Professional Documents
Culture Documents
1.1 INTRODUCTION
Electronic commerce is a process, which is happening with the help of Information
and Communication Technologies. In order to see its evolution it is important to
see how commerce itself evolved over a period of time.
1.2 OBJECTIVES
After studying this unit, you should be able to:
z define the term e-commerce and make a distinction between e-commerce
and e-business;
z explain how e-commerce is a commercial transaction;
z make a nexus between e-commerce and the World Trade Organization;
z explain the different models of e-commerce; and
z analyse the future of e-commerce.
5
E-commerce
1.3 E-COMMERCE EVOLUTION
As the society evolved the commercial practices also evolved. The barriers to
trade were broken chiefly by the language and later by transport. The barter trade
gave way to acceptance of bullion as the trading currency. With the passage of time
nation states emerged as new political units and with new technological developments,
like telegraph and telephone further facilitated the trade. For over a century these
telecommunication devices became an integral part of the commercial enterprises
all over the world.
Later, in the early 1960s, computers were increasingly used to disseminate information
across geographical space. Though telegraph, telephones, telex and facsimile were
still the relied upon options, nevertheless the big corporations opted for Electronic
Data Interchange (EDI). It refers to the process by which goods are ordered,
shipped, and tracked computer-to-computer using standardised protocol. EDI1
permits the “electronic settlement and reconciliation of the flow of goods and services
between companies and consumers”. EDI saves money because the computer,
and not an office staff, submits and processes orders, claims, and other routine
tasks.
EDI began in the 1960s as a computer-to-computer means of managing inventory,
bill presentment, shipment, orders, product specifications, and payment. EDI is
made possible because trading partners enter into master agreements to employ
electronic messaging permitting computer-to-computer transfers of information and
validating computer-to-computer contracts.2
The early adopters of EDI were companies running complex operations in the airlines,
shipping, railways and retail sectors. These companies developed their own
proprietary format for interchanging data messages. It led to development of
proprietary systems. These proprietary systems whether of a retail or automobile
company were operation specific. It was felt that a universal standard was impractical
and unnecessary. Consequently, the lack of universal standards made it difficult for
companies to communicate with many of their trading partners.
In late 1970s, the American National Standards Institute (ANSI) authorized a
committee called the Accredited Standards Committee (ASC) X-12 (consisting of
government, transportation, and computer manufacturers) to develop a standard
between trading partners. The standard was called ANSI X-12. Over a period of
time sectors like paper, chemical, warehouse, retail, telecommunications, electronics,
auto, metals, textile, and aerospace developed and started using sector specific
EDI standards, which are subset of X12 standards.
Under the aegis of United Nations, organizations from different sectors collaborated
and developed an internationally approved standard structure for transmitting
information between different trading partners, called the United Nations Electronic
Data Interchange for Administration, Commerce and Transport (UN/EDIFACT)
in 1986. It ensures transmission compatibility of electronic business documents
globally. In the US companies tend to use ANSI X-12 protocol while their European
counterparts prefer EDIFACT. Moreover, various industry sectors use their industry-
specific protocols.
The EDI was like a business-to-business (B2B) model involving a company and its
various vendors performing commercial transactions using proprietary networks.
6 By late 1980s computers acquired the status of ‘personal computer’, i.e. became
part of the private domain of an individual. It was EDI at the individual level supported E-commerce: Evolution,
Meaning and Types
by the public networks known as Internet.
Hence, e-commerce evolved out of EDI and should be considered as a next logical
step in the development of commercial processes involving commercial transactions.
Thus e-commerce means doing business electronically across the extended enterprise.
It covers any form of business or administrative transaction or information exchange
that is executed using any information and communications technology.
Narrowly put, e-commerce is limited to specific initiatives, such as sales via the
Internet, electronic procurement, or electronic payment.
Please answer the following Self Assessment Question.
Self Assessment Question 1 Spend 3 Min.
Trace the evolution of E-commerce.
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
Business Consumer
Business B2B B2C
www.vendome.niit.com www.indiatimes.com
1.7 SUMMARY
z E-commerce represents online transactions.
z It is the retail version of the Electronic Data Interchange (EDI).
z In general terms, e-commerce is a business methodology that addresses the
needs of organizations, traders and consumers to reduce costs while improving
the quality of goods and services and increasing the speed of service delivery.
z In terms of types, it has four types: Business-to-Business (B2B), Business-to-
Consumer (B2C), Consumer-to-Business (C2B) and Consumer-to-Consumer
(C2C).
z These models are dynamic business models and are changing as per the needs
of the e-consumers.
5. www.gartner.com
6. www.wto.org
7. www.paypal.com
14
UNIT 2 PAYMENT MECHANISM IN
CYBERSPACE
Structure
2.1 Introduction
2.2 Objectives
2.3 Electronic Fund Transfer (EFT)
2.3.1 How Electronic Fund Transfer Works?
2.3.2 Different Mode of EFT Mechanism
2.3.3 The Electronic Clearing Services (ECS)
2.3.4 RBI EFT
2.3.5 INFINET
2.3.6 Structured Financial Messaging System (SFMS)
2.3.7 Real Time Gross Settlement System (RTGS)
2.1 INTRODUCTION
Payment mechanism in cyberspace is all about paying for goods and/or services
ordered or consumed using modern means of information technology. Such payment
mechanism in order to be accepted must have all the attributes of a widely accepted
offline payment system.
2.2 OBJECTIVES
After studying this unit, you should be able to:
z explain the meaning of electronic fund transfer (EFT) and how it works; 15
E-commerce z explain the different modes of EFT mechanism;
z explain EFT as an important tool in online financial and banking networks and
its crucial role in electronic settlement;
z discuss the online payment mechanism in the form of credit cards, smart cards,
electronic wallet, and digital certificates; and
z describe the role of law in shaping the online payment mechanism.
PAYEE DRAWER
PAYEE’s DRAWER’s
BANK BANK
AUTOMATED
CLEARING
HOUSE
INTERNET
16
Figure 1: EFT mechanism using Internet
In India, electronic fund transfer system has got a fillip when the Central Government Payment Mechanism in
Cyberspace
amended the Negotiable Instruments Act, 1881 and brought in forth the Negotiable
Instruments (Amendment and Miscellaneous Provisions) Act, 2002, and introduced
the concept of a “truncated cheque” in section 6 (b) of the said Act:
Section 6(a) “ a truncated cheque” means a cheque which is truncated during the
course of a clearing cycle, either by the clearing house or by the bank whether
paying or receiving payment, immediately on generation of an electronic image for
transmission, substituting the further physical movement of the cheque in writing.
Explanation II. – For the purposes of this section, the expression “clearing house”
means the clearing house managed by the Reserve Bank of India or a clearing house
recognised as such by the Reserve Bank of India.
As evident from the aforesaid section, the truncation process involves replacing
physical cheques with their electronic images, which will travel through the stages of
the clearing cycle. During the whole process of truncation the instrument would remain
with the collecting bank.
17
E-commerce Please answer the following Self Assessment Question.
Self Assessment Question 1 Spend 3 Min.
The two activity lines which have become important vehicles for furthering
improvements in customer services are ......................and ......................
2.3.5 INFINET
The setting up of the apex-level National Payments Council in May 1999 and the
operationalisation of the Indian Financial Network (INFINET) by the Institute for
Development and Research in Banking Technology (IDRBT), Hyderabad have been
some important developments in the direction of providing a communication network
for the exclusive use of banks and financial institutions. INFINET members include
RBI, Public sector banks, Private banks, Foreign banks, Cooperative banks and
Financial Institutions.
Master Merchant
www.abc.com
Master/Visa Card
Figure 2: Online payment mechanism using credit card 19
E-commerce Apart from credit card based transactions, other online payment systems include:
2.7 SUMMARY
z Online payment is fast emerging as a good alternative to physical mode of
payments.
z Electronic fund transfer mechanisms are a reality now.
z Financial institutions and banks have transformed themselves into huge financial
networks providing real time facilities to their customers.
z The traditional ‘brick-and-mortar’ banking model has given way to ‘click- and-
mortar’ banking model which has made many online payment options available
to a consumer.
z Significantly, the law also grants legal validity to such online payment instruments.
2. CHIPS are a computerised funds transfer system operated by the New York
payments.
3. www.rbi.org.in
5. See: www.cybercash.com
6. See: www.ecoin.net
8. Ibid. p.252
24 Dimensions of Cyberspace. Ed. Verma. S.K. and Mittal Raman. ILI Publications.
UNIT 3 ADVERTISING AND TAXATION VIS-
À-VIS E-COMMERCE
Structure
3.1 Introduction
3.2 Objectives
3.3 Online Advertising
3.4 Forms of Online Advertising
3.4.1 Banner Advertisements and Payment Models
3.4.2 Looking Beyond the Banner Ads
3.4.3 Cookies as an Advertising Tool
3.4.4 Google AdWords: Pay Per Click
3.4.5 Other Advertising Tools
3.10 Summary
3.11 Terminal Questions
3.12 Answers and Hints
3.13 References and Suggested Readings
3.1 INTRODUCTION
Commercial transactions do not occur in vacuum. They require all kind of support
services in the form of advertising, marketing, sales, logistics, insurance and banking.
If these support functions are considered essential for offline commercial transactions,
then these can also be taken as essential for online commercial transactions.
3.2 OBJECTIVES
After reading this unit, you should be able to:
z explain the concept of online advertising and taxation and make a comparison
between traditional media and online media;
z describe the different forms of online advertising and the way it works;
25
E-commerce z explain the merits and demerits of online advertising;
z explain the relationship between e-commerce and taxation; and
z discuss the tax issues emerging from online transaction.
30
The broad consensus that has emerged is: (i) Online transactions should not be immune
from taxation solely because the sale is conducted through a medium distinct from
that of traditional offline businesses, and (ii) It is not prudent to tax these online Advertising and Taxation
vis-à-vis E-commerce
transactions purely on the basis of traditional taxation approach applicable to offline
businesses.
32
3.9.2 OECD Model Treaty Advertising and Taxation
vis-à-vis E-commerce
The Organization for Economic Co-operation and Development (OECD), a 30
member organization has proposed that the basis of any online taxation system should
be equitable, simple, certain, effective, distortions free, flexible and dynamic. The
idea is to create a uniform mode of taxation whether offline or online. That is, any
online taxation system should completely harmonize with existing offline taxation
system. Broadly speaking, electronic commerce should be taxed neither more nor
less heavily than other commerce, and online sales should, to the extent possible, be
taxed at the state of destination of sales, irrespective of the fact whether the vendor
(seller) has a physical presence in the state or not.
The OECD Commentary, on the “OECD Model Treaty” issued on January 28,
2003, clarified from an e-commerce perspective.
Whether a website constitutes a “place of business”?
The OECD Commentary mentions that a website, which is a combination of software
and electronic data, does not in itself constitute tangible property and hence cannot
be referred to as a “place of business”.
Whether location of a server constitutes a permanent establishment (PE)?
The OECD Commentary provides that if an enterprise owns (or leases) and operates
the server on which the website is stored and used, the place where that server is
located could constitute a permanent establishment of the enterprise.
It is evident that the OECD countries place a lot of emphasis on permanent
establishment from e-taxation perspective.
3.10 SUMMARY
z Online advertising is aiding online marketing initiatives.
z It has moved from a flat fee payment model to a more dynamic ‘pay per click’
model.
z Over a period of time, online advertising has become intrusive and bane for the
Net users’ and it is thus imperative that online service providers should now opt
for self-regulation.
z It is a myth that electronic tax is an additional tax burden. The fact is that it is
not! It is meant to tax e-commerce transactions but the process is not easy
because of the very nature of Internet technology, which is seamless and
unobtrusive.
z Nevertheless, world over, the governments are coming to terms with the e-
taxation reality.
your products and services on the Internet”. Van Nostrand Reinhold. 1998.
5. The Internet Tax Freedom Act. Pub. L. 105-277. S 1101.a, Oct. 21. 1998.
6. On November 28. 2001. President Bush signed H.R. 1552. the “Internet Tax
Non-discrimination Act” which simply amended the IFTA so that the moratorium
35
UNIT 4 CONSUMER PROTECTION IN
CYBERSPACE
Structure
4.1 Introduction
4.2 Objectives
4.3 E-consumers
4.4 E-consumer Support and Service
4.4.1 E-mail Support
4.4.2 Newsgroups, Chat Rooms, Message Boards, Blogs
4.4.3 FAQs
4.4.4 Consumer Service Information
4.4.5 Feedback Forms
4.4.6 Help Desk
4.7 Summary
4.8 Terminal Questions
4.9 Answers and Hints
4.10 References and Suggested Readings
4.1 INTRODUCTION
Today cyberspace represents an e-marketplace. It has got e-shops, e-malls etc.,
selling all kinds of goods and services. If there are e-sellers, then there are e-buyers
as well. These e-buyers, buying goods and/or availing services on the Internet should
be treated as the consumers as defined under the Consumer Protection Act, 1986.
4.2 OBJECTIVES
After reading this unit, you should be able to:
z describe who is an e-consumer and how the general profile of e-consumer is
different from that of offline consumer in many ways;
z explain the various kinds of support and service, which is being provided to the
e-consumers by the e-commerce service providers; and
z explain the legal remedies and analyse whether the rights of e-consumers have
36
been protected or not.
Consumer Protection in
4.3 E-CONSUMERS Cyberspace
E-consumers are consumers who are buying, consuming or selling1 goods or services
using digital medium (Internet or any other electronic platform). It is interesting to
note that the e-consumers are consuming both tangible (physical) goods as well as
intangible (digital) goods. The digital medium helps e-consumers to place buy orders
for physical goods using e-commerce business models, like business-to consumer
(B2C), consumer-to-business (C2B) and consumer-to-consumer (C2C); it also helps
them to download digital goods in the form of MP3 music files, data, databases,
content, software etc.
Interestingly, the term e-consumer nowadays includes both e-commerce (electronic
commerce) and m-commerce (mobile commerce) consumers.
E- consumer: A Profile
The general profile of e-consumer is different from that of offline consumer in many
ways. An e-consumer is urban, young, technology savvy, educated, convenience
shopper and multiple choices oriented. Moreover, he is smart; he knows where to
look for discount on the Net. As compared to physical world, ease of price comparison
and greater choices are the biggest plus points in favour of e-consumers.
It is thus important to compare a physical shopping experience with that of online
shopping experience to understand the psyche of e-consumer – his wants and needs.
Table 1: Comparison2 between physical and online shopping
As indicative from the aforesaid table, e-consumer shopping decisions are based on
“look and feel” factors, i.e. products which require “low touch” (which consumers
prefer to be able to see and feel before they buy). Nevertheless, the distinctions are
blurring, e-consumers are now even going for goods, which require look and touch,
for example dresses and diamond jewelry3.
37
E-commerce Please answer the following Self Assessment Question.
Self Assessment Question 1 Spend 3 Min.
Who is an E-consumer? Are you an E-consumer?
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
4.4.3 FAQs
Frequently Asked Questions are common consumer-service resources. They are
the most common questions posed by consumers, which are collected, together with
their answers, and can be viewed online. The only disadvantages with FAQs are that
they are not personalised.
4.4.4 Consumer Service Information
It provides relevant information to the consumer, which may include product
specifications, compatibility charts, pricing, warranty details etc. Such an information
resource helps the consumer not only in arriving at a decision, but also safeguards
him against any artificial price increase by a retailer.
4.4.5 Feedback Forms
These are the forms through which customers can complain or provide valuable
comments about the service and the products provided by the organization. These
forms are valuable assets from the point of view of consumer trust and retention.
4.7 SUMMARY
z E-consumers are consumers who are buying, consuming or selling goods or
services using digital medium (Internet or any other electronic platform).
z The digital medium helps e-consumers to place buy orders for physical goods
using e-commerce business models, like business-to consumer (B2C), consumer-
to-business (C2B) and consumer-to-consumer (C2C); it also helps them to
download digital goods in the form of music files, data, databases, content,
software etc.
z A proactive website is the one which provides consumer support and service
functions in the form of e-mail queries, feedback forms, consumer service
information etc.
z The knowledge of privacy policy and terms of use are also beneficial for e-
consumers.
z From statutory perspective enactments, like the Consumer Protection Act, 1986,
the Specific Relief Act, 1963 and the Sale of Goods Act, 1930 play a critical
role in safeguarding the e-consumers interests in cyberspace.
2. Adapted from Lohse. G.L. and Spiller. Electronic Shopping: “The Effect of
1998.
5. According to. www.technorati.com which tracks blogs on the Internet that there
46
UNIT 5 FORMS OF ONLINE CONTRACTS
Structure
5.1 Introduction
5.2 Objectives
5.3 The Nature of Online Contracts
5.3.1 Nature of Online Contracts and the European Directive
5.3.2 Nature of Online Contracts and the U.S. Law
5.3.3 Nature of Online Contracts and the Indian Law
5.1 INTRODUCTION
E-markets are technological extensions of physical markets in the cyberspace.
Everything that exists in the physical world now exists in cyberspace. E-markets
are functioning like physical markets and have their respective set of e-buyers
and e-sellers. These buyers and sellers are fulfilling all the legal pre-requisites
to have binding relationship between them. Online contract is one such
relationship that binds the buyer with the seller.
5.2 OBJECTIVES
After studying this unit, you should be able to:
z explain the different online contracts associated with various online
commercial activities from the global perspective i.e. from European
Council, the U.S. and the Indian legal perspective;
z describe online contracts covering the entire gamut of online business
behaviour whether it is:
(a) business to business (B2B) or
(b) business to consumer (B2C)
z discuss the different forms of online contracts like EDI contract, access
contracts, click wrap contracts and web wrap contracts.
5
Online Contracts
5.3 THE NATURE OF ONLINE CONTRACTS
An online contract is formed over the Internet when an offer is made and an acceptance
is received. The offer could be made by a seller (service provider) using an e-mail or
a website. The buyer on receipt of an offer, places an order and the seller confirms
receipt of the order. But there needs to be a clear statement as to how offers and
acceptance are to be communicated and received.
In fact, it was the United Nations Commission on International Trade Law
(UNCITRAL) Model Law on Electronic Commerce, which for the first time
articulated about the nature of online contract mechanism in terms of its formation
and validity. It was adopted by the General Assembly of the United Nations on
30th January 1997 by its Resolution A/RES/51/162. It deals not only with the
issue of contract formation but also with the form in which an offer and an
acceptance may be expressed. It provides1 that “information shall not be denied
legal effectiveness, validity or enforceability solely on the grounds that it is in
the form of data messages (electronic record)”.
Basically there are three legal issues related to online contracts:
(a) What sort of contracts to be concluded by electronic means?
(b) What sort of information related to offer to be provided by the service
provider?
(c) What sort of information on receipt of order to be provided by the service
provider?
It is thus imperative to seek answers to aforesaid questions across various
legislations.
6
Please answer the following Self Assessment Question. Forms of Online Contracts
Intangible + + +
Tangible + +
EDI contract predominantly deals with tangible goods in B2B space3, whereas
‘access contract’ deal with intangibles. A click-wrap contract deals with both
tangible and intangible goods. A web-wrap contract predominantly deals with
intangible goods only.
5.6 SUMMARY
z Online contracts are dynamic in nature and represent both business-to-business
(B2B) and business-to-consumer (B2C) space.
z All over the world, various legislations have been framed to articulate legal
principles creating binding relationships between e-businesses and e-consumers.
z Online contracts deal with both tangible and intangible goods.
14
4. It is typically structured as a license agreement. Website visitors are given a Forms of Online Contracts
license to use material on a given website.
Terminal Questions
1. Refer to sub-section 5.2.2 of the unit.
2. Refer to sub-sections 5.3.3, 5.3.4 of the unit.
3. Refer to section 5.4 of the unit.
4. Teitelman Robert and Stephen Davis. “How the Cash Flows?” Institutional
Law 1645.1990.
15
UNIT 6 FEATURES OF ONLINE CONTRACTS
Structure
6.1 Introduction
6.2 Objectives
6.3 Essential Features of a Contract
6.3.1 Pre-requisites of a valid Contract
6.3.2 Valid Offer
6.3.3 Valid Acceptance
6.6 Summary
6.7 Terminal Questions
6.8 Answers and Hints
6.9 References and Suggested Readings
6.1 INTRODUCTION
The Indian Contract Act, 1872 lays down that for a contract to exist there has to be
a proposal, and an assent to the proposal, which transforms into a promise. A promise
supported by consideration becomes an agreement and an agreement enforceable
by law is a contract. Likewise, an online contract follows the same pre-requisite as
being followed in offline (physical) contract. At a basic level, online contract formation
requires online offer/proposal by one party and its online acceptance by the other
party.
6.2 OBJECTIVES
After studying this unit, you should be able to:
z explain the essential features of a contract;
z describe proposal, acceptance and pre-requisites of a valid contract;
z explain when a communication is complete in case of online contracts;
z compare between the postal route and the Instantaneous Communication
Rule; and
z describe the use of digital signature in online communication.
16
Features of Online
6.3 ESSENTIAL FEATURES OF A CONTRACT Contracts
Under the Indian Contract Act, 1872 the formation of a contract is a two-limb
process, involving firstly, a communication of proposal from first party to the second
and secondly, a communication of acceptance from the second party to the first.
The role of all the three parties involved in an electronic communication process is
distinct. For a given electronic message, there would be an originator, an intermediary
and an addressee. The categories like originator and addressee are dynamic, i.e. for
an electronic message there would be a sender (originator) and a recipient (addressee)
of that message, but suppose the recipient replies back to the sender, then in such a
case the recipient would become the originator of that electronic message (reply)
and the sender would thus become the addressee. Interestingly, during the entire
activity of exchange of such messages between the parties, the category of the
intermediary4 would remain static, i.e. its function would remain the same irrespective
of role reversal of the originator and the addressee. The function of an intermediary
is that of a facilitator, a third party service provider, like e-mail service provider, web
services provider etc.
20
It is obligatory to note that categories like, originator and addressee are not to be Features of Online
Contracts
considered as equivalent to ‘promisor’ and ‘promisee’ [S.2(c)] of the Indian Contract
Act, 1872. A promisee may act as an originator or an addressee vis-à-vis any
electronic message, depending on its functional role. The categories ‘originator-
intermediary-addressee’ facilitate end-to-end communication process.
6.6 SUMMARY
z At a basic level, online contract formation requires online offer/proposal
by one party and its online acceptance by the other party.
z For a contract to happen there should be a communication of proposal and
communication of acceptance as well.
z This process of communication may involve communication by post or by
telephone, while former being referred to as postal communication and
24 latter as instantaneous communication.
z The Information Technology Act identifies three parties to the electronic Features of Online
Contracts
transmission process: the originator, the intermediary and the addressee. These
categories are not to be considered as equivalent to ‘promisor’ and
‘promisee’.
z The said Act not only grants legal recognition to communication process
involving computer, computer system and computer network by identifying
attribution, acknowledgement, dispatch and receipt of electronic records as
key statutory provisions, but also provides for a mechanism to create binding
trust with the help of digital signatures.
25
Online Contracts
2. It was observed by Lord Wilberforce in Brinkibon Ltd. v. Stahag Stahl und
the use of Telex communications has been greatly expanded, and there are
many variations on it. There may be some error or default at the recipient’s end
which prevents receipt at the time contemplated and believed in by the sender.
The message may have been sent and/or received through machines operated
by third persons. And many other variations may occur. No universal rule can
cover all such cases, they must be resolved by reference to the intentions of the
parties, by sound business practice, and in some cases by a judgment where the
3. Section 2(c) of the Indian Contract Act, 1872 states: The person making the
proposal is called the ‘promisor’, and the person accepting the proposal is
Exchange.
5. Computer Resource has been defined under section 2 (1) (k) of the Act and
database or software.
26
UNIT 7 ISSUES EMERGING FROM ONLINE
CONTRACTING
Structure
7.1 Introduction
7.2 Objectives
7.3 Issues Emerging from Online Contracting
7.3.1 Capacity to Contract
7.3.2 E-mail Box Rule
7.3.3 Electronic Authentication
7.3.4 Choice of Law
7.3.5 Choice of Forum
7.3.6 Doctrine of Acceptance by Silence
7.3.7 Unconscionable License Terms
7.3.8 Mandatory Arbitration Clauses
7.3.9 Automated Contracts
7.4 Summary
7.5 Terminal Questions
7.6 Answers and Hints
7.7 References and Suggested Readings
7.1 INTRODUCTION
Online contracts represent the formation of series of contractual obligations in an
online environment. From a legal perspective, an online contract follows the same
pre-requisite as being followed in offline (physical) contract. At a basic level, online
contract formation requires online offer/proposal by one party and its online
acceptance by the other party. The entire process of formation of online contract is
not simple. One has to trust the technology as well.
7.2 OBJECTIVES
After reading this unit, you should be able to:
z explain the emerging issues concerning contracts formed electronically;
z explain the various features of online contract such as
a) validity / enforceability of online contracts
b) capacity to contract
c) applicability of postal and instantaneous communication rule in online
medium
d) authentication of electronic records
e) jurisdictional complexities
f) unconscionable licensing terms
g) automatic contracts 27
Online Contracts
7.3 ISSUES EMERGING FROM ONLINE
CONTRACTING
Electronic contracts, by their very nature, are dynamic and often multi layered
transactions. With a layered contract, agreement to a contract may not occur at a
single point in time. There exist a chain of successive events – e-offer, e-
acceptance, consideration etc., combination of which may lead to electronic
contract formation.
E-contract formation has not only given rise to many complexities but also raised
certain critical legal issues. It is thus imperative to look into the following
issues in view of the emerging law.
33
Online Contracts Online contracts may also exist in the form of mass-market licenses to download
software or shareware programs. Such mass-market licenses are posted on the
websites in a standard form. These are enforced if two conditions are met: (1)
the user has an opportunity to review the terms of license; and (2) the user manifests
assent after having an opportunity to review the terms.
Simply clicking an “I Accept” text or icon may accomplish the manifestation of assent.
These days, a growing number of website vendors use a “double click” method,
which asks customers whether they are certain that they accept the terms of the
license. It is quite likely that the reasonable visitor will click through these icons
without reading the license agreement prior to the payment. Nevertheless, there should
be right to refund if they (customers) have no opportunity to review a mass-market
license or a copy of it before becoming obligated to pay.
34
that required any dispute arising out of the plaintiff’s purchase of a computer and Issues Emerging from
Online Contracting
software to be resolved by arbitration. Gateway shipped its personal computers in a
box containing a printed warning stating, “This document contains Gateway 2000’s
Standard Terms and Conditions.” The license agreement also stated, “By keeping
your Gateway 2000 computer system beyond 30 days after the date of delivery, you
accept these Terms and Conditions.” One of the clauses of the contract mandated
that all controversies arising out of the computer contract were to be arbitrated in
Chicago, Illinois, applying the “Rule of Conciliation and Arbitration of the
International Chamber of Commerce.”
The court upheld5 the arbitration clause, holding that it did not render the contract an
unenforceable adhesion contract. The court stated that because “the consumer has
affirmatively retained the merchandise for more than 30 days – within which the
consumer has presumably examined and even used the product(s) and read the
agreement……the contract has been effectuated”.
Problems may arise, if the arbitration clause mentions scope of international
arbitration under the London Court of International Arbitration (LCIA) or
Conciliation and Arbitration of the International Chamber of Commerce Rules. For
an Indian consumer the fee to arbitrate the dispute in such international forums may
exceed the price of the goods or service, depriving the consumer of any effective
remedy. A court may declare such a clause unconscionable and invalid.
It is thus imperative that the mandatory arbitration clause should take care of
following factors6:
(2) Whether the weaker party has an option to opt out of arbitration;
(5) Whether the weaker party had a meaningful opportunity to accept the arbitration
agreement; and
(6) Whether the stronger party used deceptive tactics.
An online contract containing one-sided arbitration clause that take away many
substantive rights without giving consumers meaningful remedies carries a risk of
being declared unconscionable by the court.
7.4 SUMMARY
z The legality of electronic communication process culminating into electronic
contracts is also based on common law of contract.
z Electronic contracts, by their very nature, are dynamic and often multi
layered transactions.
z In online contracting process, technology is an added dimension and hence,
it is important that the contracting parties should be prudent and aware of
their obligations and liabilities before they click on on-screen “I Agree”
text or icon.
36
Issues Emerging from
7.7 REFERENCES AND SUGGESTED READINGS Online Contracting
6. Id. at 658.
37
UNIT 8 INTELLECTUAL PROPERTY IN
CYBERSPACE
Structure
8.1 Introduction
8.2 Objectives
8.3 Copyright
8.3.1 Basic Concept
8.3.2 Rights Included in the term ‘Copyright’
8.3.3 Infringement of Copyright and Remedies Thereof
8.3.4 Limitations/Exceptions to Copyright
8.3.5 Registration of Copyright
8.3.6 International Nature of Copyright Protection
8.4 Trademarks
8.4.1 Fundamental Concept
8.4.2 Establishing Trademark Rights
8.4.3 Passing Off
8.4.4 Remedies for Breach
8.1 INTRODUCTION
In common use, property is simply ‘one’s own thing’ and refers to the relationship
between individuals and the objects which they see as being their own to dispense
with as they see fit. Scholars in the social sciences frequently conceive of property as
a ‘bundle of rights and obligations’. They stress that property is not a relationship
between people and things, but a relationship between people with regard to things.
Property is often conceptualized as the rights of ‘ownership’ as defined in law. Private
property is that which belongs to an individual; public property is that which belongs
to a community collectively or a State. Property is usually thought of in terms of a
bundle of rights as defined and protected by the sovereign. Traditionally, that bundle
of rights includes:
z control use of the property
z benefit from the property (e. g.: mining rights and rent)
z transfer or selling of the property
z exclude others from the property
5
Intellectual Property The term intellectual property reflects the idea that this subject matter is the product
Protection in
Cyberspace
of the mind or the intellect, and that intellectual property rights may be protected at
law in the same way as any other form of property.
Intellectual property laws are territorial such that the registration or enforcement of
IP rights must be pursued separately in each jurisdiction of interest. However, these
laws are becoming increasingly harmonised through the effects of international treaties
such as the Berne Convention, Paris Convention and WTO Agreement on Trade-
Related Aspects of Intellectual Property Rights.
Intellectual property laws confer a bundle of exclusive rights in relation to the particular
form or manner in which ideas or information are expressed or manifested, and not
in relation to the ideas or concepts themselves. The term “intellectual property”
denotes the specific legal rights which authors, inventors and other IP holders may
hold and exercise, and not the intellectual work itself.
Intellectual property laws are designed to protect different forms of intangible subject
matter, although in some cases there is a degree of overlap. Like other forms of
property, intellectual property (or rather the exclusive rights which subsist in the IP)
can be transferred or licensed to third parties. There are various kinds of tools of
protection that come under the umbrella term ‘intellectual property’. Important among
these are the following:
z Patents
z Trademarks
z Geographical Indications
z Layout Designs of Integrated Circuits
z Trade Secrets
z Copyrights
z Industrial Designs
Out of this tool kitty mainly it is copyright and trademark which are of relevance
when we discuss intellectual property protection in cyberspace. Before proceeding
to discuss the exact application of IP laws and their implication in cybersapce, it
becomes imperative to know in some greater detail about them.
8.2 OBJECTIVES
After reading this unit, you should be able to:
z explain the term intellectual property;
z describe the basic concept of copyright and the rights included in the term
copyright;
z explain infringement of copyright and what are the remedies;
z explain the concept of trademark the rights of trademark and remedies for their
search; and
6 z describe the challenges faced by IPR in cyberspace.
Intellectual Property in
8.3 COPYRIGHT Cyberspace
8.4 TRADEMARKS
8.4.1 Fundamental Concept
A trademark is a distinctive sign of some kind which is used by a business to uniquely
identify itself and its products and services to consumers, and to distinguish the business
and its products or services from those of other businesses. Conventionally, a
trademark comprises a name, word, phrase, logo, symbol, design, image, or a
combination of two or more of these elements.
The essential function of a trademark is to exclusively identify the commercial source
or origin of products or services thereby facilitating identification of products and
services which meet the expectations of consumers as to quality and other
characteristics. That way, trademark law is designed to fulfill the public policy
objective of consumer protection, by preventing the public from being misled as to
the origin or quality of a product or service. Trademarks also serve as an incentive
for manufacturers, providers or suppliers to consistently provide quality products or
services in order to maintain their business reputation.
Please answer the following Self Assessment Question.
Self Assessment Question 2 Spend 3 Min.
What is the function of trademark?
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
z The term intellectual property reflects the idea that this subject matter is the
product of the mind or the intellect.
z Copyright and trademark are of utmost relevance when we discuss intellectual
property protection in cyberspace.
z Copyright is a right given by law to the creators of literary, dramatic, musical
and artistic works and producers of cinematograph films and sound recordings
to do or authorize the doing of certain acts with regard to their creations.
z Copyright is a bundle of rights and this bundle can be broadly classified into
two categories, viz. economic rights and moral rights.
z A trademark is a distinctive sign of some kind which is used by a business to
uniquely identify itself and its products and services to consumers, and to
distinguish the business and its products or services from those of other
businesses.
z Intellectual property in its various forms has migrated to the Internet.
z Books, music, films, images, etc. are now readily available to be consumed on
the Internet.
z The biggest challenge for the success of e-commerce is to ensure proper control
of intellectual property present in cyberspace in the hands of rightowners.
9.4 Inlining
9.4.1 What is Inlining?
9.4.2 Inlining and Indian Law
9.5 Framing
9.5.1 What is Framing?
9.5.2 Legality of Framing under Indian Law
9.6 Summary
9.7 Terminal Questions
9.8 Answers and Hints
9.1 INTRODUCTION
The Web sites are soaked in information, much of it with varying degrees of copyright
protection. In fact, the reality is that almost everything on the Net is protected by
copyright law. Web sites are a composition of materials, often consisting of words,
graphics, audio, and video, that are expressed to the consumer as information content.
The subject matter expressed in the site is an electronic publication of this content.
Since, designing, producing, and maintaining a sophisticated Web site is very
expensive, protecting content ownership is extremely important. As Web sites
become more and more interactive with consumers, their creation, design, and
maintenance place enormous demands on innovative marketing techniques that
should be legally protected.
Never before has it been so easy to violate a copyright owner’s exclusive right to
copy the material. Everyone with a computer and an Internet connection creates his
own Web pages and thus become a publisher. Hence the rules that once applied to
only a few companies bind million of people now.
This unit highlights the scenario when contents of your Web site are exploited by
others without your permission or knowledge. The discussion is centred on copyright
issues involved in the practices of Linking, In lining and Framing technologies which
are normally being used on the Internet.
9.2 OBJECTIVES
After reading this unit, you should be able to:
z explain the concept of linking;
16
z make distinction between surface linking and deep linking; Linking, Inlining and
Framing
z describe the liability for linking;
z explain the Indian law references to linking; and
z describe the legality of framing under Indian law.
9.3 LINKING
9.3.1 What is Linking?
The interactive feature of the Internet’s most popular information access tool, the
World Wide Web, to hyperlink defines its very culture distinguishing it from any
other communications medium. On the Internet, a link is a selectable connection
from one word, picture, or information object to another. Links usually appear as
highlighted, underlined, otherwise prominent text or picture that can be selected by
the user, resulting in the immediate delivery and view of another file. The highlighted
object is referred to as an anchor. The anchor reference and the object referred to
constitute a link. A link may lead either to another file in the same Web site, or to a
file on a different computer located elsewhere on the Internet. Internet browsers
automatically decipher the instructions given by links and retrieve the specified file. A
single Web page may contain many links to other Web pages.
Linking is the sine qua non for the World Wide Web and in fact links are what make
the World Wide Web a web. Links allow quick access to information that otherwise
could take much time and effort to find. Linking is of two types:
Surface linking: When the home page of a site is linked it is the case of surface
linking.
Deep linking: When a link bypasses the home page and goes straight to an
internal page within the linked site it is the case of deep linking.
9.4 INLINING
9.4.1 What is Inlining?
Inlining or ‘In-line linking’ enables a Web page to summon different elements from
diverse pages or servers to create a new Web page. Instead of copying the elements
to the composite page, the elements are linked in by “pulling in” graphic or image
files from another site and displaying on the composite Web page. Thus, the composite
page would consist of a series of links to other sites and servers. While browsing the
composite page, the page directs the browser to get the pictures, graphics etc. from
the original sources.
An example would be a Web page on art that contains images stored around the
world. The Web page could contain the text: “See my favourite paintings”. Using an
IMG link, the Web page could then direct the visiting browser to retrieve the images
of famous paintings from the Web page of various museums and place it immediately
below the text. To the end-user, the integration of the two pieces of content (text and
pictures) is seamless, despite the fact that they were taken from two very different
sources. The viewer cannot distinguish that the image has originated at and been
imported from a separate site and may never come to know that it was not created
or stored at the site being visited by him. In this respect, inlining is different from
deep linking where the user is usually aware that he has “changed pages”, either
from the different appearance of the newly accessed page, or from the change in the
URL address display in the Web browser.
In the USA the Dilbert dispute, though did not involve the filing of a complaint or any
judicial determinations, is one of the few inline controversies and thus serves as a
point of discussion for these links. Dan Wallach created “The Dilbert Hack Page”, a
site that presented the Dilbert comic strip via inlining to the United Media Web site,
where the comic strips were located. The images appeared on Wallach’s Web site
via inlining. United Media, speaking for United Feature Syndicate, Inc., owner of
the copyright in the comic strip, requested by letter to Wallach to discontinue the
link. United Media contended that “the names or likenesses of the Dilbert comic
strips and all other United Media intellectual property cannot be used – on the World
Wide Web or elsewhere – without the express, written consent of UFS”. United
Media asserted that Wallach’s inline links to copyrighted material constituted an
unauthorized display of a copyrighted work, a violation of the Copyright Act. To
avoid litigation, Wallach removed the page.
In, Leslie A. Kelly v. Arriba Soft Corporation [Case No. 00-55521, US Court of
Appeals for the Ninth Circuit], a visual search engine (ditto.com, formerly known as
Arriba) crawled the web to produce thumbnail images of photographs and used
them to link to the original pictures. Leslie Kelly, a professional photographer was
upset that the search engine reproduced thumbnails of the images on his site which,
when clicked, produced the full-size image in a window on Arriba’s site. The page
used so-called in-line linking to display the original full-sized image, surrounded by
20 text describing the size of the image, a link to the original web site, the Arriba banner,
and Arriba advertising. Kelly filed suit on April 6, 1999, alleging copyright Linking, Inlining and
Framing
infringement. A California District Court ruled that both the creating of the
thumbnails and the inline-linking is justified under the fair use doctrine. On appeal by
Kelly, the Ninth Circuit Court of Appeals affirmed and reversed in part the
district court decision. The display of the tiny images was deemed to be legal fair
use, but not the inline-linking. On February 6, 2002, the US Court of Appeals for
the Ninth Circuit held that that unauthorized inline linking to images residing on the
copyright owner’s Web site violates the copyright owner’s right of public display.
The court rejected defendant’s fair use defence and stated that inline linking
diminishes the opportunities of the copyright owner to sell or licence the images on
his own Web site. The Electronic Frontier Foundation (EFF) filed a brief, thereafter,
urging the court to reconsider the part of its ruling on inlining to copyrighted
images. The EFF argued that the ruling against “inline linking” threatened to transform
everyday Web site activities into copyright infringements. In July 2003 the court
withdrew that portion of its opinion which was relating to inlining, leaving it to the
lower court to take a fresh look at the issue. It is now open for the court to reconsider
whether inlining is violative of copyright or not.
Please answer the following Self Assessment Question.
Self Assessment Question 2 Spend 3 Min.
Content on the Internet is protected by copyright law. Do you agree?
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
9.5 FRAMING
9.5.1 What is Framing?
Web browsers allow Web authors to divide pages into “frames”. A frame is an
independently controllable window on a Web site through which pages from another
Web site can be viewed. Since it is possible for a site to call a frame’s contents from
a different location, a programmer might “frame” another’s Web content beneath his
own navigation or banners. This allows him to use creative content owned by another
entity to sell banner advertising on its on site. A typical use of frames is to have one
frame containing a selection menu in one frame and another frame that contains the
space where the selected (linked to) files appear.
In Washington Post Co. v. Total News, Inc. [97 Civ.1190 (S.D.N.Y.)] The
Washington Post filed a complaint against an online news site, Total News, the
publisher of the Web site www.totalnews.com. TotalNews, an aggregator of web
news sources, employed frame technology to display news sites from around the
Web. Total News had created pages with frames that contained hyperlinks to other
news Web sites, such as The Washington Post, CNN, USA Today, Time and Sports
Illustrated, etc. Web users, therefore, could use www.totalnews.com to access
articles from various sources. The TotalNews Web site generated its revenue from
advertising, which it placed in a static border frame. Clicking on a hyperlink to ‘The
Washington Post’ within the Total News Web page displayed the content of The
Washington Post page within a frame that was surrounded by TotalNews’s URL,
logo, banner, advertisements and information. Six content providers – CNN, Time-
Warner, Reuters, The Washington Post, The Wall Street Journal and the LA Times,
sued TotalNews, claiming that such framing was the Internet equivalent of pirating
copyrighted material. They also alleged misappropriation, trademark infringement
and trademark dilution. The plaintiffs complained that TotalNews has designed a 23
Intellectual Property parasitic Web site that republishes the news and editorial content of other Web sites
Protection in
Cyberspace
in order to attract both advertisers and users. Total News settled the case by agreeing
to link to, rather than frame, the Post’s Web pages of various plaintiffs and the court
did not have an opportunity to decide any of the legal issues that were raised by the
plaintiffs.
In, Futuredontics Inc. v. Applied Anagramic Inc. [1997 46 USPQ 2d 2005 (C.D.
Calif. 1997)] Applied Anagramic, Inc., a dental services Web site, framed the content
of a competing site. The frames included information about Applied Anagramic as
well as its trademark and links to all of its Web pages. A district court ruled that the
addition of the frame somewhat modified the appearance of the linked site and such
modifications could, without authorization, amount to infringement.
Please answer the following Self Assessment Question.
Self Assessment Question 4 Spend 3 Min.
What do you mean by frame in context of cyberspace?
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
9.6 SUMMARY
z Almost everything on the Net is protected by copyright law.
z Linking is of two types; surface and deep linking.
z Inlining or ‘In-line linking’ enables a Web page to summon different elements
from diverse pages or servers to create a new Web page.
z Inlining is different from deep linking where the user is usually aware that he has
“changed pages”, either from the different appearance of the newly accessed
page, or from the change in the URL address display in the Web browser.
z A frame is an independently controllable window on a Web site through which
pages from another Web site can be viewed.
z The technologies of linking, inlining and framing could be abused to violate
someone’s copyright.
25
Intellectual Property z Moral rights which are included within the overall doctrine of copyright could
Protection in
Cyberspace
also be jeopardized by these technologies.
26
UNIT 10 P2P NETWORKING
Structure
10.1 Introduction
10.2 Objectives
10.3 What is Peer-to-peer Network?
10.4 Various P2P Networks and their Legal Implications
10.4.1 Napster
10.4.2 Post Napster P2P Networks
10.1 INTRODUCTION
Peer-to-peer (P2P) technology, with which users can use the Internet to exchange
files with each other directly or through a mediating server, is seen as a threat to
copyright industry. Recently, P2P networks such as Napster, Gnutella and Kazaa
have led to massive reproduction and distribution of copyrighted works. Armed with
digital and communication technologies, ordinary people have the competence to set
up huge distribution networks of digital products in which everything is available for
free and the producer gets nothing.
On the information superhighway this loss of control over their own digital products
has sent the digital product industry into shock and panic. In recent times the industry
has supplied figures of piracy that, if believed, are massive by any standards. This
trend, if continues, has the potential of disrupting the traditional balance in the copyright
regime and also alter the business models of our society. If taken to extreme, the
P2P networks could land us in a situation where there are no working artists or
programmers.
10.2 OBJECTIVES
After reading this unit, you should be able to:
z explain the concept of peer to peer network and the different kind of P2P
networks along with their legal implications;
z describe the damage cause by P2P networks and the reaction of copyright
industry; and
z explain the nexus or relationship between Copyright law and Digital technology,
and the growing need for the balance of the two.
27
Intellectual Property
Protection in 10.3 WHAT IS PEER-TO-PEER NETWORK?
Cyberspace
Peer-to-peer (P2P) is defined as two or more computers connected by software
which enables the connected computers to transit files or data to other connected
computers. In recent usage, P2P has come to describe applications in which users
can use the Internet to exchange files with each other directly. The P2P connection
means that it’s a direct link, the file is being directly transferred from one computer to
the other, it is not going through any mediating server.
A P2P network does not have the notion of clients or servers, but only equal peer
nodes that simultaneously function as both “clients” and “servers” to the other nodes
on the network. This model of network arrangement differs from the client-server
model where communication is usually to and from a central server. Napster, Gnutella
and Kazaa are popular examples of this kind of P2P software.
Please answer the following Self Assessment Question.
Self Assessment Question 1 Spend 3 Min.
What are P2P networks?
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
With Napster gone, what the world had at that point was something like 100 million
people around the globe hungry to share more and more files. It was only a matter of
time before another system came along to fill the gap. One distinguishing feature of
the P2P services that came after Napster was that they had no central server 29
Intellectual Property maintaining direct file listings of all the files. The other distinction was that Napster
Protection in
Cyberspace
was related to music files and that too specifically mp3 files. But most of these new
softwares, Gnutella, Kazaa, etc., allow any type of files to be transmitted and
downloaded.
Gnutella is an underground variant of Napster whose popularity has risen dramatically
in the wake of the litigation in which Napster had been embroiled. Gnutella has
dozens of clients available. Some of the popular Gnutella clients include: BearShare,
Gnucleus, LimeWire, Morpheus, WinMX and XoloX. Given that there is no central
server to store the names and locations of all the available files first, one has to install
a version of Gnutella on one’s computer and type in the name of the song/film or any
other file one wants to find. The machine knows of at least one other Gnutella machine
somewhere on the network because it has been told the location of the machine by
typing in the IP address, or because the software has an IP address for a Gnutella
host pre-programmed in. The machine sends the file name typed in to the Gnutella
machine(s) it knows about. These machines search to see if the requested file is on
the local hard disk. If so, they send back the file name (and machine IP address) to
the requester. At the same time, all of these machines send out the same request to
the machines they are connected to, and the process repeats. After getting all of the
search results the machine directly contacts the computer that has the desired file. It
is an extremely simple and clever way of distributing a query to thousands of machines
very quickly.
Kazaa is the latest version in the P2P technology which is spreading like a
wildfire. Kazaa was originally established in the Netherlands. Kazaa network is
built on a technology called the Fast-track technology. This is different from Gnutella
in the manner that this software actually converts certain good quality computers in a
particular network into supernodes which perform the listing function. The P2P
searches occur through users with these supernodes. A supernode contains a list of
some of the files available and where they are located. The Kazaa software first
searches the nearest supernode to a user and then refers his search to other supernodes
and so on. This process is designed to make searching as fast as possible and means
that searching will take place only through the files that have been indexed by the
supernodes.
In Buma & Stemra v. Kazaa [Buma & Stemra v. Kazaa, Cause list number KG
01/2264 OdC (Judgement passed by the President of the Amsterdam District
Court on November 29, 2001)], an action for copyright infringement was brought
against Kazaa by Buma & Stemra in a Dutch court. The plaintiffs, Buma & Stemra,
a Dutch copyright licensing group, sued Kazaa for the distribution of software which
allowed users to make unauthorized copies of copyrighted works. In November
2001, the district court of Amsterdam ruled in favour of the copyright industry and
ordered Kazaa to remove its website. Kazaa, thereupon, filed an appeal vide matter
Kazaa v. Buma & Stemra[Kazaa v. Buma & Stemra, Judgement delivered by the
Amsterdam Court of Appeal on March 28, 2002.] in the Amsterdam court of
appeal. The court of appeal decided in Kazaa’s favour and reversed the findings of
the district court stating that the Kazaa technology has many other substantial and
legitimate uses such as trading jokes and personal photographs apart from the fact
that it could be used for copyright violations.
The latest in the series of legal battles against the P2P file sharing softwares is MGM
30 Studios, Inc. v. Grokster, Ltd. [545 U. S. , 125 S. Ct. 2764 (2005)] which is a
United States Supreme Court case in which the Court unanimously held that defendant P2P Networking
P2P file sharing companies Grokster and Streamcast could be sued for inducing
copyright infringement for acts taken in the course of marketing file sharing software.
The plaintiffs were a consortium of 28 of the largest entertainment companies (led by
Metro-Goldwyn-Mayer studios). The case has been called the most important
intellectual property case in decades.
Grokster came before the Supreme Court having already won in two previous courts.
The United States District Court for the Central District of California originally
dismissed the case in 2003, citing the Betamax decision. Then a higher court, the
Ninth Circuit Court of Appeals, upheld the lower court’s decision after acknowledging
that P2P software has legitimate and legal uses. Finally the Supreme Court stated,
“We hold that one who distributes a device with the object of promoting its use to
infringe copyright, as shown by clear expression or other affirmative steps taken to
foster infringement, is liable for the resulting acts of infringement by third parties.”
The Court unanimously concurred that Grokster could be liable for inducing copyright
infringement. The principle laid down by the court is that it has to be shown that the
distributors of the file sharing program have advertised and/or otherwise induced its
use for copyright infringement; if this intent can be shown, additional contributory
aspects may be relevant.
The decision has been hailed by many as striking a fair balance between the need to
respect the intellectual property rights of artists, and the benefits of allowing and
promoting technological innovation. Indeed, the decision does seem to leave sufficient
leeway for developers in creating new products, as it establishes guidelines to
compliance with existing copyright law, and holds liable the distributors rather than
developers for copyright infringement. Conversely, others have criticized the new
test for its apparent vagueness.
Please answer the following Self Assessment Questions.
Self Assessment Question 3 Spend 3 Min.
1. Name some popular Gnutella clients?
..............................................................................................................
..............................................................................................................
..............................................................................................................
..............................................................................................................
..............................................................................................................
..............................................................................................................
2. .............................................. is the latest version in the P2P technology?
10.8 SUMMARY
z P2P technology is seen as a great challenge to copyright industry.
z P2P is defined as two or more computers connected by software which enables
the connected computers to transit files or data to other connected computers.
z Around the year 2000 Napster became very popular to download free music
from the Internet but ultimately the site had to shut down under a court order for
copyright violations.
z But newer P2P networks are very difficult to shut down, as they do not depend
on a central server unlike Napster.
z Copyright industry is trying to stop the damage by P2P networks through law
reform, litigation and technological measures.
35
UNIT 11 WEBCASTING
Structure
11.1 Introduction
11.2 Objectives
11.6 Summary
11.1 INTRODUCTION
Webcasting is the real-time transmission to the public in a digital format of
audio and audiovisual works. Webcasting over the Internet is similar to
broadcasting but uses special technology to reduce the size of the digital files
being sent. Webcasts are widely available to anyone with a computer connected
to the Internet. Webcasting opens new opportunities for authors and performers
to expose and market their works to new audiences, and for the public to enrich
their understanding and appreciation of cultures from around the world.
The world of broadcasting, as we have known it, is about to change with the leading
broadcasting organizations ready to jump on the Internet bandwagon. Webcasting
has a promise of presenting content which fits the slogan of ‘anything, anytime,
anywhere’. In view of the growing importance and widening reach of webcasting
and increasing incidents of piracy involving webcasting, it has become extremely
important for national laws and international conventions to address this phenomenon
which till now has been ignored. In this light this unit examines the issues of:
36
Webcasting
11.2 OBJECTIVES
After reading this unit, you should be able to:
z explain the concept of web casting;
z explain the context of distribution on the internet, the emergence of web casting;
z distinguish between broadcasting and web casting;
z describe the legal protection of web casts under the International framework,
and Indian framework both; and
z analyse and suggest the merits and demerits of the Indian protection.
C o n te n t d istrib u tio n o n
th e In te rn e t
D o w n lo a d s W e b c a sts
S im u lc a stin g V id e o /au d io o n
P2P dem and
O n -d e m a n d R e a l-tim e
s e rv ic e s tre a m in g
From a technical perspective, there are two principal methods for users to access
sound and images (or a combination of both) over the Internet. The first are
downloads, whereby a file on a server is accessed by a remote user, transmitted
over the Internet in the form of “packets” to the user’s machine and saved there
locally (in most cases on the hard drive).1
The second is streaming, which has been defined as an “Internet data transfer technique
that allows users to see and hear audio and video files without lengthy download
times. The host or source ‘streams’ small packets of information over the Internet to
the user, who can access the content as it is received. The stream may be a real time
(live) transmission or it may be an archived file”. The common underlying feature of 37
Intellectual Property all different types of streaming, which distinguishes this method of transmission from
Protection in
Cyberspace
downloads, is that, in the case of streaming, files are not saved locally on the user’s
machine.
In the case of broadcasting, users can simply access the broadcast by switching on
the receiver as the signal transmitted by the broadcasting station is direct and present,
whereas, in webcasting, users must access a server and incite its facilities to transmit
back the information.
Unless specific technological restrictions are applied, webcasts can be accessed
from any point that has Internet access. Since Internet is available globally, webcasts
can be accessed from almost any point on the planet earth. This is the major difference
in term of geographical coverage from broadcasts, be it via satellite, cable or over
the air which have an inherent limitation in their reach.
On the Internet, there are no restrictions on the number of programs offered. Capacity
can be obtained at relatively short notice and allows for a flexible adaptation to the
level of demand. Consequently, the initiators of streams face no significant initial
39
barrier to entering the market. Webcasting activities can be initiated with modest
Intellectual Property investments, albeit with a limited capacity of simultaneous listeners or viewers.
Protection in
Cyberspace
Streaming services can be adapted to the consumers’ preferences, for example,
distributing niche programs for groups of consumers or basing the contents,
arrangement and presentation of the service on intelligence gathered during earlier
visits by the consumers.
One of the main characteristics of webcasting is that the transmission is always
interactive at the machine level. The transmitting server is in active contact with the
receiving machine, verifying the success of the transmission, exchanging status reports.
This is not the case with broadcasting, where the main transmission is only one way.
i. by any means of wireless diffusion, whether in any one or more of the forms of
signs, sounds or visual images; or
ii. by wire; and includes a re-broadcast.
Further, communication to the public is defined as:
‘Communication to the public’ means making any work available for being seen or
heard or otherwise enjoyed by the public directly or by any means of display or
diffusion other than by issuing copies of such work regardless of whether any member
of the public actually sees, hears or otherwise enjoys the work so made available.
Section 37 of the Copyright Act, 1957 which protects broadcasts reads:
Broadcast reproduction right.—
1. Every broadcasting organization shall have a special right known as “broadcast
reproduction right” in respect of its broadcasts.
2. The broadcast reproduction right shall subsist until twenty-five years from the
beginning of the calendar year next following the year in which the broadcast is
made.
3. During the continuance of a broadcast reproduction right in relation to any
broadcast, any person who, without the licence of the owner of the right does
any of the following acts of the broadcast or any substantial part thereof,—
a. re-broadcasts the broadcast; or
b. causes the broadcast to be heard or seen by the public on payment of any
charges; or
c. makes any sound recording or visual recording of the broadcast; or
d. makes any reproduction of such sound recording or visual recording where
such initial recording was done without licence or, where it was licensed,
for any purpose not envisaged by such licence; or
e. sells or hires to the public, or offers for such sale or hire, any such sound
recording or visual recording referred to in clause (c) or clause (d), shall,
subject to the provisions of section 39, be deemed to have infringed the
broadcast reproduction right.
The minimum rights granted to broadcasting organizations under the Copyright Act
and the Rome Convention are the rights to authorize or prohibit: (a) the re-
broadcasting of their broadcasts; (b) the fixation of their broadcasts; (c) the
reproduction of fixations of their broadcasts; and (d) the communication to the
public of television broadcasts if such communication is made in places accessible to
the public against payment of an entrance fee.
The object of the protection under article 13 of Rome Convention, 1961 and section
37 of the Copyright Act, 1957 is not defined but from the definition of “broadcasting”
in section 2(dd), it appears that it is the signals constituting the wireless transmission
of images and/or sounds. Accordingly, the object of the protection is the signals
themselves and not to the content of what they transmit. The content part is 43
Intellectual Property independently protected as such. So, protection is granted to broadcasting
Protection in
Cyberspace
organizations for their signals independently of the copyright and related rights
protection of the content.
To protect webcasting, the definition of “broadcasting” in the Copyright Act should
be updated in two ways. First, the definition should encompass ancillary data that
may be included in the transmission. As noted above, Internet transmitting organizations
may send related and ancillary text, graphics and images along with the audio or
audiovisual works. Such data may include, for example, information concerning the
works being performed; information concerning the performers; links to the Web
sites of online retail establishments from which the listener or viewer can purchase
the particular phonogram or audiovisual work being broadcast, or tickets to concert
performances, etc. As a whole, this capacity results in rich and creative forms of
broadcasting content which merit full protection.
Article 14 of the Rome Convention states that the term of protection shall last at
least until the end of a period of twenty years computed from the end of the year in
which the broadcast took place. Section 37 of the Copyright Act, 1957, on the
other hand, states the term to be twenty five years. So, the term of protection for
webcasts should be coextensive with the term of protection for other broadcasts.
The legal framework applicable to broadcasting was normally specific and well
defined. In most countries the broadcasting sector was, and it remains today,
extensively regulated. The rules to which broadcasting organizations are subject
range from the licence required for the activity as such, procedures for the allocation
of frequencies, rules relating to the public mandate, regulation of the content itself
like language quotas, local cultural content, or rules for the protection of young people.
Because of technology the same activities can now be undertaken and transmitted
over the Internet without any rules or regulations. It is just a matter of time when
national governments would realise the importance of regulating webcasting otherwise
the entire regulations for the broadcasting sector will be rendered redundant.
Please answer the following Self Assessment Question.
Self Assessment Question 3 Spend 3 Min.
What are the rights granted to broadcasting organization?
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
11.6 SUMMARY
z Webcasting, also known as ‘streaming’, is the process of digitally transmitting
44 musical recordings, and radio and television broadcasts over the Internet.
z Broadcasting organizations have in the past been granted protection for the Webcasting
result of their investment, their entrepreneurial efforts and their contribution to
the diffusion of culture and their public information service.
z The same interests that initially impelled protection of copyright and neighbouring
rights for broadcasting now compel adoption of equivalent protections for
webcasting.
z Webcasters create and transmit valuable content reflecting creativity and
authorship, as do traditional broadcast media.
z Webcasts and webcasters do need legal protection for their activities.
z In view of convergence of various technologies and services it is only appropriate
to assimilate new activities of webcasting to traditional broadcasting.
45
UNIT 12 DOMAIN NAMES
Structure
12.1 Introduction
12.2 Objectives
12.3 What is a Domain Name?
12.4 Types of Domain Names
12.4.1 generic Top-level Domain (gTLD)
12.4.2 country code Top Level Domains (ccTLD)
12.1 INTRODUCTION
Originally the purpose of Internet domain names was to locate a web site on the
Internet. But in today’s world the importance of domain names has gone much beyond
web site location. They are used to identify the goods and services which a particular
company is offering, be it online or offline. So, domain names serve the purpose of
trademarks. Registration of domain names being not as stringent as that of trademarks
led to the practice of cybersquatting and disputes started emerging regarding their
abusive registration. Courts have responded positively to such disputes and have
resolved them by applying the principles of trademark and passing off laws.
Alternatively, the remedy exists in the form of arbitration as well.
12.2 OBJECTIVES
After reading this unit, you should be able to:
z describe the term Domain Name and its different kinds;
z explain cybersquatting;
z discuss how domain name disputes can be resolved through courts;
z explain the process of resolving such disputes through arbitration under the
UDRP rules; and
46
z compare between traditional litigation in courts and under arbitration rule.
Domain Names
12.3 WHAT IS A DOMAIN NAME?
A domain name is the address of a Web site like www.tata.com is the address of the
famous business house Tata. The purpose of a domain name is to locate a Web page
on the Internet. Every Web page has a unique address just in the same manner as
every telephone has a unique number. If you want to call someone you need to dial
that person’s telephone number. In much the same way, if you need to access a Web
site, you have to type out its IP number like 192.0.34.166. Since Web sites are very
many, it is inconvenient to remember them by numbers, a system evolved under
which a name is mapped to the concerned number or IP address. So, simply put, a
domain name is the linguistic counterpart of what is known as an Internet Protocol
(IP) address. Thus, today, instead of typing a numeral, one has merely to type in
www.tata.com. Internet Corporation for Assigned Names and Numbers (ICANN),
which is a non-profit corporation, has the overall responsibility for managing the
Domain Name System.
place electronically. So, the redressal is much faster than normal litigation in courts.
Another advantage of UDRP is that, by virtue of agreements between ICANN,
domain name registrars and registrants, the awards are binding thus making their
enforcement easy.
The disadvantage of UDRP is that you cannot claim any monetary damages even in
cases of bad faith registrations. Moreover, there is no provision of injunctive relief.
Both these can potentially be obtained by litigating a dispute in courts. So, for dispute
resolution, one can exercise either of these two options weighing their respective
pros and cons as per his requirements.
Please answer the following Self Assessment Question.
Self Assessment Question 4 Spend 5 Min.
Distinguish between Traditional Litigation in courts and under Arbitration rule?
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
...................................................................................................................
12.8 SUMMARY
z A domain name is the linguistic counterpart of what is known as an Internet
Protocol (IP) address.
z Broadly domain names are of two types — one, generic top-level domain
(gTLD); two, country code top level domains (ccTLD).
z Domain names have acquired the same importance as that of trademarks for
identifying a business or an entity.
z Bad faith registration of a trademark belonging to another is known as
cybersquatting.
z Mainly, domain name disputes could either be resolved by litigation in a court of
competent jurisdiction or referring the matter to arbitration under the UDRP.
z The Supreme Court of India is of the view that Law of trademarks and passing
off applies to domain name disputes.
z Domain name disputes could also be referred to resolution by arbitration under
the UDRP.
z In India, for the .IN category disputes could be referred to arbitration under the
dispute resolution policy framed by C-DAC.
56
Domain Names
12.10 ANSWERS AND HINTS
Self Assessment Questions
1. A domain name is the address of a website like www.tata.com is the address of
the famous business house TATA. The purpose of domain name is to locate a
webpage on the Internet.
2. a) generic top level domain (gTLD)
b) Country code top level domain (ccTLD).
3. The practice of registering and cleaning right over internet domain names that
are arguably not for the taking is known as cyber squatting.
4. See sub section 12.5.3.
Terminal Questions
1. Refer to section 12.5 of the unit.
2. Refer to section 12.4 of the unit.
3. Refer to sub section 12.5.2 of the unit.
57
UNIT 13 LIABILITY OF INTERNET
SERVICE PROVIDERS
Structure
13.1 Introduction
13.2 Objectives
13.3 ISPs and their Role in Communication on the Internet
13.4 Various Approaches for Determining the Liability of ISPs
13.4.1 Horizontal Approach
13.4.2 Non-horizontal Approach
13.5 ISP Liability for Copyright Infringement: Indian Position
13.5.1 ISP Liability under the Copyright Act, 1957
13.5.2 ISP Liability under the Information Technology Act, 2000
13.5.2.1 Classification of ISPs under the IT Action, 2000
13.5.2.2 Filtering ISP Liability through the IT Act
13.5.2.3 How can an ISP Qualify for Exemption from Liability for Copyright
Infringement?
13.6 Criticism of Provisions of IT Act vis-à-vis ISP Liability
13.7 Why are ISPs Sued for Copyright Infringements on the Internet?
13.8 Summary
13.9 Terminal Questions
13.10 Answers and Hints
13.1 INTRODUCTION
The issue of on-line copyright infringement liability for ISPs has been around since
the use of the Internet started to expand rapidly in the early 1990’s and has been the
subject of extensive debates worldwide. Should ISPs be held responsible for illegal
activities committed by their users? To what extent are ISPs responsible for third
party material put on the Internet by users of their facilities?
Because of the inherent difficulties of enforcing copyrights against individual Internet
users worldwide, the copyright owners have found the answer to this problem in
placing legal liability for copyright infringement on those who allow and enable Internet
copyright pirates to exist, namely the Internet service providers (ISPs). For the content
owners, it is practical to sue the ISPs as they are in a position of policing the Internet.
On the other side of the argument, ISPs are passive carriers similar to
telecommunications companies and, therefore, should be granted some limitation
from liability with regard to copyright infringement. In addition, to make ISPs liable
could stifle the growth of the Internet.
13.2 OBJECTIVES
After reading this unit, you should be able to:
z appreciate the role of ISPs in communication on the Internet;
5
Management of IPRs in z describe the various approaches for determining the liability of ISPs for eg the
Cyberspace
horizontal approach, the non-horizontal approach;
z explain the liability of ISPs for Copyright infringement under the Copyright Act,
1957, and The Information Technology Act, 2000.
8
................................................................................................................
................................................................................................................ Liability of Internet
Service Providers
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
14.1 INTRODUCTION
As a reward for their creativity and investment, the copyright system grants creators
exclusive rights in their works. That means third parties are prohibited from using
works in a manner that is covered by the exclusive rights, without obtaining permissions
from the right owners. Right owners will usually grant such permissions in exchange
for compensation and on the basis of certain terms and conditions of use. These
conditions are recorded in contractual arrangements concluded between right owners
and users. But the popularity of personal computers, the Internet and file sharing
tools have made the distribution of copyrighted digital media files simple. A lot of
digital products like music, films, software, text, images, etc. are available on the
Internet and they are freely available through various network architectures. In the
offline world these products are protected by copyright law and are available for a
price. But on the Internet they are mainly available for free through various P2P
networks. This free distribution and downloading is frequently referred as online
piracy of copyrighted material.
The availability of multiple perfect copies of copyrighted materials is perceived by
much of the media industry as a threat to its viability and profitability, particularly
within the music and movie industries. Digital media publishers typically have business
models that rely on their ability to collect a fee for each copy made of a digital work,
and sometimes even for each performance of said work. This digital technology has
led to a loss of control by the owners over their own copyrighted products. But the
remedy for this loss of control is increasingly being sought in the technology itself.
DRM includes within its ambit the various technological tools designed for digital
media publishers as a means to allow them to control any duplication and dissemination
of their content. The digitization of content, together with the increased reliance by 15
Management of IPRs in rightsholders and intermediaries on technological adjuncts is influencing the traditional
Cyberspace
means of licensing intellectual property rights. This application of technology to facilitate
the exploitation of rights is commonly referred to as “digital rights management”
(DRM). In effect, DRM systems aim to automate the process of licensing works
and of ensuring that license terms are complied with.
Legal support for DRM systems is to be found in the WIPO Copyright Treaty (WCT)
and the WIPO Performances and Phonograms Treaty (WPPT). In 1996, two treaties
were adopted by consensus by more than 100 countries at WIPO: the WIPO
Copyright Treaty (WCT) and the WIPO Performances and Phonograms Treaty
(WPPT) (commonly referred to as the “Internet Treaties”). The WIPO Internet
Treaties are designed to update and supplement the existing international treaties on
copyright and related rights, namely, the Berne Convention and the Rome Convention.
They respond to the challenges posed by the digital technologies and, in particular,
the dissemination of protected material over the global networks that make up the
Internet.
Because the technology holds the promise of curbing rampant piracy of copyright
works, rights owners have placed a great deal of faith in DRM as a means of enforcing
their rights in the digital environment. Substantial investments and efforts have been
made in recent years with a view to the development and deployment of the DRM
systems.
14.2 OBJECTIVES
After reading this unit, you should be able to:
z define the meaning of digital rights management;
z explain the elements and purpose of digital rights management;
z describe right management information;
z describe the technological protection measures;
z explain the legal protection against circumvention of technological protections
measures;
z explain the conflict of DRM with principal of Copyright; and
z analyse the future of digital rights management.
16
Although online content is protected by copyright laws, policing the Web and catching
law-breakers is very difficult. The purpose of DRM is to prevent illegal distribution
of paid content over the Internet. DRM products were developed in response to the Digital Rights
Management
rapid increase in online piracy of commercially marketed material, which proliferated
through the widespread use of various Internet based technologies like P2P and
hyper linking.
DRM systems are aimed at enforcing certain business rules in respect of the use of
content protected by copyright. Typically, these business rules concern questions
like, who is entitled to access a work, at what price and on which terms. These
terms address questions such as whether a user is entitled to make any copies of the
work; or how long a user is entitled to access a work; whether a user can excerpt
the work or make changes to it; whether a user can access the work on one or on
multiple devices, etc. In effect, DRM systems aim to automate the process of licensing
works and of ensuring that license terms are complied with.
Since people who download contents from the Internet without paying for it are
potentially very many, DRM technology focuses on:
z Identifying the content and its owner
z Making it impossible to steal Web content in the first place which is a much
surer approach to the problem than the hit-and-miss strategies aimed at
apprehending online poachers after the fact
z Making it possible to identify infringements of work and/or who is responsible
for it so as to enforce one’s rights
The elements associated with DRM systems are:
(1) Identifiers, i.e., numbers or codes permitting the unique identification of a piece
of content (comparable to, for example, the ISBN number in case of books);
(2) Metadata, i.e., information about the piece of content which may include, for
example, the identity of the rights holder, the price for using the work, and any other
terms of use of the work; and
(3) Technological protection measures, i.e., systems designed to ensure that certain
usage rules are complied with, in particular those concerning access and copy control.
The first two are classified as ‘Rights Management Information’ and the third as
‘Technological Protection Measures’.
Please answer the following Self Assessment Question.
Self Assessment Question 1 Spend 3 Min.
What do you mean by digital rights Management?
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................ 17
Management of IPRs in
Cyberspace 14.4 RIGHTS MANAGEMENT INFORMATION
The primary requirement for the automated grant of rights in a digital context is that
the protected work and subject matter can be identified as such belonging to the
relevant authors and right holders and the licensing terms must also be available
electronically. On the one hand, this information must be easily readable for a potential
user and on the other hand it should not be easily erasable so that it remains embodied
during the subsequent stages of exploitation in connection with the work. In addition,
rights holders must be able to prove their authorship and ownership of rights in case
of infringement; the relevant information should not be discernible to third parties
and should remain embodied within the work even after the latter has been adapted,
or where parts of the work are used.
This is possible only if certain data which identifies the work, the author of the work,
the owner of the work, or information about the terms and conditions of use of the
work which are necessary for licensing and payment of licence fee, are embedded in
the work. This data is classified as ‘rights management information’ in the WIPO
Copyright Treaty (WCT) and the WIPO Performers and Phonograms Treaty
(WPPT).
Article 12(2) of the WCT defines rights management information as, “Information
which identifiers the work, the author of the work, the owner of any right in the
work, or information about the terms and conditions of use of the work, and any
numbers or codes that represents such information, when any of these items of
information is attached to a copy of a work or appears in connection with the
communication of a work to the public.”
If we look on to the offline world ‘rights management information’ is not all that
unknown. Identifiers have been used in case of books and cassettes by way of
putting the name of author, publisher, price tag and ISBN. But in the digital age
copyright products like video films, sound records, software, text, etc. have become
container-less. They increasingly appear as part of ‘information’ in the form of bits
and bytes in cyberspace. So, ‘rights management information’ has to be imbedded in
the work itself.
Moral rights which are a part and parcel of the overall copyright philosophy give
rights to the author of a work to be identified as such and to object to any distortion
or mutilitation of his work. In the digital age it has become very easy and within the
reach of ordinary people to detach the author’s name from the work and put someone
else’s name in its place; manipulate with a work so as to distort or mutilate the same.
So, ‘rights management information’, in this regard, becomes extremely important
from the angle of moral rights as well.
A considerable amount of work is being done on ‘copyright tagging’ and developing
‘unique identifiers’ so that the owners of digital material will be able to identify their
property wherever it is and however it has been modified or distorted. Moreover,
this technology, together with the development of ‘intelligent agents’ or ‘bots’ which
are capable of trolling around cyberspace identifying these tags, will help track the
copyright material across the Internet wherever it may be.
‘Rights management information’, as a technological adjunct providing legal support
to network based rights management systems is expected to enhance the ability of
18
rights holders to exploit their property on the Internet, and allow consumers to rely Digital Rights
Management
on the accuracy of the information they receive so they can feel secure transacting
online.
As this ‘rights management information’ is the result of a technology it is also possible
to erase the same with the help of technology itself. Therefore, legal recognition and
protection to rights management information have been provided in WCT and WPPT
and have come up in a number of national legislations which penalize anybody tampering
with such ‘rights management information’ employed. Contracting parties to the
Internet treaties have agreed to provide legal remedies against any kind of removal
or alteration of any of the above information as well as distribution or communication
to the public of copies of work with such removals or alterations. Art. 12(1) of
WCT states, “Contracting Parties shall provide adequate and effective legal remedies
against any person knowingly performing any of the following acts knowing, or with
respect to civil remedies having reasonable grounds to know, that it will induce,
enable, facilitate or conceal an infringement of any right covered by this Treaty or the
Berne Convention: (i) to remove or alter any electronic rights management information
without authority; (ii) to distribute, import for distribution, broadcast or communicate
to the public, without authority, works or copies of works knowing that electronic
rights management information has been removed or altered without authority.” In
this direction suitable amendments have been proposed be made in the Indian
Copyright Act on lines of the WCT and WPPT.
Please answer the following Self Assessment Question.
Self Assessment Question 2 Spend 3 Min.
Define Right Management Information?
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
14.9 SUMMARY
z DRM includes within its ambit the various technological tools designed for digital
media publishers as a means to allow them to control any duplication and
dissemination of their content.
z Legal support for DRM systems is to be found in the WIPO Copyright Treaty
(WCT) and the WIPO Performances and Phonograms Treaty (WPPT).
z DRM includes all the technical systems designed to facilitate the management
of rights in respect of digital content.
z The purpose of DRM is to prevent illegal distribution of paid content over the
Internet.
z By ‘rights management information’ is meant all the embedded data in any digital
product which identifies the work, its author and owner and the terms and
conditions its of sale/use.
z Technological protection measures include the technical means which attempt
to restrict the use of a digital product only to an authorized person.
z In addition to the existing copyright protection various legal systems have
incorporated provisions in their copyright laws that prohibit and/or penalize the
circumvention of the technological protection measures.
z These anti-circumvention provisions have come in sharp conflict with the already
existing limitations on copyright system.
25
UNIT 15 SEARCH ENGINES AND THEIR
ABUSE
Structure
15.1 Introduction
15.2 Objectives
15.3 What are Search Engines?
15.4 The Process: How a Search Engine Works
15.4.1 Web Crawling
15.4.2 Indexing
15.4.3 Searching
15.4.4 Ranking of Web Pages by Search Engine
15.1 INTRODUCTION
Information and Internet are synonyms. It is difficult to conceive the gigantic quantum
of information present on the Internet. It runs in many billions of pages and still
growing. According to some estimates the Internet is doubling its size every four
months and with this increase in size comes a proportional increase in information.
Search engines have come to acquire a unique and important position on the overall
Internet system. They have become the presenters of information that is provided by
others. It is really interesting to know where all this information comes from or how
it is being sorted and selected by those who make it available to us.
All good search engines index hundreds of millions of pages, and respond to tens of
millions of queries each day. Google being the most used search engine today, in a
lot of respects ‘Googling’ has become synonymous with searching on the Internet. It
has become an autonomous concept and an independent form of leisure activity,
similar to ‘zapping’ through television channels. Anybody who cannot be found via
Google does not exist because of the Internet proverb, “if you are not indexed by a
26 search engine you simply do not exist”.
As search engine traffic achieved greater significance in online marketing plans, Search Engines and their
Abuse
consultants were brought in who were well versed in how search engines perceive a
web site. These consultants used a variety of techniques (legitimate and otherwise)
to improve ranking for their clients. The disputes arose when people started using
dishonest methods to manipulate the result of a search engine so as to get the best
ranking on a search engine.
How far are search engines regulated? Is any regulation necessary or desirable?
Search engines hardly find a mention in legal circles. However, search results that
are tendered by a search engine upon a query could often be manipulated and
distorted. The ones who obtain the highest position on a search engine may be using
clever tactics to mislead search engines. Legal consideration of various issues
surrounding search engines is indeed necessary to counter the abuse and to make
search engines more transparent and dependable and trustworthy. It is important for
users and consumers who depend on the information supplied by the search engines
to understand and be aware of the working of search engines.
15.2 OBJECTIVES
After reading this unit, you should be able to:
z describe the term search engine;
z explain the working of a search engine;
z explain the different ways of the abuse of the process; and
z discuss the ways how abuses of search engine be controlled through law.
27
Management of IPRs in Please answer the following Self Assessment Question.
Cyberspace
Self Assessment Question 1 Spend 3 Min.
Define the term search engine?
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
15.4.2 Indexing
After web crawling is done, indexing determines what counts as relevant words or
combinations of words; and non-relevant information, such as fillers and punctuation
marks, is deleted. The contents of each page are then analysed to determine how it
should be indexed (for example, words are extracted from the titles, headings, or
special fields called meta tags). Data about web pages is stored in an index database
28 for use in later queries. This enriched information forms the ultimate basic material
for the search engine. Some search engines, such as Google, store all or part of the Search Engines and their
Abuse
source page (referred to as a cache) as well as information about the web pages,
whereas some store every word of every page it finds, such as AltaVista. By no
means all the information that is present on the Internet is found and indexed by
search engines. According to some estimates, individual search engines index only
about 15% of all the information present on the Internet and all the search engines
together cover no more than 40% of all the available information.
Please answer the following Self Assessment Question.
Self Assessment Question 2 Spend 3 Min.
Name the different ways how a search engine works?
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
................................................................................................................
15.4.3 Searching
When a user comes to the search engine and makes a query, typically by giving key
words, the engine looks up the index and provides a listing of best-matching web
pages according to its criteria, usually with a short summary containing the document’s
title and sometimes parts of the text.
15.5.4 Cloaking
Cloaking is another search engine optimisation technique in which the content
presented to the search engine crawler is different from that presented to the users’
browser. cloaking is often used as a spamdexing technique, to try to trick search
engines into giving the relevant site a higher ranking; it could also be used to trick
search engine users into visiting a site based on the search engine description which
turns out to have substantially different – or even illegal – content.
Primarily when a web page is designed it is designed keeping in mind the end user.
But now, in order to get the attention of a search engine, webmasters also keep in
mind the search engine while designing a web page. This results in pages with too
many keywords and other factors that might be search engine ‘friendly’, but make
the pages inconvenient for actual end users to consume. So, designers sometimes
design pages solely for the search engines backed by pages for actual end users. As 31
Management of IPRs in such, cloaking is an important technique to allow webmasters to split their efforts
Cyberspace
and separately target the search engine spiders and end users. This technique also
has a potential to be used illegally.
15.8 SUMMARY
z Search engines have come to acquire a unique and important position on the
34
overall Internet system.
z World Wide Web search engines are special sites that are intended and designed Search Engines and their
Abuse
to help people find information stored on other sites.
z A search engine’s functioning is essentially composed of three elements—web
crawling, indexing and searching.
z Spamdexing refers exclusively to practices that are dishonest and mislead search
and indexing programs to give a page a ranking it does not deserve.
z Keyword stuffing, meta tag stuffing, cloaking, page hijacking and link spam are
some of the means through which spamdexing is practised.
z Through the trademark doctrine of ‘initial interest confusion’ abuse of search
engine’s process can be countered.
35
UNIT 16 NON ORIGINAL DATABASES
Structure
16.1 Introduction
16.2 Objectives
16.3 What are Databases?
16.4 Protection of Databases through Intellectual Property Laws
16.4.1 Copyright Protection of Databases
16.4.2 Protection of Databases with Technological Protection Measures
16.4.3 Sui Generis System for Protecting Databases
16.4.3.1 European Union Directive on Databases
16.4.3.2 The WIPO Draft Database Treaty
16.5 Other Legal Tools to Protect Databases
16.5.1 Database Protection under the Law of Contract
16.5.2 Database Protection under Tort Law
16.5.3 Database Protection under the Information Technology Act
16.6 Debate on Sui Generis Protection of Non Original Databases
16.7 Summary
16.8 Terminal Questions
16.9 Answers and Hints
16.1 INTRODUCTION
In the latter half of the 20th century, a new database industry came forth with the
development of computer science and communication technology. How to guarantee
and even accelerate the growth of this new industry has now become one of the
problems that demand prompt solution by policy-makers. In the database industry,
developers have to spend lots of human and material resources in collecting, sorting
out and arranging raw data before providing them to the public in an appropriate
way.
With the advent of the digital era and the consequent increase in the creation and
dissemination of electronic databases, calls have been made for a regime that would
protect even unoriginal databases, i.e. databases that lack the requisite originality/
creativity to qualify for copyright protection, but that nonetheless, involve a substantial
investment/effort. The database owners are constantly required to make substantial
investments to keep pace with the new developments. However it is argued that the
traditional intellectual property regimes have failed to protect the interests of the
database owners. Thus the database providers have lobbied with the lawmakers
across the world to provide sui generis right in the contents of their database so as
to safeguard the investments that they have to make in the collection, compilation
and management of the databases. While laying down an appropriate mode of
protection one must strike a balance among the interests of database developers,
their competitors and the public, by protecting the developers from competitors’
free ride on the one hand, and preventing the creation of any monopolisation on data
36 on the other.
In the digital world databases are difficult to make but very easy to copy and Non Original Databases
disseminate. Piracy or unauthorized use/copying are a potential disincentive to the
creation of new value-added databases. There is need for effective legal protection
of databases so that the database providers have confidence to willingly disseminate
data and thus make the information more readily accessible. Therefore, the main
concern of the database industry while soliciting enhanced protection has been an
effective remedy against the problem of infringement.
16.2 OBJECTIVES
After reading this unit, you should be able to:
z describe databases;
z explain the ways of protection of databases through intellectual property laws;
and
z discuss the issue on sui generis protection of non original databases.
................................................................................................................
................................................................................................................
16.7 SUMMARY
z Databases are collections or compilations of records that are organized for
easy access and retrieval.
z The databases are a vital element in the development of a global information
infrastructure and an essential tool in promoting economic, cultural and
technological advancement.
z Under the national laws on copyright of most countries, databases that constitute
an intellectual creation by reason of the selection or arrangement of its contents
(original databases) are protected.
z The criterion for determining originality varies from country to country.
z The database industry worldwide has consistently demanded for protection of
databases that do not conform to the norms of copyright through another sui
generis system of intellectual property protection.
z Apart from IPRs databases can also be protected using the legal tools of
contract, tort and unfair competition.
45
Management of IPRs in
Cyberspace 16.9 ANSWERS AND HINTS
Self Assessment Questions
1. A database is an organized collection of data. Databases are collections of
compilations of records that are organized for easy access and retrieval.
2. Feist v Rural Telephone (1991).
3. Section 2(1)(o) of the IT Act, 2000 defines ‘data’ as a representation of
information, knowledge, facts, concepts or instructions which are being prepared
of have been prepared in a formalised manner and is intended to be processed,
is being processed or has been processed in a computer system of computer
network, and may be in any form (including computer printout magnetic or
optical storage media, punched cards, punched tapes) or stores internally in the
memory of a computer.
4. Feist vs Rural Telephone services (1991).
Terminal Questions
1. Refer to sub section 16.4.3 of the unit.
2. Refer to sub section 16.3.1 of the unit.
3. Refer to section 16.5 of the unit.
46