18.11.2014 Views

1oz61wa

1oz61wa

1oz61wa

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5<br />

While ISP blocking activities have been fairly limited in the United States to date, blocking and<br />

filtering has been widely attempted and, in some cases, court ordered in various European countries.<br />

76 In both the United States and Europe, many critics of the blocking/filtering approach<br />

contend that serial infringers understand the technology being employed and can easily evade<br />

these measures. 77 Further, many critics contend that filtering/blocking measures often end up<br />

preventing access to legal, non-infringing content. 78 It bears noting that blocking measures were<br />

debated in the U.S. Congress prior to the January 2012 Internet Blackouts that nominally protested<br />

the inclusion of DNS blocking mechanisms. 79<br />

(4) Hybrid Approaches (Educational Initiatives)<br />

Given the widespread nature of online piracy and the inherent weakness of individual approaches<br />

to combating such unlawful conduct, the focus in both the United States and other international<br />

jurisdictions has turned to the creation and implementation of hybrid enforcement programs. These<br />

programs typically consist of a number of steps, whereby an Internet user is first provided with a<br />

series of alerts if they access or share infringing content. The intent is to educate Internet users<br />

about what constitutes copyright infringement and how it negatively impacts others and the<br />

economy.<br />

The main example in the United States is the recently-launched U.S. Copyright Alert System 80 (also<br />

called a “Stepped Enforcement Approach”). This program was launched in early March 2013 to<br />

help consumers understand illegal distribution through peer-to-peer (“P2P”) networks and educate<br />

them about unlawful content sources. It is the result of voluntary cross-industry cooperation<br />

between the 5 major U.S. Internet access providers (e.g. Comcast, Verizon) and the music/film/TV<br />

content creator industry (e.g. RIAA, MPAA, IFTA, A2IM). 81 It represents a mutual recognition that<br />

such cooperation is necessary “to prevent, detect, and deter Online Infringement.” 82 The Copyright<br />

Alert System sets up a framework for an enhanced education, notice, and enforcement program<br />

which entails a multi-step process 83 of progressive alerts to ISP subscribers whose IP addresses are<br />

discovered to be engaged in infringing activities on P2P networks and mitigation measures for<br />

repeat infringers, with a clear focus on educating users and changing consumer behavior.<br />

It also gives ISP providers a range of mitigation measures (e.g. temporary reduction in Internet<br />

speed, temporary restriction of Internet access, etc.) and a high degree of flexibility and autonomy<br />

in selecting mitigation measures. 84<br />

2. Voluntary Best Practices in the U.S.<br />

While Internet intermediaries 85 are not required by law to take the initiative to uncover instances of<br />

infringement or counterfeiting, or to decrease the use of their services by infringers, several have<br />

developed sets of “best practices” to decrease the prevalence of this conduct using their services.<br />

a) Payment Processors<br />

Because of low barriers to entry, ease of operations, decreased risk of identification and criminal<br />

prosecution, and limited effectiveness of civil IP enforcement, the Internet provides PFWs a targetrich<br />

environment for profiteering from illegal sales and distribution of copyrighted and trademarked<br />

goods. 86 PFWs that sell counterfeit products or offer subscriptions to access infringing<br />

content (on a streaming or downloading basis) rely on legitimate payment processors to conduct<br />

their illegal sales transactions. These credible payment processors lend an air of legitimacy to<br />

PFWs and may dupe unsuspecting consumers into purchasing counterfeit goods or paying for<br />

access to pirated content while costing the U.S. billions in lost revenue. 87<br />

74

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!