{"id":3041,"date":"2011-04-13T18:47:18","date_gmt":"2011-04-13T16:47:18","guid":{"rendered":"http:\/\/www.daten-speicherung.de\/?p=3041"},"modified":"2011-04-13T18:50:37","modified_gmt":"2011-04-13T16:50:37","slug":"protect-freedom-of-speech-on-line-against-private-policing-by-service-providers","status":"publish","type":"post","link":"https:\/\/www.daten-speicherung.de\/index.php\/protect-freedom-of-speech-on-line-against-private-policing-by-service-providers\/","title":{"rendered":"Protect freedom of speech on-line against private policing by service providers"},"content":{"rendered":"<p style=\"text-align: left;\">Contribution to the European Commission&#8217;s <a href=\"http:\/\/ec.europa.eu\/internal_market\/consultations\/2010\/e-commerce_en.htm\">consultation<\/a> on the future of electronic commerce in the internal market and the implementation of the Directive on electronic commerce (2000\/31\/EC):<\/p>\n<table border=\"0\" bgcolor=\"#fffacd\">\n<tbody>\n<tr>\n<td>\n<h1>Summary of recommendations<\/h1>\n<ol>\n<li>The concept of \u201cspecific\u201d obligations of intermediaries \tto \u201cprevent\u201d illegal user action should be given up in \tits entirety. Intermediaries should only be required to remove \tillegal content upon notification.<\/li>\n<li>Service \tproviders should not be required to remove or disable access to \tinformation before it has been found illegal by a court of law.<\/li>\n<li>The \te-commerce directive should be amended to include strict \tsector-specific privacy rules for information society services.<\/li>\n<li>Discrimination against users that legally exercise data protection \trights must be prohibited.<\/li>\n<li>Providers of information society services should be required to \tensure the confidentiality of our Internet use.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>I am contributing to the consultation as a private individual and a legal professional.<\/p>\n<p>Before answering some of the specific <a href=\"http:\/\/ec.europa.eu\/internal_market\/consultations\/docs\/2010\/e-commerce\/questionnaire_%20e-commerce_en.pdf\">questions<\/a> posed by the Commission, I will deal with some points of particular importance.<\/p>\n<h2>A. Accessibility of company data protection officer (Art. 5 ECD)<\/h2>\n<p>It is becoming more and more important that <strong>queries regarding personal data can be addressed directly to a company data protection officer <\/strong>where such a person has been appointed. Service providers should therefore provide the details of a company data protection officer, including his electronic mail address, which allow him to be contacted rapidly and communicated with in a direct and effective manner (article 5 ECD to be amended).<\/p>\n<h2><a name=\"Intermediary_liability:_Protect_freedom_of_speech_by_stopping_pro-active_monitoring_and_.22prevention.22\"><\/a> B. Protect freedom of speech by stopping pro-active monitoring and \u201cinfringement prevention\u201d (Art. 14 (3) ECD)<\/h2>\n<h3><a name=\"Case_study:_Inacceptable_situation_in_Germany\"><\/a> 1. Case study: Unacceptable situation in Germany<\/h3>\n<p>The <strong>German Federal Supreme Court <\/strong>(Bundesgerichtshof) interprets the liability exemptions in the e-commerce directive not to be cover applications for injunctive relief, i.e. to claims for providers to prevent illegal user activity.<a name=\"sdfootnote1anc\" href=\"#sdfootnote1sym\"><sup>1<\/sup><\/a><\/p>\n<p>In consequence, the <strong>most far-reaching doctrine of contributory \u201cliability\u201d <\/strong>is being applied by German courts, called \u201caccessory liability\u201d (<em>St&#246;rerhaftung<\/em>). According to this doctrine it is not only the wrongdoer himself (direct infringer) and participants (effective promoters or helpers) that can be subject to a claim for refraining from rights infringements, but also mere accessories, including providers of information society services. Responsibility for unlawful user action is extended to all persons who &#8211; without necessarily being wrongdoers or participants &#8211; deliberately and generally causally contribute to the infringement of a third party&#8217;s right, provided they have the legal and effective means to detect and prevent the infringement.<a name=\"sdfootnote2anc\" href=\"#sdfootnote2sym\"><sup>2<\/sup><\/a><\/p>\n<p>According to this doctrine, once an intermediary obtains knowledge of an infringement, it is not only obliged to remove the unlawful content but also to <strong>take all technically feasible and reasonable precautions to prevent future infringements<\/strong>. In other words, subject to the requirement of reasonableness, service providers are obliged to examine all user content as soon as they obtain knowledge of any unlawful content. The monitoring obligation is not limited to the detection of the unlawful content that was originally notified or to the original publisher of this content.<a name=\"sdfootnote3anc\" href=\"#sdfootnote3sym\"><sup>3<\/sup><\/a><\/p>\n<p>In practice, <strong>this jurisprudence effectively forces providers to pro-actively monitor user-generated content<\/strong>, this being the only way they can avoid indictment.<a name=\"sdfootnote4anc\" href=\"#sdfootnote4sym\"><sup>4<\/sup><\/a> Culpable breach of the monitoring duty is punished by a disciplinary fine or even a prison sentence.<\/p>\n<p>A German court that finds a provider not to have taken sufficient steps to prevent infringements will grant injunctive relief by prohibiting the provider from letting users re-publish the illegal content, <span style=\"font-weight: normal;\">without setting out what measures the court deems necessary to prevent such infringement. The extent of the provider&#8217;s pro-active obligations is determined only when the rights holder initiates a separate procedure for alleged violation of the injunction and applies for a disciplinary fine or a prison sentence to be imposed. So providers are told which steps to take only in the judgement that imposes a fine on them. This jurisprudence causes <strong>unacceptable uncertainty for providers<\/strong>.<a name=\"sdfootnote5anc\" href=\"#sdfootnote5sym\"><sup>5<\/sup><\/a> It is impossible for intermediaries to anticipate which measures the courts will consider \u201creasonable\u201d.<a name=\"sdfootnote6anc\" href=\"#sdfootnote6sym\"><sup>6<\/sup><\/a><\/span><\/p>\n<p>This doctrine also has <strong>unacceptable repercussions on the freedom of speech <\/strong>on-line, because providers threatened by fines will &#8211; often using automatic and broad filters &#8211; block and prevent any content that they consider might infringe a third party right. This leads to the suppression of controversial but politically very valuable content, as intermediaries to not wish the battle on the legality of the content to be fought at their expense.<\/p>\n<p><a name=\"cite_ref-9\"><\/a><a name=\"cite_ref-10\"><\/a><a name=\"cite_ref-11\"><\/a><a name=\"cite_ref-12\"><\/a> Furthermore, German courts tend to <strong>go very far in what measures they impose on providers to prevent future infringements <\/strong>by their users: It was held that there was a duty to deploy technology to automatically scan all user-generated content for potentially infringing content.<a name=\"sdfootnote7anc\" href=\"#sdfootnote7sym\"><sup>7<\/sup><\/a> Users that have generated illegal content in the past must be subjected to a manual examination of any future content they generate.<a name=\"sdfootnote8anc\" href=\"#sdfootnote8sym\"><sup>8<\/sup><\/a> To this end, all users must be identified and the anonymous use of services must be disabled.<a name=\"sdfootnote9anc\" href=\"#sdfootnote9sym\"><sup>9<\/sup><\/a> All user actions must be logged.<a name=\"sdfootnote10anc\" href=\"#sdfootnote10sym\"><sup>10<\/sup><\/a> Content regarding issues that \u201cprovoke illegal reaction\u201d must be examined manually.<a name=\"sdfootnote11anc\" href=\"#sdfootnote11sym\"><sup>11<\/sup><\/a> All of these duties have been imposed not for the prevention of serious crime, but for the mere prevention of infringements of private titles including commercial rights.<\/p>\n<h3><a name=\"The_concept_of_private_policing_is_failed\"><\/a> 2. The concept of private policing is failed<\/h3>\n<p>These \u201cpreventive duties\u201d imposed by the courts violate article 15 of the e-commerce directive, according to which Member States &#8211; including their courts &#8211; must not impose a general obligation on providers to monitor information which they transmit or store. Injunctions lead to a <strong>de facto obligation to monitor user-generated content<\/strong>,<a name=\"sdfootnote12anc\" href=\"#sdfootnote12sym\"><sup>12<\/sup><\/a> and thus amount to a general monitoring obligation.<\/p>\n<p><a name=\"cite_ref-14\"><\/a>At any rate, <strong>the entire concept of \u201cspecific\u201d obligations to \u201cprevent\u201d illegal user action is failed<\/strong>. In a democracy, everybody can trust in the integrity of their fellow citizens, even if it is known that this trust is sometimes abused. Fundamental freedoms constitute the foundation of justice and peace in the world.<a name=\"sdfootnote13anc\" href=\"#sdfootnote13sym\"><sup>13<\/sup><\/a> Freedom is the purpose of all law. Its benefits for every person as well as for society as a whole by far outweigh the harm done by its abuse. A prevention society aimed at eliminating, as far as possible, all potential risks of human behaviour and life is not compatible with European values and freedoms.<\/p>\n<p>According to general principles of civil law, <strong>only those need to prevent harm that have created a hazard source<\/strong>. The exchange of information is at the roots of human nature. It is a fundamental right (article 11 of the Charter of Fundamental Rights) and can therefore not be considered a \u201chazard source\u201d. The provision of telecommunications services does not create a greater risk of rights infringements than the provision of any product or service. Typical, socially adequate and therefore legal risks do not put their originator in a position of being responsible for intentional violations committed by other people using the products and services provided.<\/p>\n<p>Also information society services are often similar to off-line activity such as personal discussions, noticeboards, CD recorders, photocopying machines or lockers. <strong>Internet users must not be discriminated in a way that puts them under permanent scrutiny and surveillance on-line where similar activities off-line are completely anonymous and confidential<\/strong>, simply because the Internet makes total control technically possible. The Internet must be kept as free as the rest of our lives. In information society we must defend our freedoms if we do not want to lose them gradually.<\/p>\n<p>Even prevention (or policing) technology that can reasonably be implemented or is industry standard must not be imposed on all service providers because of its <span style=\"font-weight: normal;\">devastating effects on freedom of speech. <strong>Filtering technology, for example, will by its nature suppress legal content that is merely similar to illegal content. <\/strong>This leads to the suppression of controversial but politically very valuable content, for example critical comments on companies and products or \u201cfair use\u201d of intellectual property. Policing is not the job of private companies. <\/span><\/p>\n<h3><a name=\"Recommendation\"><\/a>3. Recommendation<\/h3>\n<p>The concept of \u201cspecific\u201d obligations of intermediaries to \u201cprevent\u201d illegal user action that is accepted in article 14 (3) and recitals 47 and 48 of the e-commerce directive should be given up in its entirety. Intermediaries should only be required to remove illegal content upon notification. The deterring effect of criminal sanctions is sufficient to \u201cprevent\u201d illegal user action.<\/p>\n<p><strong>Recommendation: <\/strong><\/p>\n<ul>\n<li>Service providers should not be \trequired to \u201cprevent\u201d infringements. To this end, \tarticle 14 (3) ECD should read: \u201c<em>This Article shall not \taffect the possibility for a court or administrative authority, in \taccordance with Member States&#8216; legal systems, of requiring the \tservice provider to terminate <\/em><span style=\"text-decoration: line-through;\"><em><strong>or prevent<\/strong><\/em><\/span><em> an infringement, nor does it affect the possibility for Member \tStates of establishing procedures governing the removal or disabling \tof access to information.<\/em>\u201d \tRecitals 47 and 48 should be deleted.<\/li>\n<\/ul>\n<h2><a name=\"Intermediary_liability:_Judicial_review_is_needed_to_protect_freedom_of_speech\"><\/a> C. Judicial review is needed to protect freedom of speech (Art. 14 (1) ECD)<\/h2>\n<p>The current liability limitations do not sufficiently protect free speech for another reason: A service provider that is notified of allegedly illegal content is not exempted from liability under the current directive even if is has reason to believe that the content may be legal. In practise this situation leads to the <strong>removal of practically any notified content without proper assessment of its legality<\/strong>, resulting in major damage to free speech on-line. Providers are being put in the position of a judge which they cannot fill. If they remove content which is later considered legal by the courts, they can be faced with high damage claims by the customer\/user whose content was removed. If, on the other hand, the providers refuse to remove content which is later considered illegal by the courts, they can be faced with high damage claims by rights holders.<\/p>\n<p>A service provider that is notified of allegedly illegal content should therefore <strong>not be required to remove the content before its legality has been assessed by a judge <\/strong>in a preliminary procedure. Member States can design this procedure to be fast and effective. However its cost must not be borne by the provider as this would again have a chilling effect on free speech. The requirement of a court ruling is not too great a burden on rights holders. A preliminary ruling can be obtained within a day in Germany, for example. As to the cost, needy claimants can apply for legal aid. Also claimants can recover theirlegal expenses by suing the user that generated the content.<\/p>\n<p><a name=\"cite_ref-15\"><\/a>I quote the Joint Declaration of the <strong>OSCE Representative on Freedom of the Media<\/strong> and Reporters Sans Fronti\u00e8res on Guaranteeing Media Freedom on the Internet:<a name=\"sdfootnote14anc\" href=\"#sdfootnote14sym\"><sup>14<\/sup><\/a><\/p>\n<p>\u201c<em>A decision on whether a website is legal or illegal can only be taken by a judge, not by a service provider. Such proceedings should guarantee transparency, accountability and the right to appeal.\u201c<\/em><\/p>\n<p>I also quote the Joint Declaration on International Mechanisms for Promoting Freedom of Expression of the <strong>UN Special Rapporteur on Freedom of Opinion <\/strong>and Expression, the OSCE Representative on Freedom of the Media and the OAS Special Rapporteur on Freedom of Expression:<a name=\"sdfootnote15anc\" href=\"#sdfootnote15sym\"><sup>15<\/sup><\/a><\/p>\n<p>\u201c<em>No one should be liable for content on the Internet of which they are not the author, unless they have either adopted that content as their own or refused to obey a court order to remove that content.\u201c<\/em><\/p>\n<p><strong>Recommendation: <\/strong><\/p>\n<ul>\n<li>Service providers should not be \trequired to remove or disable access to information before it has \tbeen found illegal by a court of law. To this end, article 14 (1) \t(b) ECD should read: \u201c<em>the provider, upon obtaining such \tknowledge or awareness, acts expeditiously to remove or to disable \taccess to the information <\/em><em><strong>after it has been found illegal \tby a court of law<\/strong><\/em><em>.<\/em>\u201d<\/li>\n<\/ul>\n<h2><a name=\"Internet_anonymity_and_privacy\"><\/a> D. Ensure Internet privacy and anonymity<\/h2>\n<p>On the Internet <strong>our every action can be tracked easily and comprehensively<\/strong>. Also information that was collected on the Internet is routinely lost or stolen. This situation has caused many potential users to refrain from using information society services, or even from using the Internet. For example a German poll<a name=\"sdfootnote16anc\" href=\"#sdfootnote16sym\"><sup>16<\/sup><\/a> found earlier this year that 50% of the polled have \u201coften\u201d refrained from on-line orders because they did not want to provide personal information that was required. 40% of the 19 to 29 year olds say the same. 18% even say they never order anything on the Internet because they do not want to provide personal information. 12% of the 19 to 29 year olds confirmed this.<\/p>\n<p>The collection of unnecessary personal information on the Internet thus constitutes an <strong>obstacle to economic development and employment in Europe<\/strong>. Looking for short-term profits, companies are often ignoring that their user screening practises are eroding consumer trust and thus the basis of their long-term success. Internet services could be provided with little or no personal data needing to be disclosed. For example anonymous payment can be made on-line by using pre-paid micropayment cards.<\/p>\n<p>For those reasons it is <strong>necessary to establish strict sector-specific privacy rules for information society services<\/strong>:<\/p>\n<ol>\n<li><strong>The \tprovider of an information society service shall offer the user \tanonymous use and payment of information society services to the \textent technically feasible and reasonable<\/strong>. The provider shall \toffer the user anonymous use and payment of its services in \tparticular where services of this kind are already being offered \tanonymously by competitors. The user shall be informed about these \toptions.<\/li>\n<li><strong>The \tprovider of an information society service may collect, process and \tuse personal data concerning the use of of an information society \tservices only to the extent necessary to enable the user to use the \tinformation society service <\/strong>(transactional data) or to charge \tthe user for the use of the information society service.<\/li>\n<li><strong>The \tprovider shall ensure that personal data generated in connection \twith the process of using information society services are erased or \trendered anonymous as soon as possible<\/strong>, at the latest upon the \tend of each utilization, unless further storage is required for \tbilling purposes.<\/li>\n<li><strong>The \tprovider may not make the provision of an information society \tservice dependent on the supply of personal data that are not \tnecessary <\/strong>for the provision of the service.<\/li>\n<li><strong>The \tprovider must not make the provision of an information society \tservice dependent on the consent of the data subject to the \tprocessing or use of their data for other purposes <\/strong>than the \tprovision of the service.<\/li>\n<li><strong>Directive \t93\/13 of 5 April 1993 on unfair terms in consumer contracts should \tbe extended to cover unfair consenting clauses <\/strong>concerning \tpersonal data.<\/li>\n<li><strong>The provider must inform the \tuser about the periods of time for which personal data is typically \tretained<\/strong>.<\/li>\n<\/ol>\n<p><strong>Recommendation: <\/strong><\/p>\n<ul>\n<li><strong>The e-commerce directive \tshould be amended to include strict sector-specific privacy rules \tfor information society services. <\/strong><\/li>\n<\/ul>\n<h2><a name=\"Non-discrimination\"><\/a>E. Non-discrimination<\/h2>\n<p>Users that exercise data protection rights and attempt to end illegal data collection and illegal data processing practises are often <strong>silenced by terminating their contact <\/strong>or account. This way providers can avoid having to comply with privacy laws.<\/p>\n<p>This situation has <strong>devastating effects <\/strong>not only on the user whose account was closed, but for all other users of that service whose rights cannot be enforced and also for competitors that respect privacy laws and are unfairly disadvantaged.<\/p>\n<p><strong>Recommendation: <\/strong><\/p>\n<ul>\n<li><strong>Discrimination against users \tthat legally exercise data protection rights must be prohibited<\/strong>. \tThe e-commerce directive should be amended to this effect.<\/li>\n<\/ul>\n<h2><a name=\"Confidentiality_of_our_Internet_use\"><\/a> F. Confidentiality of Internet use<\/h2>\n<p>The confidentiality of our Internet use must be protected not only by the access provider, but also by providers of information society services. The e-commerce directive should be amended to include a similar provision to article 5 of directive 2002\/58\/EC.<\/p>\n<p><strong>Recommendation: <\/strong><\/p>\n<ul>\n<li>The e-commerce directive should \tbe amended as follows: \u201c<em>Member States shall ensure the \tconfidentiality of the usage of information society services and the \trelated transactional and subscriber data, through national \tlegislation. In particular, they shall prohibit listening, tapping, \tstorage or other kinds of interception or surveillance of usage and \tthe related traffic and subscriber data by persons other than users, \twithout the consent of the users concerned, except when legally \tauthorised to do so. This paragraph shall not prevent technical \tstorage which is necessary for the provision of a service without \tprejudice to the principle of confidentiality.<\/em>\u201d<\/li>\n<\/ul>\n<h2><a name=\"Question_52\"><\/a>G. Question 52: interpretation of the provisions on liability<\/h2>\n<p><em>Overall, have you had any difficulties with the interpretation of the provisions on the liability of the intermediary service providers? If so, which?<\/em><\/p>\n<p>According to articles 12-14 ECD, these liability limitations do not affect the possibility for a court or administrative authority of requiring the service provider to prevent \u201can infringement\u201d. <strong>It is unclear what is meant by \u201can infringement\u201d.<\/strong> Apparently the legislator is referring to a specific infringement and not to any infringement of a kind. But what means can the provider be required to employ to \u201cprevent an infringement\u201d? Can ineffective measures be required that can easily be circumvented?<\/p>\n<p>According to article 15 ECD, this provision does not prevent Member States from imposing a monitoring obligation on service providers \u201cin a specific case\u201d or from imposing \u201cduties of care [&#8230;] in order to detect and prevent certain types of illegal activities\u201d. <strong>It is unclear what is meant by a \u201cspecific case\u201d and by \u201ccertain types of illegal activities\u201d. <\/strong>How \u201cspecific\u201d does a monitoring duty need to be? Can it extend to all users, to all content and to an unlimited period of time without being considered a \u201cgeneral obligation\u201d in the sense of article 15 (1) ECD? It is also unclear what means the provider can be required to employ in order to \u201cdetect and prevent certain types of illegal activities\u201d. Can ineffective measures be required that can easily be circumvented? Can measures be required that have severe side-effects on legal use, user privacy and free speech? Can measures be required that are unthinkable for similar off-line services, simply because they are technically feasible on-line?<\/p>\n<p>All in all <strong>the idea of private policing and infringement detection should be abandoned <\/strong>as explained above.<\/p>\n<h2><a name=\"Question_53\"><\/a>H. Question 53: \u201cvoluntary\u201d efforts to detect illegal activities<\/h2>\n<p><em>Have you had any difficulties with the interpretation of the term \u201cactual knowledge\u201d in Articles 13(1)(e) and 14(1)(a) with respect to the removal of problematic information? Are you aware of any situations where this criterion has proved counter-productive for providers voluntarily making efforts to detect illegal activities?<\/em><\/p>\n<p>The interpretation of the term \u201cactual knowledge\u201d is controversial because it is <strong>unclear whether knowledge of the illegal nature of the content is required<\/strong>. If a provider is notified of allegedly illegal content, it often has no knowledge of whether that content is legal or not. For this reason a court should always decide on the matter as explained above.<\/p>\n<p>The knowledge criterion <strong>does not prove counter-productive <\/strong>for providers voluntarily making efforts to detect illegal activities, because those practises can be regulated in the provider&#8217;s terms of service. Obviously those contract terms must be subject to a fairness test according to directive 93\/13.<\/p>\n<p>In my opinion, <strong>private efforts to detect illegal activities should not be facilitated <\/strong>but, to the contrary, made compliant with the rule of law. The removal of content without the consent of its author should be banned unless ordered by the judiciary, after hearing the user. The law may provide for interim orders issued by the judiciary. Those orders should expire if not confirmed in the ordinary procedure after a certain period of time. Providers must not be allowed to remove content in their own right because this has proven to have disastrous effects on the freedom of speech.<\/p>\n<p>I quote the Joint Declaration of the <strong>OSCE Representative on Freedom of the Media<\/strong> and Reporters Sans Fronti\u00e8res on Guaranteeing Media Freedom on the Internet:<a name=\"sdfootnote17anc\" href=\"#sdfootnote17sym\"><sup>17<\/sup><\/a><\/p>\n<p>\u201c<em>A decision on whether a website is legal or illegal can only be taken by a judge, not by a service provider. Such proceedings should guarantee transparency, accountability and the right to appeal.\u201d<\/em><\/p>\n<p>I also quote the Joint Declaration on International Mechanisms for Promoting Freedom of Expression of the <strong>UN Special Rapporteur on Freedom of Opinion <\/strong>and Expression, the OSCE Representative on Freedom of the Media and the OAS Special Rapporteur on Freedom of Expression:<a name=\"sdfootnote18anc\" href=\"#sdfootnote18sym\"><sup>18<\/sup><\/a><\/p>\n<p>\u201c<em>No one should be liable for content on the Internet of which they are not the author, unless they have either adopted that content as their own or refused to obey a court order to remove that content.\u201d<\/em><\/p>\n<h2>I. Question 57: practices other than notice and take down<\/h2>\n<p><em>Do practices other than notice and take down appear to be more effective? (\u201cnotice and stay down\u201d, \u201cnotice and notice\u201d, etc)<\/em><\/p>\n<p>I regret the fact that this question exclusively aims at \u201ceffectiveness\u201d. <strong>Proportionality and fundamental rights must be the point of departure <\/strong>when considering the procedure for the removal of content.<\/p>\n<h2><a name=\"Question_58\"><\/a>J. Question 58: general monitoring or filtering obligations<\/h2>\n<p><em>Are you aware of cases where national authorities or legal bodies have imposed general monitoring or filtering obligations?<\/em><\/p>\n<p><strong>German courts are imposing general monitoring or filtering obligations all the time.<\/strong> In order to detect potentially illegal content of a kind (e.g. Rolex imitations), they require providers, for example, to force all users to register and to prove their identity. Courts have required providers to log all user actions, to filter all user-generated content for keywords, to manually review all content generated by certain users or relating to certain topics. These requirements are far-reaching enough to make providers delete any remotely suspicious content or account, or even to move to a country outside the EU.<\/p>\n<h2><a name=\"Question_59\"><\/a>K. Question 59: filtering<\/h2>\n<p><em>From a technical and technological point of view, are you aware of effective specific filtering methods? Do you think that it is possible to establish specific filtering?<\/em><\/p>\n<p><strong>Filtering is not effective. <\/strong><span style=\"font-weight: normal;\">The various methods such as checksums, keywords, manual review, user identity or examining external links have all been discussed in detail and rejected.<a name=\"sdfootnote19anc\" href=\"#sdfootnote19sym\"><sup>19<\/sup><\/a> If rights holders believe filtering to be effective they are free to search the Internet and use such technology themselves in order to give notice to the provider of any infringement. Policing and the enforcement of private titles is not the job of intermediaries, but of the rights holder, the police and courts. Intermediaries must be neutral where conflicting interests are colliding. <\/span><\/p>\n<h2><a name=\"Question_60\"><\/a>L. Question 60: technical standards for filtering<\/h2>\n<p><em>Do you think that the introduction of technical standards for filtering would make a useful contribution to combating counterfeiting and piracy, or could it, on the contrary make matters worse?<\/em><\/p>\n<p>The introduction of technical standards for filtering or even of filtering at all would be a catastrophe from a freedom of speech point of view. Instead <strong>filtering should be prohibited. <\/strong><\/p>\n<p><a name=\"cite_ref-21\"><\/a>I quote the Joint Declaration of the <strong>OSCE Representative on Freedom of the Media<\/strong> and Reporters Sans Fronti\u00e8res on Guaranteeing Media Freedom on the Internet:<a name=\"sdfootnote20anc\" href=\"#sdfootnote20sym\"><sup>20<\/sup><\/a><\/p>\n<p>\u201c<em>In a democratic and open society it is up to the citizens to decide what they wish to access and view on the Internet. Filtering or rating of online content by governments is unacceptable. Filters should only be installed by Internet users themselves. Any policy of filtering, be it at a national or local level, conflicts with the principle of free flow of information.\u201d<\/em><\/p>\n<p>I quote the Joint Declaration on International Mechanisms for Promoting Freedom of Expression of the <strong>UN Special Rapporteur on Freedom of Opinion and Expression<\/strong>, the OSCE Representative on Freedom of the Media and the OAS Special Rappo<span style=\"font-weight: normal;\">rteur on Freedom of Expression:<span style=\"font-weight: normal;\"><a name=\"sdfootnote21anc\" href=\"#sdfootnote21sym\"><sup>21<\/sup><\/a><\/span><\/span><\/p>\n<p>\u201c<em>Filtering systems which are not end-user controlled \u2013 whether imposed by a government or commercial service provider \u2013 are a form of prior-censorship and cannot be justified.\u201c<\/em><\/p>\n<h2><a name=\"Question_62\"><\/a>M. Question 62: liability for hyperlinks<\/h2>\n<p><em>What is your experience with the liability regimes for hyperlinks in the Member States?<\/em><\/p>\n<p>The ECD liability exeptions are not being applied to hyperlinks by German courts. This has, for example, resulted in an on-line press publication being ordered to remove a hyperlink to the website of a manufacturer of software that can be used to circumvent copy protection technology, although the website can still be identified in seconds by using a search engine.<\/p>\n<p>The liability exeptions should be extended to cover hyperlinks.<\/p>\n<h2><a name=\"Question_63\"><\/a>N. Question 63: liability for search engines<\/h2>\n<p><em>What is your experience of the liability regimes for search engines in the Member States?<\/em><\/p>\n<p>The ECD liability exeptions are not being applied to applications for injunctive relief by German courts. The liability exeptions should be extended to outlaw prevention orders.<\/p>\n<h2><a name=\"Question_64\"><\/a>O. Question 64: liability for Web 2.0 services<\/h2>\n<p><em>Are you aware of specific problems with the application of the liability regime for Web 2.0 and \u201ccloud computing\u201d?<\/em><\/p>\n<p>The operator of a weblog that allows for user comments or the operator of a wiki where users can post information should be considered hosting user-generated content. Yet is is unclear whether article 14 ECD covers these services. The article should be clarified or an amendment be inserted to make sure that user-generated content is covered by article 14.<\/p>\n<h2><a name=\"Question_67\"><\/a>P. Question 67: obligation to monitor<\/h2>\n<p><em>Do you think that the prohibition to impose a general obligation to monitor is challenged by the obligations placed by administrative or legal authorities to service providers, with the aim of preventing law infringements? If yes, why?<\/em><\/p>\n<p>\u201cPreventive duties\u201d imposed by courts in specific cases violate article 15 of the e-commerce directive. Injunctions lead to a de facto obligation to monitor user-generated content, and thus amount to a general monitoring obligation. Service providers should not be obliged to prevent infractions at all. This in explained in more detail above.<\/p>\n<h2><a name=\"Question_69\"><\/a>Q. Question 69: investment in law enforcement with regard to the Internet<\/h2>\n<p><em>Do you think that a lack of investment in law enforcement with regard to the Internet is one reason for the counterfeiting and piracy problem? Please detail your answer.<\/em><\/p>\n<p>I think that a \u201cwar on counterfeiting and piracy\u201d cannot be won any more than the \u201cwar on drugs\u201d that has been waged for decades. Illegal drugs today are available as easily and cheaply as never in the past today despite all efforts. The same applies to counterfeiting and copyright infringement. Beyond the traditional powers of law enforcement, all other measures to contain counterfeiting and copyright infringement cannot be demonstrated to effectively reduce these practices.<\/p>\n<p style=\"font-weight: normal;\">\n<p style=\"font-weight: normal;\">05\/11\/2010<\/p>\n<p style=\"margin-top: 0.42cm; margin-bottom: 0.41cm; font-style: normal; font-weight: normal; line-height: 100%; widows: 0; orphans: 0; page-break-before: auto; page-break-after: avoid;\">\n<p style=\"font-weight: normal;\">\n<div id=\"sdfootnote1\">\n<p><a name=\"sdfootnote1sym\" href=\"#sdfootnote1anc\">1<\/a> BGH, \t<a href=\"http:\/\/dejure.org\/dienste\/vernetzung\/rechtsprechung?Text=NJW%202004,%203102\" title=\"BGH, 11.03.2004 - I ZR 304\/01: Internet-Versteigerung\">NJW 2004, 3102<\/a> (3103); DG Market, Study on the liability of Internet \tintermediaries, \t<a href=\"http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/germany_12nov2007_en.pdf\">http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/germany_12nov2007_en.pdf<\/a>.<\/p>\n<\/div>\n<div id=\"sdfootnote2\">\n<p><a name=\"sdfootnote2sym\" href=\"#sdfootnote2anc\">2<\/a> DG \tMarket, Study on liability of Internet providers, \t<a href=\"http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/final_report_en.pdf\">http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/final_report_en.pdf<\/a>, \tp. 51.<\/p>\n<\/div>\n<div id=\"sdfootnote3\">\n<p><a name=\"sdfootnote3sym\" href=\"#sdfootnote3anc\">3<\/a> DG \tMarket, Study on the liability of Internet intermediaries, \t<a href=\"http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/germany_12nov2007_en.pdf\">http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/germany_12nov2007_en.pdf<\/a>.<\/p>\n<\/div>\n<div id=\"sdfootnote4\">\n<p><a name=\"sdfootnote4sym\" href=\"#sdfootnote4anc\">4<\/a> DG \tMarket, Study on liability of Internet providers, \t<a href=\"http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/final_report_en.pdf\">http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/final_report_en.pdf<\/a>, \tp. 51.<\/p>\n<\/div>\n<div id=\"sdfootnote5\">\n<p><a name=\"sdfootnote5sym\" href=\"#sdfootnote5anc\">5<\/a> DG \tMarket, Study on liability of Internet service providers, \t<a href=\"http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/final_report_en.pdf\" target=\"_top\">http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/final_report_en.pdf<\/a>, \tp. 67.<\/p>\n<\/div>\n<div id=\"sdfootnote6\">\n<p><a name=\"sdfootnote6sym\" href=\"#sdfootnote6anc\">6<\/a> DG \tMarket, Study on liability of Internet providers, \t<a href=\"http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/final_report_en.pdf\">http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/final_report_en.pdf<\/a>, \tp. 51.<\/p>\n<\/div>\n<div id=\"sdfootnote7\">\n<p><a name=\"sdfootnote7sym\" href=\"#sdfootnote7anc\">7<\/a> BGH, \t<a href=\"http:\/\/dejure.org\/dienste\/vernetzung\/rechtsprechung?Text=NJW%202007,%202636\" title=\"BGH, 19.04.2007 - I ZR 35\/04: Internet-Versteigerung II\">NJW 2007, 2636<\/a> (2639 f.).<\/p>\n<\/div>\n<div id=\"sdfootnote8\">\n<p><a name=\"sdfootnote8sym\" href=\"#sdfootnote8anc\">8<\/a> BGH, \t<a href=\"http:\/\/dejure.org\/dienste\/vernetzung\/rechtsprechung?Text=NJW%202008,%20758\" title=\"BGH, 12.07.2007 - I ZR 18\/04: Jugendgef&auml;hrdende Inhalte auf Internet-Auktionsplattformen\">NJW 2008, 758<\/a> (762) \u2013 eBay.<\/p>\n<\/div>\n<div id=\"sdfootnote9\">\n<p><a name=\"sdfootnote9sym\" href=\"#sdfootnote9anc\">9<\/a> OLG \tHamburg, Urteil vom 02.07.2008 \u2013 <a href=\"http:\/\/dejure.org\/dienste\/vernetzung\/rechtsprechung?Text=5%20U%2073\/07\" title=\"OLG Hamburg, 02.07.2008 - 5 U 73\/07: Verantwortlichkeit von Rapidshare f&uuml;r Rechtsverletzungen D...\">5 U 73\/07<\/a> \u2013 Rapidshare.<\/p>\n<\/div>\n<div id=\"sdfootnote10\">\n<p><a name=\"sdfootnote10sym\" href=\"#sdfootnote10anc\">10<\/a> OLG \tHamburg, Urteil vom 02.07.2008 \u2013 <a href=\"http:\/\/dejure.org\/dienste\/vernetzung\/rechtsprechung?Text=5%20U%2073\/07\" title=\"OLG Hamburg, 02.07.2008 - 5 U 73\/07: Verantwortlichkeit von Rapidshare f&uuml;r Rechtsverletzungen D...\">5 U 73\/07<\/a> \u2013 Rapidshare.<\/p>\n<\/div>\n<div id=\"sdfootnote11\">\n<p><a name=\"sdfootnote11sym\" href=\"#sdfootnote11anc\">11<\/a> OLG \tHamburg, Urteil vom 22.08.2006 \u2013 <a href=\"http:\/\/dejure.org\/dienste\/vernetzung\/rechtsprechung?Text=7%20U%2050\/06\" title=\"7 U 50\/06 (3 zugeordnete Entscheidungen)\">7 U 50\/06<\/a> \u2013 \tHeise-Forum.<\/p>\n<\/div>\n<div id=\"sdfootnote12\">\n<p><a name=\"sdfootnote12sym\" href=\"#sdfootnote12anc\">12<\/a> DG \tMarket, Study on liability of Internet providers, \t<a href=\"http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/final_report_en.pdf\">http:\/\/ec.europa.eu\/internal_market\/e-commerce\/docs\/study\/liability\/final_report_en.pdf<\/a>, \tp. 51.<\/p>\n<\/div>\n<div id=\"sdfootnote13\">\n<p><a name=\"sdfootnote13sym\" href=\"#sdfootnote13anc\">13<\/a> European \tConvention on Human Rights, Preamble.<\/p>\n<\/div>\n<div id=\"sdfootnote14\">\n<p><a name=\"sdfootnote14sym\" href=\"#sdfootnote14anc\">14<\/a> <a href=\"http:\/\/www.webcitation.org\/query?url=http%3A%2F%2Fwww.osce.org%2Fnode%2F15657&amp;date=2011-04-13\">http:\/\/www.webcitation.org\/query?url=http%3A%2F%2Fwww.osce.org%2Fnode%2F15657&amp;date=2011-04-13<\/a>.<\/p>\n<\/div>\n<div id=\"sdfootnote15\">\n<p><a name=\"sdfootnote15sym\" href=\"#sdfootnote15anc\">15<\/a> <a href=\"http:\/\/www.article19.org\/pdfs\/igo-documents\/three-mandates-dec-2005.pdf\">http:\/\/www.article19.org\/pdfs\/igo-documents\/three-mandates-dec-2005.pdf<\/a>.<\/p>\n<\/div>\n<div id=\"sdfootnote16\">\n<p><a name=\"sdfootnote16sym\" href=\"#sdfootnote16anc\">16<\/a> Allensbach \tstudy in August of 2010, <a href=\"http:\/\/www.webcitation.org\/5t9uDMnHb\" target=\"_top\">http:\/\/www.webcitation.org\/5t9uDMnHb.<\/a><\/p>\n<\/div>\n<div id=\"sdfootnote17\">\n<p><a name=\"sdfootnote17sym\" href=\"#sdfootnote17anc\">17<\/a> <a href=\"http:\/\/www.webcitation.org\/query?url=http%3A%2F%2Fwww.osce.org%2Fnode%2F15657&amp;date=2011-04-13\">http:\/\/www.webcitation.org\/query?url=http%3A%2F%2Fwww.osce.org%2Fnode%2F15657&amp;date=2011-04-13<\/a>.<\/p>\n<\/div>\n<div id=\"sdfootnote18\">\n<p><a name=\"sdfootnote18sym\" href=\"#sdfootnote18anc\">18<\/a> <a href=\"http:\/\/www.article19.org\/pdfs\/igo-documents\/three-mandates-dec-2005.pdf\">http:\/\/www.article19.org\/pdfs\/igo-documents\/three-mandates-dec-2005.pdf<\/a>.<\/p>\n<\/div>\n<div id=\"sdfootnote19\">\n<p><a name=\"sdfootnote19sym\" href=\"#sdfootnote19anc\">19<\/a> Breyer, \t<a href=\"http:\/\/www.daten-speicherung.de\/index.php\/verkehrssicherungspflichten-von-internetdiensten-im-lichte-der-grundrechte\/\">http:\/\/www.daten-speicherung.de\/index.php\/verkehrssicherungspflichten-von-internetdiensten-im-lichte-der-grundrechte\/<\/a>.<\/p>\n<\/div>\n<div id=\"sdfootnote20\">\n<p><a name=\"sdfootnote20sym\" href=\"#sdfootnote20anc\">20<\/a> <a href=\"http:\/\/www.webcitation.org\/query?url=http%3A%2F%2Fwww.osce.org%2Fnode%2F15657&amp;date=2011-04-13\">http:\/\/www.webcitation.org\/query?url=http%3A%2F%2Fwww.osce.org%2Fnode%2F15657&amp;date=2011-04-13<\/a>.<\/p>\n<\/div>\n<div id=\"sdfootnote21\">\n<p><a name=\"sdfootnote21sym\" href=\"#sdfootnote21anc\">21<\/a> <a href=\"http:\/\/www.article19.org\/pdfs\/igo-documents\/three-mandates-dec-2005.pdf\">http:\/\/www.article19.org\/pdfs\/igo-documents\/three-mandates-dec-2005.pdf<\/a>.<\/p>\n<p style=\"text-align: left;\">This contribution is available in the pdf format <a href=\"http:\/\/daten-speicherung.de\/wp-content\/uploads\/2010\/11\/Contribution_electronic_commerce_2010-11-05.pdf\">here<\/a>.<\/p>\n<p style=\"text-align: left;\">See also the contributions submitted by <a href=\"https:\/\/lqdn.co-ment.com\/text\/KALAphGyXcx\/view\/\">La Quadrature<\/a>, <a href=\"http:\/\/www.article19.org\/pdfs\/submissions\/response-to-eu-consultation.pdf\">Article 29<\/a> and <a href=\"http:\/\/www.edri.org\/files\/EDRi_ecommerceresponse_101105.pdf\">EDRi<\/a>.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Contribution to the European Commission&#8217;s consultation on the future of electronic commerce in the internal market and the implementation of the Directive on electronic commerce (2000\/31\/EC): Summary of recommendations The concept of \u201cspecific\u201d obligations of intermediaries to \u201cprevent\u201d illegal user action should be given up in its entirety. Intermediaries should only be required to remove [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,9,4,15,13],"tags":[78,28,29],"class_list":["post-3041","post","type-post","status-publish","format-standard","hentry","category-datenschutz-im-privatsektor","category-english","category-internet-unternehmen","category-juristisches","category-metaowl-watchblog","tag-e-commerce-directive","tag-telemediengesetz","tag-telemedienrecht"],"_links":{"self":[{"href":"https:\/\/www.daten-speicherung.de\/index.php\/wp-json\/wp\/v2\/posts\/3041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.daten-speicherung.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.daten-speicherung.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.daten-speicherung.de\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.daten-speicherung.de\/index.php\/wp-json\/wp\/v2\/comments?post=3041"}],"version-history":[{"count":3,"href":"https:\/\/www.daten-speicherung.de\/index.php\/wp-json\/wp\/v2\/posts\/3041\/revisions"}],"predecessor-version":[{"id":3067,"href":"https:\/\/www.daten-speicherung.de\/index.php\/wp-json\/wp\/v2\/posts\/3041\/revisions\/3067"}],"wp:attachment":[{"href":"https:\/\/www.daten-speicherung.de\/index.php\/wp-json\/wp\/v2\/media?parent=3041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.daten-speicherung.de\/index.php\/wp-json\/wp\/v2\/categories?post=3041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.daten-speicherung.de\/index.php\/wp-json\/wp\/v2\/tags?post=3041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}