SlideShare ist ein Scribd-Unternehmen logo
1 von 31
3 Legal Mechanisms for
Sharing Data
Sarah Hinchliff Pearson
Senior Counsel, Creative Commons
12.14.11
What I am not going to
         do:
    1. convince you to share
    data
    2. argue in favor of certain
    mechanisms
What I am going to do:

    1. assume you want to share
    data
    2. explain legal realities objectively
3 legal mechanisms
1. contracts
2. public licenses
3. waivers
doing nothing ≠ option
©
© = automatic
©   covers expression
© = exclusivity
© has limits
       ≠ facts
       = fair use
doing nothing = all rights
       reserved
3 legal mechanisms
1. contracts
contracts
benefits
   1. control
contracts
risks
    1. perfect control impossible
    2. control hampers reuse
    3. potential for abuse
contracts
risks
    1. perfect control impossible
    2. control hampers reuse
    3. potential for abuse
    4. questionable enforceability
    5. limited reach
3 legal mechanisms

2. public licenses
licenses ≠ contracts
© & sui generis
  database
  rights
=©
public licenses
benefits
     1. standardized
     2. minimal conditions
     3. expansive reach
public licenses
risks
    1. limited reach
    2. complexity of ©
    3. attribution ≠ norms
attribution ≠ credit ≠ citation
3 legal mechanisms


3. waivers
waivers + norms
waivers
benefits
     1. legal certainty
     2. interoperability
     3. no lawyers
waivers
risks
    1. lack of control (under © law)
3 legal mechanisms
1. contracts
2. public licenses
3. waivers
Sarah Hinchliff Pearson
              12.14.11

   slideshow licensed CC BY 3.0, but
 screenshots on slides 13 and 16 used
pursuant to the fair use doctrine and not
        subject to the CC license

Weitere ähnliche Inhalte

Ähnlich wie 3 Legal Mechanisms for Sharing Data

A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
Evangeline
 
Mit csail-tr-2007-034
Mit csail-tr-2007-034Mit csail-tr-2007-034
Mit csail-tr-2007-034
vafopoulos
 
20131008 agoria big data vs data protection
20131008 agoria big data vs data protection20131008 agoria big data vs data protection
20131008 agoria big data vs data protection
Jos Dumortier
 

Ähnlich wie 3 Legal Mechanisms for Sharing Data (11)

3 Legal Mechanisms for Sharing Data
3 Legal Mechanisms for Sharing Data3 Legal Mechanisms for Sharing Data
3 Legal Mechanisms for Sharing Data
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Technological trends
Technological trendsTechnological trends
Technological trends
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
 
Mit csail-tr-2007-034
Mit csail-tr-2007-034Mit csail-tr-2007-034
Mit csail-tr-2007-034
 
Sharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesSharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social Issues
 
20131008 agoria big data vs data protection
20131008 agoria big data vs data protection20131008 agoria big data vs data protection
20131008 agoria big data vs data protection
 

Mehr von Sarah Hinchliff Pearson (6)

Presentation on springing licenses at CC Global Summit 2017
Presentation on springing licenses at CC Global Summit 2017Presentation on springing licenses at CC Global Summit 2017
Presentation on springing licenses at CC Global Summit 2017
 
Creative Commons 101
Creative Commons 101Creative Commons 101
Creative Commons 101
 
Legal considerations for platforms
Legal considerations for platformsLegal considerations for platforms
Legal considerations for platforms
 
Why We Share
Why We ShareWhy We Share
Why We Share
 
What is Wrong with Copyright Law and How CC Can Help
What is Wrong with Copyright Law and How CC Can HelpWhat is Wrong with Copyright Law and How CC Can Help
What is Wrong with Copyright Law and How CC Can Help
 
Creative Commons and Public Sector Information
Creative Commons and Public Sector InformationCreative Commons and Public Sector Information
Creative Commons and Public Sector Information
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

3 Legal Mechanisms for Sharing Data

Hinweis der Redaktion

  1. First, it is important to point out that doing nothing is not an option, at least not a very good one. In other words, if you publish data without a corresponding contract, license, or waiver, there are still legal consequences.
  2. To explain those consequences, I have to start by giving a quick primer on copyright law.
  3. © granted automatically as soon as content is fixed in a tangible medium no formalities required
  4. covers expression, which is a way of saying it protects the superficial aspects of work – selection, arrangement, coordination – rather than the substance (the ideas or facts)
  5. grants exclusive rights to authors of original works (i.e. if you have a ©, as a general rule no one can reproduce, modify, or distribute your data without your permission)
  6. certain exceptions and limitations apply, and they vary by jurisdiction. Most important = (1) facts are never subject to © (in data context, this means someone may not be able to reproduce an entire table of your data b/c it is ©, but they could take out particular pieces of data and reuse them); (2) in the U.S., fair use doctrine allows use of copyrighted works without permission for things like criticism or analysis (e.g., someone can quote a portion of your copyrighted paper when writing an analysis of your work)
  7. publishing data without a license, contract, or waiverneans at least arguablyyour published data is subject to “all rights reserved” copyright protection by default. That means no one can reproduce, modify, or distribute your data without your permission. Of course, that rule only applies to the extent your data is subject to copyright. As I explained earlier, the scope of copyright protection in data is complicated. The facts themselves are never protected, but the selection and arrangement of those facts may be. People can also use the data to the extent their use falls under an exception or limitation to copyright. As you can probably guess, these determinations are incredibly difficult to make, even for lawyers who specialize in copyright law. The practical result is anyone accessing your data will face potentially significant legal liability if they reuse your data without consulting a lawyer. This legal uncertainty could create a chilling effect on reuse of your data.
  8. To help avoid creating a legal landmine for those accessing your data, you should use one of the three legal mechanisms when sharing your data. Start with option you are most familiar with – contracts.
  9. You might know them as “data use agreements” or “data access policies.” They can take an infinite number of forms. Sometimes data has underlying exclusive right (like copyright), but not always. Only requirements are legal formalities, including offer and acceptance. Can be done by requiring people to “click to agree”, or with a general reference in the contract saying by accessing the data, the user agrees to the terms and conditions. Bit of legal fiction here.
  10. Customizable=can dictate who can access, what can be done with it
  11. 1. even the best lawyer can’t possibly delineate every scenario. 2. if your requirements are too burdensome or complicated, many people may decide using your data is not worth the costs; others who are less conscientious will just ignore your requirements 3. control can also be adverse to public policy – see Canadian example
  12. Example = Govt of Canada terms, violation if hurt rep of govt, was removed quicklyTroublesome. Esp when rarely read or negotiated.
  13. 4. because of legal fiction of offer and acceptance, especially in situations where the contract terms are included in a link on the bottom of the page, which most users will not even notice. Hard to argue they are “accepting an offer” by using the site.This is especially true when these un-negotiated contracts include terms that are particularly unfair or onerous. 5. contracts only bind the two parties to the agreement. If someone takes the data from your site and shares it elsewhere, anyone who obtains the data from the second user will not be bound by the terms and conditions of your contract
  14. Next option is to use a public license, like the ones offered by CC.
  15. While licenses may look a lot like contracts because they condition reuse of content upon certain terms, they are different in an important respect. Licenses require an underlying exclusive right to be enforceable. Where the underlying right begins and ends, the license begins and ends. That means, to understand the scope of a license, you have to understand the scope of the underlying right.
  16. In the context of sharing scientific data, that right is typically copyright or sui generis database rights or both. As I explained, the scope of copyright law is murky, and it varies by jurisdiction. As a general rule of thumb, in the science and research context, you can often assume that a database is subject to copyright because of the way in which the data are selected and arranged. (typically meets the very low originality threshold required or sweat of the brow in some jurisdictions) Nevertheless, in the U.S. and elsewhere, you can also assume that the data itself can be extracted and reused without infringing the copyright in the database structure because data is typically factual. This rule does not apply in the European Union. EU member countries have enacted a sui generis database right. This right gives a maker of a database the power to prevent extraction or reuse of a substantial part of the contents of that database, even if the data does not meet the originality requirement of copyright law.
  17. license for data can be rooted in copyright or in the sui generis database right if it applies, or both. E.g., Creative Commons licenses are copyright licenses. If a CC license is applied to a database, by default it covers the database itself and the contents within the database, all to the extent protected by copyright. Any use of the data or database that triggers copyright, requires compliance with the other license conditions. Any use of the data that does not trigger copyright - say if, for example, the data is in the public domain -- does not require attribution, even if it triggers database rights. Note: CC is rethinking its treatment of database rights as we create the new version of the CC license suite.
  18. (1) Bc standardized, when something is licensed under a CC license, the terms that apply are the same for all data licensed that same license; this makes it easier on users, making your data more attractive; also minimizes interoperability problems; (2) conditions fairly minimal; entire suite of CC licenses revolve around four potential license conditions (BY, NC, ND, SA); makes it easier than it would be if were subject to customized license b/c terms are fairly well-known and understood worldwide; (3) far reach - license conditions apply to anyone who obtains material, even if they obtain it from a different source (including modified data)
  19. (1) at same time, also a limited reach - mapping copyright or even SGDR means not every use of data requires compliance with license conditions, some see this as a negative (e.g., if falls within exception or limitation to copyright, for example if data is in the public domain); (2) complexity of copyright law means people may not understand that not every use of their licensed data requires compliance with conditions; also creates risk of under or over compliance by users; means lawyers often still have to be involved; (3) attribution requirements likely do not align perfectly with norms and expectations for receiving credit.
  20. Attribution refers to a legally-imposed requirement to attribute the rights holder when data is copied or re-used in a specified manner. The remedy against someone who fails to attribute correctly is a lawsuit, based on infringement of an intellectual property right.Credit, on the other hand, is what we all want - explicit recognition for our contribution to someone else’s work. Remedy for violating expectations is typically an accusation of plagiarism or other sort of professional rebuke. Finally, there is citation, which is rooted in norms of scholarly communication. The purpose of citation is to support an argument with evidence. But citation has also become a proxy for credit, albeit an imperfect one.   Remedy for failing to cite is a lack of academic or professional credibility.The attribution obligations written into a license are, by their nature, inflexible. This can lead to absurd situations where a user or aggregator of data is technically required by a license to attribute 1000 data providers, each in his or her own idiosyncratic manner. (attribution stacking)If you don’t do this, you are subject to a potential lawsuit. And even if you do-- citing 1000 providers in 1000 different ways – you may still not satisfy citation norms or people’s expectations for getting credit.Note: often same problems with contracts
  21. The last legal mechanism I will discuss is the waiver. A waiver can take many forms, but the purpose is to surrender all exclusive rights to data. In effect, it places the data in the public domain.
  22. Waivers are not enforceable in all jurisdictions. To deal with this problem, Creative Commons created a legal tool called CC0. CC0 operates on three levels. First, it is a waiver of all copyright and related rights. If the waiver fails, CC0 has a fall-back license that grants all permissions to the licensed work without any conditions. And, as a final backup, CC0 contains a non-assertion pledge, where the rights holder promises not to assert rights in the licensed work. This three-pronged approach is designed to make it operable worldwide
  23. Waivers are often coupled with a statement of norms the provider would prefer that reusers follow. This gives people guidelines for citing and giving credit, but it doesn’t create a legally enforceable requirement to follow them.
  24. legal certainty - there is no need for users to attempt to parse the copyrightability of an arrangement of data, which eliminates risk of under or over compliance; makes data more attractiveno interoperability problems – no need for users to spend time sifting through conflicting attribution requirements from different licenses or contracts; lawyers are [almost] eliminated from the equation
  25. feeling like you don’t have control over your data can be scary, but it is important to remember that most citation norms are self-enforcing, and things typically work fine (legal example: Bluebook citation does not create cause for a lawsuit, but most people follow it in order to legitimize their work); have to consider whether filing a lawsuit is really the remedy you want to resort to anyway
  26. To summarize, there are three primary legal mechanisms available, and as a baseline, it’s important to choose one of them. Doing nothing is not a viable alternative if you want your data to be used and cited. 1) Contracts are tempting because of ability to customize and control, but there are serious transaction costs to doing so, including risk your data will be avoided because it terms are too onerous or difficult to discern. 2)public licenses are a good option if attribution is particularly important to you, but there are limits here, too. The fact that licenses operate atop copyright law or sui generis database rights is a pro – because it makes it easier for people to understand. But it is also a con – copyright law in particular is complex and difficult to understand. If people misunderstand their obligations, they face a potential lawsuit, which is a scary proposition. There are also a lot of things copyright does not protect, especially when it comes to factual data. 3) In many ways, waivers are an often-overlooked alternative. This approach can scare lawyers because it means there is no legal recourse for failing to give credit, but reliance on norms is not as scary as it sounds. We do it all the time, especially in the academic and professional context. For the most part, people want to do the right thing. And for those who don’t, a contract or license probably wouldn’t stop them anyway. Now violated opening rules by letting my bias show through. Hopefully this helps you begin to navigate legal consequences of the way you share your data.