ISP Responsibilities

Internet Service Providers Have Legal and Ethical Responsibilities To Help Mitigate Massive Distribution Without Compensation

According to Sandvine, in March 2011, P2P filesharing accounted for 61.4% of North America’s daily upstream traffic and overall 18.8% of North American network traffic was used for peer-to-peer file sharing.  According to Envisional, all of the top 10,000 torrents (filesharing compilations) that they sampled violated copyright. They found that 35% of BitTorrent traffic is used to illegally upload and download movies (non-pornographic), 14% for television and 2.9% is used to do so with music.

In plain english, 61% of all files being uploaded on ISP networks in 2011 in North America were pirated movies, music, television, games, books and software – just the ones on P2P networks not including cyberlockers and hosting/streaming sites.

ISPs willful blindness of their responsibilities has gone so far that influential tech blogs now state “Generally speaking, your ISP doesn’t give a single damn about copyright violations going on in torrent transfers.”

Doing the math based on traffic figures supplied by Cisco (CSCO), this leads to some staggering numbers of copyright violations per household in the United States.(1) If every household were participating, and if each transaction requires one upload and one download, that would mean that on average, US households illegally download 132 movies each year. In other words, every household watches a movie illegally every five days on average. If half the households are participating, this means that they watched an illegal movie every 2.5 days.

Prior to the Internet, distributing movies illegally was pretty serious stuff. How is it that this can go on unchecked? One problem is that the illegal activity is taking place within the zone of anonymity facilitated by the ISPs. Copyright holders can prosecute claims against individual internet users, but doing so is usually not cost -effective.

ISPs have both ethical and legal responsibilities.  Their ethical responsibilities flow from the fact that they provide the platform on which people deprive content creators and owners of their property.  Just like the owner of a toll road or a warehouse, if they are is a position to block entry to stop the transportation of stolen merchandise, it would be unethical not to do so.  Today, ISPs receive millions of notices of subscribers who are repeatedly illegally distributing copyrighted materials.  Many ISPs respond to these notices, but many do not.  The purpose of this web site is to raise awareness that the information exists and if ISPs acted on the information that they have, then 18.8% of North American internet traffic would not be used to distribute copyrighted materials without the owner’s consent.

If the tables were turned and an ISP was informing an apartment owner that they needed to block access to a subscriber who was illegally tapping into a cable line to steal internet service, they would expect the apartment owner to play their part in preventing the resident from accessing the junction box or utility closet.

Perhaps a greater problem lies in the ISPs’ current interpretation of their legal responsibilities. Parties who facilitate copyright infringement, such as by providing network facilities, over which the activity can take place, can be found liable equally with the “direct” infringer. Congress, acknowledging the potentially crushing liabilities that could jeopardize the very existence of the ISPs, included within the Digital Millennium Copyright Act in 1998 provisions that give ISPs conditional “Safe Harbors” from this third-party liability that otherwise would arise from their subscribers’ copyright infringements. In order to qualify for their “Safe Harbor,” the most significant thing that these ISPs must do is to is to terminate the accounts of repeat copyright infringers. In practice, with 18.8% of North American traffic being used to distribute movies, software, games and music and with each American household consuming a movie illegally an average of every five days, it does not appear that many repeat infringers are being terminated.

If, as it appears, repeat infringers are not being appropriately disconnected then the ISPs don’t have the benefit of their “Safe Harbor.” This leaves ISPs open to monumental liability.

There are many proponents of file sharing. Many bloggers and “digital rights” groups regularly advocate that filesharing is somehow not distribution even though the end user has complete possession of a new copy of the product after the file is “shared.” We believe that these views simply do not match current laws in the United States.

When copyright owners choose to take peer-to-peer copyright cases to court, they win. As of February 2012, most of the 30,000 such cases filed settled out of court for between $3,000 and $5,000. Two cases have been tried. Jammie Thomas received a judgment for $1.5m for distributing 24 songs and Joel Tenenbaum received a judgment for $675,000 for downloading and distributing 31 songs.

Lawsuits against ISPs based upon these theories have not started in earnest. But there is plenty of precedent. Courts have found businesses that have been involved in contributing to copyright infringement liable for damages. In Fonovisa vs. Cherry Auction, a swap meet run by Cherry Auction was held liable to Fonovisa (the copyright owner) for damages. “As the Court observed, ‘it would be difficult for the infringing activity to take place in the massive quantities alleged without the support services provided by the swap meet,’ including the provision of space, utilities, parking, advertising, plumbing and customers…The Ninth Circuit expressly rejected defendant’s argument that the financial benefit prong of the test for finding vicarious liability could only be satisfied if the defendant earned a commission directly tied to the sale of a particular infringing item.” The Fonovisa case and its spawn provide fertile ground for copyright holders that decide to look to seek redress against ISPs for infringements being perpetrated by the subscribers that are providing the ISPs’ profits.

A medium sized ISP in the United States with just 1 million subscribers would have 1.2% of US broadband market share corresponding to 132 million occurrences of illegal movie distributions in a year. If a movie studio could prove that 100,000 infringements occurred on their network by repeat infringers and a judge awarded just $3,000 per infringement, a small ISP in the United States could be faced with a $300 million judgment. On the other side, if a studio proved 10,000 infringements and was awarded just $30,000 per infringement (still substantially less than the statute), that would result in a $300m judgment.

We believe that Internet Service Providers should be making their shareholders aware of these risks and disclosing the steps they are taking to maintain their Safe Harbor by reducing the number of repeat infringers that clearly exist on their networks.

(1) Cisco states that North America used an average of 9,947 Petabytes (1 million Gigabytes) a month in 2011, which would mean that 7,899 Petabytes were used to illegally use movies, 3,141 Petabytes to illegally use television shows and 650 Petabytes were used by illegal music consumption in 2011. Assume that the average movie is 700 Megabytes. If we divide 7,899 Petabytes (1 million Gigabytes) by 700 Megabytes, we get 11.2 billion movies uploaded and downloaded illegally in 2011 (infringements). If we divide 11.2 billion movie infringements by 85 million broadband subscribers in the United States, we get an average of 132 movies uploaded and downloaded per household in the United States in 2011.

Bookmark the permalink.
  • http://www.facebook.com/profile.php?id=100003406239540 Betri

    This is a perfect exlapme of what I was talking about a week or two ago when I commented on why it makes sense to rely primarily on an automatically updating whitelist for spam control. The challenge with spam control is not keeping bad stuff out. That’s easy. The challenge is letting ALL the good stuff in. Doing that requires SOME amount of human intervention. We want to make that as easy as possible. My advice: 1) Go to the control panel for your ISP/Hosting company and set the spam filter to a low enough setting that you can be sure it won’t block any good mail. (This will probably take some testing/trial and error. In my case, my hosting company uses SpamAssassin. I set it on 5 and had it flag emails it thought were spam rather than delete them. I ran it that way for three months to satisfy myself that it wasn’t flagging any good messages it wasn’t and then went back and changed the setting to delete. ) If your ISP won’t let you adjust the settings on the spam filter they use, turn it off.2) In Outlook (2007 in my case), go to Actions/Junk E-mail. On the OPTIONS tab, choose Safe Lists Only. Whatever you do, DO NOT (!!!) choose Permanently delete suspected junk e-mail. . . as this would prevent you from checking blocked messages in your spam folder.3) On the Safe Senders tab, check the two boxes at the bottom ( Also trust e-mail from my Contacts and Automatically add people I e-mail to the Safe Senders list ).That’s it. You will have to check your spam folder once or twice a day, but as the post indicates, you’re going to have to do that anyway. You may as well do it on your computer instead of on your ISP’s website. A final tip: When you un-spam messages from spam folder, sending any reply (i.e., Thank you for your email ) will add them to your safe senders list, so their email will always come through in the future.