英文摘要 |
The author has fewer and fewer control over his publication because of theconvenience and generalization of reproduction. Encryption, for example, is a newprotection technique to defend reproduction. The Encryption technique indeed restrictsthe access; however, there will always be other ways to break the rule, which is thedecryption. It becomes a déjá-vu between protection and circumvention. As for theinternet service providers, they often are the ones to be blamed for giving decryption toolsfor the interface. It is now a time that digital technology develops rapidly; hence it isimportant that we should think about how to respond those legal questions and how toprotect copyright on the internet. Internet copyright is not only closely relative totechnology development, but also across the borders. There are conflicts betweencurrent legislation and justice system. There are questions for how to make decisionsbetween digital and criminal policies. It raises doubts for criminal type cataloguewhether it is complete or not. There are concerns worldwide over how to punish ifviolating copyright. Therefore, what and how should our government do for this matter?
When dealing with the digital monster, our government first passed technicalprotection measures in august, 2004, and renamed it as Article 80 -2. TechnologicalProtection Measures. Later, the Legislature amended copyright law of Article 87,Section Ⅰ-⑦and Section Ⅱ for adding new category, which is “Regarding as copyrightinfringement.” in June 2007. This action brings up the infringement issues exist in P2P andinternet service providers.
This study is mainly about the doubts for criminal lawmaking of copyright in thedigital age. The whole structure is closely associated with digital copyright issues,especially the ones relative to criminal protection. There are two main parts in this study,one is technical protection measures and the other is P2P transmission.First of all, there is something strange about technical protection measures in eachcountry, which is prohibition of decryption by copyright owner. To explain it by criminallaw, it is somewhat not fair to give this kind of extreme advanced punishment protection totechnical measures or authors. In other words, use the preparative act to protect propertylegal interests is not without a doubt. Besides, under the Telling is theory rule, It is數位時代著作權刑法的挑戰與因應impossible to find victims. By the Copyright law of Article 91, the least penal is 3 yearsand above, or by Article 96-1 and by Article 80-2Ⅰall says the penal is under 1 year, so itmeant to tell that action of production, import, and supply will be the least accessory type.Second, it is such sarcasm for punishment by personal violation of copyrights as tointellectual property rights which encourages invention, creative work and culturepromotions. It is not effective to protect the authors’ interests or to meet the policyobjectives. What can we do to use the criminal law in the digital environment? It isbetter to find a balance among law enforcement, technology invention, and authors’protection and compensation. The regarding factors are business feasibility, end-user’sdecision cost and social profits. During this stage, we should use few law to intervene ormake laws to control digital copyright transmissions on the internet. Instead, let the freemarket bring out the profit balance between the authors and the end-users. Thus, Article51 -1 in the Revisions of Copyright Law, which referred to the system of hardwaresuppliers’ compulsory licensing levy regime in Germany, is not practical.Third, chapter 5 will discuss America-based internet service providers’responsibilities structures. Then, analyze the ezPeer case at Shihlin District Court. Theruling is very detailed and exceptional, but the verdict is unpersuasive. I will argue aboutthe case by presuming taterschaft not established. Next, prove the questions of neutralbehaviors and aluetter, criminal of omission (unterlassungsdelikte) and give personalopinions. According to this case, the provider should be established as criminal ofomission and abetment (unterlassungsdelikte).
Last, we do not need to introduce DMCA for internet service providers, consideringthat the enforcement could limit more end-users’ fair use of publications that are protectedby copyright law, even could invade privacy. The amendment for the Article 87 SectionⅠ-⑦and Section Ⅱ of copyright law in July, 2007, from the explanation, the normativeelement is not clear. Also the law was purposefully passed and misused burden of proofin order to transfer the risks to internet service providers. We need to think over thematter that allows the defendant himself to prove the evidence not exist is against in dubiopro reo. Besides, it is suggested not to make Article 87 Section Ⅰ-⑦ of copyright lawas constitution elements of abs and risk(abstrakte Gefaechrdungstatbestand) and objectiveconditions of punishment, or there will have gag law and as a result of unfairABSTRACTcompetitions.Consequently, my best verdict is that fair use should be explained as behaviors ofallowable risks, which is the main factor for stopping copyright violation. On the otherhand, I will evaluate the presumption issues about the crime of unauthorized reproductionfrom the case Kuro vs. ezPeer. When dealing with the reproduction cases in the digital age,it is a must to consider the rules of fair use and social profits. From the case, we canunderstand that it is difficult to tell them apart, we should not just retracting the timing ofcriminal law intervention, and then make someone be guilty. As the matter of fact, it is notnecessary to make laws for technical protection measure of digital publication and internetservice provider because it is all about the association of reproduction violation.It will be perfect if we could nullify all the newly amended related articles, but it isnot practical. Amending laws for the standards will be another impossible work byconsidering what this study says. Hence, in conclusion, I suggest making feasible, realistic,and slight changes for the law. |