Secret copyright treaty draft leaked after Washington talks
IDG News Service - Another round of negotiations, another leak: Knowledge Ecology International (KEI) published what it says is the latest draft of the secret Anti-Counterfeit Trade Agreement (ACTA) over the weekend.
In its latest draft, ACTA appears to have gained a preamble in which the parties to the treaty set out broad principles including their desire "to address the problem of copyright or related rights infringement which takes place by means of digital networks in a manner that balances the rights of the relevant right holders, online service providers and users of those networks."
However, a footnote then warns that negotiators will modify this worthy paragraph to ensure it conforms to the text agreed for Article 2.18, Enforcement in the Digital Environment, rather than the other way around.
The text published by KEI, dated Aug. 25, purports to be the negotiating draft of the copyright treaty agreed to behind closed doors at a series of meetings held in Washington, D.C., last month.
Drafts of the treaty have leaked out after most of the negotiating rounds, despite U.S. insistence that the text remain under wraps until it is finished. Most of the other parties to the treaty have been pushing for more openness. Other parties to the negotiations include Australia, Canada, the European Union, Japan, South Korea, Mexico, Morocco, New Zealand, Singapore and Switzerland.
Initial concern about the treaty text revolved around requirements that signatories introduce a so-called "three-strikes" system for identifying, warning and ultimately disconnecting Internet subscribers accused by rights holders of illegal file-sharing. The leaks show that proposal has disappeared from the treaty but the language that replaces it is still one of the most hotly disputed parts of the text: Article 2.18.
This article no longer requires online service providers to monitor their customers' activity in order to escape liability for copyright infringement by their customers, and only suggests that signatory states "may" give competent authorities the power to order online service providers to identify subscribers accused by rights holders of infringing copyright.
The countries have battled over how to protect the rights of "rights holders" without agreeing who they are talking about: One footnote warns that the "Right holder definition must be clarified."
Another definition still up for grabs is what exactly are "effective technical measures" -- often referred to as DRM (digital rights management). All agree to "provide adequate legal protection and effective legal remedies" against their circumvention.
However, the E.U., Japan and New Zealand say only that the term should cover "copy controls," leaving the detail for individual countries to decide for themselves. Others, including the U.S., Australia and South Korea, favor a tighter definition of an effective technical measure as a "technology, device or component that, in the normal course of its operation, controls access to a protected work, phonogram, or protects any copyright." Most countries are willing to provide an exemption, in this clause, for circumventing DRM that serves only to limit the geographic playback of material, such as the region code on DVDs.
The document published by KEI is still full of brackets and braces denoting unsettled business, so negotiators taking part in the next round of talks in Tokyo later this month, will have plenty to do.
Peter Sayer covers open source software, European intellectual property legislation and general technology breaking news for IDG News Service. Send comments and news tips to Peter at firstname.lastname@example.org.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts