图书介绍

Copyright Enforcement and the Internet2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

Copyright Enforcement and the Internet
  • 出版社: Aspen Publications
  • ISBN:9789041133465;9041133461
  • 出版时间:2010
  • 标注页数:354页
  • 文件大小:17MB
  • 文件页数:371页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

Copyright Enforcement and the InternetPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Part Ⅰ European Union and International Policies1

Part Ⅰ The EU Enforcement Directive 2004/48/EC as a Tool for Copyright Enforcement&Jorg Reinbothe3

Ⅰ. Introduction: The Background for the EU Enforcement Directive3

A. Enforcement Legislation in the Context of EU Harmonization and the Fight against Piracy3

B. Enforcement in the WIPO Conventions and in the TRIPs Agreement4

C. External and Internal Enforcement: The Layers of Regulatory Measures5

D. The Enforcement Directive in the Context of the Acquis Communautaire6

1. The Rationale for Horizontal Enforcement Legislation in the EU7

2. Gaps in Enforcement Rules8

3. The Accession of Ten New Member States Created a Momentum8

E. Preparatory Steps Undertaken by the European Commission8

F. The Main Objectives of the Enforcement Directive9

Ⅱ. The Directive 2004/48/EC on the Enforcement of Intellectual Property Rights in Detail9

A. From the Commission Proposal to the Adoption of the Directive9

B. The Contents of the Enforcement Directive10

1. The Structure of the Directive as Adopted10

2. Subject Matter and Scope (Articles 1 and 2)11

3. General Obligation (Article 3)13

4. Beneficiaries of Sanctions and Remedies ('Persons Entitled to Apply for the Application of the Measures, Procedures and Remedies'), Article 413

5. Presumption of Authorship or Ownership (Article 5)14

6. Evidence (Articles 6 and 7)14

7. Right of Information (Article 8)15

8. Provisional and Precautionary Measures (Article 9)17

9. Sanctions: Corrective Measures (Article 10)18

10. Sanctions: Injunctions (Article 11)18

11. Sanctions: Alternative Measures (Article 12)19

12. Sanctions: Damages (Article 13)19

13. Legal Costs (Article 14), Publication of Judicial Decisions (Article 15)20

14. 'Sanctions by Member States': Criminal Sanctions (Article 16)21

15. Codes of Conduct (Article 17) 22

16. Assessment (Article 18)23

17. Exchange of Information and Correspondents (Article 19)23

Ⅲ. Summary and Evaluation of the Enforcement Directive23

Ⅳ. The Way Forward24

A. Piracy as a Continuing Threat24

B. Other Initiatives Taken since 200424

C. Conclusion on the Perspectives27

Part Ⅰ Where Is ACTA Taking Us? Policies and Politics&Luc Pierre Devigne, Pedro Velasco-Martins & Alexandra lliopoulou29

Ⅰ. Counterfeiting and Piracy Keep Increasing: The Problem and Its Dimensions29

Ⅱ. Fighting against Counterfeiting and Piracy from the EU Perspective30

A. Protecting IPR Worldwide Is a Key Trade Priority30

B. The Current Legal Framework for IP Enforcement in the EU31

Ⅲ. The Anti-Counterfeiting Trade Agreement33

A. Why Do We Need a New International Agreement on IP Enforcement?33

B. The Launch of Negotiations on the ACTA34

C. The Three Pillars of ACTA35

1. International Cooperation between Enforcement Authorities35

2. Adoption of Best Practices35

3. Improved Legal Framework on IPR Enforcement36

a. Civil Enforcement37

b. Border Measures37

c. Criminal Enforcement38

d. Special Requirements Related to Rights Management Technology and the Internet39

Ⅳ. The ACTA Negotiating Process39

A. Transparency39

Ⅴ. Next Step of the ACTA Negotiations40

Ⅵ. Conclusion41

Part Ⅰ Copyright Enforcement in the Digital Era and Private International Law Issues&Paul L.C. Torremans43

Ⅰ. Introduction43

Ⅱ. Right and Contract44

A. The Distinction44

B. Transferability45

C. Entitlement47

Ⅲ. The Law Applicable to the Copyright Contract54

A. The Law is Chosen by the Parties55

B. The Applicable Law in the Absence of Choice55

C. Article 4 Rome I Regulation Applied in Practice57

D. Interim Conclusion61

Ⅳ. Respect for National Copyright and Copyright Contract Law?962

Ⅴ. Conclusion63

Part Ⅰ The Global System of Copyright Enforcement: Regulations, Policies and Politics&Michael D. Taylor65

Ⅰ. Introduction65

Ⅱ. Multilateral Level68

A. The World Intellectual Property Organization (WIPO)68

Ⅲ. The World Trade Organization: TRIPs Agreement72

Ⅳ. The World Customs Organization75

Ⅴ. Interpol77

Ⅵ. The Group of Eight78

Ⅶ. Multilateral Level81

A. The Anti-Counterfeiting Trade Agreement81

Ⅷ. Regional Level89

A. The European Union89

B. EC Regulation 1383/200389

C. Directive 2004/48/EC (IPRED)90

D. A Proposed Directive on Criminal Measures (IPRED2)91

E. The NAFTA92

F. The Asia-Pacific Economic Cooperation (APEC)94

G. The Association of South East Asian Nations (ASEAN)96

H. The European Free Trade Association97

Ⅸ. Bilateral Level97

A. Preferential Trade and Investment Agreements (PTIAs)97

B. FTAs: US98

C. FTAs: EU101

D. FTAs: EFTA103

E. Bilateral Investment Treaties104

F. Bilateral IP Instruments105

1. US-EU IPR Working Group105

2. EU-US Action Strategy for the Enforcement of IPRs106

3. US-China106

a. The MOU on the Protection of Intellectual Property106

4. US-China Joint Commission on Commerce and Trade107

5. Industry and Government Cooperation108

6. Industry Initiatives108

Ⅹ. Recommendations and Conclusion110

Part Ⅱ The Role of Internet Service Providers117

Part Ⅱ File-Sharing and the Role of Intermediaries in the Marketplace: National, European Union and International Developments&Maria Mercedes Frabboni119

Ⅰ. Introduction119

Ⅱ. Intermediaries: Access Providers and Platform Providers121

Ⅲ. The Problem from an Economic Perspective123

A. The Copyright Framework: Exclusiveness and Its Boundaries123

B. Effects125

Ⅳ. Regulation126

A. Copyright: International and Regional Answers to Internet-Based Activities126

B. Rules on E-Commerce and Their Applicability to Intermediaries128

Ⅴ. The Role of Intermediaries in the Individuals' Exercise of Fundamental Rights and Freedoms130

A. Promusicae v. Telefdnica130

1. Delivery of Information Concerning Internet Traffic130

2. Fundamental Rights: Property versus Privacy132

B. Negotiated Solutions and Administrative Enforcement133

1. United Kingdom: the Potential for a Voluntary Code of Practice133

2. The 'Warning and Termination' Approach: Examples of National Implementation136

3. Comment138

Ⅵ. Platforms Providers139

A. Platforms and Infringement: Different Implications of Different Technologies140

B. Pirate Bay141

1. The Decision142

2. Policy Comment144

Ⅶ. Comments and Conclusion145

Part Ⅱ The 'Graduated Response' in France: Is It the Good Reply to Online Copyright Infringements?&Alain Strowel147

Ⅰ. The French Laws on the 'Graduated Response"148

A. The 'Graduated Response' in a Nutshell149

B. Data Protection Issues151

C. A New Monitoring Obligation at the Core of the 'Graduated Response'152

D. Cooperation of Access Providers152

Ⅱ. Comparison between the 'Graduated Response' and Other Internet-Related Enforcement Systems155

Ⅲ. Internet Access is a Fundamental Right Rooted in the Freedom of Expression154

A. Freedom of Expression Protects Internet Access155

B. The Right to Access the Internet, as Protected by Freedom of Expression, Can Be Limited156

Ⅳ. A Few Concluding Remarks on the 'Graduated Response'158

A. Is the 'Graduated Response' a New Form of Access Control?158

B. Is the 'Graduated Response' a Workable Reply that Can Become the Norm?159

Part Ⅱ The Chase: The French Insight into the 'Three Strikes' System&Valerie-Laure Benabou163

Ⅰ. The Prey: The Partial Failure of Other Solutions against Wild P2P164

A. Locking P2P 'Upstream' by Technical Means164

B. Middlestream Approach with Reluctant Intermediaries165

1. Offensive Strategy against File-Sharing Software Industry165

2. Cooperative Strategy with Internet Service Providers166

C. Downstream Strategy: Targeting the Public168

Ⅱ. The Trap: Mechanism of the French Law170

A. Duty to Ensure that Access Is Not Used for Copyright Infringement: Duty to Monitor the Connection171

B. Detection and Warnings Sent to the Subscriber173

C. Suspension of Internet Access and Others Sanctions175

Ⅲ. Tally?179

Part Ⅱ User-Generated Content Sites and Section 512 of the US Copyright Act&Jane C. Ginsburg183

Ⅰ. Introduction183

Ⅱ. The Statutory Notice-and-Take-Down Safe Harbour186

A. 'Service Provider'187

B. 'Storage at the Direction of a User'188

C. Statutory Conditions for Limitation on Liability: Knowledge or Awareness190

D. Statutory Conditions for Limitation on Liability: Direct Financial Benefit193

E. Statutory Conditions for Limitation on Liability: Right and Ability to Control Infringing Activity196

Ⅲ. Conclusion197

Part Ⅱ Data Protection, Secrecy of Communications and Copyright: Conflicts and Convergences - The Example of Promusicae v. Telefonica&Irini A. Stamatoudi199

Ⅰ. Introduction199

Ⅱ. ISPs, IP Addresses and File Sharing201

Ⅲ. The Example of Promusicae v. Telefonica204

A. Historical Background204

B. Relevant Legal Provisions205

C. Outcome and Open Questions213

D. Conclusions221

Ⅳ. National Experiences223

Ⅴ. Conclusions231

Part Ⅱ Criminal Liability on the Internet&Dimitris Kioupis233

Ⅰ. Introduction: Old Problems and Modern Developments233

Ⅱ. Copyright Infringement and Criminal Liability237

A. Criminal Acts Committed through P2P Networks241

B. Third-Party Criminal Liability243

C. Collecting Digital Evidence249

Ⅲ. Conclusion253

Part Ⅲ New Models and Alternative Solutions255

Part Ⅲ Protection of 'DRM' under the WIPO 'Internet Treaties': Interpretation, Implementation and Application&Dr Mihaly Ficsor257

Ⅰ. Introduction257

Ⅱ. The Provisions of the Internet Treaties on the Two Constituting Elements of DRM Systems (TPMS and RMI) and the Key Issues of Their Interpretation, Implementation and Application258

A. Introductory Remarks258

B. Technological Protection Measures (TPMs)258

1. Treaty Provisions on TPMs258

2. '[A]dequate legal protection…against…circumvention': The Treaty Obligations Extend to Provide Protection against 'Preparatory Acts'259

3. '[T]echnological measures that are used…in connection with…exercise of rights… and that restrict acts': The Treaty Obligations to Provide Adequate Protection Cover both 'Access-Control' and 'Copy-Control' TPMs264

4. '[T]echnological measures that are used by [authors] [performers or producers of phonograms]':The Treaty Obligations also Cover TPMs Applied by Successors in Title and Licensees of Authors, Performers and Producers of Phonograms, Respectively268

5. '[E]ffective Technological Measures': Infallibility Is Not a Criterion of Effectiveness270

6. '[I]n Connection with the Exercise of Their Rights…and That Restricts Acts…Which Are Not Authorized by [the Authors] [the Performers or the Producers of Phonograms] Concerned': The Treaty Obligations to Provide Adequate Protection against Circumvention Are Not Reduced to Acts Linked to Infringements; at the Same Time, They Do Not Result in a New 'Access Right' Alien to the Copyright Paradigm281

7. '[I]n connection with the exercise of their rights…and that restrict acts…which are not…permitted by law': It Is Necessary (and Possible) to Establish Adequate Balance between the Protection of TPMs and the Applicability of Exceptions and Limitations287

8. '[T]echnological measures that are used by [authors][performers or producers of phonograms] in connection with the exercise of their rights [under this Treaty or the Berne Convention] [under this Treaty] and that restrict acts, in respect of their [works][performances or phonograms]': The Anticircumvention Provisions Do Not Apply to Productions Not Qualifying as Works, Performances or Phonograms neither to Those that Are in the Public Domain293

9. 'Effective legal remedies': The Same Kinds of Remedies Are Needed as in the Case of Infringements and, in Respect of Commercial 'Preparatory Acts', as in the Case of Piracy on a Commercial Scale296

C. Rights Management Information (RMI)297

1. Treaty Provisions on RMI; Their Interpretation and Implementation297

2. Application of RMI as Part of DRM Systems along with TPMs or Alone299

Ⅲ. Conclusions300

Part Ⅲ Codes of Conduct and Copyright Enforcement in Cyberspace&P. Bernt Hugenholtz303

Ⅰ. Introduction303

Ⅱ. Typology of Self-regulation304

A. Advantages and Disadvantages of Self-regulation306

B. Legal Nature and Normative Effect of Codes of Conduct308

C. Self-regulation in Cyberspace309

Ⅲ. Background Copyright Law311

Ⅳ. Codes of Conduct on Copyright Enforcement314

A. An Assortment of Codes314

B. Assessment316

Ⅴ. Conclusions319

Part Ⅲ Vox Pop: Public Participation in Canadian Copyright Law&Ysolde Gendreau321

Ⅰ. Judicial or Quasi-judicial Process322

Ⅱ. Legislative Amendments326

Bibliography331

Index343

热门推荐