{"id":4751,"date":"2013-10-15T09:44:33","date_gmt":"2013-10-15T04:14:33","guid":{"rendered":"http:\/\/lex-warrier.in\/?p=4751"},"modified":"2023-07-01T15:46:18","modified_gmt":"2023-07-01T15:46:18","slug":"impact-digital-technology-copyright","status":"publish","type":"post","link":"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html","title":{"rendered":"Impact of Digital Technology on Copyright"},"content":{"rendered":"<p align=\"right\"><b>Ipsita Mishra, NLU, Odisha<\/b><\/p>\n<h2 style=\"text-align: justify;\"><b>COPYRIGHT INFRINGEMENT<\/b><\/h2>\n<p style=\"text-align: justify;\">All or any substantial part of the work is prevented from copying. The substantial part of the work includes mainly the quality of work rather than the quantity. There can be copyright infringement where only a small portion of the work is copied but the portion is of great qualitative importance in the original ((Janus\u00a0v.\u00a0A &amp; M Records.\u00a0, 827 F. Supp. 282 (D.N.J. 1993).)). Unconscious copying of the work may amount to infringement ((Bright Tunes Music Corp.\u00a0v.\u00a0Harrisongs Music Ltd.\u00a0, (1976), 420 F. Supp. 177)).<\/p>\n<p style=\"text-align: justify;\">There are two main types of copyright infringement. The first is direct infringement, where the defendant has copied the whole or a substantial part of the work. The second is contributory infringement, where the defendant has authorized another to make infringing copies of the work ((Section 3(1) and 27(1), Copyright Act, 1985 [Hereinafter as\u00a0 1985 Act].)). What amounts to &#8220;authorizing&#8221; another to make infringing copies will depend on the facts of each case ((Roger T. Hughes &amp; Susan J. Peacock, \u00a0Hughes on Copyright and Industrial Design\u00a0545 ( 1995).)).<\/p>\n<p style=\"text-align: justify;\">There are two main types of copyright infringement. The first is direct infringement, where the defendant has copied the whole or a substantial part of the work. The second is contributory infringement, where the defendant has authorized another to make infringing copies of the work ((1985 Act,<i> supra<\/i> note 3.)).<\/p>\n<p style=\"text-align: justify;\">Materials available on the net are subject to infringement when they are downloaded without the permission of its creator. In software field, it is popularly known as \u2018online piracy\u2019, when software is downloaded from the web and installed but not paid for ((Ian J.lloyd, Information Technology law 39 (3<sup>rd<\/sup> ed., 2000).)). Though password system is introduced, those passwords are also decoded by suing dubious techniques.\u00a0 The following are some of the new ways of infringement:<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 i.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Catching and proxy catching ((46 S.M Bhaskar &amp; R.C Tripathi, The Electronic Transactions and Intellectual Property Rights: A leed for Digital time sampling\u00a0 208 (2004) [Hereinafter as Electronic Transactions and Intellectual Property])).<\/p>\n<p style=\"text-align: justify;\">Catching is storing of web pages in computers memory at user level or server level. It is the service provided on which the website is stored on automatically. It makes a copy of it and holds it accessible for the user\u2019s computer where it is stored by the web browser software either in the RAM, the hard drive or any other storage facility. Proxy catching takes place where user\u2019s service provider might keep a copy of the site in order to provide fast access to that page for te next time to one of his clients who wishes to access this site. When the author\u2019s work, the web site, is reproduced several times there may be infringing acts.<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0\u00a0\u00a0 ii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Providing links ((Electronic Transactions and Intellectual Property, <i>Id.<\/i>)).<\/p>\n<p style=\"text-align: justify;\">HTTP as such facilities linking of one web site with another the knowledge or consent of the owner of the linked website. Linking raises questions whether the link provider is liable for infringement or not is discussed in Shetland Times Ltd Vs Dr. Jonathon Wills.<\/p>\n<p style=\"text-align: justify;\">It was held that the \u2018linking\u2019 alone does not constitute infringement. Regardless of any provisions of copyright law, there is no barrier to prevent the site owners permitting others to link to their materials. Regardless of whether sites are designed for academic, commercial or personal purposes, it will be a rare site developer who does not wish to receive \u201cvisitors\u201d.<\/p>\n<p style=\"text-align: justify;\">There is an argument that the materials available on the net are in the public domain since the creator of such work posted that work to the Internet to make it available freely, to anyone without restriction. But this argument cannot be regarded as correct as to download or to reproduce the material, one ought to obtain license (which should be in the written form) from the owner of such copyrighted material. Therefore it can be said that unregulated copying on the net amounts to copyright infringement.<\/p>\n<h2 style=\"text-align: justify;\"><b>INFRINGEMENT <\/b><b>LIABILITY OF INTERNET SERVICE PROVIDERS AND HOSTS:<\/b><\/h2>\n<p style=\"text-align: justify;\">ISP is the collective voice of the ISP fraternity and by extension the entire Internet community. Over the years ISP has helped influence, shape and moulds the telecom policies, so that ISPs and entrepreneurs in the business of Internet can setup and grow their services in an environment that is supportive and enabling. In the last 10 years of its existence, it has been party to breaking down monopolistic structures in telecom, bringing down barriers to entry for ISPs. It helped shape India from being a bandwidth hungry to a bandwidth surplus country. it was the competitive spirit of the ISP members of ISP that, Internet access became so widely and cost effectively available to our countrymen. These very ISPs helped connect India to the rest of the world so effectively that today BPO and Call Centers cannot but make their global presence felt based on IP connectivity. India is today is arguably amongst the top 10 countries of the world in terms of the number of Internet users. Today ISP is the recognized apex body of Indian ISPs worldwide. ISPAI has access to and interacts frequently with international bodies and platforms and is frequently consulted by them on measures for future trends and growth of Internet. It works closely with the Government, the Regulator as well as the major Industry Chambers. It supports exchange of delegations, business visitors from across the globe which provides ISP members a chance to network widely and seek opportunities elsewhere too. It&#8217;s a platform for the Solution Provider&#8217;s community such as Hardware and Software manufacturers and suppliers to gain easy access to their ISP clients, promote their products and services through personal meetings and through events supported or sponsored by ISP.<\/p>\n<p style=\"text-align: justify;\">Liability for the copyright infringement on the Net can fall upon the infringer himself or upon the Internet Service Provider (ISP). ISPs can be brought under the provision of section 51(a)(ii) of the Copyright Act,1957 for the online copyright infringement. According to this section, if an person \u201cpermits for profit\u201d another person to use \u201cany place\u201d to communicate constitutes infringement, or facilities such infringement under certain conditions, such person may be held liable for such an act.<\/p>\n<p style=\"text-align: justify;\">The provisions relating to the ISPs are specifically enumerated in the Information Technology Act, 2000 which an Internet service provider is referred to as \u2018internet service provider\u2019. The Act specifically imposes liability on the ISPs, interlia, for the copyright infringement. Accordingly, an ISP may be held liable for any third party information or data made available to him by any other person. He can escape from liability, if he proves the offence or contravention was committed without his knowledge or he had exercised all due diligence to prevent such violation of copyright ((Section 79(1), Information Technology Act,2000 [Hereinafter as IT ACT].)).<\/p>\n<p style=\"text-align: justify;\">Section 43(a) of the IT Act is designed to prevent such persons from infringing acts. According to this section, if any person accesses or secures access to a computer , computer system or computer network or downloads ,copies, extracts any data, database or information from it, including information or data held or stored in any other medium, without permission\u00a0 of the owner or any other person who is in charge of it, he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected which is deterrent enough to prevent copyright violation.<\/p>\n<p style=\"text-align: justify;\">The liability under Copyright Act falls under two categories: Civil and criminal .As for as the former is concerned; the remedies may be injunction, damages or accounts for profits. In the case of the latter, normally, imprisonment for a term between six months and three years can be imposed. In addition to this the fine amount between fifty thousand and two lakhs shall also be imposed upon the infringer ((Copyright Act,1957, Section 53(A).)).<\/p>\n<p style=\"text-align: justify;\">Internet Service Providers (&#8220;ISPs&#8221;) can act as hosts storing information posted by a subscriber. ISPs also act as a conduit for messages between users, the transmission of which necessarily involves the copying of the message along the way and at the destination&#8217;s electronic mailbox. Unless the transmission is permitted, the transmission of a file over the Internet and subsequent &#8220;copying&#8221; onto a users machine may constitute &#8220;authorizing&#8221; copyright infringement by the person who transmits the file (For an analogy to TV cable companies authorizing infringement ((<a href=\"http:\/\/www.jurisdiction.com\/ccta.htm#371\">C.C.T.A.\u00a0v.\u00a0Canada<\/a>). (1993), 46 C.P.R)).<\/p>\n<p style=\"text-align: justify;\">It has been\u00a0suggested\u00a0that under Canadian copyright law the transmission of a file containing a musical work over the Internet might be a performance &#8220;in public&#8221;. Since a &#8220;performance&#8221; must be a visual or acoustic representation of the work, unless the transmission over the Internet is &#8220;real-time&#8221; and not merely the transmission of a file for later &#8220;playing&#8221;, such activity is more likely to be found to be a\u00a0communication of the work to the public by telecommunication.<\/p>\n<p style=\"text-align: justify;\">In US, the \u2018service provider\u2019 means an entity offering the transmission, routing or providing of connections for digital online communications, between or among points specified by a user, of material of the user\u2019s choosing, without modification to the content of the material as sent or received ((17 USC 512(K)(1).)). In India, \u2018network service provider\u2019 means an intermediary ((IT ACT, <i>supra <\/i>note 9, section 79)).<\/p>\n<p style=\"text-align: justify;\"><b>Types of liability:<\/b><\/p>\n<p style=\"text-align: justify;\"><b>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 i.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/b><b>Direct liability:<\/b> if any exclusive right of copyright owner is infringed<b><\/b><\/p>\n<p style=\"text-align: justify;\"><b>\u00a0\u00a0\u00a0\u00a0\u00a0 ii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/b><b>Vicarious liability:<\/b> when a person has a duty to prevent infringement and he can do but he prevents doing it and moreover benefits from it<b><\/b><\/p>\n<p style=\"text-align: justify;\"><b>\u00a0\u00a0\u00a0 iii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/b><b>Contributory liability: <\/b>when a person has knowledge of the infringing activity and participates in the act of direct infringement<b><\/b><\/p>\n<p style=\"text-align: justify;\"><b>United States:<\/b><\/p>\n<p style=\"text-align: justify;\">Section 512 of Online Copyright Infringement Liability Limitation creates five categories for which liability of an ISP may be limited:<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 i.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Digital Network Communications<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 ii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Disabling of access to, or removal of infringing material<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0\u00a0\u00a0 iii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Information location tools<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0\u00a0\u00a0 iv.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 System caching<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 v.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Storage of information on systems<\/p>\n<h2 style=\"text-align: justify;\"><b>INCORPORATION OF DMCA IN THE COPYRIGHT ACT 1957<\/b><\/h2>\n<p style=\"text-align: justify;\">Copyright law reinforces the power of DRM systems through the Digital Millennium Copyright Act (\u201cDMCA\u201d), In general, the DMCA seeks to forbid the circumvention of a DRM system \u2013 defined as \u201ca technological measure that effectively controls access to a work protected [by copyright law].\u201d It also outlaws development or trafficking of any DRM circumvention device or technology. The provision of DMCA is vested in copyright act 1957 in section 65A and 65 B\u00a0 by latest 2012 amendment of copyright act.<\/p>\n<p style=\"text-align: justify;\">The question which arises is whether the evolution of DMCA has resulted into the death of copyright act? This does not mean that copyright has or will become irrelevant to the protection of creative works in countries where DMCA is in progress but it would add extra protection , it would do away with all the gaps which was left by copyright act to protect the digital content.<\/p>\n<p style=\"text-align: justify;\">In India section 65A and 65 B is working for the better protection of digital content because author has spent a lot of hard work and money for creation of the work so stringent protection is also required because transmission of digital content is not an herculean task anybody can do it sitting any part of the world .<\/p>\n<p style=\"text-align: justify;\">In my view the DMCA has not resulted into death of copyright act because DMCA would just add on an extra protection it would not result or end up letting to the death of other protection.<\/p>\n<p style=\"text-align: justify;\">Copyright is established by federal statute in Canada and the United States ((1985 Act,<i> supra<\/i> note 3)). These statutes set out a variety of related rights which belong to the copyright holder:<\/p>\n<p style=\"text-align: justify;\">the right to stop infringement by copying the whole or a substantial part of the work ((1985 Act, <i>Id,<\/i> section \u00a03(l).)).<\/p>\n<p style=\"text-align: justify;\">the right to record a literary, dramatic or musical work where the record is mechanically performed, or delivered ((1985 Act, <i>Id,<\/i> section 3(l)(d).));<\/p>\n<p style=\"text-align: justify;\">the right to communicate a work to the public by telecommunications ((1985 Act, <i>Id,<\/i> section 3(l)(f).)).<\/p>\n<p style=\"text-align: justify;\">the right to import a work for selling or hire ((1985 Act, <i>Id,<\/i> section 44));<\/p>\n<p style=\"text-align: justify;\">in respect of computer software, the right to rent out a computer program ((1985 Act, <i>Id,<\/i> section 3(l)(h).));<\/p>\n<p style=\"text-align: justify;\">in respect of artistic works, the right to present a work at a public exhibition ((1985 Act, <i>Id,<\/i> section 3(l)(g).)); and<\/p>\n<p style=\"text-align: justify;\">in the United States, the right to prepare derivative works ((Copyright Act\u00a0, 17 U.S.C.A., section106(2).));<\/p>\n<p style=\"text-align: justify;\">Earlier copyright was given to the authors\/publishers of the books. Later it was enormously extended to cover many intellectual creations like paintings, sculptors, musical works , the latest being computer program ((Sec. 2(Ffc), Copyright Act 1957)).<\/p>\n<p style=\"text-align: justify;\">The materials available on the internet must pass the test of originality in order to claim copyright over it. Neither registration nor a claim to copyright in the work requires to be expressly made, nor needs some reasonable notice asserting the claim to copyright in work to be made. Thus, copyright subsists in all materials available on the internet ((C.B Raju, Intellectual Property Rights (1<sup>st<\/sup> ed., 2007).)).<\/p>\n<p style=\"text-align: justify;\">Guten Berg\u2019s printing technology of 1450, which mothered the publishing industry, also raised the first major challenge to the copyright regime. Most significant of the challenges faced by the copyright law is the emergence of the digital information technology, more particularly the Internet.<\/p>\n<p style=\"text-align: justify;\">Since net is the world\u2019s largest repository of information, many copyright works are available on internet. Foremost and the most significant among them is the \u2018Computer Software\u2019. Besides this news stories, screenplay, pictures, graphics, html, urml and unique markup language sequences, list of websites are copyrightable on the net. Therefore, the reality is everything on net is protected by copyright law.<\/p>\n<h2 style=\"text-align: justify;\"><b>DIGITAL RIGHTS MANAGEMENT:<\/b><\/h2>\n<p style=\"text-align: justify;\">It is under copyright because you are going to maintain rights over culture. The new concept originated in 1998-99. When the digital information came to being, this right emerged because digital data is very easy to copy and thus infringes copyright. It is a new kind of era where data is being passed very easily in digital form. New copying is only the work of pressing 2-3 keys only. The cause of concern for the publishers was they wanted their work to be sold to few persons and to be copied illegally after that, and this kind of things can be done very easily with the Cds. Various countries provided various arguments for this heavy debate during framing of WCT and WPPT and thus finally DRM was introduced.<\/p>\n<p style=\"text-align: justify;\">Infringement in such cases will be at two levels:<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 i.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Any person can access the material<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0\u00a0\u00a0 ii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The person who has it will make copies and sell it to many people .Under this we may have alteration, hampering moral rights etc.<\/p>\n<p style=\"text-align: justify;\">Digital Rights Management is a kind of process through which we manage digital content. Through this, rights are protected in digital work. DRM is a management not the means. It is a concept but it is not under WCT\/WPPT.<\/p>\n<p style=\"text-align: justify;\">Aspects of DRM:<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 I.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Technological Protection Measures(TPM)<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0 II.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Right Management Information<\/p>\n<p style=\"text-align: justify;\">TPM is any technological device or tools that prevent unauthorized or illegal access to or copying or reproduction of copying material.<\/p>\n<p style=\"text-align: justify;\">The two categories of TPM:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Access Control- TPMs prevent unauthorized access to materials. For example Access key required for accessing some software. Moreover you can access it for one time only like that of antivirus software.<\/li>\n<li>Copy control-only one person can use it. You can access it and only you can sue it with the key. You cannot copy it after that except for back up. E.g., there are some encrypted songs CDs which cannot copy paste. If you want to play those songs, you have to insert the CD.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">If there is no protection, certainly everyone will copy. There is loss to copyright owner and owners of companies publishing it. Even the fact that your email cannot be hacked comes under DRM. DRM is like a igital lock, whoever has the key can access it. Whatever material is in digital form will be protected even if it is copyrightable or not.<\/p>\n<p style=\"text-align: justify;\">Types of keys:<\/p>\n<p style=\"text-align: justify;\">a)\u00a0\u00a0\u00a0\u00a0\u00a0 Use of dongle- a piece of hardware that will contain an electronic serial number that has to be attached to the PC to enable software to run.<\/p>\n<p style=\"text-align: justify;\">b)\u00a0\u00a0\u00a0\u00a0\u00a0 Use of registration key- when we use free ware, it is only trail version. After 30 days registration key is required.<\/p>\n<p style=\"text-align: justify;\">c)\u00a0\u00a0\u00a0\u00a0\u00a0 Use of internet product activation- even if you have registration key, you have to connect to internet to install software. You have to enter a number in the website, which will alter to the owner of the software that you are buying same number then it cannot be used by any user.<\/p>\n<p style=\"text-align: justify;\">d)\u00a0\u00a0\u00a0\u00a0 Use of encryption- this technology is usually in DVD. After encryption you can only run the DVD. You cannot copy it.<\/p>\n<p style=\"text-align: justify;\">e)\u00a0\u00a0\u00a0\u00a0\u00a0 Use of digital watermark- it is a digital or pattern inserted into a digital image .\u00a0 A gien watermark may be unique to each copy or to be common to multiple copies.<\/p>\n<p style=\"text-align: justify;\">Cons of TPM with respect to Copyright law:<\/p>\n<p style=\"text-align: justify;\">&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 When you purchase something, doctrine of first sale, you own right over your copy. But TPM prevents you from even making copy to your own desktop which is inconvenient.<\/p>\n<p style=\"text-align: justify;\">&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 It is against the fair use principle.<\/p>\n<p style=\"text-align: justify;\">Exceptions under TPM:<\/p>\n<p style=\"text-align: justify;\">Section 107 of US Act and Section 65B of the Indian Copyright Act.<\/p>\n<ul style=\"text-align: justify;\">\n<li>For educational purposes:<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">This exception will not be available on original product but on the decodified copy made by someone and he has to use it for educational purpose. For example a book in almirah and if the kwy is with me, here I can use the book for fair use and whoever makes the duplicate copy will be liable. However if the book is in the library one can directly take the book and make photocopy.<\/p>\n<p style=\"text-align: justify;\">The difficulty is when you have to search for software or the person who can decode the CD. Then the person decodifying and the one using can take defense of educational purpose. There is also a law that for educational purposes you can ask company for copy, it has\u00a0 to give you an encrypted copy.<\/p>\n<ul style=\"text-align: justify;\">\n<li>Assisting persons with disability:<\/li>\n<li>Library and educational institutions<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The only limitation is that it is only used by students and teachers and staff of the university. Even if they make the entire library online, they first need to purchase software which would only make books available to members of that university.<\/p>\n<ul style=\"text-align: justify;\">\n<li>Inter operability:<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Suppose there is need for interoperability of two computer programs and TPM is a barrier, it can be circumvented provision of TPM can be diluted. Not everyone can do only experts can do. E.g.- gadgets<\/p>\n<ul style=\"text-align: justify;\">\n<li>Encryption research :<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">For reverse engineering or research, TPM can be used.<\/p>\n<ul style=\"text-align: justify;\">\n<li>Computer security testing:<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">TPM can be used for this and it is a permissible use.<\/p>\n<p style=\"text-align: justify;\"><b>WCT AND INDIAN LAW:<\/b><\/p>\n<p style=\"text-align: justify;\">WCT Article 11, 12: Obligations concerning technological measures. The provision doesnot provide for technological measure. It says it is the work of the author to protect his work.<\/p>\n<p style=\"text-align: justify;\">Obligations concerning right management information: Right management information is for anyone. If the information is in digital form, you could want to protect it. Mostly for works that does not go public but for secrecy and privacy point of view. So software shall protect information maintained in digital form (Article 12, WCT)<\/p>\n<p style=\"text-align: justify;\">For example, any photographs you place on the internet will be protected in the same way as other artistic works; any original written work will be protected as a literary work, and so on. If you download, distribute or put material on the internet that belongs to others you should ensure that you have the owner\u2019s permission, unless any of the exceptions apply.<\/p>\n<p style=\"text-align: justify;\">Just owning or buying a copy of original or copyright work does not give the person the right to use the work the way he wants. Permission is generally required in different everyday uses of copyright work, like scanning, photocopying, downloading from CD-ROM etc where copying is done Beyond an agreed license, further permission is required ((Jane Coyle, <i>Copyright and the Internet<\/i> ( 25 September 2008).)). The legal framework for digital content Intellectual Property Rights in the European Union was established by the Directive on the Harmonization of Copyright and Related Rights in the Information Society. Stakeholders should continue work on open standards. EC programmes cover IST research and E-content programme.<\/p>\n<p style=\"text-align: justify;\">The Emerging standards are those of Digital Property Rights Language (early Xerox research), Electronic Book Exchange, Extensible Access Control Markup Language, Secure Digital Music Initiative, Open Ebook Forum etc.<\/p>\n<p style=\"text-align: justify;\"><b>INDICARE<\/b> stands for Informed Dialogue about Consumer Acceptability of Digital Rights Management Solutions and deals with fair contract terms, access to usage of contents, library concerns, science and higher education concerns, transparency, flexibility in business models etc.<\/p>\n<p style=\"text-align: justify;\">Article 5 of European Copyright Directive deals with consumer interests and Article 6 deals with protection of technological measures and consumer protection laws.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ipsita Mishra, NLU, Odisha COPYRIGHT INFRINGEMENT All or any substantial part of the work is prevented from copying. The substantial part of the work includes mainly the quality of work&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[75],"tags":[809,812,814,969,970,1506,1598,1657],"class_list":["post-4751","post","type-post","status-publish","format-standard","hentry","category-articles","tag-copyright","tag-copyright-act-1957","tag-copyright-infringement","tag-digital-rights-management","tag-digital-technology","tag-impact-of-digital-technology-on-copyright","tag-infringement-liability","tag-internet-service-providers-and-hosts","no-post-thumbnail","clearfix","entry"],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Impact of Digital Technology on Copyright - Lex-Warrier<\/title>\n<meta name=\"description\" content=\"Digital time sampling 208 (2004) )). Catching is storing of web pages in computers memory at user level or server level. It is the service provided\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Impact of Digital Technology on Copyright - Lex-Warrier\" \/>\n<meta property=\"og:description\" content=\"Digital time sampling 208 (2004) )). Catching is storing of web pages in computers memory at user level or server level. It is the service provided\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html\" \/>\n<meta property=\"og:site_name\" content=\"The Lex-Warrier: Online Law Journal\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lex.warrier.page\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-15T04:14:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-01T15:46:18+00:00\" \/>\n<meta name=\"author\" content=\"Lex-Warrier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LexWarrier\" \/>\n<meta name=\"twitter:site\" content=\"@LexWarrier\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lex-Warrier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html\"},\"author\":{\"name\":\"Lex-Warrier\",\"@id\":\"https:\/\/lex-warrier.in\/archives\/#\/schema\/person\/ab2bb19b344a2bfcbc373777495f8f82\"},\"headline\":\"Impact of Digital Technology on Copyright\",\"datePublished\":\"2013-10-15T04:14:33+00:00\",\"dateModified\":\"2023-07-01T15:46:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html\"},\"wordCount\":3459,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/lex-warrier.in\/archives\/#organization\"},\"keywords\":[\"Copyright\",\"COPYRIGHT ACT 1957\",\"Copyright infringement\",\"DIGITAL RIGHTS MANAGEMENT\",\"Digital Technology\",\"Impact of Digital Technology on Copyright\",\"Infringement liability\",\"INTERNET SERVICE PROVIDERS AND HOSTS\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html\",\"url\":\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html\",\"name\":\"Impact of Digital Technology on Copyright - Lex-Warrier\",\"isPartOf\":{\"@id\":\"https:\/\/lex-warrier.in\/archives\/#website\"},\"datePublished\":\"2013-10-15T04:14:33+00:00\",\"dateModified\":\"2023-07-01T15:46:18+00:00\",\"description\":\"Digital time sampling 208 (2004) )). Catching is storing of web pages in computers memory at user level or server level. It is the service provided\",\"breadcrumb\":{\"@id\":\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lex-warrier.in\/archives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Impact of Digital Technology on Copyright\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lex-warrier.in\/archives\/#website\",\"url\":\"https:\/\/lex-warrier.in\/archives\/\",\"name\":\"The Lex-Warrier: Online Law Journal\",\"description\":\"ISSN (O): 2319-8338\",\"publisher\":{\"@id\":\"https:\/\/lex-warrier.in\/archives\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lex-warrier.in\/archives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lex-warrier.in\/archives\/#organization\",\"name\":\"The Lex-Warrier: Online Law Journal\",\"url\":\"https:\/\/lex-warrier.in\/archives\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lex-warrier.in\/archives\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i2.wp.com\/www.lex-warrier.in\/wp-content\/uploads\/2019\/02\/The-Lex-Warrier-Online-Law-Journal-1.png?fit=496%2C160\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.lex-warrier.in\/wp-content\/uploads\/2019\/02\/The-Lex-Warrier-Online-Law-Journal-1.png?fit=496%2C160\",\"width\":496,\"height\":160,\"caption\":\"The Lex-Warrier: Online Law Journal\"},\"image\":{\"@id\":\"https:\/\/lex-warrier.in\/archives\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lex.warrier.page\/\",\"https:\/\/x.com\/LexWarrier\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lex-warrier.in\/archives\/#\/schema\/person\/ab2bb19b344a2bfcbc373777495f8f82\",\"name\":\"Lex-Warrier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lex-warrier.in\/archives\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b7ad5c6449779ff1b8138f13b99bc7373067c121ed40965fc4da29ee734eeb28?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b7ad5c6449779ff1b8138f13b99bc7373067c121ed40965fc4da29ee734eeb28?s=96&d=mm&r=g\",\"caption\":\"Lex-Warrier\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Impact of Digital Technology on Copyright - Lex-Warrier","description":"Digital time sampling 208 (2004) )). Catching is storing of web pages in computers memory at user level or server level. It is the service provided","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html","og_locale":"en_US","og_type":"article","og_title":"Impact of Digital Technology on Copyright - Lex-Warrier","og_description":"Digital time sampling 208 (2004) )). Catching is storing of web pages in computers memory at user level or server level. It is the service provided","og_url":"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html","og_site_name":"The Lex-Warrier: Online Law Journal","article_publisher":"https:\/\/www.facebook.com\/lex.warrier.page\/","article_published_time":"2013-10-15T04:14:33+00:00","article_modified_time":"2023-07-01T15:46:18+00:00","author":"Lex-Warrier","twitter_card":"summary_large_image","twitter_creator":"@LexWarrier","twitter_site":"@LexWarrier","twitter_misc":{"Written by":"Lex-Warrier","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html#article","isPartOf":{"@id":"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html"},"author":{"name":"Lex-Warrier","@id":"https:\/\/lex-warrier.in\/archives\/#\/schema\/person\/ab2bb19b344a2bfcbc373777495f8f82"},"headline":"Impact of Digital Technology on Copyright","datePublished":"2013-10-15T04:14:33+00:00","dateModified":"2023-07-01T15:46:18+00:00","mainEntityOfPage":{"@id":"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html"},"wordCount":3459,"commentCount":0,"publisher":{"@id":"https:\/\/lex-warrier.in\/archives\/#organization"},"keywords":["Copyright","COPYRIGHT ACT 1957","Copyright infringement","DIGITAL RIGHTS MANAGEMENT","Digital Technology","Impact of Digital Technology on Copyright","Infringement liability","INTERNET SERVICE PROVIDERS AND HOSTS"],"articleSection":["Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html","url":"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html","name":"Impact of Digital Technology on Copyright - Lex-Warrier","isPartOf":{"@id":"https:\/\/lex-warrier.in\/archives\/#website"},"datePublished":"2013-10-15T04:14:33+00:00","dateModified":"2023-07-01T15:46:18+00:00","description":"Digital time sampling 208 (2004) )). Catching is storing of web pages in computers memory at user level or server level. It is the service provided","breadcrumb":{"@id":"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/lex-warrier.in\/archives\/impact-digital-technology-copyright.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lex-warrier.in\/archives\/"},{"@type":"ListItem","position":2,"name":"Impact of Digital Technology on Copyright"}]},{"@type":"WebSite","@id":"https:\/\/lex-warrier.in\/archives\/#website","url":"https:\/\/lex-warrier.in\/archives\/","name":"The Lex-Warrier: Online Law Journal","description":"ISSN (O): 2319-8338","publisher":{"@id":"https:\/\/lex-warrier.in\/archives\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lex-warrier.in\/archives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lex-warrier.in\/archives\/#organization","name":"The Lex-Warrier: Online Law Journal","url":"https:\/\/lex-warrier.in\/archives\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lex-warrier.in\/archives\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.lex-warrier.in\/wp-content\/uploads\/2019\/02\/The-Lex-Warrier-Online-Law-Journal-1.png?fit=496%2C160","contentUrl":"https:\/\/i2.wp.com\/www.lex-warrier.in\/wp-content\/uploads\/2019\/02\/The-Lex-Warrier-Online-Law-Journal-1.png?fit=496%2C160","width":496,"height":160,"caption":"The Lex-Warrier: Online Law Journal"},"image":{"@id":"https:\/\/lex-warrier.in\/archives\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lex.warrier.page\/","https:\/\/x.com\/LexWarrier"]},{"@type":"Person","@id":"https:\/\/lex-warrier.in\/archives\/#\/schema\/person\/ab2bb19b344a2bfcbc373777495f8f82","name":"Lex-Warrier","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lex-warrier.in\/archives\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b7ad5c6449779ff1b8138f13b99bc7373067c121ed40965fc4da29ee734eeb28?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b7ad5c6449779ff1b8138f13b99bc7373067c121ed40965fc4da29ee734eeb28?s=96&d=mm&r=g","caption":"Lex-Warrier"}}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2ACRt-1eD","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/lex-warrier.in\/archives\/wp-json\/wp\/v2\/posts\/4751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lex-warrier.in\/archives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lex-warrier.in\/archives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lex-warrier.in\/archives\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lex-warrier.in\/archives\/wp-json\/wp\/v2\/comments?post=4751"}],"version-history":[{"count":1,"href":"https:\/\/lex-warrier.in\/archives\/wp-json\/wp\/v2\/posts\/4751\/revisions"}],"predecessor-version":[{"id":7696,"href":"https:\/\/lex-warrier.in\/archives\/wp-json\/wp\/v2\/posts\/4751\/revisions\/7696"}],"wp:attachment":[{"href":"https:\/\/lex-warrier.in\/archives\/wp-json\/wp\/v2\/media?parent=4751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lex-warrier.in\/archives\/wp-json\/wp\/v2\/categories?post=4751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lex-warrier.in\/archives\/wp-json\/wp\/v2\/tags?post=4751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}