Copyright Issues in Digital Age Disseration
Copyright Issues in Digital Age Disseration
DEPARTMENT OF LAW
2022-2023
1
DECLARATION
Signature:
Date:
2
CERTIFICATE
This attests that RIYA SAINI worked under my direction and supervision to
complete the research project titled “COPYRIGHT ISSUES IN THE DIGITAL
AGE” as part of her Master’s degree (LL.M) requirements.
To ensure that her dissertation was thorough and comprehensive, RIYA SAINI
researched a number of books, journals, websites, and enactments. This
dissertation contains only original research that has never been submitted to
college and institution for a degree to be awarded. This is a fantastic piece of
work that deserves consideration. I hope she has a successful future.
-----------------------------
3
ACKNOWLEGDEMENT
This dissertation could not have been completed even without collaboration
and assistance of several people, many of whose identities may not be
included. We really value and generally accept their donations. My mentor,
Professor Surender Nara, deserves my utmost gratitude, nevertheless.
Without his direction, perseverance, support, and encouragement, I would
not have been able to work on a topic that was both of great interest to me
and a great learning experience working under his supervision.
THANK YOU
RIYA SAINI
4
ABSTRACT
The value of intellectual property has increased with the development of new
technology. This novel technology might pertain to copyright, patents, and
trademarks, among other things. It immediately comes to mind when we
discuss copyright protection then it’s typically awarded for genuine written
work, rhythmical, theatrical, as well as aesthetic creations. However, as new
technology has developed, new ideas have emerged, giving rise to things like
computer programmes, databases, layouts, diverse web works, etc.
Therefore, understanding copyright is indispensable when it comes to
databases, programming, as well as other electronic compositions. Copyright
is a critical issue regarding rights of intellectual property in the digital era. This
essay demonstrates how copyright laws can be used to protect computer-
related works. While talking about the problems, this study has been
separated into three sections based on various computer-related works,
including works on the internet, computer programmes, computer software,
and computer databases.
5
CONTENTS
A LIST OF ABBREVIATION………………………………………………
CHAPTER-1
INTRODUCTION………………………………………….
RESEARCH METHODS……………………………………………………
HYPOTHESIS………………………………………………………………
ASSESSMENT METHODS…………………………………………
CHAPTER-2
HISTORY……………………………………………………
CHAPTER-3
6
PROTECTION OF SOFTWARE COPYRIGHT…………………….
CHAPTER-4
ECONOMIC VIEWPOINT…………………………………………
REGIONAL STUDIES……………………………………………………
INDIA………………………………………………………………………..
7
AMERICA [U.S.A] ………………………………………………….
CHAPTER-5
CONVENTION OF BERNE………………………………………………
CONVENTION OF ROME………………………………………………….
WIPO………………………………………………………………………………..
WTC …….
8
CHAPTER- 6
TERM OF CYBERCRIMES………………………………………
CYBERCRIMES ……..
GREY AREAS…………………….
CHAPTER- 7
CONCLUSION……………………
BIBLIOGRAPHY…………………
9
CASES
10
Abbreviations List
11
CHAPTER- 1
INTRODUCTION
Web has greatly expanded in the last few years, particularly on mobile devices.
Producers of material found on the internet is a global online marketplace where
digital information is transmitted, including films, journals, journalism, and audio.
Because there is a large risk of original piece infringement mostly in digital age, it is
essential to include such original content with in purview of IP rights. The legal word
‘copyright’ (sometimes known as authors right) is used to refer to the ownership
rights that authors & other artists have over their creative works. Music, sculptures,
books, films, paintings, computer programmes, maps, are among the creations
protected by copyright1.As soon as we think about “original written, songs,
cinematic, or innovative works”, the Copyright Law comes to mind while
contemplating the value of intellectual property in relation to patent law. However,
as new technologies have developed quickly, new ideas have also surfaced.
Examples include “computer code, database, layout, numerous other works on the
internet, etc.
1
Term Copyright available at http://www.juscorpus.com/copyrights-for-artistic-freedom/?
12
Chapter IV, while internet protection in India and the laws that apply to copyright-
related matters and problems that arise in digital age are covered in Chapter V.
RESEARCH METHODS
In order to safeguard an individual’s freedom in both the physical world and digital
era is a relatively new development, Indian regulations are not as well developed as
those in other nations. The research will thus concentrate on the gaps in the current
system and make recommendations to turn India’s market into an investor hub.
OBJECTIVE:
The goal of this dissertation is to locate and investigate the laws that govern
copyright issues in India’s digital age. This dissertation would also concentrate on
the gaps in the current Indian intellectual property laws and make
recommendations to improve them.
With the aid of a few case studies, as well as the pertinent treaties that India has
ratified, the dissertation will clarify the many regulations dealing with copyright
issues in the digital era in India.
Whether India’s national Laws and pertinent international agreements that govern
copyright concerns in the country are effective?
13
a. What are India’s national laws addressing copyright challenges in the
digital age?
HYPOTHESIS
The administration and management of ownership inside the digital world, along
with the replication, diffusion, and mass discussion of compositions via digital
technology, are the key issues in the digital era.
ASSESSMENT METHODS
The methodology is used since there is already a wealth of literature and research
on the subject that could be helpful in bringing about improvements in the capital
14
market with regard to investor protection regime. Additionally, the study approach
is useless because the purpose of this dissertation is to evaluate the obstacles that
India’s copyright protection system faces in the digital era.
The researcher will examine current legal guidelines, court rulings, academic
articles, and comments on various aspects of the subject matter for the
aforementioned aim. The MDU-CPAS library comprises primary and secondary
sources that the researcher has gathered from a variety of sources.
15
CHAPTER-2
The database consists of a digital acquisition of information such has been arranged
and makes it simple to access that data. As “software or a programme which
regulates the database,” a database system (DBMS) is used. As a result, it’s crucial
to recognize the difference between the two while assessing what is protected
under datasets.
A database is a set of data that incorporates publications, statistics, and some other
materials that have been organized as according logical rules or in a systematic
method. Thus, database comprise textual, graphical, or musical compositions as
well as collections of documents, images, audio, statistics, and some other
information. If the creator demonstrates a certain measure of innovation, therefore
2
Term Data available at http://www.dataversity.net/the-data-information-knowledge-cycle/?
16
the arrangement and structure can be safeguarded by copyright, but the realities
cannot.
Since already stated, data bases are compilations about information comprising
projects, facts, and additional components which have been organized logically or
organized in a methodical manner. Thus, data bases are safeguarded via intellectual
property rights despite the fact that they’re assemblages for non-genuine projects
since they are the product for ability and effort effectively used via the creator to
produce the original work of art. One Example, A dataset of publications on “Indian
Intellectual Property Laws” that has been constructed with “genuine effort,
knowledge, and wealth used and structuring the contents” would be awarded
copyright. In light of this, several nations recognize databases as works of literature
and extend copyright laws them as well assuming that their content is original.
Within India, “literary text’ is defined incorporate computer software, statistics,
17
assemblages, or computerized data in Section 2(o) of a Copyright Law, 1957.
Databases are indeed viewed as literary works.
The Federal Court of Queensland has made it quite clear that archives in Australia
can be safeguarded under Statute as written texts, but then that security isn’t really
required to have a significant level of creativeness: instead, a moderate degree of
originality and inventiveness is acceptable. A list or collection that is expressed
through words, arithmetic, or symbolism is deemed a literary work under the
Copyright Law. The White & Yellow pages, both of these had been released through
Telstra, as well as additional unreleased Telstra headed publications, was the pieces
of literature that had been considered through the federal court of Australia in the
present case.3
HISTORY
The Berne Convention of City of Light Act, 1971 for the Safeguarding of Literature
Artworks and Creative Artworks 4is the foundation of databases copyrighted
materials. The current debate about data integrity would be readily recognized as
an amplification of a lengthy battle between the two competing streams of
copyrighted material for assemblages. A main vantage point affirms that datasets
and collection are shielded and it is that really is, even without evidence of
innovation or uniqueness, as well renowned as the “moisture of a hairline” or
“creative collection” doctrine. The above validates the argument by asserting that
datasets must be given copyright laws since they are the outcome of extensive
workforce and financial commitment. If certain security is offered, it will be viewed
as a motivator that will support in developing new datasets.
3
Telstra Corporation Ltd. case of 2001
4
Berne Convention signed on 9 Sept. 1886
18
The second piece of intellectual opposes the theory that datasets devoid of ideas or
creativity must be guaranteed. However, supporters of the second version would
keep extending copyright laws to “statement contained within the data,” which is
restricted to an initial choice, structure, or approach of realities inside the dataset
but does not include the realities directly. Lawmakers endorsed their viewpoint
inside the 1976, Data Protection act, but still the majority of justices refused to
award security to datasets that demonstrated any “innovativeness” with in
collection or utilization of actualities.
Lawmakers clearly stated that the initial choice and coordination in the game plan
of the materials in the compilation were the only parts of the copyright that applied
to an accumulation. But a few judges applied the “sweat of the brow” approach
after the 1976 Act was passed, ensuring that databases lacked any element of
innovation or originality.
When assembling the individual database entries, there are three things to keep in
mind:
19
As is clear, originality is strongly tied to how ideas are expressed, in addition the use
of a term need not be restricted to its initial state under intellectual property laws.
Artist must be able to distinguish what he creates as unique by proving that it
constitutes more than just a little change.
20
ACT OF 2000 ON INFORMATION TECHNOLOGY
The Information and Technology Bill was endorsed by the Union Cabinet on May
13 and eventually adopted by both chambers of Congress on May 17, 2000. The
aforementioned measures, that will thereafter refer to the year 2000, Information
& Technology Law, obtained presidential approval on June 9th, 2000. The goal of
regulating and controlling every internet-related activities throughout the nation
had been effectively accomplished by the aforementioned law, though the range
for safeguarding databases stipulated in the law remains restricted.
Only those who download, copy, or extract data, databases, or information from a
computer system, network, or computer without the permission of the authorized
user are subject to liability under the act, according to Section 43. Section 43 also
defines databases as ‘representations of data, statistics, skills, and ideas those have
been assembled within a standardized manner.’ Whenever a action takes place
alongside the intent to defraud and result in unlawful profit, unlawful suffering, or
harm towards the society, or when intentionally modifies or disintegrates any data
on a computer system or network through “hacking,” then criminal liability is
imposed under the provision of Section 43. Information pertaining to: - is protected
under the IT Rules of 2011.
The protection provided by copyright laws for computer databases and software
has been acknowledged by several nations. The Copyright Act of 1957 efficiently
safeguards the programming of computers in India (as revised in 1994), which also
provides equal protection to copyright owners. A computer database in accordance
with Section 2(o) explanation of a literary work. The evaluation of the uniqueness
has become crucial and needed during the safeguarding of copyright while India has
21
become signatory to the agreements of Berne & the TRIPS Convention, which
implies that whatever choice of the subject matter and presentation is going to be
awarded this safeguard specified the requirements of the Test for Uniqueness has
become satisfied.
For the selection of artworks that meet the requirements for safeguarding under
copyright, a choice or organization of the components must exhibit some ingenuity
and originality. The India copyright law fails to define ‘originality’ and Indian courts
decide every instance according to the information available as well as unique
conditions at hand.
The Nation of Indian adhere to the ‘SWEAT OF THE BROW’ principle, or a
combination of talent as well as effort. When an accumulation of ideas or contents
that results in a work of literature is one that was created with a sincere
commitment and dedication of effort, resources, time, and talent, even when it has
been obtained from an established source, then that compilation is safeguarded
within the law of copyright.5 The legal system placed a strong emphasis upon the
belief that nobody has the right to gain from the labours or the slightest bit of
inventiveness of another individual.
The instance themselves so demonstrate how strongly the courts of India support
a notion of “SWEAT OF THE BROW.” The Delhi High Court has evaluated if the
provision regarding safeguarding databases was relevant in the proceeding of
‘Diljeet Titus Adv. & Ors v. Alfred A. Adeb are & Ors.’ According to the court’s
decision in the present matter, the ‘copyright within a dataset compiled by an
assistant advocate performing beneath the supervision of an experienced attorney
as well as utilizing the skills, amenities, or capital made by the experienced attorney
will stay alongside the firm’s, which means senior. 6During Interpretation Section
17(1)(c), the court noted that, absent a specific agreement, the employer shall have
the exclusive and exclusive right to use any work created while an employee under
a contract of service.
5
In case Mc Millan v. Suresh Chander and Govindan v. Gopalkrishna 1995
6
In case Mr. Diljeet Titus Adv. V. Mr. Alfred A. Ade bare and Ors (2006)
22
CHAPTER-3
Software varies from “Hardware” in that the term pertains to the actual physical
components of a computer’s system, such like silicon chips, microprocessor, the
keyboards, etc., which have software stored on them.
23
Program
Code
Translator
Product
Code
Executor
OUTPUT
24
PROTECTION OF SOFTWARE COPYRIGHT
Despite all the evidence, we conclude that, with the correct measures, for poor
nations, this challenge isn’t overwhelming. Authorities and financing organizations.
For example, may review their merchandise procurement methods in order to
25
greater emphasis for minimum -effort commercial designing components, which
include easily found free and open-source products.
The first copyright law introduced in India was the copyright Act, 1914. As the year
clearly suggests, the copyright law was promulgated in India, prior to independence,
which also shows that this modelled on the British Act of 1911. At present, the
Indian Copyright Act, 1957 (the provision of which are in line with the berne
Convention) and the Copyright Rules 2013 are the current laws in force in India in
relation to copyright).
26
effective control over such software businesses. However, the Info & Techno Act
does not have a particular clause that addresses computer software.
Despite all of these attempts, legislation has not yet been created to regulate
computer software. These programmes are safeguarded by the copyright and
patents Laws as well as trade secret laws The Info and Techno Act 2000 (Amended
2008) covers digital certificate, digital data & preventing crime.
Computing programmes are regarded as literature artworks under Sec.- 2(o) of the
Indian Copyrights Law of 1957 since they are expressed in writing. The primary
requirement is that the reproduction must be in a tangible form, such as print,
writing, or any other symbols that audibly or visually depict the original work. Both
program code and product code are covered by the act, which makes no distinction
between them because they are the primary components of computer programmes
as defined by the act. The objects under computer software that are crucial for the
operation of the computer include computerized graphics, graphics cards, disks, etc.
If data is recorded on compact discs, disks or magnetic media to use an electronic
impulse, then it must be disclosed.
The US Supreme Court rejected the protection of white pages from a phone book
in the Feist vs. Rural Telephone case7, citing the “Sweat of the brow” concept and
the restriction that copyright laws only cover works involving originality, skill, effort,
and judgement. The scope of creative and literary work includes the programmes
created specifically for computer operation. But such a programme must be
innovative.
7
FEIST PUBLICATIONS, INC., Vs RURAL TELEPHONE SERVICE CO., 499 U.S. 340 SC (1991)
27
The Indian Courts have given” innovation” the same meaning as being under English
law in a number of judgements. In terms of copyright legislation, uniqueness relates
to the method through which ideas are expressed instead of their novelties, while
in academic work, it includes a way ideas are expressed via text or another form of
written work (with a clear framework). Copyright assurance requires very little
originality; instead, the emphasis is on the time, knowledge, skill, and money spent
on producing the work. No customs are needed to secure a copyright. It is not
mandatory to register it with the intellectual property office, although doing so is
an option. The legislation does not mandate the disclosure of source code for PC
projects, and programming copyright can be registered without it completely the
source code.
POSSESSION OF A COPYRIGHT
The Act states that a work’s author is its principal copyright owner8. However, in
situations where there is a manager-worker connection and a work is created
throughout the course of a business under a management or apprenticeship
arrangement, the business should, absent express written permission to the
contrary, be the primary owner of the copyright9. The same rules that apply to the
employment contracts in a copyright work also apply to computer programmes.
The owner of the copyright may only reproduce, interpret, and create derivative
works based on his original work. Under the provisions of Indian intellectual
property law, any illegal accumulation, replication, issuing of copies, or amendment
of an items of original programming would be considered an intrusion of
programming. In addition, it makes little different whether a deal is in support of a
8
The Indian Copyright Act, Section 17 ,
https://www.legalserviceindia.com/articles/copy_owner.htm
9
V T Thomas Vs Malayala Manorama, AIR (1988) 291 Kerela
28
project that the owner of the copyright has previously sold or not if someone other
than the license or the copyright owner offers or otherwise acquire the system to
anyone else. This is because they are violating the ownership in the system.
Although computer projects are considered abstract works under the Copyright Act,
their degree has mostly gone untested in this regard by the courts. All things
considered, there is a clear connection between the insurance coverage and the
encroachment problem. Although the Act protects the exacting portion of the
computer programme, the issue of what exactly qualifies as the exacting portion of
a system is still up for debate. It is possible for non-exacting programming
components to be inserted. Copyright infringement can also result from the
duplication of a system’s design and architecture.
This sort of infringement stems from the infringement of many works, particularly
dramas and fiction, where judges have said expressly that copyrights protection
doesn’t really limit itself to only words. In programming contexts, the question of
where significant duplication breaks down and which components of the system are
subject to copyright protection have been raised10. The difference between
“thought expression’ and the basic copyright legislation has bearing on this
problem.
Art.- 9(2) of the TRIPS Agreement state that copyright protection may only apply to
expressions and not to ideas, plans, methods of operation, or mathematical
10
Microsoft Corporation Vs Vijay Kaushik and Anr (2011) PTC 127 (Delhi)
https://indiankanoon.org/doc/203957/
29
concepts. The thought-expression duality in the copyright security is not
acknowledged by the Copyright Act, taking everything into account.
In R G Anand vs. Exclusive films, the Supreme Court applied the ‘reflection test,”
which was established in the United States by Nichols Vs. Universal Pictures, in
addition to the “look and feel” test, by identifying the topic’s simplification in the
plays and movie’s scripts11. The Court concluded that the respondent had not
violated any copyright and that there was no evidence to suggest that the
similarities in the complainant’s work were the result of copying but rather the
aftereffect of the common theme between the two works. Without providing any
more explanation, Indian courts continued to handle the matter in this manner in
subsequent cases. As stated in Sec- 14 and 57 independently, the Copyright Act
protects the creator’s financial as well as inherent rights inside the copyrighted
material, such as the rights in computer programmes. Due to programming
applications, the copyright owner is permitted to duplicate the work, release
duplicate data of the work to the public, create any cinematic clip or sound
recording in homage to the work, create any viewpoint then once more
modification of the work, but not to “offer then consider giving on corporate lease
or can provide available to be bought or for corporate lease any breakup copies of
the computer project.” When a computer project is valued without the software
itself being the primary rental asset, this type of business renting has no discernible
impact.
11
The case was not referred in the judgement.
30
The Act grants owners’ rights the “fair usage” and invert building exclusions” as in
the case of “literary production” (Section-52). The accompanying demos for
programmes are categorically not regarded as infringing on copyright: the lawful
proprietor of a duplication of such PC software creating duplicates of such PC
programme or alter such as duplicate—
1. To use the PC software for the intended purpose for which it was provided.
2. To make backup copies just as a temporary measure of protection against
misfortune, obliteration, or other harm I order to utilize the PC programme for the
intended purpose.
Section 52(ab) – (ad) of the Act permits reversed designing. Be aware that turn
around designing – often a necessity for learning, particularly in programming—
would not be possible under a system of patent administration.
31
CHAPTER – 4
In the light of the changes brought about by the rise of the internet, digitalization,
and an increasingly worldwide market for extremely effective virtual content, this
chapter examines how well the copyrights industries are behaving and growing. The
key financial structures of virtual content are described, and the top sectors
affected by copyright are identified. Research on country studies provide unbiased
accounts of the evolution of copyright’s economic significance and value. The
studies of nations highlight the key characteristics of each country’s copyright legal
standards and explain why they have changed over the last few years in addition to
defining whether intellectual property law have progressed. In the end, this
research will offer a comprehensive description of the ongoing talks over the
mainstream approach.
The writers of each nation’s plan emphasis how to optimize the instrument of
creativity and imagination by introducing renown & acknowledgment via copyright
bills, and these standards and guidelines had been established prior to the explosive
development of the digital generation. Because challenges develop upon a daily
basis and laws must be updated with the goal to address all concerns and give
remedies to the same reason, it is critical for all nations to continuously revising or
updating its copyrights regime in order to stay ahead of evolving concerns regarding
the utilization of technologies. The initial modification was implemented in the US
to the DMCA [Digital Millennium Copyright Act], which was approved in the year
1998, then in 2001, the EU [European Union] introduced Copyrights Directives.
Canada Passed the Copyright Modernization Act in the year 2012, and the EU’s
different member nations are currently considering it.
32
1. What is the scope of copyrights?
2. Copyright restrictions and exceptions?
3. How do I register my copyright?
4. How can copyright be enforced?
These are the sections that are discussed the most frequently and where the
majority of changes have been made throughout time.
I. Italy
II. European Union
III. Poland
IV. UK
They additionally presented the bill/law for strengthen the privileges of database
developers by incorporating non- creative databases under the purview of
copyrights. Orphan works refer to those that are produced by an individual whose
identity is unknown or cannot be established. Copyright protection is employed to
safeguard the author’s creative output. The challenge of how to safeguard them
arises because to the widespread use of orphan work on the internet. Countries like
Japan and Canada have adopted a “Public License” solution, which is given by the
government’s copyright office when a party demonstrates that great attempt was
made to find the legal owner but was unsuccessful. Currently, a newly approved EU
33
law on orphan works outlines some of the permissible uses of such works, while
many other nations still do not have orphan work policies.
The cost of sharing, changing, and duplicating information has increased in the era
of digitization, which has also increased the availability of stolen content. Therefore,
policymakers should remember that consumers should exercise caution and
flexibility while using such copyrighted material in the digital age. All nations have
taken into account the restriction and exception, and the same frameworks have
been established to permit the use of some unauthorized content for review,
criticism, educational purposes, etc. the use of copyright material’s contents for
commercial purposes is prohibited by law. To safeguard the individual who created
the original work’s legitimate interest, this is done. Thus, the essential two items in
restriction and Exception must be kept in mind.
Therefore, the primary goal of the legislative structure ought to be to prevent digital
piracy since it influences the actions of key market participants, and the laws should
be upheld to safeguard the rights of the rightsholder.
This chapter’s focus is on the experiences different nations have with the digital
copyright regime. There will be three sections:
34
1. Copyright from an economic standpoint.
2. Copyright and Interest issues related to the years of technological
development (Chapter 5 will address this).
3. A study of each nation’s legal system and the development of copyright.
As we already said, copyrights is a kind of intellectual property rights that grants the
work’s author specific rights for a certain amount of time. The copyright owner has
two exclusive rights to reproduce his work:
There are also certain economic rights that are granted to those who are:
a. The rights of authorship
b. The rights of integrity
c. The appropriate to credit
d. The rights to divulge.
These rights are granted to the author even after the transfer of his copyright work
to a third party.
35
ECONOMIC VIEWPOINT
The listed below are the two major economic elements expression, covering audio,
and orchestral composition:
The artwork wouldn’t be visible within the context of not-rivals artistic creations,
since it is diminished expense of creative work duplication within the age of
digitization, If there was no legal patent safeguards. Therefore, the justification for
ownership is that it is necessary to promote creativity and transmission by granting
the inventor some authority over how their creation may be utilized by others.
Directorial ownership through exclusive ownership offers significant financial
benefits and allows writers the potential to support themselves through their
creative works. This therefore paves the way for the reciprocal flourishing of culture
and producers.
The economic justification behind authorship entails that without it, others could
profit from authors’ workforce for free, thereby reducing the availability of
innovative products. Therefore, a shortage of adequate, acknowledged, and
efficiently enforced copyright will prevent future expenditures in original literature,
artistic, and innovative products. Ownership clearly serves an economic purpose,
and the legislation reflects this properly. An unique novel, screen play, orchestral
composition, or other literature or innovative work is challenging to create but
simple to replicate, according to the theory behind it.
36
“Copyright Protection, or the owner’s authority to restrict others from copying files,
balances the advantages of encouraging the creation of a works against the cost of
restricting access to it. The biggest concern with copyright legislation is filling the
appropriate balance among accessibility and incentives12.
The terms “copyright” and “delivery system” are distinct and cannot be used
interchangeably. When an audio disc is utilized for transmitting an audio file. Eg- an
audio file has been produced & safeguarded by copyrights laws; Nevertheless, when
users purchase that audio recording, users don’t gain control over that audio file.
12
William M. Landes and Richard A. Posner Theory
13
Copyright Based Industries: Assessing their Weight Available at
http://www.wipo.int/wipo_magazine/en/2005/03/article_0012.html
14
http://www.wipo.int/wipo_magazine/en/2005/03/article_0012.html
37
creation, distribution, and consumption of products and services protected by
copyright15.
3. Partial Copyright Enterprises: ----
These enterprises, which include art, architectural, jewels, furnishings, as well as
other arts, only have a portion of their output associated with copyright content16.
4. Non – Dedicated Supporting Enterprises: ---
Which including Telecommunication, Logistics, and Basic Merchandise, which only
marginally depend on copyrighted content or where copyright creates a very minor
amount of their revenue. Based on a properly balanced copyrights elements, the
importance of these enterprises to authorship id determined17.
Central copyright intensive enterprises are all those completely devoted to
generating, manufacturing, and constructing, exhibiting, transmitting,
communicating, or distributing and marketing the artworks and other protected
works. The following are classified by WIPO as key copyright Enterprises18: ---
e. Photography
15
http://www.wipo.int/wipo_magazine/en/2005/03/article_0012.html
16
http://www.wipo.int/wipo_magazine/en/2005/03/article_0012.html
17
http://www.wipo.int/wipo_magazine/en/2005/03/article_0012.html
18
National Studies on Assessing the Economic Contribution Based industries available at
http://www.wipo.int/edocs/pubdocs/en/copyright/624/wipo_pub_624.pdf
38
g. Graphics and artistic arts
h. Advertisement
39
REGIONAL STUDIES
Many nations in the modern world have copyrights laws that safeguard software
and applications.
INDIA
The Indian Copyright Act, 1957 controls India’s INTELLECTUAL PROPERTY RIGHT (IP
Act) laws for computer programmes. The statutes are recently undergone
modifications which have rendered it among the globe’s hardest legislation
regarding copyrights. Modification that was proposed within the month of June
1994 marked an important milestone within the arena of copyrights. For initial time,
the legislation identified the following viewpoint regarding: --
19
Copyrights Law ,Sec.-14 https://copyright.gov.in/documents/copyrightrules1957.pdf
40
specified exemption in Section 53A, which is punished by a fine not less than R.S.
50,000 and a minimum of 6 months of jail, with a potential extension to 3 years 20.
The first Copyright Law in Australia was passed in 1986 to govern copyright
concerns, and it has since been revised multiple times. When technology became
widespread in Australia, the system for regulating copyright was created to control
the consequence of the digital environment. Since 1968, when the original
copyright legislation was approved, approximately 60 revisions (large and small)
have been enacted to the statute, with 2006 being the most recent important
revision. The amendment strengthened pro government laws as well as re-
examined the issues regarding digital rights exceptions, but still it did not allow
individual duplication of digital products, where it had become a prevalent practice
these days21. Copyright Law in Australia seems to last 70 decades after the death of
the last living narrator. There aren’t any copyrights bureaus in Australia, although
20
Sec.- 63 of Copyrights Law
21
Copyright law of Australia
41
the public organizations are now The Attorney General’s Office & The IP Tribunals
of Australia22.
3. Expert Guidance
4. Investigative journalism
5. Comedy Purpose
There is no restriction for Orphaned works, and also no registration is necessary for
copyrighted material. For example, infringement of copyright is a civil issue in
Australia, but it can also be criminal in certain cases.
22
Martin Hinton, Daryle Rigney, Elliot Johnston: Indigenous Australian and the Law, Page 70.
42
AUSTRALIA’S EXISTING PROBLEM
For years and years, disputes about “Copyright in the Era of the Internet” have taken
place. The Australian Law Reform Commission recently produced a study titled
“Copyright and the Digital Revolution,” This advises the Australia Govt. implement
an idea about legitimate exemptions as well as reduce back legally binding licencing
regulations. The Australian Attorney General declared on February 14th, 2014,
stated ‘The government was going to start tackling a growing problem of digital
infringement.’
The Copyrights Statue initially come in Canada during 1921, years before
technologies became functional as well as the World Wide Web was formed, and
it’s been revised multiple times since then. During 1997, the Roman Convention
Concerning the Protection for Artists, Production companies, and Broadcasting
Organizations was put into effect, offering protection to singers and producer of
audio recordings, and also introducing a new exceptions & restriction to copyright
in the statute. Then in 2007, another measure was approved in Canada that
changed the Criminal Laws and made it illegal to record a film at a cinema theatre
even without owner’s agreement if the conduct was done for a commercial reason.
The Copyright Modernization Act was revised in 2012, and the WIPO’s Internet
Treaties of 1996 were applied in Canada. The core objective of such revisions was
to provide individuals with a move versatile copyright regime that will support in
growing innovations and creativity in the digital age. Another goal was to empower
right proprietor’s new digital privileges. Copyright holders can now utilize TPMs
(Technological Protection Measures) in the form of electronic locks to prevent
illegal access to their protected content. These new restrictions also prohibit the
43
manufacture and sale of equipment designed to break electronic locks. These locks
are being used by online gaming software developers to secure their work.
1. The Copyrights Office shall be affiliated with the patent Office, and the
office’s tasks shall include copyright registration and licensing, in addition to the
maintenance of a copyrights record.
2. The Copyright Board is an independent, legal body that serves as an
administrative regulating authority. Authority has the ability to determine on the
royalty payments which need to be compensated for copyrights usage. The Board
has assigned a supervisory function to arbitrate on agreements between users and
licensing bodies.
Sui Generis Databases are not protected in Canada, as they are in Australia. An
assemblage is a piece of art created by the gathering or presentation of facts.
Moreover, laws safeguards databases in addition to unjust competition and trade
secrets. An additional licensing plan for orphaned creations is stipulated in the
Statute. To be granted a licence, an applicant must establish that “reasonable steps”
had been taken to identify copyright proprietors. The Copyright Board of Canada
issues the licence, which is only valid in Canada for a set period of time and usually
includes a royalty payment23. Copyright registration is not required in Canada.
23
Section 77 of Canada’s Copyright Act
44
CURRENT PROBLEM
45
i. Multi Territorial licencing for artistic privileges & collectively administration
of copyrights along with associated privileges for nationwide usage digitally.
ii. Some authorized usage of orphaned creations.
iii. A Defence of software within the rules of law.
iv. Within the subject matter of IPR, rentals and borrowing privileges as well as
specific privileges connected with copyrights.
v. Duration for copyrights along with other associated privileges security.
vi. Safeguarding of creativity properties.
vii. Regarding a creator of a unique piece of artwork’s reselling privileges.
viii. Databases are protected legally.
ix. The copyrights associated privileges that apply at cables rebroadcast or
satellites broadcast.
x. Harmonizing some copyrights as well associated privileges within
informational environment.24
Copyrights last for seventy years after the demise of the final alive write, whereas
adjacent expire after fifty years have passed. Regarding the scenario of audiovisuals,
the periods remain seventy years. Databases security was initially thought during
1996 alongside the intention of providing database with uniform security. This
additionally offered an innovative kind of Sui Generis privilege to databases
producers. This stage of the EU, copyright is unable to be registered25.
24
EU’s Directives available at https://digital-strategy.ec.europa.eu/en/policies/copyright-legislation?
25
Duration of copyrights safeguards available at https://en-academic.com/dic.nsf/enwiki/1097127
26
Japan’s copyright’s law available at https://www.cric.or.jp/english/clj/ocl.html
46
was established in Act No. 43, which was recently amended. The aforementioned
legislation also reinforced the protection of associated right and copyright in order
to boost the effectiveness of anti-piracy efforts. In Japan, copyright for
cinematographic works expires 70 years after publication, but copyright for other
artistic creations including how they perform, novel, and audio recordings expires
50 years after the author’s death.
The Agency for the Affairs of Culture is the body handling matters related to
copyrights regarding the MEXT [Education, Sports, Science and Technology]
Ministry of Japan. Databases can be safeguarded as unique databases within Art.2-
12 of the legislation when “the choice or methodical building of the materials
comprised, constituted inventive works.” Restriction as well as exceptions are
additionally included within the statute for individual usage, replication at library
resources, academic, educational resources, and individual uses. Certification
seems optional within the nation and is usually completed vis the Japanese Cultural
Relations Bureau. In the nation of Japan, violating copyrights seems as civil issue
that may be prosecuted & may lead to an identical fine or jail sentence if a creator
files a lawsuit.
UK (GREAT BRITAIN)
Throughout The Great Britain, copyrights are safeguarded under the year 1988,
COPYRIGHTS DESIGN & PATENTS REGULATION [CDPA]. The Great Britain lawmakers
considered seriously the pertinent EU’s orders, especially Directives 2001/EC/29 &
Copyright Directives 2006/EC/11627. The latest version was made on October 29,
2014, when EU Orphans Works was implemented.
27
Harmonization and protection of Copyright Directives available at https://www.clarin.eu/content/clic-
overview-copyright-law?
47
Timespan of Rights
28
Originality and Database Right Available at https://en.wikibooks.org/wiki/UK_Database_Law?
48
as well as leading upon specific subjects related to web & broadcast policies.29 An
additional exemption regarding copyrights came into effect between 1st June to 1st
October of 2014, establishing a foundation in a variety of sectors across the age of
digitization. In October 2014, the EU Directive establishing standard guidelines for
an exemption to copyright Statute enabling the digitalization & online exhibition of
orphan works was implemented.30
Present Problem
The topic of “Copyright in the modern era of the Internet” has been a prevalent
subject of public discussion over a number of years, but the current key problems
are as follows: -
1. Potential EU-level Copyright Reform that will Focus upon the Digital Single
Market.
2. Under the EU Copyright Framework, UK Copyright Reforms.
3. Overcoming the difficulties to the implementation of technological
innovations.
Case Law
29
DCMS available at https://parallelparliament.co.uk/dept/DCMS
30
EU’s Directive
49
the application codes programmes since it constitutes a modification of the original
codes.31
AMERICA [U.S.A]
31
Sega Enterprises Ltd. Vs Richards 1983
32
DMCA & WIPO full form available on http://www.ala.org/advocacy/copyright/dmca?,
http://www.wipo.int/edocs/mdocs/mdocs/en/wipo_int_sin_98/...po_int_sin_98_10.doc?
50
A copyrightable piece produced in the USA is automatically safeguarded from its
date of invention throughout the duration of the life of the creator plus an
additional 70 years under the copyright legislation once it is made and established
in a tangible form of expression on or after the 1st of January 1978. But keep in mind
that this merely only an expression. There may be varying restrictions depending on
the date a work was made and if it was published. Additionally, the protection
conditions for pseudonymous, anonymous, and works created for pay also
represent exceptions to the fundamental life plus 70 terms.
In comparison to Australia &Canada, the United States never provide Sui Generis
Database protection; however, if the originality test is met, the database is covered
by the copyright and protection is provided.33
Case Law
The Court on review held that copyright could exist in computer programs
expressed in object code or embedded on a ROM (electronic read-only memory
device). The court found that copyright could exist in computer operating systems
and that the district court based its denial of the injunction in large part on an
erroneous view of the law. The court held that the jeopardy to plaintiff’s investment
and competitive position caused by defendant’s copying satisfied the requirement
of irreparable harm needed to support a preliminary injunction34. The court’s
decision in the proceeding of ‘Whelan Associates Inc. v. Jaslow Dental Laboratory’.
The concept of “Copyrightable topic of programming was defined as everyone what
33
Database Protection available at
http://www.researchgate.net/publication/228172643_Discoun..._Database_Protection?
34
Apple Computer Inc V Franklin Computer Corp. 1983
51
isn’t required for the intended use or functioning of a computer programmes,
encompassing the structures, series and arrangement.”35
An individual may submit a petition regarding authorization of his or her work in the
USA. It is not an obligation and is elective. Thus, As shortly an artwork is established
within a specific way of representation, protection is instantly granted to the
creator.
35
Whelan Associates, v. Jaslow Dental Laboratory available at https://silo.tips/download/copyright-in-
digital-era?
52
CHAPTER – 5
Alongside the Internet’s quick development has come a greater demand for
copyright protection, which is crucial and necessary in the digital age. The
protection provided by copyright laws, which were previously limited to
safeguarding works in tangible form, has recently been expanded to include works
on the internet, under the condition that they meet certain criteria. Therefore,
copyright’s primary goal is to safeguard original works that have been generated in
physical form (such as writing, typing, or recording). Because of the growth of the
internet and its widespread use, it is likely that copyright will be violated, and this
has led to mind-bogglingly easy and free infringement. Access to the internet and
the possible consequences of downloads generate brand-new, serious problems in
the area of copyright violation. The development in technology has made it simple
to replicate or modify content from one website and publish it on another, which
poses significant challenges for the conventional notion of privacy and safety.36
Anyone with a computer and a modern may become a well-known publisher since
all it takes is one mouse click to download, transfer, change, or create a subsidiary
work into another. Because it contains material in the form of images, sound, and
recordings, a website page qualifies for copyright protection even if it has very little
in common with a book, a magazine, or a CD-ROM containing sight and sound.
Copyrights regulation endowments an owner of the original work has only authority
to provide permission for reproduction, distribution, etc., but the applicability of
36
https://blog.ipleaders.in/analysis-of-copyright-issues-in-cyberspace/?
53
this concept online cannot wholly be tied to copyrights. Replication of document is
necessary for both studying information at workstations as well as transmitting
information across the web, which is equivalent to reading a book or magazine in a
store. This could result in the creation of an unauthorized or authorized duplicate
copy of the work after a temporary copy is made in the RAM of the client’s PC to
facilitate access. According to the legislation that is emerging on the issue and the
common viewpoint, since the duplicate copy made is temporary or sporadic, all
access to a website page would not be considered an infringement. Making links to
multiple locations inside the summary is another challenge that website owners
face. The transfer od data via the web as well as viewing information at a workspace,
which is analogous to studying a magazine or book in a store, require replication of
material. Following the construction of a temporary copy in the RAM of the client’s
PC to simplify access, this might lead to the development of an illegal or authorized
duplicate copy of the work. All visit to a website page would not be regarded as an
infringement, in accordance with the legislation that is developing on the subject
and the general opinion, as the duplicate copy created is transient or intermittent.
Additional difficulty faced by internet site proprietors is creating connections
toward numerous places inside the summary.
From the beginning, the Convention of Berne & the TRIPS Convention served as the
main foundations for global intellectual property laws for the safeguarding all
artwork. The Convention of Rome tackled during that point so-called Associated
Privileges concerns with soundtracks & performers. Since the year 1974, the
Worldwide Itell. Propt. Organisation [WIPO], an independent part of the UN
Corporation, has been in charge of overseeing major Global IP Treaties. Through the
assistance of the nations that it represents along with additional Global
organizations, UNESCO seeks to advance security around the entire globe.37.Right
54
now 179 nations remain the representative of WIPO and it administers six
copyrights agreements, which has an explicit intent & ambition of “homogenize
regional IP safeguards with an eventual sight closer to ensuring the establishment
of solidified, harmonious system of universal laws.”
states are the member of WIPO and it governs 6 copyright treaties having the clear
agenda and aim of “homogenizing national intellectual property protections with
an ultimate eye towards the creation of a unified, cohesive body of worldwide
international law.”38
CONVENTION OF BERNE
The invention of publishing, leading for the immediate and affordable rejuvenation
for replicas of documents, is associated with the initial stages of copyrights. There
were extremely high requirements for written content, so it was the rise in the
artistic rates which substantially altered the marketplace for publications. Since an
outcome, it was chosen to safeguard the basic privileges of both the writer and
editor against any unlawful replication. A s a result, the fundamental copyrights
regulations came into effect. Which stipulated that, upon the expiration of a
specified term, the advantages enjoyed by Stationer’s for producing and distributing
copies of works shall be returned to the writers who wrote the publications, who
have the authority to grant advantages to third-party proprietors in their discretion.
38
Convention establishing the WIPO , Stockholm, !4, 1967,
https://en.wikipedia.org/wiki/World_Intellectual_Property_Organization?
55
The ordinance of Anna promoted a race in the dispersed economy through limiting
the imposition of business models and perceiving the inventors as the rightful
owner of the authority to authorize replication. After England recognized the
author’s right by an ordinance in Denmark in 1741, copyright quickly spread to all
other nations after that. Following the adoption of the first copyright legislation by
the United States in 1790, In Germany, copyright rules were supplied as a collection
of norms that governed publication agreements. Later in the twentieth century,
several German governments recognized writers as the lawful owners of their
creations and passed legislation to that effect. As a result, the notion of copyrights
regionalism came to indicate that copyright safeguarding was merely accessible
within certain areas of the nation. Therefore, it became critical for governments to
enter into Bilateral Agreements in order to preserve the works of writers living
outside the country. Mutually beneficial deals among EU’s have been envisioned in
the Twentieth Century, though they never emerged regularly applied due to their
non-comprehensive and inconsistent nature.39 The need for a consistent system of
protection arose, and on September 9, 1885, the initial universal agreements
regarding the protection of author’s rights were signed in Berne, Switzerland. The
Berne Convention is currently administered by WIPO in Geneva, Switzerland.
Agreements went through a couple of revisions to incorporate while taking into
consideration tha basic modification brought about by the publishing and
dissemination of literature and creative artwork.40
39
Bilateral agreement among EU’s
40
The Berne Convention for protection of literary and artistic works available at
http://www.wipo.int/edocs/mdocs/arab/en/wipo_cr_dam_05/wipo_cr_dam_05_8.doc?
56
Paris Agreement Modification Committee in 1971, alterations were made
concerning the special purchase for areas of development that had been made in
Sweden. The actual purchases permitted under the Sweden Convention in nearly
exactly the same manner, yet they weren’t ever carried out.41
Compliance with The Convention of Berne has risen in recent years due to greater
knowledge and necessity for copyrights safeguarded in the worldwide arena.
Additionally, there has been an explode within worldwide commerce of services and
products which were safeguarded through IP, since wealthy as well as poor nations
discovered the fact, it would be in their greatest advantage to establish an
extremely powerful guarantee for intellectuals’ resources with the goal to boost
exposure to commerce.
The two most significant components of safety within the Berne Convention are-
41
Worldwide Organisation for safeguarding the copyrights and associate privileges
57
literature or creative piece. Additionally, the second para. Of Art.-2 permits nations
to stipulate that data to be maintained in a tangible way, such as writing or typing,
in order to provide security. For instance, as nation had a rule like this fixated
prerequisite, a choreographic piece would simply be safeguarded if the motions
have been captured on camera or wrote out using audio annotation.42
“The writer & their heirs for possession are protected and benefited by the sixth
para. of Art.-2 contained in the convention. The possession of copyrights within
specific kind of projects, which include “cinematographically creation” should be a
significance to statutes within the nation when safeguarding is asserted.
Illustration- Participating nations can state that the original holder of the licences
for these operates belong to the creator, instead of the supervisor or another
individual who invested towards the research’s production.” Publishers who
currently live in the nation which is a signatory to the “Agreement of Berne” are
safeguarded via Art.- 3 of the agreement, as a publisher who aren’t citizens or
inhabitants of that nation yet have to distribute their publications within one of the
participating nations.43
42
Art.-2 of Berne Convention available at https://www.law.cornell.edu/treaties/berne/berne.htm?
43
Art.- 2 & 3 of Berne Convention available at https://www.law.cornell.edu/treaties/berne/berne.htm?
58
According to Article 7, protection is provided for a minimum of the author’s life plus
50 years after his passing. Article 7 does, however, also provide for exceptions to
the general norm, i.e.
The Berne Convention’s adoption comes with a number of benefits. The primary
benefit is that all other states who are parties to the convention automatically grant
protection to authors’ work, which allows authors to profit financially from the
growth of markets. The fact that foreign writers’ works can be distributed with their
permission or assent as soon as a country joins the convention also increased the
rivalry for domestic authors. The legislation additionally established the United
Nations Court, which has adequate authority to rule upon matters involving nations
parties; however, administrations had the ability to seek defences, which was
considered an obstacle for the agreement, and numerous nations did so during the
moment44.
This originated during 1994, (as a component of the Uruguayan Round of GATT<
then WTO). Paris Act of the Berne Convention 1971, which provides specific
measures regarding safeguarding copyrights as well as is an Annex for the
Convention for Trade-Associated Features of IP privileges, but therefore all nations
who are participants in the convention are bound. The TRIPS Agreement recognized
software of computing by means of literature artworks covered by the Berne
44
http://www.rulg.com/documents/Retroactivity_Report_Russia.doc?
59
Agreement copyright protections, something the Berne Convention had previously
disregarded.45
50 decades after the demise of the author, or in the situation of works, 50 years
from the closing date of the year the work was first published or created, if the
duration of the period was impossible to determine. The agreement additionally
incorporate clauses about safeguarding of Associated Privileges & the enforcement
of IP Rights, including Copyright. According to this, performers had the freedom to
communicate to the public without obtaining permission on phonographs, wireless
transmission, or other media, unless it was necessary. Additionally, they were
permitted to rent out replicas of their phonograph.
45
TRIPS CONVENTION Intro. Article 10 clause 1 & 2 available at
http://www.wto.org/english/tratop_e/trips_e/intel2_e.htm?
60
including provision related to “associated rights,” and it also offers a mechanism for
member states to resolve disputes regarding consistency with the compliance
required by this Agreement.
CONVENTION OF ROME
The safeguarding of associated rights under the copyright laws regarding unlawful
copying was initially implemented by the phonogram industry. During the growth
of the right safeguards for phonogram makers and performers was presented at the
1928 Rome Diplomatic Conference, which was set up to amend the Convention of
Berne. The privileged position of performers attracted the ILO’s (International Labor
Office) intense attention. The Convention of Rome was finally written on October
26, 1961, following a meeting of BIRPI, UNESCO, and ILO in 1960.
Accordance with Article 1 within the Convention of Rome, a foreign meeting formed
which was referred to as “safeguard clause,” which specified that the safety
permitted by the Convention had to be completed and undamaged as well as that
it must not in any way affect the copyright safeguard that is granted to literary and
artistic works. It’s consequently forbidden to interpret any of the Rome
Convention’s clauses in a way which could compromise the safeguards of copyright.
According to Art.- 1, it’s obvious that wherever the writer’s consensus must be
obtained regarding future execution of the piece of art, the Convention of Rome
shall have no bearing on this prerequisite.
61
(Universal Copyright Convention). Additionally, according to Article 28(4), if a state
no longer participates in either the Berne Union or the UCC, they are no longer
considered members of the convention. Due to its relationship to copyrights, the
Convention of Rome was occasionally considered to be a sealed of conference even
though any state that satisfies the aforementioned criteria is eligible to join.
Art.- 2(1) of Rome Agreement is similar to Art.- 2(1) of the Berne Treaty in that it
principally refers to the national treatment that a state affords to local
performances, phonograms, and telecasts under its local laws. According to Art.- 2
para. – 2 the national remedy pertains to all fundamental safeguards specifically
specified in this Agreement as well as the restrictions imposed by the Agreement.
In accordance with Article 4 of the Convention, artists have the right to national
treatment even though their execution occurs in a different Contracting State
(regardless of the country in which they are located), on the off chance that it
mergers with a phonogram that is safeguarded by this convention (in spite of the
nation in which they are located or the nation in which the execution genuinely
happened), or on an off chance that it is transmitted “live” (not recorded).
In order to ensure that the Agreement pf Rome is properly followed by the greatest
number of artists possible, several possibilities for eligibility for safeguards are
offered. “Producers of phonographic recordings are also qualified to receive the
regional remedy when they’re citizens of another Party to the Agreement
[regionality basis], the crucial attachment occurred in an alternate singing state
[fixations criteria], as well as the audio recording had been initially or continuously
published in another singing states [the creation manage laws], as mentioned within
Art.- 5 of the Agreement.
62
amplifier within an alternative participating nation. When Contracting Nations may
declare the fact that they would safeguard such transmissions in praise of an
identical Contracting State if both the nationality and territoriality criteria are
satisfied (Article 6).
2. Regulating of transmission;
It should be emphasized that the final right mentioned cannot be applied to letters
to human being as a whole or to merely transmission of sound, so it’s up to domestic
law to determine the circumstances whereby a right like that may be established.
Additionally, it should be pointed out that the Agreement of Rome fails to offer
safeguards against transmitted cable delivery.
The earliest period of safeguarding through the guidelines of Art.- 14 within the
Agreement of Rome is twenty decades, commencing with the expiration of each
decades that followed.
63
The Convention of Rome is commonly referred to as the “Pioneer Convention”.
The Convention of Rome clarified instruments of associated rights safeguarding
throughout a time when only a few countries had effective law guaranteeing
the safeguards of artists, creators of phonograms, and the television
associations. Within the turn of the 19th century, intellectual property rights
customs ended and complied with in the wake of every country’s statute.
Despite several additional nations have signed onto the agreement when it was
established in 1961, its effect on the development of national statutes remains
notable. Many countries have taken action to safeguard delighted rights, raising
the scope of country-specific laws that provide safeguards to phonogram
producers and transmitting organizations.
WIPO
WIPO established a specialized unit of the United Nations (UN), 1974. The Paris
Union Assembly, the International Bureau of Berne, commonly known as BIRPI and
the Executive Committee, were only a few of the agencies that were founded earlier
WIPO.
i. Certification;
ii. Encouragement for intergovernmental collaboration for IP governance;
iii. Actions related to specialized programmes; and
iv. The dispute settlement mechanism;
64
When the convention creating WIPO was adopted, BIRPI was changed into WIPO.46
The Bern Convention concerning the safeguarding for literature and creative
artworks was modified during Paris’s Laws in 1971, and as time went on,
developments in commercial and technological fields such as video technology,
satellite broadcasting, cable television, and a significant rise in the significance of
computer systems such as programmes, databases, and digital transmission system,
such as the internet, had an impact on the works produced. Therefore, a new
international standard was required for this purpose, and later in 1980, work began
on the creation of a new instrument at WIPO47. Throughout the initial preparations
leading up to the establishment of novel tools, it quickly became obvious that the
most crucial and critical assignment faced by the producing committee needed to
demonstrate present guidelines as well as provide novel requirements in
recognition of the difficulties generated by digitized gadgets, foremost the web. All
of these topics were together referred to as the “Digital Agenda” in this situation.
Two new treaties were ratified during a diplomatic conference that took place from
2-20 December, 1996: the WIPO Copyright Treaty (WCT) and the WIPO
Performances and Phonograms Treaty (WPPT).
These two treaties are closely connected to the “Digital Agenda” and deal with the
following topics:
46
https://www.wipo.int/about-wipo/en/history.html?
47
https://en-academic.com/dic.nsf/enwiki/10960577?
65
WTC
Under the Berne Convention, the WIPO Copyright Treaty (WCT) is a specific
agreement which deal with the safeguarding of artworks and the ownership rights
of their creators in the world of digital media. Any Contracting Party shall adhere to
the substantive terms of the 1971 (Paris) Act of the Berne Convention for the
Protection of Literary and Artistic Works (1886), even if it is not a party to the Berne
Convention. The WCT also lists the following two topics as being covered by
copyright protection: Computer programs—regardless of how they are expressed—
as well as collection of data or other materials (collectively referred to as
“databases”) in any format that, due to the way their contents have been chosen or
organized, qualify as intellectual works. (In case if an information repository fails to
qualify as a legitimate creationism, then isn’t encompassed under the
Agreement.)48
i. Rights to distribution;
ii. Rights to renting; and
iii. A right to communicate with the general public.49
The ability to let the public to access both innovative & replicas of artwork complete
the auction or additional transference of proprietorship is known as rights of
distribution.
The rights of renting are an ability to permit the marketable renting to the
community of the inventive and replicas of trio different types of artworks:
48
https://wiki2.org/en/Berne_Convention?
49
Paper of Angeles University Foundation,
http://www.wipo.int/treaties/en/ip/wct/summary_wct.html?
66
• Computing programmes (excepting when the computing programme itself
isn’t the primary article of the renting);
• Cinematographic artworks (but only in situations where marketable rental
has resulted in widespread copying of such artworks, materially impairing
the exclusive right of reproduction); and
• Artwork personified in phonograms as determined by the nationwide50
For any type of work, the term of protection must last at least 50 years.
“The Agreement necessitate the signing parties to hand over legal relief towards
creators who circumvent security measures [such a encrypting] utilized in the
context of the usage for their ownership interests, in addition to for creators who
remove or modify knowledge necessary for the administration [such as licencing,
acquiring or dispersing fees] for their ownership interests.”
REPRODUCTION RIGHT
The WPPT expressly grants artists and phonogram manufactures the only right to
reproduce works, and the WCT incorporate Article 9 of the Berne Conventions to
50
http://ssrana.in/global-ip/international-copyright/wipo-copyright-treaty-wct/?
51
https://www.wipo.int/treaties/en/ip/wct/summary_wct.html?
67
grant writers the same right. The scope of reproduction privilege in the world of
technology, a topic that sparked intense debate within the framework of
agreements, isn’t addressed within the Agreements’ official phrases. The
generation (reproduction) right, however, as well as acceptable limits and
exclusions, are both fully applicable to the computerized surroundings, according to
Agreed Statements that are received by the Diplomatic Conferences.
Perhaps one of the biggest responsibilities made by the “WCT and WPPT” is to
acknowledge the privileges of writers, artists, & phonograph manufacturers, as well
as established exhibitions and phonograms, as appropriate. The authors, artists and
generators of phonograms are granted some specific advantages under the “WCT
and WPPT” to permit the distribution of their own works, presentations based on
phonograms, and phonograms separately via cable or distant means, ensuring that
people in the general public can access those pieces of works, public displays, and
phonograms from a location and at a time independently chosen by them52.
52
https://www.wipo.int/about-wipo/en/history.html?
68
of the term” creating readily accessible through a dissemination or dispersion
privilege. Since replicas of artworks, art shows, and the phonograms can
occasionally obtain during digitized on-demand communications, people from the
public as a whole might not be able to witness the artwork, public displays, or
phonograms during the point of transmission. The WCT stipulates that the
insignificant acquiring of tangible resources for enabling or creating a
communication of this sort is not considered conveyance within the context of both
the WCT and the Agreement of Bern. Obviously, it doesn’t eliminate the need for
accessibility criterion. Example, suppliers of services based on contributory risk.
Even if the WPPT does not have such an Agreed Statement, the same holds true for
it.
Accordance with Art.- 6(1) of the WCT, artists are permitted to grant a “solely
licence for circulation” that allows them to authorize the production of works that
are freely available to the public as a whole as well as distribute replicas of their
creations via sales or alternative forms of ownership. These rights are not specially
permitted under the Convention of Berne or the Agreement of TRIPS, since they fail
to expressly acknowledge cinematographic works. The Convention of Berne also
does not include a “right of distribution” clause. The contractual parties are in no
way required, by any stretch of the creativity, to pick a precise formula of fatigue
(that is, nationwide, local, or universal tiredness), or even to handle the exhaustion
problem. Identical sole rights are granted to creators and phonogram makers under
Article 8 & 12 of the WPPT.
The entitlement to commercially lease is provided under Article 7 of the WCT with
regard to computer projects, cinematic works, and works illustrated by
phonograms. However, these rights are subject to several significant exclusions that
are stated in Article 7 Subclauses (2) and (3). WPPT Article 9 grants executors in
appreciation of their displays changed in phonographic recordings and phonograph
creators in appreciation of that phonogram a first-come, first- served right of
commercial rent, as determined by national legislation.
69
The “three-stage” process to determine restrictions and exemptions is include into
Art.- 10 within the WTC and Art.- 16 within the WPPT, and it is extended to cover all
rights by Article 9 of The Berne Convention. As stated in the Arranged Statements
complementary the WCT & then WPPT, limitations and exceptions which are now
not permitted by the Bern Agreement might be enlarged in the digital realm.
Additionally, Contracting States are free to create new limits and specific instances
that work with the digital world. Naturally, the creation of new limits and exceptions
as well as the expansion of existing ones are only authorized if they pass the “three-
stage” test53.
When setting up both of the treaties, it was thought that any novel privileges in a
computerized field that took into account computerized material use might be
feasible overall and need preliminary assistance in overseeing in compliance with
digital methods of safeguarding and rights management data. To safeguard the
privileged ownership to creators, comedians, along with phonograph designers
regarding their projects, outcomes, and phonographs, both parties that
acknowledge to execute the Contract are obligated to offer appropriate legitimate
safeguarding along with successful ways towards circumvent initiatives applied for
doing that. Ex- of these embrace “copy safeguarding technology or replica
administration” platforms, that incorporate specialized equipment which
completely or partially inhibit the issuance of replicates when they’re useless.54
53
https://www.wipo.int/treaties/en/ip/wct/summary_wct.html?
54
Art.- 11 of the WCT and Art.- 18 of the WPPT https://lex.uz/ru/docs/4347549?
70
Contracting parties are required to provide a suitable response in the case of Right
administration data in order to prevent its erasure or alteration, as well as certain
relevant demonstrations.
The identical enforcement provisions included in WCT Article 14 and WPPT Article
23 require contracting parties to take appropriate measures to ensure that treat
applied correctly. These agreements contain comparable administrative and final
terms to those found in other WIPO agreements. Databases and computer
programmes are recognized as literary works protection for phonogram
manufactures and performers. This ought to be remembered that it also indicated
the nature of a performer’s privileges under the WPPT which merely implements to
real-life audio exhibits and exhibitions amended under phonographs, excluding the
privileges of television and transmission to performers, as well as people’s
perceptions of live performances, which includes all performances.
With the possibility of reservations, Art.- 12 within Agreement of Rome and Art.- 15
within WPPT grant phonograph performer and composer a “remuneration rights”
in appreciation of the broadcasting and distribution of phonograms to the public as
a whole55.
It become law in October 1998 in order to carry out the United States of America
(USA) duties in accordance with the WCT and WPPT Conventions. In order to expand
the Copyrights laws of the US towards an age of the internet. The DMCA’s goals are
as follows:
55
https://wiki2.org/en/WIPO_Performances_and_Phonograms_Treaty?
71
I. Declares it unlawful, or illegal, to get beyond countering pirate activity
safeguards installed into copyrights materials while allowing copyrights
divisions safeguards equipment to advise encoding research, assess product
connectivity, and evaluate computer safety platforms, and in some cases,
granting prohibitions form anticircumvention purchases for nonprofit
archives, libraries as a whole and colleges and universities.
II. The DMCA forbids the production and sale of code breaking devices used to
make unlawful replicas of software.
III. It restricts the liability of not-for-profit colleges and universities
organizations when they act as web service providers and, in some cases,
over copyright violations either scholars or PhD pupils, whereas requesting
assistance operators to delete anything that seems to infringe the copyrights
from their hosting systems. It additionally safeguards assistance providers
against the violations of the copyright liability for simply transferring data.
ADMCA takedown notification is how the DMCA is put into effect. A DMCA
takedown notice denotes the formal notice to the business. Additionally, internet
hosts, internet search engines, or Telecoms notify users when they are serving or
referring to content that violates a copyright.
72
A work can receive DMCA protection even if it is not registered. Any physical work
of creative expression that is created constitutes intellectual property immediately
as it does so. And is a part of the information that the DMCA seeks to protect. Only
if someone wants to lunch a lawsuit for violations of copyright does registration of
copyright become necessary.
The Digital Millennium Copyright Act has both criminal and civil sanctions for
violations. The criminal punishment may include prison and fines, however a civil
punishment requires the payment of compensation. Willful violations, or an act of
violating that is done with intention and motive typically results with criminal
penalties. Criminal consequences for offenders include a maximum of 5 years in
imprisonment and fine of as much as $500,000.
Legal action for copyright violation may be brought to USA courts under The Digital
Millennium Copyrights Legislation. If a copyrights holder succeeds at a trial, they
might get both nominal and real damages57.
56
https://vakilsearch.com/blog/digital-millennium-copyright-act/
57
http://vakilsearch.com/blog/digital-millennium-copyright-act/?
73
INDIAN LAWS AND THE DIGITAL MILLENNIUM COPYRIGHT ACT
The Digital Millennium Copyright Act solely applies to websites hosted in the US
because it is a component of US Copyright Law. Every website in the US is required
to abide with the law. As a result, DMCA notices may still be sent regardless of
whether the proprietor of the copyright is located elsewhere in the United States.
When the US is the host nation of the hosting website. Copyrights Law Sec.- 52 is
mostly likely an Indian equivalent to The Digital Millennium Copyrights Legislation.
It consisted of an amendment to the Copyright Act of 1976, but it did not free ISPs
from accountability and limited their liability in terms actions and compliance with
the terms. Therefore, an upgrade to the statute was required. By adhering to the
particular guidelines outlined in what are known as “Safe Harbours,” ISPs are
allowed by the DMCA to keep a strategic distance from both copyright risk and
commitment to supporters. Through these clauses, DMCA restricts ISPs’ exposure
to four types of risk: first, brief digital network system communication; second,
system caching; third, data residing on subscriber-borne framework; and forth,
information locating tools.
58
https://vakilsearch.com/blog/digital-millennium-copyright-act/
74
CHAPTER- 6
In India, copyright and neighbouring rights are governed by the Copyrights Law, in
1957 (in 1999 modified), the instructions promulgated thereunder, and the
International Copyright Order, 1999. Five times, in 1983, 1984, 1992,1999, and the
latest in 2012, this Act has been changed. The Act has 79 Sections organized into 15
Chapters. In addition, Section 78 of the Act gives the Central Government the
authority to issue rules that has to be revealed in the Gazette of the Govt. to
accomplish the goals of an Act’s. A registrar of copyright was appointed to run the
copyright office under the Act’s provisions, and he or she would function under the
supervision and guidance of the federal government. This office’s major
responsibility was to keep a copyright register with information on initials or
descriptions of artworks, and the residences of writers etc.59 Thae Act established a
Copyright Board, whose actions are treated as litigation. The lifespan of
safeguarding copyrights has been extended to 23-50 decades, followed by later
until s60 decades in 1992. The term of copyrights includes the sole right to convey
works through radio distribution. In additional, the lifespan of copyrights regarding
certain types of artworks was determined. The ability to translate a work was made
co-extensive with other copyright- related rights. Responsibilities of transmitting
organizations, including clauses pertaining to ownership transfers and copyright
licensing, and scenarios in which forced licensing is required. Special rights for
creators, both criminal & civil remedies towards the violation, as well as remedies
towards baseless risks or lawsuits were also introduced along with the global
59
https://blog.ipleaders.in/an-overview-of-the-copyright-act-1957/?
75
definition of copyright violation and few exceptions to the exclusive rights granted
to the creators or acts that are not considered violation60.
TERM OF COPYRIGHTS
For the purposes of this Act, “copyright means the special right subject to the
provisions of this Act, to do or authorize the doing of any of the following acts in
respect of a work substantial part thereof,” as stated in Section 14.
A) “In the event that a literary, dramatic, or musical work is not a computer
programme,”-
i. “To reproduce the work in any tangible form, including the electronic
storage of it on any medium.
ii. To make available to the public copies of the work which are not already in
print.
iii. To execute the work in public or make it known to the public.
iv. To make any sound recording or cinematograph film in relation to the work.
v. To translate the work in any manner.
vi. To carry out a single of the actions described in subclauses [i[- [iv] in
connection thereto a artwork in regard to an interpretation or adaptation of
artwork.”61
60
https://www.academia.edu/39573229/Overview_on_Copyright_Law_and_Its_Awareness_with_Re
ference_to_Aurangabad_City
61
https://aishwaryasandeep.com/2022/06/09/concept-of-copyright-2/?
76
i. Carry out one or more of the activities listed in subsection [a];
ii. To marketplace or recruit, or advertise for auction or recruit, any replica pf
the computer’s project, irrespective of where similar version was previously
marketed or rented.”62
i. “To create a replica of the film, including a photograph of any image therein;
ii. To sell or give on hire, or to offer for sale or hire, any copy of the film,
regardless of whether such copy has previously been sold or given on hire”.
62
https://aishwaryasandeep.com/2022/06/09/concept-of-copyright-2/?
63
https://aishwaryasandeep.com/2022/06/09/concept-of-copyright-2/?
77
iii. Making the audio recordings accessible for the general population.”64
‘Works’ refers for all intellectual property that is copyright protected. Thus, it may
be subject to the Sec.-13 of The Copyrights Law of 1957 for the following works:
64
https://aishwaryasandeep.com/2022/06/09/concept-of-copyright-2/?
65
http://lawbhoomi.com/meaning-and-subject-matter-of-copyright/?
78
A musical work is described as “a work comprised of sound and including
any graphical notion of such work, but excluding any work or any action
intended to be sung, spoken, or performed in conjunction with the music.”
The 2012 Amendment granted cover versions a statutory license. A song
often combines musical and textual elements. Consequently, the song’s
melody and words come together to make it. A song’s lyrics are its literary
component, and as such, they are protected as literary works. The person
who wrote the lyrics is the work’s creator66.
III. Original Dramatic work-
The term “original dramatic work” is defined as “any piece of recitation,
choreography, or entertainment in a dumb show, the scenic arrangement or
acting, the form of which is fixed in writing or other manner, but does not
include a cinematograph film.” The terms “literary” and “dramatic” are
interchangeable, because every rule that applies to a literary work also
applies to a dramatic production. A theatrical work’s author is the person
who created it67.
IV. Cinematography films-
The term “cinematograph” shall be interpreted to include any work created
by any process similar to cinematography, including video films.
Cinematography films are any works of visual recording that include a sound
recording accompanying such visual recording. The producer of the flicks
also serves as the films’ author68.
V. Original Artistic work-
A painting, a sculpture, a drawing, a diagram, a map, a chart, a plan, an
engraving, or a photograph are all considered genuine artistic works as
defined by the Act, regardless of whether they have artistic quality. Any
piece of creative workmanship can be considered an artistic work, and a
66
https://lawbhoomi.com/meaning-and-subject-matter-of-copyright/?#Original_Musical_work
67
https://lawbhoomi.com/meaning-and-subject-matter-of-copyright/?#Original_Musical_work
68
https://lawbhoomi.com/meaning-and-subject-matter-of-copyright/?#Original_Musical_work
79
work of architecture is included in this category. The creator of a creative
work, except a photograph, is its author. The photographer, who is
recognized as the originator of the image, is the one who takes it. A recent
controversy surrounded a selfie shot by a monkey. The Court ruled that an
individual must be a human being, and that, as of now, only human works
are protected by intellectual property rights69.
VI. Sound recordings-
Regardless of the media on which the recording is created or the manner by
which the sounds are produced, a sound recording is one from which such
sounds may be produced. The creator of the sound recording is also its
producer. Although vocalists and musicians may be included in the sound
recording, the author is the producer.
The length of a copyright license varies based on the type of protected work.
During the author’s lifetime and for 60 years after death, literary, musical,
theatrical, and artistic works are protected. It has been 60 years since the
piece was originally published.
Without the owner’s or the Registrar’s consent, a license has been acquired; a
condition of the license has been broken; or any other requirements imposed by
the authority under the Act have been violated:
If the individual has broken the copyright holder’s exclusive right, or if the person
allows the work to be used for communication to the public that violates the
69
https://lawbhoomi.com/meaning-and-subject-matter-of-copyright/?#Original_Musical_work
80
copyright of the work, unless they are unaware of it or have no cause to suspect
that such communication to the public violates the copyright, when someone makes
a sale for hire, sells or lends it for hire through trade display of the infringed
copyright, distributes it for trade in a way that harms the copyright owner, exhibits
it in public through trade, or imports any infringing copies of works into India, with
the exception of one copy of each work for the importer’s domestic or private use.
It is a copyright violation if a cinematograph film uses a dramatic, literary, artistic,
or musical work without permission70.
70
https://blog.ipleaders.in/need-know-copyright-trademark-offences/?
71
https://blog.ipleaders.in/need-know-copyright-trademark-offences/?
81
“Communication to public” is defined in
Sectioni2(ff)iofitheiAct,i1957iasi“makingianyiwordsiavailableiforibeingiheardiseen,iori
otherwiseienjoyedibyitheipublicidirectlyioribyianyimeansiofidisplayioridiffusioniother
ithanibyiissuingicopiesiofisuchiworkiregardlessiofiwhetherianyiemberiactuallyisees,ih
ears,ioriotherwiseienjoysitheiworkisoimadeiavailable.”72
“The explanation for this section also includes any satellite or cable-based
connection. In this approach, the phrase “by any means for display” in this definition
include the information on a website. Therefore, linking is covered under Indian
Copyright Law. If a site is linked to unfairly, its owner may take legal action to correct
it in accordance with the Indian Copyright Act.
Ifithereiwereibeianiinstanceiofiinlineilinking,itheiclientimightinotibeiawareithatitheic
ontentsiofitheicompositeipageiwereinotisavediatitheisiteiheihadipreviouslyivisited.iSi
nceitheipersoniusingianiinlineilinkionihisiwebsiteiisinoticausingianyiduplicationiofithe
icopyrightedimaterial,itheiinlineihyperlinkiisinotiprotectedibyiSectioni14iandi51iofith
eiIndianiCopyrightiAct,i1957.iHowever,itheiphrasei“byianyimeansiforidisplay”iallowsi
theiphrasei“byianyimeansiforidisplay”iallowsitheiphrasei“correspondenceitoipublic”i
asidefinediunderiSectioni2(ff)iofitheiCopyrightiActitoibeireaditoiincludei“online
linking.”
However,itheiCopyrightiActiSectioni14(a)(vi)ionlyigrantsitheirightiofiadaptationitoith
eiauthoriofiaicopyrightediwork.iByiinlinking,itheiconnectedisiteicaniuseisomeiofitheis
72
http://rajdeepandjoyeeta.com/copyright-issues-in-internet/?
82
ettingsifromitheilinkedisite,isuchiasiimages,itext,ivideoiclips,iandisoiforth,itoicreateiit
siowniuniqueiwebsite.iThisiamountsitoiaiviolationiofitheicreator’siadaptationirights.
In-linking creates additional moral problems. The exceptional rights of the author
of any copyrighted work that is adversely impacted by the common practice of in-
linking are insured by Section 57 of the Copyright Act, 1957. In-linking is not
expressly prohibited by the Act, but any modification to a website’s content without
the owner’s express consent constitutes an infringement in India’s eyes regardless
of whether it is expressly permitted by the Act.
The Indian Copyright Act, 1957 stipulates that the requirements of Section 51 and
14 of the Act must be applied to determined if an application is legitimate. If there
should be an instance of framing, the framer of the other site does not make a copy
of the copyrighted content or replicate it in any way; instead, he only provides a
visitor with instructions on how to recover the content of that browser into the
composer’s site. As a result, under the Indian Copyright Act, the site’s framer is not
accountable for unauthorized duplication or reproduction of a work protected by a
copyright, but he may still be found in violation of the copyright owner’s right to
integrity under Act 57(1) of the Act73.
The growth India has experienced online is admirable. In the fields of information
and software technology, India has also achieved enormous strides, routinely
accelerating its growth by more than 25% annually. However, the growing use of
information technology (IT) brings with it new risks and difficulties. The security
risk, which include: -
iidentityitheft,iviolationiofiintellectualipropertyirights,ipiracy,iandiotheriissues,iision
eiofitheimostiimportant.iGivenitheifinancialivalueiandipotentialiofiITiiniIndia,ifurtheri
effortiisineededitoicombatisuchiillegaliactivities.iTheiInformationiTechnologyiAct,i
73
http://en.m.wikipedia.org/wiki/Software_copyright?
83
iwasipassediintoilawibyitheiIndianiParliamentitoimaintainitheilegalisystemialongsidei
thisisocialishift.
iAi‘fairiuse’iofiaiworkidoesinoticonstituteiinfringement.iHowever,itheidefinitioniofi“f
airiuse”iisiopenitoidiscussioniandiisidecidedibyitheicourtiinieachiinstance,iwhichihasi
uniqueifactsiandicircumstances.iForiinstance,iitiwon’tibriconsideredicopyrightiinfrin
gementiifitheiworkiisiutilizediwithoutitheiowner’siconsentiforistudy,iresearch,irepor
ts,ireviews,ilegislation,ietc
AccordingitoiSectioni52iofitheiAct,ithereiareiseveraliexceptions,isuchiasiresearchifori
personalioriprivateiuse,ireviewsioricritiquesiofiaispecificiworkiorianyiotheriwork,irep
ortingionicurrentiaffairsiandieventsithatiinvolveireporting,ioriaipublicilecture74.
Judicial Redress
Criminal Remedies
74
https://blog.ipleaders.in/need-know-copyright-trademark-offences/?
84
The Legislations further states that it would be illegal to aid in the violation of
copyright or to intentionally violate copyright in a work. The following are some
criminal penalties for copyright infringement:
i. Prison time is a maximum 6th month penalty that can last up to 3 years.
ii. Fines that may vary from Rs. 50,000 to Rs. 2,00,000.
iii. Theisearchiandiseizureiofitheiinfringedigoodsiincludeiplates,iwhichiconsistiofi
moulds,iblocks,inegatives,iduplicatingiequipment,itransfers,iorianyiotheride
viceiusedioriwhichimayiintentitoibeiusediforireproducingicopiesiofitheiworkio
riprintingiit.
iv. Deliveritheiinfringingicopiesioriplatesitoitheicopyrightiholder.
iAlthoughiIndiaihasispecificilawsitoiaddressivariousiformsiofiIPRiinfringement,itheseil
awsiareinotidesigneditoiaddressiallicontemporaryicopyrightiviolations.iTheiCopyrigh
tediActiofi1957irestrictsitheicopyrightediwork’siprocreationiinianyitangibleiform,iinv
olvingitheistoringiofiitionianyikindiofimediumiusingielectroniciequipmentibyianyiuna
uthorizediindividual.iHowever,ithisiprovisionihasibeeniweakeneditoitackleitheiunla
wfuliduplication,iimportation,idistribution,iandisaleiofipiratedimusicibecauseiitiisibe
comingimoreidifficultitoitrackidowniinformation.
Thepeerifileisharingiservicesiprovidedibyivariousiwebsites,ilinking,ideepilinking,ifra
ming,iandiotheriinnovationsithatihaveichangedihowipeopleiofferiinformationioverit
85
heiinternetihaveichangeditheiwayiindividualsiofferiinformationihaveigiveniriseitoileg
alicontroversyiinithisisituationiwhereiinformationisharingiamongiindividualsihasitur
nediintoitheiprimaryifunctioniofitheiinternet.iWhileitheiserviceiprovideriisiexemptifr
omiliabilityiunderitheiexistingiCopyrightiAct,iusersiwhoidownloadimusic,isoftware,ic
omputerigamesiandiotheriintellectualicontentiareineverthelessiheldiaccountableifor
idirecticopyrightiinfringement.75
Theirapididisseminationiofiinformationionlineisuggestsithationeimustiinvestianientir
eilifeiandiplentyiofimoneyionilocatingireplicasiofitheiartworkithativiolatesithoseiprivi
leges,itrackingioutioffender,iandifilingilawsuitiiniallirelevantijurisdiction.iTheiIndianiC
opyrightiActiofi1957ianditheiITiActiofi2000ibothiimplyithaticomputerisoftwareiprogr
ammingiisiprotected.iWhileitheicopyrightilawigrantsiguaranteeitoicomputerisoftwar
e,iasiitidoesitoiotheritypesioficopyrightediworks,itheisophisticateditechnologyiandin
atureiofiPCiprogrammesireallyirequiresiforimoreirobustisecurity.
Comparingicomputerisoftwareitoiotheriformsioficopyrightediwork,itheiIndianiCopyr
ightiAct,i1957igrantsiitianiexceptionalistanding.iTheiCopyrightsiLawitreatsicomputeri
programmesiasiliteraryiworksiand,iiniadditionitoitheistandardiexclusiveirightsigrante
ditoiotheriliteraryiworks,iitialsoigivesitheiownersioficomputeriprogrammesiextraordi
naryiexclusiveirights,isuchiasitheiabilityitoiselliorioffersitoisellitheiriprogrammesiasiw
elliasitheiabilityitoirentithemioutiforiaiprofitioritoimakeirentalioffers.iTheiLawihasials
oiexcludediPCiprogrammesifromithei“fairidealingiexception”i(i.e.,iprivateiuseiforistu
dy,ifeedback,iorisurveyiofithatiworkiorisomeiotheriwork),iwhichiisiavailableiinitheica
seiofiothericopyrightsiartwork.
75
http://groups.google.com/g/lis_copyright/c/CvIgKncZtZs?
86
the IT Act only grants protection for the “sources code” of computer programmes
created by private individuals is still not covered by this law.
However,itheiaforementionedisafeguardiappliesionlyitoicomputerisourceicodesi“wh
ichiareirequireditoikeptiupibyilawiforinowiiniforce.”iTheiITiACT,i2000ipermitsisanctio
nsiforitamperingiwithiaicomputeriprogrammer’si“sourceicode.”iTherefore,itheiITiAc
tionlyigrantsiprotectioniforithei“sourcesicode”ioficomputeriprogrammesicreatedibyi
privateiindividualsiisistillinoticoveredibyithisilaw.
CYBERCRIMES
Cybercrime is distinct from other types of crime that place in society. The reason is
because it has no geographical limits and that no one knows who the cybercriminals
are. It has an impact on all parties involved, including the government, industry, and
individuals. With the increased use of information and communication technology
(ICT), cybercrime is rising in India.
Cybercrime is a wide phrase that refers to illegal action that uses computers or
computer networks as a tool, a target, or a venue. Examples range from electronic
theft to denial-of-service assaults. It is catch-all phrase for crimes including phishing
credit card fraud, bank robbery, illegal downloading, abuses of visas, hacking,
87
spilling of critical information, cyber terrorism, spam and more. Some of these cyber
offenses are clarified beneath76:-
The use of the internet promotes the social assembly of individual figures. This also
implies the possibility of a harm to a cyber-consumer’s safety, though. The misuse
76
https://www.legalserviceindia.com/legal/article-4998-cyber-crime-in-india-an-overview.html
77
https://www.legalserviceindia.com/legal/article-4998-cyber-crime-in-india-an-overview.html
88
of a cyber-consumer’s private data has grown to be a serious threat as the number
of online service providers has exploded in India. Nevertheless, there is no specific
law to safeguard a man’s personal information, while the Copyright Act of 1957 may
provide some limited safeguards. Given that the US and EU have strong policies
governing personal information protection and privacy, it becomes essential for
India to create its own information protection and privacy regulations given the
influx of foreign speculators and various commercial prospects. The Information
Technology Act only protects privacy rights against government operations;
whether it also extends to private activities is unclear.
Since the data assurances rules demand an extreme level of protection, the absence
of information privacy and protection laws has also caused problems for Indian
organizations operating the EU. India must adapt to the times’ changing demands
and adopt a comprehensive data privacy policy that would not only increase
consumer confidence but also increase the amount of EU business that Indian BPO
service providers receive.
The Information Technology Act, 2000 was enacted in India to address the
burgeoning cyber concerns. It intends to provide the legal framework necessary to
give all electronic records and transactions made through electronic data
interchange and other forms of electronic communication (e-commerce) legal
sanctity. But it doesn’t address serious problems like spamming, cyberstalking,
phishing, etc.78.
78
https://blog.ipleaders.in/information-technology-act-2000/?
89
Additionally, it mandated that every nation develop rules governing e-commerce
and cybercrimes of its own. The Act was passed in 2000 to safeguard personal
information of residents and the government, making India the 12 th nation in the
world to do so. It also goes by the name “IT Act” and offers the legal foundation for
safeguarding information pertaining to digital signatures and e-commerce. To
address societal demands, it was further modified in 2008 & 2018. The Act also
outlines the authority and restrictions placed on intermediaries79.
The phrase “Internet Service Provider” is used interchangeably with the terms
“Network Service provider” and “Intermediary” under section 79 of the IT Act. The
word “Intermediary” is defined in Section 2(w0 as “any person who, on behalf of
another, receives, stores, transmits, or provides any service with respect to that
message.”
Section 79 deals with situation in which NSP are not responsible if it can be
demonstrated that no knowledge of the violation existed and that reasonable steps
were made to stop it. Therefore, if the ISP is found not guilty of the violation, the
legislative goal was to grant them unlimited immunity.
The Act was created in order to address e-commerce, all the complexities associated
with electronic signatures, and achieve the following goals:
79
http://blog.ipleaders.in/information-technology-act-2000/?
90
• It controls the power of intermediaries to govern their operations.
• It safeguards people’s data by defining numerous offences connected to
their right to privacy.
• Additionally, it controls and safeguards the private information that social
media platforms and other electronic intermediaries keep80.
GREY AREA
The legal framework for a phenomenon must keep pace with the most recent
advancements in that field in order for it to be effectively regulated. This is
challenging given the rapid advancement of information technology, which
necessitates constant redesigning of the statute.
• The Act expands the use of its remedial measures to people outside India,
regardless of their nationality, if the offence under the Act identifies with a
computer located in India. These are some murky areas in the Act that call
for unusual thought. Such extraterritorial jurisdictions are complicated by
limitations on how they may be enforced.
• Online transactions, which include many jurisdictions, are nevertheless
subject to a single nation’s jurisdictions.
• The Act fails to address the potential problem of cross-border tax
assessment in business transactions.
• The act does not handle concerns related to data privacy and security on the
internet, or the protection of intellectual property online.
• The Act fails to address innovative cybercrime including spamming, phishing,
stalking, cybersquatting, & online money laundering.
80
https://blog.ipleaders.in/information-technology-act-2000/?
91
• The Act doesn’t explain the situation regarding network service providers’
responsibility.
CASE LAWS
TheiHighestiCourtiruledithatithereiwasinoiplagiarismioricopyrightiviolationiinitheiafo
rementionediinstance.iAilotiofiemphasisiwasiplacedionitheiperceptionithatitheiaudi
enceihadiafteriviewingitheicopyiinitheicaseiofiShipmaniv.iR.iK.iO.iRadioiPictures,iwhic
hiheldithatiaiconcepticannotibeitheisubjectioficopyright.iInithisiregard,iJ.iMentoninot
editheifollowing:i-
iTheiCourtideterminedithatitheinotionioriimpressionithatiwasitransmitteditoitheiaud
ienceiwasiwhatimattered,iandibecauseitheiperceptioniwasitheisame,iitiwasidecidedi
thatithereiwasianiinfringement.iTheicontemporaryilawioficopyrighticasesiwas
establishedibyithisicase,iandiasiairesult,iitiisinowibelievedithatiwhileiaiseriesiofieventi
isiprotectedibyitheicopyright,iideasiareinot:itheiaudienceimustibeiableitoiperceive
identityiofitheiimpressionithroughitheirisenses.iInitheimatteriofiTwentiethiCenturyiF
oxiFilmiCorporationivsiStonesifer,isimilarifindingsiwereiestablished, anded
i“Iniinstancesioficopyrightiinfringementiinvolvingiinioriginalitheatricalicompositionsi
andimotionipictureiproductions.iTheichallengeibeforeitheicourtiisipreciseiandidistinc
tiinieachiinstanceitoiestablishifromiallitheicircumstances,ieveniificompleteioriliteralia
ppropriationiofitheiprotectedipropertyiisiuncommoniinioriginalitheatricalicompositi
onsiandimotionipictureiproductions.iN.T.iRaghunathani&iAnr.iV.iAlliIndiaiReporteriLt
d.,iBombayiitiwasiheldithaticopyrightilawididinotiprotectiideasibutionlyitheiparticula
riexpressioniofiideas.iInithaticase,itheiBombayiHighiCourtihoweveriheldithatitheidef
endantihadicopiedinotionlyitheiideasibutialsoitheistyleiofiabridgement,itheiexpressi
oniofiideasianditheiformiiniwhichitheyiwereiexpressediandithusiheldithatiaicaseiforiv
iolationioficopyrightiwasimadeiout.
92
K.iR.iVenugopalaniSarmaiv.iSanguiGanesaniwasitheicaseiwhichiinvolvediaicopyrighti
violationiiniaiphotograph,iitiwasideterminedithatithereihadibeeniaicompleteiviolatio
niofitheicopyrightievenithoughitheireproductioniwasinotiexact.iHowever,iaicomparis
oniofitheitwoiphotographiwasimerelyiaicopyiofitheiplaintiff’siphotograph.81
InithisicaseiaisingleijudgeionitheiHighiCourtiofiAndhraiPradeshiciteditheiSupremeiCo
urt’sirulingiiniRajeeviChaudhryiv.iStatei(2001),iwhichistatedithatithereiwasinoiprovisi
oniinitheiActithatirendereditheiallegedioffenceinon-bailable.
iTheicourtiwentionitoisayithati“punishmentiforiaitermiwhichimayiextenditoi3iyears”ii
isinotiequivalentitoi“punishmentifori3iyearsiandiupwards”iandiasiairesult,itheioffenc
eiunderiSectioni63iofitheiActiwasicategorizediasibeingibailableiandinon-cognizable.
Thisiwasistatedidueitoitheifactithatitheioffenceiwouldifalliunderitheithirdicategoryiof
icharges.82
IniAbduliSathariv.iNodaliOfficeri&iAnr.i(Anti-
piracyiCell,iKeralaiCrimeiBranchiOffice)i(2007),iaiSingleiJudgeiBenchiofitheiKeralaiHig
hiCourtiadoptediaisimilaristanceitoithatiiniJitendraiPrasadiSinghiv.iTheiStateiofiAssa
m.
iInibothiinstances,iitiwasinotedithatitheilanguageiusediiniSectioni63iofitheiCopyrighti
Actiofi1957iiniCategoryiPartiIIiofitheiFirstiScheduleiofitheiCodeiofiCriminaliProcedure
iofi1973iclearlyistatesithatitheioffencesiunderitheisaidiprovision,iwhichiisipunishablei
byiaiprisonitermiofi3iyearsiandifine,iwillifalliwithinitheisecondicategoryiofioffences,i
whichiwillisubsequentlyiclassifyithemiasicognizableiandinon-bailable.
81
https://bnblegal.com/landmark/r-g-anand-vs-m-s-delux-films-ors/?
82
http://blog.ipleaders.in/need-know-copyright-trademark-offences/?
93
Suresh Kumar v. The Sub Inspector of Police (2007)
TheiKeralaiHighiCourtirenderediairulingiaboutiwhethericopyrightiinfringementiisiaicr
imeiforiwhichianiarresticanibeimadeiwithoutiaiwarrant.iTheicourtideterminedithatib
ecauseiviolatingisectioni63iofitheiCopyrightiact,i1957,icarriesiai3iyearsijailisentence,i
theioffenceimustibeirecognizediasicognizable.
Theidistinctionibetweeniviolationiandioriginaliinventioniisiincreasinglyibeingiblurred
iinitheiinformationianditechnologicaliworldiweiliveiin.iTheicognizabilityiofiviolationsi
ofitheiCopyrightiActiisiaicontentiousiissue,iandiuntiliitiisiresolved,ithereiwillibeinoicla
rityiregardingitheirightsiofiparties,itheicourseiofianiinquiry,ianditheirightsiofitheiaccu
sed.iTherefore,iit’sicriticalithatitheiSupremeiCourticlarifiersitheisituationiandiputsian
ienditoiit.
ThereiwasiaitotaliofiappealsisubmitteditoitheiBombayiHighiCourt.iTheiBombayiHighi
courtisentitheicasesibackitoitheicopyrightiBoardiforireconsiderationianditheidetermi
nationiofilicenceifeesiiniFirstiAppealinos.i279-
294iofi2003,i421iofi2003,iandi1573iofi2003ibyiaicommonijudgementiandiorderidate
di13.4.2004.i
SecondiLicenseicaseiiniaccordanceiwithiSectioni31(1)(b)iofitheiAct,itheiappellantireq
uestesitheifollowingireliefsiiniSectionsi18i&i19,iwhichidealsiwithitheiassignmentiofic
opyrightianditheimodeiofiassignment,irespectively.iSectioni19idealsiwithidisagreem
entsiinvolvingicopyrightitransfer.iTheifollowingiexpressionsiareiusediiniSectioni27itoi
describeitheidurationiofitheicopyrightiforisoundirecordings:i“Termioficopyrightiiniso
undirecording-
iAisoundirecording’sicopyrightimustilastiforisixtyiyearsicommencingiatitheistartiofith
eicalendariyeariimmediatelyisucceedingitheiyearitheisoundirecordingiisiissued.iThei
94
chiefiexecutiveiofitheiapplicanti(whoineedinotibeiaimemberiofitheiapplicant)iandialli
ofitheimembersiofitheigoverningibodyi(byiwhateverinameicalled)imustisignitheiappli
cationiunderisubrulei(1).iAicopyrightisocietyimayiacceptifromiairightsiowneriorihisid
dulyiauthorizediagent,iexclusiveiauthorizationitoiadministerianyirightsitoibeiadminis
tered,itheidurationiforiwhichithoseirightsiareiauthorizeditoibeiadministered,iandithe
iconditionsiunderiwhichitheiowneriofithoseirightsimayiwithdrawithatiauthorization.i
Withoutiaffectingitheirirightsiunderitheiagreementiandiwithi60idaysiadvanceinotice,
itheiownerioficopyrightiisifreeitoirevokeithisiauthorizationiinitheieventithatitheicopy
rightisocietyidoesn’tiupholdiitsiendiofitheibargain.iTariffiplan-
iAicopyrightisocietyimustistartioperatingiasisooniasipossible,ibutiininoicircumstances
ilaterithani3imonthsiafteritheidayiitiwasigranteditheiauthorityitoidoiso.
Createiaitariffiplanithatiwillibeiknowniasithei“TariffiScheme”ioutliningitheikindiandia
amountiofifeesioriroyaltiesiitiintendsitoicollectiinirelationitoitheicopyrightioriotheri
rightsiitiadministers.8384
83
https://indiankanoon.org/doc/1592558/
95
CHAPTER- 7
CONCLUSION
96
BIBLIOGRAPHY
BOOKS:-
ARTICLE:-
WEBSITES:-
• https://blog.ipleaders.in/need-know-copyright-trademark-offences/?
• https://www.academia.edu/39573229/Overview_on_Copyright_Law_and_
Its_Awareness_with_Reference_to_Aurangabad_City
• https://bnblegal.com/landmark/r-g-anand-vs-m-s-delux-films-ors/?
• https://www.legalserviceindia.com/legal/article-429-a-comp...-e-
surveillance.html?
• https://vakilsearch.com/blog/copyright-issues-in-cyberspace/
• http://en.m.wikipedia.org/wiki/Software_copyright
• http://www.wipo.int/edocs/mdocs/arab/en/wipo_cr_dam_05/wipo_cr_da
m_05_8.doc?
97