Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cyberlaw:intermediaries_safe_harbours [2015/08/19 15:31]
nic [Example of the Category A safe harbour: Roadshow v iiNet]
cyberlaw:intermediaries_safe_harbours [2019/09/25 17:13] (current)
nic
Line 1: Line 1:
-# Safe harbours+Copyright ​Safe Harbours
  
-## Copyright safe harbours+## Chapter Overview
  
-### A legislative bargain +This Chapter provides a brief history of the development of safe harbour protections in the United States (US) and Australia. It then outlines the four main copyright safe harbours in Australia, which are in the _Copyright Act 1968_ (Cth) and only apply to Carriage Service Providers (CSPs), rather than Internet Service Providers (ISPs) as in the US. The Chapter explains that each safe harbour has particular conditions, and that Australian safe harbours provide limited immunity for CSPs. It concludes by outlining other Australian safe harbours and some US case law, and discussing the future of copyright safe harbours. ​
-<WRAP box round right 460px> +
-{{youtube>​VkP4EOQL2j4}} +
-</​WRAP>​+
  
-In the late 1990s, internet service providers and other intermediaries expressed concern about potential secondary liability for copyright infringement. At the same time, copyright owners were lobbying for increased protection in the online context. The result, in 1998, was the compromise position established by the Digital Millenium Copyright Act 1998 (US) (DMCA). ​+## A Legislative Bargain
  
-The DMCA was widely supported ​by the copyright industries; it amended some provisions to ensure application in the online environment,​ strengthened penalties for infringement,​ and introduced new rights to prevent tampering with technological locks on content. It included some trade-offs: copyright owners received additional rights, but service providers ​(certain intermediaries) were immunised from liability under the so-called 'safe harbours'​.+**Video Overview ​by [Nic Suzor](https://www.youtube.com/​watch?​v=VkP4EOQL2j4)**
  
-Essentially, ​the copyright safe harbours provide that online ​service providers ​(Internet Service Providers AND content hosts) are not liable for monetary damages ​for the infringing acts of their usersas long as they meet certain conditions. The relevant provisions are in 17 USC § 512((http://​www.law.cornell.edu/​uscode/​17/​512.html)). Intermediaries might still be liable, but the only remedy available is limited injunctive relief. In exchangethey undertake obligations ​to respond to notice & takedown requests.+In the late 1990s, internet ​service providers ​and other intermediaries expressed concern about potential secondary liability ​for copyright infringement. At the same timecopyright owners were lobbying for increased protection in the online context. The result, ​in 1998, was the compromise position established by the Digital Millenium Copyright Act 1998 (US) (DMCA). The DMCA was widely supported by the copyright industries; it amended some provisions to ensure application in the online environmentstrengthened penalties for infringement,​ and introduced new rights ​to prevent tampering with technological locks on content. It included some trade-offs: copyright owners received additional rights, but service providers (certain intermediaries) were immunised from liability under the so-called 'safe harbours'​.
  
-It is important to note that these obligations are optional. A service provider only needs to meet the conditions in the safe harbours if it wishes to be able to rely on them.+Essentially,​ the copyright safe harbours provide that online service providers (Internet Service Providers AND content hosts) are not liable for monetary damages for the infringing acts of their users, as long as they meet certain conditions. The relevant provisions are in 17 USC § 512((http://​www.law.cornell.edu/​uscode/​17/​512.html)). Intermediaries might still be liable, but the only remedy available is limited injunctive relief. In exchange, they undertake obligations to respond to notice & takedown requests. ​It is important to note that these obligations are optional. A service provider only needs to meet the conditions in the safe harbours if it wishes to be able to rely on them.
  
-### Australian ​safe harbours+## Australian ​Safe Harbours
  
-Australia was obliged to implement DMCA-style legislation (known as TRIPS+) as a result of the US free-trade agreement (AUSFTA). Changes to Australian law largely followed the US model, but were redrafted. The Australian safe harbours are in Copyright ​Act 1968 (Cth) Part V Div 2AA; the main operative provisions are ss 116AG and 116AH(1).+Australia was obliged to implement DMCA-style legislation (known as TRIPS+) as a result of the US free-trade agreement (AUSFTA). Changes to Australian law largely followed the US model, but were redrafted. The Australian safe harbours are in _Copyright ​Act 1968_ (Cth) Part V Div 2AA; the main operative provisions are ss 116AG and 116AH(1).
  
-### Only ISPs can rely on the safe harbours+### Only ISPs Can Rely on the Safe Harbours
  
-The Australian Safe Harbours, unlike those in the US DMCA, only apply to '​Carriage Service Providers'​ (CSP). This is defined in [Telecommunications Act 1997 (Cth) s 87](http://​www.austlii.edu.au/​au/​legis/​cth/​consol_act/​ta1997214/​s87.html). Essentially,​ a CSP is an ISP. What this means, crucially, is that the Australian safe harbours do not apply to content hosts.+The Australian Safe Harbours, unlike those in the US DMCA, only apply to '​Carriage Service Providers'​ (CSP). This is defined in [Telecommunications Act 1997 (Cth) s 87](http://​www.austlii.edu.au/​au/​legis/​cth/​consol_act/​ta1997214/​s87.html). Essentially,​ a CSP is an ISP. What this means, crucially, is that the Australian safe harbours do not apply to content hosts. ​There are four safe harbours that apply to different types of activity: ​
  
-### Types of activity covered +**Category A ActivityTransmission ​(s 116AC)**
- +
-There are four safe harbours that apply to different types of activity. +
- +
-#### Category A activitytransmission ​(s 116AC)+
  
 >​“providing facilities or services for transmitting,​ routing or providing connections for copyright material, or the intermediate and transient storage of copyright material in the course of transmission,​ routing or provision of connections.” >​“providing facilities or services for transmitting,​ routing or providing connections for copyright material, or the intermediate and transient storage of copyright material in the course of transmission,​ routing or provision of connections.”
Line 34: Line 27:
 This is the safe harbour that applies to ISPs and others who route traffic on behalf of users. This is the safe harbour that applies to ISPs and others who route traffic on behalf of users.
  
-#### Category B activitycaching ​(s 116AD)+**Category B ActivityCaching ​(s 116AD)**
  
 >​“caching copyright material through an automatic process. The carriage service provider must not manually select the copyright material for caching.” >​“caching copyright material through an automatic process. The carriage service provider must not manually select the copyright material for caching.”
Line 40: Line 33:
 Public material that is very popular is often automatically cached (copied) by ISPs. Caching means that instead of retrieving the material from the external server every time, the ISP can serve up a local copy of the material – much faster and cheaper. Public material that is very popular is often automatically cached (copied) by ISPs. Caching means that instead of retrieving the material from the external server every time, the ISP can serve up a local copy of the material – much faster and cheaper.
  
-#### Category C activityhosting ​(s 116AE)+**Category C ActivityHosting ​(s 116AE)**
  
 >​“storing,​ at the direction of a user, copyright material on a system or network controlled or operated by or for the carriage service provider.” >​“storing,​ at the direction of a user, copyright material on a system or network controlled or operated by or for the carriage service provider.”
Line 46: Line 39:
 This is the safe harbour for hosting content – for example, ISPs who provide webserver space for their (personal and corporate) clients. This is the safe harbour for hosting content – for example, ISPs who provide webserver space for their (personal and corporate) clients.
  
-#### Category D activitysearching ​(s 116AF)+**Category D ActivitySearching ​(s 116AF)**
  
 >​“referring users to an online location using information location tools or technology.” >​“referring users to an online location using information location tools or technology.”
Line 52: Line 45:
 This safe harbour applies to search engines. This safe harbour applies to search engines.
  
-### Limited ​immunity+### Limited ​Immunity
  
 The safe harbours provide immunity from monetary damages or penalties, but not injunctive relief. The safe harbours provide immunity from monetary damages or penalties, but not injunctive relief.
  
-<WRAP box round half> 
 s 116AG(2): ​ For infringements of copyright that occur in the course of carrying out any of the categories of activities set out in Subdivision B, a court must not grant relief against a carriage service provider that consists of: s 116AG(2): ​ For infringements of copyright that occur in the course of carrying out any of the categories of activities set out in Subdivision B, a court must not grant relief against a carriage service provider that consists of:
  
Line 65: Line 57:
 (c)  other monetary relief. (c)  other monetary relief.
  
-</​WRAP>​ 
  
 S 116AG then goes on to list the relief that a successful copyright owner is entitled to: S 116AG then goes on to list the relief that a successful copyright owner is entitled to:
Line 78: Line 69:
  
  
-## Conditions+## Conditions ​for Safe Harbour Protection ​
  
-Each safe harbour requires the CSP to follow certain conditions in s 116AH(1).+As explained in this **video overview by [Nic Suzor](https://​www.youtube.com/​watch?​v=HsNBRbywcto)**,​ each safe harbour requires the CSP to follow certain conditions in s 116AH(1).
  
-<WRAP box round right 460px> +### 'Repeat Infringer' ​Policy
-{{youtube>​HsNBRbywcto}} +
-</​WRAP>​ +
- +
-#### 'repeat infringer' ​policy+
  
 All safe harbours require that the CSP “must adopt and reasonably implement a policy that provides for termination,​ in appropriate circumstances,​ of the accounts of repeat infringers.” The operation of this obligation is somewhat uncertain. It is not yet clear what '​appropriate circumstances'​ are, or even when someone becomes a "​repeat infringer"​ All safe harbours require that the CSP “must adopt and reasonably implement a policy that provides for termination,​ in appropriate circumstances,​ of the accounts of repeat infringers.” The operation of this obligation is somewhat uncertain. It is not yet clear what '​appropriate circumstances'​ are, or even when someone becomes a "​repeat infringer"​
  
- +### Conditions: Category A
-#### Conditions: Category A+
  
 >“Any transmission of copyright material in carrying out this activity must be initiated by or at the direction of a person other than the carriage service provider.” >“Any transmission of copyright material in carrying out this activity must be initiated by or at the direction of a person other than the carriage service provider.”
Line 98: Line 84:
  
  
-#### Conditions: Category B+### Conditions: Category B
  
 >“If the copyright material that is cached is subject to conditions on user access at the originating site, the carriage service provider must ensure that access to a significant part of the cached copyright material is permitted only to users who have met those conditions.” >“If the copyright material that is cached is subject to conditions on user access at the originating site, the carriage service provider must ensure that access to a significant part of the cached copyright material is permitted only to users who have met those conditions.”
Line 111: Line 97:
  
  
-#### Conditions: Categories C & D+### Conditions: Categories C & D
  
 >“The carriage service provider must not receive a financial benefit that is directly attributable to the infringing activity if the carriage service provider has the right and ability to control the activity.” >“The carriage service provider must not receive a financial benefit that is directly attributable to the infringing activity if the carriage service provider has the right and ability to control the activity.”
Line 125: Line 111:
  
  
-### Category C safe harbournotice ​takedown procedure +### Category C Safe HarbourNotice ​Takedown Procedure
- +
-<WRAP info round third> +
-Student video topic. +
-</​WRAP>​+
  
 Copyright Regulations 1969 (Cth) prescribe more detail for the notice & takedown procedure. Copyright Regulations 1969 (Cth) prescribe more detail for the notice & takedown procedure.
Line 140: Line 122:
  
  
-### Example of the Category A safe harbour: Roadshow v iiNet+### Example of the Category A Safe Harbour: Roadshow v iiNet
  
-<WRAP info round third> +**Sophie Murdock explains [Roadshow v iiNet](https://​www.youtube.com/watch?​v=h4iBhgAUV8Q)**
-Student video topic. +
-</WRAP>+
  
-The FCAFC held that iiNet could not rely on the safe harbours, had it been liable for authorising copyright infringement.+The FCAFC held that iiNet could not rely on the safe harbours, had it been liable for authorising copyright infringement. The Court unanimously held that iiNet could not rely on the safe harbour provisions. The three judges each gave separate reasons, however there were common threads throughout their arguments. Each judge focussed on item 1 condition 1 of s 116AH(1) of the Copyright Act, and while they acknowledged that iiNet was in Category A, they did not discuss the requirements for safe harbour in Category A
  
-Explain why. What was iiNet's 'repeat infringer'​ policy? Was it 'reasonably implemented'?​ What are the '​appropriate circumstances' ​in which repeat infringers must be terminated?+**Background:​** At first instance Cowdroy J found that iiNet had a repeat infringer ​policy as evidenced by a statement on the iiNet website that hosting or posting of copyright material was against iiNet'policy ​and would result in the suspension/​termination of service without notice to the subscriber and the 2005 amendments to the iiNet customer relationship agreement that gave iiNet the right to terminate subscriber accounts for copyright infringement. iiNet admitted that it didn't have a written policy but the Managing Director, Malone, said that there was an unwritten policy ​in his mind that the Chief Regulatory Officer was aware of this policy. Cowdroy J held that this was sufficient because there was no requirement for a written policy in the Copyright Act. 
  
-## Some US authority+The Court in the full court appeal did not hold that the policy was sufficient, however they generally accepted that the policy, if it did exist, was that iiNet would terminate a subscriber'​s account if: 
 +  - Ordered to do so by a court 
 +  - The subscriber admitted to infringing copyright 
 +  - A court or tribunal found that a subscriber had infringed copyright. ​
  
 +**Themes:**
 +'​Account'​- Emmett J agreed with the judgment at first instance, which had ruled against iiNet'​s argument that it should only have to terminate contracts in the event that the account holder was the infringer. Emmett J said that this would result in only a fraction of cases being prosecuted and gave the example of a household where the account holder was not the main user of internet but other members of the household infringed copyright. In that instance, he said, it would be appropriate to terminate the account. He also said that the legislation was clearly drafted to cover accounts that infringed copyright, not simply account holders. ​
  
-#### A&M Records v Napster239 F.3d 1004 (2001)+**'​Reasonably Implemented:'​** The Court was also critical of the implementation of the policy. iiNet argued that it had implemented the policy by having gone to industry forumsformed a policy in its Managing Directors mind and distributed a document amongst its staff regarding the laws around intermediaries and copyright infringementThe Court held that mere attendance at forums is not enough to implement a policy, and that iiNet had not implemented its policy. Emmett J argued that the document that had been distributed wouldn'​t have been enough to implement the policy even if it had contained information on the policy because it hadn't reached the staff who interacted with customers. He also said that customers should be made actively aware of the policy. Jagot J also said that Malone had simply formulated during cross-examination what the policy would have been had they been made aware of infringement. He said that this absence of a policy at the time of infringement meant that iiNet could not rely on the safe harbour provisions because s 116AH(1requires that the policy be in place at the time of infringement. ​
  
-Napster did not qualify for 17 USC 512 (a) (transmission) safe harbor ​because it did not actually transmit copyright material through its network.+**'​Appropriate circumstances':​** All three judges held that iiNet'​s policy should have dealt with the concept of appropriate circumstances,​ however only Nicholas J gave an example of what an appropriate circumstance would be. He held that the policy was deficient ​because ​in the circumstance that iiNet knew that a subscriber had infringed copyright on multiple occasions ​it would not have to do anything unless the subscriber admitted the infringements or a court ordered it to do so
  
-Even if Napster ​did qualify, ​it would not have satisfied 512(i), the requirement ​to terminate ​the accounts of repeat infringers+**'​Repeat infringer':​** Jagot and Nicholas JJ held that because iiNet'​s policy ​did not reference repeat infringers ​it was not sufficient because the policy could be applied to a user who had only infringed copyright once or one who had infringed it multiple times. In other words, the policy was not tailored ​to the legislation. ​
  
 +## Some US Authority
  
-#### In re: Aimster334 F.3d 643 (7th Cir. 2003)+### A&M Records v Napster239 F.3d 1004 (2001)
  
-Aimster locked itself out of any knowledge by encrypting the network. ​7th Circuit held that Aimster was wilfully blind. ​+Napster did not qualify for 17 USC 512 (a) (transmission) safe harbor because it did not actually transmit copyright material through its network. ​Even if Napster did qualify, it would not have satisfied 512(i), the requirement to terminate the accounts of repeat infringers
  
-Although ​Aimster ​had a repeat infringer policyit could never really be exercised in practice because Aimster had no way to know what users were doing.+### In re: Aimster, ​334 F.3d 643 (7th Cir2003)
  
 +Aimster locked itself out of any knowledge by encrypting the network. 7th Circuit held that Aimster was wilfully blind. Although Aimster had a repeat infringer policy, it could never really be exercised in practice because Aimster had no way to know what users were doing.
  
-#### Ellison v Robertson, 357 F.3d 1072 (9th Cir. 2004) +### Ellison v Robertson, 357 F.3d 1072 (9th Cir. 2004)  
 + 
 +**Video Overview of Ellison v Robertson by [Chris Pham](https://​www.youtube.com/​watch?​v=z3YgPFQudVk)**
  
 AOL had a repeat infringer policy, but had changed its designated email address for complaints. AOL never received Ellison'​s complaints, and never bounced back the wrongly addressed email messages. There was therefore a triable question of fact as to whether AOL had '​reasonably implemented'​ its repeat infringer policy. AOL had a repeat infringer policy, but had changed its designated email address for complaints. AOL never received Ellison'​s complaints, and never bounced back the wrongly addressed email messages. There was therefore a triable question of fact as to whether AOL had '​reasonably implemented'​ its repeat infringer policy.
  
- +### Perfect 10 v CCBill, 488 F.3d 1102 (9th Cir. 2007)
-#### Perfect 10 v CCBill, 488 F.3d 1102 (9th Cir. 2007)+
  
 CCBill kept a spreadsheet database of allegations of infringement. Court found that a service provider will '​reasonably implement'​ a repeat infringer policy: CCBill kept a spreadsheet database of allegations of infringement. Court found that a service provider will '​reasonably implement'​ a repeat infringer policy:
Line 180: Line 168:
 CCBill was under no obligation to police the site. CCBill was under no obligation to police the site.
  
- +### Red Flag DoctrineWhen Will Infringement Become Apparent?
-### Red flag doctrinewhen will infringement become apparent?+
  
 US caselaw has developed a 'red flag' doctrine – an OSP may lose the protection of the safe harbors if it takes no action when infringement becomes apparent. See Australian equivalent under s 116AH(1)(4)(2A)(a) and (b). US caselaw has developed a 'red flag' doctrine – an OSP may lose the protection of the safe harbors if it takes no action when infringement becomes apparent. See Australian equivalent under s 116AH(1)(4)(2A)(a) and (b).
  
 +### Viacom v YouTube (2nd Cir.) (Decided April 5, 2012)
  
-#### Viacom v YouTube (2nd Cir.) (Decided April 5, 2012)+**Overview video by Emily Guiver: [Viacom v YouTube](https://​youtu.be/​SC75opYLwZI)**
  
-Google were very responsive to takedown noticesalthough this suit targeted behaviour pre-2008, when protocols were not always highly formalisedDistrict Court found that Google'​s actions were sufficient to find (on summary judgment) that Google ​was protected by the 512(c) safe harbor.+Viacom InternationalIncv. YouTube, Inc was a controversial U.S case where Viacom sued YouTube for $1bil U.S dollars for copyright infringement
  
-On appeal, the Second Circuit held that there were open questions ​of fact that warranted investigation on trial – summary judgment was inappropriate.+Viacom alleged that over 150,000 unauthorised clips of their programming had been made available on YouTube. These clips had allegedly been viewed a collective 1.5 billion times without their permission. However, the Court ruled that YouTube was protected by the safe harbour provisions included in §512 of the Digital Millennium Copyright Act (‘DMCA’) because they had met the requisite conditions for immunity. Specifically,​ YouTube only had general knowledge of the infringing behaviour ​– not specific knowledge of infringements (which would disqualify them from protection under the DMCA).
  
-<WRAP alert> +This decision confirms that online service providers can rely on the DMCA’s safe harbour provisions to protect them from copyright infringement claims even where they have general knowledge ​of infringement on their sites.
-This content is now out of date! Please help by updating it. +
-</​WRAP>​+
  
-US hosting safe harbour applies to direct as well as secondary liability: "The District Court correctly determined that a finding of safe harbor application necessarily protects a defendant from all affirmative claims for monetary relief."​+Google were very responsive to takedown notices, although this suit targeted behaviour pre-2008, when protocols were not always highly formalised. The District Court found that Google'​s actions were sufficient to find (on summary judgment) that Google was protected by the 512(c) safe harbor. 
 + 
 +On appeal, the Second Circuit held that US hosting safe harbour applies to direct as well as secondary liability: "The District Court correctly determined that a finding of safe harbor application necessarily protects a defendant from all affirmative claims for monetary relief."​
  
 Different levels of knowledge can disqualify a provider from the safe harbour: Different levels of knowledge can disqualify a provider from the safe harbour:
Line 216: Line 204:
 >​“Under §512(c)(1)(A),​ knowledge or awareness alone does not disqualify the service provider, rather, the provider that gains knowledge or awareness of infringing activity retains the safe-harbor protection if it ‘acts expeditiously to remove, or disable access to, the material.’ Thus, the nature of the removal obligation itself contemplates knowledge or awareness of specific infringing material, because expeditious removal is possible only if the service provider knows with particularity which items to remove.” >​“Under §512(c)(1)(A),​ knowledge or awareness alone does not disqualify the service provider, rather, the provider that gains knowledge or awareness of infringing activity retains the safe-harbor protection if it ‘acts expeditiously to remove, or disable access to, the material.’ Thus, the nature of the removal obligation itself contemplates knowledge or awareness of specific infringing material, because expeditious removal is possible only if the service provider knows with particularity which items to remove.”
  
 +On April 18, 2013, the District Court issued another order granting summary judgment in favor of YouTube. Following the remand from the Second Circuit court of appeals, Judge Stanton ruled in favor of YouTube, finding that YouTube had no actual knowledge of any specific instance of infringement of Viacom'​s works, and therefore could not have "​willfully blinded itself"​. He also ruled that YouTube did not have the "right and ability to control"​ infringing activity because "there is no evidence that YouTube induced its users to submit infringing videos, provided users with detailed instructions about what content to upload or edited their content, prescreened submissions for quality, steered users to infringing videos, or otherwise interacted with infringing users to a point where it might be said to have participated in their activity." ​
  
-<WRAP box round 460px> +An appeal was begun, but the week before the parties were to appear in the 2nd U.S. Circuit Court of Appeals, a settlement was announced, and it was reported that no money changed hands.
-**Nic Suzor explains other Australian safe harbours** +
-{{youtube>​p6iNf63Xs0Y}} +
-</​WRAP>​+
  
 ## Broadcasting Services Act Sch 5, Cl 91 ## Broadcasting Services Act Sch 5, Cl 91
  
-<WRAP help round third> +**Video Overview by Nic Suzor[Other Australian Safe Harbours](https://​www.youtube.com/watch?​v=p6iNf63Xs0Y)**
-Help needed! +
-This section is a [[:wiki:stub]]. Please help out by filling in some details. +
-</WRAP>+
  
-## 'Mere conduits'​Sections 39B & 112E +Schedule 5, Clause 91(1) of the //​Broadcasting Services Act 1992// provides that a law of a State or Territory, or a rule of common law or equity, has no effect to the extent to which it
-<WRAP help round third> +  * (a)  subjects, or would have the effect (whether direct or indirect) of subjecting, an internet content host to liability (whether criminal or civil) in respect of hosting particular internet content in a case where the host was not aware of the nature of the internet content; or 
-Help needed! +  * (b)  requires, or would have the effect (whether direct or indirect) of requiring, an internet content host to monitor, make inquiries about, or keep records of, internet content hosted by the host; or 
-This section is [[:​wiki:​stub]]. Please help out by filling in some details. +  * (c)  subjects, or would have the effect (whether direct or indirect) of subjecting, an internet service provider to liability (whether criminal or civil) in respect of carrying particular internet content in case where the service provider was not aware of the nature of the internet content; or 
-</​WRAP>​+  * (d)  requires, or would have the effect (whether direct or indirect) of requiring, an internet service provider to monitor, make inquiries about, or keep records of, internet content carried ​by the provider
  
-## The future ​of Notice and Takedown+Although on its face the clause seems to protect intermediaries against liability for content available on their services but provied by third parties, its application in practice is limited. As protection under the clause depends largely on whether the intermediary has actual knowledge of the content, protection is lost where the intermediary is given notice of the content. Rights holders can easily stop intermediaries relying on this clause by providing written notice to intermediaries before instituting legal action. 
 + 
 +## 'Mere Conduits':​ Sections 39B & 112E 
 + 
 +Sections 39B and 112E of the //Copyright Act 1968// both provide a defence for interemdiaries who merely provide facilities for communications. Section 39B applies to Part III works, while section 112E applies to Part IV audio-visual items. 
 + 
 +While the wording of the section may appear to provide an important defence to ISPs, the way Australian courts have interpreted the defence renders it virtually useless. Essentially,​ the world '​merely'​ has been interpreted in a way that it excludes any intermediary that could be considered potentially liable for authorising infringement. As such, the provision only provides protection where such protection isn't actually required. 
 + 
 +## The Future of Notice and Takedown 
 + 
 +**Video Overview by Nic Suzor: [The Future ​of Notice and Takedown](https://​www.youtube.com/​watch?​v=tNepvFX2J6w)**
  
-<WRAP box round 460px> 
-{{youtube>​tNepvFX2J6w}} 
-</​WRAP>​ 
  
-<WRAP help round third> 
 Help needed! Help needed!
 This section is a [[:​wiki:​stub]]. Please help out by filling in some details. This section is a [[:​wiki:​stub]]. Please help out by filling in some details.
-</​WRAP>​+
  • cyberlaw/intermediaries_safe_harbours.1439962305.txt.gz
  • Last modified: 10 months ago
  • (external edit)