patents.google.com

Urban et al., 2005 - Google Patents

  • ️Sat Jan 01 2005
Efficient Process or" Chilling Effects"? Takedown Notices Under Section 512 of the Digital Millennium Copyright Act

Urban et al., 2005

View PDF
Document ID
7741782785014323753
Author
Quilter L
Publication year
2005
Publication venue
Santa Clara Computer & High Tech. LJ

External Links

Snippet

The Online Copyright Infringement Liability Limitation Act (OCILLA), codified at 17 USCA § 512,'was passed in 1998 as a compromise between the nation's copyright and online service provider (OSP) 2 industries. 3 The legislation, passed as Title II of the t Jennifer …

Continue reading at papers.ssrn.com (PDF) (other versions)
  • 238000000034 method 0 title description 167

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/184Intellectual property management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce

Similar Documents

Publication Publication Date Title
Urban et al. 2005 Efficient Process or" Chilling Effects"? Takedown Notices Under Section 512 of the Digital Millennium Copyright Act
Bar-Ziv et al. 2018 Behind the scenes of online copyright enforcement: Empirical evidence on notice & takedown
Grimmelmann 2007 The structure of search engine law
Ginsburg et al. 2017 Liability for providing hyperlinks to copyright-infringing content: international and comparative law perspectives
Wu 2011 Collateral censorship and the limits of intermediary immunity
Lee 2008 Decoding the DMCA safe harbors
Stuart 2013 Google search results: buried if not forgotten
Ginsburg et al. 2018 Embedding Content or Interring Copyright: Does the Internet Need the Server Rule
Ziniti 2008 Optimal liability system for online service providers: How Zeran v. America online got it right and web 2.0 proves it
Sandeen 2002 The sense and nonsense of web site terms of use agreements
Slane et al. 2018 Debunking the myth of “not my bad”: Sexual images, consent, and online host responsibilities in Canada
Reid 2019 Considering Fair Use: DMCA’s Take Down & Repeat Infringers Policies
Pollack 2005 Rebalancing Section 512 to Protect Fair Users from Herds of Mice-Trampling Elephants, or A Little Due Process Is Not Such a Dangerous Thing
Laidlaw 2019 Mapping Current and Emerging Models of Intermediary Liability
Nathenson 2009 Looking for Fair Use in the DMCA's Safety Dance
Wang 2016 Regulating hosting ISPs’ responsibilities for copyright infringement: The freedom to operate in the US, EU and China
Latham et al. 2014 An Update on the Legal Implications of User-Generated Content: Facebook, YouTube, Twitter, and Instagram
Morton-Park 2023 Licensed to learn: Mitigating copyright infringement liability of generative ai systems through contracts
Kociubinski 2006 Copyright and the Evolving Law of Internet Search-Field v. Google, Inc. and Perfect 10 v. Google, Inc.
Zareh et al. 2018 theARTS
Ginsburg et al. 2019 AWte ARTS
Heath et al. 2012 Intellectual property liability of consumers, facilitators and intermediaries
Bayer 2008 Liability of internet service providers for third party content
López Martínez 2020 The Reconciliation of Secondary Liability for Trademark and Copyright Law Through Tort Law in Different E-Commerce Situations. a Comparative Study Between Us and EU Systems.
Fitzgerald et al. 2008 Search engine liability for copyright infringement