Introduction
Intermediaries are third party organizations that offer intermediation services between the parties trading amongst themselves. Such organizations act as ducts for services offered by a supplier to the relevant consumer. Value addition to the service in question is a key aspect of the trading platform offered by such intermediaries, which is highly improbable if the trading is done directly. Provision of a trading platform for any kind of electronic commerce is the key link of the existence of an intermediary.
As existing in the technological age the surfaced usage includes the financial militaries along with the insurance sector. Financial services where insurance brokers, mortgage brokers and financial advisors offer select intermediation services for and in the supply of financial products such as mortgage loans, insurance premiums and investment services and products.
The intermediaries find their relevance in the Barter system in the following manner for in the aforementioned system, the intermediary is a person or a group who stores valuables in practices such as trade until those are needed. Parties to such transaction have space available to take delivery of them and store them or until and unless the requirements that follow are met. Facilitator of a contract between two parties is also an intermediary.
Classification of intermediaries is very important aspect of any transaction or for understanding purposes. Such can be classified as merchant intermediaries and or as accountant intermediaries. The landmark case of Baile and Bakos (1997) analyzed a number of prevalent case studies and jurisprudence and thereby identified four such rules and duties of electronic intermediaries inclusive of information aggregating, provision of trust, matching and meeting of minds and facilitation.[2]. The tagline of information economy has been recently glued to economy yet till date the market has always relied on the exchange of relevant information.
Neoclassical model of economics has largely ignored the importance of information[3]. As per the assumptions of a neoclassical model of the market, the market information should be perfect wherein the transaction costs are low whereas in reality such a perfect market is impossible. Actors of such structures are not having the adequate and asymmetric information so they shall and they do make decisions based on bounded rationale. The aforementioned lack of perfect information rests and results in increased transaction costs for the sellers as well as buyers.
Traditionally the intermediaries in question have served to reduce such information related transaction costs. An economic agent is what an intermediary shall act as, which in turn helps buyers and sellers find each other and help in executing a transaction stacked. In addition to that the said intermediaries help in order to classify followed by sorting the market information and finally distribute the market information and goods. The role of intermediaries does not end at the behest of distribution of the goods and services but has grown and become more specialized as advances in transportation as technology increases the size and complexity of any such market place.[4]
As for the present day, however, advances, which take us into far future, threaten the role of a tradition intermediary. If the logs of the World Wide Web were to be checked such technologies transform the said locale of any such business transaction-taking place under themselves from the traditional to the cyber market place. The Internet does exponentially expands the scope and the size of any said market, it also give direct link access in between the seller and the consumer. Businesses do advertise and market directly to the consumers whilst the said consumers employ and enjoy web tech capabilities to seek out the services they seek. Disintermediation is what is addressed by such technological capabilities of today’s era. And thus eliminate the middleman in any such transaction.
Advancement of the paradigm concerned is shifting its focus on the html space from the traditional goods to such information goods and services thereby entering into a true information economy. Infrastructure of the Internet adds value to such information by the enhancement of the ability to retrieve, filter, store, repackage and distribute the same.[5] Information can be very easily and in accordance to the consumer/ seller/ retailer being turned into a commodity and be bought or sold at a market place. Usage of Internet for businesses now days can attract a huge client base and opportunities. Information about credit cards/ bank accounts and other personal data.[6] Online businesses, in today’s era collect consumer data and sell it for direct marketing. Business can, truly, maximize profits and minimize transaction costs. Thereby proving that information commodities are not only intangible goods but also personal information is negatively politicized.
There is, however, a greater potential for the information, personal, to be misused by such Internet based businesses. Capitalizing on consumer information compromises on consumer’s privacy rights and loss of property.[7] Consumers never have any kind of control over how their information, personal, shall be used. Not so surprisingly, there has been a relevant concern in pertinence to consumer privacy.[8]
The conceptual net of an intermediary and its conceptualization
Any question related to the success rate of an intermediary shall be dealt with once the prospect of intermediaries is clear to us. Examination of the aspect of reduction of uncertainties in digital age also has to be dealt with caution and should be preceded by laying out a conceptual framework which would inherently focus on uncertainties in the digital age of today. The key aspect of the digital information is to be understood if at all we intend to find out what role an intermediary does play in our economic system. Such hitting the nib of concepts will serve as a basis and further when intermediary is analyzed both in historical and present-day markets.
Information and how it is relevant
Information is an ambiguous aspect, which has started to affect the economy in the last 100 years, and therefore needs to be addressed.[9]Given the focus of this thesis on the role and liabilities of an intermediary, a definition, which aptly relates to the same, exists.[10] Anything which can be exploited to remove/ reduce uncertainty in decision-making is information.[11] “‘Depression of individuals’/ the subjective belief of distributions over all state of the world is what uncertainty can be defined as”.[12] Thereby information is any diction which a user/ individual receives and that reduces the uncertainty in prevalent in his current environment; this is referral to the product, its price and the like.
Uncertainty has in the past created markets for information. Wherein agents are un-aware of the future event; the quality of the product, the honestly another person carries, they seek information to reduce uncertainty.[13] Information has always decreased the risk involved in complex and complicated transactions. Risk, as defined is “the potential for loss when uncertain future events might cause harm to the economy”.[14] The understanding of the exploitation of information it is first, absolutely required to remove any such queries.
Information can largely be described by properties, which hold a common referral value. Information for one is an intangible source and resource and a good, which does not have any materialistic value.[15] In continuance, information is a highly fungible reserve. All information can be described by common properties.[16]Information trading can be a barter system trading and can be exchanged as a resource for another information or its source. The value of information always does vary with the perception and requirements of the current user.[17] The nature/ significance and the value of information vary according to its use. The production of information goods requires high fixed costs and comparatively low marginal costs.[18] Information, as we may understand is costly to produce but very cheap to be reproduced.[19] Information trading is a very profitable venture very much unlike the tangible goods and services. Post the initial payment, information can be used, reused and recycled any number of ways without any sort of additional costs. In the similar manner, information can be replicated at zero value and without any sort of limitation bar. Information never deteriorates or goes rugged unlike tangible goods. Information, however, may become obsolete and or untrue with the passage of time and its value may suffer because of that.[20]
A common feature that creates uncertainties in markets all together is the non-exclusivity and information is a non-exclusive product.[21] For referral the transfer of information in between a producer and a user, only one single copy of the information is actually mortgaged. The production house keeps the actual information. Thereby giving the producer the advantage of sharing and/ or using that piece of information again and again. In the similar manner, when the good is sold, the seller enjoys its subsequent benefits.[22] The information given to the seller can be replicated and sold by the buyer without him having to give any information about the aforementioned transaction to the seller. In such cases, the seller loses the compensation for the future use of the information so transacted. Disclosure is also an issue in case of the information being non-exclusive because such commercial use of the information may be revealed to others. Additional market uncertainty develops when such agents hesitate in publishing information and it is likelihood that the agents are likely to invest comparatively less in the production of information and its knowledge.[23]
Uncertainties in markets also develop because the information’s true value can never be predicted.[24] The consumer can never know the value of information before he buys the same. The exhibition of the information by the seller before selling has a way to create certain other uncertainties as well. A traditional buyer is always at risk, never he shall know the surest nature of the information being transacted, purchase. Under-development of markets is also a repercussion of such uncertainties.
Consideration of such unique persona of a piece of information, we are bound to ace that information does not fit comfortably in the neo-classical market system and its economy. Boisot in 98’ pointed out that the problem of neo-classical economics has been addressed schizophrenically.[25] Information is treated as a free good by the economic system and not subject to trading yet on the other had it is being traded. Efficient markets gain a perfect foresight as a support to the information-trading era and practice.[26]
Overcoming the problem of imperfect information and information symmetry, a mediator can be appointed who would in –short mediate between the buyer and the seller/ creation of any such agent is a solution, a mediator w/ agent who would act in both the buyer and sellers interests. The repeating of dealing and reputation affects would discourage misrepresentation of such information to the buyer. Such a solution aligns all kinds of incentives in between producers and users. Thus, a third party -an intermediary-reduces information asymmetry.
Neoclassical finances fails to take into attention the uncertainty of intelligence, requiring alternate principles to explain the business of markets. Such two theories are hereby discussed.
Agency Cost theory
An agency cost is a financial concept concerning the rate to a "principal" (an organization, person or assemblage of persons), when the principal selects or hires a "mediator" to act on its behalf. Because the two parties have diverse interests and the manager (mediator) has more information, the major (party with the issue) cannot directly ensure that its agent is continually acting in its (the principals') best welfares.[27]
Mutual examples of this cost include that which are tolerated by shareholders (the primary), when corporate organization (the agent) buys other corporations to expand its market, or spends currency on wasteful pet schemes, instead of maximizing the value of the business's worth; or by the voters of a politician's area (the principal) when the representative (the agent) passes legislature helpful to large suppliers to their campaign rather than the supporters.[28]
Though effects of help cost are near in any agency connection, the term is most used in trade contexts.
Transaction Cost theory
In social science and connected disciplines, The value of a deal may be a value incurred in creating associate economic exchange (restated: the price of taking part in an exceedingly big/growing market).[29]
Transaction prices are divided into three broad categories:[30]
Search and data prices are unit prices, like those incurred in deciding that the specified functional article is accessible on the market; that has all-time low worth, etc.
Bargaining prices are unit specific prices in which case the buyer needs to come back to an appropriate agreement with the opposite party to do the dealings, draw up associate applicable contract then on. In theory of games this can be analyzed for example with the game of chicken. On quality markets and in market microstructure, the dealings value is which a very few perform in the space between the bids and rise.
Controlling and social control prices are unit specific prices that tend to create positive scenarios so that the opposite party sticks to the terms of the contract, and taking applicable action (often through the legal system) if the behavior of the opposite parties seems questionable. For example, the customer of a brand new automotive faces a spread-jam of various dealings prices. The search prices are the prices of finding an automobile and deciding the car's condition. The dialogue focuses on the diversification of the prices thereby negotiating upon a price with the retailer.
Internet Service suppliers and Their Liability
The DMCA defines ‘service provider’ in two such ways that, each is applicable to totally different subsections. A ‘service provider’ as ‘an entity giving transmission, routing or providing the relevant connections for digital on-line communications, between or among points mere by a user, of the material of user’s selection, without modification to the content of material as sent or received’,[31] the second half of the section states that a ‘service supplier’ is loosely outlined as ‘a provider of online services or network access, or the operator of facilities so required.’[32] This broad definition is aimed directly on the half of the framers to embrace universities and different establishments that offer Internet access to their students and researchers, etc. Moreover, it is conjointly broad to embrace the current ISPs, as well as suppliers of new services in the future.[33] The four main provisions of the DMCA address varying functions of the said associate ISP. In Section 512(a) protection is given for the passage operate and it protects ISP for ‘transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service supplier.’ Section 512(b) limits liability of associate ISP for caching and Section 512(c) protects storage of material on the provider’s system or network at the direction of the user and finally, ISPs who offer data location tools such as links or directories that are also protected, subject to bound circumstances.[34]
Despite varied laws protective IPR; it is still associate enormous task to keep a check on the copyright infringers on the web. Several lobbying teams and especially those who are acting as individuals in the music industry[35] in USA were in favour of holding ISPs liable for copyright infringement by the subscribers. It is important to take note of the truth that there is a fundamental distinction between on-line services involving transfer of content and the services themselves providing the contents.[36] Though, it is truthful enough to hold ISPs liable in the latter situation, it is transparently unfair to hold ISPs liable for the infringing actions of their subscribers. ISPs can be liable for copyright infringement if they are directly concerned in the repetition of protected material. For example, if an ISP makes offered ill-gotten copies of latest songs on its web site it would be guilty of copyright infringement. However it is not truthful to hold ISP liable for the actions of a subscriber who shares ill-gotten copies of songs over Internet without ISP having any knowledge of these infringing actions of the subscriber.
One of the main reasons behind involving ISPs in the method and holding them liable is a definite result of typical contracts that they enter into with their customers, ISPs are authorized to shut down websites as well as e-mail addresses in case of infringement. In order to take requisite action(s) they also have facilitated stern lines for news abuse.[37] In United Kingdom, beneath the information Protection Act, the ISPs are prevented from revealing the names of subscribers without their permission or an associate order from the court to a third party. Wherefore, in the event of a copyright infringement, a copyright owner cannot determine anything pertaining to the address or location of the wrong doer. In order to directly sue the wrongdoer, the copyright owner has to force ISP to disclose the offender’s name.[38] Some believe that turning to ISPs is associate, economic as well as a productive means to deal with copyright infringers or even different e-infringers in general, particularly in locating the culprits.[39] The web permits users to remain anonymous and consequently, it has become impossible to zero in on the perpetrators, thus many are in favor of holding ISPs liable for the copyright infringements by their subscribers.
Moreover, the cost of proceedings way outweighs what is recovered in the end and holding an individual liable will fetch you the same outcome for an ISP shall pay more damages. However it is absurd to hold ISP liable for the actions of its user merely as a result of ISP has deeper pockets than the individual. Another argument in favor of holding ISPs liable was due to the nature of electronic transmission of information; if a subscriber uploads infringing copyright material his ISP would have reproduced it on its laptop servers and thereby be primarily liable for copyright infringement. But, this argument might not hold still for long, as mentioned earlier in this paper, the courts set that temporary electronic copies are excluded from the definition of ‘copies’. ISPs take unit vehement in their refusal to take blame for infringing action by the subscribers. They purpose out that ISPs are mere conduits of data and are no different than a ancient post workplace that is not liable for a calumniator(s) letter that is announce through it or a phone company that is not accountable for any obscene decision created by a user. Thus, liability of ISPs ought to conjointly be restricted. They conjointly argue that imposing liability on ISPs would in flip mean barricading the potential growth of web.
ISP liability for the actions of the subscribers is based on their data of the activities of subscribers. Where, the ISP is unaware of the subscriber’s activities, the courts are reluctant to hold ISP liable, however in cases wherever the concerned ISP is aware of the subscriber’s copyright infringement or wherever ISP should have well-known the activities of subscriber’s, it is highly attainable that the courts would hold ISP liable for copyright infringement by the subscribers.[40] At present, several national governments are of the read that ISPs ought to escape liability for infringements by the subscribers of that they are unaware of, but they have a duty to take away such content once such action is brought to their notice.[41] There are varied reasons as to why it is not feasible in apply for ISPs to be accountable for cases of copyright infringement. Taking note of the immense range of transactions that take place through ISPs, it is not sensible to expect ISPs to monitor the content that passes through their systems. It is not possible and valuable for ISPs to police the content of the websites used by millions. Moreover, the instant nature of the transactions conjointly create it difficult to choose the content or even to edit it or merely keep a watch over it. As per William Foster, ‘ISPs are similar to common carriers in that they have no control over that members of the public use their facilities, or the content, members of the public choose to transmit.’ so, requiring ISPs to monitor transactions in order to trace copyright violations would violate the rights of the subscribers and it would conjointly amendment ISP business model. The latest argument is that ISPs ought to be liable for direct copyright infringement in cases wherever they interfere with the automatic information flow and conduct a human screening method of objects announce to the websites they host. However what has to be taken note of is that inspite of human screening, it is humanly impossible to be hundred percent correct as to there is no infringement of copyright at all. The terribly truth that ISP has concerned a person to check for violations in addition to the terms and conditions is smart enough proof that ISP is doing its best to forestall subscribers from copyright infringement. In such a case, it is morally wrong to hold ISPs liable for the actions of the subscribers. however there are differing views on this point.[42]
Position of the USA
Pre-DMCA situation
Prior to the Digital Millennium Copyright Act (DMCA) once the liability of ISPs came up before the courts, there was nothing however the copyright law to rely on. Thus, some courts relied on strict liability while others control ISPs to be not liable at all. However, in 1996, theCongress passed the Communications Decency Act providing immunity to ISPs.
The Communications Decency Act, 1996
In 1996, the Communications Decency Act was enacted in the United States and Section 230 of the Act states that ‘no supplier or user of associate interactive computer service shall be treated as the publisher or speaker of any data provided by another information content provider.’ Thus, it gives immunity to interactive service providers from liability beneath state intellectual property laws.[43] As a result of this provision, holding ISPs liable for deciding to publish, withdraw or alter content is not possible.19 Similar to DMCA provisions that shield ISPs in case of third party copyright infringement, this provision was conjointly brought in as a result of holding ISPs liable for communications of others would adversely affect free speech and it would be unfair to hold ISPs liable for those actions. Moreover, as mentioned earlier in this paper, it is not possible to monitor the problematic content by ISPs.
In Chicago Lawyers’ Committee for Civil Rights beneath the Law Inc v Craigslist INC;[44]
The Hon’ble Court adjudged that the immunity provided to ISPs beneath Section 230(1) of the Communications Decency Act, extends to claims, seeking to hold associate ISP liable as a publisher for content authored by third parties, and not to all claims arising out of the ISP’s role in giving public access to such content. Thus, it will be seen that the immunity given to ISPs has limitations and ISPs will not escape from its liability in all circumstances.
Playboy Enterprises INC v Frena[45]
This was one of the initial cases wherever liability of ISPs for the copyright infringement of subscribers was examined.The defendant, George Frena, operated a Bulletin Board Service (BBS) for those who purchased bound product from the suspect and anyone who paid a fee might log on and browse through totally different BBS directories to look at the pictures and they might conjointly transfer copies of the photographs. Among several images that the defendant created offered to his customers, one hundred and seventy were unauthorized proprietary photographs that belonged to the litigant. The Court noted that the intent of the BBS operator was irrelevant and applied strict liability principle of the Copyright Act. The BBS operator was liable for direct infringement as a result of the defendant’s system itself equipped unauthorized copies of proprietary work and created them offered to the public. It was irrelevant that the suspect did not create infringing copies itself. However, with time the Court’s ruling was widely debated and discredited.
Religious Technology Center v Netcom[46]
Few years later, came the Netcom case. The plaintiffs, Religious Technology Center (RTC) control copyrights in the unpublished and revealed works of L Ron Hubbard, the founder of the Church of Scientology. The suspect, Erlich was a former minister of religion who had later on become a vocal critic of the Church. On associate on-line forum for discussion and criticism of religion, Erlich announce portions of the works of L Ron Hubbard. Erlich gained his access to the web through BBS that was not directly joined to web, however was connected through Netcom On-Line Communications INC. After failing to win over Erlich to stop his postings, RTC contacted BBS and Netcom. The owner of BBS demanded the litigant to prove that they owned the copyrights of the works announce by Erlich therefore that he would be unbroken off the BBS. The plaintiffs refused BBS owner’s request as unreasonable. Netcom similarly refused plaintiffs’ request that Erlich not be allowed to gain access to web through its system. Netcom contended that it would be not possible to prescreen Erlich’s postings and that to forestall Erlich from victimization the web meant doing the same to hundreds of users of BBS. Consequently, plaintiffs sued BBS and Netcom in their suit against Erlich for copyright infringement on the web. The Court reasoned that eventhough ‘copyright is a strict liability statute, there ought to be some part of volition or causing that is lacking wherever a defendant’s system is simply used to produce a copy by third party.’ The Court additional noted that, when the subscriber is directly liable it is senseless to hold different parties (whose involvement is simply providing Internet facilities) liable for actions of the subscriber. The Court conjointly noted that the notice of infringing activity of service supplier can implicate him for contributory negligence as failure to forestall associate infringing copy from being distributed would constitute substantial participation.
Substantial participation is wherever the suspect has data of primary infringer’s infringing activities and induces, causes or materially contributes to the infringing conduct of primary infringer. The Court rejected the argument of the suspect that associate ISP is similar to a common carrier and so entitled to exemption from strict liability written in Section III of the Copyright Act and declared that carriers are not sure to carry all the traffic that passes through them. Nevertheless, the Court did not impose direct infringement liability on ISP as that would result in liability for every single server transmitting information to each different laptop.
Sega Enterprises Ltd v Maphia[47]
In this specific case, the BBS Operator wittingly created his BBS to enable users to transfer the plaintiff’s proprietary video game package therefore that users might transfer and use the package uploaded by different users for free. The Court noted that simply because the suspect is not liable for direct infringement, however, will not mean that he is free from liability. Although, the Copyright Act will not expressly impose liability on anyone different than direct infringers, courts have long recognized that in bound circumstances, liability for conducive infringement will be obligatory. The Court discovered that conducive copyright infringement stems from the notion that one who directly contributes to another’s infringement should be control liable. Such liability is established where the defendant, ‘with the knowledge of infringing activity, induces, causes or materially contributes to the infringing conduct of another.’ Thus the Court took note of the data of BBS operator and his material contribution in the copyright infringement by subscribers and control BBS operator contributory liable.
Three years once the Netcom case, the DMCA was brought in. The on-line Copyright Infringement Liability Limitation Act11 was conjointly enacted as half of the Digital Millennium Copyright Act of 1998. However, the DMCA was associate update of the general law governing copyright, viz, the Copyright Act, 1976, that restricted the potential liability of ISPs regarding bound activities, and subject to their complying with bound conditions however did not exempt ISPs from liability.[48] In addition to limiting the liability of ISPs in bound instances, the DMCA conjointly lays down wherever ISPs will be control liable for infringement of copyright by their subscribers. The DMCA permits ISPs to avoid each copyright liability and liability to subscribers by adhering to certain tips set out in this that are legendary as ‘safe harbours’. Through these safe harbor provisions, DMCA limits ISP liability to four categories, viz., firstly, temporary digital network communications, secondly, system caching, thirdly, information residing on systems at the direction of subscribers; and fourth, data location tools. The DMCA accepts the ruling of the Netcom case and provides categorical protection to ISPs, hence, as long as the information is mechanically transmitted through the server and the ISP is not concerned in sterilization the content, the ISP can not be liable for mere transmission of infringing information through its server. The DMCA conjointly exempts ISPs from direct liability for reception or temporary storage of fabric in their networks if bound measures are taken by ISPs. The DMCA in Section 512(i)(1) states that the limitation of liability of the ISP beneath this Section is provided only if such ISP:
‘(A) has adopted and fairly enforced, and informs subscribers and account holders of the service provider's system or network of, a policy that provides the termination in appropriate circumstances of subscribers and account holders of the service provider's system or network WHO are repeat infringers; and
(B) accommodates and doesn't interfere with standard technical measures.’
Thus, firstly, ISPs have to follow a policy wherever it terminates access to subscribers who are repeat offenders;[49] second, they have to place in place technical measures to forestall infringements.[50] There are further needs in the individual sections of the activities protected.3 The DMCA has a system of ‘notice and take down’ under that once associate ISP receives a notification from a right-holder informing it that a breach of copyright had been committed through its system, the ISP is obliged to take account of that data and to act to prohibit all access to the offensive data through its system. The ISP is place beneath pressure of either proscribing access to user at the risk of being sued for breachof contract in case of false notification or for being sued by the alleged copyright owner for not taking action once advised of a copyright violation by the user of ISP. however if ISP follows the statutory procedure in such a scenario, he is protected by the law. therefore in such a scenario, the ISP will repost the material taken down if the user files a counter notice stating that his posting of material will not infringe anyone’s copyright. However this will be done solely if the copyright owner has not filed associate infringement action seeking a preparation order against the user.[51]
Analysis of DMCA
Initially, USA was to adopt a procedure wherever ISPs were to be liable for the content that was transmitted and as transmission was regarded to be equivalent to reproduction. However later on in 1996 they adopted a policy that provided that ISPs are not liable for content that they unwittingly transmit. However, ISPs would be control accountable for taking down content that copyright holders will show to violate their copyright rights. This puts the burden of monitoring the content on the house owners of intellectual property and not on the ISPs. It is associate attention-grabbing solution that will be adopted by national governments in dealing with copyright infringement problems on the Internet.
What is to be noted is that USA Congress has not granted general immunity to the ISPs through DMCA, but it has restricted the liability of the ISPs based mostly on their data and involvement of the infringing activity.[52] The ISPs square measure willing to adhere to DMCA provisions, and request refuge in the safe harbors therefore that they square measure warranted of non-liability.[53] This system of limiting the responsibility of ISPs has enabled USA to produce associate evenhanded balance among the interests of all parties involved.[54] Thus, ISPs do not escape liability at all prices and copyright holders conjointly cannot harass ISPs where the sole responsibility for infringing action is on a subscriber.
Post DMCA
Costar v Loopnet [55]
Costar, a copyright owner of numerous photographs of business real estate brought a suit of copyright infringement against Loopnet Iraqi National Congress, an ISP, for direct infringement because Costar’s copyrighted pictures were denote by Loopnet’s subscribers on Loopnet’s web site. If a subscriber includes a photograph for a real estate listing, he must fill out a type and agree to the ‘terms and conditions’, along with associate degree further specific warrantee that thesubscriber has ‘all necessary rights and authorizations’ from the copyright owner of the photographs. The subscriber then uploads the photographs into a folder in Loopnet’s system, and the photograph is transferred to RAM of one of the Loopnet’s computers for review. Then a Loopnet employee quickly reviews the photograph first off to determine whether or not the photograph in truth depicts commercial real estate, and second to establish any obvious proof, such as, a text message or copyright notice, that the photograph might have been copyrighted by another. If the photograph fails either one of these criteria, the worker deletes the photograph and notifies the subscriber. Otherwise, the employee clicks associate degree ‘accept’ button that prompts Loopnet’s system to associate the photograph with the web page for the property listing, creating the photograph out there for viewing.
The Court adjudged that direct liability attaches solely when there is some conduct that causes the infringement. The Court took note of the truth that the infringing activity is initiated by the subscriber and therefore he is the direct infringer. The majority control that associate ISP ought to not be liable as a direct infringer when its facility is used to infringe a copyright however when it engaged in no intervening conduct.[56] With regard to Loopnet’s gate keeping apply, the Court observed that ‘the employee’s look is therefore casual as to be insignificant’. The Costar call additionally created it clear that DMCA will not limit ISPs to the safe harbour provisions statute in the statute. Rather, ISPs might believe on either DMCA safe harbor provisions, unwritten defences or each.[57]
Intermediary liability in Nigeria, Kenya, South Africa and Uganda.
Issues relating to intermediary liability vary among the countries in the study but there are many common issues among the countries including the limitations on liability, the role of intermediaries with regards to terrorism and violence, hate speech, cybercrime, copyright infringement, digital piracy, and obligations to assist with lawful interception of communications.
Other than in South Africa policy debates around intermediary liability are relatively new. Limitations on liability were legislated in South Africa in the Electronic Communications and Transaction Act (25 of 2002)[58], almost five years before they were first contemplated in Kenya[59] and almost ten years before they were legislated in Uganda[60]. This is perhaps due to the relatively higher internet penetration in South Africa in the 1990s and 2000s – it had one of the highest rates of internet penetration in Africa and ranked higher than other countries with similar levels of economic development[61]. The absence of mention of intermediary liability in legislation in Kenya, Nigeria and Uganda is perhaps explained by the lower levels of internet access in these countries in the 1990s and 2000s. Now other African countries have overtaken South Africa, which is reported by some studies to have lower levels of internet penetration than Nigeria, Kenya and Uganda. As all countries have in recent years experienced increased internet access, increased bandwidth and increased access through mobile phones, intermediary liability has emerged in legislative and policy debates.
Nonetheless issues concerning intermediary liability are neither new nor have they arisen out of a vacuum they have been discussed earlier in issue-based contexts using different terminology. In Nigeria the role of cybercafes with regards to cybercrime was discussed in the mid-2000s. As mobile internet access has increased and relative rates of access from cybercafes have decreased the discussion has now moved center around mobile phone operators. In Kenya, after the election violence following the 2007 elections, an ongoing debate about the role of communications intermediaries with regards to hate speech along with their role in peacebuilding began. The debate initially focused on the role of mobile operators and particularly focused on SMS/text messages. The debate continues as Kenya streamlines the writ and interpretation of its legal system to accord with its new constitution. Debate around the role of intermediaries in hate speech and in political messaging has regained momentum as the Kenyan General election approaches on the 4th of March 2013.
The Indian Perspective (Position)
India is bit by bit developing its data technology market and the variety of web subscribers is increasing everyday. On with this development, there is would like to have higher and a lot of comprehensive laws to tackle the problems that might arise in close to future. The Copyright Act, 1957 will not deal with the liability of the ISPs at all. However, the liability of ISPs finds mention in Section seventy-nine of the Information Technology Act, 2000 (IT Act) as follows:
‘Network service providers not to be liable in certain cases- For the removal of doubts, it is hereby declared that no person providing any service as a network service provider shall be liable under this Act, rules or regulations made thereunder for any third party information or data made available by him if he proves that the offence or contravention was committed without his knowledge or that he ad exercised all due diligence to prevent the commission of such offence or contravention.
Explanation.-For the purposes of this Section, - (a) ‘network service provider’ means an intermediary;
(b) ‘Third party information’ means any information dealt with by a network service provider in his capacity as an intermediary’[62]
Section seventy nine of the IT Act exempts ISPs from liability for third party info or knowledge created available by him if the ISP had no data of the offence committed or if the ISP had exercised ‘all due diligence’ to stop any infringement. This in flip means that unless the case in hand falls below these two exemptions ISPs are liable for copyright infringements as well as any different violations that take place in their websites, even if the act is done by the subscribers. Section seventy nine is very loosely worded and there is a risk that these exceptions mentioned in the IT Act will be used additional as a tool of harassment of firms by the authorities.[63] The Section exempts ISPs from liability if the ISP has exercised ‘all due diligence’. What is all due diligence? It ought to have been worded clearer since the manner in completely different ISPs perceive ‘all due diligence’ can be completely different and one will perpetually say that disregarding of the measures taken by ISPs that it is not ‘all due diligence’. The clarification to Section seventy nine conjointly has the risk to be loosely interpreted and thereby making almost any intermediary a ‘network service provider’. A better definition ought to have been given to the term ‘network service provider’. One will presumably argue that this broad definition permits several completely different sorts of service suppliers to be enclosed, however at the same time there is conjointly the risk of it being understood in a manner broader than what was contemplated by the framers. According to some legal specialists on Indian law, caching amounts to reproduction and such unauthorized copy would be equal to infringement. Since caching is done by ISPs themselves, ISPs could notice it troublesome to plead ignorance. ISPs would sure be liable if the owner of the copyright informs ISP regarding such infringement and no action is taken by the ISP. As in any different jurisdiction the truthfulness of the copyright owner’s claim is Associate in Nursing issue in Republic of India as well. whereas Section seventy nine of the IT Act, 2000 liberates ISPs of its liability if it will prove its cognitive content and due diligence, it will not specify who would be held liable for such contravention in such Associate in Nursing event. Therefore, this provision can cause issues once Associate in Nursing offence regarding third party info or provision of knowledge is committed.[64] therefore it will be ascertained that the existing legal provisions do not clearly visit the extent of the ISP’s liability in cases of copyright infringement by the subscribers.[65]
The liability of ISPs can arise in a number of cases by application of different statutes. This can be criminal or civil in nature depending on various factors. However, it is impractical to find out the liability if ISPs which could arise in various forms at one place. Equally impractical could be to amend all our laws which could hold ISPs liable, in order to limit their liability.[66] The later has not been attempted in any Indian Legislation including Copyright Act, 1957 till date. Therefore, by Information Technology Act, 2000 the attempt is to supply a mechanism which works as a filter for all such ISPs for the purpose of determining their liability. To clarify, we take an illustration, if an ISP is accused of illegally distributing pirated copies of music or videos then his liability be first determined under Section 51(a)(ii) and Section 63 of the Copyright Act, 1957. If he is found liable then his liability would be tested on the touchstone of Section 79 of the Information Technology Act, 2000. Under the Information Technology Act, 2000 itself ISPs can qualify exemptions under two grounds i.e. Lack of Knowledge and Exercise of Due Diligence.[67] These exemptions work as Safe Harbor for these intermediaries. Nonetheless, the extents of the safe harbors allowed under the Act are limited. [68]
There can be potentially three types of liability on an intermediary which can be imposed, it include, (1) direct; (2) vicarious; and (3) contributory liability which might be civil or criminal in nature.[69] Existing liability schemes generally join traditional fault-based liability and strict liability rules with broad Internet-specific liability exemptions.
The amendment S. 72(2) protects the identity of subscribers to the services of an intermediary. Under this the intermediary should (i) gain access to any material or other information relating to a subscriber who avails his services; (ii) discloses such information or material to any other person; (iii) without the consent of such subscriber; and (iv) with intent to cause injury to him.[70] In case of breach of confidentiality and privacy the liability by way of compensation under the draft is not exceeding Rs 25 lakhs.
Religious Technology Centre v. Netcom Online Communications Services Inc[71]
The court observed that lack of knowledge or intent was often emphasized by the ISPs. The Court has found out in many judgments that a lack of intention to infringe is not a defense in copyright actions. In this case the judge expressly rejected the allegations that the ISP has infringed directly and refused to follow Playboy Enterprises v. Frena, on the ground that Netcom could only be guilty of direct infringement if it has caused the infringing copies to be made:
“...the mere fact that Netcom's system incidentally makes temporary copies of plaintiff works does not mean Netcom has caused the copying.”
The Singapore Electronic Transactions Act, 1998 under Section 10 gives various liabilities of network service providers. Under Section 10(3) of the Act it does not grant immunity for hosting
third party resources, because such hosting would be automatic and temporary storage of those resources. It recognizes some kind of immunity from liability for the content the ISP carries if national ambitions for e-commerce are to be achieved. In similar fashion German Multimedia Law 1998 Article 5[72] gives responsibilities which need to consider by the Service Providers on Cyberspace. There is certainly extensive requirement of such legislations in India which can govern the jurisdictional aspects and extensive immunities for ISP's and other internet intermediaries extending to copyright infringement and criminal law as well as to civil actions for torts such as defamation.
Google Inc v. Louis Vuitton Malletier[73]
It was observed that the Commission's first report on the application of Directive 2000/31 shows by stating:-
'...the Commission will, in accordance with Article 21 [of Directive 2000/31], continue to monitor and rigorously analyse any new developments, including national legislation, case-law and administrative practices related to intermediary liability and will examine any future need to adapt the present framework in the light of these developments, for instance the need of additional limitations on liability for other activities such as the provision of hyperlinks and search engines'.
Hence from the above explanation we observe that considerable variations in laws relating to: (a) intermediary liability; (b) safe harbour regimes; (c) notification regimes must be seen in future since its the need of the hour. There are too many uncertainties in application of intermediary liability law in all jurisdictions which must be resolved through amendments. We must have a detailed compliance regime for intermediary liability and jurisdictional disputes. For all above said suggestions we require to maintain litheness to counter to changes in technology & not be controlled by exhaustive and detailed Treaty responsibility.[74]
Need for higher legislation on ISP liability India has a long approach to go in delivery of a comprehensive legislation on the liability of ISPs in cases of copyright infringement in digital context. It is of utmost importance for a country such as Republic of India with an increasing range of net users Associate in Nursing thereby increasing the threat to infringing the rights of copyright holders. At the same time, Republic of India is apace becoming digitalized and if new laws are not brought in to defend ISPs from copyright infringement by subscribers and the connected aspects, it would adversely affect the ISP business as a whole although cases regarding the same are nevertheless to come back before any court of law in Republic of India. Moreover, it is conjointly necessary for India to update their laws concerning this facet to remain in competition with different Asian countries such as Singapore that have come back up with comprehensive laws limiting the liability of ISPs. Some argue that taking note of the borderless nature of the net, all nations ought to develop a set of rules for ISPs that are universally applicable. Given the variations in the systems, different countries can come back up with completely different approaches regarding the liability of ISPs and consequently ISPs operating in multiple countries can face completely different liabilities in completely different countries. Another facet is that there can be clash of varied domestic laws on ISPs where Associate in Nursing ISP is operational a internet hosting web site in one country and wherever it has allegedly committed copyright violations in another country wherever the web site has been accessed.[75] Thus, a universal set of rules to be made applicable in the context of the net is being suggested.
Some Recommendations in pertinence to the Intermediary Liabilities.
Double mind perspective when screening content.
The unnerving effect can primarily be ascribed to the requirement for private intermediaries to achieve subjective judicial determination in the course of ordering the takedown. From the retorts to the takedown notices, it is outward that not all intermediaries have sufficient legal fitness or resources to unhurried on the legality of an countenance, as a effect of which, such intermediaries have a predisposition to err on the side of caution and chill lawful expressions in order to edge their liability. Even if such intermediary has ample legal competence, it has a tendency to prioritize the allocation of its legal resources according to the professed importance of assailed expressions. Further, if such subjective fortitude is required to be done in a controlled timeframe and in the want of adequate facts and contexts, the intermediaries have no choice but to mechanically (without application of mind or proper judgment) comply with the takedown notification.
Outlook to the aforementioned issue:-
It is hereby suggested that the need for private intermediaries to subjectively verify the lawfulness of associate expression gets replaced with associate objective test. Such associate objective check is introduced by dynamic the data requirement. for instance, for the ‘hosting’ category of intermediaries, the target check ought to be to work out “whether or not the third party supplier of data is willing to defend his expression in court”. By legal fiction, Actual data is attributed to the intermediator given that the third party supplier of data refuses to defend his expression or fails to reply with a counter notice among the notice point.
Problem in understanding and or interpreting the criterion laid down in the concerned statute.
The content policy (criteria for administering the takedown) uses terms that are not outlined to explain prohibited expressions. The responses of the takedown notices demonstrate that multiple interpretations of identical term can create uncertainty and thus a chilling impact - as it induces the negotiator to adopt the broadest attainable interpretation of the term and to err on the aspect of caution.
Outlook to the aforementioned issue:-
It is suggested that every single terminology used in the content policy (criteria for administering the takedown) be clearly outlined or be replaced with a statement that prohibits all expressions and would be unlike “violate any law for the nowadays in force” so that only specific legislatively barred expressions, within the scope of ‘cheap/adult’ restrictions as pictured within the Constitution of India, will be taken down and used.
Conclusion
There seems to be a world movement towards adopting a “notice and take-down” policy (the EU regime, the Digital Millennium Act, etc.). Such a regime passes the prices of judgment on to personal parties (who successively square measure possible to pass them on to users) and will additionally inhibit free speech. The shortage of judicial oversight will be a problematic issue, particularly within the case of tiny businesses or short-run censorship.
The Indian law at first took a step forward with the passing of the IT modification Act in 2009 however with the introduction of the go-between tips, the safe harbor provided by Section seventy nine of the Act has been worn therefore on be much non- existent. The Asian country position at the instant looks unreasonable particularly the maximum amount of the content accessed in India is formed abroad, which implies Indian intermediaries can bear the forcefulness of any liability claims.
The issue of a way to wear down intermediary liability is thus one that there's no straitjacket answer. However, I think that any palm system should be designed on the subsequent principles that square measure additional compatible with the improvement of the inter-internet as a medium of communication:
Self-regulation by intermediaries appears to guide to suboptimal social control of the law and promotes whimsicality and reduces transparency by promoting private action during a public sphere.
The law must differentiate between intermediaries on the premise of practicality and will offer immunity wherever the go-between wasn't during a position to regulate or assess the offence (practically or in law).
The law should differentiate between varied crimes on the premise of harshness and maltreatment and wear down every class appropriately (and probably through changes in alternative relevant statutes like the Copyright Act, Indian legal code, etc). For in- stance, within the case of threats to national security, commission of knowable offences, etc, a notice and takedown regime ought to be acceptable. This might change such claims to be proscribed efficiently and stop harm. Even within the event executive action is found necessary in extreme cases (say involving terror threats), there should be judicial consciousness of the action inside such a time, failing that the makes an attempt to censor should stop. Just in case of copyright, defamation and obscenity- connected claims, there's no reason for a different commonplace to be applied compared to ancient ways of dissemination of data. It might thus be appropriate if any complaints received square measure place through a judicial method before censor- ship. In any event, damages in such scenario square measure possible to be financial and per se any tiny delay occasioned by having to require the touch on court wouldn't unduly hurt the parties concerned (especially as courts square measure sceptered to grant injunctive relief). Such a system would additionally cut back false claims, and guarantee intermediaries square measure safe from having to create powerful decisions regarding matters they can't be expected to possess experience in.
Provision of data concerning in- stances of censorship could be a must and therefore judicial and government authorities square measure best suited to adjudicate on instances wherever censorship is needed. Inserting the concern of policing the web on nonpublic intermediaries is clearly impractical and in- economical within the end of the day.
Simply obstructing content is associate impractical and unreal methodology to bind net crimes.
[1] Bailey, J. P., & Bakos, J. Y. (1997). An Exploratory Study of the Emerging Role of Electronic Intermediariations and Policy, 19(5), 406-417.
[2] Kingma, B. R. (2001). The economics of information: A guide to economic and cost-benefit analysis for information professionals (2nd ed.). Englewood, CO: Libraries Unlimited.
[3] Wolpert, S. A., & Wolpert, J. F. (1986). Economics of information. New York: Van Nostrand Reinhold.
[4] Beniger, J. R. (1986). The control revolution: Technological and economic origins of the information society. Cambridge, Mass.: Harvard University Press.
[5] Shapiro, C., & Varian, H. R. (1998). Information rules: A strategic guide to the network economy. Boston, Mass.: Harvard Business School Press.
[6] Larson, E. (1992). The naked consumer: How our private lives become public commodities (1st ed.). New York: H. Holt.
[7] Larson, E. (1992). The naked consumer: How our private lives become public commodities (1st ed.). New York: H. Holt.
[8] Cavoukian, A., & Tapscott, D. (1997). Who knows: Safeguarding your privacy in a networked world. New York: McGraw-Hill.
[9] Rose, F. (1999). The economics, concept, and design of information intermediaries: A theoretic approach. New York: Physica-Verlag.
[11] Rose, F. (1999). The economics, concept, and design of information intermediaries: A theoretic approach. New York: Physica-Verlag.
[12] Hirshleifer, J. (1973). Where are we in the theory of information? The American Economic Review, Vol. 63 (No. 2, Papers and Proceedings of the Eighty-Fifth Annual Meeting of the American Economic Association), 31-39.
[13] Kingma, B. R. (2001). The economics of information: A guide to economic and cost-benefit analysis for information professionals (2nd ed.). Englewood, CO: Libraries Unlimited.
[14] ibid
[15] Rose, F. (1999). The economics, concept, and design of information intermediaries: A theoretic approach. New York: Physica-Verlag.
[16] Sampler, J. L. (1998). Redefining industry structure for the information age. Strategic Management Journal, Vol. 19 (No. 4, Special Issue: Editor's Choice), 343-355.
[17] ibid
[18] Shapiro, C., & Varian, H. R. (1998). Information rules: A strategic guide to the network economy. Boston, Mass.: Harvard Business School Press.
[19] ibid
[20] Evans, P., & Wurster, T. S. (2000). Blown to bits: How the new economics of information transforms strategy. Boston, Mass.: Harvard Business School Press.
[21] Kingma, B. R. (2001). The economics of information: A guide to economic and cost-benefit analysis for information professionals (2nd ed.). Englewood, CO: Libraries Unlimited.
[22] ibid
[23] Rose, F. (1999). The economics, concept, and design of information intermediaries: A theoretic approach. New York: Physica-Verlag.
[24] Rose, F. (1999). The economics, concept, and design of information intermediaries: A theoretic approach. New York: Physica-Verlag.
[25] Boisot, M. (1998). Knowledge assets: Securing competitive advantage in the information economy. New York: Oxford University Press.
[26] ibid
[27] ^ Pay Without Performance by Lucian Bebchuk and Jesse Fried, Harvard University Press 2004
[28] nvestopedia explains ‘Agency Costs’
[29] Cheung, Steven N. S. (1987). Economic organization and transaction costs. The New Palgrave: A Dictionary of Economics v.2 p 55-58
[30] Commons, J.R (1931). “Institutional Economics”. American Economic Review 21: 648–657. Retrieved February 8, 2013.
[31] 17 USC Section 512(k)(1)(A), http://www4.law.cornell.edu/ uscode/html/uscode17/usc_sec_17_00000512-- --000-.html (17 May 2007).
[32] 17 USC Section 512(k)(1)(B), http://www4.law.cornell.edu/ uscode/html/uscode17/usc_sec_17_00000512----000-.html (17 May 2007).
[33] Joseph B G & Wasylik D P, Copyright issues on the Internet and the DMCA, Practicing Law Institute-Patents, Copyrights, Trademarks, and Literary Property Course Handbook Series, 2003, 451.
[34] Section 512(d) of the Digital Millennium Copyright Act (DMCA).
[35] Cooper R, Media law, music copyright, ISP’s liability for file sharing, http://ezinearticles.com/?Media-Law---Music- Copyright---ISP%E2%80%99s-Liability-for-File-Sharing&id =360608 (9 May 2007).
[36] Wei W, The liability of Internet Service Providers for copyright infringement and defamation actions in the United Kingdom and China: A comparative study, European Intellectual Property Review, 28 (10) (2006) 528.
[37] Osborne D, Copyright and trademark infringement on the net – Looking to the Internet Service Provider first, http://www.iprights.com/cms/templates/articles.aspx?articlei d=146&zoneid=2 (9 May 2007).
[38] Cooper R, Media law, music copyright, ISP’s liability for file sharing, http://ezinearticles.com/?Media-Law---Music- Copyright---ISP%E2%80%99s-Liability-for-File-Sharing&id =360608 (9 May 2007).
[39] Osborne D, Copyright and trademark infringement on the net – Looking to the Internet Service Provider first, http://www.iprights.com/cms/templates/articles.aspx?articlei d=146&zoneid=2 (9 May 2007).
[40] Unni V K, Internet Service Provider’s liability for copyright infringement- How to clear the misty Indian perspective, Richmond Journal of Law and Technology, 8 (2001) 13. ISP liability, http://www.bitlaw.com/internet/isp.html (9 May 2007).
[41] Osborne D, Copyright and trademark infringement on the net – Looking to the Internet Service Provider first, http://www.iprights.com/cms/templates/articles.aspx?articlei d=146&zoneid=2 (9 May 2007).
[42] Costar v Loopnet, 373 F 3D 544 (4th CIR 2004).
[43] CDA Section 230, Immunity covers state intellectual property-related, right of publicity claims, http://brownraysman.typepad.com/technology_law_update/2 007/04/cda_section_230.html#more (24 May 2007).
[44]Chicago Lawyers’ Committee for Civil Rights Under The Law Inc v Craigslist Inc, Case No. 06 C 0657 (NDIll, 14 November 2006) in Online Defamation/Libel/ Communications Decency Act-Internet library of law and court decisions, http://www.internetlibrary.com/topics/online_defamation.cfm (24 May 2007).
[45] Playboy Enterprises Inc v Frena, 839 F Supp 1552 (M D Fla 1993).
[46] Religious Technology Center v Netcom, 907 F Supp 1361 (N D Cal 1995), http://www.tomwbell.com/NetLaw/Ch07/ Religious-C.html (17 May 2007).
[47] Sega Enterprises Ltd v Maphia, 948 F Supp 923, 932 (N D Cal 1996), http://www.tomwbell.com/NetLaw/Ch07/ Sega.html (17 May 2007).
[48] Final Report of the Inter-Governmental Copyright Committee, http://www.unesco.org/culture/copyright/images/ IGC1971XII9e.pdf (9 May 2007).
[49] http://www4.law.cornell.edu/uscode/ html/uscode17/usc_sec_17_00000512--000-.html (27 August 2007). USC 512(i)(1)(A),
[50] http://www4.law.cornell.edu/uscode/ html/uscode17/usc_sec_17_00000512--000-.html (27 August 2007). http://www.murdoch.edu.au/elaw/ issues/v9n4/mercurio94. html (9 May 2007). Francisco Castro, The Digital Millennium Copyright Act: Provisions on circumventing protection systems and limiting liability of service providers, Chicago-Kent Journal of Intellectual Property, 3 (2004) 3. USC 512(i)(1)(B),
[51] http://www4.law.cornell.edu/uscode/html/ uscode17/usc_sec_17_00000512--000-.html (27 August 2007). USC 512(g),
[52] http://www.legalservicesindia.com/articles/ isp_in_us.htm (9 May 2007).
[53] http://www.murdoch.edu.au/elaw/issues/v9n4/mercurio94.html (9 May 2007).
[54] http://www4.law.cornell.edu/uscode/html/uscode17/usc_sec_17_00000512--000-.html (27 August 2007).
[55] Costar v Loopnet, 373 F 3D 544 (4th CIR 2004).
[56] http://jip.kentlaw.edu/ art/volume%206/6%20Chi-Kent%20J%20Intell%20Prop%201.doc (9 May 2007).
[57] ibid
[58] http://www.internet.org.za/ect_act.html
[59] Safe harbour like provisions for liabilities were proposed in the Now Defunct Electronic Transactions Bill of 2007.
[60] In the Electronic Transactions Act of 20011, op cit.
[61] “South Africa” in Freedom House, Freedom on the Net 2011, http://www.freedomhouse.org/report/freedom- 
net/2012/south-africa)
[62] Section 79, IT Act (2000)
[63] http://cyberlaws.net/cyberindia/liablity.htm (15 May 2007).
[64] http://www.sudhirlaw.com/cyberlaw-itact.htm (10 May 2007).
[65] http://www.legalservicesindia.com/articles/isp_in_us.htm (9 May 2007).
[66] S.K. Verma & Raman Mittal, “Legal Dimensions of Cyberspace”, (2004, Indian Law Institute, Delhi)
[67] K. Mani's, “A Practical Approach to Cyber Laws” ̧ (2009 Edn., Kamal Publishers, Delhi)
[68] Diane Cabell, “Unlocking Economic Opportunity in the South Through Local Content Appendix A: Potential Liability Concerns for an Open Content Exchange Network”, Berkman Center for Internet & Society (January 2002), available at http://cyber.law.harvard.edu/open economies/oknliability.html#n86, Last visited on 1st March, 2010.
[69] Apar Gupta, “Liability of Intermediaries in India — From troubled waters to safe harbors”, (2007) PL May 3, www.ebc-india.com/practicallawyer, Last visited on 1st March, 2010.
[70] Proposed Amendments to the IT Act, 2000, Expert Committee on Review of the IT Act, 2000, “Report of the Expert Committee: Full Text” (Proposed 29-8-2005), available at http://www.mit.gov.in/itact2000/ITAct.doc (hereinafter proposed Amendments to the IT Act, 2000), Section 72(2).
[71] 907 F Supp 1361 (ND Cal, 1995)
[72] Trans. Christopher Kuner, www.kuner.com, Last visited on 1st March, 2010.
[73] Opinion of Advocate General Poiares Maduro, delivered on 22nd September 2009, Joined Cases C-236/08, C- 237/08 and C-238/08, www.manupatra.com, Last visited on 1st March, 2010.
[74] SSRN-id1800837; Sonia Verma, B.Sc., LL.B (Corporate Hons.), IV Year, National Law University, Jodhpur. Upvan Madhur Prakash, B.A., LL.B (Corporate Hons.), IV Year, National Law University, Jodhpur.
[75]http://www.isoc.org/inet97/proceedings/B1/B1_2.HTM (9 May 2007).
Join LAWyersClubIndia's network for daily News Updates, Judgment Summaries, Articles, Forum Threads, Online Law Courses, and MUCH MORE!!"
Tags :Intellectual Property Rights