首页 > 最新文献

Masaryk University Journal of Law and Technology最新文献

英文 中文
Addressing Evolving Digital Piracy Through Contributory Liability for Copyright Infringement: The Mobdro Case Study 通过版权侵权的共同责任解决不断发展的数字盗版:Mobdro案例研究
Pub Date : 2023-09-30 DOI: 10.5817/mujlt2023-2-3
Mindaugas Kiškis
Digital piracy, i.e., large-scale commercial copyright infringement online, is a constantly evolving phenomenon. Following the enactment and expansion of online intermediary liability rules, professional pirates have shifted away from easily blockable websites and services. Streaming piracy on dedicated platforms, monetised through embedded services, has become the prevalent model in Europe, as is well illustrated by the Mobdro case study analysed in this article. These dedicated platforms are supported by embedded service providers who, as they are not online intermediaries, can avoid the online intermediary liability regime. One potential solution to this issue could be the application of contributory copyright infringement rules, which are well-established in US copyright law but absent in EU law, to all parties that contribute to digital piracy. The CJEU has opened expressly this path in the recent C-682/18 YouTube and C-683/18 Cyando cases. Based on the CJEU's initiative and the existing precedent of harmonising intellectual property tort rules within EU law, further contributory liability rules could be modelled after US rules by updating the Enforcement Directive 2004/48/EC. Addressing this gap in EU copyright law is crucial for enhancing the effectiveness of digital copyright enforcement against evolving digital piracy.
数字盗版,即网络上大规模的商业性版权侵权,是一个不断演变的现象。随着网络中介责任规则的颁布和扩大,专业盗版已经从容易被封锁的网站和服务转移。在专用平台上的流媒体盗版,通过嵌入式服务盈利,已经成为欧洲流行的模式,正如本文分析的Mobdro案例研究所说明的那样。这些专用平台由嵌入式服务提供商提供支持,因为他们不是在线中介,可以避免在线中介责任制度。这一问题的一个潜在解决方案是,对所有助长数字盗版的各方适用共同版权侵权规则,这一规则在美国版权法中已经确立,但在欧盟法律中却没有。欧洲法院在最近的C-682/18 YouTube和C-683/18 Cyando案件中明确开辟了这条道路。基于欧洲法院的倡议和在欧盟法律内协调知识产权侵权规则的现有先例,进一步的分担责任规则可以通过更新执行指令2004/48/EC来模仿美国规则。解决欧盟版权法中的这一差距对于提高数字版权执法的有效性,打击不断发展的数字盗版至关重要。
{"title":"Addressing Evolving Digital Piracy Through Contributory Liability for Copyright Infringement: The Mobdro Case Study","authors":"Mindaugas Kiškis","doi":"10.5817/mujlt2023-2-3","DOIUrl":"https://doi.org/10.5817/mujlt2023-2-3","url":null,"abstract":"Digital piracy, i.e., large-scale commercial copyright infringement online, is a constantly evolving phenomenon. Following the enactment and expansion of online intermediary liability rules, professional pirates have shifted away from easily blockable websites and services. Streaming piracy on dedicated platforms, monetised through embedded services, has become the prevalent model in Europe, as is well illustrated by the Mobdro case study analysed in this article. These dedicated platforms are supported by embedded service providers who, as they are not online intermediaries, can avoid the online intermediary liability regime. One potential solution to this issue could be the application of contributory copyright infringement rules, which are well-established in US copyright law but absent in EU law, to all parties that contribute to digital piracy. The CJEU has opened expressly this path in the recent C-682/18 YouTube and C-683/18 Cyando cases. Based on the CJEU's initiative and the existing precedent of harmonising intellectual property tort rules within EU law, further contributory liability rules could be modelled after US rules by updating the Enforcement Directive 2004/48/EC. Addressing this gap in EU copyright law is crucial for enhancing the effectiveness of digital copyright enforcement against evolving digital piracy.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136343249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patent-Eligible Invention Requirement Under the European Patent Convention and its Implications on Creations Involving Artificial Intelligence 欧洲专利公约下符合专利条件的发明要求及其对涉及人工智能的创造的影响
Pub Date : 2023-09-30 DOI: 10.5817/mujlt2023-2-4
Liva Rudzite-Celmina
Artificial Intelligence and its subfield, Machine Learning are areas of computer science; thus, they rely on algorithms, models, computer programs and software applicable in numerous areas. Since respective creations involve resources and shift from hardware to software, there is an incentive to protect them legally. Due to their dual nature, the algorithms, models, computer programs, and software might be too “technical” to avail copyright protection but not “technical” enough for a patent. Whereas trade secret protection might not be sufficient means of protection in all cases.The article explores the issues and, as its main argument, builds further on the academic proposals on the sui generis mechanism. It also suggests certification as the potential approach to avail the desired protection instead of diluting the existing protection frameworks. An alternative would be to lie on the complete availability or trade secret protection, none of which would be an adequate balance.
人工智能及其子领域机器学习是计算机科学的领域;因此,他们依赖于算法、模型、计算机程序和适用于许多领域的软件。由于各自的创作涉及资源,并且从硬件转向软件,因此有动机对其进行法律保护。由于它们的双重性质,算法、模型、计算机程序和软件可能过于“技术性”而无法获得版权保护,但又不够“技术性”而不足以获得专利。然而,商业秘密保护可能并非在所有情况下都是充分的保护手段。本文对这些问题进行了探讨,并以此为主要论点,在此基础上进一步构建了有关自定义机制的学术建议。它还建议将认证作为利用所需保护而不是稀释现有保护框架的潜在方法。另一种选择是依赖于完全可用性或商业秘密保护,这两者都不是适当的平衡。
{"title":"Patent-Eligible Invention Requirement Under the European Patent Convention and its Implications on Creations Involving Artificial Intelligence","authors":"Liva Rudzite-Celmina","doi":"10.5817/mujlt2023-2-4","DOIUrl":"https://doi.org/10.5817/mujlt2023-2-4","url":null,"abstract":"Artificial Intelligence and its subfield, Machine Learning are areas of computer science; thus, they rely on algorithms, models, computer programs and software applicable in numerous areas. Since respective creations involve resources and shift from hardware to software, there is an incentive to protect them legally. Due to their dual nature, the algorithms, models, computer programs, and software might be too “technical” to avail copyright protection but not “technical” enough for a patent. Whereas trade secret protection might not be sufficient means of protection in all cases.The article explores the issues and, as its main argument, builds further on the academic proposals on the sui generis mechanism. It also suggests certification as the potential approach to avail the desired protection instead of diluting the existing protection frameworks. An alternative would be to lie on the complete availability or trade secret protection, none of which would be an adequate balance.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136343254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity: Notorious, but Often Misused and Confused Terms 网络安全:臭名昭著,但经常被误用和混淆的术语
Pub Date : 2023-09-30 DOI: 10.5817/mujlt2023-2-5
Jan Kolouch, Daniel Tovarňák, Tomáš Plesník, Michal Javorník
The article deals with the issue of the terminology used in the implementation and provision of cyber and information security. Although this terminology is understood as notoriety, practice shows that there are different perspectives on defining "the same". Nowadays, mainly in the context of the adoption of Directive (EU) 2022/2555 of the European Parliament and of the Council on measures to ensure a high common level of cybersecurity in the Union (NIS 2), there is a need for a consistent interpretation and, in particular, understanding of the terminology used so that cybersecurity and information security can be truly ensured. After analyzing and comparing the various definitions, the paper presents clear, general but universally applicable definitions of key terms. The relationship of these terms is presented within a conceptual model and also through a practical example.
该条款涉及在实施和提供网络和信息安全时使用的术语问题。虽然这个术语被理解为臭名昭著,但实践表明,对“相同”的定义有不同的观点。如今,主要是在通过欧洲议会和理事会关于确保欧盟网络安全高水平共同措施(NIS 2)的指令(EU) 2022/2555的背景下,需要对所使用的术语进行一致的解释,特别是理解,以便真正确保网络安全和信息安全。在分析比较各种定义的基础上,提出了清晰、通用、普遍适用的关键术语定义。这些术语之间的关系是在一个概念模型中提出的,也通过一个实际的例子。
{"title":"Cybersecurity: Notorious, but Often Misused and Confused Terms","authors":"Jan Kolouch, Daniel Tovarňák, Tomáš Plesník, Michal Javorník","doi":"10.5817/mujlt2023-2-5","DOIUrl":"https://doi.org/10.5817/mujlt2023-2-5","url":null,"abstract":"The article deals with the issue of the terminology used in the implementation and provision of cyber and information security. Although this terminology is understood as notoriety, practice shows that there are different perspectives on defining \"the same\". Nowadays, mainly in the context of the adoption of Directive (EU) 2022/2555 of the European Parliament and of the Council on measures to ensure a high common level of cybersecurity in the Union (NIS 2), there is a need for a consistent interpretation and, in particular, understanding of the terminology used so that cybersecurity and information security can be truly ensured. After analyzing and comparing the various definitions, the paper presents clear, general but universally applicable definitions of key terms. The relationship of these terms is presented within a conceptual model and also through a practical example.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136343256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(Un)lock and (Un)loaded: Regulating 3D-Printed Firearms in the Open-source Era after the 2013 Hysteria (Un)lock and (Un)loaded:在2013歇斯底里之后的开源时代规范3d打印枪支
Pub Date : 2023-09-30 DOI: 10.5817/mujlt2023-2-1
David Tan, Ampuan Situmeang, Hari Sutra Disemadi
3D printing, or additive manufacturing, is a fast-evolving technology that is transforming the way humans create things. Anyone can buy a 3D printer for private usage, allowing them to produce totally personalized things in the comfort of their own homes. One 3D-printed commodity, unfortunately, is provoking a huge debate: firearms. Any person may build a completely functional firearm only with a 3D printer, the necessary designs and filament. Thus, bypassing governmental licensing, registration, and fabrication regulations. A surge of scholarships appeared nine years back, alerting people about the dangers of 3D-printed firearms. Following the widespread hysteria, this work offers commentary on the issue of 3D-printed firearms, as well as lessons learnt for a better regulatory framework for these firearms. To establish effective regulatory oversight over illicit ownership and usage of 3D-printed guns, existing law may have to be enhanced. Furthermore, any prospective regulations will almost definitely be closely scrutinized in order to strike a balance between public security concerns and personal liberty. Additionally, many conceivable technological regulations would be unfeasible and would contradict the public interest objective of safeguarding technological development. To better control 3D-printed guns while preserving basic freedoms and technological development, a three-pronged approach has been proposed.
3D打印或增材制造是一项快速发展的技术,正在改变人类创造事物的方式。任何人都可以购买一台3D打印机供私人使用,这样他们就可以在自己舒适的家中制作完全个性化的东西。不幸的是,一种3d打印商品正在引发一场巨大的争论:枪支。任何人都可以用3D打印机、必要的设计和灯丝制造出功能齐全的枪支。因此,绕过政府许可,注册和制造规定。九年前出现了奖学金的激增,提醒人们注意3d打印枪支的危险。在广泛的歇斯底里之后,这项工作提供了对3d打印枪支问题的评论,以及为这些枪支提供更好的监管框架的经验教训。为了建立对非法拥有和使用3d打印枪支的有效监管,现有法律可能必须得到加强。此外,几乎肯定会仔细审查任何未来的规定,以便在公共安全问题和个人自由之间取得平衡。此外,许多可以想象的技术法规是不可行的,并且与保障技术发展的公共利益目标相矛盾。为了更好地控制3d打印枪支,同时保护基本自由和技术发展,提出了一个三管齐下的方法。
{"title":"(Un)lock and (Un)loaded: Regulating 3D-Printed Firearms in the Open-source Era after the 2013 Hysteria","authors":"David Tan, Ampuan Situmeang, Hari Sutra Disemadi","doi":"10.5817/mujlt2023-2-1","DOIUrl":"https://doi.org/10.5817/mujlt2023-2-1","url":null,"abstract":"3D printing, or additive manufacturing, is a fast-evolving technology that is transforming the way humans create things. Anyone can buy a 3D printer for private usage, allowing them to produce totally personalized things in the comfort of their own homes. One 3D-printed commodity, unfortunately, is provoking a huge debate: firearms. Any person may build a completely functional firearm only with a 3D printer, the necessary designs and filament. Thus, bypassing governmental licensing, registration, and fabrication regulations. A surge of scholarships appeared nine years back, alerting people about the dangers of 3D-printed firearms. Following the widespread hysteria, this work offers commentary on the issue of 3D-printed firearms, as well as lessons learnt for a better regulatory framework for these firearms. To establish effective regulatory oversight over illicit ownership and usage of 3D-printed guns, existing law may have to be enhanced. Furthermore, any prospective regulations will almost definitely be closely scrutinized in order to strike a balance between public security concerns and personal liberty. Additionally, many conceivable technological regulations would be unfeasible and would contradict the public interest objective of safeguarding technological development. To better control 3D-printed guns while preserving basic freedoms and technological development, a three-pronged approach has been proposed.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136343253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How the Two Child Abuse Cases Helped to Shape the Test of Originality of Photographic Works 两起虐童案如何影响摄影作品独创性检验
Pub Date : 2023-09-30 DOI: 10.5817/mujlt2023-2-2
Marian Jankovic
The author intends to assess the approach to finding originality in photographic works in the courts of the United States of America and the approach developed by the Court of Justice of the European Union. The means through which such assessment is to be made are two cases, each decided in a respective jurisdiction; nonetheless they are connected via both factual and legal circumstances - both involving child abuse and a dispute regarding a copyright infringement in a photographic work. The article will thoroughly assess the legal circumstances of each case and describe the methods of identification of originality applied therein. Following the said assessment, an analysis of the possible merger of both methods will be conducted, with emphasis on the possible added value for the test of originality applied to photographic works within the copyright framework of the European Union. The author’s intention is to conduct a comparison between both approaches to highlight their individual advantages and disadvantages, with a final assessment of their possible joint application in cases involving copyright infringement of photographic works within the copyright framework of the European Union.
作者打算评估美利坚合众国法院寻找摄影作品原创性的方法和欧洲联盟法院制定的方法。作出这种评估的方式是两种情况,分别由各自的司法管辖区决定;尽管如此,他们还是通过事实和法律环境联系在一起——既涉及虐待儿童,也涉及侵犯摄影作品版权的纠纷。本文将对每一案件的法律情况进行全面的评估,并阐述其中适用的原创性认定方法。在作出上述评估后,我们将分析两种方法合并的可能性,重点是在欧洲联盟版权框架内对摄影作品进行原创性检验可能带来的附加价值。作者的意图是对这两种方法进行比较,以突出其各自的优点和缺点,并最终评估它们在欧盟版权框架内涉及侵犯摄影作品版权的案件中可能的联合应用。
{"title":"How the Two Child Abuse Cases Helped to Shape the Test of Originality of Photographic Works","authors":"Marian Jankovic","doi":"10.5817/mujlt2023-2-2","DOIUrl":"https://doi.org/10.5817/mujlt2023-2-2","url":null,"abstract":"The author intends to assess the approach to finding originality in photographic works in the courts of the United States of America and the approach developed by the Court of Justice of the European Union. The means through which such assessment is to be made are two cases, each decided in a respective jurisdiction; nonetheless they are connected via both factual and legal circumstances - both involving child abuse and a dispute regarding a copyright infringement in a photographic work. The article will thoroughly assess the legal circumstances of each case and describe the methods of identification of originality applied therein. Following the said assessment, an analysis of the possible merger of both methods will be conducted, with emphasis on the possible added value for the test of originality applied to photographic works within the copyright framework of the European Union. The author’s intention is to conduct a comparison between both approaches to highlight their individual advantages and disadvantages, with a final assessment of their possible joint application in cases involving copyright infringement of photographic works within the copyright framework of the European Union.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136343258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On sovereignty 论主权
Pub Date : 2023-06-30 DOI: 10.5817/mujlt2023-1-2
D. Svantesson, S. Haataja, Danielle Ireland-Piper, Kuan-Wei (David) Chen
The concept of sovereignty is more important than ever in the Cyber context, yet it is poorly understood. With this article, we are seeking to contribute towards a shared understanding of the concept of sovereignty by succinctly addressing the following six, interrelated, questions:Who can claim to have sovereignty;Over what can one have sovereignty;What are the consequences of having sovereignty over something;Who can violate sovereignty;What is the threshold for violating sovereignty; andWhat are the consequences of violating sovereignty?However, this article is not limited to a descriptive account of the law as it stands today. A purely descriptive account would not provide a full picture of the complex concept of sovereignty, and we have felt it appropriate to enter the territory of law reform options in parts of the discussion.While sovereignty is a technology-neutral concept and the article addresses it as such, particular attention is directed at sovereignty in the cyber context.
在网络环境下,主权的概念比以往任何时候都更重要,但人们对它的理解却很少。通过这篇文章,我们试图通过简明扼要地解决以下六个相互关联的问题,促进对主权概念的共同理解:谁可以声称拥有主权;对什么可以拥有主权;对某事拥有主权的后果是什么;谁可以侵犯主权;侵犯主权的门槛是多少;侵犯主权的后果是什么?然而,这篇文章并不局限于对当今法律的描述。纯粹的描述性叙述无法全面了解复杂的主权概念,我们认为在部分讨论中进入法律改革选项的领域是适当的。虽然主权是一个技术中立的概念,本文也对此进行了阐述,但特别关注的是网络背景下的主权。
{"title":"On sovereignty","authors":"D. Svantesson, S. Haataja, Danielle Ireland-Piper, Kuan-Wei (David) Chen","doi":"10.5817/mujlt2023-1-2","DOIUrl":"https://doi.org/10.5817/mujlt2023-1-2","url":null,"abstract":"The concept of sovereignty is more important than ever in the Cyber context, yet it is poorly understood. With this article, we are seeking to contribute towards a shared understanding of the concept of sovereignty by succinctly addressing the following six, interrelated, questions:\u0000\u0000Who can claim to have sovereignty;\u0000Over what can one have sovereignty;\u0000What are the consequences of having sovereignty over something;\u0000Who can violate sovereignty;\u0000What is the threshold for violating sovereignty; and\u0000What are the consequences of violating sovereignty?\u0000\u0000However, this article is not limited to a descriptive account of the law as it stands today. A purely descriptive account would not provide a full picture of the complex concept of sovereignty, and we have felt it appropriate to enter the territory of law reform options in parts of the discussion.\u0000While sovereignty is a technology-neutral concept and the article addresses it as such, particular attention is directed at sovereignty in the cyber context.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47599855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
New Regulatory Force of Cyberspace: The Case of Meta’s Oversight Board 网络空间的新监管力量:Meta监督委员会的案例
Pub Date : 2023-06-30 DOI: 10.5817/mujlt2023-1-1
Jan Mazur, Barbora Grambličková
It’s been a few years since Facebook (Meta) instituted its Oversight Board as a new quasi-judicial and regulatory body of one of the most important contemporary cyberspaces. It’s long established that social media platforms, such as Facebook, pose certain challenges to democracies as they, among other issues, allow for spread of fake news and hate speech, shift our perception of reality, or create echo chambers. In reaction to talks of regulating similar platforms, Meta’s self-regulatory attempt of instituting the Oversight Board appears to tackle the issue of content moderation by the platform itself. As the content moderation is one of the main sources of Meta’s problematic reputation (taking down posts, pages of various more or less known persons), the board is potentially significant. The paper analyses the board’s mandate, governance structure and procedures. We look at standard elements of independence of decision-making bodies (such as courts) to establish whether the Oversight Board is structured in a way conducive to independent decision making. We conclude that that structure of the Oversight Board fulfils some of the elements of the de jure judicial independence, however there is a room for improvement. Independence of the Oversight Board from Meta is a vital element of the institution, however we detect connections and dependencies on Meta (Meta needs to agree on changes of the Charter as well as the Bylaws, Meta was profoundly involved in the initial selection of the members, etc.). The whole structure of Oversight Board is heavily impacted by the private law institutes – trust, company, contracts – which might not be able to fully facilitate all the needs of an independent quasi-judicial body. The private structure, lacking necessary participatory mechanisms, does not permit the Oversight Board to gain necessary legitimacy. We also review the Oversight Board’s setup in light of the EU’s 2022 Digital Services Act (DSA), which represents one of the most comprehensive regulations of the social media platforms, including content moderation issues. We conclude that the Oversight Board would also not be compliant with requirements set forth in the DSA. After the adoption of the DSA, a question of compatibility of the Oversight Board with the out-of-court dispute settlement bodies opened.
几年前,脸书(Meta)成立了监督委员会,作为当代最重要的网络空间之一的一个新的准司法和监管机构。长期以来,人们一直认为,脸书等社交媒体平台对民主国家构成了某些挑战,因为它们允许假新闻和仇恨言论的传播,改变我们对现实的看法,或者制造回音室。作为对监管类似平台的回应,Meta成立监督委员会的自律尝试似乎是为了解决平台本身的内容审核问题。由于内容审核是Meta声誉问题的主要来源之一(删除各种或多或少知名人士的帖子和页面),董事会具有潜在的重要意义。本文分析了董事会的任务、治理结构和程序。我们研究决策机构(如法院)独立性的标准要素,以确定监督委员会的结构是否有利于独立决策。我们的结论是,监督委员会的结构符合法律上司法独立的一些要素,但仍有改进的余地。监督委员会与Meta的独立性是该机构的一个重要组成部分,但我们发现了与Meta之间的联系和依赖性(Meta需要就章程和章程的变更达成一致,Meta深入参与了成员的初步选择等),合同——这可能无法完全满足一个独立的准司法机构的所有需求。私人结构缺乏必要的参与机制,使监督委员会无法获得必要的合法性。我们还根据欧盟2022年《数字服务法》(DSA)审查了监督委员会的设置,该法案是社交媒体平台最全面的法规之一,包括内容审核问题。我们的结论是,监督委员会也不符合DSA中提出的要求。DSA通过后,监督委员会与庭外争端解决机构的兼容性问题开始出现。
{"title":"New Regulatory Force of Cyberspace: The Case of Meta’s Oversight Board","authors":"Jan Mazur, Barbora Grambličková","doi":"10.5817/mujlt2023-1-1","DOIUrl":"https://doi.org/10.5817/mujlt2023-1-1","url":null,"abstract":"It’s been a few years since Facebook (Meta) instituted its Oversight Board as a new quasi-judicial and regulatory body of one of the most important contemporary cyberspaces. It’s long established that social media platforms, such as Facebook, pose certain challenges to democracies as they, among other issues, allow for spread of fake news and hate speech, shift our perception of reality, or create echo chambers. In reaction to talks of regulating similar platforms, Meta’s self-regulatory attempt of instituting the Oversight Board appears to tackle the issue of content moderation by the platform itself. As the content moderation is one of the main sources of Meta’s problematic reputation (taking down posts, pages of various more or less known persons), the board is potentially significant. The paper analyses the board’s mandate, governance structure and procedures. We look at standard elements of independence of decision-making bodies (such as courts) to establish whether the Oversight Board is structured in a way conducive to independent decision making. We conclude that that structure of the Oversight Board fulfils some of the elements of the de jure judicial independence, however there is a room for improvement. Independence of the Oversight Board from Meta is a vital element of the institution, however we detect connections and dependencies on Meta (Meta needs to agree on changes of the Charter as well as the Bylaws, Meta was profoundly involved in the initial selection of the members, etc.). The whole structure of Oversight Board is heavily impacted by the private law institutes – trust, company, contracts – which might not be able to fully facilitate all the needs of an independent quasi-judicial body. The private structure, lacking necessary participatory mechanisms, does not permit the Oversight Board to gain necessary legitimacy. We also review the Oversight Board’s setup in light of the EU’s 2022 Digital Services Act (DSA), which represents one of the most comprehensive regulations of the social media platforms, including content moderation issues. We conclude that the Oversight Board would also not be compliant with requirements set forth in the DSA. After the adoption of the DSA, a question of compatibility of the Oversight Board with the out-of-court dispute settlement bodies opened.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48396020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Playing the System 玩弄体制
Pub Date : 2023-06-30 DOI: 10.5817/mujlt2023-1-5
Iván David, R. Leška
In the first part of the study, we summarize the existing types of copyright bots. In the second part, we present the current state of legal research on the implementation of copyright bots and our own analysis which focuses on the Czech Supreme Court’s decision concerning copyright bots. The core of this paper concerns the impact of copyright bots on the work of sampling musicians and how the creativity of musicians is shaped by their struggle to avoid detection of sampled music by bots in the online environment.
在研究的第一部分,我们总结了现有的版权机器人类型。在第二部分中,我们介绍了关于版权机器人实施的法律研究现状,以及我们自己的分析,重点是捷克最高法院关于版权机器人的裁决。本文的核心涉及版权机器人对采样音乐家工作的影响,以及音乐家在网络环境中如何通过努力避免机器人检测采样音乐来塑造他们的创造力。
{"title":"Playing the System","authors":"Iván David, R. Leška","doi":"10.5817/mujlt2023-1-5","DOIUrl":"https://doi.org/10.5817/mujlt2023-1-5","url":null,"abstract":"In the first part of the study, we summarize the existing types of copyright bots. In the second part, we present the current state of legal research on the implementation of copyright bots and our own analysis which focuses on the Czech Supreme Court’s decision concerning copyright bots. The core of this paper concerns the impact of copyright bots on the work of sampling musicians and how the creativity of musicians is shaped by their struggle to avoid detection of sampled music by bots in the online environment.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47318348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengthening of EU regulatory intervention against data exploitations by online platforms with a zero-price business model 加强欧盟对采用零价格商业模式的在线平台利用数据的监管干预
Pub Date : 2023-06-30 DOI: 10.5817/mujlt2023-1-4
A. Tóth
The article aims to analyse the relationship between data protection and online platforms’ zero-price business model. This business model functions in a way that online platforms provide their services “free of charge”, but in exchange for personal data. This business model may not only come with competition problems, but also is detrimental to data protection principles, such as the principle of data minimisation. Users are unaware of the value of the personal data they provide, partly due to the false illusion of the service being free of charge. This market failure could be remedied by regulations that would ensure that users are able to use online services that are currently zero-price without providing personal data.
本文旨在分析数据保护与在线平台零价格商业模式之间的关系。这种商业模式的运作方式是,在线平台“免费”提供服务,但以换取个人数据。这种商业模式不仅可能带来竞争问题,而且不利于数据保护原则,例如数据最小化原则。用户不知道他们提供的个人数据的价值,部分原因是该服务是免费的。这种市场失灵可以通过法规来弥补,这些法规将确保用户能够在不提供个人数据的情况下使用目前为零价格的在线服务。
{"title":"Strengthening of EU regulatory intervention against data exploitations by online platforms with a zero-price business model","authors":"A. Tóth","doi":"10.5817/mujlt2023-1-4","DOIUrl":"https://doi.org/10.5817/mujlt2023-1-4","url":null,"abstract":"The article aims to analyse the relationship between data protection and online platforms’ zero-price business model. This business model functions in a way that online platforms provide their services “free of charge”, but in exchange for personal data. This business model may not only come with competition problems, but also is detrimental to data protection principles, such as the principle of data minimisation. Users are unaware of the value of the personal data they provide, partly due to the false illusion of the service being free of charge. This market failure could be remedied by regulations that would ensure that users are able to use online services that are currently zero-price without providing personal data.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48966244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Unwanted Paradoxes Of the Right to Be Forgotten 被遗忘权的不受欢迎的悖论
Pub Date : 2023-06-30 DOI: 10.5817/mujlt2023-1-3
Lusine Vardanyan, Hovsep Kocharyan, Ondrej Hamuľák, Matúš Mesarčík, T. Kerikmäe, Tea Kookmaa
The dynamic development of digital and informational technologies raises the issue of proper and effective protection of human privacy, which, in turn, is gradually turning from a real fundamental right into a kind of illusion. Just a piece of information about an individual distributed on the Internet may leave its negative and often indelible mark on the life and reputation of the addressee of such information, regardless of the legality and reliability of such information. And even if such information is subsequently recognized as false and/or vicious and even removed from public access, the addressee of the information will still be associated with such information in the social consciousness. In this regard, each person is at risk on the Internet, where anyone can potentially become the victim of a single publication or a post of an Internet user. In this context the emergence of the phenomenon of the right to be forgotten in European legal reality may be considered as a step forward in the question of human privacy protection in the digital age. However, this right is not without drawbacks. The most significant of these drawbacks will be analyzed in this paper, such as the practical difficulties of thoroughly exercising this right and the difficulties posed by new technological developments.
数字和信息技术的动态发展提出了适当和有效保护人类隐私的问题,这反过来又逐渐从一项真正的基本权利变成一种幻想。不管这些信息的合法性和可靠性如何,在互联网上散布的关于个人的一条信息可能会给收件人的生活和声誉留下负面的、往往是不可磨灭的印记。即使这些信息后来被认为是虚假的和/或恶毒的,甚至被从公众的视野中移除,但在社会意识中,信息的接受者仍然会与这些信息联系在一起。在这方面,每个人在互联网上都处于危险之中,任何人都有可能成为互联网用户的单一出版物或帖子的受害者。在这种情况下,欧洲法律现实中出现的被遗忘权现象可被视为数字时代人类隐私保护问题的一个进步。然而,这种权利并非没有缺点。本文将分析其中最重要的缺陷,例如彻底行使这一权利的实际困难以及新技术发展所带来的困难。
{"title":"The Unwanted Paradoxes Of the Right to Be Forgotten","authors":"Lusine Vardanyan, Hovsep Kocharyan, Ondrej Hamuľák, Matúš Mesarčík, T. Kerikmäe, Tea Kookmaa","doi":"10.5817/mujlt2023-1-3","DOIUrl":"https://doi.org/10.5817/mujlt2023-1-3","url":null,"abstract":"The dynamic development of digital and informational technologies raises the issue of proper and effective protection of human privacy, which, in turn, is gradually turning from a real fundamental right into a kind of illusion. Just a piece of information about an individual distributed on the Internet may leave its negative and often indelible mark on the life and reputation of the addressee of such information, regardless of the legality and reliability of such information. And even if such information is subsequently recognized as false and/or vicious and even removed from public access, the addressee of the information will still be associated with such information in the social consciousness. In this regard, each person is at risk on the Internet, where anyone can potentially become the victim of a single publication or a post of an Internet user. In this context the emergence of the phenomenon of the right to be forgotten in European legal reality may be considered as a step forward in the question of human privacy protection in the digital age. However, this right is not without drawbacks. The most significant of these drawbacks will be analyzed in this paper, such as the practical difficulties of thoroughly exercising this right and the difficulties posed by new technological developments.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43644945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Masaryk University Journal of Law and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1