Information Systems Management Project_Final 2
-
Upload
niharika-jain -
Category
Documents
-
view
215 -
download
0
Transcript of Information Systems Management Project_Final 2
-
8/2/2019 Information Systems Management Project_Final 2
1/29
1
Information Systems Management Project
O
Cyber-laws: Issues for Global Economy (India Vs Globally)
Submitted to
Dr. Preeti Khanna
In partial fulfilment of the requirements of the course
Information Systems Management
By Group o. 9
1. Shrey Agarwal (D-2)2. Vinay Arun (D-6)3. Archana Ashar (D-7)4. Apar Bansal (D-11)5. JayKaran Singh Chadha (D-20)6. Deeksha igam (D-40)7. Shwetank Sharma (D-55)
-
8/2/2019 Information Systems Management Project_Final 2
2/29
2
Table of Contents
Abstract ................................................................................................................................................... 4
1. Introduction ..................................................................................................................................... 5
a. Need for Cyber Laws .................................................................................................................. 5
b. Cyber Legislations Worldwide.................................................................................................... 5
c. Cyber Laws in India .................................................................................................................... 5
d. Digital Media Piracy ................................................................................................................... 6
e. Company Analyzed ..................................................................................................................... 6
2. Problem Statement .......................................................................................................................... 8
a. Indian Context ............................................................................................................................. 8
b. Understanding the Piracy Ecosystem .......................................................................................... 8
c. Factors Impacting Piracy: Global and Indian .............................................................................. 8
d. Effects of Piracy .......................................................................................................................... 9
3. As-Is To-Be Analysis .................................................................................................................... 10
4. Business Solution .......................................................................................................................... 11
a. Pre Crime Stage......................................................................................................................... 11
b. Crime Stage ............................................................................................................................... 12
c. Post Crime ................................................................................................................................. 14
5. Global Impact of Piracy ................................................................................................................ 15
6. SWOT Analysis............................................................................................................................. 17
a. STRENGTHS ............................................................................................................................ 17
b. WEAKNESS ............................................................................................................................. 18
c. OPPORTUNITY .......................................................................................................................18
d. THREATS ................................................................................................................................. 18
7. Challenges ..................................................................................................................................... 19
a. People ........................................................................................................................................ 19
b. Process....................................................................................................................................... 19
c. Technology................................................................................................................................ 19
8. Cost Benefit Analysis.................................................................................................................... 20
9. Actual Scenarios............................................................................................................................ 21
1. HADOPI (France) ..................................................................................................................... 21
2. BAIDU (The google of China).................................................................................................. 24
3. Facebook & Google: Internet Intermediaries under Indian Law............................................... 25
10. Future Scope & Conclusion ...................................................................................................... 28
-
8/2/2019 Information Systems Management Project_Final 2
3/29
3
11. References ................................................................................................................................. 29
Figure A How piracy works ...................................................................................................................... 9
Figure B Business Solution ................................................................................................................... 11Figure C Growth of subscriptions .......................................................................................................... 12
Figure D Source: SSKI Media Research, 2007 ........................................................................................ 20
Figure E Reduction in P2P use ............................................................................................................... 23
Figure F India's potential .......................................................................................................................26
-
8/2/2019 Information Systems Management Project_Final 2
4/29
4
Abstract
The Information Technology age has led to the emergence of a dynamic and highly
specialized field of law, namely Cyber laws. The unique features of the internet,
particularly, its borderless expanse, rapid technological advancements, anonymity, speed ofcommunication & data transfer have posed multiple challenges to legislators of different
countries who strive to adapt their existing laws for application in cyberspace or develop
new laws to govern the virtual world.
In this report, we analyze the cyber laws from a global perspective particularly in the digital
media sector.
The digital music sector is pushing the limits of consumer choice, extending its business
models and reaching out to consumers across the globe. Digital channels have overtaken
physical formats to become the dominant revenue stream in the worlds largest market, the
US. The digital music market is poised to further expand its reach internationally in 2012.
Despite the big steps forward of 2011, digital piracy remains a critical barrier to growth and
investment by record companies. More than a quarter of internet users globally (28 per cent)
access unauthorized services on a monthly basis, according to IFPI/Nielsen.
The report also deals with the battle against digital media piracy and the various cyber laws
and business solutions that exist to deal with this issue.
Cooperation from a far wider circle of technology and business partners, from advertisers to
search engines, is now needed to deal with the problem of piracy.
-
8/2/2019 Information Systems Management Project_Final 2
5/29
5
1. Introductiona. eed for Cyber LawsThe expression Cyber laws encompasses the legal matrix of cases, statutes, regulations &
legal principles that affect persons and institutions to control entry to cyberspace, provide
such access, use this space and create hardware and software which enable people to go
online to experience this world. To put it simply, Cyber laws constitutes rules and regulations
that govern the cyberspace.
The rapid development of Internet and Computer technology globally has led to the growth of
new forms of transnational crime especially Internet related. These crimes have virtually no
boundaries and may affect any country across the globe. Thus, there is a need for awarenessand enactment of necessary legislation in all countries for the prevention of computer related
crime. Territorially based law-making and law-enforcing authorities find this new
environment deeply threatening.
b. Cyber Legislations WorldwideTo meet the challenge posed by new kinds of crime made possible by computer technology
including telecommunication, many countries have also reviewed their respective domestic
criminal laws so as to prevent computer related crimes. Some of these countries are USA,
Austria, Denmark, France Germany, Greece, Finland, Italy, Turkey, Sweden, Switzerland,
Australia, Canada, India, Japan, Spain, Portugal, UK, Malaysia and Singapore. However, no
country has fully resolved all the issues such as legal, enforcement and prevention of crime.
The legislations enacted by different countries cover only few of the classified computer-
related offences. However, looking to the dynamic and fast changing technology, new types
of offences may pop-up frequently.
c. Cyber Laws in IndiaKeeping in line with other countries, India also has passed its first cyber law, The
Information Technology Act 2000, which aims to provide the legal backbone for enabling e-
commerce in the country. However the arrival of Internet resulted in the rise of new and
complex legal issues. Though India has a detailed and well-defined legal system in place, but
at the time of enactment of Indian laws nobody could really visualize about the Internet. We
must remember that all the existing laws in place in India were enacted keeping in mind the
relevant political, social, economic, and cultural scenario of the corresponding time. As like
-
8/2/2019 Information Systems Management Project_Final 2
6/29
6
the rest of the world, the existing laws of India also could not handle the various cyber space
activities. As such the need arose for a Cyber Law.
d. Digital Media PiracyThe Media and Entertainment (M&E) business in India is one of the fastest growing
segments of the economy. It is a US$ 11 bn industry growing at a CAGR of 18%. The
industry landscape is now undergoing a significant shift. Cable digitization, the promise of
wireless broadband, increasing DTH penetration, digitization of film distribution, growing
internet use are all prompting strategic shifts in the way companies work. Traditional
business models are evolving for the better as a host of new opportunities emerge.
However, widespread piracy is the biggest factor undermining the growth of the digital music
business. Worldwide, the industry federation says, 95 percent of the music downloaded via the
Internet is pirated.
The battle against online piracy, or at least electronic piracy, has been going on since before there
was an Internet, with early software manufacturers attempting novel security features to stop
people from making illegal copies of their software.
Neither piracy, nor the fight against it seems likely to go away anytime soon. Security measures
continue to be developed, as do the techniques used to break them, and distribute copyrighted
material freely.
The international nature of piracy, and the fact that different countries have very different laws
about it, is another factor complicating the issue as a whole.
e. Company AnalyzedUTV Software Communications Ltd (UTV), India's first integrated global media and
entertainment Company, has seen recent expansion, both in existing businesses and into new
growth sectors. The entire UTV focus is on creating, aggregating and disseminating outstanding
-
8/2/2019 Information Systems Management Project_Final 2
7/29
7
content. UTV is a diversified media and entertainment company with content creation abilities
across platforms and genres.
The company has acquired a controlling stake of 76 percent amounting to Rs.150 million in IT
Nation, India's leading online infomediary that focuses on technology markets, covering
enterprises, technology resellers and general consumers.
The company plans to invest around Rs.1.2 billion over the next two years to create a
combination of Internet space with a portfolio of 10 portals targeted at specific need groups.
UTV
VerticalsBroadcasting
Games
Content
Motion
Pictures
Interactive
TV Content
-
8/2/2019 Information Systems Management Project_Final 2
8/29
2. Problem Statementa. Indian ContextIndia is well behind the curve
P2P sites, like DesiTorrents,
outside India, conferring so
enforcement efforts of Indian
adherence to prevent piracy in
b. Understanding the Pir
c. Factors Impacting Pir
Market Need
Accessibilit
Product Pric
when it comes to fighting digital piracy. No
CTorrent, have been filed till date. Infringi
e protection from the relatively disorga
rights holders. The problem: How can India
the media sector and generate the revenue l
cy Ecosystem
cy: Global and Indian
Factors Impacting
Piracy
y
ing
Business
Environment
Profitability
Technology
Ease of Content
Acquisition
Industry Support
Political &
Regulatory
Legal Framework
Law Enforcement
Lack of C
Awar
8
uits against Indian
ng sites are hosted
ized international
enforce copyrights
st to piracy?
nsumer
ness
-
8/2/2019 Information Systems Management Project_Final 2
9/29
d. Effects of Piracy
Figure A How piracy works
9
-
8/2/2019 Information Systems Management Project_Final 2
10/29
10
3. As-Is To-Be Analysis
STAKEHOLDER AS-IS(IDIA)TO-BE
(IDIA)
EXAMPLE
(GLOBAL)
Websites
Search engines arelinked to unauthorisedcontent or sites whichregularly infringecopyright
Search engines shouldlink to legal music
Jan 2011, rightsholders in the UK werein discussions with thegovt. and searchengines on a draft codeof conduct forprioritization of legalsites in search results& online advertising
Payment ProvidersNo action againstIllegal Sites
Payment providersneed to act on illegal
sites
A partnership betweenIFPI, the City ofLondon Police andpayment providers hasprevented 62 illegalwebsites in Russia andUkraine from abusingpayment since March2011
Hosting Providers
Enable websites to
illegally distributecopyrighted material
Need to block illegal
distribution ofcopyrighted content
In May 2011, a courtin Luxembourg ruledagainst a leading
hosting provider forproviding services toillegal websites
Consumers Low AwarenessMore consumer
awareness and actionneeds to be taken
IFPI works with itsmember labels toprevent leaksoccurring, improvingsecurity of promotionalcopies of new music,and if a leak happens,it removes the
infringing links online.In 2011, it removed >15 million tracks.
Government
In spite of The IndianInformationTechnology Act andother initiatives takenup by individual states,no strict l legalframework or
enforcement iscurrently happening
Urgent need tostrengthen Indian
Copyright and cyberlaw enforcement
Fear of the law of theland is the mosteffective tool to fightpiracy. Singapore, inspite of its proximity toMalaysia, has piracylevels at 30%, due toits robust legal
framework and nocorruption.
-
8/2/2019 Information Systems Management Project_Final 2
11/29
11
4. Business SolutionThe biggest crisis that media companies face today and that can be addressed by an effective
legal structure is the piracy issue.
Piracy can be viewed as a combination of two problems; a social problem and a technological
problem. The social problem primarily gives rise to the belief that it is acceptable to
download content for free when it is easily available. The technological problem gives rise to
the ease and anonymity that pirates use to carry out pirate activities.
Hence, a solution has to be a multi-pronged approach and it is seen that such approaches have
worked1. The solution proposed here takes into account all the stakeholders that are affected
by the piracy issue.
The problem has been identified to be occurring in three stages. Pre-crime involves activities
that enable the facilitation of piracy. The crime stage is the carrying out of the act and the
post-crime stage is where prosecution and follow up occurs.
Figure B Business Solution
a. Pre Crime StageIn the pre-crime stage the major stakeholders are the players in the media sector and the
government. Ineffective cyber laws can facilitate creation of channels to create and deliver
1Piracy: improved cooperation from online intermediaries by Paul McGuinness, manager, U2
Blueprint to fight piracy in the media sector
Stakeholders involved Techniques used Actions performed
Legal Department
ISPs
Government/Legal
Payment Gateways
Artists, Publishers &
Search engines
(Monitoring and Reporting)
Music Industry
(Awareness and Education)Legitimate services
Website
Blocking
Graduated
Response
Awareness
Campaigns
Legal
Prosecution Sanctions
On transactions
Prosecution andrights
enforcement
Review and
update lawsthat enable
criminalisatio
n of piracy
Database
of violators
maintained
ISPs to monitor
and warninfringing
subscribers
Increase
consumerawareness.Provide legitimate
alternatives
Artists/publishers
to provide infringerdetails to ISPs for
action
-
8/2/2019 Information Systems Management Project_Final 2
12/29
pirated content. The solution
stakeholders. The governmen
must emphasis the availabili
These are continuous proce
performed. As technology ch
been seen that nations that ha
b. Crime StageThe crime stage is when the
information sharing has ma
networks (Peer-to-Peer). A
This scale makes it very di
techniques that have shown pr
Graduated ResponseThis is carried out by the IS
which are downloading ille
subscriber list to identify the s
that informs the subscriber o
calls are repeated. The subsc
can also throttle the bandwi
inform the concerned authori
privacy of the subscriber.
2Digital Music Report 2012, IFPI
roposes at this stage to carry out awareness
should emphasis the illegality of piracy an
y of legitimate sources through these awa
s and the activities column describes h
nges both laws and services to consumers
e implemented such an approach have seen
Figure C Growth of subscriptions
act of piracy actually takes place. The in
e it very easy to propagate piracy espec
ajor problem has been the scale to which
ficult to deal with piracy. The solution pr
ogress in the countries where they have been
(Internet Service Provider). The ISP ide
al content. This IP address is then mapp
ubscriber. The ISP then calls the subscriber
the illegality of the usage. If violation is
iber is made aware of the possibility of pr
th to the subscriber. If no improvement is
ties. All these activities are performed wit
12
campaigns by both
the media players
reness campaigns.
w this has to be
ust keep up. It has
ositive results2.
ternet and ease of
ially through P2P
iracy takes place.
poses to use two
implemented.
tifies IP addresses
ed with the ISPs
ith a first warning
bserved again the
secution. The ISP
seen the ISP will
due regard to the
-
8/2/2019 Information Systems Management Project_Final 2
13/29
In Germany, 81 per cent of
warnings with the prospect
(GfK, February 2011).
In South Korea, government
activity on receipt of a first n
with 70 per cent of users ceasi
Website BlockingAlong with the graduated res
has also shown to be effective
In Belgium, in September 20
Telenet to block access to T
from comScore shows that thi
and November 2011. In Ital
February 2010 - at the time,
passed, usage of the servi
(IFPI/Nielsen).
The website blocking techniq
that illegally distribute conte
3Digital Music Report 2012, IFPI
Consumer
heedgraduatedresponse:Ipsos MediaCTfindings in New
Zealand (Augus2011)
consumers that download media content ill
f consequences would make people stop t
officials report that 70 per cent of infringi
tice. A similar pattern is found on receipt o
ng to use their account to infringe.3
onse technique, scanning and blocking qu
in countries that have used the technique.
11, the Antwerp Court of Appeal ordered I
e Pirate Bay by way of domain name serv
s reduced the services audience by 84 per c
y, ISPs were ordered to block access to
the biggest torrent site in Italy. Once the
e fell dramatically and it is still down
e requires that the internet is scanned for qu
t. It is known that most search engines rea
Half of all online adults aged 15-50 agree thinternet suspension or fines for repeatedlydownloading content without the copyright
permission are acceptable
Although the law was not yet in place, 14 peof P2P users aware of it claimed their behavhad already changed
Most P2P users that had already changed thbehaviour as a result of the law (62%) avoidparticular unauthorised services altogether
New legal measures have the ability to signiimpact P2P as seven in ten users claim theystop on receipt of a notification with a sanctiattached
13
egally believe that
eir illegal activity
g users stop their
the second notice,
stionable websites
Ps Belgacom and
ice blocking. Data
nt between August
he Pirate Bay in
locking order was
by 74 per cent
stionable websites
ily yield results of
t
wners
r centour
ir
icantlyould
on
-
8/2/2019 Information Systems Management Project_Final 2
14/29
14
these websites if searched for, hence search engines can be used as a way of finding such
sites. The trick however is to involve multiple stakeholders. Apart from the ISPs, artists and
media distributors must also be able to play a role in scanning through a complaint
mechanism. Search engines can and should play a big role here by not featuring illegal
websites as search results.
Harris Interactive found that 23 per cent of consumers regularly download music illegally
using Google as their means to find the content (September 2010). Further research in New
Zealand by Ipsos MediaCT (August 2011) also highlighted that search engines direct a
significant number of users to unauthorised sources. 54 per cent of users of unauthorised
downloads said they found the music through a search engine. In Ireland, this figure was 49
per cent (Ipsos MediaCT, October 2011). A law that mandates responsible behavior on part
of search engines will be very effective in blocking out illegal websites.
It is also recommended in this solution that a database of violators be maintained to identify
repeat violators and take quick action. This database should ideally be at the ISP level with a
protocol in place for prosecutors to have access as the need arises.
c. Post CrimeOnce crime has been established and identified, laws must be in place to be able to quickly
prosecute the violators. Special courts can help with this regard. Payment gateways like
VISA, MasterCard etc. must deny services to accused entities, this can go a long way in
hampering the activities of pirates. Advertising is also a beg source of revenue for pirates.
Advertisers must also refuse to advertise with such websites.
Web hosting providers must also play a role in the post-crime scene by pulling down
websites of violators.
With such a comprehensive situation in place the legitimate media industry can successfully
fight piracy. It will need a continuous process and the first few stages of implementation will
see illegal sites shut down and new ones mushrooming, but this is not sustainable in the long
run. Eventually piracy will be reduced to a great deal using such an approach.
-
8/2/2019 Information Systems Management Project_Final 2
15/29
15
5. Global Impact of Piracy Brazil: One billion tracks were downloaded or swapped illegally on the internet in Brazil
last year, while the physical piracy rate was 40 per cent. It is hardly surprising against
such a backdrop that the music industry has lost 80,000 jobs in the country since 1997.There are signs though that the newly formed National Anti-Piracy Council is starting to
make an impact.
Canada: Outdated copyright laws have helped digital piracy flourish, with over onebillion songs being downloaded illegally in 2005. The previous government failed to
fulfill its long-standing pledge to ratify the 1996 WIPO Treaties. Annual retail sales of
music fell by 42 per cent 1999-2005 and 20 per cent of music industry jobs have been
lost. It is hoped the new government will take intellectual property more seriously.
China: The largest producer of pirate discs in the world with a physical piracy rate ofover 85 per cent. The country also has 64 million broadband lines which is facilitating a
rapid growth in digital piracy in a culture where paying little or nothing for music is
ingrained. The government has made positive noises about protecting intellectual
property but they need to be translated into hard action.
Greece: With a physical piracy rate of 50 per cent and legal sales falling by a fifth in thepast five years, Greece is a new priority country and one of three priority countries inside
the EU. The judicial system is weak and the Fiscal Police remain largely inactive in the
fight against piracy.
Indonesia: A major source of imported pirate discs in Australia, Indonesia has failed tocontrol its optical disc plants. There are more than 40 plants in the country and half of
them are not even registered with the Ministry of Industry as required. An Intellectual
Property Taskforce was established in March 2006 and it is hoped this may lead to a
coordinated response to enforcement that has so far been lacking.
Italy: Italy is one of the biggest sources of piracy in Western Europe. Organized crimenetworks are playing an ever-increasing role in the black market trade in music. The
governments recent anti-piracy laws and increased police action may help, but theproblem is so big it will need a concerted and continuing campaign to have any effect. At
-
8/2/2019 Information Systems Management Project_Final 2
16/29
16
the same time, the country also has a developing digital piracy problem with 2.7 million
illegal music file-sharers.
Mexico: There were nearly 110 million physical pirate products sold in Mexico last year.Digital piracy is also beginning to take-off with more than 570 million tracks being
downloaded or swapped illegally in 2005. The authorities have been working with the
industry to tackle physical piracy, but a more sustained and widespread approach is
needed.
Russia: One of the major sources of pirate discs found across Europe, Russia has alamentable record of prosecuting the criminals behind this trade with only one in four
cases resulting in a prosecution. At the same time, the country is host to a large number
of copyright infringing websites, such as allofmp3.com, which sell music around the
world without the permission of or payment to rights holders.
South Korea: Internet piracy is rife in South Korea so it is not surprising that revenuesfrom legal music sales have halved in five years. New technology has enabled the
establishment of digital broadcasting services that transmit high-quality music videos to
mobile phones via satellite without the rights holders permission. The governments anti-
piracy campaigns remain sporadic due to the lack of a centrally coordinated enforcement
agency.
Spain: Major police actions have led to a small significant reduction in physical piracy,although the rate remains unacceptably high (22%) for the sixth consecutive year. Internet
piracy is beginning to take off however with nearly 500 million tracks downloaded
illegally in Spain last year. The Spanish government needs to close loopholes in its anti-
piracy laws to take action against digital piracy.
-
8/2/2019 Information Systems Management Project_Final 2
17/29
17
6. SWOT AnalysisAfter looking at various steps taken by companies and governments in various countries this
solution has been proposed.
a. STREGTHS The solution takes the positive part and tries to minimize the negative impact The solution is more progressive in nature:
o It talks about educating the consumers. Companies want the piracy to bereduced but they also dont want to lose the customers. So by educating them
about the lawsuits and advantages of using services from legal websites it is
helping the music industry as well as consumer. Consumer will be more aware
of their action and know about the consequences because in most cases they
dont know that they are breaking law. Consumer will get better product and
services. Companies will get more revenue and will look to improve their
services
Working in collaboration with government:o Government needs to play the part in controlling piracy at each stage. Due to
piracy government is also losing revenue. Since downloading from illegal sites
results in only black money. The owner of the illegal sites doesnt pay anytaxes
Forcing ISP to maintain database:o The following step helps in tracking the people who are doing illegal
activities. Till date ISPs have been protecting their customer. But by
including the ISPs in the cost structure of system and forcing ISPs in
implementing in second stage will significantly reduce piracy
Solution is in sync with worldwide measures that are being taken
Sharing of information between various players in the industry would go a long wayin consolidating and replicating successful initiatives, which would benefit all players
in the long run. As an illustrative, the Andhra Pradesh Film Chamber of Commerce
has created an Anti-Video Piracy (AVP) cell since May 2005. This dedicated cell led
by a retired SP of the state(currently led by Mr. Keshava Reddy) along with 59 other
retired police officers works in tandem with the Government and the law enforcement
agencies to fight piracy
-
8/2/2019 Information Systems Management Project_Final 2
18/29
18
b. WEAKESS Solution wants partnership between company, government, ISPs and customers. If
any of them doesnt perform its duties then the solution may not be effective
Cyber laws are not uniform throughout the world so it is difficult to catch hold ofwebsite owner outside the country. Only way block the website
New ventures or startup have to bear the cost of the solution. Majority part (75%)ofthe cost they have to give in the initial stage when they are just starting. This makes
the venture more expensive
IT infrastructure cost of ISP increases and their liability also increasesc. OPPORTUITY
The solution has a scope of improvement
With time it is needed to give better IT infrastructure to agencies monitoring piracy.They needed regular investment in R&D for improvement in technology. Today DRM
is available as one form of technology but it increases cost of product substantially
Government needs to keep assessing the Cyber law. And add new features ifconditions of market demand. Implementation of the law is more important than just
laying down them and has to constantly invest in infrastructure so as the solution
works
d. THREATS People involved in illegal works will try to find other ways to do piracy. They will try
to find loopholes in the system and exploit them for their gain
-
8/2/2019 Information Systems Management Project_Final 2
19/29
19
7. Challengesa. PeopleThe biggest challenge is the people themselves. They need to realize the loss due to piracy.
The loss is both in terms of monetary as well as creativity. Educating people about the benefit
of using services that are legal is important.
The real challenge for the local legislators will be to protect the intellectual property by
introducing reasonable remedies and proportionate measures. The goal should be to strike a
balance between the fundamental rights involved (privacy, freedom of expression, etc.) and
in general to adopt a prudent strategy which takes into consideration the different interests of
all the parties involved: content industry, ISP, search engines, payment providers, end users,
etc.
b. ProcessIt will also be crucial to support education programs finalized to promote the respect of
intellectual property rights which often are not perceived as a product of an industry but as a
good infinitely available and transferable without any particular restraint or fee. Making
people realize downloading from illegal sites is equivalent to stealing will be a challenge.
The engagement between stakeholders mentioned in the solution will have to be streamlined
through a predetermined process with everyones signoff.
c. TechnologyStakeholders like search engines, ISPs and legitimate service providers have a huge role to
play. As pirates find newer and cleverer ways of pirating, content technology must keep pace
and be able to track and block such illegal services. Technology must be able to address the
anonymity of P2P networks that are today the biggest platform for pirated content.
The sharing of technological resources among the stakeholders is of importance if a database
of repeat offenders is to be maintained which is an integral part of the solution proposed.
-
8/2/2019 Information Systems Management Project_Final 2
20/29
20
8. Cost Benefit AnalysisIndia is one of the top countries in the world facing a threat, with the music industry losing
between US$600 billion and US$650 billion a year due to piracy. 64% of all music which is
downloaded is illegal and even though the Indian government is making serious efforts tocounter this intellectual property theft, the lack of proper patent laws or more correctly, the
enforcement of these laws allow the perpetrators of this crime to get away scot-free. Due to
this rampant piracy, the government is deprived of tax revenues, jobs are lost and research
and innovation never takes place.
Figure D Source: SSKI Media Research, 2007
(Figures in IR million)
Source: UTV financial statementsAssumptions:
1. 65% of the 38% loss in the industry is been assumed to be recoverable2. Awareness campaigns assumed to cost 5% of incremental PAT3. Monitoring cost is of 3 employees at a salary of Rs. 30,000 per month4. Infrastructure cost Rs 25 lakhs5. Miscellaneous cost Rs 10 lakhs
-
8/2/2019 Information Systems Management Project_Final 2
21/29
21
9. Actual Scenarios1. HADOPI (France)Situation Overview
France became the first country in Europe to introduce graduated response legislation. The
Creation and Internet law established a new agency, HADOPI, which sends notices to
internet subscribers whose accounts have been used to infringe copyright. If a subscriber
ignores two notices within six months and infringes copyright law for the third time in a year,
HADOPI can notify a criminal court, which can suspend the internet account for up to a
month and levy a fine of up to 1,500. To date there have been more than 700,000 notices
sent, which IFPI estimates to have reached around 10 per cent of P2P users in France.
Details of law
HADOPI -Government agencyThe law creates a government agency called HADOPI (High Authority for Transmission of
Creative Works and Copyright Protection on the Internet). The agency is vested with the
power to police Internet users and is headed by a board of nine members. The composition
includes:
3 members appointed by the government 2 members by the legislative bodies 3 members by judicial bodies 1 member appointed by the Superior Council of Artistic and Literary Property 1 government council responsible to the French Ministry of Culture
GoalTo ensure that internet subscribers "screen their internet connections in order to prevent the
exchange of copyrighted material without prior agreement from the copyright holders"
Law EnforcementOn receipt of a complaint from a copyright holder or representative, HADOPI may initiate a
'three-strike' procedure:
-
8/2/2019 Information Systems Management Project_Final 2
22/29
22
An email message is sent to the offending internet access subscriber, derived from the IPaddress involved in the claim. The email specifies the time of the claim but neither the
object of the claim nor the identity of the claimant. The ISP is then required to monitor
the subject internet connection. In addition, the internet access subscriber is invited to
install a filter on his internet connection. If, in the 6 months following the first step, a
repeat offense is suspected by the copyright holder, his representative, the ISP or
HADOPI, the second step of the procedure is invoked.
A certified letter is sent to the offending internet access subscriber with similar content tothe originating email message. In the event that the offender fails to comply during the
year following the reception of the certified letter, and upon accusation of repeated
offenses by the copyright holder, a representative, the ISP or HADOPI, the third step of
the procedure is invoked.
The ISP is required to suspend internet access for the offending internet connection, thatwhich is the subject of the claim, for a specified period of from two months to one year.
The internet access subscriber is blacklisted and other ISPs are prohibited from providing
an internet connection to the blacklisted subscriber. The service suspension does not,
however, interrupt billing, and the offending subscriber is liable to meet any charges or
costs resulting from the service termination. Appeal to a court is possible only during the
third phase of the action (after the blocking of internet access) and an appeal can result in
shortening but not cancellation of the blocking. The burden of proof is on the appellant.
Stakeholders involved
Stakeholders
P2P users
ISPs
Entertainment
industry
Copyright
owners
Consumer
associations
French
Government
(HADOPI)
-
8/2/2019 Information Systems Management Project_Final 2
23/29
Impact & Benefits To date there hav
have reached arou
A separate study bcent of P2P users
infringing if they
graduated respons
Half of P2P usersimpact on their ill
There are good inyear of operation.
with overall P2P
October 2010 (IFP
number of infringi
shows a dramatic
piracy has seen a s
Approximately onnew law has or wil
been more than 700,000 notices sent, whic
d 10 per cent of P2P users in France
y Ipsos MediaCT, conducted in November
in France were aware of the law and 71 p
received a notification with potential sanct
programme
aged 15 to 50 (48%) claim the law has or w
gal behaviour.
ications of the impact HADOPI has had o
The use of unauthorized P2P networks ha
use down by 26 per cent since notices sta
I/Nielsen). According to Peer Media Techn
ng movie downloads initiated on P2P netw
decline since notices started, supporting
ignificant drop.
in six P2P users (16%), around one millio
l encourage them to use legal services more.
Figure E Reduction in P2P use
23
IFPI estimates to
011, found 90 per
r cent would stop
ons as part of the
ill have a deterrent
piracy in its first
sharply declined,
rted being sent in
logies, data on the
rks in France also
he view that P2P
people, claim the
-
8/2/2019 Information Systems Management Project_Final 2
24/29
24
A study commissioned by HADOPI in May 2011 found that among those whohad either received a notice or knew someone who had received one, 50 per cent
said knowledge or receipt of a notice made them stop their illegal activity and a
further 22 per cent said it reduced their illegal consumption. Source: The Effect of
Graduated Response Anti-Piracy Laws on Music Sales:Evidence from an Event Study in France. (Figures are rounded).
2. BAIDU (The google of China) Situation OverviewChina, was a market with huge potential for the music industry. Yet it had suffered from anestimated 99% digital piracy rate in recent years, meaning the legitimate market had operated
at only a fraction of its true potential. China had nearly twice as many internet users as the
US, but digital music revenues per user were about 1% of that of the US. More than 70% of
music sales in China are digital, but the market had achieved a tiny fraction of its potential. In
2010, Chinas overall music sales were worth only US$67 million, making it a smaller
market than Ireland. BAIDU is a Chinese web Services Company headquartered in Beijing,
People's Republic of China. BAIDU provides an index of over 740 million web pages,80 million images and offers multimedia content including MP3 music and movies.
SolutionIn July 2011, BAIDU, Chinas largest search engine created a milestone in the music
industrys development in China by striking a partnership with One Stop China - a joint
venture between 3 major record companies
Universal Music Group Sony BMG Warner Music Group
-
8/2/2019 Information Systems Management Project_Final 2
25/29
25
Stakeholders Involved
Impact & Benefits This deal connected One-Stop's world-class repertoire of licensed music to a
massive audience, creating crucial new opportunities for artists
BAIDU had agreed to remove all its infringing deep links to music belonging toany of the One-Stop China labels
The deal would allow China-based web users to legally download and streamhundreds of thousands of songs for free
Under the agreement, BAIDU would pay a fee to the music labels each time asong is downloaded or streamed
BAIDU would remunerate music content owners on a per-play and per-downloadbasis for all tracks delivered through the BAIDU MP3 Search service
It allowed consumers to download tracks for free from Ting, a new legitimateservice supported by advertising revenues
It allowed the labels to license 500,000 songs, 10 percent of which will be inMandarin and Cantonese
3. Facebook & Google: Internet Intermediaries under Indian Law Situation Overview
Digital ad spending reached $291 million in India last year, compared with $7.4 billion inChina and $32.2 billion in the U.S. TV and newspapers in India receive more than 80% of ad
Stakeholders
Chinese
Music
industry
Digital
music
buyers
BAIDU
One
Stop
China
-
8/2/2019 Information Systems Management Project_Final 2
26/29
26
spending, while digital services get less than 5%. But India's nascent Internet industry could
generate 1.5 million jobs and $45 billion in wealth for investors in the next few years if
companies aren't bogged down in litigation.
Google Inc. and Facebook Inc., the social-networking giants are set to begin trial in March,
2012 to face charges that they hosted material that "seeks to create enmity, hatred and
communal violence" and "will corrupt minds." The complaint refers to obscene content and
material that depicted Hindu, Muslim and Christian religious figures in a mocking or
offensive manner putting on stark display the legal risks for Internet companies chasing
growth in India. These companies are Internet intermediaries as per the provisions of
Information Technology Act 2000 (IT Act 2000).
IssuesInformation Technology Act of 2008 states that intermediaries like blog-hosting platforms
and social networks are protected from liability for hosting prohibited content created by
their users as long as they remove or disable access to this content within 36 hours of
acquiring actual knowledge that it is accessible via their sites or services. The rules further
state that actual knowledge can be acquired through self-investigation or notification
submitted by others.
Impact India's nascent Internet industry could generate 1.5 million jobs and $45 billion in
wealth for investors in the next few years if companies aren't bogged down in
litigation
Figure F India's potential
-
8/2/2019 Information Systems Management Project_Final 2
27/29
27
Stepped-up regulation of social networking is seen as a particular threat to India'sWeb growth which is the biggest driver of Internet adoption in India
It might propel India to follow Chinas example in blocking citizens access toFacebook that would amount to one third of the world blocking access to the
social network
Suggestions All subsidiary/Joint ventures companies operating in India that deal in information
technology and online environment, must mandatorily establish a server in India.
Otherwise, such companies and their websites should not be allowed to operate in
India
A stringent liability for Indian subsidiaries dealing in information technology andonline environment must be established by laws of India
More stringent online advertisement and e-commerce provisions must beformulated for Indian subsidiary companies and their websites
-
8/2/2019 Information Systems Management Project_Final 2
28/29
28
10.Future Scope & ConclusionCyber crime ranks among the top 4 economic crimes of the world and is third on the list of
economic crimes in India. However, it is not going to be curbed that easily due to lack of
technological infrastructural support and weak cyber laws prevalent in India. In fact, it ishighly likely that cyber crime and its perpetrators will continue developing and upgrading to
stay ahead of the law. The risks of cyber crime are very real and too ominous to be
ignored. The real reason why so many youths are attracted to the world of cybercrimes is the
lack of transparency regarding this issue.
The digital media sector particularly is largely affected due to lack of stringent regulations
and policies in the cyber crime domain. The Indian media industry industry needs to act as a
facilitator and coordinator of anti-piracy efforts and Every franchisor and licensor, indeed
every business owner, has to face up to their vulnerability and do something about it. Further,
sharing of information between various players in the industry would go a long way
in consolidating and replicating successful initiatives, which would benefit all players in the
long run. All stakeholders need to be educated and involved to fight cyber crime and a
professional analysis of their cyber security and cyber risk needs to take place.
The media industry in collaboration with the government needs to replicate the successful
global models and engage in a prophylactic plan to minimize the liability; insure against
losses to the greatest extent possible; and implement and promote a well-thought out cyber
policy, including crisis management in the event of a worst case scenario.
-
8/2/2019 Information Systems Management Project_Final 2
29/29
11.References1. http://www.sethassociates.com/wp-content/uploads/Evolving-Strategies-for-the-
Enforcement-of-Cyberlaws.pdf2. http://www.nytimes.com/2010/01/22/business/global/22music.html3. http://hothardware.com/News/Whats-the-Real-Impact-of-Piracy-on-Music-Sales/4. http://www.wisegeek.com/what-is-online-piracy.htm5. http://mattbrundage.com/publications/online-piracy/6. http://www.oxera.com/cmsDocuments/Agenda_October2011/Music%20piracy.pdf7. http://bbs.stardestroyer.net/viewtopic.php?f=22&t=1472298. www.nber.org/chapters/c12454.pdf9. http://www.radioandmusic.com/content/editorial/news/piracy-costs-indian-music-
industry-325-mn-ey
10.http://www.aact.in/Reports.php11.http://www.aact.in/downloads/reports/March2008-
EffectsofCounterfeitingErnst&Young.pdf
12.Kampelman, M. M. 1947. The United States and International Copyright. AmericanJournal of International Law 41 (2): 40629.x
13.US facts by Institute for Policy Innovation (IPI)IPI's figures are based on the RIMS IImathematical model maintained by the U.S. Bureau of Economic Analysis.