ARTICLE 2.18 ENFORCEMENT PROCEDURES IN THE DIGITAL ENVIRONMENT
1. Each Party shall ensure that enforcement procedures, to the extent set forth in the civil and criminal enforcement sections of this Agreement, are available under its law so as to permit effective action against an act of copyright infringement which takes place in the digital environment, including expeditious remedies to prevent infringement and remedies which constitute a deterrent to further infringement.
2. Those measures, procedures and remedies shall also be fair and proportionate.
3. Without prejudice to the rights, limitations, exceptions, or defenses to copyright infringement available under its law, including with respect to the issue of exhaustion of rights, each Party shall provide for civil remedies as well as limitations, exceptions, or defenses with respect to the application of such remedies, are available in its legal system in cases of third party liability *
* For greater certainty, the Parties understand that third party liability means liability for any person who authorizes for a direct financial benefit, induces through or by conduct directed to promoting infringement, or knowingly and materially aids any act of copyright or related rights infringement by another. Further, the Parties also understand that the application of third party liability may include consideration of exceptions or limitations to exclusive rights that are confined to certain special cases that do not conflict with a normal exploitation of the work, performance or phonogram, and do not unreasonably prejudice the legitimate interests of the right holder, including fair use, fair dealing, or their equivalents. At least one delegation opposes this footnote.
|
Metro-Goldwyn-Mayer Studios v. Grokster, 545 US 913, 930 (2005)
One infringes contributorily by intentionally inducing or encouraging direct infringement, … and infringes vicariously by profiting from direct infringement while declining to exercise a right to stop or limit it … Although “[t]he Copyright Act does not expressly render anyone liable for infringement committed by another,” … these doctrines of secondary liability emerged from common law principles and are well established in the law.
|
Option 1
3. Each Party recognizes that some persons use the services of third parties, including online service providers, for engaging in copyright infringement. Each Party also recognizes that legal uncertainty with respect to application of copyright, limitations, exceptions, and defenses in the digital environment may present barriers to the economic growth of, and opportunities in, electronic commerce. Accordingly, in order to facilitate the continued development of an industry engaged in providing information services online while also ensuring that measures to take adequate and effective action against copyright or related rights infringement are available and reasonable each Party shall:
(a) provide limitations on the scope of civil remedies available against an
online service provider for infringing activities that occur by
(i) automatic technical processes, and
(ii) the actions of the provider’s users that are not directed or initiated by that provider and when the provider does not select the material, and
(iii) the provider referring or linking users to an online location,
when, in cases of subparagraphs (ii) and (iii) the provider does not have actual knowledge of the infringement and is not aware of facts or circumstances from which infringing activity is apparent; and
Option 2
Each Party recognizes that some persons use the services of third parties, including online service providers, for engaging in intellectual property rights infringements.
(a) In this respect, each Party shall provide limitation on the scope of civil remedies available against an on-line service provider for infringing activities that occur by
(i) automatic technical processes, or
(ii) the actions of the provider´s users that are not initiated nor modified by that provided and when the provider does not select the material or
(iii) the storage of information provided by the recipient of the service or at the request of the recipient of the service,
when exercising the activities as stipulated in paragraph 3(a)(ii) and/or (iii) the online service providers act expeditiously, in accordance with applicable law, to remove or disable access to infringing material or infringing activity upon obtaining actual knowledge of the infringement
the information at the initial source has been removed or disabled.
Option 1
(b) condition the application of the provisions of subparagraph (a) on meeting the following requirements:
(i) an online service provider adopting and reasonably implementing a policy to address the unauthorized storage or transmission of materials protected by copyright or related rights; and
(ii) an online service provider expeditiously removing or disabling access to material or alleged infringement, upon receipt of legally sufficient notice of alleged infringement, and in the absence of a legally sufficient response from the relevant subscriber of the online service provider indicating that the notice was the result of mistake or misidentification.
except that the provisions of (ii) shall not be applied to the extent that the online service provider is acting solely as a conduit for transmissions through its system or network.
Option 2:
Paragraph 3(a) shall not affect the possibility for a judicial or administrative authority, in accordance with the Parties legal system, requiring the service provider to terminate or prevent an infringement, nor does it affect the possibility of the parties establishing procedures governing the removal or disabling of access to information
The Parties shall not impose a general monitoring requirement on providers when acting in accordance with this paragraph 3.
3. Each Party shall enable right holders, who have given effective notification to an online service provider of materials that they claim with valid reasons to be infringing their copyright or related rights, to expeditiously obtain from that provider information on the identity of the relevant subscriber.
3. Each Party shall promote the development of mutually supportive relationships between online service providers and right holders to deal effectively with patent, industrial design, trademark and copyright or related rights infringement which takes place by means of the Internet, including the encouragement of establishing guidelines for the actions which should be taken.
|
17 USC § 512. Limitations on liability relating to material online
(a) Transitory Digital Network Communications.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider’s transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections, if—
(1) the transmission of the material was initiated by or at the direction of a person other than the service provider;
(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider;
(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person;
(4) no copy of the material made by the service provider in the course of such intermediate or transient storage is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections; and
(5) the material is transmitted through the system or network without modification of its content.
(b) System Caching.—
(1) Limitation on liability.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the intermediate and temporary storage of material on a system or network controlled or operated by or for the service provider in a case in which—
(A) the material is made available online by a person other than the service provider;
(B) the material is transmitted from the person described in subparagraph (A) through the system or network to a person other than the person described in subparagraph (A) at the direction of that other person; and
(C) the storage is carried out through an automatic technical process for the purpose of making the material available to users of the system or network who, after the material is transmitted as described in subparagraph (B), request access to the material from the person described in subparagraph (A),
if the conditions set forth in paragraph (2) are met.
[…]
(c) Information Residing on Systems or Networks At Direction of Users.—
(1) In general.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider—
(A)(i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;
(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or
(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;
(B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and
(C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity.
(2) Designated agent.— The limitations on liability established in this subsection apply to a service provider only if the service provider has designated an agent to receive notifications of claimed infringement described in paragraph (3), by making available through its service, including on its website in a location accessible to the public, and by providing to the Copyright Office, substantially the following information:
(A) the name, address, phone number, and electronic mail address of the agent.
(B) other contact information which the Register of Copyrights may deem appropriate.
The Register of Copyrights shall maintain a current directory of agents available to the public for inspection, including through the Internet, in both electronic and hard copy formats, and may require payment of a fee by service providers to cover the costs of maintaining the directory.
[…]
(d) Information Location Tools.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link, if the service provider—
(1)(A) does not have actual knowledge that the material or activity is infringing;
(B) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or
(C) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;
(2) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and
(3) upon notification of claimed infringement as described in subsection (c)(3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity, except that, for purposes of this paragraph, the information described in subsection (c)(3)(A)(iii) shall be identification of the reference or link, to material or activity claimed to be infringing, that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate that reference or link.
|
4.59 In order to provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors, the right holder of any copyright or related rights or owner of an exclusive license in connection with the exercise of their rights and that restrict unauthorized acts in respect of their works, or other subject matters specified under Article 14 of the TRIPS Agreement, each Party shall provide for civil remedies, or criminal penalties in appropriate cases of willful conduct , that apply to:
(a) the unauthorized circumvention of an effective technological measure that controls access to a protected work, performance, or phonogram; and
(b) the manufacture, importation, or circulation of a technology, service, device, product, component, or part thereof, that is: marketed or primarily designed or produced for the purpose of circumventing an effective technological measure; or that has only a limited commercially insignificant purpose or use other than circumventing an effective technological measure.
5. Each Party shall provide adequate legal protection against a violation of a measure implementing paragraph (4), independent of any infringement of copyright or related rights.
Option 1
Further, each Party may adopt exceptions and limitations to measures implementing paragraph 4 so long as they do not significantly impair the adequacy of legal protection of those measures or the effectiveness of legal remedies for violations of those measures.
Option 2
5. Each Party may provide for measures which would safeguard the benefit of certain exceptions and limitations to copyright and related rights, in accordance with its legislation.
|
17 USC § 1201. Circumvention of copyright protection systems
(a) Violations Regarding Circumvention of Technological Measures.—
(1)(A) No person shall circumvent a technological measure that effectively controls access to a work protected under this title. The prohibition contained in the preceding sentence shall take effect at the end of the 2-year period beginning on the date of the enactment of this chapter.
[…]
(2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that—
(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title;
(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or
(C) is marketed by that person or another acting in concert with that person with that person’s knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title.
|
6. Each Party shall provide adequate and effective legal remedies to protect electronic rights management information, each Party shall provide for civil remedies, or criminal penalties in appropriate cases of willful conduct, that apply to any person performing any of the following acts knowing or with respect to civil remedies having reasonable grounds to know that it will induce, enable, facilitate, or conceal an infringement of any copyright or related right:
(a) to remove or alter any electronic right management information. The obligations in paragraphs (4) and (5) are without prejudice to the rights, limitations, exceptions, or defenses to copyright or related rights infringement. Further, paragraph (4) does not imply any obligation to require that the design of, or the design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological measure, so long as the product does not otherwise violate any measures implementing paragraph (4).
(b) to distribute, import for distribution, broadcast, communicate, or make available to the public copies of works, knowing that electronic rights management information has been removed or altered without authority.
6.2 Each Party may adopt limitations or exceptions to the requirements of subparagraphs (a) and (b).
|
17 USC § 1202. Integrity of copyright management information
(a) False Copyright Management Information.— No person shall knowingly and with the intent to induce, enable, facilitate, or conceal infringement—
(1) provide copyright management information that is false, or
(2) distribute or import for distribution copyright management information that is false.
(b) Removal or Alteration of Copyright Management Information.— No person shall, without the authority of the copyright owner or the law—
(1) intentionally remove or alter any copyright management information,
(2) distribute or import for distribution copyright management information knowing that the copyright management information has been removed or altered without authority of the copyright owner or the law, or
(3) distribute, import for distribution, or publicly perform works, copies of works, or phonorecords, knowing that copyright management information has been removed or altered without authority of the copyright owner or the law,
knowing, or, with respect to civil remedies under section 1203, having reasonable grounds to know, that it will induce, enable, facilitate, or conceal an infringement of any right under this title.
|