Академический Документы
Профессиональный Документы
Культура Документы
Submitted to
By Group o. 9 1. Shrey Agarwal (D-2) 2. Vinay Arun (D-6) 3. Archana Ashar (D-7) 4. Apar Bansal (D-11) 5. JayKaran Singh Chadha (D-20) 6. Deeksha igam (D-40) 7. Shwetank Sharma (D-55)
1
Table of Contents
Abstract ...................................................................................................................................................4 1. a. b. c. d. e. 2. a. b. c. d. 3. 4. a. b. c. 5. 6. a. b. c. d. 7. a. b. c. 8. 9. 1. 2. 3. 10. Introduction .....................................................................................................................................5 Need for Cyber Laws ..................................................................................................................5 Cyber Legislations Worldwide .................................................................................................... 5 Cyber Laws in India ....................................................................................................................5 Digital Media Piracy ...................................................................................................................6 Company Analyzed .....................................................................................................................6 Problem Statement ..........................................................................................................................8 Indian Context .............................................................................................................................8 Understanding the Piracy Ecosystem ..........................................................................................8 Factors Impacting Piracy: Global and Indian ..............................................................................8 Effects of Piracy ..........................................................................................................................9 As-Is To-Be Analysis ....................................................................................................................10 Business Solution ..........................................................................................................................11 Pre Crime Stage .........................................................................................................................11 Crime Stage ...............................................................................................................................12 Post Crime .................................................................................................................................14 Global Impact of Piracy ................................................................................................................15 SWOT Analysis.............................................................................................................................17 STRENGTHS ............................................................................................................................17 WEAKNESS .............................................................................................................................18 OPPORTUNITY .......................................................................................................................18 THREATS .................................................................................................................................18 Challenges .....................................................................................................................................19 People ........................................................................................................................................19 Process.......................................................................................................................................19 Technology ................................................................................................................................19 Cost Benefit Analysis ....................................................................................................................20 Actual Scenarios ............................................................................................................................21 HADOPI (France) .....................................................................................................................21 BAIDU (The google of China) ..................................................................................................24 Facebook & Google: Internet Intermediaries under Indian Law...............................................25 Future Scope & Conclusion ......................................................................................................28 2
11.
References .................................................................................................................................29
Figure A How piracy works ......................................................................................................................9 Figure B Business Solution ...................................................................................................................11 Figure C Growth of subscriptions ..........................................................................................................12 Figure D Source: SSKI Media Research, 2007 ........................................................................................20 Figure E Reduction in P2P use ...............................................................................................................23 Figure F India's potential .......................................................................................................................26
Abstract
The Information Technology age has led to the emergence of a dynamic and highly specialized field of law, namely Cyber laws. The unique features of the internet, particularly, its borderless expanse, rapid technological advancements, anonymity, speed of communication & data transfer have posed multiple challenges to legislators of different countries who strive to adapt their existing laws for application in cyberspace or develop new laws to govern the virtual world. In this report, we analyze the cyber laws from a global perspective particularly in the digital media sector. The digital music sector is pushing the limits of consumer choice, extending its business models and reaching out to consumers across the globe. Digital channels have overtaken physical formats to become the dominant revenue stream in the worlds largest market, the US. The digital music market is poised to further expand its reach internationally in 2012. Despite the big steps forward of 2011, digital piracy remains a critical barrier to growth and investment by record companies. More than a quarter of internet users globally (28 per cent) access unauthorized services on a monthly basis, according to IFPI/Nielsen. The report also deals with the battle against digital media piracy and the various cyber laws and business solutions that exist to deal with this issue. Cooperation from a far wider circle of technology and business partners, from advertisers to search engines, is now needed to deal with the problem of piracy.
1. Introduction
a. eed for Cyber Laws
The expression Cyber laws encompasses the legal matrix of cases, statutes, regulations & legal principles that affect persons and institutions to control entry to cyberspace, provide such access, use this space and create hardware and software which enable people to go online to experience this world. To put it simply, Cyber laws constitutes rules and regulations that govern the cyberspace. The rapid development of Internet and Computer technology globally has led to the growth of new forms of transnational crime especially Internet related. These crimes have virtually no boundaries and may affect any country across the globe. Thus, there is a need for awareness and enactment of necessary legislation in all countries for the prevention of computer related crime. Territorially based law-making and law-enforcing authorities find this new environment deeply threatening.
the rest of the world, the existing laws of India also could not handle the various cyber space activities. As such the need arose for a Cyber Law.
Neither piracy, nor the fight against it seems likely to go away anytime soon. Security measures continue to be developed, as do the techniques used to break them, and distribute copyrighted material freely. The international nature of piracy, and the fact that different countries have very different laws about it, is another factor complicating the issue as a whole.
e. Company Analyzed
UTV Software Communications Ltd (UTV), India's first integrated global media and entertainment Company, has seen recent expansion, both in existing businesses and into new growth sectors. The entire UTV focus is on creating, aggregating and disseminating outstanding
content. UTV is a diversified media and entertainment company with content creation abilities across platforms and genres.
Broadcasting
UTV Verticals
TV Content
The company has acquired a controlling stake of 76 percent amounting to Rs.150 million in IT Nation, India's leading online infomediary that focuses on technology markets, covering enterprises, technology resellers and general consumers.
The company plans to invest around Rs.1.2 billion over the next two years to create a combination of Internet space with a portfolio of 10 portals targeted at specific need groups.
2. Problem Statement
a. Indian Context
India is well behind the curve when it comes to fighting digital piracy. No suits against Indian P2P sites, like DesiTorrents, DCTorrent have been filed till date. Infringing sites are hosted DCTorrent, outside India, conferring some protection from the relatively disorganized international protection enforcement efforts of Indian rights holder The problem: How can India enforce copyrights holders. adherence to prevent piracy in the media sector and generate the revenue lost to piracy?
Market Need
Business Environment
Accessibility
Profitability
Legal Framework
Product Pricing
Technology
Law Enforcement
Industry Support
d. Effects of Piracy
STAKEHOLDER
AS-IS(I DIA)
Websites
Search engines are linked to unauthorised content or sites which regularly infringe copyright
Payment Providers
Hosting Providers
Consumers
Low Awareness
Government
In spite of The Indian Information Technology Act and other initiatives taken up by individual states, no strict l legal framework or enforcement is currently happening
4. Business Solution
The biggest crisis that media companies face today and that can be addressed by an effective legal structure is the piracy issue. Piracy can be viewed as a combination of two problems; a social problem and a technological problem. The social problem primarily gives rise to the belief that it is acceptable to download content for free when it is easily available. The technological problem gives rise to the ease and anonymity that pirates use to carry out pirate activities. Hence, a solution has to be a multi-pronged approach and it is seen that such approaches have worked1. The solution proposed here takes into account all the stakeholders that are affected by the piracy issue. The problem has been identified to be occurring in three stages. Pre-crime involves activities that enable the facilitation of piracy. The crime stage is the carrying out of the act and the post-crime stage is where prosecution and follow up occurs.
Blueprint to fight piracy in the media sector
Stakeholders involved Techniques used Actions performed
Government/Legal
Awareness Campaigns
Legitimate services
ISPs
Graduated Response
Website Blocking
Legal Department
Payment Gateways
Legal Prosecution
Sanctions On transactions
11
pirated content. The solution proposes at this stage to carry out awareness campaigns by both ution stakeholders. The government should emphasis the illegality of piracy and the media players must emphasis the availability of legitimate sources through these awareness campaigns. These are continuous process and the activities column describes how this has to be performed. As technology changes both laws and services to consumers must keep up. It has been seen that nations that have implemented such an approach have seen positive results2.
b. Crime Stage
The crime stage is when the act of piracy actually takes place. The internet and ease of information sharing has made it very easy to propagate piracy especially through P2P networks (Peer-to-Peer). A major problem has been the scale to which piracy takes place. Peer). which This scale makes it very difficult to deal with piracy. The solution proposes to use two techniques that have shown progress in the countries where they have been implemented. Graduated Response This is carried out by the ISP (Internet Service Provider). The ISP identifies IP addresses which are downloading illegal content. This IP address is then mapped with the ISPs subscriber list to identify the subscriber. The ISP then calls the subscriber with a first warning that informs the subscriber of the illegality of the usage. If violation is observed again the s calls are repeated. The subscriber is made aware of the possibility of prosecution. The ISP can also throttle the bandwidth to the subscriber. If no improvement is seen the ISP will inform the concerned authorities. All these activities are performed with due regard to the privacy of the subscriber.
12
In Germany, 81 per cent of consumers that download media content illegally believe that warnings with the prospect of consequences would make people stop their illegal activity consequences (GfK, February 2011). In South Korea, government officials report that 70 per cent of infringing users stop their activity on receipt of a first notice. A similar pattern is found on receipt of the second n notice, with 70 per cent of users ceasing to use their account to infringe.3
Half of all online adults aged 15-50 agree that 50 internet suspension or fines for repeatedly downloading content without the copyright owners permission are acceptable Although the law was not yet in place, 14 per cent of P2P users aware of it claimed their behaviour had already changed Most P2P users that had already changed their behaviour as a result of the law (62%) avoid particular unauthorised services altogether New legal measures have the ability to significantly impact P2P as seven in ten users claim they would stop on receipt of a notification with a sanction attached
Website Blocking Along with the graduated response technique, scanning and blocking questionable websites has also shown to be effective in countries that have used the technique. In Belgium, in September 2011, the Antwerp Court of Appeal ordered ISPs Belgacom and Telenet to block access to The Pirate Bay by way of domain name service blocking. Data from comScore shows that this reduced the services audience by 84 per ce between August cent and November 2011. In Italy, ISPs were ordered to block access to The Pirate Bay in February 2010 - at the time, the biggest torrent site in Italy. Once the blocking order was passed, usage of the service fell dramatically and it is still down by 74 per cent (IFPI/Nielsen). The website blocking technique requires that the internet is scanned for questionable websites that illegally distribute content. It is known that most search engines readily yield results of
3
13
these websites if searched for, hence search engines can be used as a way of finding such sites. The trick however is to involve multiple stakeholders. Apart from the ISPs, artists and media distributors must also be able to play a role in scanning through a complaint mechanism. Search engines can and should play a big role here by not featuring illegal websites as search results. Harris Interactive found that 23 per cent of consumers regularly download music illegally using Google as their means to find the content (September 2010). Further research in New Zealand by Ipsos MediaCT (August 2011) also highlighted that search engines direct a significant number of users to unauthorised sources. 54 per cent of users of unauthorised downloads said they found the music through a search engine. In Ireland, this figure was 49 per cent (Ipsos MediaCT, October 2011). A law that mandates responsible behavior on part of search engines will be very effective in blocking out illegal websites. It is also recommended in this solution that a database of violators be maintained to identify repeat violators and take quick action. This database should ideally be at the ISP level with a protocol in place for prosecutors to have access as the need arises.
c. Post Crime
Once crime has been established and identified, laws must be in place to be able to quickly prosecute the violators. Special courts can help with this regard. Payment gateways like VISA, MasterCard etc. must deny services to accused entities, this can go a long way in hampering the activities of pirates. Advertising is also a beg source of revenue for pirates. Advertisers must also refuse to advertise with such websites. Web hosting providers must also play a role in the post-crime scene by pulling down websites of violators. With such a comprehensive situation in place the legitimate media industry can successfully fight piracy. It will need a continuous process and the first few stages of implementation will see illegal sites shut down and new ones mushrooming, but this is not sustainable in the long run. Eventually piracy will be reduced to a great deal using such an approach.
14
Canada: Outdated copyright laws have helped digital piracy flourish, with over one billion songs being downloaded illegally in 2005. The previous government failed to fulfill its long-standing pledge to ratify the 1996 WIPO Treaties. Annual retail sales of music fell by 42 per cent 1999-2005 and 20 per cent of music industry jobs have been lost. It is hoped the new government will take intellectual property more seriously.
China: The largest producer of pirate discs in the world with a physical piracy rate of over 85 per cent. The country also has 64 million broadband lines which is facilitating a rapid growth in digital piracy in a culture where paying little or nothing for music is ingrained. The government has made positive noises about protecting intellectual
Greece: With a physical piracy rate of 50 per cent and legal sales falling by a fifth in the past five years, Greece is a new priority country and one of three priority countries inside the EU. The judicial system is weak and the Fiscal Police remain largely inactive in the fight against piracy.
Indonesia: A major source of imported pirate discs in Australia, Indonesia has failed to control its optical disc plants. There are more than 40 plants in the country and half of them are not even registered with the Ministry of Industry as required. An Intellectual Property Taskforce was established in March 2006 and it is hoped this may lead to a coordinated response to enforcement that has so far been lacking. Italy: Italy is one of the biggest sources of piracy in Western Europe. Organized crime networks are playing an ever-increasing role in the black market trade in music. The governments recent anti-piracy laws and increased police action may help, but the problem is so big it will need a concerted and continuing campaign to have any effect. At
15
the same time, the country also has a developing digital piracy problem with 2.7 million illegal music file-sharers. Mexico: There were nearly 110 million physical pirate products sold in Mexico last year. Digital piracy is also beginning to take-off with more than 570 million tracks being downloaded or swapped illegally in 2005. The authorities have been working with the industry to tackle physical piracy, but a more sustained and widespread approach is needed. Russia: One of the major sources of pirate discs found across Europe, Russia has a lamentable record of prosecuting the criminals behind this trade with only one in four cases resulting in a prosecution. At the same time, the country is host to a large number of copyright infringing websites, such as allofmp3.com, which sell music around the world without the permission of or payment to rights holders. South Korea: Internet piracy is rife in South Korea so it is not surprising that revenues from legal music sales have halved in five years. New technology has enabled the establishment of digital broadcasting services that transmit high-quality music videos to mobile phones via satellite without the rights holders permission. The governments antipiracy campaigns remain sporadic due to the lack of a centrally coordinated enforcement agency. Spain: Major police actions have led to a small significant reduction in physical piracy, although the rate remains unacceptably high (22%) for the sixth consecutive year. Internet piracy is beginning to take off however with nearly 500 million tracks downloaded illegally in Spain last year. The Spanish government needs to close loopholes in its antipiracy laws to take action against digital piracy.
16
6. SWOT Analysis
After looking at various steps taken by companies and governments in various countries this solution has been proposed.
a. STRE GTHS
The solution takes the positive part and tries to minimize the negative impact The solution is more progressive in nature: o It talks about educating the consumers. Companies want the piracy to be reduced but they also dont want to lose the customers. So by educating them about the lawsuits and advantages of using services from legal websites it is helping the music industry as well as consumer. Consumer will be more aware of their action and know about the consequences because in most cases they dont know that they are breaking law. Consumer will get better product and services. Companies will get more revenue and will look to improve their services Working in collaboration with government: o Government needs to play the part in controlling piracy at each stage. Due to piracy government is also losing revenue. Since downloading from illegal sites results in only black money. The owner of the illegal sites doesnt pay any taxes Forcing ISP to maintain database: o The following step helps in tracking the people who are doing illegal activities. Till date ISPs have been protecting their customer. But by including the ISPs in the cost structure of system and forcing ISPs in implementing in second stage will significantly reduce piracy Solution is in sync with worldwide measures that are being taken Sharing of information between various players in the industry would go a long way in consolidating and replicating successful initiatives, which would benefit all players in the long run. As an illustrative, the Andhra Pradesh Film Chamber of Commerce has created an Anti-Video Piracy (AVP) cell since May 2005. This dedicated cell led by a retired SP of the state(currently led by Mr. Keshava Reddy) along with 59 other retired police officers works in tandem with the Government and the law enforcement agencies to fight piracy
17
b. WEAK ESS
Solution wants partnership between company, government, ISPs and customers. If any of them doesnt perform its duties then the solution may not be effective Cyber laws are not uniform throughout the world so it is difficult to catch hold of website owner outside the country. Only way block the website New ventures or startup have to bear the cost of the solution. Majority part (75%) of the cost they have to give in the initial stage when they are just starting. This makes the venture more expensive IT infrastructure cost of ISP increases and their liability also increases
c. OPPORTU ITY
The solution has a scope of improvement With time it is needed to give better IT infrastructure to agencies monitoring piracy. They needed regular investment in R&D for improvement in technology. Today DRM is available as one form of technology but it increases cost of product substantially Government needs to keep assessing the Cyber law. And add new features if conditions of market demand. Implementation of the law is more important than just laying down them and has to constantly invest in infrastructure so as the solution works
d. THREATS
People involved in illegal works will try to find other ways to do piracy. They will try to find loopholes in the system and exploit them for their gain
18
7. Challenges
a. People
The biggest challenge is the people themselves. They need to realize the loss due to piracy. The loss is both in terms of monetary as well as creativity. Educating people about the benefit of using services that are legal is important. The real challenge for the local legislators will be to protect the intellectual property by introducing reasonable remedies and proportionate measures. The goal should be to strike a balance between the fundamental rights involved (privacy, freedom of expression, etc.) and in general to adopt a prudent strategy which takes into consideration the different interests of all the parties involved: content industry, ISP, search engines, payment providers, end users, etc.
b. Process
It will also be crucial to support education programs finalized to promote the respect of intellectual property rights which often are not perceived as a product of an industry but as a good infinitely available and transferable without any particular restraint or fee. Making people realize downloading from illegal sites is equivalent to stealing will be a challenge. The engagement between stakeholders mentioned in the solution will have to be streamlined through a predetermined process with everyones signoff.
c. Technology
Stakeholders like search engines, ISPs and legitimate service providers have a huge role to play. As pirates find newer and cleverer ways of pirating, content technology must keep pace and be able to track and block such illegal services. Technology must be able to address the anonymity of P2P networks that are today the biggest platform for pirated content. The sharing of technological resources among the stakeholders is of importance if a database of repeat offenders is to be maintained which is an integral part of the solution proposed.
19
Assumptions: 1. 65% of the 38% loss in the industry is been assumed to be recoverable 2. Awareness campaigns assumed to cost 5% of incremental PAT 3. Monitoring cost is of 3 employees at a salary of Rs. 30,000 per month
4. Infrastructure cost Rs 25 lakhs 5. Miscellaneous cost Rs 10 lakhs
20
9. Actual Scenarios
1. HADOPI (France)
Situation Overview France became the first country in Europe to introduce graduated response legislation. The Creation and Internet law established a new agency, HADOPI, which sends notices to internet subscribers whose accounts have been used to infringe copyright. If a subscriber ignores two notices within six months and infringes copyright law for the third time in a year, HADOPI can notify a criminal court, which can suspend the internet account for up to a month and levy a fine of up to 1,500. To date there have been more than 700,000 notices sent, which IFPI estimates to have reached around 10 per cent of P2P users in France. Details of law HADOPI -Government agency
The law creates a government agency called HADOPI (High Authority for Transmission of Creative Works and Copyright Protection on the Internet). The agency is vested with the power to police Internet users and is headed by a board of nine members. The composition includes: 3 members appointed by the government 2 members by the legislative bodies 3 members by judicial bodies 1 member appointed by the Superior Council of Artistic and Literary Property 1 government council responsible to the French Ministry of Culture
Goal
To ensure that internet subscribers "screen their internet connections in order to prevent the exchange of copyrighted material without prior agreement from the copyright holders"
Law Enforcement
On receipt of a complaint from a copyright holder or representative, HADOPI may initiate a 'three-strike' procedure:
21
An email message is sent to the offending internet access subscriber, derived from the IP address involved in the claim. The email specifies the time of the claim but neither the object of the claim nor the identity of the claimant. The ISP is then required to monitor the subject internet connection. In addition, the internet access subscriber is invited to install a filter on his internet connection. If, in the 6 months following the first step, a repeat offense is suspected by the copyright holder, his representative, the ISP or HADOPI, the second step of the procedure is invoked. A certified letter is sent to the offending internet access subscriber with similar content to the originating email message. In the event that the offender fails to comply during the year following the reception of the certified letter, and upon accusation of repeated offenses by the copyright holder, a representative, the ISP or HADOPI, the third step of the procedure is invoked. The ISP is required to suspend internet access for the offending internet connection, that which is the subject of the claim, for a specified period of from two months to one year. The internet access subscriber is blacklisted and other ISPs are prohibited from providing an internet connection to the blacklisted subscriber. The service suspension does not, however, interrupt billing, and the offending subscriber is liable to meet any charges or costs resulting from the service termination. Appeal to a court is possible only during the third phase of the action (after the blocking of internet access) and an appeal can result in shortening but not cancellation of the blocking. The burden of proof is on the appellant.
Stakeholders involved
P2P users
ISPs
Stakeholders
Consumer associations
Entertainment industry
Copyright owners
22
Impact & Benefits To date there have been more than 700,000 notices sent, which IFPI estimates to have reached around 10 per cent of P2P users in France A separate study by Ipsos MediaCT, conducted in November 2011, found 90 per cent of P2P users in France were aware of the law and 71 per cent would stop the infringing if they received a notification with potential sanctions as part of th the graduated response programme Half of P2P users aged 15 to 50 (48%) claim the law has or will have a deterrent impact on their illegal behavi act behaviour. There are good indications of the impact HADOPI has had on piracy in its first year of operation. The use of unauthorized P2P networks has sharply declined, with overall P2P use down by 26 per cent since notices started being sent in October 2010 (IFP (IFPI/Nielsen). According to Peer Media Technologies, data on the number of infringing movie downloads initiated on P2P networks in France also shows a dramatic decline since notices started, supporting the view that P2P piracy has seen a significant drop. cy Approximately one in six P2P users (16%), around one million people, claim the roximately new law has or will encourage them to use legal services more.
23
A study commissioned by HADOPI in May 2011 found that among those who had either received a notice or knew someone who had received one, 50 per cent said knowledge or receipt of a notice made them stop their illegal activity and a further 22 per cent said it reduced their illegal consumption.
Source: The Effect of Graduated Response Anti-Piracy Laws on Music Sales:Evidence from an Event Study in France. (Figures are rounded).
China, was a market with huge potential for the music industry. Yet it had suffered from an estimated 99% digital piracy rate in recent years, meaning the legitimate market had operated at only a fraction of its true potential. China had nearly twice as many internet users as the US, but digital music revenues per user were about 1% of that of the US. More than 70% of music sales in China are digital, but the market had achieved a tiny fraction of its potential. In 2010, Chinas overall music sales were worth only US$67 million, making it a smaller market than Ireland. BAIDU is a Chinese web Services Company headquartered in Beijing, People's Republic of China. BAIDU provides an index of over 740 million web pages, 80 million images and offers multimedia content including MP3 music and movies. Solution
In July 2011, BAIDU, Chinas largest search engine created a milestone in the music industrys development in China by striking a partnership with One Stop China - a joint venture between 3 major record companies Universal Music Group Sony BMG Warner Music Group
24
Stakeholders Involved
Stakeholders
BAIDU
Impact & Benefits This deal connected One-Stop's world-class repertoire of licensed music to a massive audience, creating crucial new opportunities for artists BAIDU had agreed to remove all its infringing deep links to music belonging to any of the One-Stop China labels The deal would allow China-based web users to legally download and stream hundreds of thousands of songs for free Under the agreement, BAIDU would pay a fee to the music labels each time a song is downloaded or streamed BAIDU would remunerate music content owners on a per-play and per-download basis for all tracks delivered through the BAIDU MP3 Search service It allowed consumers to download tracks for free from Ting, a new legitimate service supported by advertising revenues It allowed the labels to license 500,000 songs, 10 percent of which will be in Mandarin and Cantonese
Digital ad spending reached $291 million in India last year, compared with $7.4 billion in China and $32.2 billion in the U.S. TV and newspapers in India receive more than 80% of ad
25
spending, while digital services get less than 5%. But India's nascent Internet industry could generate 1.5 million jobs and $45 billion in wealth for investors in the next few years if companies aren't bogged down in litigation. Google Inc. and Facebook Inc., the social-networking giants are set to begin trial in March, 2012 to face charges that they hosted material that "seeks to create enmity, hatred and communal violence" and "will corrupt minds." The complaint refers to obscene content and material that depicted Hindu, Muslim and Christian religious figures in a mocking or offensive manner putting on stark display the legal risks for Internet companies chasing growth in India. These companies are Internet intermediaries as per the provisions of Information Technology Act 2000 (IT Act 2000). Issues
Information Technology Act of 2008 states that intermediaries like blog-hosting platforms and social networks are protected from liability for hosting prohibited content created by their users as long as they remove or disable access to this content within 36 hours of acquiring actual knowledge that it is accessible via their sites or services. The rules further state that actual knowledge can be acquired through self-investigation or notification submitted by others. Impact India's nascent Internet industry could generate 1.5 million jobs and $45 billion in wealth for investors in the next few years if companies aren't bogged down in litigation
26
Stepped-up regulation of social networking is seen as a particular threat to India's Web growth which is the biggest driver of Internet adoption in India It might propel India to follow Chinas example in blocking citizens access to Facebook that would amount to one third of the world blocking access to the social network
Suggestions All subsidiary/Joint ventures companies operating in India that deal in information technology and online environment, must mandatorily establish a server in India. Otherwise, such companies and their websites should not be allowed to operate in India A stringent liability for Indian subsidiaries dealing in information technology and online environment must be established by laws of India More stringent online advertisement and e-commerce provisions must be formulated for Indian subsidiary companies and their websites
27
28
11. References
1. http://www.sethassociates.com/wp-content/uploads/Evolving-Strategies-for-theEnforcement-of-Cyberlaws.pdf 2. http://www.nytimes.com/2010/01/22/business/global/22music.html 3. http://hothardware.com/News/Whats-the-Real-Impact-of-Piracy-on-Music-Sales/ 4. http://www.wisegeek.com/what-is-online-piracy.htm 5. http://mattbrundage.com/publications/online-piracy/ 6. http://www.oxera.com/cmsDocuments/Agenda_October2011/Music%20piracy.pdf 7. http://bbs.stardestroyer.net/viewtopic.php?f=22&t=147229 8. www.nber.org/chapters/c12454.pdf 9. http://www.radioandmusic.com/content/editorial/news/piracy-costs-indian-musicindustry-325-mn-ey 10. http://www.aact.in/Reports.php 11. http://www.aact.in/downloads/reports/March2008EffectsofCounterfeitingErnst&Young.pdf 12. Kampelman, M. M. 1947. The United States and International Copyright. American Journal of International Law 41 (2): 40629.x 13. US facts by Institute for Policy Innovation (IPI)IPI's figures are based on the RIMS II mathematical model maintained by the U.S. Bureau of Economic Analysis.
29