|
La Commission européenne fait état d'une vision dogmatique du copyright |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
La Commission européenne fait état d'une vision dogmatique du copyright Par La Quadrature du NetLe [2009-11-18] à 22:45:32
Présentation : Réponse de la Quadrature du Net à la communication de la Commission européenne intitulée Renforcer l'application des droits de propriété intellectuelle sur le marché intérieur . COM 2009 467 Télécharger le memo en pdf en anglais . On September 11th, 2009, the European Commission released a new communication on the enforcement of intellectual property rights IPR in the Internal market. The communication addresses a broad range of issues, notably copyright infringements. In line with the recent leaked information regarding the Anti-Counterfeiting Trade Agreement ACTA 1 currently under negotiation, the document calls for voluntary agreements between Internet Service Providers ISPs and rights holders to deal with copyright infringement over the Internet. La Quadrature du Net, along with many other advocacy groups across the world2, believes that the position of the Commission on the matter suffers from several misconceptions. These errors, which are discussed below, reflect for the most part the influence of a few corporate interests on IPR public policy. Such inaccuracy in the analysis of the phenomenon of file-sharing is all the more illegitimate given that the Commission and the Member States3 have failed to consider alternatives to the repression of non-commercial uses of copyrighted works by Internet-users. We also take the view that the proposals put forward in the communication, if they are carried on, will inhibit many of the socio-economic benefits that the Internet offers. This memorandum uncovers the undesirable outcome of the Commission's mention of voluntary agreements between stakeholders 1. . It also outlines how the view regarding copyright enforcement laid out in the communication could eventually severely undermine the rights and freedoms of European citizens 2. . From original analytical mistakes 3. stems a wrongful assessment of the impact of file-sharing 4. , and so we urge the Commission to reconsider its copyright policies 5. . Read more pdf . 1. 1. Since Spring 2008, the European Union, the United States, Japan, Canada, South Korea, Australia as well as a few other countries have been secretly negotiating a trade treaty aimed at enforcing copyright and tackling counterfeited goods. See our web-dossier http www.laquadrature.net en acta 2. 2. See for instance the resolution of the TransAtlantic Consumer Dialogue TACD on enforcement of copyright, trademarks, patents and other intellectual property rights http tacd.org index2.php option com_docman task doc_view gid 234 Itemid 40 3. 3. On 25 September 2008 the Council adopted a Resolution on a Comprehensive European Anti-counterfeiting and Anti-piracy Plan. The resolution is available at http www.consilium.europa.eu ueDocs cms_Data docs pressData en intm 103037.pdf
Les mots clés de la revue de presse pour cet article : copyright
Les derniers articles du site "La Quadrature du Net" :
- Ask what the next European Commission will do for our Freedoms - ACTA, U.S Democracy and the Global Knowledge Economy - Paquet télécom une occasion manquée pour les droits des citoyens - Setting the record straight on Net neutrality and infrastructure investment - Telecoms Package A Missed Opportunity for Citizen's Rights - La Neutralité du Net et l'investissement dans les réseaux - Nouvelle entorse à la neutralité du Net en Europe Il est temps de légiférer - One more breach to Net neutrality in Europe Time to legislate - La Commission européenne fait état d'une vision dogmatique du copyright - Dogmatic IPR enforcement fails to address the challenges of the Internet-based creative economy
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|