Feeds

Google takedowns flawed, analysis shows

A third of requests may be bobbins

Designing a Defense for Mobile Applications

Academics have analysed the requests received by Google for copyrighted material to be removed from the internet and found that almost a third of requests may be unwarranted and over half of link removal demands came from competitor companies.

Jennifer Urban of the University of Southern California and Laura Quilter Of the University of California, Berkeley produced the report in 2006 but it has attracted widespread attention following Google's reported use of some of the information in its submission to the New Zealand government regarding a controversial change to its copyright laws.

New Zealand had planned to change its copyright law in a way that critics said would result in people being disconnected by their ISPs merely because of claims of copyright infringement.

It has been reported that Google used the research as evidence that claims of copyright infringement are not a reliable indicator of actual infringement. Google's submission is no longer online at New Zealand's telecoms forum website now that the government has decided not to proceed with the planned law change.

US copyright law contains a provision, called Section 512, which allows internet hosts to avoid liability for copyright infringement when material is posted by a third party. The publishers or service providers must remove the material as soon as they are notified of the infringement to qualify for the exemption.

It is the notifications that Urban and Quilter analysed. They collected the data from the Chilling Effects project, a collaboration between digital rights group the Electronic Frontier Foundation (EFF) and the law departments of various US universities.

The project analysed 876 notices received between 2002 and 2005. This includes every notice Google received in this period, which represents 84% of the total.

"We found that a substantial portion of notices contain at least one of the major categories of flaws we evaluated," said the study. "Each of these categories either pose significant questions with the claim’s enforceability in a court of law or invite serious concerns about the fairness of the process for targets."

"They are: substantive legal questions related to the underlying copyright claim; significant technical noncompliance that renders the notice unusable according to the statute; and notices sent in 512(a) situations," it said.

Part (a) of Section 512 only relates to service providers who are 'mere conduits' for the information such as internet service providers. It imposes no takedown obligation on the service provider.

The study found that 30% of the takedown notices "presented an obvious question for a court (a clear fair use argument, complaints about uncopyrightable material, and the like)". One in 11 complaints contained significant flaws that rendered them unusable, the research found.

The research did find, though, that the notice and takedown process was rarely used by the industries that had lobbied for it, the music and film industries.

"Perhaps surprisingly, neither 512(c) search nor 512(d) hosting notices show significant use by the movie and music industries. While these industries anticipated and helped draft the notice and takedown provisions in 512(c) and (d), our data show them only rarely using these provisions. Corporate and business entities are generally responsible for the lion’s share of notices," it said.

"It seems likely that complaints about infringing movies and songs now focus on peer-to-peer networks, where the OSP [online service provider] acts only as a conduit," it said. "This change (unanticipated when the statute was drafted and passed) might explain the lack of the content industry’s use of 512(c) and (d) notices. If true, this suggests that the industry’s concerns about piracy are currently not well-addressed by the notice-and-takedown process."

The research found other potential misuses of the law. It found that 57% of notices to Google demanding that it remove links from its search engine database were sent by competitors to the company linked to. It also found that 37% of notices to Google related to sites outside of the US, where different laws would apply.

The researchers concluded that the notice and takedown process was not working.

"Copyright infringement on the Internet is a serious issue – distribution of valuable works can occur in a flash, and value may be difficult to recapture – and the idea of a simple, inexpensive process to handle takedowns is a beguiling one. But at what cost comes this benefit? Our data reveal an unfortunately high incidence of questionable uses of the process," the research said.

"The surprising number of questionable takedowns we observed, taken in conjunction with the ex ante removal of content, the minimal remedies for abuse of the process, and the lack of knowledge about the counternotice procedures, suggest that few are well-served by the current Section 512 process, and some or many individuals, as well as public discourse and the Internet’s value as an expressive platform, may be harmed," it said.

"Our data set is, as noted, limited, so further research to prove or disprove these concerns, and to suggest the best reforms or remedies, is necessary," it conceded.

See: The research (16-page / 166KB PDF)

Copyright © 2009, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.