1oz61wa
1oz61wa
1oz61wa
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Voluntary Action<br />
various ISPs and marketplace providers are almost constantly updating and refining these forms,<br />
and thus their procedures can differ from visit to visit, and their average response times can vary.<br />
b) Restrictions on Internet Access and Hybrid Approaches<br />
In addition to online forms and procedures for removing infringing content, many proposed<br />
industry initiatives have focused on ways to block Internet access to such content and/or suspend<br />
Internet privileges altogether for their subscribers who repeatedly engage in infringing activity<br />
online based on terms and conditions governing user participation in that site. 62 A broad spectrum<br />
of such restrictions, ranging from traffic shaping to blocking to outright suspension of Internet<br />
access, have been proposed and even implemented in some cases. 63 Most of these strategies only<br />
target copyright infringement at this time, and do not expressly address trademark infringement<br />
issues. Noteworthy restriction strategies can be summarized as follows:<br />
(1) Suspension<br />
Suspension is a severe remedy imposed by an ISP directly. If an ISP identifies an Internet subscriber<br />
who engages conduct that violates its terms and conditions, including for instance, engaging in<br />
infringing activity, that ISP may alert the subscriber of his/her unauthorized conduct and suspend<br />
that subscriber’s Internet connection to access the Internet for a set period of time. 64 Some ISPs,<br />
such as Qwest, have been employing the suspension strategy for repeat copyright infringers for<br />
several years. 65 Such ISPs have generally only suspended Internet service in instances where a<br />
repeat infringer has been identified, notified of its noncompliance and yet continues to abuse the<br />
service. 66<br />
(2) Traffic Shaping<br />
Traffic shaping, also sometimes referred to as “throttling,” 67 occurs when an ISP reduces the<br />
bandwidth provided to an Internet user. 68 If an ISP receives notice or otherwise becomes aware of<br />
infringing activity, it can engage in traffic blocking to effectively reduce the speed or the volume<br />
of traffic of the user at issue. 69 This strategy has been employed to varying degrees by a wide array<br />
of parties over the last decade, including by many universities seeking to reduce the amount of<br />
illegal file-sharing by students. 70<br />
(3) Content Identification, Blocking and Filtering<br />
Blocking and filtering are processes used by ISPs to restrict Internet users from accessing websites<br />
that contain infringing content. 71 ISPs accomplish this by using protocols (e.g. P2P), ports, and<br />
various software programs to identify infringing content and prevent users from accessing, posting<br />
and/or otherwise sharing such content. 72<br />
A number of user-generated content (“UGC”) sites in particular employ content identification and<br />
filtering to proactively prevent infringements from occurring and/or recurring on their platforms.<br />
YouTube, Dailymotion, and Youku for instance utilize their own proprietary or licensed content<br />
recognition technology to filter videos posted by users upon upload and to block copyrighted<br />
content that is not authorized by the copyright owner from being published to those sites. 73<br />
YouTube’s content filter is used by more than 4,000 media companies and has identified more than<br />
200 million copyrighted videos. 74 It seems a number of major UGC sites recognize that by sharing<br />
in the burden of monitoring for infringements they help “to foster an online environment that<br />
promotes the promises and benefits of UGC Services and protects the rights of Copyright Owners,”<br />
to “strike a balance that, on a going-forward basis, will result in a more robust, content-rich online<br />
experience for all,” thus serving UGC sites’ own business interests. 75 These same content recognition<br />
technologies also power the authorized monetization of copyrighted content on UGC sites.<br />
73