EU Internet Law
Show Less

EU Internet Law

Andrej Savin

This timely and detailed book is a state of the art overview of Internet law in the EU, and in particular of the EU regulatory framework which applies to the Internet. At the same time it serves as a critical evaluation of the EU’s policy and governance methods and a comparative analysis, mainly contrasting American with EU solutions.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 5: Liability of intermediaries

Andrej Savin


The Internet’s unique layered structure1 creates three separate relevant categories of actors or subjects. The first are those who create or post information. The second are those who this information targets – the recipients. Although the two roles can be blurred in real life (e.g., a home user can post information on a blog and read other users’ blogs), legally the roles are distinct in that legal action would normally target a subject in one of its roles only. The third actor, the intermediaries, plays an essential role which revolves around three points. First, they enable the flow of information between the two other subjects without contributing to the content. Second, they act as guardians of the users’ identity and anonymity. Third, they are in a unique position to prevent or mitigate the damage that may be inflicted by the other two categories’ illegal activity. As such, they may, under certain circumstances, be liable as contributors. Internet service providers are commercial entities guided by commercial logic. Their operation, however, is not solely determined by market forces but is influenced by groups who desire to control the Internet. In the first place, these are the federal and regional governments2 who exercise force on ISPs to control undesirable behaviour on the Internet. The ISP actions, their cooperation or the lack thereof, can influence a whole range of government policies concerning, among other things, defamation, sexually explicit speech or copyright infringement. For corporations, the intermediaries who possess knowledge of possibly illegal downloading patterns are valuable holders of information

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.