The EU’s Copyright Directive Risks Creating Two Internets

The European Parliament’s approval of the Copyright Directive is the end of the internet as we know it. This new regulation creates substantial new controls on what we can share online which threaten freedom of expression, undermine creativity, and cement the dominance of technology giants.

The Copyright Directive will create two internets. The first, a heavily censored version for European users, including filters to prevent you from uploading content. The second, a free internet where creativity is encouraged, for everyone else.  By Matthew Lesh

The directive represents everything that’s wrong with the EU’s policymaking process. It was written at a substantial distance from Europeans, heavily influenced by lobbyists and national compromises. There is a serious lack of accountability.
The opposition to the directive was substantial, but it didn’t seem to matter. Over 200 intellectual property academics have warned that the directive serves “narrow sectional interests”. Even substantial parts of the European music industry have raised concerns about the scheme. The Change.org petition opposing the directive has reached over 5.1 million signatories, the most in the website’s history. 

Recently, while some Brits were marching to stay in the EU, thousands of Europeans took to the street in Save the Internet marches.

There are two particularly concerning sections of the law.

Article 11 prevents news aggregators, such as search engines and social media companies, from linking and providing snippets of news articles without paying a “link tax”. 

This is clearly absurd. There is no reason why websites should have to pay for what is, in fact, doing news organisations a favour by linking people to their content. It is the responsibility of news organisations to monetise their content through advertisements or paywalls, not attempt to siphon revenues from more successful technology companies.

In practice, this will concentrate power in the hands of large news sites, who are most likely to reach deals to licence the right to link to each other and other sites. A German study found almost two-thirds of revenue will go to a single publisher, and just 1 per cent to smaller publishers. It’s therefore no surprise that the multinational publishing industry lobbyists pushed the directive.

The internet was supposed to democratise access to information. This article will decrease access to online news. It will be much simpler for most websites to block links than go through the effort and expense of reaching licence deals. In 2014, Google shut down Google News in Spain to avoid legal liability in response to a similar domestic law. It was not worth operating a free service that brings in little revenue at the cost of paying for links.

Article 13 makes platforms (like Google, Facebook, Twitter, Tumblr, and web forums) proactively liable for breaking copyright. It reverses the onus, assuming user-generated content breaks copyright unless proven otherwise. This undermines the essential internet principle that platforms should not be legally responsible for the content produced by their users. 
Platforms are like libraries. When a book breaks copyright or is defamatory it is removed. But you do not sue a library for what authors write, you go straight to the source. While they must remove content on request if it breaks the law, internet platforms should not be liable for everything people say.

Copyright is often unclear and contested. Because they will be legally liable, Facebook, YouTube and other platforms will need to use automated systems to prevent users posting swaths of content from images, videos, and music through to humorous GIFs and memes. In practice, this means new, complex upload filters. 

This is a serious threat to freedom of expression and online creativity, which often involves mixing together various creative sources. It’ll also often result in false positives and, to avoid paying fines, substantial limiting of content where copyright is uncertain.

CapX:             Image: Nick Youngson

You Might Also Read: 

Get Ready For ePrivacy Regulation:

 

 

« Five Tech Trends Driving Cyber Security
Identity Management Fundamentals »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Information-Technology Promotion Agency (IPA) - Japan

Information-Technology Promotion Agency (IPA) - Japan

IPA is an implementing agency in Japan with a role to address Information Security, IT Systems Reliability and IT Resource Development.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Shield-IOT

Shield-IOT

Shield-IoT provides real-time analytics and cyber security solutions for deployment in mass scale B2B and IIoT networks.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

GV (Google Ventures)

GV (Google Ventures)

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

TechForing

TechForing

TechForing Ltd. works for business organization's cyber security and cyber crime incident managements. We help business to secure their business online.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.