Challenges for Copyright by ICT: Internet Service Providers ISPs (Internet Service Providers) (and to a certain extent also telecom operators) are involved in the copyright debate primarily because of their role in the transmission and storage of digital information. Problems arise particularly concerning Caching Caching it is argued could cause damage because the copies in the cache are not necessarily the most current ones and the delivery of outdated information to users could deprive website operators of accurate "hit" information (information about the number of requests for a particular material on a website) from which advertising revenue is frequently calculated. Similarly harms such as defamation or infringement that existed on the original page may propagate for years until flushed from each cache where they have been replicated. Although different concepts, similar issues to caching arise with mirroring (establishing an identical copy of a website on a different server), archiving (providing a historical repository for information, such as with newsgroups and mailing lists), and full-text indexing (the copying of a document for loading into a full-text or nearly full-text database which is searchable for keywords or concepts). Under a literal reading of some copyright laws caching constitutes an infringement of copyright. Yet recent legislation like the Information Residing on Systems or Networks at the Direction of Users ISPs may be confronted with problems if infringing material on websites (of users) is hosted on their systems. Although some copyright laws like the DMCA provide for limitations on the liability of ISPs if certain conditions are met, it is yet unclear if ISPs should generally be accountable for the storage of infringing material (even if they do not have actual knowledge) or exceptions be established under specific circumstances. Transitory Communication In the course of transmitting digital information from one point on a network to another ISPs act as a data conduit. If a user requests information ISPs engage in the transmission, providing of a connection, or routing thereof. In the case of a person sending infringing material over a network, and the ISP merely providing facilities for the transmission it is widely held that they should not be liable for infringement. Yet some copyright laws like the DMCA provide for a limitation (which also covers the intermediate and transient copies that are made automatically in the operation of a network) of liability only if the ISPs activities meet certain conditions. For more information on copyright ( Harrington, Mark E.: On-line Copyright Infringement Liability for Internet Service Providers: Context, Cases & Recently Enacted Legislation. In: Teran, G.: | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Another voluntary Disinformation A very different form of voluntary disinformation are the calls for donations. Donations offer the possibility to do something good, to help the poor. Afterwards one does no longer have to feel guilty for being luckier than those "others". The same pictures of starving and desperate children for decades, of starving babies with big sad eyes. The pictures show a terrible life. But the idea that contributing money would change the destiny of those children and other people is a lie. States use their population for paying money to make the states' policy less unjust. In fact the money of the Western donators perpetuates the dependence and because of this prolongs the misery into a vicious circle of disinformation on both sides, but it is clever to have one's people believing that they can change the world. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
History: European Tradition Only in Roman times the first rights referring to artistic works appeared. Regulations resembling a lasting exclusive right to copy did not occur until the 17th century. Before copyright was a private arrangement between guilds able to reproduce copies in commercial quantities. In France and Western European countries "droits d'auteur" or author's rights is the core of what in the Anglo-American tradition is called copyright. Such rights are rooted in the republican revolution of the late 18th century, and the Rights of Man movement. Today in the European system the creator is front and center; later exploiters are only secondary players. France During the 18th century France gradually lost the ability to restrict In 1777 the King threatened the monopoly by reducing the duration of publisher's privileges to the lifetime of the authors. Accordingly a writer's work would go into the public domain after his death and could be printed by anyone. The booksellers fought back by argumenting that, no authority could take their property from them and give it to someone else. Seven months later, in August 1789, the revolutionary government ended the privilege system and from that time on anyone could print anything. Early in 1790 Marie-Jean-Antoine-Nicolas de Caritat, Marquis de Condorcet proposed giving authors power over their own work lasting until ten years after their deaths. The proposal - the basis for France's first modern copyright law - passed in 1793. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Credibility The magic word is credibility. Disinformation can mean leaving out important informations. Telling lies is not the only method of disinformation. The not telling also creates thoughts and delegates them into certain directions, whereas other models of thinking are left out. Like this, the deaths on the own side are adjusted downwards whereas the victims of the enemy are counted proudly - as long as they are not civilians. The post-Gulf War period demonstrated how the population reacts if the number of innocent victims is much higher than expected. It was the fact of those numbers that provoked the biggest part of the post-war critique. The media in democratic states tend to criticize this, which does not mean that they always want to be free of governmental influence. They can choose to help the government in a single case by not writing anything against it or by writing pro-government stories. At the same time every democracy has undemocratic parts in it - which is already part of democracy itself. There are situations when a democratic government may find it essential to put pressure on the media to inform the population in a certain way; and also censorship is nothing that can only be connected to dictatorship; just think of the Falkland War, the Gulf-War or the Kosovo-War. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
The Piracy "Industry" Until recent years, the problem of piracy (the unauthorized reproduction or distribution of copyrighted works (for commercial purposes)) was largely confined to the copying and physical distribution of tapes, disks and CDs. Yet the emergence and increased use of global data networks and the WWW has added a new dimension to the piracy of This new development, often referred to as Internet piracy, broadly relates to the use of global data networks to 1) transmit and download digitized copies of pirated works, 2) advertise and market pirated intellectual property that is delivered on physical media through the mails or other traditional means, and 3) offer and transmit codes or other technologies which can be used to circumvent Lately the Table: IIPA 1998 - 1999 Estimated Trade Loss due to Copyright Piracy (in millions of US$)
| |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Intellectual Property: A Definition Intellectual property, very generally, relates to the output, which result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches: 1) Industrial Property a) b) c) d) Unfair competition (trade secrets) e) Geographical indications (indications of source and appellations of origin) 2) Copyright The protection of intellectual property is guaranteed through a variety of laws, which grant the creators of intellectual goods, and services certain time-limited rights to control the use made of their products. Those rights apply to the intellectual creation as such, and not to the physical object in which the work may be embodied. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Legal Protection: WIPO (World Intellectual Property Organization) Presumably the major player in the field of international Information on WIPO administered agreements in the field of industrial property (Paris Convention for the Protection of Industrial Property (1883), Madrid Agreement Concerning the International Registration of Marks (1891) etc.) can be found on: Information on treaties concerning copyright and neighboring rights (Berne Convention for the Protection of Literary and Artistic Works (1886) etc.) is published on: The most recent multilateral agreement on copyright is the 1996 WIPO Copyright Treaty. Among other things it provides that computer programs are protected as literary works and also introduces the protection of databases, which "... by reason of the selection or arrangement of their content constitute intellectual creations." Furthermore the | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Legal Protection: European Union Within the EU's goal of establishing a European single market also An overview of EU activities relating to intellectual property protection is available on the website of the European Commission (DG Internal Market): | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Copyright Management and Control Systems: Post-Infringement Steganography Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store Agents Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses. Copyright Litigation While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
The Copyright Industry Copyright is not only about protecting the rights of creators, but has also become a major branch of industry with significant contributions to the global economy. According to the In an age where knowledge and information become more and more important and with the advancement of new technologies, transmission systems and distribution channels a further increase in the production of | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
1900 - 2000 A.D. 1904 First broadcast talk 1918 Invention of the short-wave radio 1929 Invention of television in Germany and Russia 1941 Invention of microwave transmission 1946 Long-distance coaxial cable systems and mobile telephone services are introduced in the USA. 1957 First data transmissions over regular phone circuits. At the beginning of the story of today's global data networks is the story of the development of In 1955 President Eisenhower announced the USA's intention to launch a satellite. But it in the end it was the Soviet Union, which launched the first satellite in 1957: Sputnik I. After Sputnik's launch it became evident that the Cold War was also a race for leadership in the application of state-of-the-art technology to defense. As the US Department of Defense encouraged the formation of high-tech companies, it laid the ground to Silicon Valley, the hot spot of the world's computer industry. The same year as the USA launched their first satellite - Explorer I - data was transmitted over regular phone circuits for the first time, thus laying the ground for today's global data networks. Today's satellites may record weather data, scan the planet with powerful cameras, offer global positioning and monitoring services, and relay high-speed data transmissions. Yet up to now, most satellites are designed for military purposes such as reconnaissance. 1969 ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. An experimental network it mainly served the purpose of testing the feasibility of In 1969 ARPANET went online and linked the first two computers, one located at the University of California, Los Angeles, the other at the Stanford Research Institute. Yet ARPAnet did not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972. Before it was decommissioned in 1990, In the USA it was already in 1994 that commercial users outnumbered military and academic users. Despite the rapid growth of the Net, most computers linked to it are still located in the United States. 1971 Invention of 1979 Introduction of 1992 Launch of the | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
1996 WIPO Copyright Treaty (WCT) The 1996 | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Invention According to the | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
WIPO The World Intellectual Property Organization is one of the specialized agencies of the United Nations (UN), which was designed to promote the worldwide protection of both industrial property (inventions, trademarks, and designs) and copyrighted materials (literary, musical, photographic, and other artistic works). It was established by a convention signed in Stockholm in 1967 and came into force in 1970. The aims of WIPO are threefold. Through international cooperation, WIPO promotes the protection of intellectual property. Secondly, the organization supervises administrative cooperation between the Paris, Berne, and other intellectual unions regarding agreements on trademarks, patents, and the protection of artistic and literary work and thirdly through its registration activities the WIPO provides direct services to applicants for, or owners of, industrial property rights. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
DMCA The DMCA (Digital Millennium Copyright Act) was signed into law by U.S. President Clinton in 1998 and implements the two 1996 | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
RIPE The RIPE Network Coordination Centre (RIPE NCC) is one of three Regional Internet Registries (RIR), which exist in the world today, providing allocation and registration services which support the operation of the Internet globally, mainly the allocation of http://www.ripe.net | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Bandwidth The bandwidth of a transmitted communications signal is a measure of the range of frequencies the signal occupies. The term is also used in reference to the frequency-response characteristics of a communications receiving system. All transmitted signals, whether analog or digital, have a certain bandwidth. The same is true of receiving systems. Generally speaking, bandwidth is directly proportional to the amount of data transmitted or received per unit time. In a qualitative sense, bandwidth is proportional to the complexity of the data for a given level of system performance. For example, it takes more bandwidth to download a photograph in one second than it takes to download a page of text in one second. Large sound files, computer programs, and animated videos require still more bandwidth for acceptable system performance. Virtual reality (VR) and full-length three-dimensional audio/visual presentations require the most bandwidth of all. In digital systems, bandwidth is data speed in bits per second (bps). Source: Whatis.com | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
NATO The North Atlantic Treaty was signed in Washington on 4 April 1949, creating NATO (= North Atlantic Treaty Organization). It was an alliance of 12 independent nations, originally committed to each other's defense. Between 1952 and 1982 four more members were welcomed and in 1999, the first ex-members of | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Neighboring rights Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Industrial design Industrial design refers to the ornamental aspect of a useful article which may constitute of two or three-dimensional elements. To be qualified for | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Economic rights The economic rights (besides | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Proxy Servers A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that security, administrative control, and caching service can be ensured. A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own Source: Whatis.com | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Java Applets Java applets are small programs that can be sent along with a Web page to a user. Java applets can perform interactive animations, immediate calculations, or other simple tasks without having to send a user request back to the server. They are written in Java, a platform-independent computer language, which was invented by Source: Whatis.com | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Barnes and Noble Massive online retail bookstore housing more than a million titles. Includes a book recommendation "personalizer,", a comprehensive list of The New York Times bestsellers, a "live" community events calendar with a daily survey and several forums, "highlighted" books from 19 subject areas, browsable categories such as antiques, ethnic studies, and pop culture, Books in the News, and weekly features such as reviews, excerpts, recommendations, interviews, events, "roundups" of popular titles, and quizzes. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||