User Generated Law
Show Less

User Generated Law

Re-Constructing Intellectual Property Law in a Knowledge Society

Edited by Thomas Riis

Engaging and innovative, User Generated Law offers a new perspective on the study of intellectual property law. Shifting research away from the study of statutory law, contributions from leading scholars explore why and how self-regulation of intellectual property rights in a knowledge society emerges and develops. Analysing examples of self-regulation in the intellectual property law based industries, this book evaluates to what extent user generated law is an accurate model for explaining and understanding this process.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 10: Private enforcement of IP law by internet service providers: notice and action procedures

Clement Salung Petersen and Thomas Riis


Internet service providers (ISPs) play a significant role in our current knowledge-based society by providing services for internet access, use, or participation. ISPs facilitate structured exchange of information for the benefit of internet users and are able to control information exchange within their services. As a response to the inefficiency of litigation and other traditional means of law enforcement, private forms of dispute resolution and law enforcement have emerged which have largely replaced traditional means of law enforcement when it comes to dealing with allegedly illegal content and activity in internet services. This chapter concerns one significant example of private means devoted to law enforcement: the so-called notice and action (N & A) procedures. ISPs use N & A procedures to handle notifications from third parties about allegedly illegal content or activity on an internet platform, usually in order to avoid liability for making such content available for the public. When notified of illegal content, the ISP may, for example, remove the content (notice-and-takedown procedure), block access to the content, or request that it be voluntarily taken down by the person who posted it online. Organizations using N & A procedures include providers of hosting services, social media (such as Facebook and YouTube), search engines (such as Google and Bing), P2P file-sharing services and cyberlockers. In this chapter, we will use the user generated law model presented in Chapter 1 to analyse the emergence and development of these N & A procedures.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.