SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
Arthur Hoyle
Senior Lecturer in Law and Technology
                         School of Law
                 University of Canberra
W ill l k t f           l    t
We will look at a few relevant cases
 the history of copyright represents a continual struggle 
  between public and private rights, with first one and 
  then other gaining a temporary ascendency
 I want to look briefly at a number of recent Australian 
  cases, and in particular: 
  cases  and in particular: 
   Ice TV, 
   Kazaa, 
   Larrikin Records
   iiiNet ; and
   Optus
Ice TV
 The pre‐existing relevant law represented a rejection 
 of the American Feist line on originality in 
 compilations by the Australian courts

 The High Court of Australia rejected Nine’s complaint  
  The High Court of Australia rejected Nine s complaint, 
 saying that there was little substantial originality in 
 arranging a list the time and title information in 
      g g
 chronological order.
The Larrikin Records case
 Kookaburra Sings in the Old Gum Tree is and old 
  Australian song created for a competition
CCopyright purchased for $6,000 from an estate sale
         i h       h d f           f              l
 Fifty years later Men At Work recorded Do you come 
  from the Land Downunder which was alleged by 
  Larrikin to contain elements of Kookaburra in a flute 
  riff subsequently added by Greg Hay
            q       y       y    g   y
Hay Admitted

‘It was inadvertent, naive, unconscious, and by the 
time Men At work recorded the song, it had become 
unrecognisable.
unrecognisable
Relevant Materials
 http://www.youtube.com/watch?v=IbsfupH8W1o&fea
 ture=related (play to 1:06)

 http://www.youtube.com/watch?v=IT8SHafGIpU&fea
 ture=related
 ture related (start at 1:30 and go to 2:36)

 http://www youtube com/watch?v=OZzm1C‐
  http://www.youtube.com/watch?v=OZzm1C‐
 NlME&feature=related
The Court Found
 There was objective similarity sufficient to be classified 
  as breach, but
 It did not amount to a finding that the flute riff is a 
     did                  fi di   h   h  fl   iff i    
  substantial part of ‘Down Under’ or that it is indeed 
  the  hook  of that song
  the ‘hook’ of that song
 The 40% to 60% damages claimed were "excessive, 
  over‐reaching and unrealistic“
               g
 Were assessed as 5% going back only to 2002
A Shift in Judicial treatment of
   A Shift in Judicial treatment of 
              Copyright?

 Seen in the context of Ice TV, this was seen by many in 
 the interested legal community as indicating a 
 discernible shift in the court s view of copyright and its 
 di      ibl   hift i  th     t’   i   f       i ht  d it  
 enforceability through a distinct softening in the 
 sanctions
Th Sh          K
      The Sharman or Kazaa case
 Sharman Networks and certain others associated with 
  the Kazaa P2P “file sharing” software were liable for 
  the authorisation of copyright infringement engaged 
  in by Kazaa users.
 The Judge expressed the view that “it has long been 
  The Judge expressed the view that  it has long been 
  obvious that those (warnings in end user agreements) 
  measures are ineffective to prevent, or even 
  substantially to curtail, copyright infringements by 
  users”
Kazaa
 His Honour stated that he wished to be careful in 
 protecting copyright whilst balancing the rights of 
 subscribers to freedom of expression and 
 communication where no infringement occurs

 The court could be seen as pushing back against large 
 scale claims of this type, and this was to at least 
                       yp
 partially proven to be the case in the later iiiNet case
The iiNet case
 AFACT sent notices to iiNet, attaching information 
  allegedly demonstrating that iiNet users were using 
  BitTorrent to infringe the film companies’ copyright
             to infringe the film companies  copyright
 the court reviewed not only the Kazaa decision but all 
  relevant precedent including  Moorhouse, Jain, Metro, 
  Cooper and K
  C        d Kazaa
 It found that “the means by which the applicant's 
  copying is infringed is in iiNet users' use of the 
                                   users  use of the 
  constituent parts of the BitTorrent system. IiNet has 
  no control over the BitTorrent system and is not 
  responsible for the operation of the BitTorrent system”
                                                    system
The situation in Australia post iiNet
The situation in Australia post‐
  the mere provision of the facility to copy is not 
   considered sufficient to render the supplier of the 
   service guilty of any act that affects a third party 
   undertaken using that service
  The High Court in its ruling on an appeal from the 
   Federal Court held that iiNet had no direct technical 
   power to prevent its customer from using the 
   BitTorrent system, and that iiNet’s only power was 
   indirect
The Optus Case
                    p
 Optus used a minimal delay before they rebroadcast 
  material originally sold by the football codes to Telstra 
        i l  i i ll   ld b   h  f b ll  d    T l            
  under a process by which Optus customers can record 
  and watch matches screened on free‐to‐air television 
  and replay with delays as short as two minutes on some 
  devices
 An appeal panel of the Federal Court overturned the 
  decision, finding that the Betamax precedent was 
  inapplicable
 This reinforced the status quo, and in doing so 
  restated the validity of contractual arrangements 
  involving the assignment of copyright
The Struggle therefore continues
 The struggle therefore between public and private 
 rights in the use of materials produced by others goes 
 on, but is seems that the ever present pendulum is 
 now swinging back towards the public interest at the 
 expense of the private one

Mais conteúdo relacionado

Semelhante a International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra

Select a faculty-approved organization that uses an e-commerce.docx
Select a faculty-approved organization that uses an e-commerce.docxSelect a faculty-approved organization that uses an e-commerce.docx
Select a faculty-approved organization that uses an e-commerce.docxbagotjesusa
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 
Mac281 Copyright in the Digital Era
Mac281 Copyright in the Digital EraMac281 Copyright in the Digital Era
Mac281 Copyright in the Digital EraRob Jewitt
 
ODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingAusGOAL
 
LWB486 Week 6 Copyright
LWB486 Week 6 CopyrightLWB486 Week 6 Copyright
LWB486 Week 6 CopyrightPeter Black
 
Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Jim Francis
 
Transferpricingrules
TransferpricingrulesTransferpricingrules
Transferpricingruleskikanovais
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementLilian Edwards
 
The Pirate Bay (TPB), a Swedish Web site (Piratebay.org), is one o.docx
The Pirate Bay (TPB), a Swedish Web site (Piratebay.org), is one o.docxThe Pirate Bay (TPB), a Swedish Web site (Piratebay.org), is one o.docx
The Pirate Bay (TPB), a Swedish Web site (Piratebay.org), is one o.docxoreo10
 
Sookman law society_copyright_2012_conference
Sookman law society_copyright_2012_conferenceSookman law society_copyright_2012_conference
Sookman law society_copyright_2012_conferencebsookman
 
Glover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.pptGlover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.pptbsookman
 
A&M Records Inc v Napster
A&M Records Inc v NapsterA&M Records Inc v Napster
A&M Records Inc v NapsterBhaumik Oza
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital PiracyErick Prajogo
 
1.4 CASE STUDY The Pirate Bay Searching for a Safe Haven© To.docx
1.4 CASE STUDY The Pirate Bay Searching for a Safe Haven© To.docx1.4 CASE STUDY The Pirate Bay Searching for a Safe Haven© To.docx
1.4 CASE STUDY The Pirate Bay Searching for a Safe Haven© To.docxpaynetawnya
 
Mc carthy technology law_summit
Mc carthy technology law_summitMc carthy technology law_summit
Mc carthy technology law_summitbsookman
 
Future of Internet Copyrights: Recent Cases and Congress
Future of Internet Copyrights: Recent Cases and CongressFuture of Internet Copyrights: Recent Cases and Congress
Future of Internet Copyrights: Recent Cases and Congressrimonlaw
 
Understanding Legal Use Cases for Web Archives
Understanding Legal Use Cases for Web ArchivesUnderstanding Legal Use Cases for Web Archives
Understanding Legal Use Cases for Web Archivesnullhandle
 
Intellectual Property Law Roundtable - What Businesses Need to Know | Los Ang...
Intellectual Property Law Roundtable - What Businesses Need to Know | Los Ang...Intellectual Property Law Roundtable - What Businesses Need to Know | Los Ang...
Intellectual Property Law Roundtable - What Businesses Need to Know | Los Ang...Knobbe Martens - Intellectual Property Law
 

Semelhante a International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra (20)

Select a faculty-approved organization that uses an e-commerce.docx
Select a faculty-approved organization that uses an e-commerce.docxSelect a faculty-approved organization that uses an e-commerce.docx
Select a faculty-approved organization that uses an e-commerce.docx
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
Mac281 Copyright in the Digital Era
Mac281 Copyright in the Digital EraMac281 Copyright in the Digital Era
Mac281 Copyright in the Digital Era
 
ODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and Licensing
 
LWB486 Week 6 Copyright
LWB486 Week 6 CopyrightLWB486 Week 6 Copyright
LWB486 Week 6 Copyright
 
Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008
 
Transferpricingrules
TransferpricingrulesTransferpricingrules
Transferpricingrules
 
Polinter08
Polinter08Polinter08
Polinter08
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcement
 
The Pirate Bay (TPB), a Swedish Web site (Piratebay.org), is one o.docx
The Pirate Bay (TPB), a Swedish Web site (Piratebay.org), is one o.docxThe Pirate Bay (TPB), a Swedish Web site (Piratebay.org), is one o.docx
The Pirate Bay (TPB), a Swedish Web site (Piratebay.org), is one o.docx
 
Sookman law society_copyright_2012_conference
Sookman law society_copyright_2012_conferenceSookman law society_copyright_2012_conference
Sookman law society_copyright_2012_conference
 
Glover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.pptGlover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.ppt
 
A&M Records Inc v Napster
A&M Records Inc v NapsterA&M Records Inc v Napster
A&M Records Inc v Napster
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
1.4 CASE STUDY The Pirate Bay Searching for a Safe Haven© To.docx
1.4 CASE STUDY The Pirate Bay Searching for a Safe Haven© To.docx1.4 CASE STUDY The Pirate Bay Searching for a Safe Haven© To.docx
1.4 CASE STUDY The Pirate Bay Searching for a Safe Haven© To.docx
 
Mc carthy technology law_summit
Mc carthy technology law_summitMc carthy technology law_summit
Mc carthy technology law_summit
 
CED013014
CED013014CED013014
CED013014
 
Future of Internet Copyrights: Recent Cases and Congress
Future of Internet Copyrights: Recent Cases and CongressFuture of Internet Copyrights: Recent Cases and Congress
Future of Internet Copyrights: Recent Cases and Congress
 
Understanding Legal Use Cases for Web Archives
Understanding Legal Use Cases for Web ArchivesUnderstanding Legal Use Cases for Web Archives
Understanding Legal Use Cases for Web Archives
 
Intellectual Property Law Roundtable - What Businesses Need to Know | Los Ang...
Intellectual Property Law Roundtable - What Businesses Need to Know | Los Ang...Intellectual Property Law Roundtable - What Businesses Need to Know | Los Ang...
Intellectual Property Law Roundtable - What Businesses Need to Know | Los Ang...
 

Mais de GiantSteps Media Technology Strategies

Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?GiantSteps Media Technology Strategies
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisGiantSteps Media Technology Strategies
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...GiantSteps Media Technology Strategies
 

Mais de GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
 
Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt
Copyright and Technology 2011: Opening Remarks - Bill RosenblattCopyright and Technology 2011: Opening Remarks - Bill Rosenblatt
Copyright and Technology 2011: Opening Remarks - Bill Rosenblatt
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra

  • 1. Arthur Hoyle Senior Lecturer in Law and Technology School of Law University of Canberra
  • 2. W ill l k t f l t We will look at a few relevant cases  the history of copyright represents a continual struggle  between public and private rights, with first one and  then other gaining a temporary ascendency  I want to look briefly at a number of recent Australian  cases, and in particular:  cases  and in particular:   Ice TV,   Kazaa,   Larrikin Records  iiiNet ; and  Optus
  • 3. Ice TV  The pre‐existing relevant law represented a rejection  of the American Feist line on originality in  compilations by the Australian courts  The High Court of Australia rejected Nine’s complaint   The High Court of Australia rejected Nine s complaint,  saying that there was little substantial originality in  arranging a list the time and title information in  g g chronological order.
  • 4. The Larrikin Records case  Kookaburra Sings in the Old Gum Tree is and old  Australian song created for a competition CCopyright purchased for $6,000 from an estate sale i h  h d f    f       l  Fifty years later Men At Work recorded Do you come  from the Land Downunder which was alleged by  Larrikin to contain elements of Kookaburra in a flute  riff subsequently added by Greg Hay q y y g y
  • 6. Relevant Materials  http://www.youtube.com/watch?v=IbsfupH8W1o&fea ture=related (play to 1:06)  http://www.youtube.com/watch?v=IT8SHafGIpU&fea ture=related ture related (start at 1:30 and go to 2:36)  http://www youtube com/watch?v=OZzm1C‐ http://www.youtube.com/watch?v=OZzm1C‐ NlME&feature=related
  • 7.
  • 8. The Court Found  There was objective similarity sufficient to be classified  as breach, but  It did not amount to a finding that the flute riff is a   did         fi di   h   h  fl   iff i     substantial part of ‘Down Under’ or that it is indeed  the  hook  of that song the ‘hook’ of that song  The 40% to 60% damages claimed were "excessive,  over‐reaching and unrealistic“ g  Were assessed as 5% going back only to 2002
  • 9. A Shift in Judicial treatment of A Shift in Judicial treatment of  Copyright?  Seen in the context of Ice TV, this was seen by many in  the interested legal community as indicating a  discernible shift in the court s view of copyright and its  di ibl   hift i  th   t’   i   f  i ht  d it   enforceability through a distinct softening in the  sanctions
  • 10. Th Sh K The Sharman or Kazaa case  Sharman Networks and certain others associated with  the Kazaa P2P “file sharing” software were liable for  the authorisation of copyright infringement engaged  in by Kazaa users.  The Judge expressed the view that “it has long been  The Judge expressed the view that  it has long been  obvious that those (warnings in end user agreements)  measures are ineffective to prevent, or even  substantially to curtail, copyright infringements by  users”
  • 11. Kazaa  His Honour stated that he wished to be careful in  protecting copyright whilst balancing the rights of  subscribers to freedom of expression and  communication where no infringement occurs  The court could be seen as pushing back against large  scale claims of this type, and this was to at least  yp partially proven to be the case in the later iiiNet case
  • 12. The iiNet case  AFACT sent notices to iiNet, attaching information  allegedly demonstrating that iiNet users were using  BitTorrent to infringe the film companies’ copyright to infringe the film companies  copyright  the court reviewed not only the Kazaa decision but all  relevant precedent including  Moorhouse, Jain, Metro,  Cooper and K C   d Kazaa  It found that “the means by which the applicant's  copying is infringed is in iiNet users' use of the  users  use of the  constituent parts of the BitTorrent system. IiNet has  no control over the BitTorrent system and is not  responsible for the operation of the BitTorrent system” system
  • 13. The situation in Australia post iiNet The situation in Australia post‐  the mere provision of the facility to copy is not  considered sufficient to render the supplier of the  service guilty of any act that affects a third party  undertaken using that service  The High Court in its ruling on an appeal from the  Federal Court held that iiNet had no direct technical  power to prevent its customer from using the  BitTorrent system, and that iiNet’s only power was  indirect
  • 14. The Optus Case p  Optus used a minimal delay before they rebroadcast  material originally sold by the football codes to Telstra  i l  i i ll   ld b   h  f b ll  d    T l   under a process by which Optus customers can record  and watch matches screened on free‐to‐air television  and replay with delays as short as two minutes on some  devices  An appeal panel of the Federal Court overturned the  decision, finding that the Betamax precedent was  inapplicable  This reinforced the status quo, and in doing so  restated the validity of contractual arrangements  involving the assignment of copyright
  • 15. The Struggle therefore continues The struggle therefore between public and private  rights in the use of materials produced by others goes  on, but is seems that the ever present pendulum is  now swinging back towards the public interest at the  expense of the private one