Trade talks hone in on Internet abuse, ISP liability
Could ISPs be forced to snoop on their subscribers?
IDG News Service - ISPs around the world may be forced to snoop on their subscribers and cut them off if they are found to have shared copyright-protected music on the Internet, under an international agreement being promoted by the U.S.
Countries including Japan, Canada, South Korea, Australia as well as the European Union and U.S. have been negotiating an anti-counterfeiting trade agreement (ACTA) over the past two years to combat the growing problem of counterfeit products ranging from designer clothes to downloadable music.
The countries are due to discuss the ACTA at a meeting in South Korea on Wednesday, focusing specifically on the issue of Internet piracy. The U.S. has drafted the text of the chapter on the Internet.
In a summary of the U.S.'s position shared orally with trade officials at the European Commission in September, signatories of the accord must "provide for third-party liability." The Commission informed all 27 countries in the E.U. of the U.S. position in a memo seen by IDG News service.
Under existing laws in the U.S., the E.U. and elsewhere, ISPs are granted immunity from prosecution for illegal activities carried out by subscribers across their networks. This new global trade agreement appears to contradict the legal status quo, said Michael Geist, a law professor at Ottawa University in Canada.
This provision would mean that every country that signs up to ACTA must allow content owners such as record companies and Hollywood studios to sue ISPs for failing to stop their subscribers from illegally sharing copyright-protected material such as music and movies.
U.S. trade officials have been slow to show trading partners its draft of the Internet chapter ahead of Wednesday's meeting. "This is an intellectual property agreement yet it is being treated like nuclear secrets," Geist said.
The Commission memo said the U.S. is secretive about the Internet chapter because it is "sensitive due to the different points of view regarding the internet chapter both within the Administration, with Congress and among stakeholders (content providers on one side, supporters of internet freedom on the other)."
Geist has been "troubled" about the secretive way the ACTA has been drafted "from the beginning."
"It is unprecedented for an IP treaty that impacts literally millions of people to be negotiated in such secrecy," he said, adding that the U.S. negotiating stance "runs counter to the Obama Administration's commitment to transparency."
Europe appears willing to back up the U.S.'s plans to make ISPs more liable for the content on their networks, according to Joe McNamee, European affairs specialist for Digital Rights Europe, a free speech and privacy pressure group.
The prevailing E.U. law on the matter of ISP liability is the e-commerce directive, which grants service providers protection from prosecution as long as they are just the conduit and not involved with the sender or receiver of illegal content.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts