|
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
No Three-Strikes in ACTA Par Very Very IPLe [2010-05-07] à 19:59:07
Présentation : A consolidated text of the Anti-Counterfeiting Trade Agreement ACTA has been made public at last this week. Parts of the text in brackets indicate what has not been adopted yet by all Parties. Article 1.4 about Privacy and disclosure of information merely indicates between brackets that a suitable provision ensuring that nothing in the Agreement detracts from national legislation regarding protection of personal privacy needs to be drafted. Let s move on to section 4 dedicated to Special measures related to technological enforcement of Intellectual Property in the digital environment. That was the part of ACTA I was the most anxious to read, to find out whether ACTA promotes a three-strikes law similar to the French HADOPI law, or the Digital Economy Bill, which was recently passed by the U.K. Parliament. Article 2.18 deals with Enforcement Procedures in the Digital Environment. There are two Options of this article, Option 1 and Option 2 this is still a draft after all. For both Options, these measures, procedures and remedies should be fair and proportionate. p.18 Indeed, some persons use the services of thirds parties, including online service providers to engage in IP rights infringement. What are, if any, the responsibilities of the ISPs according to the ACTA In Option 1, there would be a Safe Harbor for ISPs although only in certain situations , see note 52 page 19 , provided that the ISP had not selected the infringing material nor had initiated the user s infringing actions, article 2.18. 3. a ii , and did not have actual knowledge of the infringement. An ISP would also need to have a policy addressing the unauthorized storage or transmission of copyrighted materials. However, no Party may condition offering a Safe Harbor to an ISP by having the ISP monitor its services or affirmatively seeking facts indicating that an infringing activity is occurring, article 2.18. 3. b i Page 21 . Does that mean that the ISP would have no monitoring duties at all In Option 2, there would be also a Safe Harbor provided that the ISP had not selected the infringing material nor had initiated the user s infringing actions, article 2.18. 3. a ii , and only if the ISP would remove or disable access to the infringing material expeditiously upon learning about the infringement. This is very similar to the DMCA takedown notices. Article 2.18. 3 ter, Option 2, would enable intellectual property rights holders, who have given notice to an ISP that they have valid reasons to claim that some material posted by one of its subscriber infringes their rights, to obtain expeditiously from the ISP the identity of this subscriber. No three-strikes in ACTA so far, but to be followed with care
Les derniers articles du site "Very Very IP" :
- Towards Orphan Works Legislation in the EU - Où l'on reparle de la protection internationale de la vie privée et des données personnelles... - Emerging Privacy Issue Les Compteurs Intelligents - Email, Cloud, Privacy and the ECPA - New Blog Post on the Information Security Breaches the Law blog - Second Circuit The FCC indecency policy is unconstitutionally vague - Safe Harbor Blog Post - Online Impersonation - City of Ontario, California, v. Quon - Are Communications Made through Social Networking Sites Readily Accessible to the Public
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|