{"id":3473,"date":"2004-02-11T09:14:01","date_gmt":"2004-02-11T13:14:01","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/cmusings\/2004\/02\/11\/ellison-appeal-and-the-512-standards"},"modified":"2004-02-11T09:14:01","modified_gmt":"2004-02-11T13:14:01","slug":"ellison-appeal-and-the-512-standards","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/cmusings\/2004\/02\/11\/ellison-appeal-and-the-512-standards\/","title":{"rendered":"Ellison Appeal and the 512 Standards"},"content":{"rendered":"<p><a name='a601'><\/a><\/p>\n<p><P>The <A href=\"http:\/\/www.authorslawyer.com\/c-ellison.shtml\"><EM>Ellison v. Robertson&nbsp;<\/EM><\/A><EM>&nbsp;<\/EM>appeals <A href=\"http:\/\/www.authorslawyer.com\/ellison\/ca9slip.pdf\">decision<\/A> came yesterday.&nbsp; The district court <A href=\"http:\/\/www.authorslawyer.com\/ellison\/189fs2d1051.rtf\">noted <\/A>that AOL had no&nbsp;obligation to&nbsp;monitor&nbsp;the actions of users for infringements, terminate repeat infringers, or investigate such users; in fact, <A href=\"http:\/\/www4.law.cornell.edu\/uscode\/17\/512.html\">17 USC 512(i)<\/A> &#8220;only requires AOL to put its users on notice that they face a realistic threat of having their Internet access terminated.&#8221;&nbsp;The&nbsp;policy is only a &#8220;mere threat,&#8221; which never&nbsp;needs to be put into action.&nbsp; &nbsp;If 512(i) forced ISPs to punish people for infringement, then &#8220;most if not all of the notice and takedown requirements of the subsection (c) safe harbor would be indirectly imported and applied to subsections (a) and (b) as well.&#8221;&nbsp; (I&#8217;d say that <A href=\"http:\/\/blogs.law.harvard.edu\/cmusings\/2003\/12\/21\">that&#8217;s already happened<\/A>.)<\/P><br \/>\n<P>The appeals court doesn&#8217;t spell it out, but they disagree to some extent.&nbsp; According to the ruling, the ISP must have a notification procedure much like that for 512(c).&nbsp; Thus, a service provider cannot simply create a policy and then remain willfully ignorant of notices pertaining to that policy.&nbsp; Seemingly, an ISP would have to act on the notices to whatever extent its policy requires; otherwise, notices of infringement would still &#8220;fall into a vacuum and go unheeded.&#8221;&nbsp;<\/P><br \/>\n<P>Neither ruling touches on whether these notices must be of actual infringements.&nbsp;One can strictly interpret 512(i)&nbsp;to say that only repeat infringers, and, as opposed to 512(h), not &#8220;alleged&#8221; infringers, must be terminated &#8211; thus, only people found to have infringed by a court <EM>twice <\/EM>must be terminated.&nbsp; In its more flexible reading of what it means to &#8220;reasonably implement&#8221; a policy, the appeals court points in the other definition of infringer, but it&#8217;s not clear from the ruling.<\/P><br \/>\n<P>There are other cases that deal with this matter, too.&nbsp; See <EM>Perfect 10 v. Cybernet <\/EM>(<A href=\"http:\/\/www.phillipsnizer.com\/library\/cases\/lib_case269.cfm\">summary here<\/A>) and <A href=\"http:\/\/homepages.law.asu.edu\/~dkarjala\/cyberlaw\/InReAimster(9C6-30-03).htm\"><EM>In re: Aimster<\/EM><\/A><EM>.&nbsp; <\/EM>The former states that &#8220;sufficient evidence of blatant, repeat infringement,&#8221; and the latter affirms that the ISP must do &#8220;what it can reasonably be asked to do&#8221; to prevent repeat infringers from using the system.<\/P><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Ellison v. Robertson&nbsp;&nbsp;appeals decision came yesterday.&nbsp; The district court noted that AOL had no&nbsp;obligation to&nbsp;monitor&nbsp;the actions of users for infringements, terminate repeat infringers, or investigate such users; in fact, 17 USC 512(i) &#8220;only requires AOL to put its users on notice that they face a realistic threat of having their Internet access terminated.&#8221;&nbsp;The&nbsp;policy is [&hellip;]<\/p>\n","protected":false},"author":72,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[],"class_list":["post-3473","post","type-post","status-publish","format-standard","hentry","category-general-news"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts\/3473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/comments?post=3473"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/posts\/3473\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/media?parent=3473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/categories?post=3473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cmusings\/wp-json\/wp\/v2\/tags?post=3473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}