BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?

No donation is too small. If every visitor before 31 December gives just £1, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!



BAILII [Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback]

United Kingdom Journals


You are here: BAILII >> Databases >> United Kingdom Journals >> The Path Dependence of European Copyright
URL: http://www.bailii.org/uk/other/journals/Script-ed/08-1/larsson.html
Cite as: The Path Dependence of European Copyright

[New search] [Printable PDF version] [Help]



Site Search



Archive

(2004) 1 SCRIPTed

(2005) 2 SCRIPTed

(2006) 3 SCRIPTed

(2007) 4 SCRIPTed

(2008) 5 SCRIPTed

(2009) 6 SCRIPTed

(2010) 7 SCRIPTed

(2011) 8 SCRIPTed


Enter your email address:

Delivered by FeedBurner

The Path Dependence of European Copyright

Stefan Larsson*
 

 
Cite as: S Larsson, "The Path Dependence of European Copyright", (2011) 8:1 SCRIPTed 8, http://www.law.ed.ac.uk/ahrc/script-ed/vol8-1/larsson.asp 
 

Download  options

DOI: 10.2966/scrip.080111.8
© Stefan Larsson 2011.
Creative Commons License
This work is licensed under a Creative Commons Licence. Please click on the link to read the terms and conditions.
 


1. Introduction - legal path dependence and social norms

The development of law is generally conservative and retrospective. Values embedded are long lasting and consequent upon the main principle of predictability.1 At the same time, the problem addressed in this article is not that legal development follows a path, but, in relation to a historically relatively sudden shift in society, that the dependence on this path within law has become too strong, and hence, too retrospective, in the sense that it has failed to incorporate the social changes now at hand. Law is often prone to falling behind social change, and this gap causes conflict between the social and the legal spheres.2

That there is something very inconsistent and discordant between online behaviour and copyright regulation has been well documented and widely discussed.3 There is a growing amount of research that portrays the problems of applying unrevised copyright regulation in a digitalised society, in terms of creativity, cultural aspects and privacy as well as a dominant industry’s struggle for power.4 SCRIPTed contributes to the debate on different aspects of the regulatory dilemmas of digital practices, or on social change resulting from an increasingly connected society.5 I link to this by closing in on the question of why European legal development with regard to copyright and related legislation during the growth of the Internet have failed to encompass the changes in behaviour and social norms that have followed. The argument concerns law and the historical and retrospect aspects of legal development in relation to social changes. In order to outline how path dependent European copyright is, and in what way, along with those consequences that derive from this dependency, I undertake a detailed analysis of the most recent directives that amend explicit copyright legislation as well as the most important ones that are affected to some degree by copyright. Their implementation in Sweden has been chosen as a case study since the copyright dilemma in terms of illegal file sharing is highly active and at stake there and also to illustrate the gap between an EU directive and its implementation.

I proceed in three stages. Firstly, I develop a theoretical framework for my conceptualisation of path dependence. Secondly, I show the most important regulatory bodies of interest on a European supranational level, i.e. InfoSoc, the IPRED, the Data Retention Directive, the Telecoms Reform Package/ACTA, and their implementations in Sweden where relevant, and I also point out the applicable aspects that contribute to forming “the path”. Thirdly, I elaborate the lock-in effects of copyright development in Europe, and I conclude with the main general and also specific consequences of the path dependence at hand.

2. Path dependence of law

Although much of it has concerned technological development, the literature on path dependence may apply with equal force to legal development.6 Regulatory regimes provide obvious analogies to technological standards.7 Legal developments have been analysed in terms of path dependence, especially by American scholars, with reference to the classic text The Path of the Law by Oliver Wendell Holmes.8 Predictability, as described by the legal scholar Peczenik, is “one of the basic values in democracy and a state governed by law”, and many legal theorists hold that the norm of “jurisdiction and the actions of public authorities in a democratic state should be predictable”.9 The Norwegian sociologist of law Vilhelm Aubert speaks of law as something that serves to safeguard expectations, one of five main tasks of law, and as Niklas Luhmann has argued, its most important one.10 This predictability can also account for the often-incremental development of law, the minor steering towards a retrospective activity that changes mostly in evolutionary rather than revolutionary terms. This retrospectivity, this “past-dependency” of law, in the terms of the American Judge Richard A Posner, is probably not a problem when society changes according to stable curves.11

In terms of technologies, there are huge advantages to standardisation, which makes it lock in certain conditions.12 These standards solve coordination problems among users, allowing them to constitute a network beneficiary for those who use the same technology.13 Gillette adds an element of power to the otherwise relatively cold equation of transactions costs, in much of the literature on path dependence. The dominant interest groups can, supported by the regulatory standards, use their powers to ward off emerging attempts for regulatory change. This is the reason why, if one seeks to understand the whole picture, one has to include those actors who depend on regulation, in order to understand its development.

Furthermore, a factor that perpetuates lock-in effects and has to do with metaphors and conceptions of legal development, somewhat similar to the “rhetorical repertoires” of international organisations studied by Halliday et al., but which mostly draw on the findings of the conceptual metaphor school founded by George Lakoff and Mark Johnson in the 1980s.14 Gillette speaks as if the lock-in effects are always conscious and are therefore an outcome of power struggles and transaction costs. These struggles for power, to a high degree, probably are, but there is also an element of the language-based legal means that include metaphors, categorisations and labels used to make certain conceptions that are supported in law.15 Although these metaphors can be used very much consciously, as in copyright education efforts, they may just as well be part of an unconscious but language-based pattern that functions as a type of standardisation.16 It is just not as visible as other standards. Gillette does not see these conceptual lock-in effects that emanate from the retrospect practices of a law-making nature, but they have been shown to be relevant when it comes to copyright.17

Mahoney, who analyses the use of path dependence as an analytical tool in historical sociology, divides the types of path dependencies into self-reinforcing sequences and reactive sequences.18 Mahoney broadly defines path dependence as something that occurs when a “contingent historical event triggers a subsequent sequence that follows a relatively deterministic pattern”. In relation to the two categories of path dependence, Mahoney concludes that in the case of a self-reinforcing sequence this means that “the contingent period corresponds with the initial adoption of a particular institutional arrangement, while the deterministic pattern corresponds to the stable reproduction of this institution over time”. Mahoney contrasts this with the reactive sequence, where the contingent period “corresponds with a key breakpoint in history, while the deterministic pattern corresponds with a series of reactions that logically follow from this breakpoint”.19 As we will see, self-reinforcing path dependency is very much relevant to the development of the European copyright regime.

3. European Copyright in the days of the Internet

The development of copyright is directly connected to contemporary technological development. It is the networking technologies that have challenged the legislation, thus leading to amendments in order to cope with the new technical and social changes. A series of legislative initiatives have been taken to strengthen online compliance with copyright regulation. This article presents four of the most important recent regulatory initiatives in the European Union that either have had an explicit focus on copyright, or an indirect, but important effect, as well as a brief outtake about future development.

  • The European Community Directive on Copyright in the Information Society (“InfoSoc Directive”) was tabled in December 1997,20 and the directive was passed in 2001.21 It was implemented in Sweden on 1 July 2005.

  • The Intellectual Property Rights Enforcement Directive 2004/48/EC (“IPRED”) was approved by the European Parliament on 9 March 2004, and implemented in Sweden on 1 April 2009.

  • The Data Retention Directive aims at harmonising the regulation of the Member States, who require telephone operators and Internet Service Providers to retain personal data.22 This will play a role in the enforcement of copyright, and how this will happen is explained in this article. It has yet to be implemented in Sweden.

  • The European Telecoms Reform Package was widely debated in the Swedish press in 2009. It was presented to the European Parliament in Strasbourg on 13 November 2007 but not voted on until 6 May 2009. This is a cluster of directives that are being prepared (COM [2007] 697),23 which includes aspects of the role of the Internet Service Providers and which will also play a role in the enforcement of copyright violations.

  • The imminent future developments can be interpreted from the outcome of the international negotiations on the Anti-Counterfeiting Trade Agreement (“ACTA”), a multilateral agreement negotiated outside WTO processes and protections, and to some extent the Green Paper - Copyright in the Knowledge Economy from July 2008.

3.1. Stronger Copyright: The InfoSoc Directive

The initial proposal for the European Community Directive on Copyright in the Information Society was tabled in December 199724 and the directive was passed in 2001.25 This followed the Green Paper on Copyright and Related Rights in the Information Society of July 1995.26 One of the original two purposes of the directive was to bring the laws on copyright and related rights in the European Union into line with the WIPO Internet Treaties, in order to set the stage for joint ratification of the treaties by the member states and the European Community.

The second goal of the InfoSoc Directive was to harmonise certain aspects of substantive copyright law across the European Union. The Directive states the importance of legal protection of copyright and related rights with regard to the “information society” in article 1.27 The Directive has been criticised for focusing on the aggregators’ rights rather than the creators’, and that it is “primarily geared towards protecting the rights and interests of the ‘main players’ in the information industry (producers, broadcasters and institutional users), not of the creators that provide the invaluable ‘content’ that drives the industry”.28 During the almost eight years from the first proposal in 1997 to Sweden’s implementation in 2005, much happened on line in terms of techniques and technology for communicating in general on the “information superhighway” mentioned in the Green Paper from 1995. In terms of organised file sharing initiatives for music and films etc., the architecture went from the centralised unstructured peer-to-peer system of Napster to the first decentralised file-sharing network, Gnutella, in 2000 and then to Kazaa in 2001. From 2002 through 2003, a number of popular BitTorrent services were established, including The Pirate Bay.29

The InfoSoc Directive includes protection for “technological measures” which often are referred to as Digital Rights Management, DRM (article 6). This criminalisation of the circumvention of technological measures has been seen by critics as a way to authorise copyright more powerfully than ownership in terms of consumers buying music for example, but at the same time being restricted as to what they are allowed to do with the purchased product (for example, the owner of a music CD who cannot copy it in order to play it in his or her car).30 The protection of technological measures is not new to the Swedish Copyright Act, but the version prior to the InfoSoc Directive implementation applied only to computer programmes.31 The directive was implemented among the Member States, mainly between 2003 and 2004, by Denmark, the Czech Republic and Greece at an early date and by Sweden, Finland, Spain and France at a later one.32 The original last implementation date for the InfoSoc Directive was 22 December 2002, but only Denmark and Greece had implemented it by then. In Sweden, the proposal from the governmental commission (the SOU) was presented in 2003.33 In the following government draft bill 2004/05:110, legal changes were accepted by the Parliament and came into force on 1 July 2005.34

The digital technologies from the mid-1990s provoked worldwide and interdisciplinary debates on their potential impact on the non-digital world. It is in this context that the European Council called for a report on “the problems” of the information society. The report often referred to as the Bangemann Report, after the chair of the group that produced it, concluded that the protection of intellectual property was of the greatest importance. The InfoSoc Directive has meant a wider scope for copyright and a criminalisation of more actions.35 For the legal concepts that once described the reproduction and protection of pieces of vinyl and other plastic materials, a sudden enlargement had to be undertaken to include digital formats in increasing use. The legal concepts that describe and regulate the analogue practices became metaphorical in the sense that they were held to regulate emerging practices of a different format, with new (digital) restraints and possibilities, unlike their existing analogue counterparts.36 An emphasis was placed on the control of an environment, which at the time lacked this very feature.

3.2. Enforcing Copyright: IPRED and its implementation in Sweden

Looking back on the origins of the Enforcement Directive, the Commission presented a Communication in November 2000, announcing a series of practical measures intended to improve and intensify countermeasures against “counterfeiting and piracy in the single market”. As part of these measures, the Commission forwarded a proposal for a directive harmonising the legislation of Member States so as to strengthen the means of enforcing intellectual property rights.37 Even then, around the time the IPRED was approved by the European Parliament (9 March 2004),38 it caused a stir amongst civil rights groups in the United States and Europe.39 In April 2004, the EU passed the Directive on the Enforcement of Intellectual Property Rights, the so-called IPRED Directive. It was established because it was “necessary to ensure that the substantive law on intellectual property….is applied effectively in the Community” (Recital 3). Recital 4 of the Directive explicitly relates it to copyright legislation according to the TRIPS Agreement.40 Although its scope covers the entire IP spectrum, the Directive has generally been discussed in terms of copyright enforcement. Central to the debate is the fact that the directive gives the copyright holders the right, by virtue of a court decision, to retrieve the identity information behind an IP address at a certain time, when they “have presented reasonably available evidence sufficient to support its claims” (article 6.1). The “competent judicial authorities” may then requisition such information. The IPRED is a minimum directive, meaning that the member states can stipulate national conditions that are even more favourable to the rights holders than the directive prescribes (article 2).

Sweden did not meet the requirements of article 8 of the Directive. To do so required that the Swedish law introduce provisions that give holders of intellectual property rights, a right to information about the infringer.41 This was one of the most widely debated issues in Sweden, because copyright holders’ representatives, such as the IFPI and the Antipiratbyrån, could apply to the courts to approve the release of identity information from ISPs (S 53 c of the Swedish Copyright Act). For such an injunction to be issued by the court, requires neither that the applicant identify the infringers nor that infringement has been intentional or grossly negligent. It is enough that probable cause has been shown that a person has committed an infringement or a violation, according to s 53 c Swedish Copyright Act.42 It requires the court to have found that an infringement has occurred, which means that in implementing the directive, Sweden lowered the requirement below that contained in it the Directive and also departed from the proposed level in the preparatory memorandum.43

The injunction is aimed at ISPs and describes the relationship between them and the copyright holders (their representatives). This is an expansion of rights linked to IPR, in the name of enforcement of the latter. Implementation meant that the majority of the provisions in the IPRED were in force by 1 April 2009.44 To date, this legislation has led to only a few court cases in Sweden, of which no more than two are of interest here. This is despite the initial reports in the media of “hundreds” of cases being prepared by copyright holders’ interest groups and the rough estimate of preparatory legal work on an estimated 400 to 800 cases per year.45

In general, the IPRED highlights the issue of the ISPs’ position as being increasingly targeted because they are the key to identifying information behind the IP numbers, on the one hand, and are also the guardian of their customers’ privacy, on the other. The two aforementioned Swedish cases underline this. An interesting aspect of both cases is the defendants’ claims that the Data Retention Directive, although not yet implemented in Sweden, is applicable in a way that would hinder the legal use of the rights that the IPRED law grants the copyright holders. No court agreed until the Ephone case was granted a review permit for a hearing in the Supreme Court in September 2010, which acknowledged the legal uncertainty of the non-implemented Data Retention Directive with regard to the application of the IPRED implemented in Sweden by asking the European Court of Justice for a preliminary ruling in the matter, and its response is still pending. This underlines the complex and uncertain but applicable role of the Data Retention Directive with regard to European copyright.

3.3. Combating “Serious Crime”: The Data Retention Directive

The Data Retention Directive amends Directive 2002/58/EC in order to force operators of public telephone services and Internet Service Providers, ISPs to keep data such as calling number, user ID and identity of a user of an IP address for a period of between six months and two years. The aim is to “ensure that the data are available for the purpose of the investigation, detection and prosecution of serious crime, as defined by each Member State in its national law”.46 Though the scope of government-mandated data retention may vary, at its core is the requirement that ISPs collect and store data that track the Internet activity of their customers.47 In December 2005, the European Parliament passed the Data Retention Directive.48 The origin of the directive was the fight against terrorism in response to the Madrid and London bombings in 2004 and 2005.

We may ask why this is relevant in the copyright context. A first step in answering this question is to conclude that the Data Retention Directive lacks clarity with regard to three main issues. It does not define what is meant by ‘‘serious crime’’ and instead leaves this task to each Member State’s national law; it does not limit access to retained data to specifically designated law enforcement authorities, as it refers only to ‘‘competent national authorities’’; and it leaves it up to each Member State’s national law as to when access to data is permitted, all of which are relevant to copyright enforcement, depending on where the line is drawn in each of the three cases.

Furthermore, the directive targets the role of the ISPs and their relationship to the customer by weakening the latter’s privacy rights. The former Directive, 2002/58/EC, established a principle that traffic data must be erased as soon as storage is no longer needed for purposes relating to the communication itself (including billing). The Data Retention Directive entails a breach of this principle. The European Data Protection Supervisor (“EDPS”),49 was harsh in its criticism of the proposal, and actually termed it illegal.50 Criticism of this kind was also voiced by the Article 29 Data Protection Working Party, which is an independent EU body for the data protection of privacy.51 It concluded with regard to the directive that it “encroaches into the daily life of every citizen and may endanger the fundamental values and freedoms all European citizens enjoy and cherish”.52 The Article 29 Data Protection Working Party continues by stating that it is “of utmost importance that the Directive is accompanied and implemented in each Member State by measures curtailing the impact on privacy”.53

The important choices to be made by the Member States in implementing the directive related to the data storage period (6-24 months), exactly what data should be stored, and who should be obliged to retain them (should small operators have to?). The question of who should pay for data retention and data delivery when data have been requested has also been very widely debated, and different Member States have adopted different solutions. Some commentators believe that media companies will seek to lobby national governments to include file sharing in the definition of ‘‘serious crime’’ so that data can be accessed for this purpose.54 In general, the directive touches on the fundamental concern about what extended access to traffic data in a digitalised society will bring, irrespective of the intentions behind it. Specifically, the directive aims to harmonise the regulation by the Member States of telephone operators and ISPs, with a view to retaining personal traffic data.

In examining the case of the Swedish implementation of the Directive, there are a few questions about data retention that are of relevance to the copyright path. An important question, as previously mentioned, is whether or not the Directive will override the IPRED. Secondly, when it comes to the “serious crimes”, it is not only about the data storage period, but also about what levels of criminal penalties will allow the police to obtain and use subscriber identification.55 In late 2010, the media reported that a proposal was being prepared that would diminish the necessary severity of the crime, so that the police could also retrieve traffic data from the ISPs for crimes punishable only by a fine. This would include copyright crime, often referred to as illegal file sharing.

The Data Retention Directive aims at aiding the prosecution of criminal cases, while the IPRED relates to civil cases. This probably means that the traffic data stored under the provisions of the Data Retention Directive cannot be used to aid copyright holders’ representatives in a civil law case for damages for copyright infringement. This will in turn probably require some sort of dual database for the ISPs. The type of data that the copyright holders have the right to obtain from the ISPs, as a result of the implementation of the IPRED, is often already erased by the ISPs in accordance with the principle of consumer privacy. These data will probably still be available to some extent as a result of the implementation of the Data Retention Directive. This means that the Data Retention Directive may aid the IPRED and the copyright holder's case against illegal file sharing, a consequence of the Data Retention Directive that never was mentioned in its draft stages.

The copyright owners’ interest groups collect IP numbers that they believe violate the rights of their clients. In order to link the IP number to the persons behind the actions, these groups need to approach those who have access to this link, the ISPs. Since present legislation on ISP responsibilities focuses on the integrity of the subscribers, the ISPs generally do not store the data for a long period. Some ISPs even stated that they store traffic data for the minimum time possible, when the IPRED was implemented in Sweden in 2009. Implementing the Data Retention Directive therefore helps the case of the copyright holders in that changing the responsibilities of the ISPs from being prohibited from storing the data for an unnecessarily long period, to being obliged to store the data for a longer time.56 The ISPs will no longer be able to lawfully choose to discard the data logs as soon as the billing purposes have been fulfilled when the Data Retention Directive is implemented. This was according to the draft bill set to be done 1 July 2011 in Sweden but was postponed in a vote in the Swedish Parliament 16 March 2011 for at least a year from the original date of implementation.57

3.4. The Telecoms Reform Package, ACTA and the future

In order to see some of the future outcomes of this regulatory path a few on-going or otherwise related processes must be presented: The European Telecoms Reform Package, the Anti-Counterfeiting Trade Agreement (ACTA), and the Green Paper - Copyright in the Knowledge Economy from July 2008.

The Telecoms Reform Package was presented to the European Parliament in Strasbourg on 13 November 2007, voted upon 6 May 2009, and finalised on 25 November 2009. The reform package originated from a non-legislative resolution on “Cultural industries in Europe”, generally referred to as the “Bono Report” after the French Socialist MEP responsible for drafting the resolution. The reform package is a cluster of directives (COM [2007] 697) that to a great extent focus on the role of ISPs.58 It comprises five different EU directives, and its total scope is vast and only of limited relevance here.59 Much of this regulation has already been implemented in Swedish law, through the Electronic Communications Act (2003:396) and a few sections in a law on standards for broadcasting of radio and television.60 The Commission’s initial proposal for the Telecom Package was presented to the European Parliament and Council as the “Better Regulation Directive” and “Citizen Rights Directive”, 16 November 2007.61 During the Parliament's examination of the Commission's proposals, a number of amendment proposals were produced. Of the 126 amendment proposals to the Better regulation directive and 155 amendment proposals to the Citizens rights directive (in that first reading on 24 September 2008), it was proposal 138 for the Better regulation directive and proposal 166 on the Citizen rights directive that were the most widely debated, in media, on blogs, and in the EU Parliament and the Council. These stated that users’ access may not be restricted in any way that infringes their fundamental rights, and (166) that any sanctions should be proportionate and (138) require a court order. In May 2009, the French representatives wanted to withdraw amendment 138, which ensures that court proceedings precede a possible disconnection. At the same time, the issue of disconnecting Internet users for suspected copyright violations before they are proven guilty in court has been highlighted in France through the three-strikes HADOPI-law.62 A compromise version of the amendment was eventually adopted by the European Parliament in November 2009 replacing the requirement for a “prior ruling by the judicial authorities” with the requirement for a “prior fair and impartial procedure”. The Telecoms reform package reaffirms how the copyright path may colonise a variety of types of regulations. This time it was highlighted by the ISPs’ key position in the battle over copyright enforcement and the attempts made by strong forces to disassemble consumer protection in the case of disconnecting copyright violators from Internet access.

When it comes to the future development of copyright within the EU, there are conflicting initiatives. On one hand, the EU takes part in the confidential negotiations of the Anti-Counterfeit Trade Agreement (“ACTA”) which will significantly elevate the level of copyright protection on a global level, and, on the other, the EU speaks of the importance and need to “promote free movement of knowledge and innovation as the ‘Fifth Freedom’ in the single market”, presented in the Green Paper on Copyright in the Knowledge Economy 2008, a document inviting participation in these issues.

This begins with the ACTA, a plurilateral agreement negotiated secretly by around a dozen countries. Although the negotiations have been hidden from public view, an ACTA text dated 18 January 2010 was leaked in March 2010, followed by an official EU version published 21 April 2010 and the final version of 3 December 2010.63 One difference between the leaked document and the official ones is that the parties’ opinions are not stated in the latter. The leaked version dated 18 January 2010 reveals that the U.S., unsurprisingly, is an IP maximalist here, pushing for strong provisions. The question of privacy interests is of very great importance when analysing the ACTA, since the agreement seems to increase data sharing with both other countries and with rights holders.64 The official document of 21 April, in short, seems to picture an active, pro-rights holder role for ISPs and other online intermediaries. The ACTA may also limit the type of services that can fall into a “mere conduit” exception to notice-and-takedown. Once again, the ISPs are identified as the key target. Although the draft versions to a high degree targeted ISP liability, the most controversial enforcement measures proposed in the initial stages of the negotiations of the ACTA have been narrowed down in its final version.65 All in all, the ACTA however shows that there are strong international forces that seek to extend the means of enforcing copyright undemocratically, at the expense of ISP neutrality.

The purpose of the Green Paper on copyright in the knowledge economy is to “foster a debate on how knowledge for research, science and education can best be disseminated in the online environment”. The Green Paper aims to set out a number of issues connected with “the role of copyright in the ‛knowledge economy”’.66 The problem here is the lock-in effects of the legislative path that EU has taken with regard to copyright. The way that it proposes to “unlock” some of the aspects is to broaden the exemptions under copyright. The Green Paper has been said to highlight the need for serious research and a dialogue on the future of the InfoSoc Directive, especially as regards competing policies in the areas of “consumer protection, telecoms regulation and electronic commerce”.67 The Green Paper states that “a high level of copyright protection is crucial for intellectual creation.” “Copyright ensures the maintenance and development of creativity in the interests of authors, producers, consumers and the public at large”, and at the same time it seeks to acknowledge the essence of no protection for certain groups as well as types of creativity, for instance “user-created content”.

It is the legal heritage of a strongly path-dependent copyright that creates this contradictory stance, in its attempt to grasp the online flow without being able to diverge from the legally locked-in path.

4. Analysis and discussion

There are at least five main findings in a path dependence analysis of European copyright development. Most of them have already been pointed out, but here they will be collated and further elaborated. These are presented in the following subchapters, where the first, the legitimacy issue, deals with the fundamental conflict between social and legal norms, making the path dependence analysis important in the first place; the second deals with how the preservation of the path is being undertaken, the third describes how the copyright path and its inherent conceptions colonise other legal paths, at the expense of other values; the fourth fairly succinctly highlights the targeting of the ISPs in this development; and the fifth, on the other hand, elaborates how the increased use of data traceability in legal enforcement has implications for how privacy should be handled. Finally, a brief section suggests future possible research in line with this article.

4.1. The legitimacy issue

As mentioned, the gaps between regulation, social norms and conduct have been widely discussed and stated in the literature.68 This stems in part from the fact that the global copyright construction is a legal complex that in general is based on ideas of the conditions of an analogue world for distribution and production of copies, but it is armed with increasingly protective measures when faced with human conduct in the context of digital networks. Around this regulation an industry emerged mainly during the second half of the twentieth century that is dependent on the ability to enforce this type of law against those who attempt to benefit from the immaterial work of others. This dependency is expressed in terms of control over copies and distribution. Every copy was inevitably connected to a physical object, which demanded an investment. In this analogue context, this construction is functional, without too many anomalies in terms of breach of this control. Although, in a digital context, where the distribution costs are close to zero and making copies does not need any investment, this control is fundamentally breached, with the consequence that law and practice does not correspond well. This non-digital versus digital divide plays an important role in the legitimacy of copyright laws. The legal answer to the Read/Write environment of the Internet technologies, to borrow terminology from Lawrence Lessig, has been a constant increase in regulatory efforts to maintain the prevailing constraints of a Read Only conception of copyright.69 This is where the concepts of copyright law becomes the metaphors of copyright, where these standardised modes of conceptualising how copyright best serves its purpose are preserved in law, regardless of the external changes in society. This is where the transaction costs of legal change become manifest, to the extent that the cost becomes remarkably high for shifting the path for copyright regulation. This kind of change seemingly provokes a political struggle, and the legal domain cannot abandon certain legally embedded conceptions; the law lags behind. There are transaction costs attached to such a fundamental change of ideas embedded in law, especially for one so locked into national, international and supranational law and treaties.

The media industry’s struggle to push illegal file sharing of copyrighted content into a legitimate market in conformity with copyright laws has been described by many in terms of a “war”.70 This metaphor not only strongly emphasises how common illegal file sharing is, but the aggressive legal and other measures the industry (especially in the United States) has taken in the battle as well. This “war” has led copyright owners’ interest groups to employ a very active strategy in collecting evidence against violators of the regulation,71 which highlights the distance and the clash between the behaviour and social norms of some groups on the one hand, and the laws that try to regulate this behaviour and change these social norms on the other hand.72

4.2. Preserving the path

The path dependence of European copyright serves as a strong argument for those who benefit from its conservation. Appeals to tradition impede change by privileging the status quo in terms of an increased protection. The reason why these appeals still prevail as dominant ones is probably a consequence of the linkage to a strong industry protecting and voicing them, thereby complementing the internal functions of path dependence. As has been mentioned, the “adoption of a particular institutional arrangement” in copyright had already been undertaken before Internet came into being, and the deterministic pattern of this “self-reinforcing sequence” over the last few years had corresponded with the stable reproduction of this institution over time.73 It had already been self-reinforced, reproduced and legitimised when it became fundamentally challenged by the development of digitalised networks.

The legal path, when it becomes strongly dependent, is related to internal legal “legitimating processes” in the sense that increasing legitimating processes are marked by a positive feedback cycle in which an initial precedent about what is appropriate forms a basis for making future decisions about what is appropriate. As a result, a familiar cycle of self-reinforcement occurs: the institution that is initially favoured sets a standard for it own legitimacy; this institution is reproduced because it is seen as legitimate at this stage; and the reproduction of the institution reinforces its internal legitimacy.74 This should in the perspective of social change relating to Internet and similar technologies be seen as an internal legal legitimacy, not necessarily connected to external social norms and the behaviour of ordinary citizens today, when the institution has reached an own momentum, albeit not without support from the actors benefitting from its continued dominance.

A negative implication of this “standardisation”, according to Gillette, is that the incentive to produce an improved system is discouraged, because no single user within the existing network can be induced to shift to the new system without assurances that a critical mass of potential users will do likewise. As an analogy, Gillette claims, regulatory regimes that share the characteristics of lock-in could be as vulnerable to path dependence as technological standards:

Where those who are favoured by the status quo can organise with ease relative to those who are disfavoured (that is, where those who favour the status quo can form a dominant interest group), they are likely to take advantage of that position whenever an inkling of change arises.75

The revisions of copyright the last ten years shows an interesting incremental approach. In terms of what analysis is perceived as necessary when developing copyright regulation, it merely reinforces values already in position. There are no signs of deregulation or decreasing protection, indeed the opposite is the case, assuming that the concepts and metaphors used will also function in a digital environment under proper control. It is a “disjointed incrementalism”, that in the words of Etzioni seeks to “adapt decision-making strategies to the limited cognitive abilities of decision-makers and to reduce the scope and cost of information collection and computation”.76 This decision-making focuses on close goals instead of comprehensive ones, through a limited analysis. The successive composition reduces the need for theory, or for a detailed understanding of social changes outside the control of the law. Minor adjustments to a model that has been working fairly well for a considerable time are a decision-making model used by policy makers. This is where the (paradigmatic) shift between an analogically anchored way of communicating (in the broadest sense) and a digital one inevitably leads to policy-related problems.77

4.3. Colonising other paths

As has been mentioned, there are power structures that contribute to make this legal path colonise other legal paths. When concerned interests, relying on the power balances of the regulation drafted in non-digital times, seek to maintain their position, other values that the law protects become secondary. Not only does the path dependency incorporate a broadened criminalisation of types of actions, but as more actions become criminal, it also affects the hierarchy of rights, as with the non-circumvention of technical measures.78 Furthermore, if the Data Retention Directive describes how copyright enforcement can become embroiled in legal efforts against terrorism, the Telecoms reform package shows how it can get tangled up in telecommunications market issues. For that matter, the ACTA shows how copyright can increasingly be understood in terms of trade, and hence, be part of trade agreements that can circumvent more democratic legislative processes on a national or supranational level. The effect of copyright distribution and the formulations for how copyright is constructed and conceptualised are reproduced and strengthened in various related and sometimes only remotely related legislative efforts. A directive that is drafted to fight terrorism, such as the one on data retention, which combats an activity with extremely low legitimacy in social norms, can end up in including the struggle against illegal file sharing of copyrighted content, an activity with extremely high legitimacy in terms of social norms.

4.4. Targeting the ISPs

From the strong path dependence of copyright there derives a clear tendency to target the ISPs and other intermediaries in an attempt to keep the copyright path intact. The IPRED is a clear example of this, and also the Telecoms Reform Package and, the ACTA further emphasise this fact. There are plans to revise the IPRED, and a recent report from the Commission discusses that the currently available legislative and non-legislative instruments are not powerful enough to combat online infringements of intellectual property rights effectively, which leads to the conclusion that ISPs could be further targeted and involved:

Given intermediaries’ favourable position to contribute to the prevention and termination of online infringements, the Commission could explore how to involve them more closely.79

In addition, the exact implications of the Data Retention Directive for copyright are not clear, but it will probably affect copyright enforcement, as outlined above, by ensuring that identification information is stored. The key role of the ISPs is, however, also part of a bigger issue that concerns the character of the Internet as we know it and the features and possibilities for the online enforcement of the law.

4.5. Looking ahead: Pushing the limits of effective legal action

Law is in many aspects very dependent on its history, in the sense that history matters. Concepts and principles create paths that also lock in future legal directions. The problem here is not that legal developments relate to its past, or lock in standardised modes of prescribed conduct. On the contrary, these elements serve as parts of the strong legal principle of predictability. However, problems occur when they relates to the past in such a manner that it fails to include or to grasp important changes in society, and it is so locked in that it cannot even consider alternatives that might be more efficient, given the new conditions in society. In short, problems occur when law is too path dependent in relation to social change.

This development shows that the fight against file sharing risks being drawn into legislative contexts of fundamentally different origin and legitimacy. A significant predicament regards the fact that a directive that is drafted to fight terrorism, an activity with extremely low legitimacy in social norms, can end up in including the struggle against illegal file sharing of copyrighted content, an activity with extremely high legitimacy in social norms.

The development of European copyright, in its broad sense, not only re-builds the Internet in terms of traceability (the IPRED and possibly the Data Retention Directive) but also legal enforcement in terms of mass-surveillance. Since this is a strong claim, the analysis has to be elaborated further. This paper shows the legislative and supranational responses to the problems that copyright faces in the digital milieu and the legislative developments where the authoritarian trend in copyright-related European legislation is striking. This cluster of legislation that seeks to harmonise the national legislations of the European Union are all part of a trend for increasing control over the flows on the Internet. More data are being generated and retained in order to support the copyright owners’ fight against the illegal file sharing of protected content. At the same time, the copyright holders’ representatives are given easier access to identification data through regulation assigning greater responsibility to the ISPs for content that is being trafficked through their infrastructure. This is one of the reasons that the debate around net neutrality has widened.80

A relevant question here is whether the price for the enforcement of copyright is acceptable in terms of decreased privacy for all. This shows that following the copyright path in legal development is not an independent trend but one that also affects other very important values, which is something that is not always considered in the process. Thus file sharing and copyright are closely linked to issues of privacy and the character of the Internet, and. there are different values that oppose each other. It is of interest to note that copyright legislation, seemingly, is path dependent and inviolable while privacy regulation is not, or at least not as strongly.

The Internet can be used by citizens to circumvent authority and governments use the Internet and related technologies to respond to this. There is, however, always a limit to the effectiveness of legal action, although this is hard to draft in detail. Roscoe Pound seeks to lay down principles suggested by a consideration of basic characteristics of modern law, and advances the fact that law can only deal with “the outside”, the law cannot attempt to control social norms and beliefs but only observable behaviour.81 This is even more interesting in the context of Internet-related behaviour, considering the newly emerging opportunities to “observe behaviour” on such a vast scale. Never before has there been so much collectable information revealing the inner thoughts and every-day habits of an increasingly connected society. This poses new questions as to who has the rights to do what with this information, it shapes the strategies of the copyright protectors, it magnifies the question of the role of the ISPs, and it certainly asks to what extent the law should stipulate a centrally located collection of, for instance, traffic data in order to enforce whatever laws the legislator seeks to enforce. As the Internet develops, the effectiveness of legal regulation meets new obstacles with respect to controlling actions on line. On the one hand, the possibilities that the medium provides have an impact on the prerequisites for social norms, which also affects compliance with copyright legislation, as well as give new tools for resistance to legal enforcement.82 On the other hand, central to this article is that the digital networks that form the “new social morphologies” impose completely new ways of legal enforcement and mass-surveillance over the multitude of habits and secrets of our everyday lives. The “long arm of the law” has acquired an extensive reach. It now has a new potential to discover and control everyday behaviour in a way that forces us to ask questions about how far we want it to extend.

Law enforcement is expanding in terms of the possibilities for control, surveillance and identification that the digitalised and networked society can offer. The possible “nodality” of legal enforcement is greater than ever before. The IPRED is one such European Union response to the circumvention of copyright legislation that the Internet has brought about. One must ask who can, for instance, really guarantee the legitimate uses of the massive traffic data collection in which the Data Retention Directive results.

While describing the “generativity” (and citing Zittrain) of the Internet technologies, the Internet policy researcher Margetts asks in what way the Internet serves as a platform for policy innovation.83 One answer can be found in the growing responsibility of balancing integrity concerns and new and extreme possibilities for recording behaviour by means of data logs and digital supervision. The potential of technology and its embeddedness in all aspects of social life test the limits on the effectiveness of legal action in determining the borders of legitimacy. Where to draw this line is, hopefully, a political question, and, ideally, this question will be decided in a democratic manner. It is important to be clear about the fact that the development of a general mass surveillance of the entire population is not an issue to be taken lightly or a development that should be allowed to pass unscrutinised.

4.6. Future research

This article contributes to a knowledge base pertaining to the legal aspects of a dilemma relating to illegal file sharing, copyright regulation and its role in social and societal developments. A detailed and deeper understanding of these developments probably requires a more comprehensive research approach including studies of social norms and a greater understanding of what is happening online, or socially, in conjunction with network lifestyles. One could also imagine that a more detailed study of the origins of the directives would tell us more about transnational law-making; the interests that have been able to influence this process, the kind of forces are at play, and those who have the power to influence the process, etc. Questions of further interest are, e.g., to what extent there are hidden aspects of international considerations, perhaps involving global politics related to trade and “strong” versus “weak” countries that shape the regulatory formulations.

In terms of path dependence in copyright, this study has focused on the days of the Internet, meaning the last decade or so, but it would be of interest to see a more historical study of the development of the copyright complex, how it grew, and evolved its “particular institutional arrangement” throughout the twentieth century, in the words of Mahoney.

5. Conclusion

Copyright’s strong path dependence has been elucidated by describing how copyright is legally constructed and harmonised through international treaties as well as recent European regulatory efforts, in the form of InfoSoc Directive and the IPRED. The Data Retention Directive and the Telecommunications Reform package highlights the ISPs as being increasingly conceptualised as the key to identity information about copyright violators, on the one hand, and as guardians of subscriber privacy on the other hand, while they themselves advocate neutrality and a “mere conduit” as their leading principle. Furthermore, the “secretly” negotiated ACTA agreement may result in imposing stronger copyright on Member States, which the US is seemingly striving to achieve. The underlying formulations of how copyright is constructed and conceptualised is reproduced and strengthened in various related and sometimes only tenuously related legislative efforts.

From a socio-legal perspective, copyright regulation suffers from legitimacy issues. The global copyright construction is a legal complex that in general is based on ideas of the conditions of an analogue world for distribution and production of copies- but armed with increasingly protective measures when faced with human conduct in the context of digital networks. To some extent, this most probably involves expansion of the concepts and metaphors that once described only non-digital practice but now form standardised ways of creating new law. The trend in European copyright is protectionist, through the expanding and strengthening of rights and their enforcement, and in that it is self-reinforcing and locked in to certain standards. The path dependence of European copyright serves as a strong argument for those who benefit from its preservation, signalling that there are power structures that support the colonisation by this legal path of other legal paths that protect conflicting rights.

There is a clearly visible tendency in targeting the ISPs and other intermediaries in an attempt to keep the copyright path intact. The development of European copyright, in its broad sense, not only re-designs the Internet in terms of traceability but also law enforcement in terms of mass-surveillance. The digitalisation of society requires that new questions be asked as to how legal enforcement is or can be performed in terms of mass-surveillance of the multitude of habits and secrets in our everyday lives. This means that there is a growing political responsibility for balancing integrity concerns and new and extreme possibilities for recording behaviour by means of data logs and digital supervision. Thus, the path dependence of copyright leads to an imbalance of principal importance between the interests at stake. The imbalance lies in that a special interest is allowed to modify methods of legal enforcement from the reactive and particular to the pre-emptive and general. The special copyright interest gains at the expense of the privacy of everyone.

 


* Ph D Candidate, Sociology of Law, Lund University.

1 See for instance A Peczenik, Vad är rätt? Om demokrati, rättssäkerhet, etik och juridisk argumentation (Stockholm: Fritzes, 1995), at 89-90; V Aubert, Continuity and Development in Law and Society (Oslo: Norwegian University Press, 1989), at 62; N Luhmann, Rechtssoziologie (Reinbek bei Hamburg: Rowohlt, 1972), at 31ff.

2 See R L Abel, “Law as Lag: Inertia as a Social Theory of Law” (1982) 80 Michigan Law Review 785, or A Christensen, “Rätten i ett samhälle under förändring” in S Strömholm (ed), Svensk Rättsvetenskap, 1947 – 1997 (Stockholm: Nordstedts, 1997).

3 S Larsson “The Darling Conceptions of Your Time, Or: Why Galileo Galilei Sings So Sadly in the Chorus” in SR Eide (ed), Free Beer 1.0 (FSCONS, 2009) available at http://www.lulu.com/items/volume_67/7897000/7897083/1/print/book.pdf (accessed 3 February 2010), at 27-46, the anthology from the presenters at Free Society Conference 2008; L Lessig, Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity (New York: Penguin Books 2004); L Lessig, Remix: Making Art and Commerce Thrive in the Hybrid Economy (London: Bloomsbury Academic, 2008); U Lewen, “Internet File Sharing: Swedish Pirates Challenge the U.S.” (2008) 16 Cardozo Journal of International & Comparative Law; J Litman, Digital Copyright: Protecting Intellectual Property on the Internet, the Digital Millennium Copyright Act, Copyright Lobbyists Conquer the Internet, Pay Per View...Pay Per Listen...Pay Per Use, What the Major Players Stand to Gain, What the Public Stands to Lose, 2nd ed (Amherst: Prometheus Books, 2006), available at http://works.bepress.com/cgi/viewcontent.cgi?article=1004&context=jessica_litman (accessed 3 February 2010); S Morris, “Pirates of the Internet, at Intellectual Property’s End with Torrents and Challenges for Choice of Law” (2009) 17 International Journal of Law & Information Technology 282-303; H Selg and L-E Eriksson, Broadband Technologies Transforming Business Models and Challenging Regulatory Frameworks: Lessons from the Music Industry (Music Lessons - Deliverable 4 2006); M Svensson and S Larsson, Social Norms and Intellectual Property: Online Norms and the European Legal Development, Research Report in Sociology of Law (Lund: Lund University, 2009), at 1; S Vaidhyanathan, Copyrights and Copywrongs: The Rise of Intellectual Property and How It Threatens Creativity (New York: New York University Press, 2001); O Vincents, “When Rights Clash Online: The Tracking of P2p Copyright Infringements vs. the EC Personal Data Directive” (2008) 16 International Journal of Law & Information Technology 270-296.

4 The privacy of ordinary people is a growing issue in the digitalising society. In addition, Marsoof has identified this in the context of South Asia, although Marsoof’s perspective does not elaborate the possibility of conflicting interests also being embedded in law. See A Marsoof, “The Right to Privacy in the Information Era: A South Asian Perspective” (2008) 5 SCRIPTed 553-574; L Lessig, The Future of Ideas: The Fate of the Commons in a Connected World (New York: Vintage Books, 2002).

5 For instance, in relation to copyright. Graham Reynolds’ example of “mashup music” and copyright regulation in Canada relates to creativity and the boundaries of copyright relating to the work of Lawrence Lessig. See G Reynolds, “A Stroke of Genius or Copyright Infringement? Mashups and Copyright in Canada” (2009) 6 SCRIPTed 639-668; L Lessig, see note 3 above. The practice of “mashing up” music and sounds digitally in order to create whole new works, sometimes with the original sources surprisingly unrecognisable, ties in with questions of “unlocking IP” that R Clarke and D Kingsley discuss in relation to open access and journal content, and the role of the commons and public domain, as analysed in an Australian case study by G Greenleaf. See R Clarke and D Kingsley, “Open Access to Journal Content as a Case Study in Unlocking IP” (2009) 6 SCRIPTed 234-258; G Greenleaf, “National and International Dimensions of Copyright’s Public Domain (An Australian Case Study)” (2009) 6 SCRIPTed 259-340. J B Meisel analyses the development of competition in the delivery of digital content to consumers that, for instance, file sharing in peer-to-peer (p2p) networks implies in “Entry into the Market for Online Distribution of Digital Content: Economic and Legal Ramifications”(2008) 5 SCRIPTed 50-69. The new possibilities of the Internet raise the question of how privacy is re-formulated, or re-regulated. Marsoof draws attention to the increased “need to protect the privacy of the individual from invasions not only by the State, but also from others who seek to profit from such intrusions”, see A Marsoof, note 4 above. This “new” question or dilemma of privacy is also touched upon up by S Nouwt in relation to information privacy and data privacy, specifically in relation to Location Based Services and geo-information about citizens, see S Nouwt, “Reasonable Expectations of Geo-Privacy?” (2008) 5 SCRIPTed 375-403

6 See, for instance C P Gillette, “Lock-in Effects in Law and Norms” (1998) 78 Boston University Law Review and O A Hathaway, “Path Dependence in the Law: The Course and Pattern of Legal Change in a Common Law System” (2001) 86 Iowa Law Review 601.

7 See M Adams, “Norms, Standards, Rights” (1996) 12 European Journal of Political Economy 363-375.

8 S J Burton (ed), The Path of the Law and its Influence: The Legacy of Oliver Wendell Holmes, Jr., (Cambridge: CUP, 2000).

9 A Peczenik, see note 1 above, at 89-90. For a case study related to legal predictability, see S Larsson, “Non-Legal Aspects of Legally Controlled Decision-Making – The Failure of Predictability in Governing the 3G Infrastructure Development in Sweden” in H Hydén and P Wickenberg (eds), Contributions in Sociology of Law: Remarks from a Swedish Horizon, Lund Studies in Sociology of Law (Lund: Lund University, 2008).

10 V Aubert, Continuity and Development in Law and Society (Oslo: Norwegian University Press, 1989), at 62; N Luhmann, see note 1 above, at 31ff.

11 R A Posner, “Past-Dependency, Pragmatism, and a Critique of History in Adjudication and Legal Scholarship” (2000) 67 University of Chicago Law Review 573.

12 S J Liebowitz and S E Margolis, “Path Dependence, Lock-In, and History” (1995) 11 Journal of Law, Economics and Organization 205. P A David, “Clio and the Economics of QWERTY” (1985) 75 American Economic Review 332–337.

13 C P Gillette, see note 6 above, at 818.

14 T C Halliday, S Block-Lieb, and B G Carruthers, “Rhetorical Legitimation: Global Scripts as Strategic Devises of International Organizations” (2010) 8 Socio-Economic Review77-112. See G Lakoff and M Johnson, Metaphors We Live By (Chicago: University of Chicago Press, 1980).

15 See for instance M Johnson, “Mind, Metaphor, Law” (2007) 58 Mercer Law Review 845-868.

16 On copyright education and its rhetoric, see M Yar, “The Rhetorics and Myths of Anti-Piracy Campaigns: Criminalization, Moral Pedagogy and Capitalist Property Relations in the Classroom” (2008) 10 New Media & Society 605-623.

17 See more on this in S Larsson and H Hydén “Law, Deviation and Paradigmatic Change: Copyright and its Metaphors” in M Vargas Martin et al. (eds) Technology for Facilitating Humanity and Combating Social Deviations: Interdisciplinary Perspectives (IGI Global, 2010) and S Larsson, “459 miljarder kronor – om metaforer, flöden & exemplar” in P Snickars and J Andersson (eds), Efter Pirate Bay (Stockholm: Mediehistoriskt arkiv, Kungliga biblioteket, 2010).

18 J Mahoney, “Path Dependence in Historical Sociology” (2000) 29 Theory and Society 507-548.

19 Ibid, 535.

20 European Commission, Proposal for a European Parliament and Council Directive on the Harmonization of Certain Aspects of Copyright and Related Rights in the Information Society, COM/97/0628 final – COD 97/0359, [1998] OJ C108/6, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:51997PC0628:EN:HTML (accessed 14 March 2011).

21 Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society, [2001] OJ L167/10-19, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32001L0029:EN:HTML (accessed 14 March 2011).

22 Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the Retention of Data Generated or Processed in Connection with the Provision of Publicly Available Electronic Communications Services or of Public Communications Networks and Amending Directive 2002/58/EC, [2006] OJ L105/54-63, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32006L0024:EN:HTML (accessed 14 March 2011).

23 European Commission, Proposal for a Directive of the European Parliament and of the Council amending Directives 2002/21/EC on a Common Regulatory Framework for Electronic Communications Networks and Services, 2002/19/EC on access to, and Interconnection of, Electronic Communications Networks and Services, and 2002/20/EC on the Authorisation of Electronic Communications Networks and Services {SEC(2007) 1472} {SEC(2007) 1473}, COM/2007/0697 final – COD 2007/0247, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2007:0697:FIN:EN:HTML (accessed 14 March 2011).

24 European Commission, Proposal for a European Parliament and Council Directive on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society, COM/97/0628 final – COD 97/0359, [1998] OJ C108/6, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:51997PC0628:EN:HTML (accessed 14 March 2011).

25 Directive 2001/29/EC, see note 21 above.

26 European Commission, Green Paper of 27 July 1995 on Copyright and Related Rights in the Information Society – COM (95)/0382 final, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:1995:0382:FIN:EN:PDF (accessed 14 March 2011).

27 See I Brown (ed) Implementing the EU Copyright Directive (FIPR 2003).

28 P B Hugenholtz, “Why the Copyright Directive is Unimportant, and Possibly Invalid” (2000) 22 European Intellectual Property Review 501-502. See also P B Hugenholtz, M van Eechoud, S van Gompel, L Guibault and N Helberger, Harmonizing European Copyright Law: The Challenges of Better Lawmaking (Alphen aan den Rijn: Kluwer Law International, 2009).

29 J Zittrain, “A History of Online Gatekeeping” (2006) 19 Harvard Journal of Law and Technology 253-298 gives a good historical exposé up until 2006 and includes Napster, Aimster, Gnutella and Grokster. See also L J Strahilevitz, “Charismatic code, social norms, and the emergence of cooperation on the file-swapping networks” (2003) 89 Virginia Law Review 505 on Napster and Gnutella. See D Spitz and S D Hunter, “Contested Codes: The Social Construction of Napster” (2005) 21:3 The Information Society 169-180 on the social construction of Napster.

30 See T Gillespie, Wired Shut: Copyright and the Shape of Digital Culture (Cambridge, MA: MIT Press, 2007), at 181-185.

31 S 57a Swedish Copyright Act. This protection follows art. 7.1c in Council Directive 91/250/EEC of 14 May 1991 on the legal protection of computer programmes.

32 G Westkamp, “The Implementation of Directive 2001/29/EC in the Member States” (Queen Mary Intellectual Property Research Institute, February 2007), available at http://ec.europa.eu/internal_market/copyright/docs/studies/infosoc-study-annex_en.pdf (accessed 1 July 2010), at 79-81.

33 SOU 2003:35 (Upphovsrätten i informationssamhället – genomförande av direktiv 2001/29/EG, m.m.).

34 Prop 2004/05:110 (Upphovsrätten i informationssamhället – genomförande av direktiv 2001/29/EG, mm.), SFS 2005:359. In addition the government draft bill 2004/05:135 “Utökade möjligheter att förverka utbyte av och hjälpmedel vid brott m.m.” brought with it some changes for the Swedish Copyright Act, and was in force by 1 July 2005. SFS 2005:360; SOU 2003:35, Prop 2004/05:110, see S Larsson, Intellectual Property Rights in a Transitional Society: Internet and File Sharing from a Sociology of Law Perspective (In Swedish. Musikupphovsrätten i ett samhälle under förändring – Internet och fildelning ur ett rättssociologiskt perspektiv), Master of Laws Thesis, University of Lund (2005), at 28-29. Sweden had received a reprimand from the European Court of Justice for the delay that had already occurred.

35 For the UK implementation, see T Cook, “UK Implementation of the Copyright in the Information Society Directive” (2004) 20 Computer Law & Security Report 17-21.

36 See S Larsson and H Hydén, see note 17 above.

37 For the Portuguese implementation of IPRED and an example of what choices are made when implementing a directive into national law, see M Lourenço Carretas, “Os Novos Meios de Tutela Preventiva dos Direitos de Propriedade Intelectual no Direito Português (The New Means of Preventive Protection of Intellectual Property Rights in Portuguese Law)” (2008) 5 SCRIPTed 455-481.

38 Corrigendum to Directive 2004/48/EC of the European Parliament and of the Council of 29 April 2004 on the Enforcement of Intellectual Property Rights (OJ L157, 30.4.2004), [2004] OJ L195/16-25, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32004L0048R(01):EN:HTML (accessed 1 July 2010).

39 S M Kirkegaard, “Taking a Sledgehammer to Crack the Nut: The EU Enforcement Directive” (2005) 21 Computer Law & Security Report 488-495, at 489.

40 Recital 4 of IPRED, Corrigendum to Directive 2004/48/EC of the European Parliament and of the Council of 29 April 2004 on the enforcement of intellectual property rights (OJ L157, 30.4.2004), [2004] OJ L195/16-25, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32004L0048R(01):EN:HTML (accessed 1 July 2010).

41 See DS 2007:19, Civilrättsliga sanktioner på immaterialrättens område - genomförande av direktiv 2004/48/EG, p. 170 f. and Bill Prop. 2008/09:67, Civilrättsliga sanktioner på immaterialrättens område – genomförande av direktiv 2004/48/EG, at 128 f.

42 Bill 2008/09: 67, at 259.

43 DS 2007:19, s. 190 f. The explanation for departing from the proposal was that there were considered to be good reasons that such regulation would fit in better with the Swedish system and mean that the effect of the injunction evidence in a following trial against infringers would diminish. Furthermore, it was pointed out that this is not contrary to the directive, as it would benefit the copyright holders (see Article 2.1 of the Ipred Directive), Bill 2008/09: 67, at 149 ff.

44 Draft bill Prop. 2008/09:67, Civilrättsliga sanktioner på immaterialrättens område – genomförande av direktiv 2004/48/EG. In a European Court of Justice ruling on 15 May 2008, Sweden was found to have failed to incorporate the Directive into domestic law within the prescribed period, see Commission of the European Communities v Kingdom of Sweden, Case C-341/07, [2008] OJ C171/11, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2008:171:0011:0011:EN:PDF (accessed 1 July 2010).

45 See Prop 2008/09:67, at 255 on the estimate. The first of the two mentioned actual cases, the Ephone Case, involves five publishing houses that attempted to retrieve identity information from an ISP on an individual who was using a server to share audio books. Just a few hours after the law was implemented, these five publishers submitted an application to the district court (Case Ä 2707-09). The district court found that there was sufficient evidence of the alleged copyright violations; the case was, however, appealed by the ISP and the higher court did not find that the evidence showed probable cause that a violation of copyright had occurred, due to the fact that a password was needed to access the server content and no evidence was presented regarding the extent of distribution. The publishers appealed, and the Supreme Court granted a review permit in January 2010. However, when the case was scheduled for trial in September 2010, the Court decided to ask for a preliminary ruling by the European Court of Justice on the relationship between the Data Retention Directive that Sweden still has to implement and the implemented Ipred (Supreme Court Case nr Ö 4817-09, Court of Appeal Case ÖÄ 6091-09). The outcome of this preliminary ruling will definitely affect a similar but later case, the TeliaSonera Case. It involves four movie companies represented by the Swedish Antipiratbyrån, which filed a lawsuit at the district court in order to retrieve information on the individual(s) running a site called Swetorrents. They claimed that the site was illegally sharing copyright-protected material. The ISP, TeliaSonera, did not reveal information that could identify the alleged copyright violators, referring instead to its customers’ integrity. The district court accepted the movie companies’ claim, and the ISP appealed the case to a higher court, which ruled in favour of the movie companies. This compelled the ISP to apply for leave to appeal to the Supreme Court, which still has to decide whether or not to try the case (Case Ä 9211-09).

46 Article 1, s 1 of the Data Retention Directive.

47 See C Crump, “Data Retention: Privacy, Anonymity, and Accountability Online” (2003) 56 Stanford Law Review 191-229 for a perspective on American legislation regarding data retention after the 9/11 terrorist attack. See C DeSimone, “Pitting Karlsruhe Against Luxembourg? German Data Protection and the Contested Implementation of the EU Data Retention Directive” (2010) 11 German Law Journal 291-318 for the German perspective.

48 Directive 2006/24/EC, see note 22 above.

49 The EDPS is an independent supervisory authority devoted to protecting personal data and privacy and promoting good practice in the EU institutions and bodies.

50 Opinion of the European Data Protection Supervisor on the proposal for a Directive of the European Parliament and of the Council on the Retention of Data Processed in Connection with the Provision of Public Electronic Communication Services and amending Directive 2002/58/EC (COM(2005) 438 final), [2005] OJ C298/1-12, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2005:298:0001:01:EN:HTML (accessed 14 March 2011), section 8.

51 Article 29 Data Protection Working Party was established according to article 29 of the Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, [1995] OJ L281/31-50, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML (accessed 14 March 2011). Its duties are described in article 30 of the Directive 95/46/EC and article 15 of the Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), [2002] OJ L201/37-47, available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32002L0058:EN:HTML (accessed 14 March 2011).

52 Article 29 Data Protection Working Party, Opinion 3/2006 on the Directive 2006/24/EC of the European Parliament and of the Council on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC, [2006] 654/06/EN WP 119, available at http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2006/wp119_en.pdf (accessed 14 March 2011), at 2.

53 Ibid.

54 M Taylor, “The EU Data Retention Directive” (2006) 22 Computer Law and Security Report 309-312.

55 SOU 2009:1 En mer rättssäker inhämtning av elektronisk kommunikation i brottsbekämpningen, at 72-73.

56 In Sweden the regulation currently applying to the protection of privacy in electronic communication is primarily contained in the sixth chapter of the Electronic Communications Act (2003:389). As regards traffic data, section 6 states that “Traffic data that are required for subscriber invoicing and payment of charges for interconnection may be processed until the claim is paid or a time limit has expired and it is no longer possible to make objections to the invoicing or the charge”.

57 Sixty-two members of the Swedish parliament voted to postpone the proposal, while 281 members voted not to. But under the rules of so-called minority plating it is sufficient for one-sixth of the members voting in favor of a postponement in order to reach this effect. The EU directive however states that the member states should implement the directive by 15 September 2007. When it comes to Internet access, e-mail and Internet telephony, there is an option to postpone the implementation. This option has been used by Sweden, see SOU 2007:76, Lagring av trafikuppgifter för brottsbekämpning, at 17-18. Nevertheless, Sweden is likely to be fined by the European Court for failure to implement the directive within the time limits.

58 European Commission, see note 23 above.

59 The directives have been abbreviated as the Framework Directive, the Access Directive, the Authorisation Directive, the Universal Service Directive and the e-Privacy Directive.

60 Lagen (1998:31) om standarder för sändning av radio- och TV-signaler.

61 COM (2007) 697 and COM (2007) 698.

62 HADOPI is the abbreviation for the oversight agency mandated by the French law officially titled Loi Favorisant la Diffusion et la Protection de la Création sur Internet or “Law Favouring the Diffusion and Protection of Creation on the Internet”, regulating and controlling the usage of the Internet in order to enforce its compliance with copyright law.

63 For the December 2010 version of the ACTA, see http://www.dfat.gov.au/trade/acta/Final-ACTA-text-following-legal-verification.pdf (last visited 14 March 2011).

64 See the blog post of M Kaminski, “The Anti-Counterfeiting Trade Agreement” (25 March 2010) http://balkin.blogspot.com/2010/03/anti-counterfeiting-trade-agreement.html (accessed 14 March 2011) who wrote an article on ACTA also before the document was leaked, M Kaminsky, “The Origins and Potential Impact of the Anti-Counterfeiting Trade Agreement (ACTA)” (2009) 34 Yale Journal of International Law, at 247.

65 See the Opinion of European Academics on the final versio of ACTA, http://www.iri.uni-hannover.de/tl_files/pdf/ACTA_opinion_110211_DH2.pdf (last accessed 14 March 2011).

66 Green Paper - Copyright in the Knowledge Economy (2008) 466 (July 2008), at 3.

67 S S Jakobsen, R Nielsen, T Riis, A Savin, and K Østergaard, “Comments on the Commission's Green Paper on Copyright in the Knowledge Economy” (1 December 2008). Available at SSRN: http://ssrn.com/abstract=1310196

68 See note 3 above.

69 L Lessig, see note 3 above.

70 See, for instance, the excellent description of this metaphorical use in terms of “war on piracy” in the preface of L Lessig, Remix: Making Art and Commerce Thrive in the Hybrid Economy (New York: Penguin Press, 2008).

71 See for instance O Vincents, see note 3 above.

72 M Svensson and S Larsson, see note 3 above.

73 J Mahoney, see note 18 above.

74 For the general process of legitimation in path dependence, see Ibid, at 523-524.

75 C P Gillette, see note 6 above, at. 820.

76 A Etzioni, “Mixed-Scanning: A “Third” Approach to Decision-Making” (1973) Public Administration Review 219.

77 For a paradigmatic perspective in relations to metaphors and conceptions of copyright, see S Larsson and H Hydén, see note 17 above.

78 See the “circumvention of technological measures” in InfoSoc directive and consider ownership of a CD in comparison to the copyrights holders’ technical protection of copies of that CD. T Gillespie, see note 30 above, at181-185.

79 “Report from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee or the Regions’, Application of Directive 2004/48/EC of the European Parliament and the Council of 29 April 2004 on the enforcement of intellectual property rights, at 7. See http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0779:FIN:EN:PDF (last visited 14 March 2011).

80 For a discussion on “net neutrality”, see CT Marsden, “Net Neutrality and Consumer Access to Content” (2007) 4 SCRIPTed 407-435.

81 R Pound, “The Limits of Effective Legal Action” (1917) 27 International Journal of Ethics 150-167.

82 See S Larsson and M Svensson, “Compliance or Obscurity? Online Anonymity as a Consequence of Fighting Unauthorised File Sharing” (2010) 2 Policy & Internet, available at http://www.psocommons.org/policyandinternet/vol2/iss4/art4/ (accessed 14 March 2011).

83 H Margetts, “The Internet and Public Policy” (2009) 1 Policy & Internet, at 11-13, available at http://www.psocommons.org/policyandinternet/vol1/iss1/art1

 


BAILII: Copyright Policy | Disclaimers | Privacy Policy | Feedback | Donate to BAILII
URL: http://www.bailii.org/uk/other/journals/Script-ed/08-1/larsson.html