18.11.2014 Views

1oz61wa

1oz61wa

1oz61wa

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Voluntary Action<br />

various ISPs and marketplace providers are almost constantly updating and refining these forms,<br />

and thus their procedures can differ from visit to visit, and their average response times can vary.<br />

b) Restrictions on Internet Access and Hybrid Approaches<br />

In addition to online forms and procedures for removing infringing content, many proposed<br />

industry initiatives have focused on ways to block Internet access to such content and/or suspend<br />

Internet privileges altogether for their subscribers who repeatedly engage in infringing activity<br />

online based on terms and conditions governing user participation in that site. 62 A broad spectrum<br />

of such restrictions, ranging from traffic shaping to blocking to outright suspension of Internet<br />

access, have been proposed and even implemented in some cases. 63 Most of these strategies only<br />

target copyright infringement at this time, and do not expressly address trademark infringement<br />

issues. Noteworthy restriction strategies can be summarized as follows:<br />

(1) Suspension<br />

Suspension is a severe remedy imposed by an ISP directly. If an ISP identifies an Internet subscriber<br />

who engages conduct that violates its terms and conditions, including for instance, engaging in<br />

infringing activity, that ISP may alert the subscriber of his/her unauthorized conduct and suspend<br />

that subscriber’s Internet connection to access the Internet for a set period of time. 64 Some ISPs,<br />

such as Qwest, have been employing the suspension strategy for repeat copyright infringers for<br />

several years. 65 Such ISPs have generally only suspended Internet service in instances where a<br />

repeat infringer has been identified, notified of its noncompliance and yet continues to abuse the<br />

service. 66<br />

(2) Traffic Shaping<br />

Traffic shaping, also sometimes referred to as “throttling,” 67 occurs when an ISP reduces the<br />

bandwidth provided to an Internet user. 68 If an ISP receives notice or otherwise becomes aware of<br />

infringing activity, it can engage in traffic blocking to effectively reduce the speed or the volume<br />

of traffic of the user at issue. 69 This strategy has been employed to varying degrees by a wide array<br />

of parties over the last decade, including by many universities seeking to reduce the amount of<br />

illegal file-sharing by students. 70<br />

(3) Content Identification, Blocking and Filtering<br />

Blocking and filtering are processes used by ISPs to restrict Internet users from accessing websites<br />

that contain infringing content. 71 ISPs accomplish this by using protocols (e.g. P2P), ports, and<br />

various software programs to identify infringing content and prevent users from accessing, posting<br />

and/or otherwise sharing such content. 72<br />

A number of user-generated content (“UGC”) sites in particular employ content identification and<br />

filtering to proactively prevent infringements from occurring and/or recurring on their platforms.<br />

YouTube, Dailymotion, and Youku for instance utilize their own proprietary or licensed content<br />

recognition technology to filter videos posted by users upon upload and to block copyrighted<br />

content that is not authorized by the copyright owner from being published to those sites. 73<br />

YouTube’s content filter is used by more than 4,000 media companies and has identified more than<br />

200 million copyrighted videos. 74 It seems a number of major UGC sites recognize that by sharing<br />

in the burden of monitoring for infringements they help “to foster an online environment that<br />

promotes the promises and benefits of UGC Services and protects the rights of Copyright Owners,”<br />

to “strike a balance that, on a going-forward basis, will result in a more robust, content-rich online<br />

experience for all,” thus serving UGC sites’ own business interests. 75 These same content recognition<br />

technologies also power the authorized monetization of copyrighted content on UGC sites.<br />

73

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!