The book - a monograph based upon the author's PhD research - is presented in 7 chapters. The first chapter provides a foundation to consider the human element in online copyright infringement. The book notes that the development of copyright law is symbiotically linked with technological development. This is true of the internet, through which data can be in multiple places at once, is subject to limitless copying without loss, may be transformed into new formats, and can reach a wider audience than ever before. In tandem with this technological development is the human element, reflected both in the drafting of regulation and judicial interpretation; the book addresses these components through the framework of internal and external perspectives of the internet, as presented in the next chapter.
The author presents Professor Orin Kerr's concept of internal and external perspectives of the internet as a framework through which to consider online copyright infringement in the second chapter. The facts of the internet depend upon which perspective one takes: the external perspective takes a literal view of the internet as a network of computers in physical places, connected by wires and cables. Through this perspective, precise laws are drafted to conform to technological development, but the pace of technological change limits the lifespan of such regulation. By contrast, the internal perspective views the internet as a virtual space in and of itself. This perspective tends toward a purposive approach that uses metaphor to map the law onto the cyber space.
The third chapter presents the reproduction right in copyright law through the framework discussed in the previous chapter. The first section of the chapter traces the historical development of the reproduction right, through the drafting of the Copyright, Designs and Patents Act of 1988 (CDPA). The second section of the chapter delves into Section 17 of the CDPA; particularly addressing subsections (2)-(6), the chapter presents both the external and internal perspectives within the law.
Chapter 4 considers the judicial application of subsections (2) and (6) of Section 17 of the CDPA - infringing reproduction by storage and by transient or incidental copying. The chapter demonstrates the development of the definitions of storage and transient copying, which have come to mean access to and display of copyright materials. Then, the chapter presents both the external and internal approaches taken by judges to address the reproduction right online. The chapter concludes by noting the indistinction between judicial application of storage and transient copying, as recent case law has centered on "temporary storage within the random access memory (RAM)."
Atticus communicates his hunger to the public |
Chapter 6 addresses copyright infringement by way of communication to the public in light of internet, analyzing case law and judicial interpretation of Section 20 of the CDPA both before and after the amendments of the Copyright and Related Rights Regulations of 2003. While the concept of communication via the internet is best understood through an internal perspective, statutory law has defined communication to the public in online copyright infringement through an external perspective. Through a comparative analysis of case law concerning Section 20 of the CDPA, this chapter presents the effects of the Copyright and Related Rights Regulations of 2003 amendments on UK case law; the author shows that judges demonstrate internal perspectives when online infringement is concerned, taking a purposive approach in their decisions.
In the conclusion, the author offers suggestions for a potential UK copyright act following the departure from the European Union, drawing a distinction between online and offline regulation.
This book will be of particular interest to academics, students, and policymakers across the UK.
204 Pages
Book Review: Law, Technology and Cognition
Reviewed by Thomas Key
on
Friday, August 21, 2020
Rating:
No comments:
All comments must be moderated by a member of the IPKat team before they appear on the blog. Comments will not be allowed if the contravene the IPKat policy that readers' comments should not be obscene or defamatory; they should not consist of ad hominem attacks on members of the blog team or other comment-posters and they should make a constructive contribution to the discussion of the post on which they purport to comment.
It is also the IPKat policy that comments should not be made completely anonymously, and users should use a consistent name or pseudonym (which should not itself be defamatory or obscene, or that of another real person), either in the "identity" field, or at the beginning of the comment. Current practice is to, however, allow a limited number of comments that contravene this policy, provided that the comment has a high degree of relevance and the comment chain does not become too difficult to follow.
Learn more here: http://ipkitten.blogspot.com/p/want-to-complain.html