vol. 23, No. 1 (2012).
Bridy, Annemarie, Graduated Response and the Turn to Private Ordering In Online Copyright Enforcement, Oregon Law Review no. 89 (2010).
European Data Protection Supervisor, Opinion of the European Data Protection Supervisor on the current negotiations by the European Union of an Anti-Counterfeiting Trade Agreement (ACTA) – 2010/C 147/01 adopted on 22 February 2010.
European Data Protection Supervisor, Opinion of the European Data Protection Supervisor on the proposal for a Council Decision on the Conclusion of the Anti-Counterfeiting Trade Agreement between the European Union and its Member States, Australia, Canada, Japan, the Republic of Korea, the United Mexican States, the Kingdom of Morocco, New Zealand, the Republic of Singapore, the Swiss Confederation and the United States of America – 2012/C 215/08 adopted on 24 April 2012.
Geist, Michael, Rogers Provides New Evidence on Effectiveness of Notice-and-Notice System, http://www.michaelgeist.ca/content/view/5703/125/ last accessed 20 December 2013 (2011).
Geist, Michael, Web privacy vs. identifying infringers, Toronto Star, http://www.michaelgeist.ca/resc/html_bkup/oct62003.html last accessed 20 December 2013 (2003).
Karaganis, Joe, and Renkema, Lennart, Copy Culture in the US & Germany (2013).
Lessig, Lawrence, Code 2.0, Basic Books, New York (2006).
Lyon, David, Editorial. Surveillance Studies: Understanding visibility, mobility and the phenetic fix, Surveillance and Society no. 1 (2002).
Lyon, David, Surveillance Society: Monitoring Everyday Life, Open University Press, Philadelphia (2001).
Meyer, David, Europe will not accept three strikes in ACTA Treaty, http://www.zdnet.com/europe-will-not-accept-three-strikes-in-acta-treaty-3040057434/ last accessed 20 December 2013 (2010).
Meyer, Trisha, and Van Audenhove, Leo, Surveillance and regulating code: an analysis of graduated response in France, Surveillance and Society no. 9 (2012).
New Zealand’s Office of the Minister of Commerce, Cabinet Economic Growth and Infrastructure Committee, Illegal Peer-to-Peer File Sharing (Cabinet Paper).
Patry, William, Moral Panics and the Copyright Wars, Oxford University Press US, Oxford (2009).
Serbin, Danielle, The Graduated Response: Digital Guillotine or a Reasonable Plan for Combating Online Piracy?, Intellectual Property Brief no. 3 (2012).
Solove, Daniel J, A Taxonomy of Privacy, University of Pennsylvania Law Review no. 3 (2006).
Strowel, Alain, Internet Piracy as a Wake-up Call for Copyright Law Makers – Is the «Graduated Response» a Good Reply?, WIPO Journal no. 1 (2009).
Strowel, Alain, The «Graduated Response» in France: Is It the Good Reply to Online Copyright Infringements? In: Copyright Enforcement and the Internet, edited by Stamatoudi, Irini, Kluwer Law International, Alphen aan den Rijn (2010).
Michal Czerniawski
Ph.D. researcher, University of Warsaw, Faculty of Law and Administration
Krakowskie Przedmiescie 26/28, 00-927 Warsaw, PL
m.czerniawski@student.uw.edu.pl; http://www.wpia.uw.edu.pl
- 1 Strowel, Alain, Internet Piracy as a Wake-up Call for Copyright Law Makers – Is the «Graduated Response» a Good Reply?, WIPO Journal no. 1, p. 84 (2009).
- 2 Hadopi law (its revised version) and Irish private ordering were validated by courts.
- 3 Following David Lyon, surveillance refers to «the collection and processing of personal data, whether identifiable or not, for the purposes of influencing or managing those whose data have been garnered» Lyon, David, Surveillance Society: Monitoring Everyday Life, p. 2, Open University Press, Philadelphia (2001). Data surveillance «tries to make visible the identities or the behaviours of people of interest to the agency in question» Lyon, David, Editorial. Surveillance Studies: Understanding visibility, mobility and the phenetic fix, Surveillance and Society no. 1, p. 2 (2002).
- 4 Copyright (Infringing File Sharing) Amendment Act, 2011.
- 5 FrenchLoi n°2009-669 du 12 juin 2009 favorisant la diffusion et la protection de la création sur internet, JORF n°0135 du 13 juin 2009 p. 9666, known as «Hadopi law».
- 6 See EMI Records & Ors v. Eircom Ltd. [2010] IEHC 108. Eircom is the first ISP in Europe to voluntarily introduce the graduated response procedure. Under its policy, subscribers who download music illegally can end up losing their Internet connection. The ISP agreed to this solution in order to avoid legal sanctions under a lawsuit brought by the Irish Recorded Music Association.
- 7 Copyright Act of Taiwan, article 90 (2007).
- 8 Copyright Act of South Korea, article 133bis (2007).
- 9 Under section 124G of the Digital Economy Act, the Secretary of State can request OFCOM,an independent regulator and competition authority for the British communications industries, to assess whether technical obligations should be imposed on ISPs. A technical obligation is an obligation to take technical measures against a subscriber that infringes copyright which include suspension of the service provided to a subscriber.
- 10 Lawrence Lessig described the role of ISPs in the Internet using the example of a daydreaming postal worker, who only moves the data and leaves interpretation of the data to the applications at either end – Lessig, Lawrence, Code 2.0, Basic Books, New York, p. 44 (2006). Ralf Bendrath, basing on Lessig’s postal worker example, describes DPI technology as follows: «Imagine a postal worker who is not just daydreaming and moving packets from one point to another in the transportation chain. Imagine the postal worker: opens up all packets and letters, inspects and even reads the content, checks it against databases of illegal material and if finding a match, sends a copy to the police authorities, destroys letters he finds having prohibited or immoral content…», Bendrath, Ralf, Global technology trends and national regulation: Explaining Variation in the Governance of Deep Packet Inspection, http://userpage.fu-berlin.de/~bendrath/Paper_Ralf-Bendrath_DPI_v1-5.pdf, last accessed 20 December 2013 (2009).
- 11 CJEU’s ruling in Case C-70/10 Scarlet Extended SA v Société belge des auteurs, compositeurs et éditeurs SCRL (SABAM). See also Case C -360/10 Belgische Vereniging van Auteurs, Componisten en Uitgevers CVBA (SABAM) v Netlog NV and Case C -461/10 Bonnier Audio AB and Others v Perfect Communication Sweden AB.
- 12 Bridy, Annemarie, Graduated Response and the Turn to Private Ordering In Online Copyright Enforcement, Oregon Law Review no. 89, p. 128 (2010).
- 13 Hadopi law was ultimately revoked by the French Government on 8 July 2013 by Décret n° 2013-596 du 8 juillet 2013 supprimant la peine contraventionnelle complémentaire de suspension de l’accès à un service de communication au public en ligne et relatif aux modalités de transmission des informations prévue à l’article L. 331-21 du code de la propriété intellectuelle, however French government did not resign from a system based on graduated response.
- 14 Patry, William, Moral Panics and the Copyright Wars, Oxford University Press US, Oxford, p. 14 (2009). See also Serbin, Danielle, The Graduated Response: Digital Guillotine or a Reasonable Plan for Combating Online Piracy?, Intellectual Property Brief no. 3, pp. 42-52 (2012).
- 15 The system was introduced as a result of a settlement between the largest ISP in the Ireland, Eircom, and members of the Irish Recorded Music Association (IRMA). According to IRMA, Eircom agreed that it will implement a graduated process in which it will: (i) inform its broadband subscriber that the subscriber’s IP address has been detected infringing copyright; (ii) warn the subscriber that unless the infringement ceases the subscriber will be disconnected; (iii) in default of compliance by the subscriber with the warning it will disconnect the subscriber – see statement of the International Federation of the Phonographic Industry, http://www.ifpi.org/content/section_news/20090129a.html, last accessed 20 December 2013 (2009).
- 16 Bridy, Annemarie, Graduated Response American Style: «Six Strikes» Measured Against Five Norms, Fordham Intellectual Property, Media & Entertainment Law Journal, Vol. 23, No. 1, p. 66 (2012).
- 17 Op.cit., p. 17.
- 18 As Alain Strowel wrote «… solution that would eliminate all piracy, if at all possible, would seem dangerous or at least dubious for both individual liberties and technological innovation», Strowel, Alain, The «Graduated Response» in France: Is It the Good Reply to Online Copyright Infringements? In: Copyright Enforcement and the Internet, edited by Stamatoudi, Irini, Kluwer Law International, Alphen aan den Rijn, p. 160 (2010).
- 19 SeeMeyer, Trisha, and Van Audenhove, Leo, Surveillance and regulating code: an analysis of graduated response in France, Surveillance and Society no. 9, p. 365 (2012).
- 20 The graduated response was also discussed during the Anti-Counterfeiting Trade Agreement (ACTA) negotiations. It seems that initial intention of ACTA’s creators was to include in the agreement provisions allowing the graduated response to be implemented. It, however, did not happen – probably because the European Union expressed its reluctance to include the graduated response in the treaty – Meyer, David, Europe will not accept three strikes in ACTA Treaty, http://www.zdnet.com/europe-will-not-accept-three-strikes-in-acta-treaty-3040057434/ last accessed 20 December 2013 (2010).
- 21 Meyer, Trisha, and Van Audenhove, Leo, op.cit. p. 372.
- 22 See EMI Records (Ireland) Ltd & Ors -v- Eircom Ltd, [2010] IEHC 108 and EMI Records (Ireland) Ltd & Ors -v- The Data Protection Commissioner & Anor, [2012] IEHC 264.
- 23 Solove, Daniel J, A Taxonomy of Privacy, University of Pennsylvania Law Review no. 3, p. 487 (2006).
- 24 Opinion of the European Data Protection Supervisor on the current negotiations by the European Union of an Anti-Counterfeiting Trade Agreement (ACTA) – 2010/C 147/01 adopted on 22 February 2010, at 27 and Opinion of the European Data Protection Supervisor on the proposal for a Council Decision on the Conclusion of the Anti-Counterfeiting Trade Agreement between the European Union and its Member States, Australia, Canada, Japan, the Republic of Korea, the United Mexican States, the Kingdom of Morocco, New Zealand, the Republic of Singapore, the Swiss Confederation and the United States of America – 2012/C 215/08 adopted on 24 April 2012, at 19.
- 25 Article 29 Working Party, Working document on data protection issues related to intellectual property rights (WP 104) adopted on 18 January 2005.
- 26 The need of establishing a fair balance between these two rights was mentioned in the CJEU’s ruling in Case 275/06 Promusicae v. Telefonica de Espana.
- 27 Opinion of the European Data Protection Supervisor on the current negotiations by the European Union of an Anti-Counterfeiting Trade Agreement (ACTA) – 2010/C 147/01 adopted on 22 February 2010, at 37.
- 28 Directive2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002/22/EC on universal service and users’ rights relating to electronic communications networks and services, Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No 2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws.
- 29 Article 21.4 (a) of the Directive 2009/136/EC.
- 30 According to Michael Geist «As privacy advocates began to react to the gradual deterioration of privacy protections in the name of security, they realized that it was necessary to promote a policy agenda that sought to protect both privacy and security. With a similar trend emerging in the intellectual property field, the privacy community must consider how it can promote a balanced approach that ensures respect for both intellectual property rights and personal privacy», Geist, Michael, Web privacy vs. identifying infringers, Toronto Star, http://www.michaelgeist.ca/resc/html_bkup/oct62003.html last accessed 20 December 2013 (2003).
- 31 New Zealand’s Office of the Minister of Commerce, Cabinet Economic Growth and Infrastructure Committee, Illegal Peer-to-Peer File Sharing, at 29.
- 32 Notice-and-notice system shall be soon implemented in Canada on the basis of Bill C-11 (Copyright Modernization Act), the copyright reform bill enacted in June 2012.
- 33 According to Karaganis, Joe, and Renkema, Lennart, Copy Culture in the US & Germany, pp. 45-46 (2013), who analysed situation in Germany, due to various other factors, such as free streaming services, it is unclear how notifications affect illegal music downloading. On the other hand, Michael Geist stated that the data reported by Rogers (Canadian ISP) shows that «67% of recipients (…) do not repeat infringe after receiving a notice and 89% cease allegedly infringing activity after a second notice», Geist, Michael, Rogers Provides New Evidence on Effectiveness of Notice-and-Notice System, http://www.michaelgeist.ca/content/view/5703/125/ last accessed 20 December 2013 (2011).
- 34 Opinion of the European Data Protection Supervisor on the current negotiations by the European Union of an Anti-Counterfeiting Trade Agreement (ACTA) – 2010/C 147/01, at 43.
- 35 With a single exception – see supra note 32.