SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Chile’s Law 20,435 on Intellectual Property


Implications Abroad for Chile’s Internet Service
          Provider Liability Limitations


                A Policy Analysis for
   The Government of Chile, Ministry of Foreign Affairs

                      Conducted by:
                     Z’leste Wanner
     Advisor on International Communications Policy
               zleste.wanner@gmail.com
Objective

 Analyze Chapter III, Articles 85L-U on ISP Liability

 Identify Strengths and Weaknesses

 Discuss Conflict with US re US-Chile FTA

 Propose Recommendations

 Discuss Implications for International Relations
Importance of ISP Liability Provision

 Rampant piracy in Chile – facilitated through ISPs
    400 million songs downloaded illegally annually
    Chile 18th in world in terms of P2P unauthorized file sharing

 ISPs can cooperate in fight against piracy

 ISP liability provision a requirement of the US-Chile FTA
Chapter III, Articles 85L-U
2 Fundamental Principles of Policy:

1. ISPs should cooperate in the fight against digital piracy, the policy
   defines legal mechanisms requiring them to do so, (eg block or
   takedown infringing content upon notification of its existence

2. ISPs should not be directly liable for what users do (eg upload
   or download music illegally) if they meet certain conditions
   established according to the nature of the service provided by the
   ISP (ie providers of access, host or reference sites on the Internet)
Distinguishing Feature: Article Ñ
ISP not liable if removes content upon becoming “aware” of it

ISP “aware” upon receipt of court notification

         “The service provider shall be deemed to have actual knowledge when
a competent court of justice, in conformity with the procedure set forth in Article 85
Q, has ordered that the data be removed or access to it be disabled and the
service provider, legally served, does not comply expeditiously with such order.”

                                                         (Ley Núm. 20.435, Article Ñ)

Foundation: Chilean Constitution protection of individual rights to due process

ISPs cannot block unilaterally under its own judgment without judicial review
Distinguishing Feature: Article Q
Notice + Notice - Chile                      Notice and Takedown – US

Rights holder informs court of copyright     Rights holder sends notice to ISP of
infringement                                 copyright infringement

Court reviews case and sends                 ISP complies, takes down infringing
notification to ISP                          content

ISP notifies user within 5 working days      User can counter-notice alleged
                                             infringement, and if ruled in favor, ISP
Can counter-petition the claim               must restore content in 2 weeks

Benefit: Petition for takedown more likely   Problem: Incentive for ISP to take down
to be substantiated and accurate, less       faster, more work for ISP, censorship
work for ISP, censorship less likely         more likely
Strengths                               Weaknesses
 protection of individual expression by      dependency on the courts makes
  limiting rights holders and ISPs from        process slow and less efficient
  regulating or censoring internet users
                                              limited incentive for ISPs to
 well balanced: rights of rights holders,     cooperate with takedowns or
                                               pass along notifications
  ISPs, internet users
                                              burden on copyright holders to
 explicit limitation of ISP from actively     involve courts, requires financial
  patrolling its users, ensuring greater       resources
  privacy protection and less disruption
  to internet, ISPs                           creators do not feel the system
                                               adequately protects their
 judicial review component keeps Chile        interests, time lost through
  in compliance with its commitments to        judicial review results in
  its Constitution and the ACHR related        significant losses in illegal
                                               downloads where large quantity
  to individual rights and rights to due       can be pirated in a very short
  process                                      amount of time
US Critique of Chile’s ISP Policy
 Priority Watch List for failure to comply with FTA

 IIPA: Chile’s policy on ISP liability, “notice plus notice” architecture is
  “ineffective”
    does not act a deterrent because there is no threat of real consequences if
     the ISP does not comply with forwarding the notice
    inadequate for dealing with P2P file sharing
    “actual knowledge” is dependent on a court order and does not establish
     voluntary cooperation between rights holders and ISPs

 IIPA: Chile’s policy is too lenient on ISPs and users and does not
  establish an effective system to fight piracy
Recommendations
 Retain provision of judicial review prior to notification of copyright infringement
  must be retained in the policy
    Maintain protections guaranteed by Constitution related to individual rights & due process
    Lead the way for other Latin American countries that will adopt ISP liability provisions and
     subject to the same constraints of the American Convention on Human RIghts

 Create stronger legal incentives or penalties for ISPs to comply with the
  infringement notification requirement
    Elect a body to be charged with enforcing compliance with sending notices, such as the
     Department of Intellectual Property Rights
    incentivize ISPs to participate and ensure a faster, more efficient process

 Execute stronger enforcement of Intellectual Property Rights

 Increase education about intellectual property protection among the population
Implications for Foreign Relations

 Consequence:
    Souring relations with the US
    Continued presence on Priority Watch List
    Potential reputation as bad trading partner

 Opportunities:
    International leader in ISP liability regulation
    More flexible IP regime facilitates trade relations with other countries
     with different regimes
    Stance in Trans Pacific Partnership trade agreement negotiations,
     which would include a significantly more stringent chapter on ISP
     liability provisions

Weitere ähnliche Inhalte

Was ist angesagt?

Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? Abraham Vergis
 
Contract for the web
Contract for the webContract for the web
Contract for the webMassa Critica
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Academic letter re changes in surveillance law
Academic letter re changes in surveillance lawAcademic letter re changes in surveillance law
Academic letter re changes in surveillance lawAndrew Murray
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
 
Mobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael HanleyMobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael HanleySara Quinn
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider LiabilityAndres Guadamuz
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2Kenny Boddye
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
Understanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange AgreementsUnderstanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange AgreementsDoubleHorn
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviewsaleenia23
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - CybersecurityGautam GR
 

Was ist angesagt? (20)

Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
E commerce law
E commerce lawE commerce law
E commerce law
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
Contract for the web
Contract for the webContract for the web
Contract for the web
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Academic letter re changes in surveillance law
Academic letter re changes in surveillance lawAcademic letter re changes in surveillance law
Academic letter re changes in surveillance law
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
Mobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael HanleyMobile: Location Privacy and Apps_Michael Hanley
Mobile: Location Privacy and Apps_Michael Hanley
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider Liability
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Understanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange AgreementsUnderstanding CJIS Compliance – Information Exchange Agreements
Understanding CJIS Compliance – Information Exchange Agreements
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 

Ähnlich wie Client presentation

Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...KenfoxLaw
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptssuserd26df0
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfRiley Claire
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Ben Allen
 
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...Danny Friedmann
 
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...ovento
 
Cyber Liability Coverage in the Marketplace with Dan Cotter
Cyber Liability Coverage in the Marketplace with Dan CotterCyber Liability Coverage in the Marketplace with Dan Cotter
Cyber Liability Coverage in the Marketplace with Dan CotterButlerRubin
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Ip innovations congress
Ip innovations   congressIp innovations   congress
Ip innovations congressLawrence Wang
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate ResponsibilityCharles Mok
 
Group 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxGroup 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxStephenQuijano3
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...William Tanenbaum
 
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...FSR Communications and Media
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the LawDavid Phillips
 

Ähnlich wie Client presentation (20)

Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).ppt
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdf
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
 
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
How to Protect End Users‘ Personal Data and Enforce Copyright on the Internet...
 
Cyber Liability Coverage in the Marketplace with Dan Cotter
Cyber Liability Coverage in the Marketplace with Dan CotterCyber Liability Coverage in the Marketplace with Dan Cotter
Cyber Liability Coverage in the Marketplace with Dan Cotter
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Ip innovations congress
Ip innovations   congressIp innovations   congress
Ip innovations congress
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Ip innovations congress
Ip innovations   congressIp innovations   congress
Ip innovations congress
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
Group 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxGroup 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptx
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
Expression on Platforms: Freedom of Expression and ISP Liability in the Frame...
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 

Kürzlich hochgeladen

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Kürzlich hochgeladen (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Client presentation

  • 1. Chile’s Law 20,435 on Intellectual Property Implications Abroad for Chile’s Internet Service Provider Liability Limitations A Policy Analysis for The Government of Chile, Ministry of Foreign Affairs Conducted by: Z’leste Wanner Advisor on International Communications Policy zleste.wanner@gmail.com
  • 2. Objective  Analyze Chapter III, Articles 85L-U on ISP Liability  Identify Strengths and Weaknesses  Discuss Conflict with US re US-Chile FTA  Propose Recommendations  Discuss Implications for International Relations
  • 3. Importance of ISP Liability Provision  Rampant piracy in Chile – facilitated through ISPs  400 million songs downloaded illegally annually  Chile 18th in world in terms of P2P unauthorized file sharing  ISPs can cooperate in fight against piracy  ISP liability provision a requirement of the US-Chile FTA
  • 4. Chapter III, Articles 85L-U 2 Fundamental Principles of Policy: 1. ISPs should cooperate in the fight against digital piracy, the policy defines legal mechanisms requiring them to do so, (eg block or takedown infringing content upon notification of its existence 2. ISPs should not be directly liable for what users do (eg upload or download music illegally) if they meet certain conditions established according to the nature of the service provided by the ISP (ie providers of access, host or reference sites on the Internet)
  • 5. Distinguishing Feature: Article Ñ ISP not liable if removes content upon becoming “aware” of it ISP “aware” upon receipt of court notification “The service provider shall be deemed to have actual knowledge when a competent court of justice, in conformity with the procedure set forth in Article 85 Q, has ordered that the data be removed or access to it be disabled and the service provider, legally served, does not comply expeditiously with such order.” (Ley Núm. 20.435, Article Ñ) Foundation: Chilean Constitution protection of individual rights to due process ISPs cannot block unilaterally under its own judgment without judicial review
  • 6. Distinguishing Feature: Article Q Notice + Notice - Chile Notice and Takedown – US Rights holder informs court of copyright Rights holder sends notice to ISP of infringement copyright infringement Court reviews case and sends ISP complies, takes down infringing notification to ISP content ISP notifies user within 5 working days User can counter-notice alleged infringement, and if ruled in favor, ISP Can counter-petition the claim must restore content in 2 weeks Benefit: Petition for takedown more likely Problem: Incentive for ISP to take down to be substantiated and accurate, less faster, more work for ISP, censorship work for ISP, censorship less likely more likely
  • 7. Strengths Weaknesses  protection of individual expression by  dependency on the courts makes limiting rights holders and ISPs from process slow and less efficient regulating or censoring internet users  limited incentive for ISPs to  well balanced: rights of rights holders, cooperate with takedowns or pass along notifications ISPs, internet users  burden on copyright holders to  explicit limitation of ISP from actively involve courts, requires financial patrolling its users, ensuring greater resources privacy protection and less disruption to internet, ISPs  creators do not feel the system adequately protects their  judicial review component keeps Chile interests, time lost through in compliance with its commitments to judicial review results in its Constitution and the ACHR related significant losses in illegal downloads where large quantity to individual rights and rights to due can be pirated in a very short process amount of time
  • 8. US Critique of Chile’s ISP Policy  Priority Watch List for failure to comply with FTA  IIPA: Chile’s policy on ISP liability, “notice plus notice” architecture is “ineffective”  does not act a deterrent because there is no threat of real consequences if the ISP does not comply with forwarding the notice  inadequate for dealing with P2P file sharing  “actual knowledge” is dependent on a court order and does not establish voluntary cooperation between rights holders and ISPs  IIPA: Chile’s policy is too lenient on ISPs and users and does not establish an effective system to fight piracy
  • 9. Recommendations  Retain provision of judicial review prior to notification of copyright infringement must be retained in the policy  Maintain protections guaranteed by Constitution related to individual rights & due process  Lead the way for other Latin American countries that will adopt ISP liability provisions and subject to the same constraints of the American Convention on Human RIghts  Create stronger legal incentives or penalties for ISPs to comply with the infringement notification requirement  Elect a body to be charged with enforcing compliance with sending notices, such as the Department of Intellectual Property Rights  incentivize ISPs to participate and ensure a faster, more efficient process  Execute stronger enforcement of Intellectual Property Rights  Increase education about intellectual property protection among the population
  • 10. Implications for Foreign Relations  Consequence:  Souring relations with the US  Continued presence on Priority Watch List  Potential reputation as bad trading partner  Opportunities:  International leader in ISP liability regulation  More flexible IP regime facilitates trade relations with other countries with different regimes  Stance in Trans Pacific Partnership trade agreement negotiations, which would include a significantly more stringent chapter on ISP liability provisions