Code Wars

Code Wars

10 Years of P2P Software Litigation

Rebecca Giblin

With reference to US, UK, Canadian and Australian secondary liability regimes, this insightful book develops a compelling new theory to explain why a decade of ostensibly successful litigation failed to reduce the number, variety or availability of P2P file sharing applications – and highlights ways the law might need to change if it is to have any meaningful effect in future.

Chapter 9: Can the Secondary Liability Law Respond to Code’s Revolutionary Nature?

Rebecca Giblin

Subjects: law - academic, intellectual property law


So far this book has told the story of the beginning of the P2P file sharing era, tracing the way in which the law and technology evolved in response to efforts by rights holders to end the resulting infringement, and explaining how, after a decade of ostensibly successful litigation, there came to be more P2P file sharing software providers than ever before. It de-masked the revolutionary nature of software code, and highlighted how the physical world assumptions on which the existing law is based cripple its ability to respond to the P2P phenomenon. This final chapter now asks whether the secondary liability law can be reformulated in a way that better responds to the challenges posed by code-based distribution technologies. Starting point: the reasonable alternative design standard Its starting point is the reasonable alternative design standard proposed in 2007 by Menell and Nimmer in one of the most serious, far-reaching and principled attempts to date to fix the problems that permeate the existing secondary liability law. Their proposal has the stated aim of providing “a more flexible framework for addressing the challenges of new technology”.1 Menell and Nimmer persuasively argue that, instead of importing patent law principles to resolve the Betamax case, the 1984 Supreme Court should have adopted a “reasonable alternative design” model like the one incorporated into the US products liability law. This would have been consistent with prior evolutions of the law governing secondary liability for copyright infringement: like contributory and vicarious infringement, the origins of...

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information