What are you looking for?

Showing 9 of 15 Results in Fair Use

Amicus of IP Law Experts to the 2nd Circuit in Hachette v Internet Archive

Amicus Brief INTEREST OF AMICI CURIAE Amici Curiae are 24 former government officials, former judges, and intellectual property scholars who have developed copyright law and policy, researched . . .


Amici Curiae are 24 former government officials, former judges, and intellectual property scholars who have developed copyright law and policy, researched and written about copyright law, or both. They are concerned about ensuring that copyright law continues to secure both the rights of authors and publishers in creating and disseminating their works and the rights of the public in accessing these works. It is vital for this Court to maintain this balance between creators and the public set forth in the constitutional authorization to Congress to create the copyright laws. Amici have no stake in the parties or in the outcome of the case. The names and affiliations of the members of the Amici are set forth in Addendum A below.[1]


Copyright fulfills its constitutional purpose to incentivize the creation and dissemination of new works by securing to creators the exclusive rights of reproduction and distribution. 17 U.S.C. § 106. Congress narrowly tailored the exceptions to these rights to avoid undermining the balanced system envisioned by the Framers. See 17 U.S.C. §§ 107–22. As James Madison recognized, the “public good fully coincides . . . with the claims of individuals” in the protection of copyright. The Federalist NO. 43, at 271–72 (James Madison) (Clinton Rossiter ed., 1961). Internet Archive (“IA”) and its amici wrongly frame copyright’s balance of interests as between the incentive to create, on the one hand, and the public good, on the other hand. That is not the balance that copyright envisions.

IA’s position also ignores the key role that publishers serve in the incentives copyright offers to authors and other creators. Few authors, no matter how intellectually driven, will continue to perfect their craft if the economic rewards are insufficient to meet their basic needs. As the Supreme Court observed, “copyright law celebrates the profit motive, recognizing that the incentive to profit from the exploitation of copyrights will redound to the public benefit by resulting in the proliferation of knowledge.” Eldred v. Ashcroft, 537 U.S. 186, 212 n.18 (2003) (quoting Am. Geophysical Union v. Texaco Inc., 802 F. Supp. 1, 27 (S.D.N.Y. 1992)). Accordingly, the Supreme Court and Congress have long recognized that copyright secures the fruits of intermediaries’ labors in their innovative development of distribution mechanisms of authors’ works. Copyright does not judge the value of a book by its cover price. Rather, core copyright policy recognizes that the profit motive drives the willingness ex ante to invest time and resources in creating both copyrighted works and the means to distribute them. In sum, commercialization is fundamental to a functioning copyright system that achieves its constitutional purpose.

IA’s unauthorized reproduction and duplication of complete works runs roughshod over this framework. Its concept of controlled digital lending (CDL) does not fall into any exception—certainly not any conception of fair use recognized by the courts or considered by Congress—and thus violates copyright owners’ exclusive rights. Expanding the fair use doctrine to immunize IA’s wholesale copying would upend Congress’s carefully-considered, repeated rejections of similar proposals.

Hoping to excuse its disregard for copyright law, IA and its amici attempt to turn the fair use analysis on its head. They acknowledge that the first sale exception does not permit CDL, as this Court made clear in Capitol Records, LLC v. ReDigi Inc., 910 F.3d 649 (2d Cir. 2018).[2] They also are aware that courts consistently have rejected variations on the argument that wholesale copying, despite a format shift, is permissible under fair use.[3] Nevertheless, IA and its amici ask this Court, for the first time in history, to create a first sale-style exemption within the fair use analysis. CDL is not the natural evolution of libraries in the digital age; rather, like Frankenstein’s monster, it is an abomination composed of disparate parts of copyright doctrine. If endorsed by this Court, it would undermine the constitutional foundation of copyright jurisprudence and the separation of powers.

The parties and other amici address the specific legal doctrines, as well as the technical and commercial context in which these doctrinal requirements apply in this case, and thus Amici provide additional information on the nature and function of copyright that should inform this Court’s analysis and decision.

First, although IA and its amici argue that there are public benefits to the copying in which IA has engaged that support a finding that CDL is fair use, their arguments ignore that copyright itself promotes the public good and the inevitable harms that would result if copyright owners were unable to enforce their rights against the wholesale, digital distribution of their works by IA.

Second, IA’s assertion of the existence of a so-called “digital first sale” doctrine—a principle that, unlike the actual first sale statute, would permit the reproduction, as well as the distribution, of copyrighted works—is in direct conflict with Congress and the Copyright Office’s repeated study (and rejection) of similar proposals. Physical and digital copies simply are different, and it is not an accident that first sale applies only to the distribution of physical copies. Ignoring decades of research and debate, IA pretends instead that Congress has somehow overlooked digital first sale, yet left it open to the courts to engage in policymaking by shoehorning it into the fair use doctrine. By doing so, IA seeks to thwart the democratic process to gain in the courts what CDL’s proponents have not been able to get from Congress.

Third, given that there is no statutory support for CDL, most libraries offer their patrons access to digital works by entering into licensing agreements with authors and their publishers. Although a minority of libraries have participated in IA’s CDL practice, and a few have filed amicus briefs in support of IA in this Court, the vast majority of libraries steer clear because they recognize that wholesale copying and distribution deters the creation of new works. As author Sandra Cisneros understands: “Real libraries do not do what Internet Archive does.” A-250 (Cisneros Decl.) ¶12. There are innumerable ways of accessing books, none of which require authors and publishers to live in a world where their books are illegally distributed for free.

No court has ever found that reproducing and giving away entire works—en masse, without permission, and without additional comment, criticism, or justification—constitutes fair use. IA’s CDL theory is a fantasy divorced from the Constitution, the laws enacted by Congress, and the longstanding policies that have informed copyright jurisprudence. This Court should reject IA’s effort to erase authors and publishers from the copyright system.

[1] The parties have consented to the filing of this brief. Amici Curiae and their counsel authored this brief. Neither a party, its counsel, nor any person other than Amici and their counsel contributed money that was intended to fund preparing or submitting this brief.

[2] See SPA-38 (“IA accepts that ReDigi forecloses any argument it might have under Section 109(a).”); Dkt. 60, Brief for Defendant-Appellant Internet Archive (hereinafter “IA Br.”) (appealing only the district court’s decision on fair use).

[3] See, e.g., ReDigi, 910 F.3d at 662; UMG Recordings, Inc. v. MP3.com, Inc., 92 F. Supp. 2d 349, 352 (S.D.N.Y. 2000); see also Disney Enters., Inc. v. VidAngel, Inc., 869 F.3d 848, 861–62 (9th Cir. 2017).

Continue reading
Intellectual Property & Licensing

Utility, Copyright, and Fair Use after Warhol

Scholarship Abstract This paper is a reaction to AWE v. Goldsmith (Warhol), which found that Warhol’s adaptation of a photograph of Prince, taken by photographer Lynn . . .


This paper is a reaction to AWE v. Goldsmith (Warhol), which found that Warhol’s adaptation of a photograph of Prince, taken by photographer Lynn Goldsmith, is not protected from copyright liability by the fair use defense. The Warhol dissent accuses the majority of being overly concerned with the commercial character of Warhol’s use, while the dissent emphasizes the artistically transformative quality of Warhol’s adaptation. These different approaches provide strong evidence that the theory of fair use remains unclear to the Court. There is a need for a simple positive theory of thefair use doctrine. That need was largely met by Gordon’s article in 1982. I aim to develop the economic theory of fair use further. especially in light of case law since 1982. A theory of fair use is at the same time a theory of the scope of copyright. I clarify the economic basis for jair use, taking advantage of basic concepts in welfare economics. As a general matter, the optimal scope of copyright minimizes the sum of dynamic (having to do with incentives over time) and static (having to do with allocation at a given time) welfare costs. One proposition advanced is that the concepts of economic complementarity, substitutability, and preference correlation provide crucial analytical tools in resolving fair use disputes. This proposition may seem narrow, but it stands the approach taken in the cases on its head. I explain how the approach urged here works by applying it to several cases, including Warhol and Google v. Oracle.

Continue reading
Intellectual Property & Licensing

A Roadmap to Reform Section 512 of the Copyright Act

ICLE White Paper Executive Summary Section 512 of the Copyright Act, passed as part of the Digital Millennium Copyright Act of 1998, was created to preserve “strong incentives . . .

Executive Summary

Section 512 of the Copyright Act, passed as part of the Digital Millennium Copyright Act of 1998, was created to preserve “strong incentives for service providers and copyright owners to cooperate to detect and deal with copyright infringements that take place in the digital networked environment,” while also providing “greater certainty to service providers concerning their legal exposure for infringements that may occur in the course of their activities.” The idea was to provide a safe harbor to online service providers (OSPs) that would also help to fight piracy.

In practice, Section 512 has reduced OSPs’ liability risk and thereby promoted the growth of distribution services. Piracy, however, has grown exponentially. Among the factors driving this growth is that the courts’ interpretation of Section 512 has pushed OSPs toward a reactive “file-containment” approach, rather than encouraging them to seek proactive solutions to piracy on their services. Indeed, citing both technological change in the intervening years and the judicial construction of Section 512, the U.S. Copyright Office has concluded that “Congress’ original intended balance has been tilted askew.” It would therefore be appropriate for Congress to revisit the law, applying lessons learned over the more than two decades since its enactment.

Much of the challenge in combating online piracy stems from the “volume problem.” The amount of content that traverses online services makes it unreasonable to expect OSPs to catch every intentional or inadvertent infringement by their users. But the amount of infringement that slips through and harms copyright holders is nonetheless substantial, accelerated by technological innovations like more comprehensive search engines, faster upload and download speeds, and the emergence of peer-to-peer file-sharing services.

One solution would be for OSPs to license content directly from rightsholders. As intermediaries, OSPs can potentially license content more efficiently and cost-effectively than individual copyright holders and users of Internet services could negotiate licenses among themselves. Licensing by OSPs could also remove litigation risk, enable their service’s users to benefit from the content, and ensure copyright holders’ rights are respected. TikTok, Facebook, Snapchat, Instagram, and YouTube, for example, are increasingly licensing at least some content, so that their users have an authorized way to incorporate that content into posts and streams.

Unfortunately, the current safe-harbor regime gives OSPs little incentive to license content or otherwise proactively deter pirated content on their services, insofar as they can presumptively monetize infringing content until rightsholders issue takedown notices. Under Section 512, to be protected by the safe harbors, OSPs must have neither “actual knowledge” of infringement, nor “red-flag knowledge”—i.e., awareness of facts that make infringement apparent. Judicial interpretations of Section 512, however, have essentially collapsed the red-flag standard into the actual-knowledge standard, while progressively narrowing the scope of the actual-knowledge standard; the bar for legally relevant knowledge of infringing activity is now quite high.

To address this, the standard for when an OSP is considered to have “knowledge” of infringement ought to be changed from what an “ordinary” person might infer from the circumstances to what a reasonable person in the user-generated content business would infer, even absent notification by a rightsholder. This broader knowledge standard would then be used to condition the safe harbors offered by Section 512 on OSPs taking reasonable steps both to prevent infringement and to remove that infringing content that does slip through.

Even where OSPs do not host or display infringing content, they may sometimes facilitate its dissemination by others. To be eligible for the safe harbors, OSPs should be obligated to provide the identity of infringing parties and to prevent further access to the infringing content, even when the OSPs are not at fault for the underlying infringement. Around the world, these sorts of “no-fault injunctions” have been used effectively to combat piracy with no interference with OSPs’ normal operations. Indeed, in some cases, private companies have voluntarily partnered with rightsholders to restrict access to content that a court has declared infringing.

Congress originally expected OSPs to collaborate with rightsholders in the development of standard technical anti-piracy measures, such as filtering. In the nearly quarter century since Section 512’s enactment, however, no standard technical measures have emerged. Recently proposed legislation—the SMART Copyright Act—endeavors to fix this problem. It would empower the Office of the Librarian of Congress to engage in rulemaking proceedings to develop standard technical measures with the relevant multistakeholder community. Despite some ambiguities and shortcomings in the bill’s text, it offers a promising framework to address one of Section 512’s longstanding deficiencies.

Finally, Section 512 requires OSPs to have policies to terminate service to repeat infringers and to reasonably implement those policies. Courts, however, have interpreted these requirements loosely. The purpose of the safe harbors is to provide platforms greater certainty regarding litigation risk when they act responsibly and to assure copyright holders that their rights will be reasonably protected in exchange for the liability limitations the platforms receive. That bargain is not achieved unless the platforms and their users know that costly repeat infringement will not be tolerated. To better address this goal, the Copyright Office should be authorized to provide guidance on the minimum requirements necessary to meet the repeat-infringer policy obligation, including by creating a model repeat-infringer policy that will be presumed to comply.


The birth of the commercial Internet was among the most important technological developments of the past century and crucial to its success have been the rules governing the Internet’s use. These include architectural rules to address such issues as management of the Domain Name System (DNS) and the resolution of disputes over domain names. Other important rules concern the relationships between and among commercial entities and individuals operating online. They include such familiar legal rules as torts, copyright, and antitrust.

In certain respects, these rules of general applicability apply differently on the Internet than they do in other contexts, typically to address the scale, scope, and speed with which information can be shared online via intermediaries (i.e., digital platforms). This leads to the general legal presumption that intermediary liability should be specially tailored online to ensure that business models that rely on user-generated content can thrive, while also suitably protecting broader social interests.  Section 230 is one of the most well-known U.S. laws dealing with this subject, and it has received significant attention, aimed at understanding how best to frame policy around intermediary liability online. As we have noted in previous work on that subject, intermediary-liability laws should be focused on balancing the benefits that platforms can provide with the negative externalities they can generate.[1] Any legal policy that requires intermediaries to moderate more than they currently do will remove some harmless content; the relevant question, however, is whether the marginal reduction in harmless speech is justified by the marginal increase in the deterrence of illegal content. In essence, crafting intermediary-liability policy is about conducting a cost-benefit analysis that implicitly assumes that the goal is optimally to minimize both the loss of user-generated content and the harms of illegal activity facilitated by platforms.[2]

Given the uncertainties and complexity in locating that middle ground between costs and benefits, erring on the side of granting full immunity from third-party liability­­ to platforms—as Section 230 largely does—may conceivably be the best possible outcome. Without strong evidence to support this position, however, it is highly improbable that a legal regime that results in complete immunity for platform operators for the harmful activity that can occur on their services is socially optimal. This is particularly true, given the long history of common-law attempts to parse exactly this kind of liability for offline intermediaries, which suggests that courts and lawmakers can indeed shape regimes to allow both liability and room for firms to operate their services.[3]

In other words, simply claiming that costs would rise if intermediaries were held liable, or that liability itself is a harm to the platforms, is insufficient. Liability has some harmful consequences everywhere. The relevant question is whether those harms outweigh the ones avoided by not imposing legal accountability.

It is notable that copyright protection was specifically exempted from the liability shield created by Section 230.[4] It is also notable that the subject of this paper—Section 512 of the Copyright Act (“Section 512”)—adopted, at least in theory, a different approach than Section 230. But as we discuss below, while Section 512 did not create a complete liability shield, its practical effect, largely through judicial interpretation, has come closer to that end than its drafters likely envisioned.

Section 512 altered key elements of how secondary-liability rules for copyright are applied online. Most notably, Section 512 created a safe harbor for online service providers (“OSPs”) for potentially infringing content generated by users of their platforms.[5]

Nearly a quarter-century after its passage, Section 512 is due for reform. When Congress added Section 512 to the Copyright Act, it had two things in mind. First, that copyrighted content merited protection online, just as it did offline. Second, that the then-nascent OSPs would struggle to bear the full weight of direct or secondary liability for all the copyrighted content their users might disseminate without authorization. Thus, Congress intended Section 512 to preserve “strong incentives for service providers and copyright owners to cooperate to detect and deal with copyright infringements that take place in the digital networked environment,” while providing “greater certainty to service providers concerning their legal exposure for infringements that may occur in the course of their activities.”[6]

Given the monumental challenges that OSPs would face in trying to prevent any unauthorized dissemination of copyrighted content by their users, they particularly feared the precedent set by 1993’s Frena decision, which imposed direct copyright liability on a bulletin-board operator for storing infringing images uploaded by users.[7] To address the perceived threat to OSP viability if Frena were broadly followed, Section 512 contains safe harbors that essentially codify the precedent in 1995’s Netcom case, which instead countenanced only secondary liability for OSPs that host infringing content.[8] Broadly speaking, the law grants OSPs conditional immunity for unwittingly disseminating unlicensed copyrighted material without authorization.[9] Importantly, Section 512’s immunity is conditioned on OSPs acting to curb infringement once they have actual knowledge of its existence, such as when notified by the copyright owner, or when the infringement is apparent. This latter category of apparent infringement is sometimes referred to as “red flag” knowledge.[10]

The regime Section 512 established has produced mixed results in practice. By enabling OSPs to transmit content across the Internet at greatly reduced risk of liability, Section 512 has, without question, facilitated the rapid growth of distribution services that also benefit content producers and consumers. At the same time, however, the proliferation of pirated content has grown exponentially. The law imposes little obligation on OSPs to mitigate the dissemination of infringing content other than to react ex post—at which point, the damage has already been done.

It is therefore not surprising that there have been growing calls for stronger copyright and other forms of content protection, both in the United States and around the world. Australia’s Competition and Consumer Commission (ACCC) has moved to impose “neutrality” requirements on tech platforms,[11] as well as to curtail platforms’ ability to monetize news content without licensing it at what news organizations believe are fair rates.[12] The European Union passed reforms to its Copyright Directive intended to provide greater protection for rightsholders.[13] And following years of public meetings and stakeholder input, the U.S. Copyright Office published its long-anticipated Section 512 report, which concluded that the safe harbors should be adjusted to better address online piracy, as “Congress’ original intended balance has been tilted askew.”[14]

In this paper, we examine whether Section 512 set the right balance between, on the one hand, mitigating unreasonable copyright-litigation risks that may arise from user-generated content, and on the other, holding online platforms accountable when they unreasonably fail to curb foreseeable infringement risks. We ultimately conclude, as the Copyright Office did, that the law’s proper balance has been tilted askew. We therefore recommend adjustments to Section 512.

I. The Development of Section 512

When Congress passed the Digital Millennium Copyright Act (“DMCA”) in 1998, only about 30% of the U.S. population used the Internet in any fashion,[15] and only 12% of American adults reported daily online use.[16] Indeed, while the Internet’s potential to dramatically alter the way consumers access information and buy all manner of goods and services had become clear by the mid-1990s, much of the technology that would come to shape the Internet as we know it remained either still in its infancy or did not exist at all. Amazon didn’t start selling books until 1995,[17] MP3.com wasn’t launched until 1997,[18] and Google wasn’t founded until 1998.[19] Napster, one of the earliest drivers of massive-scale digital piracy, didn’t exist until 1999.[20] Facebook wasn’t launched until 2004.[21] YouTube started in 2005 and was bought by Google in 2006.[22] Twitter became a company in 2007.[23]

By contrast, recent estimates find that, today, 81% of Americans have mobile Internet access, while 28% of Americans say they are online “almost constantly.”[24] Global Internet access has jumped from 3.14% in 1998 to more than 50% in 2020.[25] This explosion of online access has benefitted consumers and businesses in ways that weren’t necessarily obvious in 1998. Amazon’s e-commerce revolution, for example, benefitted not just Amazon, but a host of firms that wished to exploit the Internet as a distribution channel. At the same time, service has offered consumers a fast, convenient, and affordable way to shop for nearly every conceivable product. Similar revolutions have been seen in media and the arts, where digital distribution has provided users an outlet for their own creativity, while creating another channel for traditional media entities to reach audiences.

But Internet distribution reduces friction not just for legitimate transactions, but also for unlawful ones.[26] The question becomes how to combat that unlawful activity without hindering the development of legitimate content and the online platforms that distribute it—either through excessive regulation or unending litigation risk stemming from user-generated content.

It was this question that Congress sought to address in the mid-1990s when it attempted to balance two competing interests regarding copyright policy online. On the one hand, it recognized that the incipient Internet platforms of the day would have great difficulty if they were subject to direct or secondary copyright liability for all their users’ posts. On the other hand, rightsholders had a valuable interest in protecting their works. The balance Congress struck is embodied in Section 512, which was added to the Copyright Act through passage of the Digital Millennium Copyright Act of 1998.[27]

Importantly, Section 512 did not create an absolute shield for OSPs against copyright-infringement claims. Rather, Section 512 created a set of “safe harbors” that would grant various types of OSPs protection from copyright claims arising from user-generated content, provided the service providers promptly took down instances of infringement.[28] The safe harbors cover four specific categories of activity. Section 512(a) covers OSPs that merely serve as conduits for material directed at third parties;[29] Section 512(b) covers OSPs that temporarily cache content as it is being transmitted;[30] Section 512(c) covers OSPs that host material for third-party users;[31] and Section 512(d) covers OSPs that “link” to content—for example, search engines or directories.[32] Each of Section 512’s safe harbors imposes certain obligations on OSPs before they will merit protection from liability. For example, service providers are required to comply with a notice-and-takedown procedure,[33] as well as to act on both “apparent” and “actual” knowledge of infringement.[34]

As noted above, Section 512 was passed at a relatively immature stage in the development of online technologies. At the time, the web existed largely as a collection of static, primarily text-based pages. Usenet also existed and was then a major conduit for pirated content, although its relative importance has since declined.[35] By today’s standards, search technologies were crude[36] and, while there undoubtedly were private servers dedicated to content-sharing, it would have been difficult to find such servers in the relatively disorganized web of the day. High-speed Internet service was also rare and, outside of universities and large corporations, most users connected to the Internet via analog modems and telephone lines.[37] Moreover, the peer-to-peer services that would make file-sharing more efficient effectively did not exist.[38] And yet, even at the time Section 512 was enacted, it was understood that “[d]ue to the ease with which digital works can be copied and distributed worldwide virtually instantaneously, copyright owners will hesitate to make their works readily available on the Internet without reasonable assurance that they will be protected against massive piracy.”[39]

Thus, even in the Internet’s infancy, when broadband speeds were a tiny fraction of today’s and with only rudimentary file-sharing services available, Congress believed that “[w]ith this… evolution in technology, the law must adapt in order to make digital networks safe places to disseminate and exploit copyrighted materials.”[40]

A.   The evolving legal backdrop

Section 512 emerged in response to federal case law regarding online copyright infringement. Two cases in particular—Playboy Enterprises Inc. v. Frena and Religious Technology Center v. Netcom On-Line Communication Services Inc.—represented the dominant poles of jurisprudence.

In Frena, Playboy Enterprises sued George Frena, the operator of an online bulletin-board system.[41] The complaint concerned copyrighted photos that were stored on Frena’s servers and had been uploaded by users of the bulletin board without Frena’s knowledge.[42] As soon as he became aware of the infringing material, Frena removed it.[43] The court, however, framed Frena’s activity as one of direct infringement, rather than contributory infringement.[44] After walking through a fairly routine copyright analysis, it found Frena liable.[45]

By contrast, the Netcom decision two years later framed the relevant copyright analysis differently. In Netcom, an affiliate organization of the Church of Scientology sued the operator of a bulletin board, Thomas Klemesrud, and his Internet-service provider (ISP), Netcom, for hosting portions of copyrighted works that it owned.[46] The works were not posted by either Klemesrud or Netcom, but by a user of Klemesrud’s bulletin board named Dennis Erlich.[47] The court dismissed the direct infringement claims, characterizing storage by a bulletin-board operator and transmission by an ISP as “incidentally making temporary copies,” and thus insufficiently tangible to support a direct infringement claim.[48]

The court, however, went on to examine the plaintiffs’ other claims of contributory infringement, as well as vicarious liability.[49] In this regard, it found that the plaintiffs had raised genuine issues of fact: whether Netcom and Klemesrud had sufficient knowledge that an infringement was occurring, and whether they were in positions to stop such infringement.[50] Consequently, the court denied the motion for summary judgment, and allowed the case to proceed on the secondary-liability theories.[51]

Thus, under either dominant approach to examining the infringing acts of users of an online service, there was a distinct possibility that providers could be found liable. At the same time, some rightsholders objected that basing service providers’ liability on their having sufficient knowledge of infringing activities (however that term would come to be defined) would encourage OSPs to choose to be willfully blind.[52]

In response to these cases, Congress drafted and passed Title II of the Digital Millennium Copyright Act, which was subsequently codified as Section 512 of the Copyright Act:

There have been several cases relevant to service provider liability for copyright infringement.  Most have approached the issue from the standpoint of contributory and vicarious liability. Rather than embarking upon a wholesale clarification of these doctrines, the Committee decided to leave current law in its evolving state and, instead, to create a series of “safe harbors,” for certain common activities of service providers. A service provider which qualifies for a safe harbor, receives the benefit of limited liability.[53]

Section 512’s explicit goal was to balance the competing interests of rightsholders and service providers in a way that preserved strong incentives for service providers and copyright owners to cooperate in detecting and resolving copyright infringements in the digital networked environment.[54] At the same time, it provided greater certainty to service providers concerning their legal exposure for infringements that may occur in the course of their activities.[55]

II. The Costs and Benefits of Section 512

It is to be expected that a legal regime constructed before the commercial Internet had truly taken shape would require updates as new harms and user behaviors emerged. With the benefit of hindsight that the drafters of Section 512 lacked, this section offers an overview of the positive and negative effects that the law has produced.

A.   The positive effects of Section 512

Section 512 has delivered on at least some of its promise. Online-distribution services have grown dramatically: transforming entire industries; significantly altering how we consume books, music, and videos; and increasing the availability of creative works, including user-generated works. Without a doubt, OSPs have generated enormous benefits to society,[56] and a substantial proportion of those benefits have come from legitimate dissemination of high-quality content (e.g., Apple Music, Spotify, Netflix, Amazon Prime Video, etc.).

It would be difficult to quantify the full value that online services carrying user-generated content have offered society, but it is surely quite large. Just seven years after Section 512’s passage, YouTube was founded as a platform for individuals to store and stream everything from their own amateur films and home movies to grassroots outreach on important civic and political issues.[57] It now draws 2 billion monthly users.[58] Facebook has 1.9 billion daily users.[59] Google processes at least 2 trillion searches annually.[60] And all of these services are nominally free to users, thanks to the platforms’ ability to monetize their services successfully with ad revenue. In the process of hosting and serving ads, the platforms also generate value for advertisers, who are better able to match their offerings to targeted users, and for users, who receive more relevant offers for products and services.

The rise of closed systems like iTunes (now Apple Music) and Spotify also demonstrates the benefits that can flow, in part, from predictable legal liability around digital content. Numerous third-party services allow content creators to feed their music into Apple’s and Spotify’s ecosystems.[61] It would be virtually impossible to vet rights claims at scale for every piece of content that these services host. Platforms like Bandcamp and Soundcloud provide services analogous to YouTube, but for independent musicians. Those sites allow millions of individual artists to release and market their music to a broad array of consumers. And social media like Reddit, Facebook, Instagram, and SnapChat would similarly be unable to offer multimedia-sharing services to millions or billions of users without something like the liability-limiting provisions of Section 512.

Research published in the Proceedings of the National Academy of Sciences (PNAS), using willingness-to-accept choice experiments, finds that users assign relatively high values to Internet services.[62] For example, survey respondents in 2017 indicated they would require the following payments to give up each of the following services for one year (95% confidence interval):

Search engines: $14,000-22,000
Email: $6,900-10,200
Maps: $2,700-5,100
Video streaming: $940-1,490
E-commerce: $700-1,000
Social media: $240-430
Messaging: $115-210
Music: $130-215


Authors Erik Brynjolfsson, et al., believe that one explanation for the high valuations that users place on Internet services is that many see them as essential to their jobs and would thus be reluctant to give them up, even for significant compensation. Moreover, the authors argue, because most consumers do not pay for these services directly, nearly all of their willingness-to-accept represents consumer surplus.

There are also intangible benefits that flow from Internet platforms and user-generated content.  For example, experiments comparing Internet versus non-Internet research have found that searchers are more likely to find an answer to a question using Internet search; that an Internet search takes significantly less time to complete; and that searchers will consult significantly more sources on the Internet.[63] When searching factual questions for which there is a clear correct answer, Internet searches are significantly more likely to find the correct answer.

B.   The negative effects of Section 512

Along with the value created by online platforms, however, has also come the widespread, unauthorized dissemination of copyrighted content. This has almost certainly diminished some of the investment-backed expectations of content creators and rightsholders; raised costs for producers, and, thus, consumers; and reduced the quantity, breadth, and quality of content available to audiences. Early on, for example, YouTube quickly became a major venue for users to upload copyrighted content illegally,[64] while other legitimate social-media platforms similarly have hosted large quantities of unauthorized content.[65] The past quarter-century has, of course, also seen the development of myriad other sites specifically dedicated to the mass, unlawful dissemination of copyrighted content.[66]

At the same time, direct piracy is not the only negative effect suffered by rightsholders. The broad dissemination of pirated content as an alternative to legitimate content, coupled with Section 512, has placed downward pressure on the value of licenses for content. The Phoenix Center’s T. Randolph Beard, George S. Ford, and Michael L. Stern conducted an economic analysis examining the distortions that online platforms have had on the market for licensing by examining the relationship between market rates and the rates that YouTube paid for digital music.[67] They concluded that YouTube’s use of Section 512, given the widespread piracy on its service, “reduces revenues to artists and labels in the U.S. by at least hundreds of millions and by perhaps more than one billion dollars each year.”[68] If YouTube were to pay rates closer to the market level, it would generate between $650 million and $1 billion in additional revenue for content creators.[69]

This is not to suggest that OSPs like YouTube do not attempt to control piracy on their services. Soon after acquiring YouTube, Google developed its innovative ContentID “fingerprint” filtering system.[70] Such systems detect attempts to upload unauthorized content, allowing copyright holders to determine whether to permit dissemination and whether to monetize it.[71] While this is the sort of technological innovation that Congress hoped to encourage with Section 512, filtering systems are available on only a few platforms and they extend primarily to the largest copyright holders, often to the exclusion of smaller content creators.[72] Moreover, such systems do nothing to stem access to infringement on dedicated piracy sites, whose unlawful offerings can be found relatively easily, whether through word of mouth, linking sites, or search services.[73]

Compounding matters, there have been significant changes in the legal and technological landscape over the last two decades that undermine some of the assumptions underlying Section 512. As we discuss at length in the remainder of this paper, judicial interpretations have systematically diminished the effectiveness of many of the provisions of Section 512 that were meant to aid rightsholders in combatting piracy. Although red-flag knowledge of suspicious activity that could be infringement was supposed to constitute grounds on which OSPs were expected to act, judicial interpretation of Section 512’s relevant provisions has so narrowed the scope of those grounds as to render them a nullity.[74] Rightsholders have, moreover, largely been unable to seek adequate redress in U.S. courts by seeking the sorts of no-fault injunctions that have been widely successful in other jurisdictions.[75] And the original standard technical measures envisioned by Section 512’s drafters, which would have enabled collaborative approaches between platforms and rights holders to control piracy, have not adequately materialized.

III. The Costs and Extent of Piracy

From some perspectives, the balance embodied by Section 512 has largely worked well.[76] As Jennifer Urban, et al., characterized the current enforcement around Section 512:

Overall, the fundamental compromise in section 512—to manage liability and enforcement costs for OSPs and rightsholders—holds in essence. The basic compromise still underpins negotiations between OSPs and rightsholders over responsibility as Internet services and distribution channels evolve.[77]

For those who take this perspective, where the basic compromise has failed, it has done so in the direction of over-enforcement, suggesting that the protections Section 512 offers to rightsholders should be limited further still.[78] More directly, the primary concern of many who support the status quo is the extent to which Section 512 could be used as a tool to stifle free expression, not to facilitate piracy.[79]

Nonetheless, stakeholders on both sides of the Section 512 bargain generally acknowledge that the sheer scale of online piracy has tended to overwhelm the law’s notice-and-takedown provisions.[80]

Developed in a world that operated at dial-up speeds, Section 512 was targeted at isolating infringing content and preventing its spread. When an infringing file appeared, the relatively slow speeds of dial-up Internet access were a natural barrier that tended to prevent rapid dissemination, giving platforms and rightsholders time to issue a series of notices and counter-notices to stop further infringement. But the underlying assumptions of that bargain have been undermined by the advance of technology. Today, a file-containment approach leads to the well-known game of copyright “Whac-A-Mole” that does little, if anything, to control the spread of massive online piracy.[81]

A core defect of the current Section 512 regime is that it places little onus on platforms to prevent either the initial unlawful dissemination or the repeat posting of files that are known (or easily knowable) to be infringing. While Google faces a gargantuan task in processing millions of takedown notices, rightsholders face an even larger collective challenge in searching across all platforms to discover, investigate, and report on cases of infringement.[82] Many do not have the resources of major movie studios or record labels and must make tough decisions about how to adequately police infringement of their property.

U.S. consumers logged 725 million visits to pirate sites for movies and television programming in April 2020 alone.[83] Close to 90% of those visits were attributable to illegal streaming services.[84] In the United States, there are more than 9 million subscribers to Internet protocol television (IPTV) services specializing in pirated content, which reap more than $1 billion annually in ill-gotten gains.[85] Globally, there are more than 26.6 billion illicit viewings of U.S.-produced movies and 126.7 billion illicit viewings of U.S.-produced television episodes each year, annually costing U.S. rightsholders between $30 and $70 billion, costing the sector between 230,000 and 560,000 jobs, and costing the overall economy between $45 and $115 billion in GDP.[86]

For larger rightsholders, policing this infringement represents a significant cost (albeit one that addresses only a fraction of the online infringement that affects them). For smaller rightsholders, it can be a prohibitive barrier that prevents them from effectively policing unlicensed use of their property and existentially threatens their livelihood.[87] The Copyright Office took note of the explosion of piracy since the mid-1990s in its Section 512 report:

[B]etween 1998 and 2010, Google received notices for less than three million URLs containing content that allegedly infringed a copyrighted work. The scale of notices grew with time, and in 2013, Google received notices for approximately three million URLs—more than the total received by Google during the previous twelve years. Since then, the volume of infringement notices has rocketed up. In 2017, Google received notices identifying about 882 million URLs, and has processed requests to delist more than 4.6 billion URLs for copyright violations to date.[88]

From January to June 2021, Microsoft reported receiving more than 11 million takedown requests involving 103 million URLs.[89] The company rejected only about 0.33% of these requests.[90]

Because takedowns occur after illicit dissemination, by the time the takedown process is initiated, copyright holders by definition have already suffered significant harm to their exclusive rights to determine whether, how, and under what terms their content may be disseminated. Moreover, the future market for the works likely has been impeded, as at least some portion of the future audience will probably be able to access the content at no cost. Recognizing the smaller addressable market, distributors (whether online or traditional media) will offer copyright holders less to license the content than they would have if the illicit dissemination had never occurred. The volume of takedown notices offers evidence of the massive scope of online piracy, which in turn can have a huge effect on a copyright’s value to the rightsholder.

The status quo is also not without cost to the OSPs. Complying with the volume of requests generated pursuant to Section 512’s safe-harbor requirements entails significant investment of resources.[91] Just as smaller rightsholders face disproportionately large challenges in policing infringement of their copyrights, it is smaller platforms and new market entrants that are least able to bear the costs of safe-harbor compliance.

There is, moreover, the potential problem of takedown notices that were filed fraudulently. Estimating real costs in this regard is difficult, as the costs of compliance depend on several factors, including internal technology and compliance staff. Some sense of the scale is available, however, from public data. For example, Automattic—the makers of a host of popular web-publishing software, including WordPress and WooCommerce—reports that, generally, between 5% and 10% of the takedown requests they receive are “abusive.”[92] In 2021, this accounted for about 530 notices.[93] A larger provider like Google faces substantially more abusive takedown demands. In one study of a single fraudulent effort to force takedowns by misrepresenting ownership of content, a researcher discovered 33,988 illegitimate takedown efforts.[94] Even beyond fraud, erroneous takedowns can be a problem, with another study estimating that up to 30% of the takedown notices in its sample were potentially in error.[95]

IV. Legal Developments in the Section 512 Regime

There are two general trends that can be observed in the evolution of Section 512’s legal standards: toward relatively less participation on the part of platforms to deter illegal content on their services and toward greater burdens on rightsholders to police piracy of their content.[96] While the platforms have enjoyed exponential growth and the accompanying financial rewards, the law has not always kept pace with that growth by ensuring that platforms more properly internalize the social costs of their activity.[97]

For example, courts have consistently interpreted Section 512’s grant of immunity as being almost completely undisturbed by red-flag knowledge.[98] Courts have also interpreted a key rightsholder’s ability to seek subpoenas and injunctions against actual infringers in so restrictive a manner as to effectively neuter that section of the law.[99] Further, in practice, the ways that OSPs process takedown notices essentially requires copyright holders to proceed URL-by-URL—a linear process doomed to failure and frustration in the face of logarithmic piracy.

A.   Knowledge, red-flag knowledge, and the duty to monitor

To receive the benefit of a Section 512 safe harbor, OSPs engaged in hosting or search services must act to address copyright infringement by users of their services when they have either: 1) actual knowledge of infringement, or 2) awareness of facts that make it apparent that infringement is occurring—i.e., red-flag knowledge.[100]

Despite some suggestions to the contrary from the U.S. Supreme Court,[101] courts have not generally imposed a legal obligation on OSPs to proactively mitigate infringement by their users to qualify for the safe harbor; rather, courts have instead only required service providers to curtail infringement after the fact. In this regard, courts have relied upon Section 512(m), which explicitly declines to condition application of a safe harbor on an OSP “monitoring its service or affirmatively seeking facts indicating infringing activity, except to the extent consistent with a standard technical measure complying with the provisions of subsection (i).”[102] There is room, however, between actively monitoring to discover evidence of actual or impending infringement and taking preventative measures to avoid infringement where such evidence presents itself—either because it has been affirmatively called to the OSP’s attention or has otherwise become apparent.

Indeed, the legislative history of Section 512 describes actual and red-flag knowledge as two distinct ways through which OSPs may become aware of infringing material that requires action on their part.

[A] service provider need not monitor its service or affirmatively seek facts indicating infringing activity… in order to claim this limitation on liability (or, indeed any other limitation provided by the legislation). However, if the service provider becomes aware of a ‘‘red flag’’ from which infringing activity is apparent, it will lose the limitation of liability if it takes no action. The ‘‘red flag’’ test has both a subjective and an objective element. In determining whether the service provider was aware of a ‘‘red flag,’’ the subjective awareness of the service provider of the facts or circumstances in question must be determined. However, in deciding whether those facts or circumstances constitute a ‘‘red flag’’—in other words, whether infringing activity would have been apparent to a reasonable person operating under the same or similar circumstances—an objective standard should be used.[103]

To be sure, this can be a complicated standard to adjudicate. A court was expected, first, to determine whether an OSP had subjective red-flag knowledge of infringement. Next, if a court found that the OSP did not have subjective knowledge, it would have to determine if the lack of such knowledge was objectively reasonable. If the OSP’s lack of knowledge was objectively unreasonable, the OSP would be required to remove the infringing material or lose the safe harbor. Thus, in the original formulation of Section 512, actual or red-flag knowledge of infringement could theoretically arise from a range of potential situations: rightsholders pointing out a violation, an employee discovering (either through automated functions or plain observation) such material, or from evidence that would lead a reasonable person to recognize that infringement might be occurring.

A series of court decisions, however, have significantly enhanced the requirements to meet these knowledge standards. In the Viacom case, the 2nd U.S. Circuit Court of Appeals described actual knowledge as whether the OSP “‘subjectively’ knew of specific infringement.”[104] Other circuits and district courts have largely followed this view of actual knowledge.[105]

As for red-flag knowledge, the Viacom court described it as turning “on whether the provider was subjectively aware of facts that would have made the specific infringement ‘objectively’ obvious to a reasonable person.”[106] Along these lines, the 9th U.S. Circuit Court of Appeals ruled that “general knowledge” that an entire category of hosted content was likely to contain copyrighted material was insufficient to create red flag awareness in an OSP.[107] Curiously, the 9th Circuit held that red-flag knowledge didn’t exist even when a suspected infringer went so far as to label its files “stolen” or “illegal,” as such labels merely increased the “salacious appeal” of the content.[108]

In effect, courts have collapsed the distinction between red-flag knowledge and actual knowledge by disallowing “red flags” to arise from general awareness of infringement on a service. The 9th Circuit’s Veoh opinion is emblematic:

Although the parties agree, in retrospect, that at times there was infringing material available on Veoh’s services, the DMCA recognizes that service providers who do not locate and remove infringing materials they do not specifically know of should not suffer the loss of safe harbor protection.[109]

As noted above, the 2nd Circuit’s Viacom decision essentially agreed with the requirement that subjective knowledge of infringement be “objectively reasonable” to avoid constituting red-flag knowledge.[110] Yet it also followed the 9th Circuit’s approach of pinning the knowledge requirement to “specific” acts of infringement. This substantially narrows the circumstances under which an OSP could theoretically be said to form a reasonably subjective view of potential infringement.[111]

It is helpful to unpack the 2nd Circuit’s 2016 Vimeo decision to understand the scope of the problem. Vimeo is a website that allows users to post videos. Several record labels and music publishers sued Vimeo for direct, contributory, and vicarious copyright infringement, documenting at trial a variety of Vimeo employee messages about incorporating copyrighted songs in uploads. Examples included three members of the Vimeo content-moderation team individually:

  • telling a user that Vimeo allowed uploading “lip-synch” videos containing copyrighted music, but would take them down if and when asked by a rightsholder;
  • telling a user, “don’t ask, don’t tell,” in response to a question about including copyrighted music in original videos the user created;
  • saying to a user “[w]e can’t officially tell you that using copyright music is okay. But…” in response to a question about using a song by the band Radiohead;
  • telling fellow employees that she was “[i]gnoring, but sharing” internally a user message that included a link to a video and asked what Vimeo did about people using copyrighted music on Vimeo; and
  • responding to a user question about including Bobby McFerrin’s “Don’t Worry, Be Happy” in a home video that “[t]he Official answer I must give you is: While we cannot opine specifically on the situation you are referring to, adding a third party’s copyrighted content to a video generally (but not always) constitutes copyright infringement under applicable laws… Off the record answer… Go ahead and post it….”[112]

The company’s vice president of product and development also sent a message to two members of the content-moderation team and every employee in the “[email protected]” email group asking: “Who wants to start the felons group, where we just film shitty covers of these [EMI] songs and write ‘FUCK EMI’ at the end?”[113]

The 2nd Circuit nonetheless ruled that the messages in this case did not constitute red-flag knowledge because they did not relate to the specific infringement claims at issue and because the mere viewing by employees of videos containing recognizable songs would not be sufficient.[114] Citing its prior decision in Viacom, the court said that, to possess red-flag knowledge, the service provider must be subjectively aware of facts that would make the specific infringements at issue objectively obvious to a reasonable person.[115] Moreover, that “reasonable person” is “an ordinary person” without any expertise regarding music or copyright law, and without any obligation to investigate whether the content is copyrighted or the poster is engaged in a licensed or fair use.[116]

According to the court, it would not be sufficient to establish red-flag knowledge that there were facts that would lead a reasonable person to infer that infringement occurred. Rather, the service provider must have actual knowledge of the significance of those facts, and those facts would need to lead an ordinary, reasonable person to infer infringement was occurring.[117]

This appears to be both a poor interpretation of the statute and bad policy. Indeed, the Copyright Office does not appear to believe that Congress intended to erect so high a bar as the Vimeo court and others have suggested:

The Office believes a standard that requires an OSP to have knowledge of a specific infringement in order to be charged with red flag knowledge has created outcomes that Congress likely did not anticipate. The Copyright Office reads the current interpretations of red flag knowledge as effectively removing the standard from the statute in some cases, while carving an exceptionally narrow path in others that almost requires a user to “fess up” before the OSP will have a duty to act. OSPs are correct that Congress likely did not intend to adopt a general awareness standard for red flag knowledge, since such a standard would consume many OSPs Congress otherwise sought to protect. Yet courts have set too high a bar for red flag knowledge, leaving an exceptionally narrow space for facts or circumstances that do not qualify as actual knowledge but will still spur an OSP to act expeditiously to remove infringing content.[118]

B.   Subpoenas and injunctions

Another notable trend in the law, both in the United States and abroad, has been the growing challenges rightsholders’ face in seeking to identify suspected infringers. Under the EU’s General Data Protection Regulation, for example, it has become significantly more difficult to obtain valid WHOIS contact information for the owners of domains that host infringing content.[119] In a similar vein, the European Commission has been wrestling with so-called “structural infringement”—infringement that occurs as a core component of a provider’s business model and is aided by online anonymity.[120] According to a recent report prepared for the Commission, rightsholders in the EU find that such structural infringement is compounded by the paucity of requirements that intermediaries be identifiable to hosting providers.[121] There is little recourse under current EU law to identify anonymous parties, leading to calls to impose “know your customer” requirements on intermediaries.[122]

In the United States, Section 512 theoretically grants rightsholders some ability to unmask anonymous infringers through subpoenas.[123] Although it is not explicit on this point, Section 512(h) has been narrowly interpreted by courts to apply only to hosting providers, and not to Internet service providers (ISPs).[124] Technically, there are other means to potentially identify infringers, including relying on FRCP (26)(d)(1) motions to seek the identity of infringers.[125] This process, however, requires additional pleading and litigation expense as compared to Section 512(h), which allows rightsholders to apply for an unmasking order as of right once a takedown request has been filed. Limiting subpoenas solely to storage providers often ignores “the most relevant OSPs for uncovering the identity of individuals using BitTorrent and similar file-sharing protocols.”[126]

Another area where Section 512 has failed to evolve is in the use of injunctions. On its face, Section 512(j) appears to provide a broad remedy to rightsholders. It allows courts to grant injunctions: 1) to disable access to infringing content, 2) to limit service to the subscriber who is infringing, or 3) to provide other relief the court deems necessary to limit infringement of copyrighted content at a specific online location.[127] The first two forms of relief, however, only address access to a specific unauthorized copy of the copyrighted content or continued service access by a specific subscriber, rather than preventing unauthorized access more broadly to the copyrighted work. This perpetuates the Whac-A-Mole problem.

The third form of injunctive order might prove more useful, but it is rarely issued. Before granting any injunction under Section 512(j), a court must perform a balancing test to determine whether the burden placed on the OSP outweighs the harm to rightsholders.[128] The Copyright Office has observed that courts have generally found that the burden on OSPs from broader orders would outweigh the benefit to rightsholders.[129] Short of a major reconsideration of how injunctive remedies should work, Section 512(j)’s injunctive remedy is unlikely to be of much use to rightsholders in the foreseeable future:

The cost and expense of seeking an injunction in federal court against an OSP, particularly one that has previously demonstrated a willingness to litigate subpoenas and other matters relating to claims of online infringement, likely has some deterrent effect on rightsholders’ willingness to test the outer boundaries of section 512(j). Thus, while there may be some untapped “potential” in section 512(j) for combating online infringement, it is unlikely that changes to section 512(j) would play a significant role in restoring the balance under section 512. Nonetheless, the Office notes that, even in the absence of legislative change, courts have been overly narrow in their consideration of available injunctive relief under section 512(j).[130]

C.   Failure of voluntary, industrywide solutions

One final aspect of the legal development of Section 512 is worth addressing. As noted previously, Section 512 was enacted to create a set of tools for rightsholders and OSPs to work collaboratively to mitigate piracy, while also facilitating the growth of the commercial Internet. Ostensibly, part of this collaboration was to be the voluntary development of standard technical measures (“STMs”) that could effectively prevent infringement.[131] Yet, after more than 20 years, no STMs have been adopted.[132] The most effective preventive measures produced to date have been the filtering solutions adopted by YouTube,[133] Facebook,[134] and Audible Magic,[135] but neither filtering nor other solutions have been adopted industrywide. As the Copyright Office has observed:

While consensus-based fixes would be the ideal approach to improving the U.S. notice- and-takedown system, it has become clear that this is one instance where the perfect should not become the enemy of the good. Throughout the Study, the Office heard from participants that Congress’ intent to have multi-stakeholder consensus drive improvements to the system has not been borne out in practice. By way of example, more than twenty years after passage of the DMCA, although some individual OSPs have deployed DMCA+ systems that are primarily open to larger content owners, not a single technology has been designated a “standard technical measure” under section 512(i). While numerous potential reasons were cited for this failure— from a lack of incentives for ISPs to participate in standards to the inappropriateness of one-size-fits-all technologies—the end result is that few widely-available tools have been created and consistently implemented across the internet ecosystem. Similarly, while various voluntary initiatives have been undertaken by different market participants to address the volume of true piracy within the system, these initiatives, although initially promising, likewise have suffered from various shortcomings, from limited participation to ultimate ineffectiveness.[136]

The Copyright Office sounds a somewhat pessimistic note on this situation, seeing proposed STMs as “likely to encounter opposition from one or several groups of stakeholders.”[137] This concern is well-taken. For example, in their analysis of Section 512, Urban, et al., regard YouTube’s use of Content ID as a negative for the Internet ecosystem, fearing that it may become a standard for effective rights enforcement:

From the perspective of some other [online service providers], Google’s size, its prominence in the politics of notice and takedown, and its role in litigation, combined with its early adoption of DMCA Plus measures like content filtering on YouTube, trusted sender programs, autocomplete restrictions, and search result demotion, make it a dangerous elephant in the room. It is capable of adopting practices that could move collective perceptions of what is required for good practice, or even for safe harbor protection. When Google adopts DMCA Plus measures, these OSPs see their own practices under threat, as they fear the norm-setting potential of these moves.[138]

The ideal solution to control widespread piracy would likely be a set of standards that evolve naturally and that work for both rightsholders and platform operators. In lieu of that, unfortunately, Section 512 likely needs to be reevaluated to discover where incentives can be better aligned.

In that vein, Sens. Patrick Leahy (D-Vt.) and Thom Tillis (R-N.C.)—the chair and ranking member, respectively, of the U.S. Senate Judiciary Committee’s Subcommittee on Intellectual Property—recently introduced S. 3880, the SMART Copyright Act. The bill would amend Section 512 to require OSPs to comply with a slightly heightened set of obligations to deter copyright piracy on their platforms.[139] Among other changes, the Leahy-Tillis bill would empower the Office of the Librarian of Congress (“LOC”) with broad latitude to recommend STMs for everything from off-the-shelf software to open-source software to general technical strategies that can be applied to a wide variety of systems. This would include the power to initiate public rulemakings in which the LOC could either propose new STMs or revise or rescind existing STMs. The STMs could be as broad or as narrow as the LOC deems appropriate, including being tailored to specific types of content and specific types of providers.

Critically, the SMART Copyright Act would not hold OSPs liable for the infringing content itself, but only for failure to make reasonable efforts to accommodate the STM (or for interference with the STM). Courts finding an OSP to have violated their obligation for good-faith compliance could award an injunction, damages, and costs.

Indeed, this approach comports with general principles of intermediary liability. The common law has deployed these principles in analogous situations, where the incentives of private actors are not aligned with the socially optimal outcome. As Doug Lichtman and Eric Posner have observed:

[R]ules that hold one party liable for wrongs committed by another are the standard legal response in situations where . . . liability will be predictably ineffective if directly applied to a class of bad actors and yet there exists a class of related parties capable of either controlling those bad actors or mitigating the damage they cause. . . . [W]hile indirect liability comes in a wide variety of flavors and forms . . . , it is the norm.[140]

And as we have detailed in work examining nearly this exact concept in the context of Section 230:

Generally speaking, the law of negligence has evolved a number of theories of liability that apply to situations in which one party obtains a duty of care with respect to the actions of a third party. One legal obligation of every business is to take reasonable steps to curb harm from the use of its goods and services…. If the business has created a situation or environment that puts people at risk, it has an obligation to mitigate the risk it has created.[141]

Services that depend on user-generated content have been a boon to free expression, commerce, and likely much more. With that said, these services are inherently likely to surface illicit content if they are not adequately maintained. It is widely debated today what sort of changes are needed to reform Section 230 in order to prevent some of the harms that have emerged in the last quarter century.[142] Section 512 is due no less for this sort of reform, where OSPs should be obligated to take reasonable steps to ensure that their services are not vulnerable to piracy. Section 512 originally contemplated that voluntary standards would emerge to achieve this end. History has demonstrated that a more positive obligation may be necessary.

V. Potential Solutions

A range of possible reforms to Section 512 could better mitigate piracy and offer incentives for OSPs and rightsholders to engage in licensing negotiations. Properly applied safe harbors should encourage OSPs to help prevent unlawful dissemination of copyrighted content—as the obligation to act in the face of red-flag knowledge would largely do, absent its amelioration by the courts.[143] Ideally, such rules would also encourage OSPs to license content, enabling them and their users to benefit from such content without litigation risk. Indeed, in theory, it should be significantly more efficient for OSPs to negotiate license agreements with rightsholders than for rightsholders to do so with each of the service providers’ many users.[144]

But, as noted above, the current safe-harbor regime offers few incentives for OSPs either to curb piracy or to license content at market rates; indeed, they can obtain de facto unlicensed access to the content at no cost and with effectively no risk of liability.[145] To help address these misaligned incentives, Section 512’s safe harbor should be conditioned on OSPs taking reasonable steps: 1) to prevent infringement proactively, and 2) to stop infringement either a) when they have actual knowledge, such as when notified by a rightsholder, or b) when infringement would be apparent to a reasonable person.[146]

Below, we discuss potential adjustments to the legal standards that lead to application of safe harbors, as well as the practical steps that OSPs would need to take to qualify. We also examine some relatively less dramatic changes that could nonetheless contribute to a healthier online ecosystem that deters piracy and preserves the freedom of OSPs to innovate.

A.   Clarification of the knowledge standards

As noted above, judicial interpretations of Section 512 have essentially collapsed the red-flag standard into the actual-knowledge standard, while progressively narrowing the scope of the actual-knowledge standard; the bar for legally relevant knowledge of infringing activity is now quite high.[147]

To remedy this, the statute should be revised to effectively overturn the subjective element of red-flag knowledge applied in Vimeo. OSPs that host user-generated content should be attributed more knowledge than an “ordinary” person. Thus, red-flag knowledge would be present when information exists that would objectively lead a reasonable person in the business of facilitating dissemination of user-generated content (i.e., running a website that hosts such content) to infer infringement is taking place, even if a rightsholder has not alerted the site to a specific instance of infringement.

OSPs that host user-generated content seek to monetize that content. The DMCA presumes a significant likelihood that much of that content includes copyrighted material. Just as Congress wanted to ensure that platforms had room to grow and operate, so too did it intend to provide opportunity for rightsholders and platforms to work together to meaningfully control piracy. A service in the business of distributing content, where there is an elevated risk of infringing content, should be expected to act according to a higher standard than that to which we would hold an uninformed lay person.

This obligation to behave reasonably should exist even if that requires some degree of investigation and remediation on the part of the OSP once they have information that would objectively lead a reasonable platform to infer infringement is taking place. The obligation should obtain even if that information did not come from the rightsholder and was not related to a specific instance of infringement.

Such a standard would still offer reasonably responsive OSPs a safe harbor, which is appropriate, given that it would be impossible for platforms to catch all instances of infringement. The standard is not and should not be one of perfect content moderation, but one of reasonable content moderation. So long as a platform takes objectively reasonable steps to prevent and remediate infringement, the fact that other infringement slips through should not result in loss of the Section 512 safe harbor.

B.   Authentication, anonymous users, and subpoena authority

The Internet has long facilitated anonymous or pseudonymous communications. Fully anonymous communication systems obviously make it more difficult for rightsholders to pursue the parties responsible for infringement. Further, they can create a sense of safety (real or imagined) for would-be infringers, who may believe they can infringe with impunity.

Thus, another beneficial reform would require OSPs that host content likely to contain infringing material to reasonably ensure that they know their users’ identities. This would both discourage users from engaging in piracy and make it harder for those users to evade enforcement (and to continue infringing) simply by changing account names once caught. It would also help rightsholders to seek redress, including in cases where all they want is to ask users who are infringing unintentionally to cease doing so. Identities could remain confidential, disclosed to third parties only when needed to resolve a case of infringement.

Such disclosure might be provided voluntarily by the service provider, subject to any applicable requirements regarding the user’s privacy. The disclosures might also be provided pursuant to subpoenas issued under Section 512(h), which provides that “[a] copyright owner or a person authorized to act on the owner’s behalf may request the clerk of any United States district court to issue a subpoena to a service provider for identification of an alleged infringer in accordance with this subsection.”[148]

Relatedly, as the Copyright Office has explained, “this provision has proven to be little-used by rightsholders, in part because of how restrictively courts have interpreted it and in part because the information gleaned from such subpoenas is often of little use.”[149] Such subpoenas can be costly to obtain and are frequently ineffective; the data are often inaccurate or useless, and the OSPs may have already deleted it.[150] Moreover, courts have held that only OSPs that host material that can be removed pursuant to section 512(c)(3)(A) may be the subject of a Section 512(h) subpoena. In practice, this means such subpoenas cannot be used to obtain information from “mere conduit” ISPs.[151]

The Copyright Office is not convinced that Congress intended to exclude ISPs from section 512(h). Only an ISP is likely to be able to determine the identity of a user behind an IP address, information essential to filing an infringement claim.[152] The Copyright Office has therefore recommended clarifying that Section 512(h) applies to conduit ISPs.[153] OSPs are supposed to help rightsholders combat infringement in exchange for safe-harbor protection. Section 512 should be amended to require all OSPs seeking safe-harbor protection to provide whatever identifying information their service collects pursuant to a Section 512(h) subpoena.

C.   Filtering, takedown, and staydown

Section 512 does not require OSPs to proactively filter infringing content.[154] It was, however, expected that private industry would collaborate to develop and implement widespread standards for proactive technological controls to deter piracy. Section 512(i), for example, requires OSPs to accommodate STMs that would deter piracy and that have been developed through a voluntary, consensus process. While there have been piecemeal developments toward that end, the imagined innovations have thus far failed to materialize industrywide.

Congress must consider ways to prevent the initial sharing of pirated works, rather than the prevailing outdated file-containment approach. The latter presumes that post-hoc notice-and-takedown will be sufficient to control the spread of infringing material, which has not proven to be the case. New filtering solutions could empower OSPs to contribute significantly toward fighting piracy.[155]

Were OSPs to adopt reasonably effective filtering technologies, infringing files that are flagged and removed could more reliably be prevented from being reposted in the future. Indeed, as far back as 2007, several media and platform companies developed a set of best practices to control the proliferation of piracy. The proposed principles for user-generated content called on “websites to implement filtering technology that can recognize copyrighted works and notify rightsholders of any matches; rightsholders may then determine how the match should be treated.”[156]

Such filtering technologies already exist. Google employs proprietary filtering systems, for example.[157] DropBox has also implemented filtering in the past.[158] Audible Magic makes its filtering technology available for use by others,[159] and even small websites have found ways to employ filtering.[160] Indeed, even more prosaic technologies that have existed for decades—like web crawlers and digital fingerprinting accessible through basic APIs—could be adopted as effective STMs.

As the Copyright Office has noted, however, private firms could do more to advance broader access to these technologies for a wider range of firms.[161] A legal requirement to filter content for copyright infringement would help to foster a market for additional filtering solutions. This, in turn, could drive down costs and help to address the concern that smaller entities lack the resources to either create or obtain filtering solutions.[162]

The Copyright Office could help facilitate this process. Congress could empower the office to work with industry on specifications for STMs and to establish guidelines that ease their implementation. This could include determining minimum levels of functionality that such filters must include, which in turn should take a given platform’s size into account.

Indeed, this idea is central to the proposed SMART Copyright Act, discussed at the end of Part IV.[163] In this regard, the bill is directionally correct legislation, with two important caveats: it all depends on the kinds of STMs the LOC recommends and on how a “violation” is determined for the purposes of awarding damages.

The law would magnify the incentive for private firms to work together with rightsholders to develop STMs that more reasonably recruit OSPs into the fight against online piracy. In this sense, the LOC would be best situated as a convener, encouraging STMs to emerge from the broad group of OSPs and rightsholders. The fact that the LOC would be able to adopt STMs with or without stakeholders’ participation should provide more incentive for collaboration among the relevant parties.

Short of a voluntary set of STMs, the LOC could nonetheless rely on the technical suggestions and concerns of the multistakeholder community to discern a minimum viable set of practices that constitute best efforts to control piracy. The least desirable outcome—and the one most susceptible to failure—would be for the LOC to examine and select specific technologies.[164]

Among the concerns that surround promulgating new STMs are that they could potentially create cybersecurity vulnerabilities or sources for privacy leaks, or that they could accidentally chill speech.[165] In light of the potential unforeseen harms that can arise from implementation of an STM, the SMART Copyright Act’s requirements should be modified. If a firm does, indeed, discover that a particular STM, in practice, leads to unacceptable security or privacy risks, or is systematically biased against lawful content, there should be a legal mechanism that would allow for good-faith compliance, while also mitigating the STM’s unforeseen flaws. Ideally, this would involve working with the LOC in an iterative process to refine relevant compliance obligations.

While adopting filtering solutions would represent a new cost for many OSPs, complying with the existing notice-and-takedown system has costs, as well.[166] Using filtering solutions to prevent the unauthorized dissemination of copyrighted material would reduce the number of takedown notices that rightsholders would need to send and that OSPs would need to process. All parties would save time, hassle, and money—very possibly reducing the overall cost of Section 512 compliance.

1.     Fears of illegitimate blocking are overstated

Some critics have raised concerns that flaws in filtering technology could lead to mistakenly blocking legitimately disseminated content.[167] Among the faults commonly attributed to filtering solutions are failures to recognize licensed content or content disseminated pursuant to the Fair Use doctrine, or instances in which a rightsholder is mistaken as to the scope of its copyright.[168] The extent to which such faults are common is difficult to assess empirically. The experience of companies that offer content filters is proprietary information, and there are any number of reasons a platform might choose not to contest a takedown request that it or its users believe to be illegitimate. But some inferences may be drawn from available data, which generally suggest that harms stemming from this concern do not outweigh the known costs of piracy.

Actual false positives—instances where a user has an unambiguous right to use a file (e.g., they are the actual creator or have a license)—are likely to be exceedingly rare. A party who is the unambiguous creator of a work understandably has strong incentives to ensure that she can use her work as she sees fit.

What remains are false positives that fall somewhere on the spectrum of fair use—that is to say, they are somewhere between probably authorized under the fair-use factors and probably not authorized. If this reasoning is correct, then looking at the known instances of objections to takedown requests offers some sense of the possible scope of any false-positives problem. Some of the testimony offered during a December 2020 hearing of the U.S. Senate Judiciary Committee is illustrative in this regard.

According to Katherine Oyama, global director of business public policy for Google, uploaders disputed less than 1% of the Content ID claims made from January through June 2020.[169] Thus, in the set of all takedowns, 99% of the uploaders did not feel sufficiently entitled to use as to lodge an objection, or lodging an objection was otherwise not worth their time due to a variety of costs.[170] The remaining 1% captures some significant portion of those who are both definitely entitled (i.e., the original creator or a licensee who was misidentified) and those legitimately entitled to use under the fair-use affirmative defense.[171]

Among that 1% of uploaders, slightly more than half of the disputes were resolved in the uploader’s favor.[172] Even if all the remaining disputed uploads were kept down in error—which is unlikely—that would represent an error rate of less than 0.5% of all content flagged by Content ID. It is likely that most, if not all, of the errors were remedied in the slightly more than 0.5% of material flagged by Content ID that was allowed to proceed onto YouTube. Further, according to Noah Becker—president and co-founder of Adrev, a digital-rights-management company that administers Content ID claims for rightsholders—70% of Content ID disputes are “false claims of fair use, false claims of having procured a license, or false claims that the content is in the public domain. Most of these illegitimate disputes contain perjurious information from the user.”[173]

Using a similar set of numbers as those offered by Katherine Oyama, economist Stan Liebowitz estimated the differential between the number of infringing files uploaded to YouTube annually and the number of files taken down as infringing but later restored.[174] By his analysis of publicly available data, in 2016, roughly 2 million takedown disputes were resolved in favor of the uploader, while 600 million files were taken down and stayed down.[175] That is to say, 0.3% of takedowns were in error, which he characterized as a conservative estimate.[176]

It is, of course, possible that the percentage of false takedowns is greater than 1%, given that we can extrapolate only from known takedowns and putbacks. But if some unaccounted-for number of false takedowns are never challenged, it would appear that those users have deemed it not worth the trouble. Given the relative simplicity of the platforms’ takedown-challenge process,[177] a reluctance to engage would suggest the uploader does not place much value in the upload (i.e., there is not much benefit to be had and, by implication, limited social value). In such cases, the social cost of the false positive (erroneous takedown) is presumably not very significant compared to the value of enforcing IP rights.

By contrast, a false negative (erroneously leaving content up), even on a small site, can create significant harms to a rightsholder. Even a single unauthorized version of copyrighted content can quickly become available to the world, due to the global nature of the Internet and the availability of search, linking sites, and Internet-protocol-enabled piracy devices. Moreover, a single unauthorized version can multiply quickly. Thus, without more evidence, there is currently no reason to assume that content-filtering solutions like Content ID result in such widespread removal of legitimate uses of copyrighted material as to justify failing to enforce rightsholders’ claims rigorously.

While an industry standard for proactive filtering would help, the incredible scale of the takedown problem highlights deeper flaws in Section 512. The law should also be extended to place affirmative obligations on OSPs to employ filtering to prevent the recurrence of known infringing material once it has been discovered—a so-called “staydown” obligation, similar to recent experiments in the EU.[178] Expecting a rightsholder to repeatedly notify an OSP each time an infringing file reappears on the service makes little sense: it places rightsholders—especially small rightsholders—at a constant disadvantage.

Indeed, the Copyright Act does not currently require a copyright holder to scour a site for every instance of infringement of a specific work and to itemize every URL. Section 512(c)(3)(A)(ii) specifies that a takedown notice must identify the “copyrighted work claimed to be infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.”[179] Section 512(c)(3)(A)(iii) makes clear that the copyright holder need provide only “information reasonably sufficient to permit the service provider to locate” the infringing material.[180] Even if a copyright holder fails to “substantially comply” with the notice information requirements, the OSP must take “reasonable steps” to work with the copyright holder to gather the missing information.[181] If reasonably sufficient information remains unavailable, the copyright holder’s notice would not be considered the source of actual or red-flag knowledge.[182] The OSP may, however, obtain such knowledge from other sources.

Despite the broad obligations placed on OSPs by the Copyright Act’s statutory language, courts have rendered decisions that suggest rightsholders must provide near-exhaustive information, including URLs, for each and every specific infringement before OSPs have essentially any obligation to act.[183] The legislative history makes clear that such detailed information, while certainly helpful, is not required:

Where multiple works at a single on-line site are covered by a single notification, a representative list of such works at that site is sufficient. Thus, for example, where a party is operating an unauthorized Internet jukebox from a particular site, it is not necessary that the notification list every musical composition or sound recording that has been, may have been, or could be infringed at that site. Instead, it is sufficient for the copyright owner to provide the service provider with a representative list of those compositions or recordings in order that the service provider can understand the nature and scope of the infringement being claimed.

New subsection (c)(3)(A)(iii) requires that the copyright owner or its authorized agent provide the service provider with information reasonably sufficient to permit the service provider to identify and locate the allegedly infringing material. An example of such sufficient information would be a copy or description of the allegedly infringing material and the so-called ‘‘uniform resource locator’’ (URL) (i.e., web site address) which allegedly contains the infringing material. The goal of this provision is to provide the service provider with adequate information to find and examine the allegedly infringing material expeditiously.[184]

Some OSPs impose additional technical requirements for notices, such as creating an account or using an online form, instead of emailing the designated agent registered with the Copyright Office.[185] To mitigate this problem, the Copyright Office should be authorized to create model forms deemed to provide adequate notice, as well as to specify what kind of information is necessary and sufficient to require takedown. This information could be revised in a periodic process to give the office and stakeholders opportunities to properly shape the contours of this set of requirements.

D.   Repeat-infringer policies

Section 512 already requires that OSPs have policies to terminate service to repeat infringers, and to reasonably implement those policies. Indeed, Section 512(i) requires that, to be eligible for safe harbor, an OSP must have “adopted and reasonably implemented, and inform[ed] subscribers and account holders of the service provider’s system or network of, a policy that provides for the termination in appropriate circumstances of subscribers and account holders of the service provider’s system or network who are repeat infringers.”[186] As the Copyright Office has observed:

Both the House Commerce and Senate Judiciary Committee Reports explained that “those who repeatedly or flagrantly abuse their access to the Internet through disrespect for the intellectual property rights of others should know that there is a realistic threat of losing that access.”[187]

Courts, however, have historically interpreted the repeat-infringer policy requirement rather loosely. In Ventura Content v. Motherless, Inc.,[188] a site that allowed users to upload pornographic images and videos was found not to be in violation of the repeat-infringer policy requirement, even though the operator did not have a formal, detailed policy or keep a list of the number of times a user infringed.[189] The operator testified that he instead relied on his memory and terminated some repeat infringers but not others based on his own “gut” judgment, after considering a variety of unwritten factors that were not publicly available.[190] The court nonetheless concluded that this met the obligation to have a policy and to reasonably implement it.[191]

Where violations have been found, such cases have typically involved such egregious fact patterns as to provide little generalizable guidance. In Capitol Records v. Escape Media Group, an online-music service was found in violation where it failed to keep adequate records of infringement, prevented copyright owners from collecting information necessary to issue takedown notices, and did not terminate repeat infringers.[192] In UMG Recordings v. Grande Communications Networks, an ISP was found in violation where it had “utter[ly] fail[ed] to terminate any customers at all over a six-and-a-half-year period despite receiving over a million infringement notices and tracking thousands of customers as repeat infringers.”[193] And in BMG Rights Management v. Cox Communications, an ISP was found in violation where it capped the total number of notices a copyright holder could provide in a day; only counted one copyright-holder notice per subscriber per day; only considered terminating users after 13 strikes; and, if it did terminate them, reinstated the users after a break and restarted the strike counter so that, as an employee email indicated, the company could “collect a few extra weeks of payments for their account.”[194]

The point of the DMCA safe harbor is to provide platforms greater certainty regarding litigation risk when they act responsibly and to assure copyright holders that their rights will be reasonably protected in exchange for the liability limitations the platforms receive. That bargain is not achieved unless the platforms (and their users) know that costly repeat infringement will not be tolerated. To better address this goal, the Copyright Office should be authorized to provide guidance on the minimum requirements necessary to meet the repeat-infringer policy obligation, including by creating a model repeat-infringer policy that will be presumed to comply. This would offer platforms, their users, rightsholders, and courts more clarity on what behavior will be sanctioned.

E.   No-fault injunctions

Even where U.S. courts have ruled that websites have willfully engaged in infringement, stopping the infringement can be difficult, especially when the parties and their facilities are located outside the United States. One solution would be for a court to direct a non-party to the case, such as a U.S. -based ISP, to cut off access to a website held to be infringing.

Although Section 512 does allow courts to issue injunctions, there is ambiguity as to whether it allows courts to issue injunctions that obligate OSPs not directly party to a case to remove infringing material. Section 512(j) provides for the issuance of injunctions “against a service provider that is not subject to monetary remedies under this section.”[195] The “not subject to monetary remedies under this section” language could be construed to mean that such injunctions may be obtained even against OSPs that have not been found at fault for the underlying infringement.[196] But, “[i]n more than twenty years … these provisions of the DMCA have never been deployed, presumably because of uncertainty about whether it is necessary to find fault against the service provider before an injunction could issue, unlike the clear no-fault injunctive remedies available in other countries.”[197]

Indeed, more than 40 countries—including Denmark, Finland, France, India, England, and Wales—have enacted or are under some obligation to enact no-fault-injunction provisions directing ISPs to disable access to websites that predominantly promote copyright infringement.[198]

[L]egally and factually, these remedies turn on the infringing conduct of the pirate site at issue; they do not entail any finding of fault on the part of the intermediaries. No-fault injunctive remedies have been applied against a wide range of intermediaries, after first giving the intermediary notice of the infringing conduct taking place through its platform, all without entailing any inquiry into whether the intermediary may or may not have behaved in a manner that would incur primary or secondary liability. That question simply is not relevant to this form of relief, which turns on the simple finding that “such intermediaries are best placed to bring such infringing activities to an end.”[199]

Relatedly, Google has been working with rightsholders to delist pirate sites in response to “‘no fault’ orders directed at ISPs.”[200] To date, they have delisted nearly 10,000 sites in this manner.[201] The Motion Picture Association claims that its partnership with Google to delist pirate sites results in a “1.5 times larger traffic decline,” when compared with no-fault injunctions applied strictly at the ISP level.[202]

Thus, Section 512 should be amended to similarly grant U.S. courts authority to issue no-fault injunctions that require OSPs to block access to sites that courts have ruled are willfully engaged in mass infringement. Comparable authority was included in the Stop Online Piracy Act that was defeated in 2012, amid hyperbolic claims that allowing such orders would “break the Internet.” Notably, however, such sky-is-falling predictions have not materialized in the other nations that have authorized no-fault injunctions.[203] In fact, there is evidence that such orders can be quite useful in curbing piracy,[204] with one study demonstrating that no fault injunctions led to a more than 90% decrease in piracy.[205]

F.   Preservation of rights-management information

Digital copyrighted files often have embedded rights-management information, which indicates who holds the copyright and how the content may be used. OSPs and others who use the work sometimes strip out such information,[206] which is unlawful under Section 1202 of the Copyright Act. But to obtain redress, a rightsholder must demonstrate both that the OSP or other entity: 1) intentionally removed the rights-management information or disseminated the copyrighted work with knowledge that the rights-management information had been removed, and 2) did so with knowledge that its actions would facilitate infringement.[207] In practice, this section has been difficult to enforce, because the second requirement has proven a very high bar.

For example, in Stevens v. CoreLogic, Inc.,[208] CoreLogic’s software removed rights-management information from the photographs of two professional real-estate photographers when it compressed them for uploading to the Multiple Listing Service database.[209] The photographers, alleging that this might have led to unauthorized use of their photographs, sued under Section 1202.[210] The court upheld summary judgment for CoreLogic, on grounds that there was no evidence CoreLogic knew or had reason to know its actions would “induce, enable, facilitate, or conceal” infringement.[211] Similarly, in Philpot v. AlterNet Media Inc.,[212] photographer Larry Philpot alleged that AlterNet posted on its Facebook page a copyrighted photograph he took of Willie Nelson, and that it did not include the associated rights-management information.[213] The court granted AlterNet’s motion to dismiss on grounds that Philpot failed to plead facts showing that AlterNet knew or had reason to know that removal of the rights-management information would induce, enable, facilitate, or conceal an infringement.[214]

The lack of accurate rights-management information makes it harder for copyright holders to enforce their rights, as well as for individuals willing to license content to determine whom to approach to do so. Consequently, anyone disseminating the copyrighted work, including OSPs that may monetize the content through advertising or other means, should have an obligation to ensure that rights-management information included by a copyright holder remains intact and accurate. The concern here is not that the entity may be infringing the copyright or that there has been some intent to cause harm (although both may be true in some cases), but that the entity’s carelessness increases the likelihood that someone else will use the work without the copyright holder’s authorization. Consequently, Congress should consider amending Section 1202 to make it unlawful to negligently, recklessly, or knowingly remove rights-management information, or to negligently, recklessly, or knowingly disseminate a copyrighted work without that rights-management information, regardless of whether there was an intent to facilitate infringement.


Revising the Copyright Act as described above would encourage OSPs both to prevent initial infringement and to more effectively curtail ongoing or repeat infringement. OSPs could decline to implement these content-protection requirements, but the consequence would be losing the safe harbors and becoming subject to the ordinary standards of copyright liability. OSPs also might more widely choose to license copyrighted works that are likely to appear on their platforms. That would benefit copyright holders and Internet consumers alike. The providers themselves might even find it leads to increased use of their service—as well as increased profits.

Ultimately, however, it is important to advance copyright reforms that take seriously both the constraints on OSPs as well as the real harms that the failures of Section 512 have caused rightsholders for more than two decades. Real reform can be accomplished in a way that preserves both the benefits of a free and open Internet, as well as healthy legal protection for intellectual-property rights.

At the same time, it is important to be cognizant that effective reforms must move through a political process that can be challenging. What is set forth in this paper is a vision of what comprehensive reform would look like. But, short of a full reform, there are select measures proposed above that we believe could, even standing on their own, provide significant benefit. Foremost among these would be the expanded use of no-fault injunctions in the United States. As we note above in Section V(e), no-fault injunctions have been successfully employed around the world in a way that protects both the interests of copyright holders, as well as the interests of OSPs and private citizens. Moreover, we believe that a reform that facilitates a no-fault injunctive regime would go very far in controlling the most egregious forms of organized piracy.

[1] Geoffrey A. Manne, Kristian Stout, & Ben Sperry, Who Moderates the Moderators?: A Law & Economics Approach to Holding Online Platforms Accountable Without Destroying the Internet, at 38-39, International Center for Law & Economics, ICLE (2021), available at https://laweconcenter.org/resource/who-moderates-the-moderators-a-law-economics-approach-to-holding-online-platforms-accountable-without-destroying-the-internet.

[2] Id. at 27 (“The relevant questions [when considering intermediary liability rules] are: To what degree would shifting the legal rules governing platform liability increase litigation costs, increase moderation costs, constrain the provision of products and services, increase ‘collateral censorship,’ and impede startup formation and competition, all relative to the status quo, not to some imaginary ideal state? Assessing the marginal changes in all these aspects entails, first, determining how they are affected by the current regime. It then requires identifying both the direction and magnitude of change that would result from reform. Next, it requires evaluating the corresponding benefits that legal change would bring in increasing accountability for tortious or criminal conduct online. And finally, it necessitates hazarding a best guess of the net effect.”).

[3] Id. at 139-95 and accompanying text.

[4] 47 U.S.C. § 230(c)(1)-(2).

[5] Congress added Section 512 to the Copyright Act through amendments adopted in Section 202 of the Digital Millennium Copyright Act of 1998. See Pub. L. No. 105-304, sec. 202, 112 Stat. 2860, 2877.

[6] Digital Millennium Copyright Act, H.R. Rep. No. 105-796, at 72 (1998) (Conf. Rep.).

[7] Playboy Enterprises, Inc. v. Frena, 839 F. Supp. 1552, 1554 (M.D. Fla. 1993). Frena is discussed, infra, at notes 37-41 and accompanying text.

[8] Religious Tech. Ctr. v. Netcom On-Line Commc’n Servs., Inc., 907 F. Supp. 1361, 1365–66 (N.D. Cal. 1995). Netcom is discussed, infra, at notes 42- 47, and accompanying text.

[9] 17 U.S.C. § 512.

[10] See, e.g., 17 U.S.C. § 512(c)(1) (providing safe harbor on the condition that the online service provider “(A)(i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing; (ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or (iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material; (B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and (C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity.”).

[11] See, e.g., Dirk Auer et al., Submission on the Final Report of the Australian Competition and Consumer Commission’s Digital Platform Inquiry, International Center for Law & Economics (Sep. 12, 2019), https://laweconcenter.org/resource/submission-on-the-final-report-of-the-australian-competition-and-consumer-commissions-digital-platforms-inquiry.

[12] Australian News Media to Negotiate Payment with Major Digital Platforms, Australian Competition and Consumer Commission (Jul. 31, 2020), https://www.accc.gov.au/media-release/australian-news-media-to-negotiate-payment-with-major-digital-platforms; see also Journalism Competition and Preservation Act, S. 673, 117th Congress (2021); Dean Miller, France and Australia to Google and Facebook: Pay for News, The Seattle Times (Apr. 24, 2020), https://www.seattletimes.com/opinion/france-and-australia-to-google-and-facebook-pay-for-news, (France suing Google under the new EU copyright directive for harm to news producers); Inti Landauro & Emma Pinedo, Alphabet to Reopen Google News in Spain After Govt Amends Rules, Reuters (Nov. 3, 2021), https://www.reuters.com/technology/alphabet-reopen-google-news-spain-soon-after-govt-changed-regulation-2021-11-03, (Google required to negotiate with Spanish news producers under EU copyright updates).

[13] Copyright Reform Clears Final Hurdle: Commission Welcomes Approval of Modernised Rules Fit for Digital Age, European Commission (Apr. 15, 2019), https://ec.europa.eu/digital-single-market/en/news/copyright-reform-clears-final-hurdle-commission-welcomes-approval-modernised-rules-fit-digital.

[14] U.S. Copyright Office, Section 512 of Title 17: A Report of the Register of Copyrights 1 (May 2020), available at https://www.copyright.gov/policy/section512/section-512-full-report.pdf [hereinafter “Section 512 Report”].

[15] Data Bank: World Development Indicators, The World Bank,  http://databank.worldbank.org/data/reports.aspx?source=world-development-indicators (last visited Oct. 11, 2022).

[16] See, e.g., The Internet News Audience Goes Ordinary, Pew Research Center for The People & The Press (January 1999), http://www.people-press.org/1999/01/14/the-internet-news-audience-goes-ordinary.

[17] Amazon Opens for Business, History.com: This Day in History (Jul. 27, 2019), https://www.history.com/this-day-in-history/amazon-opens-for-business.

[18] Hope Hamashige, MP3.com Founder Michael Robertson Discusses His Revolutionary Company, CNNMoney (Feb. 20, 2000), https://money.cnn.com/2000/02/28/electronic/q_mp3.

[19] From the Garage to the Googleplex, Google (last visited Oct. 11, 2022), https://about.google/our-story.

[20] Tom Lamont, Napster: The Day the Music Was Set Free, The Guardian (Feb. 23, 2013), https://www.theguardian.com/music/2013/feb/24/napster-music-free-file-sharing.

[21] Anne Sraders, History of Facebook: Facts and What’s Happening, TheStreet (Feb. 18, 2020), https://www.thestreet.com/technology/history-of-facebook-14740346.

[22] Paige Leskin, Youtube Is 15 Years Old, BusinessInsider (Oct. 11, 2022), https://www.businessinsider.com/history-of-youtube-in-photos-2015-10.

[23] Jack Meyer, History of Twitter, TheStreet (Jan. 2, 2020), https://www.thestreet.com/technology/history-of-twitter-facts-what-s-happening-in-2019-14995056.

[24] Monica Anderson, Mobile Technology and Home Broadband 2019, Pew Research Ctr. (2019), https://www.pewresearch.org/internet/2019/06/13/mobile-technology-andhome-broadband-2019, (reporting that 81% of American adults owned a smartphone in 2016, up from 35% in 2011); Andrew Perrin & Madhu Kumar, About Three-in-Ten U.S. Adults Say They Are ‘Almost Constantly’ Online, Pew Research Ctr.: FactTank (Jul. 25, 2019), https://www.pewresearch.org/fact-tank/2019/07/25/americans-going-onlinealmost-constantly.

[25] See ITU Telecomm. Dev. Bureau, Measuring Digital Development Facts and Figures 2019, 1 (2019), available at https://www.itu.int/en/ITU-D/Statistics/Documents/facts/FactsFigures2019.pdf; Internet Usage Statistics: World Internet Users and 2020 Population Stats, Internet World Stats (last visited Oct. 11, 2022), http://www.internetworldstats.com/stats.htm; Internet Growth Statistics, Internet World Stats (last visited Oct. 11, 2022), https://www.internetworldstats.com/emarketing.htm.

[26] See Geoffrey A. Manne & Julian Morris, Dangerous Exceptions: The Detrimental Effects of Including ‘Fair Use’ Copyright Exceptions in Free trade Agreements, International Center for Law & Economics, ICLE White Paper 2015-1 (2015) (“Technologies such as DVRs and MP3 players that predominantly enable users to shift the time, location and/or format of consumption may increase the value of the creative work to the consumer and hence the creator. But there is also a risk that they will be used for illegal distribution of works, reducing income to the creator—since it is almost impossible for the creator to appropriate that value. To the extent that the value added by the technologies may be appropriated by creators, it is in the interests of the creator to permit their use—and to develop technologies that minimize infringing uses. But if the infringing use dominates—as was clearly the case with Napster, for example—then it is in the creators and society’s interest for the use to be prohibited.”); See also Benjamin Klein et al., The Economics of Copyright “Fair Use” in a Networked World, 92 Am. Econ. Ass’n Papers & Proc. 205, 208 (2002).

[27] See H.R. Rep. No. 105-796, at 72 (1998) (Conf. Rep.) (noting that the purpose of Section 512 was to “preserve[] strong incentives for service providers and copyright owners to cooperate to detect and deal with copyright infringements that take place in the digital networked environment” while “provid[ing] greater certainty to service providers concerning their legal exposure for infringements that may occur in the course of their activities.”); See also Irina Y. Dmitrieva, I Know It When I See It: Should Internet Providers Recognize Copyright Violation When They See it?, 16 Santa Clara Computer & High Tech. L.J. 233, 235-39 (2000) (discussing debates that emerged in academic circles over the problems faced by both rightsholders and online service providers under the pre-DMCA case law).

[28] 17 U.S.C. § 512.

[29] Id. § 512(a).

[30] Id. § 512(b).

[31] Id. § 512(c).

[32] Id. § 512(d).

[33] Intermediaries that qualify on the basis of caching, hosting, or linking must comply with the notice-and-takedown procedures prescribed in Section 512(c)(3). See also Io Grp., Inc. v. Veoh Networks, Inc., 586 F. Supp. 2d 1132, 1148 (N.D. Cal. 2008).

[34] See, e.g., 17 U.S.C. § 512(c)(1)(A) (providing safe harbor on the condition that the online service provider “(i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing [or] (ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent”). Courts have progressively made it more difficult for rightsholders to assert claims against OSPs on the basis that they had such knowledge. For example, in Capitol Records v. Vimeo, the 2nd U.S. Circuit Court of Appeals construed fair use as a barrier to employees of Vimeo being able to detect potentially illegitimate uses of copyrighted material, even where that employee knew the work was copyrighted. Capitol Records, LLC v. Vimeo, LLC, 826 F.3d 78, 96–97 (2d Cir. 2016), cert. denied, 137 S. Ct. 1374 (2017) (“Even assuming awareness that a user posting contains copyrighted music, the service provider’s employee cannot be expected to know how to distinguish, for example, between infringements and parodies that may qualify as fair use.”). This is particularly striking, because fair use is ostensibly an affirmative defense. See Kristian Stout, A Takedown of Common Sense: The Ninth Circuit Overturns the Supreme Court in a Transparent Effort to Gut the DMCA, Truth on the Market (Sep. 23, 2015), https://truthonthemarket.com/2015/09/23/a-takedown-of-common-sense-the-9th-circuit-overturns-the-supreme-court-in-a-transparent-effort-to-gut-the-dmca.

[35] Ernie Smith, How File Sharing Broke the Internet’s First Forum, Motherboard (Feb. 6, 2018), https://motherboard.vice.com/en_us/article/a34z85/how-file-sharing-broke-the-internets-first-forum-usenet.

[36] As noted above, Google did not exist until 1998 and the then-available search engines were far inferior. See Caleb Donaldson, Beyond the DMCA: How Google Leverages Notice and Takedown at Scale, 10 Landslide 2 (2017), available at https://www.americanbar.org/content/dam/aba/publications/landslide/2017-nov-dec/beyond-dmca.authcheckdam.pdf.

[37] See Howard A. Shelanski, The Speed Gap: Broadband Infrastructure and Electronic Commerce, 14 (2) Berkley Tech L. J. 721 (1999), available at https://lawcat.berkeley.edu/record/1116740/files/fulltext.pdf.

[38] See Tom Lamont, Napster: The Day the Music Was Set Free, The Guardian (Feb. 23, 2013), https://www.theguardian.com/music/2013/feb/24/napster-music-free-file-sharing.

[39] The Digital Millennium Copyright Act of 1998, S. Rep. No. 105-190, at 8 (1998).

[40] Id. at 2-3.

[41] Playboy Enterprises, Inc. v. Frena, 839 F. Supp. at 1554.

[42] Id. at 1554.

[43] Id.

[44] Id. at 1559.

[45] Id. at 1555-58. It is noteworthy that the court and litigants did not appear to bring up even the possibility of treating Frena as a secondarily liable party.

[46] Religious Tech. Ctr. v. Netcom On-Line Commc’n Servs., Inc., 907 F. Supp. at 1365–66.

[47] Id. at 1365-66.

[48] Id. at 1368–70.

[49] Id. at 1373.

[50] Id. at 1376-81.

[51] Id. at 1383.

[52] Irina Y. Dmitrieva, I Know It When I See It: Should Internet Providers Recognize Copyright Violation When They See It?, 16 Santa Clara Computer & High Tech. L.J. 233, 237 (2000).

[53] The Digital Millennium Copyright Act of 1998, S. Rep. 105-190, at 19.

[54] Id. at 20.

[55] Id. See also Section 512 Report, supra note 14, at 21 (“The legislative history of section 512 thus acknowledges two key components of the balance that Congress sought to achieve: the assurance that good faith actions to address internet piracy by OSPs would qualify for safe harbors, providing ‘greater certainty’ regarding their liability, and the preservation of ‘strong incentives for service providers and copyright owners to cooperate to detect and deal with copyright infringements that take place in the digital networked environment,’ providing creators with viable remedies against online infringement.”) available at https://www.copyright.gov/policy/section512/section-512-full-report.pdf; The Digital Millennium Copyright Act at 22: What Is It, Why Was it Enacted, and Where Are We Now: Hearing Before the Subcomm. on Intellectual Property of the S. Comm. on the Judiciary, 116th Cong. (2020) (statement of Senior Judge Edward J. Damich, at 2), available at https://www.judiciary.senate.gov/imo/media/doc/Damich%20Testimony.pdf.

[56] See, e.g., Erik Brynjolfsson, Avinash Collis, & Felix Eggers, Using Massive Online Choice Experiments to Measure Changes in Well-Being, 116 Proc. Nat’l. Acad. Sci. 7250 (April 2019) (finding that digital goods and services have “created large gains in well-being that are not reflected in conventional measures of GDP and productivity.”).

[57] See YouTube, Britannica.com (last visited Oct. 11, 2022), https://www.britannica.com/topic/YouTube.

[58] See YouTube for Press (last visited Oct. 11, 2022), https://blog.youtube/press.

[59] See Number of Daily Active Facebook Users Worldwide as of 4th Quarter 2021, Statista (last visited Oct. 11, 2022), https://www.statista.com/statistics/346167/facebook-global-dau.

[60] See Danny Sullivan, Google Now Handles at Least 2 Trillion Searches Per Year, Search Engine Land (May 24, 2016), https://searchengineland.com/google-now-handles-2-999-trillion-searches-per-year-250247.

[61] See, e.g., TuneCore (last visited Oct. 11, 2022), https://www.tunecore.com; see also CD Baby (last visited Oct. 11, 2022), https://cdbaby.com.

[62] Erik Brynjolfsson, et al., supra note 53.

[63] Yan Chen, Grace YoungJoo Jeon & Yong-Mi Kim, A Day Without a Search Engine: An Experimental Study of Online and Offline Searches, 17 Exp. Econ. 512 (2014).

[64] Kenneth Li, YouTube Anti-Piracy Software Policy Draws Fire, Reuters (Feb. 16, 2007),  https://www.reuters.com/article/us-youtube-media/youtube-anti-piracy-software-policy-draws-fire-idUSN1321663620070217, (noting that, in 2007, one copyright holder alone was demanding the removal of 100,000 copyright-protected videos from YouTube).

[65] See, e.g., Transparency Report 2021, Reddit.com, https://www.redditinc.com/policies/transparency-report-2021-2, (Reddit reports a 104% increase in takedown requests for 2021, amounting to nearly 1 million pieces of content); see also Notice and Takedown, Facebook Transparency Report, Meta, https://transparency.fb.com/data/intellectual-property/notice-and-takedown/facebook, (In the first half of 2021, Facebook reports taking down more than 3 million pieces of content for copyright violations in response to 738,000 notices).

[66] See, e.g., Brett Danaher, et al., The Effect of Piracy Website Blocking on Consumer Behavior (2019), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2612063, (discussing the effects of site-blocking on the well-known piracy site The Pirate Bay); see also Brett Danaher & Michael D. Smith, Gone in 60 Seconds: The Impact of the Megaupload Shutdown on Movie Sales (2013), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2229349.

[67] T. Randolph Beard, George S. Ford & Michael L. Stern, Safe Harbors and the Evolution of Music Retailing, Phoenix Center, Phoenix Center Policy Bulletin No. 41 (2017).

[68] Id. at 3.

[69] Id. at 20.

[70] See Paige Leskin, YouTube Is 15 Years Old. Here’s a Timeline of How YouTube Was Founded, Its Rise to Video Behemoth, and Its Biggest Controversies Along Way, Business Insider (May 30, 2020), https://www.businessinsider.com/history-of-youtube-in-photos-2015-10.

[71] See, e.g., Overview of Copyright Management Tools, YouTube Help (last visited Oct. 11, 2022), https://support.google.com/youtube/answer/9245819. “Monetization” is the process, typically, of permitting YouTube to run ads alongside the content in question and to share the proceeds of that ad sale in different ways (e.g., between YouTube, the video creator, and the copyright holder).

[72] House Section 512 Hearing, 113th Cong. 54 (statement of Maria Schneider, Grammy Award Winning Composer/Conductor/Producer, Member of the Board of Governors, New York Chapter of the Recording Academy); see also Directors Guild of America (“DGA”), Comments Submitted in Response to U.S. Copyright Office’s Dec. 31, 2015, Notice of Inquiry at 8 (Apr. 1, 2016) (“DGA Initial Comments”) (“[I]ndividual creators usually do . . . not have any access to, or in many cases awareness of . . . [content-filtering technologies].  That . . . needs to be rectified.”); FMC, Additional Comments Submitted in Response to U.S. Copyright Office’s Nov. 8, 2016, Notice of Inquiry at 6 (Feb. 21, 2017).

[73] Note, however, that the full picture of enforcement online remains relatively complicated. For example, acknowledging that search results can be a major vector for individuals locating pirated content, Google has begun working with the Motion Picture Association to delist sites in voluntary compliance with no-fault injunctions. See, e.g., Ernesto Van der Sar, MPA: Google’s Delisting of Thousands of Pirate Sites Works, TorrentFreak (Mar. 22, 2022), https://torrentfreak.com/mpa-googles-delisting-of-thousands-of-pirate-sites-works-220322. No-fault injunctions are discussed further, infra, at notes 175-185 and accompanying text.

[74] See section notes 100-118, infra, and accompanying text.

[75] See section notes 119-130, infra, and accompanying text.

[76] Jennifer M. Urban, et al., Notice and Takedown in Everyday Practice at 115, Berkley Public Law Research Paper No. 2755628 (Mar. 17, 2017), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2755628. See also, e.g., Amazon.com, Comments Submitted in Response to U.S. Copyright Office’s Dec. 31, 2015, Notice of Inquiry at 3 (Apr. 1, 2016) (“Amazon Initial Comments”) (“A key principle of both federal Internet policy and the DMCA is that online service providers should not be required to police the activities of their users or make difficult legal determinations about the nature of any particular content on the service provider’s system.  Lawful services like Amazon and other U.S. Internet companies could not have flourished without such a policy.  This principle is crucial to the growth of the Internet where today, a single service can facilitate real-time discourse among over three billion worldwide users.”); See The DMCA’s Notice-and-Takedown System Working in the 21st Century: Hearing Before the S. Comm. on the Judiciary Subcomm. on Intell. Prop., 116th Cong. (2020) (statement of Abigail A. Rives, Intell. Prop. Couns.).

[77] Urban, et al., id.

[78] Id. at 116-21.

[79] Id. at 116-18; See also Marc J. Randazza, Lenz v. Universal: A Call to Reform Section 512(f) of the DMCA and to Strengthen Fair Use, 18 JETLaw 743 (2020), available at https://scholarship.law.vanderbilt.edu/jetlaw/vol18/iss4/3; Rashmi Rangnath, ?U.S. Chamber of Commerce Uses the DMCA to Silence Critic?, ?Public Knowledge (Oct. 27, 2019), https://www.publicknowledge.org/blog/u-s-chamber-of-commerce-uses-the-dmca-to-silence-critic.

[80] See, e.g., Computer & Communications Industry Association (“CCIA”), Comments Submitted in Response to U.S. Copyright Office’s Dec. 31, 2015, Notice of Inquiry at 11 (Apr. 1, 2016) (“CCIA Initial Comments”); Microsoft Corporation, Comments Submitted in Response to U.S. Copyright Office’s Dec. 31, 2015, Notice of Inquiry at 9 (Mar. 31, 2016) (“Microsoft Initial Comments”) (“In 2012, Microsoft received notices targeting under 1.8 million links to alleged infringing works appearing in Bing’s search results.  In 2015, that number grew to over 82 million alleged links to infringing works appearing in Bing’s search results, with more than 99% of such notices sent using Microsoft’s online forms.  Processing this volume of notices without the benefit of automated tools and processes, using human review, would not be viable.”); Motion Picture Association of America, Inc. (“MPAA”), Comments Submitted in Response to U.S. Copyright Office’s Dec. 31, 2015, Notice of Inquiry at 18 (Apr. 1, 2016) (“MPAA Initial Comments”) (“For smaller owners, the phenomenon may well make the notice-and-takedown exercise cost prohibitive.  One independent film maker, for example, had to send 56,000 takedown notices regarding her film, and that volume of notices did not result in the film’s permanent removal.”)

[81] Section 512 Report, supra note 12, at 81.

[82] For just one album (“1989” by Taylor Swift), UMG had to hire full-time staff to issue more than 180,000 takedown requests between October 2014 and March 2016. Nonetheless, that album alone was illegally downloaded more than 1.4 million times. See Karen Gwee, How Artists Are Struggling for Control in an Age of Safe Harbors, Consequence (Jul. 8, 2016), https://consequenceofsound.net/2016/07/how-artists-are-struggling-for-control-in-an-age-of-safe-harbors.

[83] Now More than Ever, Creative Future (Jun. 10, 2020), https://creativefuture.org/now-more-than-ever (providing data from research firm MUSO).

[84] Id.

[85] Pirate Subscription Services Now a Billion-Dollar U.S. Industry, Joint Digital Citizens Alliance-NAGRA Report Finds, Digital Citizens Alliance, (Aug. 6, 2020), https://www.digitalcitizensalliance.org/news/press-releases-2020/pirate-subscription-services-now-a-billion-dollar-u.s.-industry-joint-digital-citizens-alliance-nagra-report-finds.

[86] David Blackburn, Jeffrey Eisenach, & David Harrison Jr., Impacts of Digital Video Piracy on the U.S. Economy, Nera Consulting (June 2019), available at https://www.theglobalipcenter.com/wp-content/uploads/2019/06/Digital-Video-Piracy.pdf.

[87] See, e.g., The Internet Association, Comments Submitted in Response to U.S. Copyright Office’s Dec. 31, 2015 Notice of Inquiry at 15 (Apr. 1, 2016) (“Internet Association Initial Comments”) (“[T]he problems of scale are true for Internet platform creators: startups and small businesses lack the sophisticated resources of larger, more established businesses in responding to takedown requests.”)

[88] Section 512 Report, supra note 12, at 32.

[89] Copyright Content Removal Requests Report, Microsoft (last visited Oct. 11, 2022), https://www.microsoft.com/en-us/corporate-responsibility/copyright-removal-requests-report.

[90] Id.

[91] Id.

[92] Intellectual Property 2021: Jul 1-Dec 31, Automattic (last visited Oct. 11, 2022), https://transparency.automattic.com/wordpress-dot-com/intellectual-property/intellectual-property-2021-jul-1-dec-31.

[93] Id.

[94] Over Thirty Thousand DMCA Notices Reveal an Organized Attempt to Abuse Copyright Law, Lumen (Apr. 22, 2022), https://www.lumendatabase.org/blog_entries/over-thirty-thousand-dmca-notices-reveal-an-organized-attempt-to-abuse-copyright-law.

[95] Urban, et al., supra note 76, at 2.

[96] Section 512 Report, supra note 14, at 84 (“Over the decades, the shift in the balance of the benefits and obligations for copyright owners and OSPs under section 512 has resulted in an increasing burden on rightsholders to adequately monitor and enforce their rights online, while providing enhanced protections for OSPs in circumstances beyond those originally anticipated by Congress”).

[97] Some rightsholders have claimed that the way DMCA safe harbors have been construed has led to a “culture of free” — expectations by users that content has near-zero cost. See U.S. Copyright Office, Docket No. 2015-7, Section 512 Study: Notice and Request for Public Comment (2015), available at https://downloads.regulations.gov/COLC-2015-0013-89806/attachment_1.pdf. According to these commentators, the end result of safe harbors in the presence of a “culture of free” is that the perceived value of licenses themselves goes down, resulting in a vicious circle of devaluation that affects their subsequent bargaining position with the platforms. This is, however, another way of restating the argument here. If the licensing value is diminished because existing safe harbors are improperly biased toward platform owners, then the devalued license reveals that the costs of piracy are born by rightsholders, instead of being allocated more equitably between platforms and rightsholders.

[98] See, e.g., Capitol Records, Ltd. Liab. Co. v. Vimeo, Ltd. Liab. Co., 826 F.3d 78 (2d Cir. 2016); Viacom Int’l, Inc. v. YouTube, Inc., 676 F.3d 19 (2d Cir. 2012); Mavrix Photographs, Ltd. Liab. Co. v. LiveJournal, Inc., 873 F.3d 1045 (9th Cir. 2017).

[99] See infra notes at 87-94 and accompanying text.

[100] See 17 U.S.C. § 512(c)–(d).

[101] In Grokster, the Supreme Court noted that secondary liability for “vicarious” infringement could attach when an OSP directly profits from an infringement, while also declining to exercise its right to stop or limit that infringement.  Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 930 (2005). While not an explicit command to proactively monitor infringement, the Supreme Court recognized some circumstances in which a service provider’s obligations are heightened with respect to deterring the presence of infringing material on their services.

[102] 17 U.S.C. § 512(m).

[103] Digital Millennium Copyright Act, H.R. Rep. No. 105-551, at 53 (1998) (Conf. Rep.).

[104] Viacom, 676 F.3d at 31.

[105] See, e.g., UMG Recordings, Inc. v. Shelter Capital Partners LLC, 718 F.3d 1006, 1021 (9th Cir. 2013) (noting that “actual knowledge” as being “specific” knowledge of “particular infringing activity”); BWP Media USA, Inc. v. Clarity Digital Grp., LLC, 820 F.3d 1175, 1182 (10th Cir. 2016) (“general knowledge of potential infringement could not count as ‘actual’ knowledge”); Sony Music Entm’t v. Cox Commc’ns, Inc., 426 F. Supp. 3d 217, 230–31 (E.D. Va. 2019) (adopting the 9th Circuit’s interpretation of actual knowledge of infringement).

[106] Viacom, 676 F.3d at 31.

[107] Shelter Capital, 718 F.3d at 1023.

[108] Perfect 10, Inc. v. CCBill LLC, 488 F.3d 1102, 1114 (9th Cir. 2007). This case may be a classic instance of bad facts making bad law, with the subject content—pornography—perhaps being viewed negatively by the reviewing court in such a way that users’ increasing the “salacious appeal” of the content was seen as expected behavior.

[109] Shelter Capital, 718 F.3d at 1023 (emphasis added).

[110] Viacom, 676 F.3d at 31.

[111] Id. The court felt that the two provisions did not collapse into each other because of the addition of the “objective” standard for red-flag knowledge, even though the set of circumstances in which the knowledge standard could apply would become virtually identical (“The red flag provision, because it incorporates an objective standard, is not swallowed up by the actual knowledge provision under our construction of the § 512(c) safe harbor. Both provisions do independent work, and both apply only to specific instances of infringement.”).

[112] Vimeo, 826 F.3d at 85-86.

[113] Id. at 86.

[114] Id. at 94.

[115] Id. at 93-94.

[116] Id. at 94.

[117] Id.

[118] Section 512 Report, supra note 14, at 123 (emphasis added).

[119] See WHOIS Database Under GDPR: Temporary Measures in Place, Eurodns (Jul. 17, 2018), https://www.eurodns.com/blog/whois-database-gdpr-compliance. The WHOIS information is now considered protected. A third party with a valid interest can still obtain this information, but the process has become more cumbersome and may require appeals through the ICANN organization.

[120] Jan Bernd Nordemann, The Functioning of the Internal Market for Digital Services: Responsibilities and Duties of Care of Providers of Digital Services, European Parliament IMCO Committee at 51 (2020), available at https://www.europarl.europa.eu/RegData/etudes/STUD/2020/648802/IPOL_STU(2020)648802_EN.pdf.

[121] Id. at 51-54.

[122] Id. at 54.

[123] 17 U.S.C. § 512 (h).

[124] See, e.g., In re Subpoena to Univ. of N.C. at Chapel Hill, 367 F. Supp. 2d 945, 955 (M.D.N.C. 2005); see also Recording Industry Association of America, Inc. v. Verizon Internet Services, Inc., 351 F.3d 1229, 1233 (D.C. Cir. 2003).

[125] See, e.g., Strike 3 Holdings, LLC v. Doe, 964 F.3d 1203, 1213 (D.C. Cir. 2020).

[126] Id.

[127] 17 U.S.C. 512(j)(1).

[128] 17 U.S.C. 512(j)(2).

[129] See, e.g., Wolk v. Kodak Imaging Network, Inc., No. 10 CIV. 4135 RWS, 2011 WL 940056, at *8 (S.D.N.Y. Mar. 17, 2011).

[130] Section 512 Report, supra note 14, at 171.

[131] Id. at 67.

[132] See e.g., Authors Guild, Inc., Comments Submitted in Response to U.S. Copyright Office’s Dec. 31, 2015, Notice of Inquiry at 27 (Apr. 1, 2016) (“As a result, there has been no impetus to conduct the sort of standards creation process to develop STMs that was contemplated by Congress . . . .”); Comput. & Commc’ns Indus. Ass’n (“CCIA”), Comments Submitted in Response to U.S. Copyright Office’s Dec. 31, 2015, Notice of Inquiry at 24 (Mar. 31, 2016) (“CCIA Initial Comments”) (“CCIA is unaware of any successful or emerging inter-industry technological effort that satisfies the requirements of Section 512(i)(2).”); see also SMART Copyright Act of 2022, S. 3880, 117th Congress (2022) [hereinafter “SMART Copyright Act”].

[133] How ContentID Works, YouTube Help (last visited Oct. 11, 2022), https://support.google.com/youtube/answer/2797370?hl=en.

[134] About Rights Manager, Meta for Business (last visited Oct. 11, 2022), https://www.facebook.com/business/help/2015218438745640?id=237023724106807.

[135] Technology, Audible Magic (last visited Oct. 11, 2022), https://www.audiblemagic.com/technology.

[136] Section 512 Report, supra note 14, at 67-68.

[137] Id. at 68

[138] Urban, et al. supra note 68, at 71.

[139] SMART Copyright Act, supra note 108.

[140] Doug Lichtman & Eric Posner, Holding Internet Service Providers Accountable, 14 Sup. Ct. Econ. Rev. 221, 223 (2006).

[141] Geoffrey A. Manne, Kristian Stout, & Ben Sperry, Who Moderates the Moderators?: A Law & Economics Approach to Holding Online Platforms Accountable Without Destroying the Internet at 38-39, International Center for Law & Economics, ICLE (2021), available at https://laweconcenter.org/resource/who-moderates-the-moderators-a-law-economics-approach-to-holding-online-platforms-accountable-without-destroying-the-internet.

[142] See id. at notes 25-100 and accompanying text.

[143] See T. Randolph Beard, et al., Fixing Safe Harbor: An Economic Analysis, Phoenix Center Policy Paper No. 52 (2017) at 23, available at https://www.phoenix-center.org/pcpp/PCPP52Final.pdf (stating that “the vetting of upload material prior to its availability for consumption on the UUC platform should be encouraged” and that “the protection of the safe harbors could be limited to UUC platforms with formal vetting policies and systems.”).

[144] See, e.g., Reiko Aoki & Aaron Schiff, Intellectual Property Clearinghouses: The Effects of Reduced Transaction Costs in Licensing, 22 Info. Econ. & Pol’y 218 (2010) (noting that third-party clearing houses are “two-sided platforms” that can improve intellectual-property licensing by centralizing information, reducing search friction, solving coordination and externality problems, simplifying contracting, and generally creating economic value by bringing upstream IP owners and downstream IP users together more efficiently); Bruce I. Carlin, Intermediaries and Trade Efficiency, at 6-7 (2005), https://ssrn.com/abstract=779485 (stating that intermediaries add value by allowing suppliers and consumers to trade objects of all quality levels, by alleviating the cost of obtaining a counterparty and decreasing search costs, and by decreasing the transaction cost); John E. Dubiansky, The Licensing Function of Patent Intermediaries, 15 Duke Law & Tech. Rev. 269, 269-70 (2017) (arguing that licensing to intermediaries can provide advantages over unilateral licensing because intermediaries can overcome search and valuation costs, avoid litigation costs, drive licensee demand by reducing uncertainty, and create network effects by increasing the number of prospective licensees accessed through the intermediary).

[145] See George R. Barker, The Value Gap in Music Markets in Canada and the Role of Copyright Law, at 8 (2018), https://ssrn.com/abstract=3320026 (stating that poor copyright law creates a “value gap” by enabling OSPs to commercially exploit copyrighted works at less than market-based rates, if they pay copyright holders anything at all); Daniel Lawrence, Addressing the Value Gap in the Age of Digital Music Streaming, 52 Vand. J. Transnat’l L. 511, 518-522 (2019), available at https://cdn.vanderbilt.edu/vu-wp0/wp-content/uploads/sites/78/2019/05/25124350/9.20Lawrence.pdf (explaining how flaws in the U.S. Copyright Act have caused a value gap); T. Randolph Beard et al., Safe Harbors and the Evolution of Music Retailing, Phoenix Center Policy Bulletin No. 41, at 20 (2017), available at https://www.phoenix-center.org/PolicyBulletin/PCPB41Final.pdf (estimating that the flawed safe harbors in the United States create a value gap of between $650 million and more than $1 billion per year for music, alone).

[146] See Beard et al., supra note 116 at 4-5, 8-10, 20, 21-22, 25-26 (2017) (stating that the United States’ flawed copyright safe harbors promote infringing platforms to the detriment of responsible ones, and recommending that the safe harbors be conditioned on platforms doing more to prevent piracy in the first place).

[147] See, e.g., Capitol Records, LLC v. Vimeo, LLC, 826 F.3d at 78; Viacom v. YouTube; Ventura Content, Ltd. v. Motherless, Inc., 885 F.3d 597, 610–11 (9th Cir. 2018); BWP Media USA, Inc. v. Clarity Digital Grp., LLC, 820 F.3d 1175, 1182 (10th Cir. 2016).

[148] 17 U.S.C. § 512(h)(1).

[149] Section 512 Report, supra note 14, at 6.

[150] Id. at 164.

[151] Verizon, 351 F.3d at 1234–36.

[152] See discussion, supra, at note 125 and accompanying text.

[153] Section 512 Report at 6, 166-67.

[154] But note that the Supreme Court has held that, in some cases, a lack of filtering is a relevant element of an infringement analysis. See Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 913 (2005) (noting that evidence suggested that Grokster and StreamCast were not “merely passive recipients of information about infringing use” but engaged in inducement, and observing that there was “no evidence that either company made an effort to filter copyrighted material from users’ downloads or otherwise impede the sharing of copyrighted files.”).

[155] See Beard et al., supra note 116, at 10 (observing that platforms are now capable of relatively effective filtering and suggesting that such filtering should be a “predicate for safe harbor,” with notice and takedown used as a “backstop.”).

[156] Principles For User Generated Content Services, UGCPrinciples.com (last visited Oct. 11, 2022), available at https://ugcprinciples.com.

[157] See supra notes 109 & 110.

[158] Greg Kumparak, How Dropbox Knows When You’re Sharing Copyrighted Stuff (Without Actually Looking At Your Stuff), TechCrunch (Mar. 30, 2014), https://techcrunch.com/2014/03/30/how-dropbox-knows-when-youre-sharing-copyrighted-stuff-without-actually-looking-at-your-stuff.

[159] Audible Magic (last visited Oct. 11, 2022), https://www.audiblemagic.com.

[160] See, e.g., Ventura Content v. Motherless, Inc., 885 F.3d 597, 616 (9th Cir. 2018) (indicating a site in the case employed hashing software to police the presence of illicit clips on its service).

[161] Section 512 Report, supra note 14, at n. 501.

[162] Urban, et al. supra note 68, at 124.

[163] See SMART Copyright Act, supra note 108 and accompanying text.

[164] All else equal, firms are more intimately familiar with how their own technology works and how their users interact with that technology than are regulators. As such, regulators are usually best positioned to propose general standards and leave technical implementation details up to actual market participants (so long as such implementation reasonably comports with the requirements of the standard).

[165] Re:Create Statement on Dangerous Technical Mandate and Filtering Bill, S. 3880, re:create (Mar. 18, 2022), https://www.recreatecoalition.org/press_release/recreate-statement-on-dangerous-technical-mandate-and-filtering-bill-s-3880.

[166] See Section 512 Report, supra note 14, at n. 237 (quoting comments of the Business Software Alliance that “BSA members invest significant resources into developing state of the art systems for processing high volumes of takedown notices.”); In re Section 512 Study: Notice and Request for Public Comment, Copyright Office Docket No. 2015-7, Comments of the Information Technology and Innovation Foundation, at 3, (Mar. 21, 2016), available at http://www2.itif.org/2016-section-512-comments.pdf (stating that “[t]he best way to minimize the cost of sending and responding to so many notices of infringement is to use automated techniques. In particular, online service providers can use automated filtering systems that check content as it is uploaded to stop a user from reposting infringing content.”).

[167] See, e.g., Ben Depoorter & Robert Kirk Walker, Copyright False Positives, 89 Notre Dame Law Rev. 319, 322 (2013)  (“Second, and even more problematic, are instances where transaction  costs and risk aversion inhibit wrongly accused infringers from opposing copyright infringement actions.”).

[168] Id.

[169] The Role of Private Agreements and Existing Technology in Curbing Online Piracy: Hearing Before the Subcomm. on Intell. Prop. of the S. Comm. on the Judiciary, 116th Cong. (2020) (written testimony of Katherine Oyama, at 9), available at https://www.judiciary.senate.gov/imo/media/doc/Oyama%20Testimony.pdf.

[170] Some users undoubtedly lack knowledge of their rights. Others will find the costs in time to outweigh the benefit of pressing a fair use claim. The relevant point here is that the reasons for failing to object are likely diverse. Thus, concerns rooted in a concept that all users who fail to object to a takedown are having their rights improperly ignored is potentially quite misleading.

[171] Admittedly, this is an extrapolation. But it is hard to imagine that a true author would fail to object to a takedown of her content. Similarly, a person who incorporates part of a work into his or her own work and feels entitled under fair use (e.g., a parody or a news commentary) has a relatively strong incentive to object. Whereas a user that incidentally includes a song in the background of a video has a much more ambiguous claim and is much less likely to object.

[172] Id.

[173] Id.; The Role of Private Agreements and Existing Technology in Curbing Online Piracy: Hearing Before the Subcomm. on Intell. Prop. of the S. Comm. on the Judiciary, 116th Cong. (2020) (written testimony of Noah Becker, at 6), available at https://www.judiciary.senate.gov/imo/media/doc/Becker%20Testimony.pdf. And to the extent the illegitimate disputes were inadvertent, the education requirement discussed above would play an ameliorating role.

[174] Stan J. Liebowitz, Economic Analysis of Safe Harbor Provisions, CISAC, at 10 (2018), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3143811.

[175] Id. at 11.

[176] Id. (Noting that he is selecting numbers on the low side of the potential range of takedowns and putbacks). In another analysis of a study purporting to demonstrate “high” error rates from false takedown notices, George Ford demonstrates that the actual incidence is less than 0.2% of requests. George S. Ford, Notice and Takedown in Everyday Practice: A Review, 3 (2017), available at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2963230.

[177] See, e.g., Submit a Copyright Counter Notification, YouTube (last viewed Apr. 7, 2022), https://support.google.com/youtube/answer/2807684.

[178] See DSM Directive, art. 17(4). To avoid liability for an instance of infringement on its service, an OSP must have “acted expeditiously, upon receiving a sufficiently substantiated notice from the rightholders, to disable access to, or to remove from their websites, the notified works or other subject matter, and made best efforts to prevent their future uploads.” (emphasis added)

[179] 17 U.S.C. § 512I(3)(A)(ii).

[180] 17 U.S.C. § 512(c)(3)(A)(iii).

[181] 17 U.S.C. § 512(c)(3)(B)(ii).

[182] 17 U.S.C. § 512(c)(3)(B)(i).

[183] See Perfect 10 v. CCBill, 488 F.3d 1102 (9th Cir. 2007); Viacom Int’l v. YouTube, Inc., 940 F.Supp. 2d 110, 115 (S.D.N.Y. 2013).

[184] H.R. Report No. 105–551, at 55 (emphasis added).

[185] See Copyright and the Internet in 2020—Reactions to the Copyright Office’s Report on the Efficacy of 17 U.S.C. § 512 After Two Decades: Hearing Before the H. Comm. on the Judiciary, 116th Cong. (Dec. 15, 2020) (statement of Terrica Carrington, at 8), available at https://copyrightalliance.org/wp-content/uploads/2020/11/Copyright-Alliance-512-DMCA-HJC-Testimony-for-September-30-FINAL.pdf (stating that “[i]ndividual creators face numerous other significant barriers to the effective use of the notice and takedown process, including the lack of uniformity and consistency from one OSP’s web form to the next, and the practice by some OSPs of imposing requirements beyond those prescribed under the law”).

[186] 17 U.S.C. § 512(i)(A).

[187] Section 512 Report, supra note 14, at 102 (citing H.R. Rep. No. 105-551, pt. 2, at 61 (1998); S. Rep. No. 105-190, at 52 (1998)).

[188] 885 F.3d 597 (9th Cir. 2018).

[189] Id. at 607-8.

[190] Id. at 616.

[191] Id. at 619.

[192] Capitol Records v. Escape Media Group, 12-CV-6646 (AJN) (S.D.N.Y. Mar. 25, 2015).

[193] UMG Recordings v. Grande Communications Networks, 384 F. Supp. 3d 743 (W.D. Tex. 2019).

[194] BMG Rights Management v. Cox Communications, No. 16-1972 (4th Cir. Feb. 1, 2018).

[195] 17 U.S.C. § 512(j).

[196] See Copyright Law in Foreign Jurisdictions—How Are Other Countries Handling Digital Piracy?: Hearing Before the Subcomm. on Intellectual Property of the S. Comm. on the Judiciary, 116th Cong. (Mar. 10, 2020) (statement of Justin Hughes, at 11 & n.65), available at https://www.judiciary.senate.gov/imo/media/doc/Hughes%20Testimony.pdf (“§512(j)(1)(B) makes transmission ISPs eligible for injunctive orders to deny access to subscribers engaged in infringing activity ‘by terminating the accounts of the subscriber or account holder that are specified in the order’ as well as eligible for orders ‘restraining the service provider from providing access, by taking reasonable steps specified in the order to block access, to a specific, identified, online location outside the United States.’ I believe that §512(j)(3) makes it clear that these orders were intended to be “innocent” third party injunctions available without suing the ISP.”).

[197] See Copyright Law in Foreign Jurisdictions—How Are Other Countries Handling Digital Piracy?: Hearing Before the Subcomm. on Intellectual Property of the S. Comm. on the Judiciary, 116th Cong. (Mar. 10, 2020) (testimony of Stanford K. McCoy, at 6), available at https://www.judiciary.senate.gov/imo/media/doc/McCoy%20Testimony.pdf.

[198] See Directive 2001/29 of the European Parliament and of the Council of 22 May 2001 on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society, art. 8(3), 2001 O.J. (L 167) (EC); Ellen Marja Wesselingh, Website Blocking: Evolution or Revolution? 10 Years of Copyright Enforcement by Private Third Parties, Rev. Internet Derecho Politica 38–39 (October 2014), https://idp.uoc.edu/articles/10.7238/idp.v0i19.2422/ galley/2482/download; Neil Turkewitz, Why the Canadian Supreme Court’s Equustek Decision Is a Good Thing for Freedom — Even on the Internet, Truth on the Market (Jul. 8, 2017), https://truthonthemarket.com/2017/07/08/why-the-canadian-supreme-courts-equustek-decision-is-a-good-thing-for-freedom-even-on-the-internet.

[199] See McCoy, supra note 175, at 3 (quoting Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonization of certain aspects of copyright and related rights in the information society, recital 59).

[200] Charles H. Rivkin, Working Toward a Safer, Stronger Internet, Motion Picture Association (Mar. 21, 2022), https://www.motionpictures.org/press/working-toward-a-safer-stronger-internet.

[201] Id.

[202] Id.

[203] See Brett Danaher et al., Website Blocking Revisited:  The Effect of the UK November 2014 Blocks on Consumer Behavior at 17 (Apr. 18, 2016) (unpublished article), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2766795; see also Rettighedsalliancen, Annual Report 2017, 5 (March 2018), available at https://rettighedsalliancen.dk/wpcontent/uploads/ 2018/08/ENGB_RettighedsAlliancen2018.pdf (noting the average 75% decrease in Danish IP traffic to piracy sites in the wake of DNS blocking orders).

[204] See McCoy, supra note 198, at 4 (“Our internal data shows us that site blocking is very effective at cutting traffic to pirate domains – meaning that an order applicable to the main access providers in a given country reduces traffic to a targeted domain by 70% on average and can be as high as 80-90% in some countries. That domain-specific impact is very clear and sustained over time. It becomes even more durable if the remedy specifies the underlying site, rather than just one or a few of the many domain names the site may use at any given time (this is the case in the UK, for example).”); Beard et al., supra note 116 (observing that site blocking has helped to curb digital piracy) (citing Brett Danaher, Michael D. Smith, and Raul Telang, Website Blocking Revisited: The Effect of the UK November 2014 Blocks on Consumer Behavior, Working Paper (Apr. 18, 2016), http://ssrn.com/abstract=2766795; Site Blocking Efficacy in Portugal: September 2015 to October 2016, Incopro (May 2017), available at http://www.incoproip.com/wp- content/uploads/2017/07/Site-Blocking-and-Piracy-Landscape-in-Portugal-FINAL.pdf; Site Blocking Efficacy Study: United Kingdom, Incopro (Nov. 13, 2014), available at http://auscreenassociation.film/uploads/reports/Incopro_Site_Blocking_Efficacy_Study-UK.pdf; Site Blocking in the World, Motion Picture Association (October 2015), available at http://www.mpa-i.org/wp-content/uploads/2016/02/Site-Blocking-October-2015.pdf; Nigel Cory, How Website Blocking is Curbing Digital Piracy Without “Breaking the Internet,” Information Technology & Innovation Foundation (August 2016), available at https://www.researchgate.net/publication/333292640_How_Website_Blocking_Is_Curbing_Digital_Piracy_Without_Breaking_the_Internet; T. Randolph Beard, et al., supra note 117.

[205] Brett Danaher, Michael D. Smith & Rahul Telang, Copyright Enforcement in Digital Age: Emprical Evidence and Policy Implications, 60 Comm’cns ACM 2, 11 (2017).

[206] A frequent reason for violating this provision appears to be simple error. For example, in Stevens v. CoreLogic, No. 16-56089 (9th Cir., Aug. 6, 2018) (Order and Amended Opinion), the defendants employed standard software libraries that did not adequately read and retain embedded metadata in photos, giving rise to a claim under Section 1202.

[207] See 17 U.S.C. § 1202(b) (making it unlawful for someone to “intentionally remove or alter any copyright management information” or to distribute or perform a copyrighted work “knowing that copyright management information has been removed or altered,” if that person also knows or has reasonable grounds to know that doing so “will induce, enable, facilitate, or conceal an infringement of any right under this title.”).

[208] Stevens v. CoreLogic, No. 16-56089 (9th Cir. 2018).

[209] Id. at 7.

[210] Id. at 9.

[211] Id. at 16-17.

[212] No. 18-cv-04479-TSH (N.D. Cal., Nov. 30, 2018).

[213] Id.

[214] Id.

Continue reading
Intellectual Property & Licensing

Antitrust Unchained: The EU’s Case Against Self-Preferencing

ICLE White Paper Examining whether self-preferencing should be considered a new standalone offense under European competition law.


Whether self-preferencing is inherently anticompetitive has emerged as perhaps the core question in competition policy for digital markets. Large online platforms who act as gatekeepers of their ecosystems and engage in dual-mode intermediation have been accused of taking advantage of these hybrid business models to grant preferential treatment to their own products and services. In Europe, courts and competition authorities have advanced new antitrust theories of harm that target such practices, as have various legislative initiatives around the world. In the aftermath of the European General Court’s decision in Google Shopping, however, it is important to weigh the risk that labeling self-preferencing as per se anticompetitive may merely allow antitrust enforcers to bypass the legal standards and evidentiary burdens typically required to prove anticompetitive behavior. This paper investigates whether and to what extent self-preferencing should be considered a new standalone offense under European competition law.

I. Introduction

In recent years, widespread concern has emerged that large digital platforms may misuse their market positions by giving preferential treatment to their own products and services. One fear is that, by engaging in self-preferencing, so-called “Big Tech” firms may be able not only to entrench their power in core markets, but also to extend it into associated markets.1F[1] Notably, by controlling ecosystems of integrated complementary products and services—which usually represent important gateways for business users to reach end users—dominant platforms may enjoy a strategic market status that allows them to exercise bottleneck power. As the argument goes, by acting as gatekeepers and regulators within their ecosystems, these platforms represent unavoidable trading partners and may pick winners and losers in the marketplace.

Moreover, digital platforms often serve a dual role, acting as both an intermediary and a trader operating on the platform. Hence, they may be tempted to influence results in their own favor (so-called “biased intermediation”). Indeed, once an intermediation platform is also active in complementors’ markets, it loses its status of neutrality and risks of discrimination against rivals may arise because of potential conflict of interests. Therefore, quoting a slogan delivered by U.S. Sen. Elizabeth Warren (D-Mass.) during the 2020 Democratic Party presidential primary campaign: “you get to be the umpire or you get to have a team in the game—but you don’t get to do both at the same time.”2F[2] European Commissioner for Competition Margrethe Vestager has used a similar sporting analogy—arguing that a platform cannot be both a player who competes against rivals in the downstream market and, at the same time, the upstream referee who determines the conditions of that competition.3F[3]

In short, self-preferencing may allow large digital platforms to adopt a leveraging strategy to pursue a twofold anticompetitive effect—that is, excluding or impeding rivals from competing with the platform (defensive leveraging) and extending their market power into associated markets (offensive leveraging). The latter scenario may take the form of envelopment, in which a platform attempts to both exclude rivals and facilitate its own entry into a target market by tying the core functionalities of its platform to the services offered in that market.4F[4]

The legislative initiatives that have been undertaken around the world posit that, to ensure a level playing field, digital gatekeepers must be prevented from engaging in various forms of self-preferencing. The European Union’s Digital Markets Act (DMA), for example, prohibits gatekeepers from: engaging in any form of self-preferencing in ranking services and products offered by the platform itself; using any non-publicly available data generated through activities by business users to compete with those users on the platform; preventing the removal of preinstalled applications; giving preferential access to hardware, operating-system, or software features to their own ancillary services; and refusing to grant “fair, reasonable, and non-discriminatory” (FRAND) access to app stores, search engines, and social-networking services.5F[5] The United Kingdom’s proposed regulatory regime for digital markets, which imagines the adoption of firm-specific codes of conduct for online platforms with “strategic market status,” includes self-preferencing as an example of exclusionary behavior that large digital platforms sometimes engage in when they exert control over an ecosystem.6F[6] The German Digitalization Act likewise includes a ban on platforms favoring their own offers when they mediate access to supply and sales markets, particularly in cases where they present their own offers in a more favorable manner, exclusively pre-install them on devices, or integrate them in any other way.7F[7]

The American Innovation and Choice Online Act (AICOA) would go even further. The bill would declare it unlawful to engage in conduct that would “unfairly preference the covered platform operator’s own products, services, or lines of business over those of another business user on the covered platform in a manner that would materially harm competition on the covered platform.”8F[8] Accordingly, for example, Google would be prevented from launching only Google Maps in response to a query for restaurants, or from placing Google services at the top of a search-results page unless it is accompanied by all possible rival services. Similarly, Amazon would be constrained from showcasing its branded products or favoring third-party products that use its fulfillment service, while Apple would be banned from supplying prominent app-search results for its own apps or even from preinstalling its own apps.9F[9]

These provisions and others like them would essentially treat digital platforms as common carriers, and therefore subject them to a neutrality regime and utilities-style regulation. In some markets, lawmakers have proposed even more stringent reforms designed to reduce digital platforms’ potential bottleneck and intermediation power, and to prevent conflicts of interest, such as requirements that intermediation and operating units be structurally separated, restrictions on lines of business, and imposed duties to deal.10F[10]

In addition to these legislative initiatives, self-preferencing has also emerged as a theory of harm before European courts and antitrust authorities. After all, much of the behavior prohibited explicitly in the DMA initially attracted attention as part of antitrust investigations. In particular, the ban against self-preferencing appears to have been informed by the European Commission’s decision in the Google Shopping case, in which Google was fined for having systematically demoted the results of competing comparison-shopping products on its search results pages, while having granted prominent placement to its own comparison-shopping service.11F[11] The fact that the decision came following a protracted seven-year investigation has been cited as evidence of the need for an ex ante prohibition of such practices, thus removing the annoying hurdles and burdens posed by standard antitrust analysis.

The European General Court recently upheld the Commission’s decision,12F[12] although it narrowed the original decision’s scope by focusing on the context in which the practice occurred. Rather than articulating a legal test for a new antitrust offense, the Court applied fact-specific criteria to examine the potential for discrimination by a search engine. This approach notably differs from defining self-preferencing as a standalone abuse, as has been supported by the European Commission and some national competition authorities (NCAs).13F[13]

The DMA, it should be noted, will not displace Europe antitrust rules;14F[14] rather, the law will be implemented alongside them. This heightens the potential for interpretative uncertainty regarding the degree to which self-preferencing will or ought to be treated, in practice, as an infringement of competition law. This paper therefore sets out to investigate whether, in the aftermath of the Google Shopping ruling, self-preferencing by digital platforms has peculiar features that justify its consideration as a new theory of harm.

Indeed, one of the primary challenges posed by treating self-preferencing as a competitive harm, from a competition-law perspective, is the lack of an obvious limiting principle.15F[15] Notably, recent European case law suggests that, rather than a standalone theory of harm, self-preferencing is a catch-all category that includes various practices already addressed by antitrust rules. The risk is that labeling self-preferencing as per se anticompetitive would merely provide antitrust authorities with the opportunity to elide the application of legal standards and evidentiary burdens traditionally required to prove anticompetitive behavior.

This paper calls for appreciation of the continuing wisdom of antitrust orthodoxy against the prevailing zeitgeist, arguing that many of the perceived limits of antitrust actually represent its virtues.16F[16] Indeed, the goal of competition law ought not be to satisfy urgent policy objectives. Rather, antitrust is about limiting principles, even where that means it is unpopular.17F[17]

The remainder of the paper is structured as follows. Section II provides an overview of the relevant traditional antitrust theories of harm and emerging case law to analyze whether and to what extent self-preferencing could be considered a new standalone offense in EU competition law. Section III investigates whether platform neutrality more generally belongs to the scope of competition law, according to its legal foundations and settled principles. Section IV concludes.

II. Self-Preferencing as a Standalone Offense

The debate over self-preferencing revolves around its novelty. Antitrust concerns are raised regarding the preferential treatment granted by a vertically integrated dominant firm to its own products and services because of the firm’s dual role as both host and competitor. This is of particular interest when such potential conflicts of interest may result in the leveraging of market power in adjacent lines of business in ways capable of producing exclusionary effects.

From this perspective, competitive risks associated with self-preferencing do not appear significantly different from those that emerge in any scenario of vertical integration. Vertical integration is, indeed, often procompetitive, specifically because it can be used to improve efficiency and reduce transaction costs. Furthermore, while there is some dispute as to whether a dominant firm is required to ensure a level playing field by treating rivals in the same way as it does its own businesses, competition law is already equipped with tools to forbid practices that pursue discriminatory leveraging strategies. The emergence of digital platforms does not, in and of itself, challenge antitrust enforcement. To investigate whether self-preferencing should be considered a new standalone offense, it is necessary to first analyze the scope of relevant antitrust prohibitions and to evaluate the peculiar features of self-preferencing, as illustrated by courts and antitrust authorities that have recently sanctioned this behavior.

A.   Traditional European Theories of Antitrust Harm

Although predatory pricing and loyalty rebates may sometimes lead a firm to favor its own downstream services, our attention will be devoted to those practices that appear closer to self-preferencing: namely, refusal to deal, tying, bundling and mixed bundling, margin squeezes, and discrimination. In particular, the last of these represents the most obviously relevant comparison, as the favorable treatment a platform grants to its own products and services entails discriminatory treatment of rivals.

Under European competition law’s non-discrimination provisions, preferential treatment may be investigated when a vertically integrated firm applies to rivals (primary line injury) or other partners (secondary line injury) more onerous conditions than it applies to its own downstream businesses.18F[18] The second-degree price discrimination is mainly addressed by Article 102(c) TFEU, which establishes the abusive character of applying dissimilar conditions to equivalent transactions with trading parties, thereby placing them at a competitive disadvantage. It has been noted that the provision may be considered a straightforward legal basis for a theory of self-preferencing, as shown by the case law that has predominantly applied the provision in settings where a vertically integrated dominant firm sought to advantage its downstream operations at the expense of rivals.19F[19]

In the aftermath of the MEO ruling and following the effects-based approach affirmed in Intel,20F[20] discrimination is not, in itself, problematic from the point of view of competition law.21F[21] As a consequence, not every disadvantage that affects some customers of a dominant firm will amount to an anticompetitive effect; competitive disadvantages cannot be presumed. Antitrust enforcers are instead required to consider all the circumstances of the relevant case, assessing whether there is a strategy to exclude from the downstream market a trading partner that is at least as efficient as its competitors.

Self-preferencing may also take the form of tying, bundling, or mixed bundling. In the first of these, a dominant player leverages its market position in the tying product, making the purchase of the latter subject to the acceptance of another (tied) product. Bundling refers to the way products are offered and priced. In the case of pure bundling, the products are only sold jointly in fixed proportions. In mixed bundling, the products are also made available separately, but the sum of prices when sold separately is higher than the bundled price.22F[22]

Any of these practices may lead to anticompetitive foreclosure in the tied market and, indirectly, in the tying market. The exclusion of as-efficient-competitors is key to triggering antitrust liability for competition foreclosure. Mixed bundling may be anticompetitive if the discount is so large that equally efficient competitors offering only some of the components cannot compete against the discounted bundle. With bundling, the greater the number of products on which the undertaking exerts market power, the stronger the likelihood of anticompetitive foreclosure. In the case of tying, if an insufficient number of customers would buy the tied product on its own to sustain competitors of the dominant undertaking in the tied market, the tying could lead to those customers facing higher prices. Finally, the risk of foreclosure in tying and bundling strategies is expected to be greater where the dominant player makes it last—e.g., through technical tying (i.e., designing a product in such a way that it only works properly with the tied product and not with alternatives offered by competitors).

As tying strategies can be implemented either through contractual terms or by technical means, antitrust authorities are increasingly prone to challenge platforms’ product-design decisions that favor their own products or services by limiting interoperability, thereby impeding compatibility with rival products or services.23F[23] In Microsoft, the European General Court argued that the ubiquity of a dominant player in the tying market is likely to foreclose competition in the tied market. The Court noted that the practice of bundling a specific piece of software to an operating system through pre-installation allows the tied product “to benefit from the ubiquity of that operating system … which cannot be counterbalanced by other methods of distributing media players.”24F[24]

Foreclosure also may arise when consumers obtain the tied product free of charge and are not prevented from obtaining rival services. In Google Android, the Commission fined Google for having engaged in a leveraging practice to preserve and strengthen its position in the search-engine market by requiring device manufacturers to preinstall Google Search and the Chrome browser as preconditions to license the Google Play app store. By locking down Android in the Google-controlled ecosystem, manufacturers wishing to pre-install Google apps were prevented from selling smart-mobile devices that run on versions of Android not approved by Google (so-called Android “forks”).25F[25] According to the Commission, pre-installation can create a status quo bias, which reduces the incentives for manufacturers to pre-install competing search and browser apps, as well as the incentives for users to download such apps. The therefore affects rivals’ ability to compete effectively with Google. Despite the fact that Android is mostly distributed as open-source software, the Commission rejected both of the justifications Google put forward: that leveraging practices reflected a legitimate appropriation strategy to preserve incentives to innovate in a regime of weak appropriability26F[26] and that fork restrictions fell under governance rules needed to protect multi-sided platforms from negative externalities (in this case, preventing software fragmentation and the potential diffusion of incompatible versions of the software).27F[27]

Taken to its extreme, self-preferencing can result in refusals to deal,28F[28] which explains why European policymakers have invoked the essential facilities doctrine to address such cases. The aim of the doctrine, which imposes on dominant firms a duty to deal with all who request access, is to prevent a firm with control over an essential asset from excluding rivals or from extending its monopoly into another stage of production. Because it requires sacrificing the dominant firm’s freedom of contract and right to property, however, it may weaken incentives to invest, innovate, and compete.

These refusal-to-deal infringements are, under European competition law, generally limited to “exceptional circumstances.” According to Magill, a refusal to deal may trigger an antitrust violation when: (i) access to the product or service is indispensable to a firm’s ability to do business in a market; (ii) the refusal is unjustified; (iii) the refusal excludes competition on a secondary market; and (iv), if intellectual property rights are involved, it prevents the emergence of a new product for which there is potential consumer demand.29F[29] The IMS30F[30] and Microsoft31F[31] judgments substantially dismantled the third and fourth requirements, respectively, by considering the secondary-market requirement met even if that market is just potential or hypothetical, and the new product requirement satisfied even when access to the facility is necessary for rivals to develop follow-on innovation (i.e., improved products with added value).

Nonetheless, pursuant to the interpretation provided in Bronner, the requirement that a requested facility be indispensable remains in place and represents the last bulwark against the dangers of uncontrolled application of the doctrine.32F[32] Indeed, access to an input is considered indispensable if there are no technical, legal, or even economic obstacles that would render it impossible (or even unreasonably difficult) to duplicate. To demonstrate the lack of realistic potential alternatives, a requesting firm must establish that it is not economically viable to create the resource on a scale comparable to that of the firm controlling the existing product or service.

Against this background, the recent Slovak Telekom judgment introduced a relevant novel claim that the conditions laid down in Bronner do not apply where the dominant undertaking does give access to its infrastructure but makes that access subject to unfair conditions.33F[33] In addition, the Court of Justice (CJEU) implied that enforcers do not have to prove indispensability when access to a facility has been granted as a result of a regulatory obligation.34F[34] The implications are particularly relevant to digital markets, as the regulatory framework established by the DMA requiring access to platforms designated as gatekeepers would exempt antitrust authorities from having to demonstrate the indispensability of those facilities.

Finally, self-preferencing may be construed as a “margin squeeze,” which EU competition law defines as a standalone abuse that undermines the condition of equality of opportunity between economic operators. The European Commission initially equated this practice to a constructive refusal to deal, noting that, instead of refusing to supply, a dominant undertaking charges a price for a product on the upstream market that would not allow even an equally efficient competitor to trade profitably in the downstream market on a lasting basis.35F[35] The Commission therefore introduced the so-called Telefonica exceptions to categorize a specific class of cases where Bronner’s requirements would not apply. These exceptions hold that an obligation to supply cannot have negative effects on the input owner’s and/or other operators’ incentives to invest and innovate upstream.36F[36]  The CJEU has, however, gradually moved toward rejecting the concept of an implicit refusal to grant access, holding that margin squeezes should be treated as a separate theory of harm, thereby introducing an even broader exception to Bronner.

Notably, while an essential facility was involved in Deutsche Telekom I, the owner of the facility had a regulatory obligation to share and rivals’ margins were negative.37F[37] Teliasonera found a margin squeeze in a situation where the input of the dominant undertaking was not indispensable, there was no regulatory obligation to supply, and rival firms’ margins were positive, but insufficient, as the rivals were forced to operate at artificially reduced levels of profitability.38F[38] Telefonica39F[39] and Slovak Telekom40F[40] upheld the approach of considering margin squeezes as an independent form of abuse to which the criteria established in Bronner are not applicable.

B.   European Case Law on Self-Preferencing

Against this background, doubts about the potential to identify self-preferencing as a standalone abuse under EU law emerge from the court analysis and antitrust decisions that have been issued to date sanctioning dominant platforms for preferential treatment granted of own products and services. Indeed, recent European case law would appear to question whether self-preferencing is sufficiently novel to constitute a standalone theory of harm, given that it has been readily addressed under existing theories of harm. With the exceptions of the Amsterdam Court of Appeal41F[41] and the Italian Competition Authority,42F[42] courts generally do not even use the term “self-preferencing,” opting instead to label the conduct “favoring.”

1.  UK Streetmap decision and European Commission Google Shopping decision

The birth of self-preferencing as a standalone theory of harm is usually associated with the European Commission’s investigation of Google for having positioned and displayed, in its general search-results pages, its own comparison-shopping service more favorably than rival comparison-shopping services.43F[43]

However, a similar issue was addressed a few months earlier by the High Court of England and Wales in the dispute between Streetmap and Google, which involved the interaction of competition between online search engines and online maps.44F[44] Indeed, Streetmap contended that Google abused its dominant position by prominently and preferentially displaying its own related online-map product. Streetmap contended that, by visually displaying a clickable image from Google Maps (and no other map) in response to certain geographic queries (Maps OneBox) at or near the very top of its search-engine results page (SERP), and consequently relegating Streetmap to a blue link lower down the page, Google abused its dominant position in the market for online search and online search advertising.

Given the evident similarity with the Google Shopping case, Justice Roth’s analysis is worthy of examination. While Streetmap framed Google’s practice in terms of bundling or tying, and referred extensively to the European Microsoft decision, the U.K. Court held that the complaint should have been appropriately characterized as an allegation of discrimination.45F[45] The user who sees the Maps OneBox is, indeed, under no obligation to click on it or to use Google Maps; she remains free to use any other online-mapping provider without penalty. In contrast to Microsoft, where obtaining a competing streaming-media player by downloading from the Internet was regarded by a significant number of users as more complicated than using the pre-installed Microsoft product, the Google SERP includes clickable links to other relevant online maps and users experience no difficulty in clicking on those blue links.

To establish whether Google’s conduct constituted anticompetitive foreclosure, the Court concluded that it was necessary to prove that the effects of that conduct appreciably affected competition, which cannot simply be assumed. Indeed, the Google’s introduction a Maps OneBox containing a thumbnail map was intended to improve the quality of the SERP, and hence must be evaluated as a technical efficiency46F[46]: “The unusual and challenging feature of this case is that conduct which was pro-competitive in the market in which the undertaking is dominant is alleged to be abusive on the grounds of an alleged anti-competitive effect in a distinct market in which it is not dominant.”47F[47] For this reason, evaluating alternative ways that Google might have made this procompetitive improvement without allegedly distorting competition in online maps played a significant role in the Court’s analysis.

If anticompetitive effects are proven, then the issue of objective justification must be considered. This requires a proportionality assessment, which is a matter of fact and degree. Hence, the question of alternatives cannot be considered only with respect to competitive impact: “Where the efficiency is a technical improvement, proportionality does not require adoption of an alternative that is much less efficient in terms of greatly increased cost, or which imposes an unreasonable burden.”48F[48]

Following this line of reasoning, Justice Roth found that the introduction of the Maps OneBox with no shortcut hyperlinks to Streetmap (and other online maps) did not, in itself, have an appreciable effect in steering customers away from Streetmap; it therefore was not reasonably likely to give rise to anticompetitive foreclosure.49F[49] Moreover, even if it was likely to have such an effect, Google’s conduct was objectively justified because the way that it implemented the technical efficiency—i.e., presenting a thumbnail map on the SERP—was not disproportionate.50F[50]

The European Commission reached a different conclusion in Google Shopping. There, the Commission found that, by promoting its own comparison-shopping service in its search results and demoting those of competitors, Google engaged in a strategy of leveraging the dominance of its flagship product (i.e., the search engine) in the adjacent market for comparison-shopping services.

According to the Commission’s findings, Google’s strategy rested on two related practices: ensuring prominent placement for its own comparison-shopping service and demoting rival comparison-shopping services in its search results. Notably, while competing comparison-shopping services could appear only as generic search results—potentially subject to demotion in search listings by Google’s algorithms—Google’s own comparison-shopping service was prominently positioned, displayed in rich format, and free from the risk of demotion to the second page of search results.51F[51]

The Commission concluded that the conduct fell outside the scope of competition on the merits, could extend Google’s dominant position in the national markets for general search services to the national markets for comparison-shopping services (offensive leveraging), would tend to protect Google’s dominance in the former (defensive leveraging).

Rather than recognizing that it was deploying a novel theory of harm, the Commission argued that Google’s conduct belonged to the well-known category of leveraging. Accordingly, there was no need to look for a new legal test, since “it is not novel to find that conduct consisting in the use of a dominant position on one market to extend that dominant position to one or more adjacent markets can constitute an abuse.”52F[52] The Commission therefore found that self-preferencing constitutes a “well-established, independent, form of abuse.”53F[53]

To support its line of reasoning, the Commission invoked disparate case law, including judgments involving either specific theories of harm (e.g., Tetra Pack,54F[54] Irish Sugar,55F[55] and Microsoft,56F[56] with regards to tying and predatory pricing, loyalty rebates, and refusal to deal, respectively) or that are outdated (e.g., Telemarketing57F[57]).58F[58] The Commission’s rationale in offering this selection of decisions is unclear. References to one case in which the essential facilities doctrine was applied (i.e., Microsoft) and to another ruling that has since been replaced by the elaboration of the essential facilities doctrine (i.e., Telemarketing) are even more surprising.

The Commission ultimately dismissed Google’s claim that its conduct could be considered abusive only if Bronner’s criteria were fulfilled: namely, if access to Google’s general search results pages were indispensable to being able to compete.59F[59] According to the Commission, the decision merely required Google to cease the conduct. Hence, the Bronner criteria were “irrelevant in a situation, such as that of the present case, where bringing to an end the infringement does not involve imposing a duty on the dominant undertaking to transfer an asset or enter into agreements with persons with whom it has not chosen to contract.”60F[60]

The case spurred debate over the legal test applied to require Google to grant equal treatment to rival comparison-shopping services and its own service. Among the questions raised by the case are whether the conduct fell more within exclusionary or discriminatory abuses and, if it was the former, whether tying or the essential facilities doctrine was the proper framework to assess such self-preferencing abuse.61F[61] For instance, the experts appointed by the Commission to provide suggestions for the design of a competition policy for digital markets considered self-preferencing a specific technique of leveraging, which is not abusive per se, but subject to an effects test.62F[62] Furthermore, quoting Microsoft, they argued that, according to well-established case law, the owner of an essential facility must not engage in self-preferencing. Nonetheless, they believed that self-preferencing by a vertically integrated dominant digital platform can be abusive, not only under the preconditions set out by the essential facilities doctrine, but also wherever it is likely to result in leveraging market power and is not justified by a pro-competitive rationale.

2.   Amsterdam Court of Appeal ruling in Funda

In May 2020, the Amsterdam Court of Appeal handed down a decision in litigation between VBO Makelaars and NVM, two associations of real-estate agents, brokers, and appraisers.63F[63] NVM owns Funda, the largest online real-estate platform in the Netherlands and which, according to VBO, granted NVM agents more prominent positions in the ranking of properties. Funda also applied higher tariffs to and granted only limited website functionality to VBO agents, who also did not have access to the underlying Funda database. VBO’s complaint charged NVM with anticompetitive discrimination.

Upholding the decision of the district court, the Court of Appeal found that Funda did not abuse its dominant position in favoring the listings of NVM members over those of rival agents. Assessing self-preferencing as discriminatory conduct under Article 102(c) TFEU, the Court cited MEO, arguing that VBO’s complaint failed to demonstrate that the discrimination distorted the company’s competitive position in ways that led to a competitive disadvantage on the downstream market for real-estate services.

In particular, the Court noted that several factors play relevant roles in consumers’ home-purchase decisions and that it is implausible that a buyer would automatically assume that the listing placed highest on a website would be the one that best meets their demands. To the contrary, the Court concluded that the market for homes differs significantly from markets for other consumer products. For example, buyers generally conduct an intensive search over a long period of time to consider all relevant offers. Therefore, the Court found, a lower website ranking would be of minor importance and would not necessarily lead to a competitive disadvantage.

Accordingly, the Court considered comparisons with Google Shopping to be unhelpful.64F[64] In assessing NVM’s preferential treatment in accordance with the principles the CJEU elaborated in MEO, however, the Dutch court did frame self-preferencing as a discriminatory abuse, thus anticipating the approach that the European General Court would ultimately endorse in Google Shopping.

3.   French Competition Authority Apple ATT and Google AdTech decisions

In June 2021, the French Competition Authority (AdlC) followed the European Commission’s lead in investigating practices implemented by Google in the online-advertising sector.65F[65]

Responding to referrals from news publishers who monetize their websites and mobile apps through advertising, the AdlC found that Google engaged in abusive practices to favor its own advertising intermediation technologies, granting preferential treatment to its proprietary technologies offered under the Google Ad Manager brand. Notably, in the Authority’s view, Google used its dominant publisher ad server (DoubleClick for Publishers, or DFP) both to favor its own programmatic advertising sales platform (AdX) and, separately, used AdX to favor DFP in the market for supply-side ad-intermediation platforms (SSPs). Regarding the first practice, the preferential treatment consisted of informing AdX of the prices offered by competing SSPs, thus allowing it to optimize the bidding process by varying the commissions received on impressions sold according to the intensity of competition. Regarding the second practice, Google imposed technical and contractual limitations on the use of the AdX platform through a third-party ad server. As a result, the modalities of interaction offered to third-party ad-server clients were inferior to the modalities of interaction between DFP and AdX, which penalized both third-party SSPs and publisher clients.

Similar concerns about the impact of Google’s conduct in ad-tech services have also been raised by the Australian Competition and Consumer Commission (ACCC). The ACCC concluded that Google’s vertical integration and dominance across the ad-tech supply chain and related services have allowed the company to engage in leveraging and self-preferencing conduct and that this, in turn, has likely interfered with the competitive process.66F[66]

According to the AdlC, the evidence showed that DFP’s favorable treatment of AdX had a foreclosure effect on competition among platforms selling ad space, significantly reducing the attractiveness of rival SSPs. In addition, according to the Authority, DFP’s preferential treatment strengthened Google’s dominant position, impairing the competitiveness of rival ad-server providers, and limiting their ability to compete on the merits. Therefore, as regards the latter, limitations on interoperability were deemed a practice that cannot be considered competition on the merits, as it would tend to impose on rivals a competitive disadvantage by applying to them less favorable technical conditions.67F[67]

By and large, the French decision did not provide insights on the theory of harm or type of abuse that this form of discrimination would constitute. Like the European Commission, the AdlC did not refer to self-preferencing explicitly, instead describing Google’s conduct as favoring. With regards to Google’s leveraging strategy, the AdlC cited Google Shopping and quoted the very same case law the Commission mentioned in that decision.68F[68] The only significant addition made by the Authority was a reference to Slovak Telekom, a margin-squeeze case that, as already mentioned, brought about a remarkable change in confining the application of Bronner’s indispensability condition to “pure” refusals to deal.69F[69]

However, the AdlC is also currently investigating Apple’s privacy policy, where self-preferencing is mentioned explicitly and appears to be framed differently.70F[70] Notably, in March 2021, the French Authority rejected the request for interim measures against Apple’s adoption of the App Tracking Transparency (ATT) framework for applications on iOS 14, which create new consent and notification requirements for app publishers. The ATT solicitation was considered part of Apple’s longstanding strategy to protect iOS users’ privacy and its implementation was not expected to impose unfair trading conditions, such as excessive or disproportionate restrictions on the activities of app developers. The AdlC nonetheless advised that, as part of its investigation into the merits of the case, it would examine how the user-consent collection processes differ between Apple’s own advertising services and third-party advertising services. Differences in those processes might result in a “form of discrimination (or self-preferencing)” if Apple applied, without justification, more binding rules on third-party operators than those it applies to itself for similar operations.71F[71]

The growing suspicion of self-preferencing has likewise prompted the German Competition Authority to initiate its own proceeding on Apple’s ATT policy,72F[72] while the U.K. Competition and Markets Authority (CMA) raised similar concerns in its market study on mobile ecosystems.73F[73]

4.   General Court ruling in Google Shopping

Given this background, the European General Court’s judgment in Google Shopping was much awaited.74F[74] For those who were looking for legal certainty from the judgment, however, those expectations have been not completely met.

What was new in the ruling was its broad interpretation of the general principle of equal treatment, which the Court affirmed obligates vertically integrated platforms to refrain from favoring their own services over rivals.75F[75] While this approach was in line with the Commission’s expansive reading of the special responsibility of dominant firms, however, the ruling framed self-preferencing as a discriminatory abuse.76F[76] Notably, the Court highlighted that the various judgments the Commission cited in its original ruling do not support the conclusion that any use of a dominant position on one market to extend that position to one or more adjacent markets constitutes a “well-established” form of abuse.77F[77] After all, “leveraging” is a generic term covering several practices that are potentially abusive, such as tied sales, margin squeezes, and loyalty rebates.78F[78]

The three rulings the Court cited involve, instead, practices found to be discriminatory abuses specifically because they place third parties at a competitive disadvantage. Two of three involve discriminatory conditions applied by public undertakings operating a commercial port79F[79] and an airport.80F[80] This may support a link with recent legislative initiatives categorizing digital platforms as common carriers and thus subject to the neutrality regime of public utilities-style regulation. Nonetheless, the Court clarified that prohibiting self-preferencing to enforce the policy goal of neutrality is appropriate only when a competitive harm is demonstrated. Indeed, rather than deeming self-preferencing to be per se abusive, the Court moved to its potential anticompetitive effects. This is in line with the effects-based approach affirmed in MEO,81F[81] as well as in other judgments that, although they involve different abusive conduct, entail similar discriminatory elements.82F[82] The Court, however, surprisingly did not even mention MEO.

The Court’s ruling focused on potential exclusionary effects associated with specific leveraging strategies, reflected in the Commission’s original finding of abuse on the basis of certain relevant criteria.83F[83] The Commission had noted that, due to network effects, the traffic that Google’s search engine generates represents a critical asset; that users are significantly influenced by favoring, as they typically concentrate on the first few search results and tend to assume that the most visible results are the most relevant; and that traffic directed from Google’s search-results pages accounts for a large portion of traffic to competing comparison-shopping services, which cannot be effectively replaced by other sources.84F[84]

The Court outlined four criteria that differentiated Google’s self-preferencing from competition on the merits, therefore warranting a finding of antitrust liability.

First, the Court highlighted the “universal vocation” and openness of a search engine as features of its core mission.85F[85] These features distinguish a search engine, which designed to index results that might contain any possible content, from other services referenced in the case law, which consist of tangible or intangible assets (press-distribution systems or intellectual property rights, respectively) whose value depends on a proprietor’s ability to retain their exclusive use.86F[86]

While not explicitly mentioned, the reference is clearly to the essential facilities doctrine case law. Unlike these services, “the rationale and value of a general search engine lie in its capacity to be open” to results from external sources and to display multiple and diverse sources on its general results pages.87F[87] Moreover, the legal obligation of equal treatment that ensues from net-neutrality regulations88F[88] for Internet access providers on the upstream market cannot be disregarded when analyzing the practices of an operator like Google on the downstream market.89F[89]

Second, because Google holds a “superdominant” (or “ultra-dominant”) position on the market for general search services and acts as a “gateway” to the Internet, it is under a stronger obligation not to allow its behavior to impair genuine, undistorted competition on the related market for specialized comparison-shopping search services.90F[90]

Third, the market for general search services is characterized by very high barriers to entry.91F[91]

Fourth, in light of prior considerations (i.e., the mission of a search engine, Google’s dominance, and the presence of very high barriers to entry), the Court found that Google’s conduct is “abnormal.”92F[92] Indeed, for a search engine to limit the scope of its results to its own services entails an element of risk and is “not necessarily rational.” This is especially the case in a situation where, because of barriers to entry and the search engine’s own dominance, it is significantly unlikely that there would be market entry within a sufficiently short period of time in response to the limitations placed on Internet users’ choices.93F[93]

In this scenario, in the Court’s view, Google’s promotion of its own specialized results over third-party results contradicts the basic economic model of a search engine and hence involves a certain form of abnormality.94F[94] The suspicion is strengthened by Google’s “change of conduct.”95F[95] While it initially provided general search services and displayed all the results of specialized search services in the same way and according to the same criteria, once the firm had entered the market for specialized comparison-shopping search services—and after having experienced the failure of its dedicated comparison-shopping website (Froogle)—Google changed its practices and comparison-shopping services were no longer all treated equally.96F[96]

These four criteria suggest that the Court saw Google’s search engine as an essential facility. The Court, indeed, noted that, by envisaging equal treatment for any comparison-shopping services on Google’s general results pages, the Commission’s decision was seeking to provide competitors with access to Google’s general results pages. This was presented as particularly important to competing comparison-shopping services and something that was not effectively replaceable, as it accounted for such a large proportion of traffic to their websites.97F[97] Moreover, the Court acknowledged that the Commission considered Google’s traffic to be indispensable to competing comparison-shopping services.98F[98] As a consequence, the analysis would have required an assessment of preferential treatment pursuant to the conditions set out in Bronne, as Google itself had requested, rather than relying on the case law applicable to abusive leveraging, as the Commission did in its decision.

But despite characterized the features of Google’s general results page as “akin to those of an essential facility,”99F[99] the Court upheld the Commission’s decision not to apply Bronner’s indispensability requirement. In doing so, it drew a line between express refusals to supply and exclusionary practices that do not lie “principally” in a refusal, as such.100F[100] Indeed, “the present case is not concerned merely with a unilateral refusal by Google to supply a service to competing undertakings that is necessary in order to compete on a neighboring market, which would be contrary to Article 102 TFEU and would therefore justify the application of the ‘essential facilities’ doctrine.”101F[101]

Therefore, the Court shared the Commission’s viewpoint that Google’s self-preferencing was a standalone form of leveraging abuse, involving positive acts of discrimination in the treatment of the search results for comparison-shopping services.102F[102]

The Court’s ruling has been generally welcomed for two reasons. By affirming self-preferencing as an independent abuse, the judgment provides legal support to the policy goal of imposing a neutrality regime over large digital platforms, which has informed all the regulatory interventions promoted in different jurisdictions. At the same time, the Court advances a clearer legal qualification of the conduct in question. Indeed, while the Commission’s approach appeared unprecedented—because it revolved around the notion of favoring as a specific form of leveraging—the Court opted for the more defined legal framework of discrimination. The outcome should help to restrain the scope of application for self-preferencing prohibitions in comparison to other traditional practices that, although belonging to the general category of leveraging and including elements of discrimination, reflect specific theories of harm and are assessed according to their respective legal tests.103F[103] By and large, the Court confirms that there is no well-established case law that would forbid any extension of a dominant position in adjacent markets, in contrast with the Commission’s stance.

Nonetheless, the ruling raises new doubts. Notably, the definition of the conduct that would be covered remains unclear. While adopting the general principle of equal treatment as a legal basis to prohibit self-preferencing may allow intrusions into platforms’ design choices,104F[104] the listed criteria appear to define a narrow framework, ultimately calling into question the broad application of self-preferencing as a standalone abuse.

The Court underscored the relevance of the “particular context” in which favoring occurred.105F[105] Namely, the emphasis was on the role played by search engines on the Internet, including their “universal vocation” and “open” business models. This is strengthened by analogies to net neutrality, the characteristics “akin to those of an essential facility,” and the “superdominant position” that made Google a “gateway” to the Internet. Furthermore, the peculiar features of search engines (notably, their openness) are also deemed relevant in assessing the “abnormality” of Google’s behavior—which, in the Court’s evaluation, is indeed at odds with the basic economic model of its search engine. The legal framework is completed with the detection of opportunistic behavior by Google, which changed its strategy once it entered the adjacent market of comparison-shopping services.

It is left far from clear whether Google Shopping is even sanctioning the favoring practice as such. Indeed, the Court describes the anticompetitive strategy in question as formed by a combination of two practices—namely the promotion of Google’s own services and the demotion of its rivals’ services. Therefore, the conduct is not necessarily abusive even if it consists “solely in the special display and positioning” of the platform’s own products and services.106F[106] The practice has instead been judged illegal because it included the relegation of competing services in Google’s general results pages by means of adjustment algorithms. That, in conjunction with Google’s promotion of its own results, there was a simultaneous demotion of results from competing comparison services is considered a “constituent element” of the conduct and moreover plays a “major role” in the exclusionary effect identified.107F[107]

In summary, rather than articulating a legal test for a new antitrust offense, the criteria pointed out in the judgment for considering the preferential treatment abusive appear extremely fact-sensitive: both Google-specific and search engine-specific. Therefore, it is difficult to see how, according to these criteria, a self-preferencing prohibition may be applied to different forms of preferential treatment, digital services, and business models.108F[108]

5.   Italian Competition Authority Amazon Logistics decision

A few weeks after the General Court’s ruling, the Italian Competition Authority (AGCM) handed down a decision that significantly departed from the legal framework elaborated in Google Shopping, thus confirming that the precise contours of self-preferencing abuses under Article 102 TFEU remained anything but clear.109F[109]

In late November 2021, the AGCM issued a mammoth fine against Amazon for granting preferential treatment to third-party sellers who use the company’s own logistics and delivery services (i.e., Fulfilment by Amazon, or FBA). Amazon was accused of having leveraged its dominance in the market for intermediation services on marketplaces to favor the adoption of its own FBA by sellers active on Amazon.it, as well as to strengthen its own dominant position. Under AGCM’s view, this strategy ultimately harmed both competing logistics operators, by putting them at a competitive disadvantage, and competing marketplaces, by creating incentives for sellers to single-home.

Indeed, although third-party sellers are free to manage the logistics associated with their operations on the platform themselves or outsource them to an independent operator (Merchant Fulfilment Network, or MFN), Amazon was deemed to be artificially pushing them to use its own logistics service, thus deterring them from multi-homing.110F[110] Notably, the Authority found that Amazon “tied” the use of FBA to access to a set of exclusive benefits essential for gaining visibility and increasing sales on the marketplace.111F[111]

Among those benefits, the most relevant is the Prime label, which allows sellers to participate in special events promoted by Amazon (e.g., Black Friday, Cyber Monday, Prime Day) and benefit from fast and free shipping. Furthermore, Prime increases the likelihood of sellers’ offers being selected as featured offers displayed in the Buy Box. This is of the utmost importance to sellers, as the Buy Box prominently displays just a single seller’s offer for a given product on Amazon’s marketplaces and generates the vast majority of all sales for that product.

Quoting from several of Amazon CEO Jeff Bezos’ letters to shareholders, the AGCM noted the company believes FBA is the “glue” that links Marketplace and Prime112F[112]: “Thanks to FBA, Marketplace and Prime are no longer two things … Their economics and customer experience are now happily and deeply intertwined.”113F[113] Furthermore, FBA is a “game changer” for sellers because it makes their items eligible for Prime benefits, which drives their sales.114F[114] Pursuant to its leveraging strategy, Amazon prevented third-party sellers from associating the Prime label with offers not managed by FBA. In addition, the AGCM noted that third-party sellers using FBA are not subject to the performance-evaluation metrics that Amazon applies in monitoring non-FBA sellers’ performance. Such metrics can ultimately lead to the suspension of non-compliant sellers’ accounts on Amazon.it. All these benefits derived from the use of FBA were considered, to various extents, to be “crucial” to success on the marketplace.115F[115]

It is worth noting that the European Commission has also launched an investigation of Amazon for facts identical to those already addressed in the Italian inquiry, with the relevant market defined as the European Economic Area, except for Italy.116F[116]

The alleged unequal treatment of non-FBA sellers has also been investigated by the Austrian Federal Competition Authority (BWB).117F[117] Although concerned about potential discrimination against sellers who organize their deliveries independently, the Authority conceded that  a better ranking could have also resulted from the better service offered under FBA, compared with the independent organization of deliveries. Hence, the BWB remained open to the possibility that the appearance of preferential treatment for FBA Marketplace sellers was objectively justified.118F[118] The Austrian Authority concluded that a comprehensive and transparent legal framework was the best way to counter problematic business practices and accepted Amazon’s modifications to its terms and conditions.119F[119]

The link between Amazon Marketplace and FBA was also scrutinized as part of the investigation conducted by the U.S. House Judiciary Committee’s Antitrust Subcommittee into the state of competition in digital markets. The subcommittee’s final report found that many third-party sellers have no choice but to purchase fulfillment services from Amazon to maintain a favorable search-result position.120F[120] The report characterized Amazon’s strategy as tying.121F[121]

For the sake of our analysis, the Italian Amazon decision is especially remarkable because of how it contrasts with Google Shopping. As already mentioned, with the exception of the Amsterdam Court of Appeal, it represents the only decision in which the term self-preferencing is used.122F[122] Self-preferencing is here defined as an unequal and unjustified preferential treatment granted by a dominant player to its own services in pursuing a leveraging strategy, hence falling outside the scope of competition on the merits.123F[123] Therefore, rather than reflecting the criteria set out by the General Court, the Italian decision is clearly inspired by the Commission’s approach in Google Shopping. Indeed, in line with the idea of describing self-preferencing as a new form of leveraging abuse, Amazon’s practice is characterized as a form of tying.124F[124]

This definition of self-preferencing is convenient for enforcers, in that it would allow them to bypass the legal standards otherwise required to prove unlawful tying. Indeed, tying requires a form of coercion, such that customers do not have the choice to obtain the tying product without the tied product. In the Amazon case, by contrast, there is neither a contractual obligation nor technical integration between marketplace services and logistics services. Business users are free to run the logistics by themselves or to outsource it to an independent operator without losing the ability to operate on the Amazon e-commerce platform.

Apart from the legal qualification of the conduct in question (which may be more properly characterized as bundling), finding an abuse in a tying case also requires proof of potential foreclosure effects against equally efficient rivals. Looking at the effects on logistics operators, according to the AGCM’s view, vertical integration between the marketplace and logistics constitutes Amazon’s main competitive advantage, which is unmatchable even by equally efficient rivals.125F[125] Indeed, FBA is an integrated logistics service designed to represent “a one-stop shop solution” for storage, shipping, and customer service within a “closed and complete ecosystem” in which Amazon plays multiple roles.126F[126] While Amazon recently started offering a multi-channel logistics service, few retailers have adopted it due to its high operating costs.127F[127] Moreover, part of the AGCM’s decision concerning complaints raised by Amazon’s major e-commerce rival eBay—which reported that a large portion of its market share had been absorbed by Amazon—ultimately recognized that Amazon’s superiority stemmed from its popularity with users and retailers, especially in the critical areas of trust, shipping, and returns.128F[128]

In short, the thing that has made the playing field uneven has been Amazon’s creation of a successful ecosystem, which provides the company with competitive advantages that cannot be replicated either by pure online marketplaces or pure logistics providers.129F[129] A prohibition on self-preferencing may therefore functionally reflect a bias against ecosystems, which require massive and uncertain investment to create, and which provide significant benefits to both business users and final customers.

In summary, the AGCM endorsed an expansive view of the scope of anticompetitive self-preferencing that was at odds with the legal qualifications and narrow criteria set out by the General Court in Google Shopping, and that lacked the context the General Court had laid out to assess the circumstances in which preferential treatment constitutes discriminatory abuse. Notably, an online marketplace does not share many relevant features with an Internet search engine. Indeed, Amazon’s business model is “a closed and complete ecosystem.”130F[130] Moreover, unlike in the Google Shopping case, Amazon is not accused of changing its conduct in response to its market position. The only elements of the criteria defined in Google Shopping that Amazon could be argued to meet are operating in a market with high barriers to entry and being a vertically integrated firm with a super/hyper dominance in the upstream market.131F[131]

Although the General Court’s ruling is mentioned a few times,132F[132] these appear to be last-minute references included merely to note that the Commission’s decision had been upheld by the General Court.133F[133] Since the Italian Amazon decision was delivered just a few weeks after the Google Shopping ruling, it is possible that the AGCM simply did not have time to adjust its line of reasoning to comport with the Court’s qualifications and criteria.

C.   Preferential access to non-public data

A broad interpretation of self-preferencing could find that it covers the preferential provision of data and information, which could similarly be prohibited as abusive. Following this line of reasoning, the European Commission sent a statement of objections to Amazon in November 2020 informing the company of the Commission’s preliminary view that its practice of systematically using non-public business data from independent retailers who sell on its online marketplace infringes antitrust rules, on grounds that Amazon uses that data to benefit its own retail business that directly competes with those retailers.134F[134]

More recently, the UK CMA has also opened an investigation into how Amazon collects and uses third-party seller data, including whether Amazon gains an unfair advantage in business decisions made by its retail arm.135F[135] Similar concerns were raised by staff to the U.S. House Judiciary Antitrust Subcommittee, whose final report argued that Amazon’s asymmetric access to and use of third-party seller data constitutes unfair treatment of those third-party sellers.136F[136] The ACCC likewise warned that Apple and Google both have the ability and incentive to use their positions as app-marketplace operators to monitor downstream competitors.137F[137] For instance, the ACCC found that Apple’s Developer Agreement allows the company to develop, acquire, license, market, promote, and distribute products and software that perform functions the same or similar to any of the products, software or technologies provided by app developers that use the App Store. By contrast, Apple requires that app developers follow obligations to avoid being copycats.

Similar allegations of unfair use of user data have been levied against Facebook by the European Commission and the U.K. CMA, which charge that the company uses data gathered from advertisers in order to compete with them in markets in which Facebook is active, such as classified ads.138F[138] Finally, one focus of the European Commission’s investigation of Apple’s App Store rule requiring developers to use Apple’s in-app purchase mechanism for the distribution of paid apps and/or paid digital content is the potential that competing developers may be disintermediated from important customer data, while Apple can obtain valuable data about the activities and offers of its competitors.139F[139]

These investigations have inspired the bans on so-called “sherlocking” (i.e., the use of business users’ data to compete against them) included both in the DMA140F[140] and the proposed American Innovation and Competition Online Act,141F[141] as well as calls for structural separation and line-of-business restrictions.142F[142]

Amazon has faced accusations that it takes advantage of its dual role and hybrid business model in serving both as a marketplace-service provider and a retailer on the same marketplace, in competition with independent sellers. The charge is that the company can leverage its access to non-public third-party sellers’ data—such as the number of units ordered and shipped, the revenues sellers earn on the marketplace, the number of visits to sellers’ offers, data related to shipping and to sellers’ past performance, and consumer product claims—to identify and replicate popular and profitable products from among the hundreds of millions of listings on its marketplace.

Notably, according to the European Commission’s preliminary findings, such granular and real-time business data feed into the algorithms of Amazon’s retail business, allowing them to calibrate retail offers and strategic business decisions to the detriment of the other marketplace sellers. Thus, it is argued that the appropriation and the use of third-party sellers’ data enables Amazon to avoid the normal risks of retail competition, such as those associated with investing in a new product or choosing a specific price level, and to leverage its dominance in the market for the provision of marketplace services in France and Germany (i.e., the biggest markets for Amazon in the EU).143F[143]

The U.S. House Antitrust Subcommittee similarly charged that Amazon is able to use marketplace data from third-party merchants to create competing private-label products or to source products directly from manufacturers in order to free ride off sellers’ efforts.144F[144] The impact assessment study supporting the DMA confirmed this suspicion, noting that the launch of Amazon Basics (i.e., the most successful private label brand on Amazon’s marketplace) has negatively impacted the sales on Amazon of third-party products in identified attractive product segments.145F[145]

Leveraging this information exclusively, without sharing it with third-party sellers, is considered a form of self-preferencing because Amazon is in position to use data from its marketplace to gain a competitive advantage in market research and to identify new business opportunities without incurring any financial risk.146F[146] Furthermore, by using information from its Amazon fulfilment program, Amazon can also determine where products offered by third-party merchants are being manufactured and by whom. Since Amazon Basics products are sold in large volumes, Amazon can approach the manufacturers of goods for third-party merchants, buy these items in larger quantities, and sell them for a lower price than the competition on its own platform.147F[147]

This line of reasoning aligns with the core concerns about self-preferencing, such as conflicts of interest and the competitive advantages that a platform’s dual role may yield. But to invoke antitrust in cases where a platform performing a dual role gains a competitive advantage would require demonstrating proof of competitive harm, which isn’t apparent in this case. Indeed, while the impact on innovation appears uncertain,148F[148] Amazon’s practice likely benefits consumers by permitting close price comparisons, increasing output, and forcing sellers to reduce their prices.149F[149] Such effects are even more relevant when it comes to sellers with market power, as the introduction of products and services in competition with third parties would reduce double marginalization.

Moreover, the relevance of non-public third-party merchants’ data in facilitating copying by Amazon is questionable. Indeed, as noted, Amazon’s public product reviews supply a great deal of information and any competitor can obtain an item for the purposes of reverse engineering.150F[150] Conversely, if the products in question are protected by intellectual-property rights, Amazon could be found guilty of infringement. Finally, it is unclear whether and how this form of self-preferencing would meet the legal qualification and criteria set out by the General Court in Google Shopping.

Nonetheless, the European Commission is currently evaluating the commitments offered by Amazon, which has proposed to refrain from using non-public data relating to, or derived from, the activities of independent sellers on its marketplace for its retail businesses that compete with those sellers.151F[151] The relevant data would cover both individual and aggregate data (e.g., sales terms, revenues, shipments, inventory-related information, consumer-visit data, or seller performance on the platform). Amazon commits not to use such data for the purposes of selling branded goods, as well as in its private-label products.

III. Imposing platform neutrality under antitrust law

Because preferential treatment may result from a wide range of practices, self-preferencing potentially covers different types of behavior that are subject to different legal standards and that may include exploitative elements.152F[152] Prohibitions on self-preferencing as per se anticompetitive would therefore grant antitrust enforcers significant leeway to bypass the legal standards ordinarily required to prove traditional anticompetitive harms. As a result, such prohibitions would provide antitrust authorities with a powerful tool to intervene in digital markets. This issue is particularly sensitive in Europe where the DMA entrusts the European Commission with the sole power to apply the new regulation but does not displace national competition law. Hence, national competition authorities will remain in charge of the enforcement of national and European antitrust rules.

Besides its potential as an enforcement shortcut, self-preferencing prohibitions may function to impose a neutrality regime on online gatekeepers. The aim would be to ensure a level playing field that currently appears uneven because of the bottleneck and intermediation power exerted by large online platforms. Such rules also could neutralize conflicts of interests raised by platforms’ dual-mode intermediation. The dual roles that some platforms perform fuel the never-ending debate over vertical integration and the related concern that, by giving preferential treatment to its own products and services, an integrated provider may leverage its dominance from one market to related markets. Indeed, the circumstances that may give rise to conflicts of interests and the circumstances that can give rise to leveraging strategies can be similar.153F[153] From this perspective, self-preferencing is a byproduct of the emergence of ecosystems. By integrating complementary products and services, a platform that controls and operates at all levels of the value chain may have an incentive to favor its own offers.154F[154]

But as antitrust authorities generally recognize, self-preferencing conduct is “often benign.”155F[155] Furthermore, since the value that the ecosystem generates depends on the activities of independent complementors, that value is not completely under the control of the platform owner.156F[156] Firms operating on the platform and competing with the platform owner may be disadvantaged by a variety of legal, technological, and informational measures implicated by self-preferencing, but there also may be legitimate justifications for such conduct that would need to be carefully considered in each instance.157F[157] Platforms implement different business models and are driven by different incentives, which in turn affects their strategies.

Against this backdrop, an outright ban on self-preferencing could undermine the very existence of ecosystems by challenging their design and monetization strategies.158F[158] Given that preferential treatment can take many different forms and have very different effects, the different business models adopted by platforms should be subject to case-by-case and effects-based assessment.159F[159] This is also consistent with the industrial-organization literature, which has found mixed evidence on the impact of duality on welfare, thereby supporting the insight that absolute neutrality is not desirable and interventions should be product- and platform-specific.160F[160]

Finally, and more importantly, antitrust law does not impose a general duty to ensure a level playing field by sharing competitive advantages with rivals. Indeed, a competitive advantage cannot be automatically equated with anticompetitive effects.161F[161] Within this framework, the relevance of the general principle of equal treatment that has been invoked by the General Court in Google Shopping to frame self-preferencing as a discriminatory abuse should be regarded with significant skepticism.

This is even more evident in the aftermath of the recent CJEU ruling in Servizio Elettrico Nazionale, which confirmed that the effects-based approach to the assessment of abusive practices remains core to European competition law.162F[162] Notably, the CJEU definitively stated that competition law is not intended to protect the competitive structure of the market, but rather to protect consumer welfare, which represents the goal of antitrust intervention.163F[163]

Accordingly, as illustrated in Intel, not every exclusionary effect is necessarily detrimental to competition.164F[164] Competition on the merits may, by definition, lead some competitors— those that are less efficient and thus less attractive to consumers from the standpoint of price, choice, quality or innovation—to become marginalized or to depart from the market.165F[165] In particular, given that exclusionary effects do not necessarily undermine competition, a distinction must be drawn between a risk of foreclosure and a risk of anticompetitive foreclosure, since only the latter may be penalized under Article 102 TFEU.166F[166] If any conduct having an exclusionary effect were automatically classified as anticompetitive, such rules would become a means to protect less capable, less efficient undertakings and would in no way protect the more meritorious undertakings that stimulate a market’s competitiveness.167F[167]

By and large, these well-settled principles do not support the claim that antitrust rules are designed to ensure platform neutrality. As acknowledged by the General Court in Google Shopping, self-preferencing cannot be considered prima facie unlawful and therefore outside the scope of competition on the merits. Its assessment instead requires the demonstration of anticompetitive effects, taking account of the circumstances of the case and the relevant legal and economic context.168F[168] Toward this aim, a dominant platform remains free to demonstrate that its practice, albeit producing an exclusionary effect, is objectively justified on the basis of all the circumstances of the case, or that the effects are counterbalanced or outweighed by efficiency advantages that also benefit consumers, such as through lower prices, better quality, or a wider choice of new or improved goods and services.169F[169]

In order to assess the anticompetitive nature of a practice, it is necessary to examine whether the means used come within the scope of normal competition.170F[170] Anticompetitive effects do not amount to a mere competitive disadvantage, but require an impact on efficient firms’ ability and incentive to compete.171F[171] Servizio Elettrico Nazionale also clarified the meaning of competition on the merits, considering outside its scope conduct that is not based on obvious economic reasons or objective reasons.172F[172] It is therefore necessary to assess the ability of equally efficient competitors to imitate the conduct of the dominant undertaking. Exclusionary conduct by a dominant firm that can be replicated by equally efficient competitors does not represent the sort of conduct that would lead to anticompetitive foreclosure; it therefore comes within the scope of competition on the merits.173F[173] In order to assess whether a given practice comes within the scope of competition on the merits, the test of whether it would be impossible for an equally efficient rival to imitate the dominant firm’s conduct arises from the case law on both price-related (e.g., TeliaSonera and Post Danmark II) and non-price-related conduct (e.g., Bronner).174F[174]

Moving away from the goal of ensuring a level playing field, recent European case law on self-preferencing centers instead on the competitive advantages that platforms enjoy due to their dual role. A competitive advantage, however, need not amount to anticompetitive foreclosure. Foreclosure not only needs to be proved, but also assessed against potential advantages for consumers, in terms of price, quality, and choice of new goods and services. It is even less clear how NCAs’ expansive approach toward self-preferencing as a standalone abuse fit within this legal framework. Both the AdlC’s decision in Google AdTech and the AGCM’s decision in Amazon Logistics appear inconsistent both with the legal qualification and criteria defined by the General Court, and with the CJEU principles recalled in Servizio Elettrico Nazionale. Similar doubts are raised by the investigations into the preferential access to and use of non-public business data. Moreover, in these cases, the benefits for consumers appear particularly significant as, for instance in Amazon Marketplace, the conduct under investigation led to an immediate output increase and price reduction: in short, more competition.

IV. Conclusion

In her opinion Post Danmark II opinion, Advocate General Juliane Kokott warned that, in enforcing antitrust rules, the CJEU “should not allow itself to be influenced so much by current thinking (‘Zeitgeist’) or ephemeral trends, but should have regard rather to the legal foundations on which the prohibition of abuse of a dominant position rests in EU law.”175F[175] Accordingly, this paper has addressed the prevailing zeitgeist in digital markets, analyzing the markets’ proclaimed peculiar features and the potential scope of application to evaluate whether it should be considered a novel standalone antitrust prohibition.

Indeed, common-carrier antitrust is on the rise. Following the 2017 decision in Google Shopping, the European Commission and some NCAs have advanced a new theory of harm pointing to the competitive disadvantage suffered by rivals. This therefore constitutes a de facto ban on any preferential treatment granted by dominant platforms to their own products and services. Such a strong stance in antitrust enforcement relies on the premise that the special responsibility that an incumbent dominant player bears implies that they must ensure a level playing field.

It remains the case, however, that European case law questions both the goal of relying on antitrust rules to impose a neutrality regime on dominant platforms and the very existence of self-preferencing as an autonomous abuse. Competition law does not impose a general duty to share competition advantages with rivals and does not protect the structure of the market; hence, not every exclusionary effect automatically undermines competition. Self-preferencing is not, in itself, unlawful and platform neutrality as such is outside the scope of competition law.

In contrast with the European Commission and some NCAs, the European General Court in Google Shopping not only framed self-preferencing as a discriminatory abuse but also highlighted some criteria to assess its potential exclusionary effects and considered it outside the scope of competition on the merits. Such criteria are particularly fact-sensitive, and therefore at odds with its wide application as a standalone abuse.

In summary, against the sirens of a fascinating, popular, and convenient new label, the limiting principles of competition law remind us that it cannot be weaponized to ensure a specific market outcome. Therefore, in the aftermath of the Google Shopping ruling, doubts about the characteristics and boundaries of self-preferencing remain on the table, and we still do not have a legal test that distinguishes such purported new antitrust offenses from other practices aimed at pursuing leveraging strategies and already addressed by antitrust rules.

[1] Jacques Cre?mer, Yves-Alexandre de Montjoye, and Heike Schweitzer, Competition Policy for the Digital Era, European Commission (2019) 7, available at https://ec.europa.eu/competition/publications/reports/kd0419345enn.pdf; Unlocking Digital Competition, UK Digital Competition Expert Panel (2019) 58, available at https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/785547/unlocking_digital_competition_furman_review_web.pdf.

[2] Elizabeth Warren, Here’s How We Can Break up Big Tech, Medium (2019) available at https://medium.com/@teamwarren/heres-how-we-can-break-up-big-tech-9ad9e0da324c.

[3] Margrethe Vestager, Statement Before the U.S. House of Representatives, Subcommittee on Antitrust, Commercial, and Administrative Law (2020) 2, available at https://www.euractiv.com/wp-content/uploads/sites/2/2020/07/Statement-EVP-Vestager-House-SubCommittee-30-July.pdf. See also id., Technology with Purpose (2020), https://ec.europa.eu/commission/commissioners/2019-2024/vestager/announcements/technology-purpose_en.

[4] Thomas Eisenmann, Geoffrey Parker, and Marshall Van Alstyne, Platform Envelopment, 32 Strateg. Manag. J. 1270 (2011).

[5] Regulation (EU) on Contestable and Fair Markets in the Digital Sector (Digital Markets Act), Article 6(1), (3), (5), (7), and (12), https://www.europarl.europa.eu/doceo/document/TA-9-2022-0270_EN.html.

[6] Impact Assessment – A New Pro-Competition Regime for Digital Markets, U.K. Government (2021) para. 21, https://www.gov.uk/government/consultations/a-new-pro-competition-regime-for-digital-markets.

[7] GWB Digitalization Act (Jan. 18, 2021), Section 19a, https://www.bundesrat.de/SharedDocs/beratungsvorgaenge/2021/0001-0100/0038-21.html.

[8] S.2992 – American Innovation and Choice Online Act, 117th Congress (2021-2022) Section 3(a)(1), available at https://www.congress.gov/117/bills/s2992/BILLS-117s2992rs.pdf.

[9] Richard J. Gilbert, The American Innovation and Choice Online Act: Lessons from the 1950 Celler-Kevaufer Amendment, Concurrentialiste (2022), https://leconcurrentialiste.com/gilbert-innovation-choice-act/?mc_cid=8bdf17d95a&mc_eid=34922555f0; Randal Picker, The House’s Recent Spate of Antitrust Bills Would Change Big Tech as We Know It, Promarket (2021), https://promarket.org/2021/06/29/house-antitrust-bills-big-tech-apple-preinstallation.

[10] Investigation of Competition in Digital Markets’, Majority Staff Reports and Recommendations, U.S. House Judiciary Subcommittee on Antitrust, Commercial, and Administrative Law (2020), 380, https://judiciary.house.gov/uploadedfiles/competition_in_digital_markets.pdf?utm_campaign=4493-519. See also Elettra Bietti, Self-Regulating Platforms and Antitrust Justice, Tex. Law Rev. (forthcoming); Nikolas Guggenberg, Essential Platforms, 24 STLR 237 (2021); Rory Van Loo, In Defense of Breakups: Administering a “Radical” Remedy, 105 Cornell L. Rev. 1955 (2020); Lina M. Khan, The Separation of Platforms and Commerce, 119 Columbia Law Rev. 973 (2019); K. Sabeel Rahman, Regulating Informational Infrastructure Internet Platforms as the New Public Utilities, 2 GLTR 234 (2018).

[11] Case AT.39740, Google Search (Shopping), European Commission (Jun. 27, 2017).

[12] Case T-612/17, Google LLC and Alphabet Inc. v. European Commission, European General Court (Nov. 10, 2021), EU:T:2021:763.

[13] See, e.g., Decision No. 29925, FBA Amazon, Autorità Garante della Concorrenza e del Mercato (Nov. 30, 2021), https://www.agcm.it/dettaglio?db=41256297003874BD&uid=801201274D8FDD40C12587AA0056B614&view=&title=A528-FBA%20AMAZON&fs=Abuso%20di%20posizione%20dominante. Previously, see Decision 21-D-11, Google, Autorité de la Concurrence (Jun. 7 2021) , https://www.autoritedelaconcurrence.fr/en/decision/regarding-practices-implemented-online-advertising-sector.

[14] Giuseppe Colangelo, The Digital Markets Act and EU Antitrust Enforcement: Double & Triple jeopardy, ICLE White Paper (2022), https://laweconcenter.org/resource/the-digital-markets-act-and-eu-antitrust-enforcement-double-triple-jeopardy.

[15] Pablo Iba?n?ez Colomo, Self-Preferencing: Yet Another Epithet in Need of Limiting Principles, 43 World Competition 417 (2020).

[16] Nicolas Petit, A Theory of Antitrust Limits, 28 Geo. Mason L. Rev. 1399 (2021).

[17] Herbert Hovenkamp, Selling Antitrust, Hastings L.J. (forthcoming).

[18] See Opinion of Advocate General Wahl, 20 December 2017, Case C?525/16, MEO — Serviços de Comunicações e Multimédia SA v. Autoridade da Concorrência, EU:C:2017:1020, paras. 76-77, arguing that a distinction must be drawn between undertakings that are vertically integrated (and have an interest in displacing competitors on the downstream market) and those that have no such interest. In the case of vertically integrated undertakings, the application by a dominant undertaking of discriminatory prices on the downstream or upstream market is, in reality, similar to first-degree price discrimination, which indirectly affects the undertaking’s competitors. See also Inge Graef, Differentiated Treatment in Platform-to-Business Relations: EU Competition Law and Economic Dependence, 38 YEL 448, 452-453 (2019), distinguishing among pure self-preferencing (whereby a vertically integrated platform treats its affiliated services more favorably than non-affiliated services), pure secondary line differentiation (whereby a non-vertically integrated platform engages in differentiated treatment among unaffiliated services in a market in which it is not active itself), and a hybrid category in which either a vertically integrated or a non-vertically integrated platform engages in differentiated treatment among unaffiliated services in an effort to favor its own business.

[19] Nicolas Petit, Theories of Self-Preferencing Under Article 102 TFEU: A Reply to Bo Vesterdorf, 1(3) CLPD 4 (2015).

[20] Case C-413/14 P, Intel v. Commission, Court of Justice of the European Union (Sept. 6, 2017), EU:C:2017:632.

[21] Id., C?525/16, MEO v. Autoridade da Concorrência (Apr. 19, 2018),  EU:C:2018:270. See also Wahl, supra note 18, para. 61.

[22] Guidance on the Commission’s Enforcement Priorities in Applying Article 82 of the EC Treaty to Abusive Exclusionary Conduct by Dominant Undertakings, European Commission (2009) OJ C 45/7, paras. 47-62.

[23] See Autorité de la Concurrence, supra note 13, para. 410, binding limits on interoperability with third-party services servers cannot be considered competition on the merits. See also Herbert Hovenkamp, Antitrust and the Design of Production, 103 Cornell L. Rev. 1155 (2018); Pablo Iba?n?ez Colomo, Product Design and Business Models in EU Antitrust Law, SSRN (2021), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3925396.

[24] Case T-201/04, Microsoft v. Commission, European General Court (Sept. 17, 2007), para. 1036, EU:T:2007:289.

[25] Case AT.40099, Google Android, European Commission, (Jul. 18, 2018), confirmed by Case T-604/18, Google v. Commission, European General Court (Sept. 14, 2022) EU:T:2022:541.

[26] Dirk Auer, Appropriability and the European Commission’s Android Investigation, 23 CJEL 647 (2017).

[27] Christopher S. Yoo, Open Source, Modular Platforms, and the Challenge of Fragmentation, 1 Criterion Journal on Innovation 619 (2016).

[28] UK Government, supra note 6, para. 21.

[29] Joined Cases C-241/91 P and 242/91 P, RTE and ITP v. Commission, Court of Justice of the European Union (Apr. 6, 1995), EU:C:1995:98.

[30] Id., 29, Case C-418/01, IMS Health GmbH & Co. OHG v. NDC Health GmbH & Co. GH (Apr. 29, 2004), EU:C:2004:257.

[31] European General Court, supra note 24.

[32] Case C-7/97, Oscar Bronner GmbH & Co. KG v. Mediaprint Zeitungs- und Zeitschriftenverlag GmbH & Co. KG, Mediaprint Zeitungsvertriebsgesellschaft mbH & Co. KG and Mediaprint Anzeigengesellschaft mbH & Co. KG, Court of Justice of the European Union (Nov. 26, 1998), EU:C:1998:569.

[33] Id., Case C-165/19 P, Slovak Telekom a.s. v. Commission (Mar. 25, 2021) para. 50, EU:C:2021:239.

[34] Ibid., para. 57. In a similar vein, see Case T?814/17, Lietuvos gele?inkeliai AB v. Commission, European General Court (Nov. 18, 2020), para. 92, EU:T:2020:545.

[35] European Commission, supra note 22, para. 80.

[36] Ibid., para. 82; and Case COMP/38.784, Wanadoo Espan?a v. Telefo?nica, European Commission (Jul 4, 2007). This is likely to occur in two cases: where regulation compatible with EU law already imposes an obligation to supply on the dominant undertaking and it is clear, from the considerations underlying such regulation, that the necessary balancing of incentives has already been made by the public authority when imposing such obligation; or where the upstream market position of the dominant firm has been developed under the protection of special or exclusive rights or has been financed by state resources.

[37] Case C-280/08 P, Deutsche Telekom AG v. European Commission (Deutsche Telekom I), Court of Justice of the European Union (Oct. 14, 2010), EU:C:2010:603.

[38] Id., Case C-52/09, Konkurrensverket v. TeliaSonera Sverige AB (Feb. 17, 2011), EU:C:2011:83.

[39] Id., Case C?295/12 P, Telefónica SA and Telefónica de España SAU v. European Commission (Jul. 10, 2014), EU:C:2014:2062.

[40] Id., supra note 33.

[41] Case C/13/528337, VBO Makelaar v. Funda, Gerechtshof Amsterdam (May 16, 2020), para. 3.12.3.

[42] Autorità Garante della Concorrenza e del Mercato, supra note 13, paras. 236, 393, 436, 504, 708, 710, 716, and 901.

[43] European Commission, supra note 11.

[44] Streetmap.EU Ltd. v. Google and Others, [2016] EWHC 253 (ch).

[45] Ibid., paras. 51-54.

[46] Ibid., paras. 84 and 147.

[47] Ibid., para. 84.

[48] Ibid., para. 149.

[49] Ibid., para. 139.

[50] Ibid., para. 161.

[51] European Commission, supra note 11, para. 344.

[52] Ibid., para. 649.

[53] Ibid.

[54] Case C-333/94, Tetra Pak International SA v. Commission, Court of Justice of the European Union (Nov. 14, 1996), EU:C:1996:436.

[55] Case T-288/97, Irish Sugar plc v Commission, European General Court (Oct. 7, 1999), EU:T:1999:246.

[56] Id., supra note 24.

[57] Case C-311/84, Centre Belge D’Etudes de Marché – Télémarketing (CBEM) v. SA Compagnie Luxembourgeoise de Télédiffusion (CLT) and Information Publicité Benelux (IPB), Court of Justice of the European Union (Oct. 3, 1985), EU:C:1985:394.

[58] European Commission, supra note 11, para. 334.

[59] Ibid., para. 645.

[60] Ibid., para. 651.

[61] See, e.g., Jay Pil Choi and Doh-Shin Jeon, A Leverage Theory of Tying in Two-Sided Markets with Nonnegative Price Constraints, 13 Am Econ J Microecon 283 (2021); Edward Iacobucci and Francesco Ducci, The Google Search Case in Europe: Tying and the Single Monopoly Profit Theorem in Two?Sided Markets, 47 Eur. J. Law Econ. 15 (2019); Eduardo Aguilera Valdivia, The Scope of the ‘Special Responsibility’ upon Vertically Integrated Dominant Firms after the Google Shopping Case: Is There a Duty to Treat Rivals Equally and Refrain from Favouring Own Related Business?, 41 World Competition 43 (2018);  Pinar Akman, The Theory of Abuse in Google Search: A Positive and Normative Assessment under EU Competition Law, 2 J. Tech. L. & Pol’y 301 (2017); Ioannis Kokkoris, The Google Case in the EU: Is There a Case?, 62 Antitrust Bull. 313 (2017); John Temple Lang, Comparing Microsoft and Google: The Concept of Exclusionary Abuse, 39 World Competition 5 (2016); Renato Nazzini, Unequal Treatment by Online Platforms: A Structured Approach to the Abuse Test in Google, SSRN (2016), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2815081; Bo Vesterdorf, Theories of Self-Preferencing and Duty to Deal – Two Sides of the Same Coin?, 1(1) CLPD 4 (2015); Petit, supra note 19.

[62] Cre?mer, de Montjoye, and Schweitzer, supra note 1.

[63] Gerechtshof Amsterdam, supra note 41.

[64] Ibid., para. 3.12.1.

[65] Autorité de la Concurrence, supra note 13.

[66] Digital Advertising Services Inquiry Final Report, Australian Competition and Consumer Commission (2021), available at https://www.accc.gov.au/system/files/Digital%20advertising%20services%20inquiry%20-%20final%20report.pdf.

[67] Autorité de la Concurrence, supra note 13, paras. 369 and 410.

[68] Ibid., paras. 366 and 369. Since Google did not hold a dominant position in the market for SSPs, the reference to Tetra Pak has also been used to argue that, under specific circumstances, behavior implemented in a non-dominated market that has effects on the dominated market may be considered abusive (see para. 367).

[69] CJEU, supra note 33.

[70] Decision 21-D-07, Apple, Autorité de la Concurrence, (Mar. 17, 2021) https://www.autoritedelaconcurrence.fr/en/decision/regarding-request-interim-measures-submitted-associations-interactive-advertising-bureau.

[71] Ibid., para. 163.

[72] Bundeskartellamt Reviews Apple’s Tracking Rules for Third-Party Apps (press release), Bundeskartellamt (2022) https://www.bundeskartellamt.de/SharedDocs/Meldung/EN/Pressemitteilungen/2022/14_06_2022_Apple.html.

[73] Mobile Ecosystems: Market Study Final Report, U.K. Competition and Markets Authority (2022), Chapter 6 and Appendix J, https://www.gov.uk/cma-cases/mobile-ecosystems-market-study.

[74] European General Court, supra note 12.

[75] Ibid., para. 155.

[76] More recently, see also Case 50972, Google Privacy Sandbox, U.K. Competition and Markets Authority (Feb. 11, 2022), https://www.gov.uk/cma-cases/investigation-into-googles-privacy-sandbox-browser-changes, which considered self-preferencing as a traditional discrimination abuse. In particular, the competitive risks the CMA highlighted involve Google’s self-preferencing its own ad inventory and ad-tech services by transferring key functionalities to Chrome. The Privacy Sandbox Project would offer Google the ability to affect digital-advertising-market outcomes through Chrome in a way that cannot be scrutinized by third parties. It could lead to conflicts of interests because Google operates as publisher and ad-tech provider simultaneously.

[77] General Court, supra note 12, para. 160.

[78] Ibid., para. 163.

[79] Case C-242/95, GT-Link A/S v. De Danske Statsbaner (DSB), Court of Justice of the European Union (Jul. 17, 1997), EU:C:1997:376.

[80] Id., Case C-82/01 P, Ae?roports de Paris v. Commission (Oct. 24, 2002), EU:C:2002:617.

[81] Id., supra note 21.

[82] See Lena Hornkohl, Article 102 TFEU, Equal Treatment and Discrimination after Google Shopping, 13 J. Eur. Compet. Law Pract. 99 (2022), mentioning Post Danmark I as an example of primary-line exclusionary discrimination in the predatory-pricing context and TeliaSonera (supra note 38) and Slovak Telekom (supra note 33) as examples of secondary-line exclusionary discrimination in the margin-squeeze context.

[83] General Court, supra note 12, paras. 166 and 175.

[84] Ibid., paras. 169-174.

[85] Ibid., paras. 176-177.

[86] Ibid.

[87] Ibid., para. 178.

[88] Regulation (EU) 2015/2120 laying down measures concerning open Internet access and amending Directive 2002/22/EC on universal service and users’ rights relating to electronic communications networks and services, and Regulation (EU) No 531/2012 on roaming on public mobile-communications networks within the European Union, (2015) OJ L 310/1.

[89] General Court, supra note 12, para. 180. Comparisons to net neutrality have also been made by the U.S. House Judiciary Subcommittee on Antitrust, Commercial, and Administrative Law, supra note 10, 382-383, recommending that Congress consider establishing nondiscrimination rules.

[90] General Court, supra note 12, paras. 180, 182 and 183.

[91] Ibid., paras. 178, 182, 183, and 237.

[92] Ibid., paras. 176 and 179.

[93] Ibid..

[94] Ibid., paras. 176 and 179.

[95] Ibid., para. 181.

[96] Ibid., paras. 182-184.

[97] Ibid., paras. 219-222.

[98] Ibid., paras. 227.

[99] Ibid., para. 224.

[100] Ibid., paras. 232 and 233.

[101] Ibid., para. 238.

[102] Ibid., para. 240.

[103] See Christian Ahlborn, Gerwin Van Gerven, and William Leslie, Bronner Revisited: Google Shopping and the Resurrection of Discrimination Under Article 102 TFEU, 13 J. Eur. Compet. Law Pract. 87 (2022); Friso Bostoen, The General Court’s Google Shopping Judgement Finetuning the Legal Qualification and Tests for Platform Abuse, 13 J. Eur. Compet. Law Pract. 75 (2022), and Hornkohl, supra note 82, arguing that the ruling has resurrected discriminatory abuses as potentially one of the most important tools for regulating the platform economy.

[104] See Elias Deutscher, Google Shopping and the Quest for a Legal Test for Self-preferencing Under Article 102 TFEU, 6 European Papers 1345, 1348 (2021), arguing that the judgment did not address the fundamental question of how far Article 102 TFEU can interfere with the design choices of dominant firms or prohibit them from granting favorable treatment to their own products or services.

[105] General Court, supra note 12, para. 196.

[106] Ibid., para. 187.

[107] Ibid., para. 245.

[108] See Bostoen, supra note 103, arguing that, at best, this form of favoritism may be applicable in other cases of prominent display and positioning in searches (e.g., the conduct of Amazon favoring its own retail offers); and Ahlborn, Van Gerven, and Leslie, supra note 103, noting that, in contrast to price discrimination, discriminatory access to an input can encompass a range of factors that are difficult to disentangle (e.g., greater interoperability or preferential access to core services).

[109] Autorità Garante della Concorrenza e del Mercato, supra note 13.

[110] Ibid., para. 702, describing Amazon’s conduct as an “abusive pressure.”

[111] Id., Italian Competition Authority: Amazon Fined over € 1,128 Billion for Abusing Its Dominant Position (2021), https://en.agcm.it/en/media/press-releases/2021/12/A528.

[112] Autorità Garante della Concorrenza e del Mercato, supra note 13, para. 254.

[113] Ibid..

[114] Ibid., paras. 253 and 737.

[115] Ibid., para. 698.

[116] See C(2020) 7692 Final, European Commission (Nov. 10, 2020). See also Margrethe Vestager, Statement by Executive Vice-President Vestager on Statement of Objections to Amazon for the Use of Non-Public Independent Seller Data and Second Investigation into Its E-Commerce Business Practices (2020), https://ec.europa.eu/commission/presscorner/detail/en/STATEMENT_20_2082. See also CMA Investigates Amazon over Suspected Anti-Competitive Practices, U.K. Competition and Markets Authority (2022), https://www.gov.uk/government/news/cma-investigates-amazon-over-suspected-anti-competitive-practices, opening an investigation into how Amazon sets criteria for allocation of suppliers to be the preferred in the Buy Box and how Amazon sets the eligibility criteria for selling under the Prime label. The European Commission is currently evaluating the commitments offered by Amazon (Commission Seeks Feedback on Commitments Offered by Amazon Concerning Marketplace Seller Data and Access to Buy Box and Prime, European Commission (2022) https://ec.europa.eu/commission/presscorner/detail/en/ip_22_4522). Amazon has committed to apply equal treatment to all sellers when selecting the winner of the Buy Box and to display a second competing offer to the Buy Box winner if there is a second offer that is sufficiently differentiated on price and/or delivery. Both offers will display the same descriptive information and provide for the same purchasing experience. Moreover, regarding Prime, Amazon has committed to set non-discriminatory conditions and qualifying criteria for marketplace sellers and offers, to allow Prime sellers to freely choose any carrier for their logistics and delivery services, and not to use any information obtained through Prime about the terms and performance of third-party carriers for its own logistics services.

[117] Bundeswettbewerbsbehörde (Jul. 17, 2019), available at https://www.bwb.gv.at/fileadmin/user_upload/Fallbericht_20190911_en.pdf.

[118] Ibid., para. 81.

[119] Ibid., para. 87.

[120] U.S. House Judiciary Subcommittee on Antitrust, Commercial, and Administrative Law, supra note 10, 287-291.

[121] Ibid., 287-288.

[122] Autorità Garante della Concorrenza e del Mercato, supra note 13, paras. 236, 504, 710, 716, and 901.

[123] Ibid., paras. 236, 504, 506, 716, 723, and 810.

[124] Ibid., paras. 505, 713, 726, 760, 826, 852, 857, and 874. See also Autorità Garante della Concorrenza e del Mercato, supra note 111.

[125] Id., supra note 13, para. 807.

[126] Ibid., paras. 127, 136, 188, 614, and 804.

[127] Ibid., paras. 834-835.

[128] Ibid., paras. 658-666, 679, and 682.

[129] Ibid., paras. 805-806.

[130] Ibid., para. 136.

[131] Ibid., paras. 506, 609, 610, 680, and 716.

[132] Ibid., paras. 610, 710, 716, and 723.

[133] Ibid., para. 710.

[134] Case AT.40462, Amazon Marketplace, European Commission (Nov. 10, 2020). See also Commission Sends Statement of Objections to Amazon for the Use of Non-Public Independent Seller Data and Opens Second Investigation into Its E-Commerce Business Practices, European Commission, (2020) https://ec.europa.eu/commission/presscorner/detail/en/ip_20_2077.

[135] U.K. Competition and Markets Authority, supra note 116.

[136] U.S. House Judiciary Subcommittee on Antitrust, Commercial, and Administrative Law, supra note 10, 275.

[137] App Marketplaces: Interim Report, Australian Competition and Consumer Commission, (2021), 134, available at https://www.accc.gov.au/system/files/Digital%20platform%20services%20inquiry%20-%20March%202021%20interim%20report.pdf.

[138] Case AT.40684, Facebook leveraging, European Commission (Jun. 4, 2021), https://ec.europa.eu/competition/elojade/isef/case_details.cfm?proc_code=1_AT_40684; CMA Investigates Facebook’s Use of Ad Data, U.K. Competition and Markets Authority (2021), https://www.gov.uk/government/news/cma-investigates-facebook-s-use-of-ad-data.

[139] Case AT.40716, Apple – App Store Practices, European Commission (Jun. 16, 2020).

[140] DMA, supra note 5, Article 6(1).

[141] AICOA, supra note 8, Section 3.

[142] See, e.g., U.S. House Judiciary Subcommittee on Antitrust, Commercial, and Administrative Law, supra note 10, 380. See also Simon P. Anderson and O?zlem Bedre-Defolie, Hybrid Platform Model, CEPR Discussion Paper No. 16243 (2021), available at https://cepr.org/active/publications/discussion_papers/dp.php?dpno=16243, arguing that the hybrid business model leads to higher platform fees for third-party sellers, less variety on the platform, and lower consumer welfare, compared to when the platform is a pure marketplace. On a different note, see Herbert Hovenkamp, Antitrust and Platform Monopoly, 130 Yale Law J. 1952 (2021), considering structural separation as the worst solution for the problems raised by Amazon’s strategy. See also Andrei Hagiu, Tat-How Teh, and Julian Wright, Should Platforms Be Allowed to Sell on Their Own Marketplaces?, 53 Rand J Econ 297 (2022), arguing that a structural remedy, such as an outright ban on the dual mode, would be detrimental to consumer surplus or total welfare, since the presence of the intermediary’s products constrains the pricing of the third-party sellers on its marketplace. The authors consider preferable policy interventions that target specific behaviors by the platform, such as a ban on product imitation and on self-preferencing.

[143] European Commission, supra note 134.

[144] U.S. House Judiciary Subcommittee on Antitrust, Commercial, and Administrative Law, supra note 10, 275.

[145] Digital Markets Act: Impact Assessment Support Study (Annexes), European Commission (2020), 301-308, https://op.europa.eu/en/publication-detail/-/publication/2a69fd2a-3e8a-11eb-b27b-01aa75ed71a1/language-en/format-PDF/source-search.

[146] Ibid., 304.

[147] Ibid..

[148] See Hagiu, Teh, and Wright, supra note 142, arguing that a ban on product imitation by a platform restores sellers’ incentive to innovate; Erik Madsen and Nikhil Vellodi, Insider Imitation, SSRN (2022) available at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3832712, finding that a ban on a platform’s use of marketplace data can either stifle or stimulate innovation, depending on the nature of innovation. Namely, it stimulates innovation only for experimental product categories with significant upside demand potential. On the impact of data usage on consumer welfare, because of the tradeoff between static benefits from lower prices and dynamic costs from lower sellers’ incentives to investment, see Federico Etro, Product Selection in Online Marketplaces, 30 J Econ Manag Strategy 614 (2021).

[149] See Herbert Hovenkamp, The Looming Crisis in Antitrust Economics, 101 B.U. L. 489, 543 (2021), finding no evidence to suggest that the practice is so prone to abuse or so likely to harm consumers in other ways that it should be categorically condemned: “Rather, it is an act of partial vertical integration similar to other practices that the antitrust laws have confronted and allowed in the past. One close analogy is dual distribution, which occurs when a firm sells through both independent franchisees and its wholly owned stores. Such practices nearly always increase output, benefitting consumers and typically even independent competing firms.” On the different impact of Amazon’s practice on consumer welfare and third-party sellers’ welfare, see also Feng Zhu and Qihong Liu, Competing with Complementors: An Empirical Look at Amazon.com, 39 Strateg. Manag. J. 2618 (2018), finding that Amazon tends to enter into high-quality, popular products sold by third-party merchants and that such entry tends to lower prices and lead to the exit of third-party sellers; and Nan Chen and Hsin-Tien Tsai, Steering via Algorithmic Recommendations, (2021) https://www.tse-fr.eu/sites/default/files/TSE/documents/sem2021/tsai.pdf, arguing that Amazon tends to recommend products sold by Amazon Retail to consumers over products sold by third-party retailers, and that this steering is inconsistent with Amazon promoting consumer welfare.

[150] Hovenkamp, supra note 142, 2015-2016.

[151] European Commission, supra note 116.

[152] See Graef, supra note 18, distinguishing Google Shopping and Amazon Marketplace as pure self-preferencing cases (i.e., primary-line injuries whose key objective is to exclude rivals from the market) from the Italian Amazon Logistics case, which belongs instead to a hybrid category that includes a mix of exploitative and exclusionary elements.

[153] Australian Competition and Consumer Commission, supra note 66, 92.

[154] Colomo, supra note 15, 418.

[155] Updating Competition and Consumer Law for Digital Platform Services, Australian Competition and Consumer Commission (2022), 85, https://www.accc.gov.au/media-release/feedback-sought-on-potential-new-rules-for-large-digital-platforms.

[156] Tobias Kretschmer, Aija Leiponen, Melissa Schilling, and Gurneeta Vasudeva, Platform Ecosystems as Meta?Organizations: Implications for Platform Strategies, 43 Strateg. Manag. J. 405 (2022).

[157] Kevin J. Boudreau and Andrei Hagiu, Platforms Rules: Multi-Sided Platforms as Regulators, in (Annabelle Gawer, ed.) Platforms, Markets and Innovation, Cheltenham, Edward Elgar Publishing (2009), 163; David Evans, Governing Bad Behavior by Users of Multi-sided Platforms, 27 BTLJ 1201 (2012).

[158] See Hovenkamp, supra note 17, considering the pending U.S. self-preferencing legislation “an affront to both antitrust policy and intelligent regulatory policy.” See also Geoffrey A. Manne, Against the Vertical Discrimination Presumption, 2 Concurrences 1, 2 (2020), arguing that forcing platforms to allow complementors to compete on their own terms would affect platform incentives for innovation. Indeed, platforms have an incentive to optimize openness and mandating maximum openness is not necessarily optimal because it would disregard the trade-off faced by platforms. Consequently, any presumption of harm from vertical discrimination is not based on sound economics. In a similar vein, Jonathan M. Barnett, The Host’s Dilemma: Strategic Forfeiture in Platform Markets for Informational Goods, 124 Harv. L. Rev. 1861 (2011).

[159] See Australian Competition and Consumer Commission, supra note 155, 87, arguing that rules might need to be “specifically tailored to each digital platform service with a high level of precision, to target the specific conduct that causes anti-competitive harm.”

[160] See Patrice Bougette, Axel Gautier, and Fre?de?ric Marty, Business Models and Incentives: For an Effects-Based Approach of Self-Preferencing?, 13 J. Eur. Compet. Law Pract.136, 140 (2022). On the welfare effects of Amazon’s dual role and the welfare implications of proposed regulations, see Germa?n Gutie?rrez, The Welfare Consequences of Regulating Amazon, (2021) available at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3965566, showing that interventions that eliminate either the Prime program or product variety are likely to decrease welfare. See also Guy Aridor and Duarte Gonçalves, Recommenders’ Originals: The Welfare Effects of the Dual Role of Platforms as Producers and Recommender Systems, 83 Int. J. Ind. Organ.102845 (2022), highlighting the importance of targeted restrictions on self-preferencing because of the ambiguity of the welfare implications of a policy remedy separating recommendation and production or imposing unbiased recommendations. However, with regards to app stores and device-funded gatekeepers, Jorge Padilla, Joe Perkins, and Salvatore Piccolo, Self-Preferencing in Markets with Vertically Integrated Gatekeeper Platforms, J. Ind. Econ. (forthcoming) find that consumer welfare would be increased by preventing the device seller from selling its own apps and associated services in competition with third-party apps. See also Morgane Cure, Matthias Hunold, Reinhold Kesler, Ulrich Laitenberger, and Thomas Larrieu, Vertical Integration of Platforms and Product Prominence, Quant. Mark. Econ. (forthcoming), studying the potential effects of self-preferencing in the online hotel-booking industry because of the integration between one of the major online travel agencies (Booking Holdings) and a meta-search platform (Kayak). According to their empirical findings, the horizontal ranking of sales channels for a given hotel indicate that sales channels of online travel agents by Booking Holdings are more often position leaders than price leaders and online travel agents affiliated to Booking Holdings have a higher probability than other online travel agents of being among the visible providers and of being the highlighted sales channel. Moreover, for the vertical ranking of hotels for a search request, hotels are ranked worse in the Kayak search results when an online travel agent of the Expedia Group is the cheapest sales channel.

[161] Colomo, supra note 15, 421; Id., Anticompetitive Effects in EU Competition Law, 17 J. Competition Law Econ. 309, 356 (2021).

[162] Case C-377/20, Servizio Elettrico Nazionale SpA v. Autorità Garante della Concorrenza e del Mercato, Court of Justice of the European Union (May 12, 2022), EU:C:2022:379.

[163] Ibid., para. 46.

[164] CJEU, supra note 20, paras. 133-134.

[165] CJEU, supra note 162, para. 73.

[166] Case C?377/20, Servizio Elettrico Nazionale SpA v. Autorità Garante della Concorrenza e del Mercato, Advocate General Rantos (Dec. 9, 2021), EU:C:2021:998, para. 43.

[167] Ibid., para. 45.

[168] See CJEU, TeliaSonera, supra note 38; Post Danmark I, supra note 82; Case C-23/14, Post Danmark A/S v. Konkurrencerådet (Post Danmark II), (Oct. 6, 2015), EU:C:2015:651; Intel, supra note 20; Case C-307/18, Generics (UK) and Others v. Competition and Markets Authority (Jan. 30, 2020), EU:C:2020:52; Case C-152/19 P, Deutsche Telekom v. Commission (Mar. 25, 2021) EU:C:2021:238.

[169] CJEU, supra note 162, paras. 84-85.

[170] Ibid., para. 75. See also Advocate General Rantos, supra note 166, paras. 48-50, arguing that demonstrating that a dominant undertaking used means other than those that come within the scope of normal competition is not a requirement that needs to be assessed separately from the restrictive effect of the conduct.

[171] See, e.g., CJEU, MEO, supra note 21, and Post Danmark II, supra note 168. See also Colomo, supra note 161.

[172] Advocate General Rantos, supra note 166, para. 62.

[173] Ibid., para. 68 and CJEU, supra note 162, paras. 77-79.

[174] CJEU, supra note 162, para. 79.

[175] Case C?23/14, Post Danmark A/S v. Konkurrencerådet, Advocate General Kokott (May 21, 2015), EU:C:2015:343, para. 4.

Continue reading
Antitrust & Consumer Protection

Declaring Computer Code Uncopyrightable with a Creative Fair Use Analysis

Scholarship Abstract Google v Oracle is a blockbuster copyright case. This decade-long lawsuit arose from Google’s unauthorized copying of 11,500 lines of code in the Java . . .


Google v Oracle is a blockbuster copyright case. This decade-long lawsuit arose from Google’s unauthorized copying of 11,500 lines of code in the Java computer program in launching its Android smartphone to vast commercial success. When Oracle sued Google for copyright infringement, Google argued that the Java computer program was uncopyrightable or that its copying was fair use. On the first issue of copyrightability, the Supreme Court punted. Instead, Justice Stephen Breyer’s majority opinion sets forth a novel and sweeping fair use defense for Google’s unauthorized commercial copying of computer programs like Java (known as APIs).

This article first explains that the Computer Software Copyright Act of 1980 is clear that APIs are copyrightable, and that the Court should have explicitly addressed this issue. This copyrightability analysis is important, because it elucidates the peculiar nature of Justice Breyer’s fair use analysis in the substance of his opinion. At a minimum, it confirms the Court’s ultimate decision: a de facto denial of copyright protection in all APIs. In sum, the Google Court did not skip deciding that APIs are not copyrightable. Rather, Justice Breyer reached this same result through a novel and creative application of fair use doctrine.

Google’s significance cannot be understated: the Court held for the first time that an unauthorized copying of a copyrighted work for a commercial purpose to sell a competing product qualifies as a fair use. The Court ostensibly limited its analysis to only APIs, but academics and accused infringers are now arguing that Google applies to other creative works. Time will tell if Google has created a (fair use) exception that swallows the (copyright) rule.

Continue reading
Intellectual Property & Licensing

Righting Incentives to Combat Online Piracy

TOTM More than two decades after Congress sought to strike a balance between the interests of creators and service providers with the Digital Millennium Copyright Act (DMCA), it . . .

More than two decades after Congress sought to strike a balance between the interests of creators and service providers with the Digital Millennium Copyright Act (DMCA), it is clear that Section 512 of the Copyright Act has failed to create the right incentives to curb online copyright infringement. Indeed, as a May report from the U.S. Copyright Office concluded, the “original intended balance has been tilted askew.”

Read the full piece here.

Continue reading
Intellectual Property & Licensing

ICLE STATEMENT TO USTR on the 2019 GSP REVIEW of South Africa

Regulatory Comments We submit this statement in support of IIPA’s petition to review South Africa’s GSP eligibility in light of South Africa’s failure to provide “adequate and . . .

We submit this statement in support of IIPA’s petition to review South Africa’s GSP eligibility in light of South Africa’s failure to provide “adequate and effective protection” to intellectual property as required by the GSP statute and, in particular, profound concerns with draft legislation that will, if enacted, further erode the protection of intellectual property in South Africa for U.S. and South African creators alike.

While we support IIPA’s petition, we note at the outset our reluctance to take such a position: We believe that trade sanctions are harmful to the country imposing them (and on which they are imposed, of course), and, as far as possible, should be avoided. Both the U.S. and South Africa benefit from the GSP that currently affords South African producers unilateral, tariff-free access to U.S. markets for some goods. As such, we caution that the USTR should withdraw South Africa’s GSP designation only as a last resort.

But we also believe that both the United States and South Africa share a strong interest in sustaining creators through adequate and effective protection of intellectual property, thereby promoting economic development and the production of culturally diverse materials. And, unfortunately, removal of GSP is one of the few tools available to the U.S. to protect the interests of U.S. creators of intellectual property in global markets. The USTR is legally obliged to faithfully discharge its congressional mandate by taking action to defend U.S. intellectual property in accordance with various trade laws, including by ensuring that GSP beneficiary countries provide adequate and effective protection within the meaning of the statute.

In submitting this statement, we are mindful that South Africa’s President has not yet signed into law the Bills that motivated the IIPA’s petition. If he does so, South Africa would fail to meet the conditions for GSP eligibility and USTR will be obliged to revoke all or some of its GSP benefits. We note, however, that numerous local actors have voiced concerns regarding the constitutionality of the proposed legislation and the harm that it will to do to the community of creators in South Africa. It is possible that President Ramaphosa will heed these concerns, reject the draft legislation and send it back to Parliament for reconsideration, with directions to adapt or remove its numerous provisions that conflict with South Africa’s Constitution and the country’s international treaty obligations. So doing could result in a text more consistent with South Africa’s (and the U.S.’s) cultural and economic interests. Most importantly from the perspective of this submission, by rejecting the draft legislation President Ramaphosa would at the very least defer any action on the part of USTR to revoke South Africa’s GSP eligibility.

In short, we argue that:

  • Protection of intellectual property both in the U.S. and in South Africa is mutually beneficial;
  • Duty-free imports from South Africa to the U.S. benefit the citizens of both countries, and those citizens will suffer as a result of the partial or full withdrawal of GSP benefits from South Africa;
  • GSP withdrawal is nonetheless required if South Africa does not adequately and effectively protect U.S. intellectual property;
  • South Africa’s copyright laws currently do not effectively protect the rights of artists; and
  • Two Bills recently passed by South Africa’s Parliament, and championed by U.S.-based evangelists of “fair use,” would further weaken the effectiveness of copyright protection.


Continue reading
Intellectual Property & Licensing

Fair use’s fatal conceit

TOTM My colleague, Neil Turkewitz, begins his fine post for Fair Use Week (read: crashing Fair Use Week) by noting that Many of the organizations celebrating . . .

My colleague, Neil Turkewitz, begins his fine post for Fair Use Week (read: crashing Fair Use Week) by noting that

Many of the organizations celebrating fair use would have you believe, because it suits their analysis, that copyright protection and the public interest are diametrically opposed. This is merely a rhetorical device, and is a complete fallacy.

If I weren’t a recovering law professor, I would just end there: that about sums it up, and “the rest is commentary,” as they say. Alas…

Read the full piece here

Continue reading
Financial Regulation & Corporate Governance

No, The FCC Should Not Have the Power to Cancel Contracts

TOTM Copyright law, ever a sore point in some quarters, has found a new field of battle in the FCC’s recent set-top box proposal. At the . . .

Copyright law, ever a sore point in some quarters, has found a new field of battle in the FCC’s recent set-top box proposal. At the request of members of Congress, the Copyright Office recently wrote a rather thorough letter outlining its view of the FCC’s proposal on rightsholders.

Read the full piece here.

Continue reading
Financial Regulation & Corporate Governance