Statement to the Draft Report
Transcription
Statement to the Draft Report
Register IDs: BDWi: 66554994595-42, Web-Guard: 938641310866-54 ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS Statement to the Draft Report on ‘Towards a renewed consensus on the enforcement of Intellectual Property Rights: An EU Action Plan’ 2014/2151(INI) Committee on Legal Affairs / Rapporteur: Pavel Svoboda 26.2.2015 Jörg Weinrich IVD – Association of German Video Rental Dealers, CEO; www.ivd-online.de Web-Guard - Association for Rights in the Internet, CEO; www.webguard-online.de BDWi – German Association for Service Economy, head of the work group “Law in the Internet” www.bdwi-online.de Contact: IVD e.V., Mercatorstrasse 15, 40545 Düsseldorf Tel.: … 49-211-577 390-0, E-Mail: [email protected] We welcome the report on the EU Action Plan on the enforcement of Intellectual Property Rights and particularly emphasises and supports the ‘follow the money’ approach, the improvement of IP civil enforcement procedures and the focus on commercial scale IPR infringements. 1) Consumer awareness and information A German opinion poll by GfK1 indicates that people generally know what is allowed: • Only 2% believe, offering media content or making it accessible on sharehosters, P2Pnetworks or newsgroup services is permitted. • Only 3% believe, downloading media content in peer-to-peer networks is permitted and 11% believe you are allowed to watch new cinematic releases on portals like kino.to, movie2k etc. This knowledge is also a result of the press reporting about police measures taken against the people who organized the illegal kino.to network. Moreover in other countries of the EU, the press covered such topics as blocking illegal sites, the ECJ-verdict about blocking kino.to, warning notices like Hadopi and police measures against illegal offers in the Internet. Therefore, we believe that the consumer is normally able to identify the main-offers in the illegal market. So we should set our priority on children so that the next generation also knows what is allowed. Therefore, we would welcome to learn more about best practices. 2) Developing new business models In 2011 two-thirds of German consumers said that the legal online-offers of media-products were satisfactory. Nearly the half said they have found the perfect offer. 2 Since 2011, the legal offers have improved in nearly all countries. Nevertheless, we have got new piracy records: • The finale season of “Game of Thrones” has set a brand new piracy record in Summer 2014. A quarter of a million people shared a single file at the same time and 1.5 million file-sharers downloaded a pirated copy during the first 12 hours. Interestingly, “Game of Thrones” was available through legal channels in most of the countries.3 • In February 2015 ”The Walking Dead“ (season five / part two) had 1.29 million downloads within 24 hours. It was offered legally at the same time.4 GfK, Studie zur Digitalen Contentnutzung (DCN-Studie) 2012, www.gvu.de/media/pdf/852.pdf; p. 29-30 GfK, Studie zur Digitalen Contentnutzung (DCN-Studie) 2012,www.gvu.de/media/pdf/852.pdf; p. 26 3 http://torrentfreak.com/game-thrones-season-finale-sets-piracy-record-140616/ 4 www.mediabiz.de/video/news/the-walking-dead-auch-bei-onlinepiraten-begehrt-wie-nie/390877 1 2 2 These records indicate there are other reasons for consumers using illegal content instead of legal content. Is it the price? In an EU-study 31% of the respondents said: ”many films are available online and I don’t see the point in paying“.5 A legal offer, which pays for the copyrights, can never be offered free of charge and is always more expensive than an illegal offer. So, the best way to strengthen the legal suppliers is to reduce the amount of illegal copies in the Internet. To reduce the number of illegal downloads, measures against ISPs and intermediaries are needed. 3) Involving all actors in the supply chain / Follow the money Many actors offering illegal content in the Internet act anonymously. So you need a broad approach to have a chance to reduce these illegal services. Therefore, we welcome the plan to involve all actors in the supply chain. Looking at the illegal supply chain, it includes service providers like datacenters, advertisers and payment providers. We tried to reduce ads on illegal sites by using the concept of “follow the money“ and in our experience soft-law measures are not enough: • The people running these websites sometimes finance their illegal businesses through fees for premium accounts and often by selling advertising space on their websites.6 So, we and others associations informed companies that their ads had been placed on illegal websites. Up to now about 2,000 warnings have been sent in Germany.7 But it is an ongoing issue: A lot of companies we have informed haven’t stopped advertising there. We still find some normal companies and a lot of semi-legal businesses like gambling and sex chats. But soft-law measures do not help against semi-legal sites. And they are powerless, if the browser game industry use these sites to find new customers, who like (everything) for free. • Additionally: The German Ministry of Economics organized a dialog between right holders and ISPs for several years without any result. Therefore, we recommend supporting such measures and to observe their important success or failure factors. This is probably a job for the Observatory. A profile of current and future audiovisual audience, p. 27; http://bookshop.europa.eu/is-bin/INTERSHOP.enfinity/WFS/EUBookshop-Site/en_GB/-/EUR/ViewPublication-Start?PublicationKey=NC0414085 6 FDS, OpSec, Studie zur Nutzung von Zahlungsdienstleistern bei der Verbreitung urheberrechtlich geschützter Werke, 2014; www.webschauder.de/studie-zeigt-bezahlsysteme-sind-lebensadern-der-share-und-videohoster/ 7 See appendix: Our presentation for the European Commission, DG Internal Market and Services - Unit Fight against counterfeiting and piracy; June 2013 5 3 But that is not enough. We need measures against companies who support illegal offers. Being involved in the piracy networks, there is a low level of risk for the intermediaries but a chance to earn money. So they often do not take measures against the illegal sites, which are their clients. We need stronger legislation to counter the support of illegal sites through ads and payment services. Right owners need the possibility to start civil proceedings against these supporters. So we recommend - in addition to no. 20 - a new no. 5: Believes that not all parts of the supply chain and their service providers (including datacenters, advertisers and payment providers) are willing to stop their continuous support of illegal offers. Therefore, we call on the Commission to develop measures by civil proceedings against continuous support of illegal offers. 4) Evolution of the legal framework The legal framework is just a small part of the report but it is the most important one. a) Enforcement Directive An optimized right of information [EC-Directive 2004/28] would be helpful:8 • One important chance to trace the perpetrators is to follow the money. But this is not possible, because the right of information [Article 8 (2)] is limited. It does not include the “bank account information“. Moreover if the right owner knows the bank account details, he has no chance to get the name of the account holder to sue him. In these cases “banking confidentiality” is stronger than the “right of information” [Article 8 (3e)]. There isn’t any fair balance as long as private data protection prevents civil proceedings against perpetrators. The balance would be better, if the “right of information” includes bank account information. A judge should be able to order a bank to give the right owner the name (address etc.) of the perpetrator who owns the bank account involved in the breach of copyrights. • It is difficult to get information from providers and intermediaries. Experience has shown that providers often claim, that they store really little data, so they could not help to trace the perpetrators. Right owners do not know what kind of information they store. Therefore, we recommend that it should be possible to ask the provider, under oath, in an interlocutory injunction if he has got any information. 8 See Appendix “Right of Information and Internet Piracy” 4 Therefore, we would welcome modifications to no. 18: 18. Takes note of the Commission’s report indicating that the IPR Enforcement Directive is in some respects out of step with the digital age and insufficient for combating online infringements; calls on the Commission to come up with a detailed assessment of the limitations of the current legal framework as regards online activities and, if appropriate, with proposals for adapting the EU legislative framework to the internet environment, which takes payment processes and unwillingly intermediaries into consideration. b) E-Commerce Directive (Article 12-15)9 More than fifteen years ago the E-Commerce-Directive introduced a exemption from liability because the ISPs didn’t have many possibilities to influence the Internet and to regulate their services. As a “result” sharehoster (one-click-hoster, filehoster etc.) say they are not liable for the content of their hosting services and they offer millions of Downloads (we estimate at least 600 mio. direct downloads in Germany in 2014 10). Consumers are using these hosters overwhelmingly for illegal content.11 They often store the illegal content in European datacenters, who earn a lot of money. Today there are many technologies to regulate the Internet, so they ISPs could act without an exemption from liability. At the very least, providers should be allowed to use the exemption from liability only when they actively avoid illegal content. Moreover, ISPs that provide services for unknown customers should be liable. Therefore, we recommend a new no. 21: Calls on the Commission to prove if the E-Commerce Directive takes into account the fact that today there are numerous possibilities to regulate the services and to prove if it would be possible to reduce the release from liability only for providers who take measures to avoid illegal content and who know their customers. 9 Furthermore, the Initiative Urheberrecht demands new rules of liability in the answer to the Reda-Report: „Die medienrechtlichen Ausnahmevorschriften, die Provider und Intermediäre von der Haftung für auf ihren Plattformen stattfindende Urheberrechtsverletzungen frei stellen, müssen überprüft werden; es bietet sich im Rahmen dieser Prüfung an, leichte Rechtsverletzungen (im Zusammenhang mit „user generated content“ z.B. Nutzung von Werkteilen) im Rahmen von Schranken gegen Vergütung – zu zahlen durch die Intermediäre – im Rahmen einer Schranke zuzulassen, um auch hier die Basis für eine Versöhnung zwischen Endnutzern und Urhebern zu schaffen.“ www.urheber.info/aktuelles/2015-02-13_reda-entwurf-ini-urheberrecht-nimmt-stellung 10 Overview of the illegal distribution via hosting services in 2013: www.webschauder.de/spielfilme-2013-der-illegale-marktdominiert/ 11 GfK, OpSec: Studie zur Nutzung von Sharehostern 2013, www.webschauder.de/erste-studie-zur-nutzung-vonsharehostern/ or www.faz.net/aktuell/feuilleton/medien/sharehoster-studie-komm-auf-meine-festplatte-12113447.html 5 5) Focus on SMEs The access to justice is difficult if the law lacks precision and clarity. Unclear laws prevent judicial proceedings for SMEs. They can’t afford it. So a better legal framework is an important contribution for SMEs. If the report demands the Commission and Member States to put more pressure on the industry to develop licit offers (no. 8), it will be difficult for SMEs to take part. This will be a business for American companies such as Netflix or iTunes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ight of Information and Internet Piracy Possibilities, Limitations and Suggestions for Improvements March 2012 Jörg Weinrich Geschäftsführender Vorstand des Interessenverbands des Video- und Medienfachhandels in Deutschland (IVD) Geschäftsführer des Web-Guard - Verein zur Förderung der Rechte im Internet Leiter des Arbeitskreises „Rechtewahrung im Internet“ des Bundesverbands der Dienstleistungswirtschaft (BDWi) Contact: IVD e.V., Hartwichstr. 15, D - 40547 Düsseldorf E-Mail: [email protected], Tel.: 0211-5773900 I. Internet Piracy Customers find copyright infringing products through using piracy portals like thepiratebay.se or boerse.bz. They download the files either from P2P-networks or directly from filehosters (also called sharehoster, streaminghoster, one-click-hoster or cyberlocker). For example: rapidshare.com, uploaded.to or megavideo.com (closed). According to the German DCN study, illegal downloading using hosters is more important: 16 % P2P 42 % Sharehosters 42 % Streaminghosters (www.gvu.de/media/pdf/780.pdf) Internet Piracy Downloader Google, Bing etc. Piracy Portal Link referer Filehosters (Download and Streaming) Bit-Torrent E-Mule link publ ishin g file upl oad Uploader Filehosters pay financial rewards to uploaders who generate a lot downloads. 2 Hosters generate turnover through advertising and selling premium accounts. According to the indictment against the owners of the hoster megaupload, the “Mega Conspiracy” collected $150 million subscription fees from premium users and $25 million through online advertising. Piracy and money income expenses Advertising industry Add s The money was transferred by online payment. They got $100,000,000 through PayPal and $5,000,000 through Moneybookers. Host Provider p remiu m accou nts finan icial servers etc. rewards Payment Provider Filehoster (Download and Streaming) II. Problems with information rights The EC-Directive 2004/48 gives the owners of (copy)rights a ”right of information“ (Article 8). This right of information could help to find perpetrators within hosting services: If a customer loads a lot of files onto a filehoster, the hoster should know who it is. He could have an address, an e-mail-address or even payment information because the uploader paid for a premium account or received a financial reward for uploading a lot of interesting files. Uploaders of Sharehosters and Streaminghosters Possibilit ies of investigation and using of information rights l ink publ ishin g Perpetrator‘s address Piracy Portal Copyright owner finds uploader and “t heir“ files fil e uplo ad Shareor Filehoster Streaminghoster ha s information ab out the perp etrator: Email Provider address bank account information address email address Payment Provider address payment information 3 Web-Guard and some copyright owners tried these ways and found some problems: 1) Bank account information Filehosters do not store addresses of customers. E-mailaddresses of customers are often used anonymously. So the only relevant data are the bank account details. But the copyright owners don’t have any right to get this information, because they are not listed in the law (Higher Regional Court - OLG Köln, verdict of 25.03.2011 – Az. 6 U 87/10). We recommend that bank account information is added to Article 8 2.a. 2) Banking confidentiality Moreover, it has to be clear that banks have to provide this information to trace the perpetrator. Otherwise they are not allowed do it because of “banking confidentiality” ((Verdicts: Higher Regional Court - OLG Stuttgart 23.11.2011 – Az. 2 W 56/11 and Regional Court- LG Hamburg 19.8.2011, Az. 408 HKO 3/11). The “right of information” has to be stronger then the banking confidentiality. Article 8 3 e should to be adapted. Uncooperative filehosters Some anonymous filehosters refuse to delete copyright infringing files after they are informed about the files (no notice and take down). These filehosters offer premium accounts, so you can register and pay the premium account and you could have a possibility to find the perpetrator. But you will not get the address of the perpetrator because of bank confidentiality. Uncooperative Filehoster Copyright owner Pre mium account Ri ght of informatio n Payment Payment Provider Address Unkooperativer Uncooperative Shareoder Streaminghoster Filehoster (Download or Streaming) refuses to delete illegal files Higher Region al Court S tuttgar t 4 Problem for trademark rights Moreover, if the owner of a trademark buys a counterfeit from a perpetrator in the Internet (ebay, amazon marketplace or an illegal pharmacy) he has to pay. So he has got bank account details. But he will not get the address of the perpetrator because of bank confidentiality. 3) Direct or indirect Article 8 1 c states that ”services used in infringing activities“ have to provide information. It is obvious that a hoster is used in the infringing activity of an upload or download. But when the perpetrator uses a bank to pay this hoster or uses an e-mail-address to be a customer of this hoster then it is not clear if these services are used “in” infringing activities. So it should be clear that all services which are used directly or indirectly for the infringing activities have to give information. 4) Trustworthiness Right owners do not know what information the provider stores. Experience has shown that providers often claim they store nearly no data: a) In the case of P2P-networks, you can see the IP-addresses of the down- and uploader. The access provider knows who uses this IP-address. But only some access providers give names and addresses belonging to IP-addresses. Others say they don’t have any data or they do not know how to get the data out of the system. Access providers who refuse to give addresses are becoming more important for P2P copyright infringements. Market share I/11 onlinekosten.de (1) Access Provider Deutsche Telekom AG Hansenet / Alice / o2 Vodafone / Arcor First half-year 2011 48.5% 10.4% 13.8% Share of copyright infringements (movies) (2) January 2010 22.8% 23.4% 20.2% June 2011 12.4% 28.1% 26.4% (1) www.onlinekosten.de/breitband/breitbandkunden (2) OpSec Security in regard to infringement in the P2P sector b) Filehosters claim that persons who uploaded more than hundred movies do not have a premium account and so they don’t have any data about this person on record. c) Payment providers claim they have only parts of the mobile phone number used for paying the hoster. Three months after the payment they cannot say which mobile provider paid them. 5 Normally the copyright owner will loose the case. The judge believes the providers that they don’t store the data. But nobody knows if it is true and the right owner can’t give evidence that the data is available. The only possibility is to start a principle proceeding where the CEO has to claim, under oath, that he has no data. But this would take a year to get information. But after a year there won’t be any information left. We recommend that it should be possible to ask the provider, under oath, in an interlocutory injunction. III. Result The “right of information” can help within P2P networks, if the access provider is willing to cooperate. But verdicts make it impossible to use it for copyright infringements on filehosters. Uploaders of Sharehosters and Streaminghosters Poss ibilities of investigation and using of information rights l ink publ ishin g Perpetrator‘s address Piracy Portal Copyright owner finds uploader and “their“ files fil e uplo ad art. 8 1c “in “ Email Provider address bank account information Hi gher Reg ional Co urt St uttgar t Shareor Filehoster Streaminghoster ha s information abo ut the perp etr ato r: address (u nusua l) e-mail address Payment Provider address Hig her Region al payment Co urt Colo gne information So the “right of information” is only useful in a small part of the piracy market. 6