Top Banner
Tilburg Law School Tilburg Institute for Law, Technology and Society (TILT) Master Law & Technology (LL.M) Master Thesis Liability of Internet Society Service Providers and the (upcoming) role of content recognition technologies Name: Romy van Limpt ANR: 678380 SNR: U1254490 Supervisor: Mr. Ir. M.H.M. Schellekens Second supervisor: S. de Conca
63

Tilburg Law School - http

Jan 26, 2023

Download

Documents

Khang Minh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Tilburg Law School - http

Tilburg Law School

Tilburg Institute for Law, Technology and Society (TILT)

Master Law & Technology (LL.M)

Master Thesis

Liability of Internet Society Service Providers and the (upcoming) role of content

recognition technologies

Name: Romy van Limpt

ANR: 678380

SNR: U1254490

Supervisor: Mr. Ir. M.H.M. Schellekens

Second supervisor: S. de Conca

Page 2: Tilburg Law School - http

2

Table of Contents Table of Contents .............................................................................................................. 2 List of abbreviations ......................................................................................................... 3 1. Introduction ................................................................................................................ 4

1.1. Background ..................................................................................................................................4 1.2. Research questions .......................................................................................................................6 1.3. Methodology .................................................................................................................................7 1.4. Structure .......................................................................................................................................7

2. Terminology and Intermediary Liability ................................................................. 8 2.1. Introduction ..................................................................................................................................8 2.2. Internet Society Service Providers .............................................................................................9 2.3. Intermediary liability – current legal framework ...................................................................10

2.3.1. Liability exemptions ............................................................................................................11 2.3.2. No general obligation to monitor .........................................................................................14

2.4. Copyright enforcement ..............................................................................................................15 2.4.1. Notice and Take Down ........................................................................................................15 2.4.2. Content Recognition Technologies ......................................................................................17

2.5. Conclusion ..................................................................................................................................21 3. Intermediary Copyright Liability and Compatibility .......................................... 22

3.1. Introduction ................................................................................................................................22 3.2. The European Digital Single Market .......................................................................................22

3.2.1. New EU Copyright Directive ...............................................................................................23 3.2.2. Practical consequences .........................................................................................................26

3.3. Fundamental compatibility .......................................................................................................29 3.3.1. Freedom to conduct a business ............................................................................................29 3.3.2. Freedom of expression and information ..............................................................................32 3.3.3. Right to protection of personal data .....................................................................................33

3.4. Fundamental restrictions ..........................................................................................................36 3.5. Conclusion ..................................................................................................................................38

4. Intermediary Copyright Enforcement in the future ............................................. 39 4.1. Introduction ................................................................................................................................39 4.2. Vertical intermediary liability approach .................................................................................39

4.2.1. Fair balance test ...................................................................................................................40 4.3. Compatible copyright enforcement system .............................................................................42 4.4. Notice and Action .......................................................................................................................44

4.4.1. Notice and Notice System ....................................................................................................45 4.4.2. Notice Wait and Take Down System ...................................................................................46 4.4.3. Notice and Stay Down system .............................................................................................47

4.5. Conclusion ..................................................................................................................................48 5. Conclusion ................................................................................................................. 49 Bibliography .................................................................................................................... 52

Page 3: Tilburg Law School - http

3

List of abbreviations

AG: Advocate General

CDA: Communications Decency Act

Charter: Charter of Fundamental Rights of the European Union

CRTs: Content Recognition Technologies

DMCA: Digital Millennium Copyright Act (US)

DSMS: Digital Single Market Strategy

DSM: Digital Single Market

EC: European Commission

ECHR: European Convention on Human Rights

ECtHR: European Court of Human Rights

EP: European Parliament

ECJ: European Court of Justice

EU: European Union

InfoSoc: Information Society

ISP: Internet Service Provider

ISSP: Information Society Service Provider

NN: Notice and Notice (system)

NSD: Notice and Stay Down (system)

NTD: Notice and Take Down (system)

NWTD: Notice Wait and Take Down (system)

SLA: Second Level Agreement

UCC: User Created Content

UMG: Universal Music Group

WP: Working Party

Page 4: Tilburg Law School - http

4

1. Introduction

1.1. Background

Online service providers are playing an important role in the economic and social life of today.

Think of search engines, e-commerce platforms, price comparison websites and social media.

The providers are enabling information to consumers and creating interactions between users.

The E-commerce Directive1 makes a beginning with regulating online service providers by

defining service providers in article 2(b) as ‘any natural or legal person providing an information

society service’. Article 1(2) of the Technical Standards Directive 2 further defines these

Information Society Service Providers (ISSPs), or intermediary service providers3. The article

states that an Information Society Service is ‘any service normally provided for remuneration, at

a distance, by electronic means and at the individual request of a recipient of services’.

With the growing importance of service providers and the amount of information and data

on them, it is hard for the creators of copyright protected work to enforce and license their rights.

In addition, it is difficult to seek remuneration for the online distribution of their works. 4

Copyright gives exclusive rights to the rightholders in order to protect their work and gain some

income. One of the exclusive rights, is the right to communicate to the public, which means

online sharing and disclosure of the protected work to the public.5 Usually, there is no agreement

between the user and rightholder or between the platform and the rightholder when someone

uploads copyright protected work on the platform. The options for the rightholders are mostly

requesting an injunction6 or notifying the online platform to take down the content. The latter,

called the Notice and Take Down (NTD) procedure, is provided in article 14(2) of the E-

Commerce Directive. The ISSP takes down or prevents access to the information or activity once 1 Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (E-Commerce Directive), OJ L178/1. 2 Directive 98/34/EC of the European Parliament and of the Council of 22 June 1998 laying down a procedure for the provision of information in the field of technical standards and regulations (Technical Standards Directive), OJ L204/37. 3 Section 4 E-Commerce Directive. 4 European Commission, ‘Proposal for a Directive of the European Parliament and of the Council on copyright in the Digital Single Market’ COM (2016) 593 final, p. 3. 5 Art. 3(1) Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related right in the information society (InfoSoc Directive), OJ L167/10. 6 Ibid, art. 8.

Page 5: Tilburg Law School - http

5

notified about illegal content on their services. The European Court of Justice (ECJ) confirms

that the procedure should be followed when a sufficiently precise and substantiated notice is sent

to the ISSP.7 Reporting mechanisms should be available to the general public without needing to

be signed-in as a user.8

In relation to this, the European Commission made a new EU Directive on Copyright in the

Digital Single Market in which they want to address the ‘value gap’.9 This refers to the idea that

revenues generated from the online use of copyright-protected content are unfairly distributed

between the different players in the value chain of online publishing.10 The new proposed

Directive introduces an obligation for online intermediaries to filter uploads and to set up

licencing agreements with the rightholders, in order to decrease the amount of illegal content and

to solve the problem of the value gap. With the increasing responsibility and proposed liability

for intermediaries, it is likely that intermediaries are forced to take measures to prevent copyright

infringements. Different content recognition technologies (CRTs) can be used by intermediaries

to avoid liability and to fulfil the obligation to implement measures to carry out a copyright

check prior to the content being publicly available. Automatic tools and filters can be used to

identify potentially infringing content, and third parties will not be able to notice the

infringement. Automated technologies will be used to identify content by processing and

comparing the content to discover a breach of copyright or licence agreement.11 Once there is a

notice for a particular piece of content which is protected under copyright law, the system will be

able to block any copy of that content from ever being uploaded to the platform again.

However, citation of copyright protected material or the use of copyright protected material

for education can be permitted under certain circumstances. With the use of technologies and

algorithms it will be a challenging job to put information in context. Unless the fact that an

option for counter-notice is in place, there will be a risk of removing legal content because of the

7 Case C-324/09, eBay vs. l'Oréal [2011] ECR I-06011. 8 European Commission, ‘Tackling Illegal Content Online Towards an enhanced responsibility of online platforms’ COM (2017) 555 final, page 9. 9 European Commission, ‘Proposal for a Directive of the European Parliament and of the Council on copyright in the Digital Single Market’ COM (2016) 593 final, p. 3. 10 Christina Angelopoulus, ‘EU Copyright Reform: Outside the Safe Harbours, Intermediary Liability Capsizes into Incoherence’ (2016) Kluwer Copyright Blog <http://copyrightblog.kluweriplaw.com/2016/10/06/eu-copyright-reform-outside-safe-harbours-intermediary-liability-capsizes-incoherence/> accessed 2 April 2019. 11 ‘Automated Content Recognition (ACR)’ (Gartner IT Glossary) <https://www.gartner.com/it-glossary/automatic-content-recognition-acr> accessed 14 May 2019.

Page 6: Tilburg Law School - http

6

lack of human involvement.12 For example, the educational use of a Jimi Hendrix cover has been

taken down by YouTube, which was in the context of a Harvard Professor’s Copyright Lecture.13

YouTube also deleted ten thousands videos of war crimes on the internet by automated

algorithms who were not being able to make a distinction between news articles, an archive or a

call for jihadist struggles.14 Another example are the videos of the National Aeronautics and

Space Administration (NASA), the independent agency of the federal government of the United

States that has no copyrighted on their content. Their images, videos and files may be used

without needing explicit permission of the NASA.15 With the permitted use of NASA material

by TV programs who automatically ask copyright protection, the algorithms thought that NASA

was infringing someone else’s copyright.16 NASA was, as a result of that, not able to publish

their own content. These examples illustrate that CRTs do not always recognize the context of

the copyright protected work on the internet completely. However, intermediaries may rely on

these types of content recognition when their liability is at risk. This can lead to significant

implications for the concerned parties which should be balanced against the interest of copyright

protection.

1.2. Research questions

Following on from the above discussion, the main research question is:

Should Internet Society Service Providers (ISSPs) be held liable for copyright

infringements on their platform and in what way can content recognition technologies play

a role in this?

12 European Commission, ‘Proposal for a Directive of the European Parliament and of the Council on copyright in the Digital Single Market’ COM (2016) 593 final, page 17. 13 Ernesto van der Sar, ‘YouTube Copyright Complaint Kills Harvard Professor’s copyright Lecture (Update)’ (TorrentFreak 2016) <https://torrentfreak.com/youtube-copyright-complaint-kills-harvard-professors-copyright-lecture-160217/> accessed 14 May 2019. 14 SyrianArchive, ‘Survey of social media channels removed by @YouTube machine learning and restored w/ help by @witnessorg.’ (Twitter 2017) <https://twitter.com/syrian_archive/status/905019172370960384> accessed 14 May 2019. 15 ‘Media Usage Guidelines’ (NASA) <https://www.nasa.gov/multimedia/guidelines/index.html> accessed 14 May 2019. 16 Mike Masnick, ‘How Google’s ContentID System Fails At Fair Use & The Public Domain’ (TechDirt 2012) <https://www.techdirt.com/articles/20120808/12301619967/how-googles-contentid-system-fails-fair-use-public-domain.shtml> accessed 14 May 2019.

Page 7: Tilburg Law School - http

7

To answer the main question, the following sub-questions will be a guidance:

- What are Internet Society Service Providers (ISSPs)? And what kind of copyright

enforcement technologies can be used by ISSPs?

- How does the EU intermediary liability framework address copyright liability?

- How do content recognition technologies fit within EU legal framework and what is the

fundamental compatibility?

- What is the ideal copyright enforcement system in the legal framework?

1.3. Methodology

To answer the questions, a legal analysis of the existing legal framework on ISSP liability in the

context of copyright infringement has to be made. The analysis includes an assessment of the E-

Commerce Directive, the new EU Copyright Directive but also fundamental principles like the

freedom of expression and right to protection of personal data. The analyses will be combined

with relevant case law from the European Court of Justice (ECJ), documents and policies of

European Institutions and literature. Since we will be focussing on the European perspective, the

European framework has a central place in this thesis. However, the US Digital Millennium

Copyright Act will come across to discuss the regulation of ISSP liability in another way. To

understand the different ways of copyright enforcement, we will take a look at the meaning of

different copyright enforcement techniques and describe their potential position within the legal

framework in order to illustrate the fundamental compatibility.

1.4. Structure

The research will be divided in different parts, all guided by the sub-questions as aforementioned.

In the second Chapter, we will elaborate on the definition of ISSPs and copyright enforcement

techniques will be investigated. It is necessary to understand how these techniques work,

especially the technique of content recognition. The third Chapter sets out the legal framework

regarding ISSPs’ copyright liability within the EU. Therefore, a close look at European

legislation, the new EU Copyright Directive and case law is needed. The research concludes by

assessing other copyright enforcement technologies within the European framework.

Page 8: Tilburg Law School - http

8

2. Terminology and Intermediary Liability

2.1. Introduction

People are intensively using web shops, search engines and information tools on the internet.

Intermediaries, the Internet Society Service Providers (ISSPs), are making sure that everyone has

access to the internet, that users can upload information on the internet and that people can

communicate with each other on the internet. The term ISSP is broad and subject to debate since

the law and literature describe different definitions. This Chapter distinguishes and defines the

different providers. The terms ISSPs and intermediaries, having the same definitions, will be

used throughout this thesis and are not limited to the extent of internet access providers. This

thesis will primarily focus on hosting providers, consisting of the storage of the information

provided by a recipient of a service.17

The rules regarding ISSPs’ liability for copyright infringements can be found in the E-

Commerce Directive, the Intellectual Property Rights Enforcement Directive18 and the InfoSoc

Directive19. The E-Commerce Directive provides safeguards for intermediaries by differentiating

between different providers: mere conduit, caching and hosting providers. Most EU Member

States transposed these respective provisions literally. 20 The scope of these safeguards is

horizontal, meaning that the exemptions cover various types of illegal content and activities and

covers different kinds of liability. Some types of illegal content are copyright infringing content,

defamation laws or unfair commercial practices for example. The different sorts of liability are

criminal or civil liability, as well as direct or indirect liability.21 This thesis will focus on the

intermediary liability regarding copyright protected material in the context of hosting platforms.

And finally, this Chapter provides the current various means of copyright enforcement systems

in order to assess the copyright enforcement systems in the current and future legal intermediary

liability framework.

17 Art. 14(1) E-Commerce Directive. 18 Directive 2004/48/EC of the European Parliament and of the Council of 29 April 2004 on the enforcement of intellectual property rights (Intellectual Property Rights Enforcement Directive), OJ L195/16. 19 Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related right in the information society (InfoSoc Directive), OJ L167/10. 20 European Commission, ‘First report on the application of the Directive on electronic commerce’ COM (2003) 702 final, p.13. 21 Natali Helberger and others, ‘Legal Aspects of User Created Content’ (2009) IViR, p. 40.

Page 9: Tilburg Law School - http

9

2.2. Internet Society Service Providers

The E-Commerce Directive defines ISSPs as ‘information society services’, which are further

defined as ‘any service normally provided for remuneration, at a distance, by electronic means

and at the individual request of a recipient of services’.22 The Internet Service Provider (ISP)

falls under the scope of that definition, mostly used as a synonym. Further explanation of the

concept of ISSPs is needed since the definition is very broad and ambiguous.23 First of all, the

term ‘at a distance’ means that the parties are not present for the provided service. The service is

sent initially and received at its destination by means of electronic equipment for the processing

and storage of data, and entirely transmitted, conveyed and received by wire, radio, optical

means or other electromagnetic means by referring to the element ‘by electronic means’.24 In

addition to that, the transmission of data on individual request is required by the words ‘at the

individual request of a recipient of services’. The second element, ‘normally provided for

remuneration’, is defined in recital 19 of Directive 98/48/EC25, which introduced the concept of

information society services for the first time. The recital refers to article 50 of the EC Treaty.26

When we look at case law regarding article 50 of EC Treaty, we see that the ECJ explicitly said

that some activities are not ‘normally being provided for remuneration’, like public education

and services of the government.27 The ECJ clarified that an activity remunerated by a third party

can also fall under remuneration. It is not necessary that the user pays himself, services relying

on the income of advertisements will fall under the element too.28 And the last element which is

important in the definition is ‘by electronic means’, meaning that the service is on top of the

already existing infrastructure of networks. The service cannot consist of low-level signal

transmission. The means of electronic equipment can be used for processing, digital compression

and storage of data.29

22 Art. 2(a) and (b) E-Commerce Directive, with reference to art. 1 of the Technical Standards Directive. 23 Irini Stamatoudi and Paul Torremans (eds), EU Copyright Law: A Commentary (Edward Elgar Publishing, Cheltenham 2014), p. 507. 24 Christina Angelopoulos, ‘European intermediary liability in copyright: A tort-based analysis’ (2016) UvA Digital Academic Repository, p. 44. 25 Council Directive 98/48/EC of 20 July 1998 amending Directive 98/34/EC laying down a procedure for the provision of information in the field of technical standards and regulations, OJ L217/18. 26 Treaty establishing the European Community (TEC), OJ C325/1. 27 Case 263/86 Belgian State v. Humbel [1988] ECR 05365. 28 Case 352/85 Bond van Adverteerders v. the Netherlands [1988] ECR 02085. 29 Recital 17 and 18 E-Commerce Directive.

Page 10: Tilburg Law School - http

10

Looking at the definition from the E-Commerce Directive, you will find that the definition

is clearly linked to primary law, like article 57 of the Treaty on the Functioning of the European

Union (TFEU), concerning free movement of services.30 The Court and the Advocate General

(AG) gave a broader definition to the concept of ‘service’. The AG argued that ‘the requirement

for pecuniary consideration laid down in article 57 TFEU does not mean that the service must be

paid for directly by those who benefit from it.’31 With this, the AG meant that an economic

activity might be covered as long as some indirect transactions are made. This can be interpreted

as a form of consideration like the purchase of advertised goods or services. 32 The ECJ

confirmed the approach of the AG by stating that ‘the cost of that activity is incorporated into the

price of those (advertised) goods or services.33 At the same time it is noted that a mere economic

character of an activity would not be sufficient to qualify an activity as a service; some additional

circumstances have to be present.34 However, definition of a service might not be the same in

every Member State. Domestic laws can extend safe harbours beyond the harmonised area of

services ‘normally provided for remuneration’, in which situation there is no need to inquire

about the limits of EU legislation.35

2.3. Intermediary liability – current legal framework

Articles 12 to 15 of the E-Commerce Directive are providing a limited liability regime for the

provision of certain ISSPs. The E-Commerce Directive applies to different kind of providers and

areas of law, meaning that it has a horizontal approach. The European legislator considered the

limitations on the liability of such internet users in the E-Commerce Directive to be ‘absolutely

necessary’.36 This is in connection with the promotion of the free movement of goods and

services in the field of electronic commerce, the reduction of costs and of such services, freedom

of expression and legal certainty.37 Unlike the US approach38, the E-Commerce Directive does

30 Consolidated version of the Treaty on the Functioning of the European Union (TFEU), OJ C326/47. 31 Case C-484/14 Tobias McFadden v. Sony Music (ECJ 15 September 2016), Opinion of AG Szpunar, para. 43. 32 Martin Husovec, ‘Holey cap! CJEU Drills (yet) Another Hole in the E-Commerce Directive’s Safe Harbors’ (2017) JIPLP, p. 116. 33 Case C-484/14 Tobias McFadden v. Sony Music (ECJ 15 September 2016), Opinion of AG Szpunar, para. 42. 34 Ibid, para. 41. 35 Martin Husovec, ‘Holey cap! CJEU Drills (yet) Another Hole in the E-Commerce Directive’s Safe Harbors’ (2017) JIPLP, p. 116 and 117. 36 European Commission, ‘First report on the application of the Directive on electronic commerce’ COM (2003) 702 final, p. 14. 37 Recitals 3, 4, 40 and 46 E-Commerce Directive.

Page 11: Tilburg Law School - http

11

not specify the type of content that is illegal on platforms. It covers criminal, administrative and

civil infringements.39 Despite the fact that this thesis focuses on copyright liability, it will

mention case law regarding other types of illegal content since it can provide guidance to the

legal position of ISSPs. The current legal framework is providing comprehensive protection,

regardless of whether it is a potential infringement of copyright, criminal law or defamation.40

Despite the current horizontal comparison, the EU is moving to a vertical approach. A horizontal

approach will be difficult to regulate, mainly because of the size of the platforms and the ease

with which they can expand.41

2.3.1. Liability exemptions

There are three types of providers that can invoke a liability exemption from the E-Commerce

Directive. Before explaining the hosting provider central in this thesis, we will discuss the two

other providers that can invoke a liability exception. The first one is the mere conduit provider.

An ISSP acts as a mere conduit when the it is passively involved in the transmission of

information. For instance by e-mail, or when it is involved in providing access to a

communications network. 42 This means that the conduit is not involved in the message or the

substance of the communication parts. In cases where the service provider is involved in the

transmission in modifying or selecting or when the receiver of the data is selected by the service

provider, the liability exemption does not apply.43 The ISSP can claim the exemption to liability

when the provider does not initiate the transmission, when it refrains itself from selecting the

person receiving the information and when the provider does not select or modify the

38 Georgios N. Yannopoulos, ‘The Immunity of Internet Intermediaries Reconsidered?’ in Mariarosaria Taddeo and Luciano Floridi (eds), The Responsibilities of Online Service Providers (Springer International Publishing, Cham 2017), p. 45. 39 European Commission, ‘Online Platforms and the Digital Single Market Opportunities and Challenges for Europe’ COM (2016) 288 final, page 8; and European Commission, ‘Tackling Illegal Content Online Towards an enhanced responsibility of online platforms’ COM (2017) 555 final, page 6. 40 European Commission, ‘Online services, including e-commerce, in the Single Market’ SEC (2011) 1641 final, p. 25. 41 European Commission, ‘Online Platforms and the Digital Single Market Opportunities and Challenges for Europe’ COM (2016) 288 final, page 9; and European Commission, ‘Online Platforms Accompanying the document Communication on Online Platforms and the Digital Single Market’ SWD (2016) 172 final, page 3, 14 and 15. 42 Lilian Edwards (ed), The New Legal Framework for e-commerce in Europe (Hart Publishing, Portland 2005), p. 112. 43 Art. 12 E-Commerce Directive; and DLA Piper, ‘EU Study on the Legal Analysis of a Single Market for the Information Society; new rules of a new age?’ (2009) <http://ec.europa.eu/information_society/newsroom/cf/document.cfm?doc_id=842> accessed 15 May 2019, p. 7.

Page 12: Tilburg Law School - http

12

transmission.44 This exception to liability is, however, subject to the condition that the ISSP may

be required to impose certain restrictions on the subscription at a national level. This is a very

different situation from when an ISSP will be held liable for not having checked for illegal

content and not having exercised control over it, as we will see with the hosting provider.45

The second provider able to invoke a liability exemption, is the caching provider. This

provider temporarily and automatically stores data in order to make the onward transmission of

the information more efficient.46 Caching is transmitting information at the request of a recipient

or storing that information for a short period.47 For immunity, the mere conduit provider cannot

interfere with the information passing through the network by modifying it, and the ISSP should

regularly update information with respect to terms of use in accordance with industry standards.

The information copy must be identical to the original information. Further, the webserver may

specify the maximum period for which copies can be stored on the server and the caching

provider must remove the copies when it obtains knowledge of the fact that the original data is

removed or that the access of the original data is blocked.48 The longer term storage will not be

defined as caching but as hosting and will therefore be subject to a greater risk of liability.

The third provider able to invoke a liability exemption, and the main focus in this thesis, is the

hosting provider. The definition of a hosting provider, included in article 14 E-Commerce

Directive, is assigned to more types of providers than those that only offer access to the internet.

A hosting provider can validly invoke this exemption from liability if knowledge of illegal

activities or illegal stored information is lacking. The hosting provider can only benefit from the

liability exemption when the service in question can qualify as an information society service,

consisting of storage of information that is provided by the recipient of the information and while

having no actual knowledge or awareness of the illegal nature of the information.49 It requires the

44 Thibault Verbiest, Gerald Spindler and Giovanni Maria Riccio, ‘Study on the Liability of Internet Intermediaries’ (2007) SSRN. 45 Chris Reed and John Angel (eds), Computer Law (Oxford University Press, Oxford 2003). 46 Art. 13 E-Commerce Directive. 47 Lilian Edwards, ‘The Fall and Rise of Intermediary Liability Online’ in Lilian Edwards and Charlotte Waelde (eds), Law and the Internet (Hart Publishing, Portland 2009), p. 64. 48 DLA Piper, ‘EU Study on the Legal Analysis of a Single Market for the Information Society; new rules of a new age?’ (2009) <http://ec.europa.eu/information_society/newsroom/cf/document.cfm?doc_id=842> accessed 15 May 2019, p. 8.49 Case C-236/08 Google France v. Louis Vuitton [2010] ECR I-02417, para. 28.

Page 13: Tilburg Law School - http

13

ISSP to perform certain actions if it has become aware of the illegal activities and actions, such

as the deleting the information. The storage of information means holding, keeping or storing

data provided by the providers’ users50, on a server.51 The data is stored, specifically selected and

uploaded by a user of the service and is intended to be stored for an infinite amount of time. The

users are generating the content and placing it on the providers’ platform for the access by other

users.52 Article 14 E-Commerce Directive covers a wide range of different activities and applies

to a wide range of providers, such as online marketplaces and social media platforms.53 Typically,

these types of providers are webhosting companies, providing web space to its users. If someone

places anything on the service under the control of the ISSP, the exceptions to liability will

lapse.54 The ISSP is thus exempt from material hosted by third parties until the ISSP was aware

of the illegal content and has done nothing to remove it.

The E-Commerce Directive states that the liability exemption in article 14 E-Commerce

Directive covers only cases ‘where the activity of the information society service provider is

limited to the technical process of operating and giving access […] activity is of a mere technical,

automatic and passive nature’.55 The ECJ clarifies the precise scope of this in case law. An

important case in this respect is the L’Oreal v. eBay case56 in which the central question was

whether article 14 E-Commerce Directive applies to the online marketplace eBay. The ECJ

indicated that the operation of an online marketplace falls within the definition of an information

society service.57 But the applicability of the article requires more than just the provision of a

service containing the storage of information for users. There is only an ISSP within the meaning

of the E-Commerce Directive if the provider limits itself to a neutral provision of the service by

50 Broder Kleinschmidt, ‘An International Comparison of ISP’s Liabilities for Unlawful Third Party Content’ (2010) International Journal of Law and Information Technology 18(4), p. 340. 51 Case C-236/08 Google France v. Louis Vuitton [2010] ECR I-02417, para. 111. 52 Giovanni Sartor and Mario Viola de Azevedo Cunha, ‘The Italian Google-Case: Privacy, Freedom of Speech and Responsibility of Providers for User-Generated Contents’ (2010) International Journal of Law and Information Technology 18(4), p. 370. 53 Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012), para. 27. 54 Art. 14(2) E-Commerce Directive. 55 Recital 42 E-Commerce Directive. 56 Case C-324/09 L’Oréal v. eBay [2011] ECR I-06011. 57 Ibid, para. 109.

Page 14: Tilburg Law School - http

14

means of a purely technical and automatic processing of the data provided by its customers.58

The ECJ came to the same conclusion in the Google Adwords case.59 The ECJ ruled that ‘it is

necessary to examine whether the role played by that service provider is neutral, in the sense that

its conduct is merely technical, automatic and passive, pointing to a lack of knowledge or control

of the data which it stores’.60 The fact that Google determines the terms of payment itself and

provide the general information to the customers, does not mean that Google cannot invoke the

exemption of liability in article 14 E-Commerce Directive. 61 Unfortunately, it is up to the

national courts to assess whether the ISSP’s role corresponds to the role described by the ECJ. A

case in which there was a direct infringement by an ISSP is the Brein v. Ziggo case.62 By

managing the platform, Pirate Bay made the protected content available to the public and was not

having a neutral role that could lead to a liability exemption.63

2.3.2. No general obligation to monitor

According to article 15 E-Commerce Directive, Member States shall not impose a general

obligation on online intermediaries to monitor the information that they transmit or store when

they are performing one of the above mentioned type of services.64 Member States may also not

require intermediaries to look for illegal activities from their users. This is a logical rule as

otherwise it becomes impossible for providers to offer the services in a realistic and commercial

way. The second paragraph of article 15 establishes a more specific obligation of the ISSP. The

ISSP is obliged ‘to promptly inform the competent public authorities of alleged illegal activities’

of information provided by the ISSPs customers, or to ‘communicate to the competent

authorities’. While article 15 E-Commerce Directive prohibits to impose a general obligation to

monitor, is recital 48 E-Commerce Directive contradicting this by providing the possibility for

Member States to establish a ‘duty of care, which can reasonably be expected from them and

which are specified by national law, in order to detect and prevent certain types of illegal

activities’. The recital explains the term ‘general’ from article 15 E-Commerce Directive. The

interpretation has been left to the courts. ISSPs which are not subject to one of the liability 58 Case C-324/09 L’Oréal v. eBay [2011] ECR I-06011, para. 113. 59 Case C-236/08 Google France v. Louis Vuitton [2010] ECR I-02417, para. 114 and 120. 60 Ibid, para. 114. 61 Ibid, para. 116. 62 Case C-610/15 Stichting Brein v. Ziggo (ECJ 14 June 2017). 63 Ibid, para. 36 and 37. 64 Art. 12, 13 and 14 E-Commerce Directive.

Page 15: Tilburg Law School - http

15

exemptions are not subject to the general prohibition of monitoring. However, the duty is

normally understood for activities which are concerning criminal and public law infringements

and not for preventing copyright infringements.65 But in the Scarlet v. SABAM judgment66, the

ECJ decided that the obligation to filter content for copyright protection, asked by SABAM, is

contrary to article 15 E-Commerce Directive. Filtering entails the monitoring of all data from all

customers for any future infringement of intellectual property, for an unlimited time.67

2.4. Copyright enforcement

Different copyright enforcement systems currently used by ISSPs to avoid copyright liability are

discussed below. The E-Commerce Directive forms the basis for the Notice and Take Down

(NTD) procedure. Although intermediaries can gain knowledge or awareness with investigations

undertaken on the intermediary’s own initiative68, the NTD procedure is the most common way

of copyright enforcement in the current horizontal legal system. But, also the rise of technology

in the prevention of liability is becoming increasingly popular. Not only because it saves high

costs and energy, but also because the EU is slowly working towards the system in which a

hosting provider will be liable for copyright infringements on its platform, regardless of its actual

knowledge. This leads to a proactive system ensuring that the control takes place before an

upload. In order to test the different forms of content recognition, an explanation of these

systems is necessary.

2.4.1. Notice and Take Down

Once a notification is sent to the hosting provider, the knowledge element is no longer lacking

and the hosting provider should ‘act expeditiously’ to remove or disable the access to the illegal

content. When the ISSP receives a complaint about unlawful or illegal content, the ISSP has to

decide whether the information is illegal or unlawful, and if so, the ISSP has to remove it from

the website or has to block the access to the illegal content.69 But although the NTD system

contributes to copyright protection, there is a downside on this type of procedure. The copyright

65 Lilian Edwards, ‘Role and Responsibility of Internet Intermediaries in the field of Copyright and Related Rights’ (2011) WIPO, p. 10. 66 Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959. 67 Ibid, para. 40. 68 Case C-324/09 L’Oréal v. eBay [2011] ECR I-06011, para. 122. 69 Art. 4 E-Commerce Directive.

Page 16: Tilburg Law School - http

16

owners will often send a notice without actually carrying out careful research and ISSPs will

probably remove the material immediately without further research in order to reduce the risk of

liability. The removed material is likely to remain offline, regardless of whether or not the

uploading was legal. The reason for this is the lack of proper investigation and the uploader itself

that will usually not send a counter-notice to the ISSP. Recital 46 allows Member States ‘to

establish specific requirements which must be fulfilled expeditiously prior to the removal or

disabling of information’. As a consequence, the implementation of the NTC procedure is left to

Member States and leading to Member States defining different procedures. However, the ISSPs

should provide a ‘rapid and reliable procedure for removing and disabling access to illegal

information’.70 In addition to the NTD system, Member States may establish the obligation for

ISSPs to inform the competent public authorities of alleged illegal activities undertaken or

information provided by recipients of their service. 71 If the ISSP ‘accidentally’ encounters

certain indications that are illegal, the ISSP must report this to the competent authorities.

However, this is not a logical measure, as the ISSP is obliged to block or to remove the material

if it is certain that the content on the platform infringes copyright.

In contradiction to the European framework, the US obligates hosting providers to

implement the detailed and clear NTD system. The Digital Millennium Copyright Act (DMCA)

72 is enacted in 1998 and regulates copyright infringements on the Internet in the US through an

NTD procedure. The US legislation makes a clear distinction between intermediary liability for

copyright infringements and infringements within other jurisdictions.73 The notices have to fulfil

certain formal requirements in the US and should include minimal content to impose a duty for

the service provider to remove the material such as the name, address, electronic signature and

sufficient information about the potential infringement. 74 The ISSP can ignore notices not

meeting the formal requirements and must have a designated agent to receive notifications of the

claimed infringement.75 The DMCA protects ISSPs for unknowingly transmitting or storing

copyright protected material, almost similar as the E-Commerce Directive but including the

70 Recital 40 E-Commerce Directive. 71 Art. 15(2) E-Commerce Directive. 72 US Digital Millennium Copyright Act (DMCA), Pub. L. No. 105-304. 73 Art. 512 DMCA and section 230 Communications Decency Act (CDA). 74 Section 512(c)(3)(A) DMCA. 75 Section 512(c)(3)(A) DMCA.

Page 17: Tilburg Law School - http

17

prevention of future infringements as a condition to fall within the scope.76 The hosting service

provider avoids liability when it blocks access to the material after notification.77

2.4.2. Content Recognition Technologies

In practice, the use of content recognition technologies (CRTs) will mainly be accomplished by

the existence of a database. As soon as users upload new content, the content will be compared

to the already existing database. These types of Digital Rights Management (DRM) are based on

digital technologies that describe and identify content. With the identification it is possible to

enforce rules set by rightholders or prescribed by law for the distribution and use of copyright

protected content.78 The use of CRTs is not new. For example, it is possible to use compare-by-

hash to find out whether a file is the same as the original and screened work. A hash is a short

digest of the original file and is able to determine the absolute equality of non-equality of files.

During verification, the original file is hashed. If the file is changed, the hash value will change

in a random manner and is totally different than the hash of the original file.79 The compare-by-

hash technique is a predecessor of fingerprinting. 80 Another technique for tracing files is

recording metadata like download data, the purchaser’s name, the author and the creation date.

Combining the metadata technique with the digital fingerprinting can lead to opportunities by

associating external information and automatic adding the metadata to different files. 81 The

digital fingerprinting technique is often referred to as the digital watermarking technique.

However, these two techniques are different as we will explain hereafter.

76 Michael Kevin Lemly, ‘Protecting Consumers from Themselves: Alleviation the Market Inequalities Created by Online Copyright Infringement in the entertainment industry’ (2002) Albany Law Journal of Science & Technology 13, p. 620. 77 Art. 512(c)(1) DMCA. 78 Lucie Guibault and Natali Helberger, ‘Copyright Law and Consumer Protection’ (2005) European Consumer Law Group Brussels 035(05), p. 9. 79 Stefan Katzenbeisser, Huajian Liu and Martin Steinebach, ‘Challenges and Solutions in Multimedia Document Authentication’ in Information Resources Management Association, Digital Rights Management: Concepts, Methodologies, Tools and Applications (IGI Publishing, Hershey 2012), p. 1587. 80 Sara Kudrle, ‘Media Fingerprinting: Managing Content, Security and Quality’ (2014) Grass Valley <https://www.grassvalley.com/docs/WhitePapers/purple/GVB-1-0283A-EN-WP_Media_Fingerprinting.pdf> accessed 2 April 2019, p. 5. 81 Ibid, p. 10.

Page 18: Tilburg Law School - http

18

The watermarking technique already exists for a long time. Paper was already watermarked in

the thirteenth century by varying the thickness and density of certain parts of the paper. Creating

an image was possible via consequential differential transmission of light. A well-known

example for this is money.82 The paper watermarks inspired the digital area and therefore digital

watermarking was a growing area in the late nineties. Digital watermarking embeds information

into digital material that it is imperceptible to a human observer but easily detected by computer

algorithm.83 Watermarking can either be visible or invisible and places an identifying mark on a

file. An example of visible watermarking is a television station such as BBC, where you can see

the logo in one of the corners on the screen. To identify the copyright data, like identifying the

author of a copyright protected work, invisible watermarking is mostly used.84

Fig. 1: Structure of the watermarking-based system for content recognition85

The digital watermarking technique derives from steganography, which is the science of

communication information while hiding the existence of the communication.86 By hiding the

information, steganography ensures that the information cannot be discovered in any way. The

advantages of digital watermarking are that it is almost impossible to remove a digital watermark

82 Jessica C. Lai and Christoph B. Graber, ‘Is Digital Text-Watermarking the Long-Desired User Friendly Digital Rights Management? Copyright and Fundamental Values from a Comparative Perspective’ (2015) i-call Working Paper 2, p. 11. 83 Juergen Seitz, Digital Watermarking for Digital Media (IGI Publishing, London 2005), p. 5. 84 Chun-Shien Lu (ed), Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (IGI Publishing, London 2005), p. 6. 85 Civolution, ‘Automated Content Recognition: creating content aware ecosystems’ (2012) Civolution <http://www.csimagazine.com/csi/whitepapers/ACR%20Creating%20%20content-aware%20ecosystems%20-Civolution%20White%20Paper%20-%20Sept%202012.pdf> accessed 2 April 2019, p. 7. 86 Chun-Shien Lu (ed), Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (IGI Publishing, London 2005), p. 4.

Page 19: Tilburg Law School - http

19

and it applies to shortened files. On the other hand, it is a disadvantage that the digital

watermarking system is not standardised. Using the same technique is not enough to read the

watermark. An identification key is necessary.87 The use of digital watermarking, whether or not

standardised, can be a major burden for intermediaries given the enormous amount of copyright

protected work.

By using the digital fingerprinting technique, computer systems can filter out copyright protected

material. Digital fingerprinting differs from digital watermarking by only analysing the media,

instead of embedding information into the file. The watermark can be completely unrelated to

the media, a fingerprint is an actual representation of characteristics of the file itself.88 The idea

of fingerprinting is that audio files, images and video content can be identified by examining the

characteristics of the file. The system has to recognise the content and therefore the system

knows already the characteristics of the file. This requires a two-step process.89

Fig. 2: Structure of the fingerprinting-based system for content recognition90

87 Prabhishek Singh and R.S. Chadha, ‘A Survey of Digital Watermarking Techniques, Applications and Attacks’ (2013) International Journal of Engineering and Innovative Technology 2(9), p. 169. 88 Sara Kudrle, ‘Media Fingerprinting: Managing Content, Security and Quality’ (2014) Grass Valley <https://www.grassvalley.com/docs/WhitePapers/purple/GVB-1-0283A-EN-WP_Media_Fingerprinting.pdf> accessed 2 April 2019, p. 5. 89 Jürgen Herre, ‘Content based identification (fingerprinting)’ in Eberhard Becker and others (eds), Digital Rights Management: Technological, Economic, Legal and Political Aspects (Springer Verlag, Berlin Heidelberg 2003), p. 94. 90 Civolution, ‘Automated Content Recognition: creating content aware ecosystems’ (2012) Civolution <http://www.csimagazine.com/csi/whitepapers/ACR%20Creating%20%20content-aware%20ecosystems%20-Civolution%20White%20Paper%20-%20Sept%202012.pdf> accessed 2 April 2019, p. 8.

Page 20: Tilburg Law School - http

20

The fingerprinting technology is able to recognise the audio if it already exists. In contrast to

hashing and digital watermarking, it is possible to identify re-recordings when using a digital

fingerprinting system. Unlike the compare-by-hash technique, the digital fingerprinting

technique is able to recognise the contents of files that are shortened, have a different resolution

or are slightly modified.91 A major disadvantage that must be taken into account is the chance

that a copyright protected work is used but falls under the exception for any use by, for example,

criticising the work or making a parody of it. Even in this case, human work will therefore be

required in order to make the test afterwards. Some hosting providers have been using the

fingerprinting technique for some time now, including YouTube. By using the digital

fingerprinting technique, YouTube shapes its Content ID system and tries to ensure that

copyright protected work is prevented from uploading. Another very popular recognition system

using digital fingerprinting is Shazam. Shazam has an extensive database with fingerprinting

algorithms on the audio files. The user of the phone records a few seconds of a song and sends it

to Shazam. When data packages are filtered, the traffic is identified so that a certain consequence

can be linked. This form of filtering must be distinguished from the blocking system. Blocking

can be used as preventing certain communications without inspecting data packets, for example

by countering spam or harmful traffic for security reasons. This is in contrast with filtering

techniques which are checking the content before blocking. Blocking has a completely different

legal implication than filtering. AG Cruz Villalón stated this in the Scarlet case by saying that the

filtering system is a condition of the effectiveness of the blocking system and that the two

operations are very different with different consequences, although they are closely linked.92

In the two SABAM judgments93, the ECJ has taken a strong position against filtering. Prior

to these judgments, it had become apparent at L’Oréal v. eBay that surveillance of ISSP

customers’ data is prohibited by article 15 of the E-Commerce Directive. In the Scarlet v.

SABAM judgment, the ECJ reiterated the conclusion from L’Oréal v. eBay but added that, even

in the absence of article 15 E-Commerce Directive, an application to introduce a filtering system

91 Sara Kudrle, ‘Media Fingerprinting: Managing Content, Security and Quality’ (2014) Grass Valley <https://www.grassvalley.com/docs/WhitePapers/purple/GVB-1-0283A-EN-WP_Media_Fingerprinting.pdf> accessed 2 April 2019, p. 5. 92 Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959, Opinion of AG Cruz Villalón, para. 46. 93 Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959 and Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012).

Page 21: Tilburg Law School - http

21

may also infringe certain fundamental rights of the parties involved.94 An example of this is the

freedom to conduct business for an ISSP or the protection of personal data for the customer.95 In

the Scarlet case, it was about an internet access provider. The ECJ made a few months after this

case the same conclusion with regards to a hosting service provider in the SABAM v. Netlog

case. 96 The rulings confirm the conclusion from the Promusicae judgment: the limits for

enforcement of copyright infringements were not set in secondary legislation, but in primary

legislation.97

2.5. Conclusion

This Chapter discusses and analyses the horizontal liability regime of online intermediaries, in

particular hosting providers. Hosting providers, falling under the scope of an Information Society

Service Provider (ISSP) can rely on the liability exemption in the E-Commerce Directive if it is

lacking actual knowledge of the illegal activities on their platform. The liability exemption and

together with the prohibition of a general monitoring obligation, leads to the main use of a

Notice and Take Down (NTD) system. Because ISSPs want to avoid liability, they often remove

the information in question immediately upon receipt of a notification, without investigating the

alleged infringement or weighing up the interests. Rightholders can make use of this by sending

notifications without being sure of an alleged infringement. This, together with the fact that the

internet is changing rapidly and the volume of data is increasing enormously, means that a new

regulated and harmonised system for preventing copyright infringements in the EU is necessary.

Techniques will be used in order to avoid copyright liability without having a sluggish system

relying on the human being. There are two large different systems that can perform an automatic

check and use a database. On the one hand you have the digital watermarking where a visible or

invisible mark on certain works leads to its direct recognition by the computer. A second system

is the analysis of the media by recognising characteristics. Whether these techniques will fit into

the new legal system is discussed below.

94 Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959, para. 44. 95 Art. 8, 11 and 16 Charter of Fundamental Rights of the European Union (Charter), 2010 OJ C 83/02. 96 Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012), para. 42. 97 Case C-275/06 Promusicae v. Telefónica de España [2008] ECR I-00271.

Page 22: Tilburg Law School - http

22

3. Intermediary Copyright Liability and Compatibility

3.1. Introduction

In order to harmonise copyright legislation in the EU, increase transparency and balance the

contractual relations between content creators and publishers or producers, the European

Commission (EC) established a new EU Copyright Directive.98 The new Directive essentially

enlists hosting providers to police content of their users. The idea is not novel, but the proposed

obligations would go much further than before, and the role in the copyright enforcement process

changes from reactive to proactive.99 This Chapter shows how a new vertical intermediary

liability system will look like. This will be examined on the basis of case law, in which the focus

will no longer be on the legal system, but on the fundamental principles at stake. Intermediary

liability is often leading to a dispute with conflicting fundamental rights and therefore discussed

at the highest court levels of the EU. Before discussing the fundamental clashes arising in case

law, we will look at the new vertical system proposed by the EC.

3.2. The European Digital Single Market

The EU has put forward a new strategy for a joint legislative approach to technology and its

developments: The Digital Single Market Strategy (DSMS). Member States encountered the

same issues individually and had to solve them at national level.100 The EU wants to harmonise

legislation, including on copyright. The EU’s ambition is to give access to all Member States,

while ensuring fair competition, consumer protection and data privacy. This is proposed by

focusing on three pillars: consumers and businesses that have better access to online goods and

services, the infrastructure that allows digital services to thrive and investment and research that

maximise the growth potential of the digital economy. As part of the EU’s Digital Single Market

Strategy, the EC wants to implement a new EU Copyright Directive.101 In recent years, the

European Commission already tried in several ways to come up with solutions to restrict illegal

98 ‘Questions and Answers – European Parliament’s vote in favour of modernised rules fit for digital age’ (European Commission 2019) <http://europa.eu/rapid/press-release_MEMO-19-1849_en.htm> accessed 14 May 2019. 99 Aleksandra Kuczerawy, ‘EU Proposal for a Directive on Copyright in the Digital Single Market: Compatibility of Article 13 with the EU Intermediary Liability Regime’ (2018) CentreforIT&IPLaw(CiTiP),p.2.100 European Commission, ‘A Digital Single Market Strategy for Europe’ COM (2015) 192 final, page 3. 101 European Commission, ‘Proposal for a Directive of the European Parliament and of the Council on copyright in the Digital Single Market’ COM (2016) 593 final.

Page 23: Tilburg Law School - http

23

material on the Internet. With the new provisions on copyright protection, the European

Commission wants to introduce vertical rules that replace the current horizontal liability rules for

intermediaries.

3.2.1. New EU Copyright Directive

The EC made an evaluation of the ISSPs liability regime. The evaluation concluded that the

regime served its purposes. However, improving the implementation of the E-Commerce

Directive was necessary to achieve the E-Commerce Directive’s full potential. 102 The EC

presented a reform of the ISSPs liability regime regarding copyright in the Digital Single Market

Strategy, which implements a sectorial, problem-driven approach and is implemented by the

European Union (EU) in 2015.103 The new EU Copyright Directive talks about the obligations

for service providers to prevent copyright liability when users are uploading infringing materials

on their platforms. The European Commission expressed that the new Copyright Directive aims

to ‘clarify the role of online services in the distribution of works and other subject-matter’.104 On

February 2019, negotiators from the European Commission and the European Parliament

published the final text of the new EU Copyright Directive after a long debate that lasted two

years. The European Council approved the Directive in April 2019. The debate was mainly about

article 17 of the EU Copyright Directive, an important article for this research and which will

lead to the use of CRTs by ISSPs. Therefore, this article and its consequences for practice will be

discussed in detail.

Not only article 17 of the new EU Copyright Directive is raising eyebrows. The other

article that has been the subject of much criticism, is article 15 of the Directive. It is stipulating

that major ISSPs may have to pay publishers or showing snippets of news articles. Although the

objections to article 15 EU Copyright Directive may be less extreme, there has been much

discussion about this article. First of all, it is unclear what kind of material exactly needs to be

licensed. Is it about fragments, headlines or just the snippets themselves? This would give more

responsibility for social media platforms with regard to checking uploaded content. It could also

make it more difficult to share content on Facebook for example. 102 European Commission, ‘A coherent framework for building trust in the Digital Single Market for e-commerce and online services’ COM (2011) 942 final, p. 5. 103 European Commission, ‘Online Platforms and the Digital Single Market Opportunities and Challenges for Europe’ COM (2016) 288 final. 104 Ibid, page 2.

Page 24: Tilburg Law School - http

24

Article 17 of the new Copyright Directive in the Digital Single Market (DSM)105 intends to

tackle the value gap. The value gap refers to the idea that revenues generated from the online use

of copyright-protected content are being unfairly distributed between the different players in the

value chain of online publishing.106 You can distinguish different platforms in this matter;

platforms that are subscription-funded, like Spotify and Netflix, require consent of the copyright

holders to operate legally. While other platforms like YouTube and Vimeo operate around user

created content (UCC). The article applies to:

‘Information society services whose main or one of the main purposes is to store and give

the public access to a large amount of copyright protected works uploaded by its users

which it organises and promotes for profitmaking purposes’

The article is talking about Information Society Service Providers without giving a definition to

it. Most likely the definition following from the E-Commerce Directive and described in Chapter

2 applies. The article does not apply to non-profit online encyclopaedias, non-profit educational

and scientific repositories, open source software developing and sharing platforms, electronic

communication service providers, online marketplaces and business-to-business cloud services

and cloud services allowing users to upload content of their own use. These excluded services

are still covered by the liability exemption from the E-Commerce Directive.107 The only clarity

provided by the article regarding the definition of an information society service is the profit

motive criterion. The providers are performing an act of communication to the public when they

are giving the public access to a large amount of copyright protected works uploaded by its users.

The limitation of liability established in article 14(1) of the E-Commerce Directive does not

apply to such acts.

105 European Commission, ‘Proposal for a Directive of the European Parliament and of the Council on copyright in the Digital Single Market’ COM (2016) 593 final. 106 Christina Angelopoulos, ‘EU Copyright Reform: Outside the Safe Harbours, Intermediary Liability Capsizes into Incoherence’ (2016) Kluwer Copyright Blog <http://copyrightblog.kluweriplaw.com/2016/10/06/eu-copyright-reform-outside-safe-harbours-intermediary-liability-capsizes-incoherence/> accessed 2 April 2019. 107 Art. 14 E-Commerce Directive.

Page 25: Tilburg Law School - http

25

The article provides for different requirements. With regards to all platforms covered by article

17 of the EU Copyright Directive, providers must make best efforts to license all copyright

protected works uploaded by its users and the service make best efforts to take down works upon

notice from the rightholders. ISSPs cannot know what their users will upload, requiring them to

license almost all copyright protected work that may be capable of being uploaded. The vast

majority of creators of copyright protected work will be disinterested in licensing. As a result,

these ISSPs run a very high risk of liability because they will no longer be covered by article 14

E-Commerce Directive. The likely impossibility for ISSPs to obtain licenses for all works has

often been discussed in the preparations for the new law. The mitigation measures have been

included in article 17 EU Copyright Directive108 and will be discussed hereafter. The ISSP will

be able to influence the material coming online by means of an automatic process and will

therefore have no knowledge or control over it. If the measure qualifies as an active role of the

ISSP, the liability regime for ISSPs radically changes. They will not only be held liable for errors

but will be objectively responsible.109

First of all, the ISSPs, covered by article 17 of the EU Copyright Directive, must make

every effort to obtain a license for all copyright protected works that may be uploaded by their

users. It is unclear how this will be interpreted in practice and when the best possible efforts will

be made for ISSPs. Unless it concerns a large provider, it will be impossible to conclude a

license with many rightholders. This may also lead to expensive legal advice. With regards to

providers covered by article 17 EU Copyright Directive having more than five million visitors

per month, the ‘notice and stay down requirement’ is applicable. Services must make best efforts

to prevent their future uploads of works that have bene taken down after a notice from the

rightholders. And finally, platforms covered by article 17 EU Copyright Directive being more

than three years old and having more than 10 million euros in yearly revenue, are required to

insert a form of CRT. Services must make best efforts to ensure the unavailability of specific

works for which the rightholders have provided the service provider with the relevant and

necessary information and to prevent future uploads of works that have been taken down after a

notice from rightholders. The use of SLAs will only be a solution between major ISSPs and 108 Art. 17(4) EU Copyright Directive. 109 Giancarlo F. Frosio, ‘From horizontal to vertical: an intermediary liability earthquake in Europe’ (2016) JIPLP 12(7), p. 565.

Page 26: Tilburg Law School - http

26

high-profile copyright owners. For small copyright owners and smaller ISSPs it will be difficult

to engage in agreements because of their lack of influence.110 Many ISSPs will therefore end up

with the obligation to insert CRTs because of the lack of power to agree upon SLAs with the

copyright owners.

3.2.2. Practical consequences

The obligation in article 17 EU Copyright Directive to license copyright protected work that can

be uploaded on the platform is likely to result in a tension between ISSPs and their users.111 The

pre-emptive licenses acquired by the ISSPs are defined as second level agreement (SLA). The

copyright owner authorises the use of specified works by the platform’s users in return for

royalties, company stakes, or ad revenue share.112 The agreements resulting from the new EU

Copyright Directive will probably result in standardised agreement. With the use of these SLAs,

the user’s interest tend to be neglected and will be more in favour to copyright owners than the

platform users.113 An example for this is the development of the YouTube’s Content-ID system.

Before 2012, YouTube’s users could file a dispute and then the copyright owner was able to

make the decision and claim the video. The copyright owner’s decision made the dispute to an

end.114 The process is now very biased in favour of the copyright owners. Because of the notice

and takedown system, the right to defence the claim has been further eroded for YouTube’s users.

Moreover, the SLAs are vulnerable for changing. An example for this is the termination of the

agreement between Universal Music Group (UMG) and YouTube in 2009. UMG could not reach

an agreement for prolonging the cooperation with YouTube, with a termination of the agreement

as a result. UMG signed a new contract with Sevenload, who was the competitor of YouTube.115

But by the time of termination, UMG already had given many users permission to upload videos

110 Yafit Lev-Aretz, ‘Second Level Agreements’ (2012) Akron Law Review 45, p. 171 and 172. 111 Jie Wang, ‘Regulating hosting ISPs’ responsibilities for copyright infringement: The freedom to operate in the US, EU and China’ (2016) Maastricht University, p. 233. 112 Ibid, p. 152. 113 Abigail R. Simon, ‘Contracting in the Dark: Casting Light on the Shadows of Second Level Agreements’ (2014) William & Mary Business Law Review 305, p. 308; and Benjamin Boroughf, ‘The Next Great YouTube: Improving Content ID to Foster Creativity, Cooperation, and Fair Compensation’ (2014) Albany Law Journal of Science and Technology, p. 16. 114 Abigail R. Simon, ‘Contracting in the Dark: Casting Light on the Shadows of Second Level Agreements’ (2014) William & Mary Business Law Review 305, p. 325. 115 Holger Schmidt, ‘Die Antwort auf Youtube: Universal-Musikvideos jetzt auf Sevenload’ (Frankfurter Allgemeine 2009) <https://blogs.faz.net/netzwirtschaft-blog/2009/04/02/die-antwort-auf-youtube-universal-musikvideos-jetzt-bei-sevenload-1014/> accessed 14 May 2019.

Page 27: Tilburg Law School - http

27

with integrated music from UMG. After the termination, it was unclear what the procedure

would be with the already uploaded videos.116 With the use of SLAs, the copyright claim

mechanism may be abused. Rightholders need to have exclusive rights to the materials, they just

cannot claim third party content or content being fairly used. But with the use of CRTs, some

people are able to claim public domain content because of the front-end ownership

verification.117 Some game companies were experiencing these false claims. They had to ask

users of the game to contest the matches and then they found out who was claiming the

content.118 Fairly uploaded content is vulnerable to be monetised or blocked by copyright owners,

as the technologies will not be able to make the distinction between fairly uploaded content and

content that is infringing copyright.119 Furthermore, there is some legal risk when ISSPs will use

CRTs. Instead of letting users agree with the terms of service that are exempting them from the

content of uploads, they are responsible for infringing uploaded material. They will derive some

public pressure to ensure the measures will protect Internet users’ interest and measures that can

prevent taking fairly used material offline. With YouTube’s new Content ID system in 2012,

YouTube announced that it will support its users in defending their rights, up to one million

dollars.120 With this YouTube wanted to reduce the increasing distance with the necessary users.

It is therefore important, especially because of the obligation for many large hosting platforms,

that users will feel supported in situations where a human judgment will be necessary.

The second drawback is Facebook and Google probably being the only ones able to

implement CRTs, due to the high costs and the required capacity. This can have several major

consequences. First of all, it will be more difficult for companies to fight the dominant position

of the major platforms with a negative impact on innovation and less freedom of choice for

consumers as a result. Secondly, the independent creators of copyright protected content such as

musicians and vloggers, the group for which the new EU Copyright Directive should be most

advantageous, can only publish their work on one or just a few platforms. This is bad for their

116 Yafit Lev-Aretz, ‘Second Level Agreements’ (2012) Akron Law Review 45, p. 172 and 173. 117 Benjamin Boroughf, ‘The Next Great YouTube: Improving Content ID to Foster Creativity, Cooperation, and Fair Compensation’ (2014) Albany Law Journal of Science and Technology, p. 9. 118 Tripp Papineau, ‘Industry fights back as YouTube begins mass cull of game videos’ (E:Info Games 2013) < http://einfogames.com/news/industry-fights-back-youtube-begins-mass-cull-game-videos%E2%80%8F/> accessed 6 April 2019. 119 Benjamin Boroughf, ‘The Next Great YouTube: Improving Content ID to Foster Creativity, Cooperation, and Fair Compensation’ (2014) Albany Law Journal of Science and Technology, p. 12. 120 P.H. Madore, ‘YouTube Will Pay Up To $1 Million in Legal Fees For Qualifying Users’ (Hacked 2015) <https://hacked.com/youtube-will-pay-1-million-legal-fees-qualifying-users/> accessed 14 May 2019.

Page 28: Tilburg Law School - http

28

freedom of choice and will weaken their negotiation position. The use of CRTs restricts their

freedom of choice, will weaken their negotiation position and is an attack on the freedom of

expression as the major intermediaries have the dominant position in the public debate. It is

necessary that all the information can be freely exchanged and that everyone can discuss urgent

and important social issues. In 2018, several times blocking certain content has led to

information and debate being restricted online. For example, YouTube deleted the account of the

non-profit organisation Women on Waves, which wants to raise awareness of abortion laws.

YouTube removed the account 30 days before the Irish abortion referendum because the non-

profit organisation had violated the ‘community guidelines’, according to YouTube. Videos

about safe abortion and reliable medical information were taken offline. No details about the

deletion were published and no response from YouTube to Women on Waves’ objection is

received. After a while it turned out that the guidelines had not been violated, but after the

account was online for a while, videos were later taken offline again by YouTube.121

The removal of content will most likely be anything but reserved. CRTs cannot separate

illegal content from content that is recognised by the system, but may be uploaded on the basis of

the copyright exceptions that apply to the use of copyright protected work, such as the creation

of a parody. Intermediaries will ensure limited liability by removing too much content rather

than removing too little content. With the new EU Copyright Directive, ISSPs can choose not to

block the content on the basis of the law because they will then have to meet all kinds of

requirements, but on the basis of the general conditions. If they have to comply with the law,

they would have to build complex software and set up a complicated and time-consuming

complaints procedure costing a lot of money. By translating the legislation into general terms

and conditions and community guidelines, intermediaries can ensure that they remove content

based on their guidelines, not based on the law designed to protect the users. An example of this

is the US’ recent adoption of a law, making intermediaries responsible for sex work

advertising.122 As a result, the intermediaries modified their terms and conditions by referring to

sexual acts and stating that content related to that may not be uploaded. This means a restriction

of the freedom of expression in the US, without the safeguards from the law.

121 ‘YouTube censors lifesaving abortion information’ (Women on Waves 2018) <https://www.womenonwaves.org/en/page/7044/youtube-censors-lifesaving-abortion-information> accessed 14 May 2019. 122 The US Stop Enabling Sex Traffickers Act (SECTA) S. 1693 (115th Congress) and section 230 CDA.

Page 29: Tilburg Law School - http

29

3.3. Fundamental compatibility

The Charter of Fundamental Rights (Charter) is binding as from 1 December 2009, when the

Treaty of Lisbon entered into force. 123 The provisions of the Charter are applicable for

institutions, bodies and agencies of the European Union and to Member States.124 Member States

must find a fair balance between the various fundamental rights when interpreting and applying

European legislation, including when transposing the new EU Copyright Directive. The Charter

is very important for analysing intermediary liability and all EU secondary legislation and

national legislation falling within the scope of the EU must be interpreted in light of the

Charter.125 The European Commission stated that platforms mediating access to content for most

internet users, have a significant social responsibility in terms of protecting users and society

from illegal content on their platform. And with that in mind, they have to balance the

fundamental rights at stake.126 The ECJ even acknowledged that article 15 of the E-Commerce

Directive is enshrined in articles 8 and 11 of the Charter on protection of personal data and of

freedom of expression and information.127 The ECJ did not declare the right of intellectual

property inviolable.128

3.3.1. Freedom to conduct a business

The right to conduct business is recognised in 1974129 and incorporated in article 16 Charter. The

provision is very brief and formulated in a relatively vague manner:

‘The freedom to conduct a business in accordance with Community law and national

laws and practices is recognised.’

123 Charter of Fundamental Rights of the European Union (Charter), 2010 OJ C 83/02. 124 Art. 51(1) Charter. 125 Koen Lenaerts, ‘Exploring the Limits of the EU Charter of Fundamental Rights’ (2012) European Constitutional Law Review 8(3), p. 376. 126 European Commission, ‘Tackling Illegal Content Online Towards an enhanced responsibility of online platforms’ COM (2017) 555 final, page 2 and 3. 127 Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012), para. 48 and Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959, para. 50. 128 Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012), para. 41 and Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959, para. 43. 129 Case 4/73 Nold v. Commission of the European Communities [1975] ECR 00985.

Page 30: Tilburg Law School - http

30

The freedom to conduct a business is an absolute right and therefore cannot be subject to

legitimate restrictions.130 The right should be balanced against the right to property131 and other

Charter rights. The Charter distinguishes between the freedom to conduct a business and the

right of establishment in another Member State. 132 The right of establishment protects the

freedom to move within the EU when you want to set up a new business. The freedom to

conduct a business applies in all situations that fall under the scope of application of EU law and

is therefore not restricted to such a context. It does not matter if there is a trans-border element or

not.133 Freedom to conduct business includes the right to exercise economic and commercial

activities in freedom134, the freedom to contract135 and free competition.136 It covers the freedom

to conclude contracts that allow companies to choose who to do business with and who not.

According to this right, companies also have the freedom to make use of economic, financial and

technical means.137 Content recognition technologies will affect the right to conduct business

because ISSPs will be obliged to cooperate with the person who has the exclusive rights over the

protected work. This means that the rightholders of copyright protected works ultimately have a

great influence, without the ISSP ultimately having the opportunity to make a choice in the

persons with whom it wishes to collaborate. As a result, rightholders are able to set high

standards than may be necessary. The ISSP is obliged to cooperate with these rightholders. This

will not only affect the freedom of contract, but can also have major financial consequences for

the ISSP. These high financial requirements are accompanied by the technology that ISSPs have

to deploy and can impose a high financial burden on ISSPs, especially on those platforms that

are less large and have less financial resources.

The changing liability regime of ISSPs leads to the use of content recognition systems. The

current ways of Internet management, as discussed in Chapter 2, shall be limited to those

systems being able to check the content on copyright protected material prior to publishing.

ISSPs will only have the choice in technological systems that can entail high costs. In the

130 Hugh Collins (ed), The forthcoming EC Directive on Unfair Commercial Practices (Kluwer Law International 2004), p. 91-92. 131 Art. 17 Charter. 132 Art. 15(2) Charter. 133 Case C-426/11 Alemo-Herron v. Parkwood Leisure (ECJ 18 July 2013), Opinion of AG Cruz Villalón, para. 51. 134 Case 4/73 Nold v. Commission of the European Communities [1975] ECR 00985, para. 14. 135 Case 151/78 Sukkerfabriken v. Ministry of Agriculture [1979] ECR 00001, para. 20. 136 Art. 119 TFEU. 137 Case C-314/12 UPC Telekabel Wien v. Constantin Film (ECJ 27 March 2014), para. 49.

Page 31: Tilburg Law School - http

31

SABAM v. Netlog case, the Court emphasised that it can constitute a complex process that

requires an expensive system. The system leads, according to the Court, to a restriction of the

freedom to conduct business because it imposes an obligation to use a complicated, costly and

permanent system.138 An evidence for this is for example SoundCloud that implemented a

content recognition system by spending 5 to 10 million euros on the development of the system.

In addition to that, SoundCloud also employed 12 fulltime employees for the development of

that content recognition system. The use of such systems will lead to a large financial burden on

companies. Especially for smaller platforms, the use of those systems can form an attack on the

company’s activities. This is not in line with the ECJ’s view that compulsory measures,

including an obligation to check third party generated user’s content beforehand, should not be

too expensive.139

In the preliminary ruling procedure Scarlet SA v. SABAM, the ECJ answered the question of

whether the relevant EU legislation on intellectual property rights in the information society

interprets as precluding an order to an ISSP to put in place an electronic communications

filtering system to prevent the exchange of copyright infringing files. In doing so, the ECJ struck

a balance between the rights to property of persons affected by measures taken by an ISSP under

article 17, sub 2, of the Charter and the right to conduct business. The high costs of purchasing a

complex and expensive computer system in order to protect the copyright of rightholders is thus

a disproportionate balance with the right to conduct business. A court order to implement a

filtering system would not strike the right balance between the protection of copyright holders

and the right to freedom to conduct a business of ISSPs. A similar case is the UPC case, where

the ECJ had to strike a balance between the right to conduct business and the Internet users’ right

to freedom of information. The central question was whether ISSPs’ freedom to conduct business

precludes an order imposed on ISSPs to block its customers’ access to a website that has

copyright protected content online. The ECJ has confirmed that such an injunction does restrict

the right to conduct business since it obliges ISSPs to take measures. According to the ECJ, these

measures can have a major impact on ISSPs because they not only entail significant costs, but

138 Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012), para. 46. 139 Case C-324/09 L’Oréal v. eBay [2011] ECR I-06011, para. 139.

Page 32: Tilburg Law School - http

32

also require difficult and complex solutions. These solutions will have to be technical in nature

and have a major impact on the organisation and activities of an ISSP. However, the ECJ found

that there is no conflict with the essence of the right to conduct business. The ECJ wants to have

national rules for the ISSPs to be able to challenge the right to conduct business in the national

courts. In addition to that, the implementation of such systems is also in the interest of the ISSP

itself, according to the ECJ. This is because this way prevents (future) liability of the ISSP.

3.3.2. Freedom of expression and information

Furthermore, a content recognition system will be unable to distinguish between lawful and

unlawful content and can therefore potentially undermine the freedom of expression and

information.140 Freedom of expression and information is enshrined in article 11 of the Charter

and derived from article 10 ECHR. The provision is essential for the democratic EU and reads:

‘Everyone has the right to freedom of expression. This right shall include freedom to hold

opinions and to receive and impart information and ideas without interference by public

authority and regardless of frontiers’

The right includes the freedom to have ideas, the freedom to have an opinion and to express it to

others. This right, too, is not an absolute right and must be balances with other legitimate aims.

The content of the right can therefore be limited. However, there is no case law on how far this

right extends, but there is case law that balances other fundamental rights. A discussion of these

cases follows in the next paragraph.

An example where a restriction on the right to property was justified is the judgment of the

General Court (GC) of the ECJ in the FIFA cases.141 FIFA and UEFA had submitted to the GC

that the British and Belgian rules prohibiting exclusive television rights to certain events such as

the European Championships and World Championships would infringe the freedom to provide

140 Lilian Edwards (ed), The New Legal Framework for eCommerce in Europe, (Hart Publishing, Portland 2005), p. 74. 141 Case T-385/07 FIFA v. European Commission [2011] ECR II-00205 and Case T-68/08 FIFA v. European Commission [2011] ECR II-00349.

Page 33: Tilburg Law School - http

33

services and competition. FIFA and UEFA considered that not all events had a significant social

interest, as the GC claimed. The GC responded by saying that the broadcasting of an event based

on a substantial interest for society may result in it constituting an obstacle to the right to

property.142 The right to information was thus more important in this case than the right to

exclusive rights, which is the right to property. On the other hand, Advocate General (AG)

Jääskinen in the L’Oreal v. eBay case143 and the ECJ in the Telekabel Wien case144 are taking a

different approach in this. According to the AG’s opinion, freedom of expression and

information does not infringe intellectual property rights because the Charter protects intellectual

property rights too.145 In the Telekabel Wien case, the ECJ allows measures to block certain

content, if safeguards are in place.146 Notwithstanding the foregoing, in this case ECJ determines

that this should not affect users of the service who use the service in an appropriate manner.147

The cases concerned the blocking of websites instead of blocking files or texts themselves.

Despite the difference, it follows that a requirement prohibiting access to copyright protected

work is not unlawful with regard to the freedom of expression and information. Making a

balance between the different fundamental rights will lead to the prevention of an infringement,

together with the provision of guarantees for users. It is unclear whether there are measures in

place that can prevent an infringement of a copyright and at the same time do not affect freedom

of expression. Because automatic content recognition technologies cannot distinguish between

lawful and unlawful communication, the use of content recognition technologies will affect the

substance of the freedom of expression and a proportionate balance is missing.

3.3.3. Right to protection of personal data

Article 8 of the Charter governs the right to protection of personal data and reads as:

‘Everyone has the right to the protection of personal data concerning him or her.’

142 Case T-385/07 FIFA v. European Commission [2011] ECR II-00205, para. 143 and Case T-68/08 FIFA v. European Commission [2011] ECR II-00349, para. 139. 143 Case C-324/09 L’Oréal v. eBay [2011] ECR I-06011, Opinion of AG Jääsken. 144 Case C-314/12 UPC Telekabel Wien v. Constantin Film (ECJ 27 March 2014). 145 Case C-324/09 L’Oréal v. eBay [2011] ECR I-06011, Opinion of AG Jääsken, para. 158. 146 Case C-314/12 UPC Telekabel Wien v. Constantin Film (ECJ 27 March 2014), para. 47. 147 Ibid, para. 56.

Page 34: Tilburg Law School - http

34

According to the provision, processing of personal data is only possible when it is for specific

purposes and has a legitimate basis in the law. Under article 52 sub 1 of the Charter and article 8

sub 2 ECHR, the right to protection of personal data may be restricted if it protects the rights and

freedoms of others. The protection of personal data is also included in the GDPR since May

2018. This regulation is a very important source to get a clear understanding of the right to

protection of personal data.

Content recognition technologies are processing information from the uploader to identify

the content and the uploader himself. In both the SABAM cases, the ECJ stated that a filtering

system requires the ‘identification, systematic analysis and processing of information’ of users of

the service in question.148 Most ISSPs require you to enter an email address to create an account.

If in the future the user wants to put certain information online on the platform in question, it is

possible for the ISSP to use a filter system to link the uploaded information to the correct

account, and therefore also to the person behind it. Through the email addresses, ISSPs can

identify the user and therefore personal data is involved.149 It is also possible for an ISSP to find

out who put a file online without the user creating an account. ISSPs are able to store the IP

addresses of the visitors. Despite the fact that the ISSP cannot trace the person directly, the ECJ

determined that IP addresses could be qualified as personal data.150 One way or another, with IP

addresses you can identify users.151 Article 29 Working Party (WP), the Working Party on the

protection of individuals with regard to the processing of personal data, states that when ISSPs

process IP addresses to identify copyright infringers, the information regarding the IP addresses

is personal data since the addresses are unique identifiers.152 With the information, you can

identify each individual. It therefore qualifies as personal data processing.153 The use of CRTs

will probably lead to identification of users through the processing of IP addresses. The

processing needs to respect the principles for data processing and requires a legal basis.154

148 Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959, para. 51 and Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012), para. 49. 149 Art. 4 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (GDPR), OJ L119/1. 150 Case C-275/06 Promusicae v. Telefónica de España [2008] ECR I-00271, para. 45 and Case C-582/14 Patrick Breyer v. Bundesrepublik Deutschland (ECJ 19 October 2016), para. 49. 151 Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959, para. 51. 152 Art. 29 WP, ‘Opinion 4/2007 on the concept of personal data’ WP 136, p. 16. 153 Art. 4 GDPR. 154 Art. 5 and 6 GDPR.

Page 35: Tilburg Law School - http

35

A right balance is necessary between the right to property on the one hand, and the right to data

protection on the other. The first case in which the ECJ made a balance between these rights is

the Promusicae case.155 More specifically, the issue at stake in this case was the extent to which

ISSPs can be required to give identifying data of their users to copyright holders’ societies. A

Spanish Internet access provider, Telefónica, refused to disclose personal data of certain users to

Promusicae, a non-profit organisation of music producers and musical publishers. Promusicae

wanted this information in order to start civil proceedings against the persons who used a file

exchange program in which the Promusicae members owned the exploitation rights of the

program. The ECJ concluded that the Member States must take care of a fair balance between

the different fundamental rights.156 Member States are not required to oblige ISSPs to provide

personal data of the Internet user to third parties in the context of civil proceedings.157 However,

when striking the right balance between the different fundamental rights, the ECJ considers such

an obligation permissible. The ECJ does not give a clear direction to Member States and says

that Member States can come up with a solution themselves. In the similar Bonnier Audio case158,

the Swedish judge asked for a preliminary ruling from the ECJ. The applicants in this case are

publishers of audio books. These publishers own various audio books. An ISSP, called ePhone,

made these audio books accessible to the public by making a broadband connection available.

The applicants demanded the name and address details of the user of the broadband connection.

ePhone did not comply with this request, invoking the Data Retention Directive159. The ECJ

ruled that the Data Retention Directive did not prevent the disclosure of data of an infringing

user of a service.160 However, as in the Promusicae case, the ECJ does stress the need to strike

the right balance between the various interests. It is irrelevant whether a Member State has

actually implemented the Data Retention Directive.161 This case merely repeats and confirms the

Promusicae ruling. There is no clear direction given for Member States here either, and no 155 Case C-275/06 Promusicae v. Telefónica de España [2008] ECR I-00271. 156 Ibid, para. 68 and 70. 157 Ibid, para. 54 and 60. 158 Case C-461/10 Bonnier Audio v. Perfect Communication (ECJ 19 April 2012). 159 Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (Data Retention Directive), OJ L105/54. 160 Case C-461/10 Bonnier Audio v. Perfect Communication (ECJ 19 April 2012), para. 36, 55 and 56. 161 Ibid, para. 61 and 65.

Page 36: Tilburg Law School - http

36

solution is given in the event of a conflict between the right to protection of personal data on the

one hand and the right to property on the other. Another case where the battle with data

protection came to the fore is the Digital Rights Ireland case. It discussed the Data Retention

Directive and identified it as a serious invasion of privacy. The Directive requires

communication services to retain data relating to the privacy and communications of individuals.

The ECJ found that it exceeds the proportionality limit in article 52 of the Charter. As a result,

the Directive is ultimately declared invalid. The use of content recognition technologies can

therefore result in a violation of users’ privacy rights. If ISSPs want to limit liability and

automatically check content, there is a good chance that users’ privacy rights will be violated.

3.4. Fundamental restrictions

Art. 52(1) Charter sets out the scope of the fundamental rights in the Charter. In the Kjell

Karlsson case, the ECJ decided that ‘restrictions may be imposed on the exercise of fundamental

rights, in particular in the context of a common organisation of the market’.162 As discussed

above, the use of content recognition technologies may lead to an infringement of fundamental

rights. These infringements must meet cumulative requirements for a limitation to be justified.

Therefore, the requirements should all be met for a fair limitation.163 Any limitation on the

exercise of the rights and freedoms of the Charter must be provided by law and respect the

essence of those rights and freedoms. In addition to that, and subject to the principle of

proportionality, limitations may be made only if or when in need to protect the rights and

freedoms of others.164 The limitation must be provided by law, either by national law165 or by EU

legal acts166. The law should be accessible and foreseeable. An act is accessible if it is properly

published, for instance in the EU Official Journal. Foreseeability requires an act to be formulated

with sufficient precision to enable the individual to adapt his or her behaviour to the provided

provision. He or she must be able to foresee, to a reasonable degree, the consequences that an act

entails. The scope of any discretion conferred on the competent authorities implementing the law

162 Case C-292/97 Kjell Karlsson and others v. Sweden [2000] ECR I-02737, para. 45. 163 Paul Craig and Gráinne de Búrca, EU Law Text, Cases and Materials, (Oxford University Press Inc, New York 2011), p. 397. 164 Art. 52(1) Charter. 165 Case C-650/12 Thierry Delvigne v. Commune de Lesparre Médoc and Préfet de la Gironde (ECJ 6 October 2015), para. 47. 166 Case C-190/16 Werner Fries v. Lufthansa CityLine GmbH (ECJ 5 July 2017), para. 37; and Case C-601/15 J.N. v. Staatssecretaris van Veiligheid en Justitie (ECJ 15 Februari 2016), para. 51.

Page 37: Tilburg Law School - http

37

should also be indicated with sufficient clarity.167 By checking whether or not the essential

content168 of the right at issue is affected, it could be determined whether the limitation respects

the essence of the fundamental rights at issue. An example for this is the Schrems case.169 In this

case, there was an impairment of the essence of fundamental rights to privacy170 and the effective

judicial protection171. The ECJ considered that legislation not providing any possibility for an

individual to pursue legal remedies in order to have access to personal data relating to him, or to

obtain the rectification or erasure of such data, does not respect the essence of the right to

effective judicial protection.172

Furthermore, in order to ensure limitations are proportionate, the disadvantages of the

limitation must not be disproportionate to the aim, the general interest, pursued.173 The limitation

should not impose a disproportionate and excessive burden on the persons concerned by the

limitation in relation to the objective pursued.174 When there are several rights and fundamental

freedoms at issue, the assessment of the possible disproportionate nature of a provision must be

carried out with a view to reconciling the requirements of the protection of those different rights

and freedoms and a fair balance between them. 175 Measures may not exceed the limits of

appropriateness and necessity in order to attain the objectives legitimately pursued by the

legislation in question. When there is a choice between different appropriate measures, recourse

must be had to the least onerous, and the disadvantages caused must not be disproportionate to

the aims pursued.176 In the Sky Österreich case177, the question was about the necessity of the

measure limiting the fundamental right of intellectual property 178 . the ECJ ruled that Sky

167 Sunday Times v. United Kingdom (App no 6538/74) ECHR 26 April 1979, para. 49; and Malone v. United Kingdom (App no 8691/79) ECHR 2 August 1984, para. 68. 168 The ECJ also uses expressions like ‘actual substance’, ‘the very principle’ and ‘the very substance’; see for example Joined Cases C-379/08 and 380/08 Raffinerie Mediterranee and Others v. Ministero dello Sviluppo economico and Others (2010) ECR I-02007, para. 88. 169 Case C-362/14 Schrems v. Data Protection Commissioner (ECJ 6 October 2015). 170 Art. 7 Charter. 171 Art. 47 Charter. 172 Case C-362/14 Schrems v. Data Protection Commissioner (ECJ 6 October 2015), para. 94 and 95. 173 Joined Cases C-92/09 and C-93/09 Volker and Markus Schecke v. Land Hessen (2010) ECR I-11063, para. 76 and 77. 174 Case C-258/14 Eugenia Florescu and Others v. Casa Judeteaña de Pensii Sibiu and Others (ECJ 13 June 2017), para 58. 175 Case C-283/11 Sky Österreich v. Österreichischer Rundfunk (ECJ 22 January 2013), para. 60; and Case C-275/06 Promusicae v. Telefónica de España [2008] ECR I-00271, para. 65 and 66. 176 Case C-134/15 Lidl v. Freistaat Sachsen (ECJ 30 June 2016), para. 33; and Case C-283/11 Sky Österreich v. Österreichischer Rundfunk (ECJ 22 January 2013), para. 50. 177 Case C-283/11 Sky Österreich v. Österreichischer Rundfunk (ECJ 22 January 2013). 178 Art. 17 Charter.

Page 38: Tilburg Law School - http

38

Österreich, as exclusive broadcasting rightholder for Europa League soccer matches, must grant

the right to gain free access to the satellite signal to make short news reports of these matches.

Article 15(6) of the Audiovisual Media Services Directive179, obligating broadcasting providers

of giving other broadcasting providers access to material of high interest for the public without

being able to seek remuneration, was forming a limitation on the fundamental right. Although a

less restrictive measure could have been implemented, the provision of the Audiovisual Media

Services Directive was considered to be necessary.180 Nonetheless, the ECJ ruled in Tele2

Sverige that legislation is not justified when it exceeds the limits of what is strictly necessary.

The preventive measure in this case, the retention of traffic and location data for the purpose of

fighting serious crime, should be restricted to what is strictly necessary. Meaning that there

should be minimum safeguards in place with sufficient guarantees, while the legislation indicates

under what circumstances the data can be retained.181

3.5. Conclusion

As part of the Digital Single Market Strategy and to harmonise the current intermediary liability

system, the European Commission established a new EU Copyright Directive. The value gap

should be tackled with the new article 17 EU Copyright Directive. Large platforms such as

Google and Facebook will be subject to a different vertical liability system in two years' time.

Unless the ISSPs in question have licenses with rightholders, a pre-upload check will have to

take place in order to avoid liability. Given the impossibility to license all content, ISSPs are

forced to switch to CRTs not able to make a proper distinction between the unlawful use of

copyright-protected work and its use on the grounds of the copyright exceptions, such as the

right to parody or to criticize. CRTs will affect the right to conduct a business, the right to

freedom of expression and the right to protection of personal data.

179 Directive 2010/13/EU of the European Parliament and of the Council of 10 March 2010 on the coordination of certain provisions laid down by law, regulation or administrative action in Member States concerning the provision of audiovisual media services (Audiovisual Media Services Directive), OJ L95/1. 180 Case C-283/11 Sky Österreich v. Österreichischer Rundfunk (ECJ 22 January 2013), para. 57. 181 Joined Cases C-203/14 and C-698/14 Tele2 Sverige v. Post-och and Secretary of State (ECJ 21 December 2016), paras. 105, 106 and 107.

Page 39: Tilburg Law School - http

39

4. Intermediary Copyright Enforcement in the future

4.1. Introduction

From a policy perspective, the economic consequences of a mandatory provision imposing CRTs

must be taken into account. These techniques are not only entailing high costs that are

unsustainable for start-ups and small ISSPs, but are also having limited effectiveness as they are

easy to circumvent and not able to identify exemptions for using copyright protected material.182

Over the past five years, Europe has been working on the Digital Single Market mainly from an

economic perspective. One might wonder, however, whether we in Europe are now running up

against the purely economic limits. The European Parliament (EP) stresses that the limited

liability of intermediaries is essential to the protection of the openness of the internet,

fundamental rights, legal certainty and innovation. 183 In the previous Chapter, the friction

between the new EU Copyright Directive and fundamental rights in the EU was discussed. The

main problem following from that discussion, is the need to strike a proportionate balance

between the different rights at stake. It is a risk to rely on CRTs preventing copyright protected

works from uploading. For this reason, a number of suggestions are given hereafter that could

possibly be used to supplement or amend the new system. But firstly, we will explain why the

current horizontal system of the E-Commerce Directive is outdated. This is contrary to the EP’s

opinion, considering the E-Commerce Directive to be future-proof and technologically neutral.184

After discussing the necessary vertical liability system and the need for a fair balance assessment,

different copyright enforcement systems are suggested in order to come to an appropriate

copyright enforcement system in the future legal framework.

4.2. Vertical intermediary liability approach

The current horizontal approach used in the European legal framework is outdated. This system

uses a one-size-fits-all solution, leading to the main use of the NTD procedure regarding

copyright infringements. With the new EU Copyright Directive entering into force, the

intermediary liability system is slowly changing towards a vertical system. Given the

182 Giuseppe Colangelo and Mariateresa Maggiolino, ‘ISPs’ Copyright Liability in the EU Digital Single Market Strategy’ (2017) International Journal of Law and Information Technology, p. 10. 183 European Parliament, ‘Towards a Digital Single Market Act’ (2016) Resolution C11/55, para. 73. 184 Ibidem.

Page 40: Tilburg Law School - http

40

jurisprudence and the emphasis of both the ECJ and the ECtHR on the need to strike a fair

balance between the rights at stake, a calibrated system would be more appropriate. The case law

shows that a fair balance is the judicial tool for assessing fundamental rights clashes. There are

two reasons for this. The ECJ has indicated that intermediary liability cases are not about a

conflict between absolute rights, but between rights of a relative nature. The rights in question

can be limited by countervailing rights.185 The ECtHR complemented this by saying that there is

no hierarchy between the different relative fundamental rights. These rights should be treated

equally.186 Although the current system is horizontal in nature, it follows from European case

law that there is a great need for more flexibility with regard to intermediary liability. A solution

lies in a legal system in which the changing circumstances and the appropriate jurisdiction, in

this case intellectual property law, are taken into account in the assessment of potential liability

for hosting providers with regards to user generated content. With the renewal of the rules on the

liability of intermediaries, the EU has chosen a path towards a vertical system. This is a good

development because, in view of the aforementioned fair balance test, the current horizontal

system is obsolete. The question that follows is the kind of copyright enforcement system would

best fit into the vertical legal system and whether the new EU Copyright Directive fits into the

ideal system. The current EU legal system already provides some guidance on the legal system

that can strike a balance between the different rights and interests of the parties involved in

relation to intermediary liability. For example, the E-Commerce Directive187 and the case law of

the ECJ188 have shown that a general monitoring obligation on intermediaries is not able to lead

to a fair balance of fundamental rights.

4.2.1. Fair balance test

The solution for intermediary liability must be found in the theory of fair balance, because the

highest European courts rely on it again and again. Despite the fact that case law speaks of the

need for a fair balance, these judgments are also criticised. In some judgments the courts are

vague and give little meaning to the legal system of intermediary liability. In the important

185 Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012), para. 41-43 and Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959, para. 43 and 44. 186 Delfi AS v. Estonia (App no 64569/09) ECHR 16 June 2015, para. 138 and 139. 187 Art. 15 E-Commerce Directive. 188 Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959, para. 48; Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012), para. 50; and Case C-314/12 UPC Telekabel Wien v. Constantin Film (ECJ 27 March 2014), para. 47.

Page 41: Tilburg Law School - http

41

Promusicae case discussed in Chapter 3, the ECJ determined that it is up to the Member States to

find a fair balance between different conflicting fundamental rights.189 In addition, there is

criticism in the literature on rulings in which the fair balance between the different rights is

constantly being invoked without giving a clear explanation of the concept fair balance in any

case, so that the concept remains an empty slogan.190 The concept of fair balance is, without

further explanation, vacuous and unhelpful. 191 The fair balance tool in key jurisprudence

determining intermediary liability is therefore the main reason for opting for a vertical system, as

it means that different actions cannot be assessed by a single system to determine possible

liability of the intermediary. The ECJ has previously ruled in the Telekabel Wien case that

safeguards should be put in place that contribute to a fair balance of the different rights and

interests of the different parties. All the parties have to accept that not all fundamental rights can

be fully defended because there are different parties involved, such as the users, the provider, the

rightholders and third parties. Respecting a balance between the different interests and rights

means that the measures taken to avoid liability should avoid unnecessary infringement of

fundamental rights.192 The ECJ has imposed on the ISSP the obligation to strike a balanced

balance in this case.193 As a result, contrary to the principle that human rights duties are intended

for the Member States themselves194, the intermediary has been given the duty by the ECJ itself

to make a fair balance of interests. Member States cannot escape from the obligation to strike a

fair balance by giving the obligation to the ISSPs.195 An absolute immunity for ISSPs cannot be

given. The very substance of the fundamental rights should be kept in place196 and a balance

must be struck that retains the essence of the fundamental rights.197

Following case law, it is difficult to formulate a clear meaning for this fair balance because

it has a changing character in view of changing circumstances and social developments. In the 189 Case C-275/06 Promusicae v. Telefónica de España [2008] ECR I-00271, para. 68. 190Tuomas Mylly, ‘The Constitutionalization of the European Legal Order: Impact of Human Rights on Intellectual Property in the EU’ in Christophe Geiger (ed), Research Handbook on Human Rights and Intellectual Property (Edward Elgar Publishing, Cheltenham 2015), p. 130. 191 Jonathan Griffiths, ‘Constitutionalising or Harmonising? The Court of Justice, the Right to Property and European Copyright Law’ (2013) European Law Review 38, p. 72. 192 Case C-314/12 UPC Telekabel Wien v. Constantin Film (ECJ 27 March 2014), para. 64. 193 Ibid, para. 55-64. 194 David Harris (ed), Law of the European Convention on Human Rights (Oxford University Press, Oxford 2014), p. 23. 195 Fanny Coudert and Evi Werkers, ‘In the Aftermath of the Promusicae Case: How to Strike the Balance?’ (2010) International Journal of Law and Information Technology 18, p. 71. 196 Case C-314/12 UPC Telekabel Wien v. Constantin Film (ECJ 27 March 2014), para. 51. 197 Delfi AS v. Estonia (App no 64569/09) ECHR 16 June 2015, para. 110.

Page 42: Tilburg Law School - http

42

L’Oreal v. eBay case198, the ECJ ruled that ISSPs may be subject to infringements of intellectual

property rights, in this case trademarks. This is regardless of the liability that already rests on

these ISSPs. The injunctions issued in that case must be ‘effective and dissuasive’ and the

national rules applicable to it must be ‘designed in such a way that the objective pursued by the

Directive may be achieved’. 199 At the same time, the measures imposed should be ‘fair,

proportionate and not prohibitively expensive’. 200 They must also ‘not create barriers to

legitimate trade’.201 For an explanation of the fair balance between different rights and interests,

the Promusicae judgment can be relevant.202 There was a conflict between fundamental rights to

property and the right to effective judicial protection on the one hand and the protection of

personal data and private life on the other. In doing so, the ECJ has provided that ‘the authorities

and courts of the Member States must not only interpret their own national law in a manner

consistent with (the European) directives but also make sure that they do not rely on an

interpretation of them which would be in conflict with those fundamental rights or with the other

general principles of Community law, such as the principle of proportionality’.203

4.3. Compatible copyright enforcement system

The ECtHR has already given an opinion in important court cases in which it indicates that the

NTD procedure is a system that in many cases could be an appropriate tool to weigh up different

rights and interests, if accompanied by effective procedures allowing for rapid response.204 A

NTD system, which is now the main actor in the horizontal liability regime, could lead to the

required balance being struck if it could be applied quickly. As described earlier, such a system

is a low-cost solution, but there is a good chance, particularly in the field of copyright, that

dubious notices can be sent to the hosting provider.205 The ISSP then has little motivation to

defend or challenge the rights of users and may suffer a major disadvantage if such notices are

198 Case C-324/09 L’Oréal v. eBay [2011] ECR I-06011. 199 Ibid, para. 136. 200 Ibid, para. 139. 201 Ibid, para. 140. 202 Case C-275/06 Promusicae v. Telefónica de España [2008] ECR I-00271. 203 Ibid, para. 68 and 70. 204 Delfi AS v. Estonia (App no 64569/09) ECHR 16 June 2015, para. 159 and Magyar Tartalomszolgáltatók Egyesülete (MTE) & Index v. Hongary (App no 22947/13) ECHR 2 Februari 2016, para. 91. 205 Wendy Seltzer, ‘Free Speech Unmoored in Copyright’s Safe Harbor: Chilling Effects of the DMCA on the First Amendment’ (2010) Harvard Journal of Law & Technology 24, p. 178.

Page 43: Tilburg Law School - http

43

ignored. This will lead to the follow-up of the messages of the rightholders and therefore the

content will usually be removed, without a fair balance of the different rights and interests.206

The use of CRTs prior to uploading will lead to a continuous discussion about the

definition of ‘reasonable’. Ultimately, the decision will be left to national courts to determine

what can reasonably be expected from ISSPs. The new EU Copyright Directive does not provide

much guidance on this. However, if we look at the jurisprudence already discussed, there are a

few things that can be noted in this respect. After all, ISSPs are already obliged to, if necessary

in the context of other fundamental rights, cooperate with the relevant rightholders.207 A strict

monitoring obligation which is unfair, disproportionate or costly, cannot be compulsory.208 If

they interfere too much with the content online, a direct infringement with full liability will

result.209 Nevertheless, ISSPs will have to take all possible measures. In doing so, they have to

ensure that the measures do not unnecessarily deprive internet users of the possibility of lawfully

accessing information. The measures should have the effect of preventing unauthorised access to

the protected subject-matter. Or the measures should, at least, discourage ISSPs’ users from

accessing the subject-matter that has been made available to them in breach of the copyright.210

The result will be, despite the new EU Copyright Directive, an endless discussion about of what

can ‘reasonably’ be expected from ISSPs. 211 Should ISSPs share and pay their revenues,

including through advertisements, to the rightholders, or will they have to choose to take

preventive measures by means of CRTs? And not only will that be a discussion point. If ISSPs

choose to block and remove content, there has to be a fair balancing test with the fundamental

rights at stake and the balancing act cannot be done by a computer itself.

There should be better rules on the problems arising from the use of CRTs by ISSPs. For

example, the new EU Copyright Directive does not contain any rules on the protection of

personal data in the event of unnecessary processing of personal data. But even if such

procedures were harmonised, there is a good chance that a harmonised procedure should also be

206 Ibid, p. 205 an 206; and Gregory R. Hagen, ‘Modernizing ISP Copyright Liability’ in Michael Geist, From ‘Radical Extremism’ to ‘Balanced Copyright’: Canadian Copyright and the Digital Agenda (Irwin Law, Toronto 2010), p. 638. 207 Case C-275/06 Promusicae v. Telefónica de España [2008] ECR I-00271, para. 70. 208 Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012), para. 34 and Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959, para. 36. 209 Case C-610/15 Stichting Brein v. Ziggo (ECJ 14 June 2017), para. 47. 210 Case C-314/12 UPC Telekabel Wien v. Constantin Film (ECJ 27 March 2014), para. 63. 211 Dirk J.G. Visser, ‘Trying to understand article 13’ (2019) SSRN, p. 11.

Page 44: Tilburg Law School - http

44

called into question. An example of this is the Lenz case in the US212, where a NTD system is

harmonised by law213. Lenz uploaded a video of her dancing son to a Prince song, which lasted

less than half a minute. Universal Music was the rightholder of this music and sent a notice to

YouTube. Lenz protested because she felt that the use of the music amounted to fair use. In this

situation, the central question was whether one could require copyright holders to check for

themselves whether or not using the music falls under the provision of fair use. According to the

judge, it is not too much to ask the rightholder to decide for himself whether or not there is fair

use. In addition to that, a solution should be offered to the potential conflict between other

fundamental rights. A human person should be included to carry out a kind of a ‘second opinion’

on files identified as infringing content. A human being can then determine whether the

infringement has actually taken place. By motivating blocking or removing decisions and with

implementing redress mechanisms, it will increase the trust and reduce the imbalance between

the parties. A useful addition to this is enabling users to require intermediaries to reconsider their

decision in the context of a fair trial. This means that providers have to come up with more

elements in order to remove alleged infringing content and users have sufficient rights to

challenge the intermediaries’ decisions to remove or block content. This would prevent

intermediaries from casually removing content to avoid liability and simply always trust the

CRTs or algorithms.

4.4. Notice and Action

The main problem will be the need to strike a proportionate balance between the different rights

at stake. It is a risk to rely on the technique itself. For this reason, a number of suggestions are

given that could possibly be used to supplement or replace the new EU Copyright Directive. In

the current system, the ISSP has one option after a notification; taking it down. In the vertical

legal system, the ISSP has distinct actions which it can adjust to the relevant information and

legal system in question, thus enabling it to better meet the requirement of a fair balance.

212 Lenz v. Universal Music Corp., 801 US F.3d 1126 (2015). 213 Art. 512(c)(1) DMCA.

Page 45: Tilburg Law School - http

45

4.4.1. Notice and Notice System

The first suggestion to the problem could be a so-called Notice and Notice (NN) system, already

implemented in Canada in 2012 with the aim of addressing copyright infringements while

protecting the interests of the platform users.214 The NN system differs in an important point

from the NTD system because the ISSP is not required to act quickly and remove or block the

alleged infringing content on the platform. The NN system is a good solution to the current

problem and avoids a major burden for intermediaries. The system can make sure that ISSPs are

not inclined to remove the content immediately after each notice in order to avoid liability. The

rightholder on a particular work sends a notice of an alleged infringement to the ISSP,

designating the person who committed the alleged infringement on the platform. This obliges the

ISSP to forward the notice to this alleged infringer electronically and to inform the rightholder of

this forwarding. The user who, according to the owner of the copyright, commits the alleged

infringement, is not obliged to respond to such a notification. Such a notification does not

necessarily mean that an actual infringement has taken place. The intermediaries keep the user’s

data for six months after the notification of the infringement. This period extends to a period of

one year if the rightholder decides to take legal action in the meantime. The ISSP cannot share

the data of the rightholder himself, unless the rightholder has a court order to do so.215 However,

the advantage is the system allowing individuals to take down content without initiating court

proceedings. This can be effective for the younger users, not always being aware of their illegal

actions.216 The focus is no longer on the intermediary involved, but on the person who actually

committed the infringement. Self-regulation, the great danger with the use of content recognition

systems, is moderated by such a procedure and the enforcement can eventually take place

through the courts. In addition, ISSPs will fall into their natural role of an intermediary and the

system will meet the threshold of the Telekabel Wien case, namely that it serves a discouraging

purpose.217

214 Section 47 Canadian Copyright Modernisation Act (CCMA) of 29 June 2012 amending the Canadian Copyright Act, S.C. 2012 c. 20. 215 Federica Giovanella, ‘Online Service Providers’ Liability, Copyright Infringement and Freedom of Expression: Could Europe Learn from Canada?’ in Mariarosaria Taddeo and Luciano Floridi (eds), The Responsibilities of Online Service Providers (Springer International Publishing, Cham 2017), p. 234-237. 216 Zingales N., ‘Internet Intermediary Liability: Identifying Best Practices for Africa’ (2013) Association for Progressive Communications, p. 20 and 21. 217 Case C-314/12 UPC Telekabel Wien v. Constantin Film (ECJ 27 March 2014), para. 62.

Page 46: Tilburg Law School - http

46

4.4.2. Notice Wait and Take Down System

ISSPs will probably feel compelled by the use of content recognition technologies to use extra

caution in order to avoid liability. Also, claims will not always be clear and a NTD system will

often rely on a notice without further investigation. A system that uses a moment of reflection

seems to be very suitable for reaching a compromise and a balance of interests. The Notice Wait

and Take Down (NWTD) system is a softer form of the NTD system and is already playing a

major role in Japan.218 The system requires ISSPs to pass on any notification of the alleged

infringement to the person who uploaded the content online. If the uploader does or does not

agree to the notification or if it does not respond, the ISSP may take the content offline.219 In this

way, the user is given the opportunity to react before immediately blocking the content. The

system will limit the removal of lawful, non-infringing material. It also gives the uploaders a

chance to respond to it, which can prevent legal proceedings. The NWTD system is even being

distributed in Europe. For example, the British defamation law of 2013 already includes a similar

approach that applies to website operators.220 Contrary to the horizontal Japanese approach, these

rules are only limited to defamation. In Lithuania, a system has also been implemented whereby

the legal obligations for the ISSP remain in place. For example, a slightly modified system has

been introduced in Lithuania. Users only have three days to reply, but the ISSP has thereby the

authority to ask for an opinion from the relevant control body before verifying the validity of a

justification provided by the user.221

Judgments making clear that the NWTD system can be an outcome, are the European

Court of Human Rights (ECtHR) Delfi v. Estonia case222 and MTE v. Hungary case223. These

cases were about ISSPs’ liability for defamatory content, posted by users under news articles on

their ISSPs’ platform. Despite the fact that these cases were not about copyright liability and that

there are differences with the ECJ’s rulings, a balance of interests is weighed up and a fair 218 Art. 3(2)(ii) Japanese Act on the Limitation of Liability for Damages of Specified Telecommunications Service Providers and the Right to Demand Disclosure of Identification Information of the Senders of 30 November 2001, unofficial translation available at <http://www.japaneselawtranslation.go.jp/law/detail/?id=2088&vm=04&re=02>. 219 Jeremy de Beer and Christopher D. Clemmer, ‘Global Trends in Online Copyright Enforcement: A Non-Neutral Role for Network Intermediaries?’ (2009) Jurimetrics 49(4), p. 387 and Nicolo Zingales, ‘Internet Intermediary Liability: Identifying Best Practices for Africa’ (2013) Association for Progressive Communications, p. 18. 220 The UK Defamation (Operations of Websites) Regulations of 2 December 2013, Statutory Instruments 2013/3028. 221 Nicolo Zingales, ‘Internet Intermediary Liability: Identifying Best Practices for Africa’ (2013) Association for Progressive Communications, p. 18. 222 Delfi AS v. Estonia (App no 64569/09) ECHR 16 June 2015. 223 Magyar Tartalomszolgáltatók Egyesülete (MTE) & Index v. Hongary (App no 22947/13) ECHR 2 Februari 2016.

Page 47: Tilburg Law School - http

47

balance is sought between fundamental rights in the context of infringing user generated content.

The ECtHR believes that this balance extends to different areas of law. All data subjects’ rights

are therefore relevant to the scope of the measures that can be imposed on ISSPs. The ECtHR

has also opted for a more structured approach in these rulings, including four specific factors: the

context of the content, the measures taken by the ISSPs, the liability of the actual uploader’s

content, ant the consequences for the platform or the victim. Despite the application of the same

factors, the ECtHR came to different judgments. In the Delfi case, the news site Delfi was held

liable for the comments and the site had to proactively remove them. In the MTE case, however,

the ECtHR decided otherwise and ruled that allowing unfiltered comments could not be a reason

to hold the site liable, even if the site should have realised that the comments might be unlawful.

According to the ECtHR, such a rule would undermine the freedom to provide information on

the internet. These statements about similar situations therefore show that the search for a fair

balance between fundamental rights is subject to change and that a suitable solution must be

found. Nevertheless, the cases are providing points of departure for determining when an ISSP

should be held liable for unlawful user generated content. A NWTD system therefore seems,

partly on the basis of these matters, to be the right alternative and can introduce a moment of

reflection. With this, a compromise can be reached by persons having the opportunity to respond.

4.4.3. Notice and Stay Down system

The Notice and Stay Down (NSD) system can ensure that an ISSP not only deletes or blocks the

information for which a rightholders’ notice has been sent, but will also take additional measures.

For example, the ISSP can use such a system to prevent the information from being re-posted by

a user. This system is already very popular in Germany and in France there are positive reactions

on the system.224 In fact, it is already been discussed by the EC in the run-up to the new EU

Copyright Directive.225 However, one could say that despite the great advantage of such a system

ensuring an appropriate balance, it will give an enormous burden to ISSPs. It will also ensure

that taking illegal information offline requires the filtering of the entire content. Just as the use of

CRTs for prior checking, the NSD system can lead to a violation of fundamental rights and will

impose a burden on ISSPs.

224 Christina Angelopoulus, ‘Beyond the Safe Harbours: Harmonising Substantive Intermediary Liability for Copyright Infringement in Europe’ (2013) Institute for Information Law 11, p. 24. 225 European Commission, ‘Towards a Modern, More European Copyright Framework’, COM (2015) 626 final.

Page 48: Tilburg Law School - http

48

4.5. Conclusion

The interfaces with different fundamental rights require a fair balance between blocking

information by CRTs and the possible infringement of other fundamental rights that may result

from it. The jurisprudence at the highest European levels tells us that the ultimate judicial tool is

a fair balance between the different fundamental rights. A vertical system is necessary. More

regulation is needed regarding a clear detailed and appropriate copyright enforcement system

that can weigh up different interest. A first suggestion would be the NN system in which the

ISSP is free of self-regulation. However, given the conclusion that the ISSP should carry some

responsibility, this is not the right system in a vertical framework. A second possibility is the

NWTD system. This is comparable to the NTD procedure, but ensures that a moment of

reflection takes place and that a notification is not followed up by the ISSP without a substantive

assessment. The final suggestion lies in the NSD system. It is similar to the NTD procedure but

the ISSP can put an addition in place by using CRT to prevent a similar upload of a person in the

future, once it is clear that it is an infringement. A combination of the latter two seems to be the

most appropriate solution. In this way, fundamental rights are not directly affected, there is a

moment of reflection and the technology can be used to assess the large amount of data and to

promote speed.

Page 49: Tilburg Law School - http

49

5. Conclusion The hosting provider falls under the definition of an Internet Society Service Provider (ISSP) and

is normally provided for remuneration, at a distance, by electronic means and at the individual

request of a recipient. The growing importance of hosting providers, such as YouTube and

Facebook, and the amount of information and data on them, leads to difficulty for creators of

copyright protected work to enforce or license their rights and seek remuneration for it.

Revenues generated from copyright protected content are unfairly distributed between the

different players, defined as the value gap. Hosting providers are now covered by the horizontal

legal system with a one-size-fits-all solution, whereby, independently of the jurisdiction in

question, the provider is only liable of copyright infringements if it. This leads to the main use of

the Notice and Take Down (NTD) system. As soon as a notification of a potential copyright

infringement is sent to the hosting provider, the provider has actual knowledge and cannot rely

on the liability exemption deriving from article 14 E-Commerce Directive anymore. Many

notifications, even dubious, are sent because the hosting provider will often remove the

information immediately without further assessment or weighing the interest and rights at stake

in order to avoid liability. This current legal intermediary liability framework is therefore,

together with the need to tackle the value gap, subject to lots of discussed modifications and

moving to a vertical liability system. This will result in the use of content recognition

technologies (CRTs) using a database to check online content. The computer will be able to

recognise the information immediately and will remove or block the information on the basis of

a possible recognition. Different types of CRTs can be used. A digital watermark gives

information a unique brand, requiring a certain not standardised key to understand it. The digital

fingerprinting technique recognises characteristics of the information in a standardised way.

Looking at case law and the various techniques to prevent liability for copyright infringements,

suggestions are made in this study to arrive at assessing the new framework regarding

intermediary liability and come up with the right copyright enforcement system.

As part of the Digital Single Market Strategy and to harmonise the current intermediary

liability system, the European Commission established a new EU Copyright Directive. The value

gap should be tackled with the new article 17 EU Copyright Directive. Large platforms like

Google and Facebook will be subject to a different liability system in two years time. If there is

content on their platform that is protected by copyright, they are liable. In contrast to the current

Page 50: Tilburg Law School - http

50

system, this is a major change. An important element, that the hosting provider must have

knowledge of the alleged infringement, is thus removed. Unless the ISSPs in question have

licenses with rightful claimants, a pre-upload check will take place in order to avoid liability.

Given the impossibility to license all content, ISSPs are forced to switch to CRTs. However, the

use of CRTs in the new vertical system does have many drawbacks. For example, an ISSP will

take too much rather than too little information offline and it is difficult to appeal against the

blocking or deleting as a user. A few examples of the use of YouTube's Content ID system show

that it is impossible for CRTs to make a proper distinction between the unlawful use of copyright

protected work and the use of copyright protected work on the grounds of the exceptions, such as

the right to parody.

CRTs will affect the right to conduct a business. Licenses are needed, which will give the

rightholders a lot of influence and offer them the opportunity to set high standards. Together with

the high costs of implementing such a system, the freedom to start a business will be limited. As

the ECJ also indicated in the L'Oreal v. eBay case, mandatory measures should not be expensive.

It will also be possible to restrict the freedom of expression right. Information cannot be shared

through multiple channels, people will be restricted in their freedom of choice and ISSPs can

decide what information will be showed. Even if someone wants to give an opinion about

copyright protected work, the computer will often not be able to distinguish the difference

between the right to give your opinion and an infringement of the work. And finally, the right to

protection of personal data may be in danger with the use of CRTs. In the SABAM cases, the

ECJ stated that the use of filtering techniques requires identification and analysing all content in

order to avoid copyright liability. The uploaded content can be identified via the account of the

uploader itself.

The interfaces with different fundamental rights require a proper balance between the

blocking of information by CRTs and the possible infringement of other fundamental rights that

may result from it. The jurisprudence at the highest European levels tells us that the ultimate

judicial tool is a fair balance between the different fundamental rights. In view of this, the

horizontal system is obsolete. A copyright enforcement system that can move with new

circumstances and technological changes that can be weighed up, is therefore necessary. The

NTD system is not an appropriate system in view of the abuse and inertia. The prior blocking of

content by CRTs is also considered undesirable. It is impossible for an ISSP to be the one who

Page 51: Tilburg Law School - http

51

decides what will or will not come online by means of a computer. That is why more regulation

is needed regarding a clear and appropriate copyright enforcement system. A first suggestion

would be that a Notice and Notice (NN) system in which the ISSP is free of a duty of care with

regard to a necessary balancing of interests. The rightsholder sends a notification which is

forwarded to the uploader. As a result, self-regulation by ISSPs has been prevented and hosting

providers fall into their natural role, whereby users will be discouraged from committing a

copyright infringement. A second possibility is the Notice Wait and Take Down (NWTD) system.

This is comparable to the NTD procedure, but ensures that a moment of reflection takes place

and that a notification is not followed up by the ISSP without a substantive assessment. As a

result, the user will not be restricted in his freedom to upload information and has the

opportunity to respond to this. This will prevent the rightholders from gaining a dominant

position in the vertical legal system. And a final suggestion lies in the Notice and Stay Down

(NSD) system. The ISSP can use the use of a CRT to prevent a similar upload of a person in the

future, once it is clear that it is an infringement.

In conclusion, a hosting provider will have to be partly responsible for the content online

because it generates revenue, partly belonging to the rightholders. A vertical liability system is

necessary, but given the infringement of fundamental rights and the practical consequences of

CRTs checking and blocking content before it is uploaded, it is undesirable. As long as the

technology does not work optimally, the new EU Copyright legislation should be amended and a

less intrusive copyright enforcement system should be chosen. A fair balance can be sought in a

system in which a moment of reflection takes place in order to assess whether or not a certain

right should be restricted. A combination of the NWTD and the NSD procedure is therefore

desirable. In this way, technology can help to ensure that the large amounts of information can be

assessed and that there is speed in the removal of other infringements, without forgetting to

weigh up the interests at stake.

Page 52: Tilburg Law School - http

52

Bibliography

Literature

Angelopoulus C. (2013)

Angelopoulus C., ‘Beyond the Safe Harbours: Harmonising Substantive Intermediary Liability

for Copyright Infringement in Europe’ (2013) Institute for Information Law 11.

Angelopoulus C. (2016)

Angelopoulus C., ‘EU Copyright Reform: Outside the Safe Harbours, Intermediary Liability

Capsizes into Incoherence’ (2016) Kluwer Copyright Blog

<http://copyrightblog.kluweriplaw.com/2016/10/06/eu-copyright-reform-outside-safe-harbours-

intermediary-liability-capsizes-incoherence/> accessed 2 April 2019.

Angelopoulus C. (2016)

Angelopoulos C., ‘European intermediary liability in copyright: A tort-based analysis’ (2016)

UvA Digital Academic Repository.

Beer de J. and Clemmer C.D. (2009)

Beer de J. and Clemmer C.D., ‘Global Trends in Online Copyright Enforcement: A Non-Neutral

Role for Network Intermediaries?’ (2009) Jurimetrics 49(4).

Belli L. and Bergen van M. (2013)

Belli L. and Bergen van M., ‘Protecting Human Rights through Network Neutrality: Furthering

Internet Users’ Interest, Modernising Human Rights and Safeguarding the Open Internet’ (2013)

CDMSI Misc 19.

Boroughf B. (2014)

Benjamin Boroughf, ‘The Next Great YouTube: Improving Content ID to Foster Creativity,

Cooperation, and Fair Compensation’ (2014) Albany Law Journal of Science and Technology

Page 53: Tilburg Law School - http

53

Colangelo G. and Maggiolino M. (2017)

Colangelo G. and Maggiolino M., ‘ISPs’ Copyright Liability in the EU Digital Single Market

Strategy’ (2017) International Journal of Law and Information Technology.

Coudert F. and Werkers E. (2010)

Coudert F. and Werkers E., ‘In the Aftermath of the Promusicae Case: How to Strike the

Balance?’ (2010) International Journal of Law and Information Technology 18.

Civolution (2012)

Civolution, ‘Automated Content Recognition: creating content aware ecosystems’ (2012)

Civolution <http://www.csimagazine.com/csi/whitepapers/ACR%20Creating%20%20content-

aware%20ecosystems%20-Civolution%20White%20Paper%20-%20Sept%202012.pdf>

accessed 2 April 2019.

Craig P. and De Búrca G. (2011)

Paul Craig and Gráinne de Búrca, EU Law Text, Cases and Materials (Oxford University Press

Inc, New York 2011), p. 397.

Collins H. (2004)

Collins H. (ed), The forthcoming EC Directive on Unfair Commercial Practices (Kluwer Law

International 2004).

DLA Piper (2009)

DLA Piper, ‘EU Study on the Legal Analysis of a Single Market for the Information Society;

new rules of a new age?’ (2009)

<http://ec.europa.eu/information_society/newsroom/cf/document.cfm?doc_id=842> accessed 15

May 2019.

Edwards L. (2005)

Edwards L. (ed), The New Legal Framework for e-commerce in Europe (Hart Publishing,

Portland 2005).

Page 54: Tilburg Law School - http

54

Edwards L. (2009)

Edwards L., ‘The Fall and Rise of Intermediary Liability Online’ in Edwards L. and Waelde C.

(eds), Law and the Internet (Hart Publishing, Portland 2009).

Edwards L. (2011)

Edwards L., ‘Role and Responsibility of Internet Intermediaries in the field of Copyright and

Related Rights’ (2011) WIPO.

Frosio G.F. (2016)

Frosio G.F., ‘From horizontal to vertical: an intermediary liability earthquake in Europe’ (2016)

JIPLP 12(7).

Giovanella F. (2017)

Giovanella F., ‘Online Service Providers’ Liability, Copyright Infringement and Freedom of

Expression: Could Europe Learn from Canada?’ in Taddeo M. and Floridi L. (eds), The

Responsibilities of Online Service Providers (Springer International Publishing, Cham 2017).

Griffiths J. (2013)

Jonathan Griffiths, ‘Constitutionalising or Harmonising? The Court of Justice, the Right to

Property and European Copyright Law’ (2013) European Law Review 38.

Guibault L. and Helberger N. (2005)

Guibault L. and Helberger N., ‘Copyright Law and Consumer Protection’ (2005) European

Consumer Law Group Brussels 035(05).

Hagen G.R. (2010)

Hagen G.R., ‘Modernizing ISP Copyright Liability’ in Geist M., From ‘Radical Extremism’ to

‘Balanced Copyright’: Canadian Copyright and the Digital Agenda (Irwin Law, Toronto 2010).

Page 55: Tilburg Law School - http

55

Harris D. (2014)

Harris D. (ed), Law of the European Convention on Human Rights (Oxford University Press,

Oxford 2014).

Helberger N. and others (2009)

Helberger N. and others, ‘Legal Aspects of User Created Content’ (2009) IViR.

Herre J. (2003)

Herre J., ‘Content based identification (fingerprinting)’ in Becker E. and others (eds), Digital

Rights Management: Technological, Economic, Legal and Political Aspects (Springer Verlag,

Berlin Heidelberg 2003).

Husovec M. (2017)

Husovec M., ‘Holey cap! CJEU Drills (yet) Another Hole in the E-Commerce Directive’s Safe

Harbors’ (2017) JIPLP.

Kuczerawy A. (2018)

Kuczerawy A., ‘EU Proposal for a Directive on Copyright in the Digital Single Market:

Compatibility of Article 13 with the EU Intermediary Liability Regime’ (2018) Centre for IT &

IP Law (CiTiP).

Katzenbeisser S., Liu L. and Steinebach M. (2012)

Katzenbeisser S., Liu L. and Steinebach M., ‘Challenges and Solutions in Multimedia Document

Authentication’ in Information Resources Management Association, Digital Rights Management:

Concepts, Methodologies, Tools and Applications (IGI Publishing, Hershey 2012).

Kleinschmidt B. (2010)

Kleinschmidt B., ‘An International Comparison of ISP’s Liabilities for Unlawful Third Party

Content’ (2010) International Journal of Law and Information Technology 18(4).

Page 56: Tilburg Law School - http

56

Kudrle S. (2014)

Kudrle S., ‘Media Fingerprinting: Managing Content, Security and Quality’ (2014) Grass Valley

<https://www.grassvalley.com/docs/WhitePapers/purple/GVB-1-0283A-EN-

WP_Media_Fingerprinting.pdf> accessed 2 April 2019.

Lai J.C. and Graber C.B. (2015)

Lai J.C. and Graber C.B., ‘Is Digital Text-Watermarking the Long-Desired User Friendly Digital

Rights Management? Copyright and Fundamental Values from a Comparative Perspective’

(2015) i-call Working Paper 2.

Lemly M.K. (2002)

Lemly M.K., ‘Protecting Consumers from Themselves: Alleviation the Market Inequalities

Created by Online Copyright Infringement in the entertainment industry’ (2002) Albany Law

Journal of Science & Technology 13.

Lenaerts K. (2012)

Lenaerts K., ‘Exploring the Limits of the EU Charter of Fundamental Rights’ (2012) European

Constitutional Law Review 8(3).

Lev-Aretz L. (2012)

Yafit Lev-Aretz, ‘Second Level Agreements’ (2012) Akron Law Review 45.

Lu C. (2005)

Lu C. (ed), Multimedia Security: Steganography and Digital Watermarking Techniques for

Protection of Intellectual Property (IGI Publishing, London 2005).

Mylly T. (2015)

Mylly T., ‘The Constitutionalization of the European Legal Order: Impact of Human Rights on

Intellectual Property in the EU’ in Geiger C. (ed), Research Handbook on Human Rights and

Intellectual Property (Edward Elgar Publishing, Cheltenham 2015).

Page 57: Tilburg Law School - http

57

Reed C. and Angel J. (2003)

Reed C. and Angel J. (eds), Computer Law (Oxford University Press, Oxford 2003).

Sartor G. and Azevedo Cunha de M.V. (2010)

Sartor G. and Azevedo Cunha de M.V., ‘The Italian Google-Case: Privacy, Freedom of Speech

and Responsibility of Providers for User-Generated Contents’ (2010) International Journal of

Law and Information Technology 18(4).

Seitz J. (2005)

Seitz J., Digital Watermarking for Digital Media (IGI Publishing, London 2005).

Seltzer W. (2010)

Seltzer W., ‘Free Speech Unmoored in Copyright’s Safe Harbor: Chilling Effects of the DMCA

on the First Amendment’ (2010) Harvard Journal of Law & Technology 24.

Simon A.R. (2014)

Abigail R. Simon, ‘Contracting in the Dark: Casting Light on the Shadows of Second Level

Agreements’ (2014) William & Mary Business Law Review 305.

Singh P. and R.S. Chadha (2013)

Singh P. and Chadha R.S., ‘A Survey of Digital Watermarking Techniques, Applications and

Attacks’ (2013) International Journal of Engineering and Innovative Technology 2(9).

Stamatoudi I. and Torremans P. (2014)

Stamatoudi I. and Torremans P. (eds), EU Copyright Law: A Commentary (Edward Elgar

Publishing, Cheltenham 2014).

Verbiest T., Spindler G. and Riccio G.M. (2007)

Verbiest T., Spindler G. and Riccio G.M., ‘Study on the Liability of Internet Intermediaries’

(2007) SSRN.

Page 58: Tilburg Law School - http

58

Visser D.J.G. (2019)

Visser D.J.G., ‘Trying to understand article 13’ (2019) SSRN.

Wang J. (2016)

Wang J., ‘Regulating hosting ISPs’ responsibilities for copyright infringement: The freedom to

operate in the US, EU and China’ (2016) Maastricht University.

Yannopoulus G.N. (2017)

Yannopoulos G.N., ‘The Immunity of Internet Intermediaries Reconsidered?’ in Taddeo M. and

Floridi L. (eds), The Responsibilities of Online Service Providers (Springer International

Publishing, Cham 2017).

Zingales N. (2013)

Zingales N., ‘Internet Intermediary Liability: Identifying Best Practices for Africa’ (2013)

Association for Progressive Communications.

Page 59: Tilburg Law School - http

59

Legislation

• Canadian Copyright Modernisation Act (CCMA) of 29 June 2012 amending the Canadian

Copyright Act, S.C. 2012 c. 20.

• Charter of Fundamental Rights of the European Union (Charter), 2010 OJ C83/02.

• Consolidated version of the Treaty on the Functioning of the European Union (TFEU), OJ

C326/47.

• Council Directive 98/48/EC of 20 July 1998 amending Directive 98/34/EC laying down a

procedure for the provision of information in the field of technical standards and regulations,

OJ L217/18.

• Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on

certain legal aspects of information society services, in particular electronic commerce, in the

Internal Market (E-Commerce Directive), OJ L178/1.

• Directive 98/34/EC of the European Parliament and of the Council of 22 June 1998 laying

down a procedure for the provision of information in the field of technical standards and

regulations (Technical Standards Directive), OJ L204/37.

• Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the

harmonisation of certain aspects of copyright and related right in the information society

(InfoSoc Directive), OJ L167/10.

• Directive 2004/48/EC of the European Parliament and of the Council of 29 April 2004 on the

enforcement of intellectual property rights (Intellectual Property Rights Enforcement

Directive), OJ L195/16.

• Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on

the retention of data generated or processed in connection with the provision of publicly

available electronic communications services or of public communications networks and

amending Directive 2002/58/EC (Data Retention Directive), OJ L105/54.

• Japanese Act on the Limitation of Liability for Damages of Specified Telecommunications

Service Providers and the Right to Demand Disclosure of Identification Information of the

Page 60: Tilburg Law School - http

60

Senders of 30 November 2001, unofficial translation available at

<http://www.japaneselawtranslation.go.jp/law/detail/?id=2088&vm=04&re=02>.

• Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016

on the protection of natural persons with regard to the processing of personal data and on the

free movement of such data, and repealing Directive 95/46/EC (GDPR), OJ L119/1.

• The UK Defamation (Operations of Websites) Regulations of 2 December 2013, Statutory

Instruments 2013/3028.

• Treaty establishing the European Community (TEC), OJ C325/1.

• US Digital Millennium Copyright Act (DMCA), Pub. L. No. 105-304.

• US Stop Enabling Sex Traffickers Act (SECTA) S. 1693 (115th Congress).

Case Law

• Case 4/73 Nold v. Commission of the European Communities [1975] ECR 00985.

• Case 151/78 Sukkerfabriken v. Ministry of Agriculture [1979] ECR 00001.

• Sunday Times v. United Kingdom (App no 6538/74) ECHR 26 April 1979.

• Malone v. United Kingdom (App no 8691/79) ECHR 2 August 1984.

• Case 263/86 Belgian State v. Humbel [1988] ECR 05365.

• Case 352/85 Bond van Adverteerders v. the Netherlands [1988] ECR 02085.

• Case C-292/97 Kjell Karlsson and others v. Sweden [2000] ECR I-02737.

• Case C-275/06 Promusicae v. Telefónica de España [2008] ECR I-00271.

• Case C-236/08 Google France v. Louis Vuitton [2010] ECR I-02417.

• Joined Cases C-379/08 and 380/08 Raffinerie Mediterranee and Others v. Ministero dello

Sviluppo economico and Others (2010) ECR I-02007.

• Joined Cases C-92/09 and C-93/09 Volker and Markus Schecke v. Land Hessen (2010) ECR

I-11063.

• Case T-385/07 FIFA v. European Commission [2011] ECR II-00205.

Page 61: Tilburg Law School - http

61

• Case T-68/08 FIFA v. European Commission [2011] ECR II-00349.

• Case C-324/09 L’Oréal v. eBay [2011] ECR I-06011.

• Case C-70/10 Scarlet Extended v. SABAM [2011] ECR I-11959.

• Case C-461/10 Bonnier Audio v. Perfect Communication (ECJ 19 April 2012).

• Case C-360/10 SABAM v. Netlog (ECJ 16 February 2012).

• Case C-426/11 Alemo-Herron v. Parkwood Leisure (ECJ 18 July 2013).

• Case C-283/11 Sky Österreich v. Österreichischer Rundfunk (ECJ 22 January 2013).

• Case C-314/12 UPC Telekabel Wien v. Constantin Film (ECJ 27 March 2014).

• Delfi AS v. Estonia (App no 64569/09) ECHR 16 June 2015.

• Case C-362/14 Schrems v. Data Protection Commissioner (ECJ 6 October 2015).

• Case C-650/12 Thierry Delvigne v. Commune de Lesparre Médoc and Préfet de la Gironde

(ECJ 6 October 2015).

• Case C-601/15 J.N. v. Staatssecretaris van Veiligheid en Justitie (ECJ 15 Februari 2016).

• Case C-134/15 Lidl v. Freistaat Sachsen (ECJ 30 June 2016).

• Magyar Tartalomszolgáltatók Egyesülete (MTE) & Index v. Hongary (App no 22947/13)

ECHR 2 Februari 2016.

• Case C-582/14 Patrick Breyer v. Bundesrepublik Deutschland (ECJ 19 October 2016).

• Joined Cases C-203/14 and C-698/14 Tele2 Sverige v. Post-och and Secretary of State (ECJ

21 December 2016).

• Case C-484/14 Tobias McFadden v. Sony Music (ECJ 15 September 2016).

• Case C-258/14 Eugenia Florescu and Others v. Casa Judeteaña de Pensii Sibiu and Others

(ECJ 13 June 2017).

• Case C-610/15 Stichting Brein v. Ziggo (ECJ 14 June 2017).

• Case C-190/16 Werner Fries v. Lufthansa CityLine GmbH (ECJ 5 July 2017).

• Lenz v. Universal Music Corp., 801 US F.3d 1126 (2015).

Page 62: Tilburg Law School - http

62

Documents

• Article 29 WP, ‘Opinion 4/2007 on the concept of personal data’ WP 136.

• BEREC, ‘A view of traffic management and other practices resulting in restrictions to the

open Internet in Europe’ BoR (2012) 30.

• BEREC, ‘Summary of BEREC positions on net neutrality’ BoR (2012) 146.

• European Commission, ‘A Digital Single Market Strategy for Europe’ COM (2015) 192 final.

• European Commission, ‘First report on the application of the Directive on electronic

commerce’ COM (2003) 702 final.

• European Commission, ‘Online Platforms Accompanying the document Communication on

Online Platforms and the Digital Single Market’ SWD (2016) 172 final.

• European Commission, ‘Online Platforms and the Digital Single Market Opportunities and

Challenges for Europe’ COM (2016) 288 final.

• European Commission, ‘Online services, including e-commerce, in the Single Market’ SEC

(2011) 1641 final.

• European Commission, ‘Proposal for a Directive of the European Parliament and of the

Council on copyright in the Digital Single Market’ COM (2016) 593 final.

• European Commission, ‘Tackling Illegal Content Online Towards an enhanced responsibility

of online platforms’ COM (2017) 555 final.

• European Commission, ‘Towards a Modern, More European Copyright Framework’, COM

(2015) 626 final.

• European Council, ‘Legal issues on Article 13 and recital 38 of the Proposal’ COD (2017)

13140.

• European Parliament, ‘Towards a Digital Single Market Act’ (2016) Resolution C11/55.

Page 63: Tilburg Law School - http

63

Websites

• ‘Automated Content Recognition (ACR)’ (Gartner IT Glossary)

<https://www.gartner.com/it-glossary/automatic-content-recognition-acr> accessed 14 May

2019.

• Madore P.H., ‘YouTube Will Pay Up To $1 Million in Legal Fees For Qualifying Users’

(Hacked 2015) <https://hacked.com/youtube-will-pay-1-million-legal-fees-qualifying-users/>

accessed 14 May 2019.

• Masnick M, ‘How Google’s ContentID System Fails At Fair Use & The Public Domain’

(TechDirt 2012) <https://www.techdirt.com/articles/20120808/12301619967/how-googles-

contentid-system-fails-fair-use-public-domain.shtml> accessed 14 May 2019.

• ‘Media Usage Guidelines’ (NASA)

<https://www.nasa.gov/multimedia/guidelines/index.html> accessed 14 May 2019.

• ‘Questions and Answers – European Parliament’s vote in favour of modernised rules fit for

digital age’ (European Commission 2019) <http://europa.eu/rapid/press-release_MEMO-19-

1849_en.htm> accessed 14 May 2019.

• Sar van der E, ‘YouTube Copyright Complaint Kills Harvard Professor’s copyright Lecture

(Update)’ (TorrentFreak 2016) <https://torrentfreak.com/youtube-copyright-complaint-kills-

harvard-professors-copyright-lecture-160217/> accessed 14 May 2019.

• Schmidt H., ‘Die Antwort auf Youtube: Universal-Musikvideos jetzt auf Sevenload’

(Frankfurter Allgemeine 2009) <https://blogs.faz.net/netzwirtschaft-blog/2009/04/02/die-

antwort-auf-youtube-universal-musikvideos-jetzt-bei-sevenload-1014/> accessed 14 May

2019.

• SyrianArchive, ‘Survey of social media channels removed by @YouTube machine learning

and restored w/ help by @witnessorg.’ (Twitter 2017)

<https://twitter.com/syrian_archive/status/905019172370960384> accessed 14 May 2019.

• ‘YouTube censors lifesaving abortion information’ (Women on Waves 2018)

<https://www.womenonwaves.org/en/page/7044/youtube-censors-lifesaving-abortion-

information> accessed 14 May 2019.