The EU’s Copyright Directive Risks Creating Two Internets

The European Parliament’s approval of the Copyright Directive is the end of the internet as we know it. This new regulation creates substantial new controls on what we can share online which threaten freedom of expression, undermine creativity, and cement the dominance of technology giants.

The Copyright Directive will create two internets. The first, a heavily censored version for European users, including filters to prevent you from uploading content. The second, a free internet where creativity is encouraged, for everyone else.  By Matthew Lesh

The directive represents everything that’s wrong with the EU’s policymaking process. It was written at a substantial distance from Europeans, heavily influenced by lobbyists and national compromises. There is a serious lack of accountability.
The opposition to the directive was substantial, but it didn’t seem to matter. Over 200 intellectual property academics have warned that the directive serves “narrow sectional interests”. Even substantial parts of the European music industry have raised concerns about the scheme. The Change.org petition opposing the directive has reached over 5.1 million signatories, the most in the website’s history. 

Recently, while some Brits were marching to stay in the EU, thousands of Europeans took to the street in Save the Internet marches.

There are two particularly concerning sections of the law.

Article 11 prevents news aggregators, such as search engines and social media companies, from linking and providing snippets of news articles without paying a “link tax”. 

This is clearly absurd. There is no reason why websites should have to pay for what is, in fact, doing news organisations a favour by linking people to their content. It is the responsibility of news organisations to monetise their content through advertisements or paywalls, not attempt to siphon revenues from more successful technology companies.

In practice, this will concentrate power in the hands of large news sites, who are most likely to reach deals to licence the right to link to each other and other sites. A German study found almost two-thirds of revenue will go to a single publisher, and just 1 per cent to smaller publishers. It’s therefore no surprise that the multinational publishing industry lobbyists pushed the directive.

The internet was supposed to democratise access to information. This article will decrease access to online news. It will be much simpler for most websites to block links than go through the effort and expense of reaching licence deals. In 2014, Google shut down Google News in Spain to avoid legal liability in response to a similar domestic law. It was not worth operating a free service that brings in little revenue at the cost of paying for links.

Article 13 makes platforms (like Google, Facebook, Twitter, Tumblr, and web forums) proactively liable for breaking copyright. It reverses the onus, assuming user-generated content breaks copyright unless proven otherwise. This undermines the essential internet principle that platforms should not be legally responsible for the content produced by their users. 
Platforms are like libraries. When a book breaks copyright or is defamatory it is removed. But you do not sue a library for what authors write, you go straight to the source. While they must remove content on request if it breaks the law, internet platforms should not be liable for everything people say.

Copyright is often unclear and contested. Because they will be legally liable, Facebook, YouTube and other platforms will need to use automated systems to prevent users posting swaths of content from images, videos, and music through to humorous GIFs and memes. In practice, this means new, complex upload filters. 

This is a serious threat to freedom of expression and online creativity, which often involves mixing together various creative sources. It’ll also often result in false positives and, to avoid paying fines, substantial limiting of content where copyright is uncertain.

CapX:             Image: Nick Youngson

You Might Also Read: 

Get Ready For ePrivacy Regulation:

 

 

« Five Tech Trends Driving Cyber Security
Identity Management Fundamentals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

Watch this webinar to see how cloud security posture management (CSPM) tools can fit into your cloud security strategy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

Newtec Services

Newtec Services

IT should be responsive, adaptive, and smart. Now more than ever, you need a business that runs efficiently and can adapt to today's challenges. We can help with custom IT solutions.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Onyxia Cyber

Onyxia Cyber

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.