Technologie en recht
Nooren, P.; Gorp, N. van; van Eijk, N.; Fahy, R. Should We Regulate Digital Platforms? A New Framework for Evaluating Policy Options Journal Article Policy & Internet, 2018 , pp. 264-301, 2018. @article{Nooren2018,
title = {Should We Regulate Digital Platforms? A New Framework for Evaluating Policy Options}, author = {Nooren, P. and Gorp, N. van and van Eijk, N. and Fahy, R.}, url = {https://www.ivir.nl/publicaties/download/Policy_and_Internet_2018.pdf}, doi = {https://doi.org/10.1002/poi3.177}, year = {2018}, date = {2018-09-11}, journal = {Policy & Internet}, volume = {2018}, pages = {264-301}, abstract = { The economic and societal impact of digital platforms raises a number of questions for policymakers, including whether existing regulatory approaches and instruments are sufficient to promote and safeguard public interests. This article develops a practical framework that provides structure and guidance to policymakers who design policies for the digital economy. The framework differs from other approaches in taking the digital business models of platforms as the starting point for the analysis. The framework consists of three pillars, namely determining a platform's characteristics, relating these to public interests, and formulating policy options. The framework then invokes a return‐path analysis for assessing how the interventions affect the business model, whether it has the desired effect on public interests, and ensuring it has no undesired side‐effects on public interests. The framework puts forward two key messages for current discussions on digital platforms. First, one should look at the underlying characteristics of platforms rather than trying to understand digital platforms as a single category. Second, policymakers should explore existing rules and policy options, as they seem fit to deal with several characteristics of digital platforms in a time frame that matches the rapid development of platform technologies and business models. }, <p>The economic and societal impact of digital platforms raises a number of questions for policymakers, including whether existing regulatory approaches and instruments are sufficient to promote and safeguard public interests. This article develops a practical framework that provides structure and guidance to policymakers who design policies for the digital economy. The framework differs from other approaches in taking the digital business models of platforms as the starting point for the analysis. The framework consists of three pillars, namely determining a platform's characteristics, relating these to public interests, and formulating policy options. The framework then invokes a return‐path analysis for assessing how the interventions affect the business model, whether it has the desired effect on public interests, and ensuring it has no undesired side‐effects on public interests. The framework puts forward two key messages for current discussions on digital platforms. First, one should look at the underlying characteristics of platforms rather than trying to understand digital platforms as a single category. Second, policymakers should explore existing rules and policy options, as they seem fit to deal with several characteristics of digital platforms in a time frame that matches the rapid development of platform technologies and business models.</p>
|
Möller, C.; McGonagle, T. Europe's Internet Policies: The Challenge of Maintaining an Open Internet Book Chapter pp. 153-183, 2018, ISBN: 9781783208869, (<p>Chapter in: Comparative Media Policy, Regulation and Governance in Europe: Unpacking the Policy Cycle, ed. L. d' Haenens, H. Sousa & J. Trappel, Bristol: Intellect, 2018.</p>). @inbook{M\"{o}ller2018c,
title = {Europe's Internet Policies: The Challenge of Maintaining an Open Internet}, author = {M\"{o}ller, C. and McGonagle, T.}, isbn = {9781783208869}, year = {2018}, date = {2018-08-23}, pages = {153-183}, note = {<p>Chapter in: Comparative Media Policy, Regulation and Governance in Europe: Unpacking the Policy Cycle, ed. L. d' Haenens, H. Sousa & J. Trappel, Bristol: Intellect, 2018.</p>}, keywords = {}, pubstate = {published}, tppubtype = {inbook} } |
Poort, J.; van Eijk, N. Digital fixation: the law and economics of a fixed e-book price Journal Article International Journal of Cultural Policy, 23 (4), pp. 464-481, 2017. @article{Poort2017,
title = {Digital fixation: the law and economics of a fixed e-book price}, author = {Poort, J. and van Eijk, N.}, url = {http://www.ivir.nl/publicaties/download/1586.pdf}, year = {2017}, date = {2017-04-28}, journal = {International Journal of Cultural Policy}, volume = {23}, number = {4}, pages = {464-481}, abstract = { Fifteen OECD countries, ten of which EU members, have regulation for fixing the price of printed books. At least eight of these have extended such regulation to e-books. This article investigates the cultural and economic arguments as well as the legal context concerning a fixed price for e-books and deals with the question of how the arguments for and against retail price maintenance for e-books should be weighted in the light of the evidence. It concludes that while the evidence in defence of a fixed price for printed books is slim at best, the case for a fixed price for e-books is weaker still while the legal acceptability within EU law is disputable. Against this background, introducing a fixed price for e-books is ill-advised.
}, <p>
Fifteen OECD countries, ten of which EU members, have regulation for fixing the price of printed books. At least eight of these have extended such regulation to e-books. This article investigates the cultural and economic arguments as well as the legal context concerning a fixed price for e-books and deals with the question of how the arguments for and against retail price maintenance for e-books should be weighted in the light of the evidence. It concludes that while the evidence in defence of a fixed price for printed books is slim at best, the case for a fixed price for e-books is weaker still while the legal acceptability within EU law is disputable. Against this background, introducing a fixed price for e-books is ill-advised.</p> |
Caspers, M. The Commission’s proposed TDM exception: Who’s to benefit? Online 2016, visited: 15.09.2016, (Post on Kluwer Copyright Blog). @online{Caspers2016,
title = {The Commission’s proposed TDM exception: Who’s to benefit?}, author = {Caspers, M.}, url = {http://kluwercopyrightblog.com/2016/09/15/commissions-proposed-tdm-exception-whos-benefit/}, year = {2016}, date = {2016-09-15}, urldate = {2016-09-15}, note = {Post on Kluwer Copyright Blog}, keywords = {}, pubstate = {published}, tppubtype = {online} } |
N.A.N.M. van Eijk Bijdrage Rondetafelgesprek 11 februari 2016: Computercriminaliteit III Presentation 18.02.2016. @misc{,
title = {Bijdrage Rondetafelgesprek 11 februari 2016: Computercriminaliteit III}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/1726.pdf}, year = {2016}, date = {2016-02-18}, note = { Bijdrage aan Rondetafelgesprek 11 februari 2016, Computercriminaliteit III, Vaste commissie voor Veiligheid en Justitie.
}, |
Caspers, M. The role of Anne Frank’s diary and academic freedom for text & data mining Online 2016, visited: 20.01.2016, (Post on Kluwer Copyright Blog). @online{Caspers2016b,
title = {The role of Anne Frank’s diary and academic freedom for text & data mining}, author = {Caspers, M.}, url = {http://kluwercopyrightblog.com/2016/01/20/the-role-of-anne-franks-diary-and-academic-freedom-for-text-data-mining/}, year = {2016}, date = {2016-01-20}, urldate = {2016-01-20}, note = {Post on Kluwer Copyright Blog}, keywords = {}, pubstate = {published}, tppubtype = {online} } |
Til, H. van; Nooren, P.; Stokking, H.; Gelevert, H.; van Eijk, N.; Fahy, R. Digital platforms: an analytical framework for identifying and evaluating policy options Technical Report 2016, (<p> TNO-rapport 2015, R11271. Bijlage bij Kamerbrief over toekomstbestendige wetgeving.</p> @techreport{Til2016,
title = {Digital platforms: an analytical framework for identifying and evaluating policy options}, author = {Til, H. van and Nooren, P. and Stokking, H. and Gelevert, H. and van Eijk, N. and Fahy, R.}, url = {http://www.ivir.nl/publicaties/download/1703.pdf}, year = {2016}, date = {2016-01-07}, abstract = { Kader om beleidsopties ten aanzien van 'digitale platforms' te analyseren. }, <p> Kader om beleidsopties ten aanzien van 'digitale platforms' te analyseren.</p>
|
Til, H. van; Nooren, P.; Stokking, H.; Gelevert, H.; van Eijk, N.; Fahy, R. Digitale Platforms: een analytisch kader voor het identificeren en evalueren van beleidsopties Technical Report 2016. @techreport{Til2016b,
title = {Digitale Platforms: een analytisch kader voor het identificeren en evalueren van beleidsopties}, author = {Til, H. van and Nooren, P. and Stokking, H. and Gelevert, H. and van Eijk, N. and Fahy, R.}, url = {https://www.ivir.nl/publicaties/download/digitale-platforms_tno-1.pdf}, year = {2016}, date = {2016-01-07}, abstract = { Nederlandse samenvatting van rapport "Digital platforms: an analytical framework for identifying and evaluating policy options".
}, <p>Nederlandse samenvatting van rapport "Digital platforms: an analytical framework for identifying and evaluating policy options".</p>
|
R.F. Fahy; M.M.M. van Eechoud Clinical Legal Education: A Review of the Literature Technical Report 2015. @techreport{,
title = {Clinical Legal Education: A Review of the Literature}, author = {R.F. Fahy and M.M.M. van Eechoud}, url = {http://www.ivir.nl/publicaties/download/1630.pdf}, year = {2015}, date = {2015-09-29}, note = { iLINC (ICT Law Incubators Network), September 2015.
}, |
R.F. Fahy; M.M.M. van Eechoud Establishing Links to Learning Technical Report 2015. @techreport{,
title = {Establishing Links to Learning}, author = {R.F. Fahy and M.M.M. van Eechoud}, url = {http://www.ivir.nl/publicaties/download/1631.pdf}, year = {2015}, date = {2015-09-29}, note = { iLINC (ICT Law Incubators Network), Work Package 3, September 2015.
}, |
M.M.M. van Eechoud Students going cross-border for start-ups Miscellaneous 2015. @misc{,
title = {Students going cross-border for start-ups}, author = {M.M.M. van Eechoud}, url = {http://www.ivir.nl/publicaties/download/1632.pdf}, year = {2015}, date = {2015-09-29}, note = { iLINC Law Incubator Brief, 2015.
}, |
R.F. Fahy; M.M.M. van Eechoud Establishing a Start-up Law Clinic in a Law School - 10 Practical Tips Miscellaneous 2015. @misc{,
title = {Establishing a Start-up Law Clinic in a Law School - 10 Practical Tips}, author = {R.F. Fahy and M.M.M. van Eechoud}, url = {http://www.ivir.nl/publicaties/download/1684.pdf}, year = {2015}, date = {2015-09-29}, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
(Ed.) How to Start-Up A Legal Clinic: Key Considerations Journal Article 2015. @article{,
title = {How to Start-Up A Legal Clinic: Key Considerations}, url = {https://www.ilincnetwork.eu/wp-content/uploads/2015/08/6-PB-How-to-Start-Up-a-Legal-Clinic-Key-Considerations.pdf}, year = {2015}, date = {2015-09-29}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
R.F. Fahy; M.M.M. van Eechoud Establishing a Start-up Law Clinic in Law School: A Practical Guide Technical Report 2015. @techreport{,
title = {Establishing a Start-up Law Clinic in Law School: A Practical Guide}, author = {R.F. Fahy and M.M.M. van Eechoud}, url = {http://www.ivir.nl/publicaties/download/1686.pdf}, year = {2015}, date = {2015-09-29}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } |
A.M. Arnbak Software is ook bij bitcoin altijd politiek Miscellaneous 2015. @misc{,
title = {Software is ook bij bitcoin altijd politiek}, author = {A.M. Arnbak}, url = {https://www.axelarnbak.nl/2015/05/20/10e-column-financieele-dagblad-machtsstrijd-software-is-ook-bij-bitcoin-altijd-politiek/}, year = {2015}, date = {2015-06-05}, note = { Column in Het Financieele Dagblad van 20 mei 2015.
}, |
Arnbak, A. Any Colour You Like: the History (and Future?) of E.U. Communications Security Policy Presentation 14.10.2014, (<p> @misc{,
title = {Any Colour You Like: the History (and Future?) of E.U. Communications Security Policy}, author = {Arnbak, A.}, url = {http://www.ivir.nl/publicaties/download/1421.pdf}, year = {2014}, date = {2014-10-14}, abstract = { This descriptive legal analysis maps and evaluates a four decade legacy of communications security conceptualizations in E.U. law and policy, including four legislative proposals launched in 2013. As the first comprehensive historical analysis of its kind, the paper forwards a range of new scientific contributions in a time secure electronic communications are of historically unparalleled societal, economic and political relevance. Five communications security policy cycles are identified, and their ‘security’ definitions and scope are described. These cycles are: network and information security, data protection, telecommunications, encryption and cybercrime. An evaluation of the current E.U. ‘security’ conceptualizations illuminates the underlying values at stake, the protection offered in current regulations, the formulation of six research themes and an agenda for computer science, political theory and legal research. Despite constitutional values at stake such as privacy and communications freedom and a robust computer science literature, the paper observes a deep lack of conceptual clarity and coherence in E.U. security policymaking. It then concludes that the observed conceptual ambiguity has allowed powerful stakeholders to capture, or paint E.U. network and information security policies in any colour they like.
}, <p>
This descriptive legal analysis maps and evaluates a four decade legacy of communications security conceptualizations in E.U. law and policy, including four legislative proposals launched in 2013. As the first comprehensive historical analysis of its kind, the paper forwards a range of new scientific contributions in a time secure electronic communications are of historically unparalleled societal, economic and political relevance. Five communications security policy cycles are identified, and their ‘security’ definitions and scope are described. These cycles are: network and information security, data protection, telecommunications, encryption and cybercrime. An evaluation of the current E.U. ‘security’ conceptualizations illuminates the underlying values at stake, the protection offered in current regulations, the formulation of six research themes and an agenda for computer science, political theory and legal research. Despite constitutional values at stake such as privacy and communications freedom and a robust computer science literature, the paper observes a deep lack of conceptual clarity and coherence in E.U. security policymaking. It then concludes that the observed conceptual ambiguity has allowed powerful stakeholders to capture, or paint E.U. network and information security policies in any colour they like.</p> |
A.M. Arnbak Twijfels over cyberdiefstal Russische bende Miscellaneous 2014. @misc{,
title = {Twijfels over cyberdiefstal Russische bende}, author = {A.M. Arnbak}, url = {http://www.ivir.nl/publicaties/download/FD_12082014.pdf}, year = {2014}, date = {2014-10-10}, journal = {Het Financieele Dagblad}, note = { Interview, 11 augustus 2014.
}, |
A.M. Arnbak Cybersecurity dekmantel voor digitale boterberg Miscellaneous 2014. @misc{,
title = {Cybersecurity dekmantel voor digitale boterberg}, author = {A.M. Arnbak}, url = {http://www.ivir.nl/publicaties/download/FD_29082014.pdf}, year = {2014}, date = {2014-10-10}, journal = {Het Financieele Dagblad}, note = { Column, 29 augustus 2014.
}, |
Asghari, H.; Eeten, M.J.G. van; Arnbak, A.; van Eijk, N. Security Collapse in the HTTPS Market Journal Article Communications of the ACM, 57 (10), pp. 47-55., 2014, (<p> @article{,
title = {Security Collapse in the HTTPS Market}, author = {Asghari, H. and Eeten, M.J.G. van and Arnbak, A. and van Eijk, N.}, url = {http://www.ivir.nl/publicaties/download/CACM_2014_10.pdf}, year = {2014}, date = {2014-10-10}, journal = {Communications of the ACM}, volume = {57}, number = {10}, pages = {47-55.}, abstract = { HTTPS (Hypertext Transfer Protocol Secure) has evolved into the de facto standard for secure Web browsing. However, widely reported security incidents\textemdashsuch as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed\textemdashhave exposed systemic security vulnerabilities of HTTPS to a global audience. The Edward Snowden revelations\textemdashnotably around operation BULLRUN, MUSCULAR, and the lesser-known FLYING PIG program to query certificate metadata on a dragnet scale\textemdashhave driven the point home that HTTPS is both a major target of government hacking and eavesdropping, as well as an effective measure against dragnet content surveillance when Internet traffic traverses global networks. HTTPS, in short, is an absolutely critical but fundamentally flawed cybersecurity technology. To evaluate both legal and technological solutions to augment the security of HTTPS, our article argues that an understanding of the economic incentives of the stakeholders in the HTTPS ecosystem, most notably the CAs, is essential. We outlines the systemic vulnerabilities of HTTPS, maps the thriving market for certificates, and analyzes the suggested regulatory and technological solutions on both sides of the Atlantic. The findings show existing yet surprising market patterns and perverse incentives: not unlike the financial sector, the HTTPS market is full of information asymmetries and negative externalities, as a handful of CAs dominate the market and have become "too big to fail." Unfortunately, proposed E.U. legislation will reinforce systemic vulnerabilities, and the proposed technological solutions that mostly originate in the U.S. are far from being adopted at scale. The systemic vulnerabilities in this crucial technology are likely to persist for years to come.
}, <p>
HTTPS (Hypertext Transfer Protocol Secure) has evolved into the de facto standard for secure Web browsing. However, widely reported security incidents—such as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed—have exposed systemic security vulnerabilities of HTTPS to a global audience. The Edward Snowden revelations—notably around operation BULLRUN, MUSCULAR, and the lesser-known FLYING PIG program to query certificate metadata on a dragnet scale—have driven the point home that HTTPS is both a major target of government hacking and eavesdropping, as well as an effective measure against dragnet content surveillance when Internet traffic traverses global networks. HTTPS, in short, is an absolutely critical but fundamentally flawed cybersecurity technology.</p> <p> To evaluate both legal and technological solutions to augment the security of HTTPS, our article argues that an understanding of the economic incentives of the stakeholders in the HTTPS ecosystem, most notably the CAs, is essential. We outlines the systemic vulnerabilities of HTTPS, maps the thriving market for certificates, and analyzes the suggested regulatory and technological solutions on both sides of the Atlantic. The findings show existing yet surprising market patterns and perverse incentives: not unlike the financial sector, the HTTPS market is full of information asymmetries and negative externalities, as a handful of CAs dominate the market and have become "too big to fail." Unfortunately, proposed E.U. legislation will reinforce systemic vulnerabilities, and the proposed technological solutions that mostly originate in the U.S. are far from being adopted at scale. The systemic vulnerabilities in this crucial technology are likely to persist for years to come.</p> |
A.M. Arnbak Stortvloed regels moet beveiliging internet verbeteren Miscellaneous 2014. @misc{,
title = {Stortvloed regels moet beveiliging internet verbeteren}, author = {A.M. Arnbak}, url = {http://www.ivir.nl/publicaties/download/FD_30092014.pdf}, year = {2014}, date = {2014-10-10}, journal = {Het Financieele Dagblad}, note = { Column, 30 september 2014.
}, |
N.A.N.M. van Eijk The Internet and the State: A Survey of Key Developments Technical Report Den Haag, 2014. @techreport{,
title = {The Internet and the State: A Survey of Key Developments}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/internet_state.pdf}, year = {2014}, date = {2014-08-19}, pages = {42.}, publisher = {Raad voor Maatschappelijke Ontwikkeling}, address = {Den Haag}, abstract = { This paper sets out to provide a concise overview of key developments in relation to Internet-based services that may have an impact on public policies and ultimately on the state itself. It is intended to support the Netherlands Council for Societal Development (\textit{Raad voor Maatschappelijke Ontwikkeling}, RMO) in preparing its advisory report to the Dutch government on how to deal with the impact of the Internet on society and the state.
}, This paper sets out to provide a concise overview of key developments in relation to Internet-based services that may have an impact on public policies and ultimately on the state itself. It is intended to support the Netherlands Council for Societal Development (Raad voor Maatschappelijke Ontwikkeling, RMO) in preparing its advisory report to the Dutch government on how to deal with the impact of the Internet on society and the state.
|
K. Irion 2014. @misc{,
title = {The Governance of Network and Information Security in the European Union: The European Public-Private Partnership for Resilience (EP3R)}, author = {K. Irion}, url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2075916}, year = {2014}, date = {2014-01-02}, booktitle = {The Secure Information Society, Gaycken, Krueger, Nickolay (eds.)}, pages = {83-116}, publisher = {Springer}, address = {Berlin}, note = { prepublication
}, |
P.B. Hugenholtz Doellijntechnologie Miscellaneous 2013. @misc{,
title = {Doellijntechnologie}, author = {P.B. Hugenholtz}, url = {http://uitgeverijdewereld.nl/article/doellijntechnologie}, year = {2013}, date = {2013-12-06}, note = { In: Het Beste Idee van 2013, J. Baijens (red.), Tilburg: Uitgeverij De Wereld, 2013.
}, |
M.A.A. Oostveen World Wide Web of Your Wide Web?: Juridische aspecten van zoekmachine-personalisatie Journal Article Tijdschrift voor Internetrecht, (6), pp. 173-179, 2013. @article{,
title = {World Wide Web of Your Wide Web?: Juridische aspecten van zoekmachine-personalisatie}, author = {M.A.A. Oostveen}, url = {http://www.ivir.nl/publicaties/download/TvIR_2012.pdf}, year = {2013}, date = {2013-07-11}, journal = {Tijdschrift voor Internetrecht}, number = {6}, pages = {173-179}, abstract = {Het world wide web is een enorme bron van informatie. Iedere internetgebruiker maakt gebruik van zoekmachines om die informatie te kunnen vinden. Veel gebruikers weten echter niet dat zoekresultaten behorende bij een bepaalde zoekterm niet voor iedereen hetzelfde zijn. Dit personaliseren van zoekresultaten heeft aanzienlijke maatschappelijke en juridische gevolgen.}, keywords = {}, pubstate = {published}, tppubtype = {article} } Het world wide web is een enorme bron van informatie. Iedere internetgebruiker maakt gebruik van zoekmachines om die informatie te kunnen vinden. Veel gebruikers weten echter niet dat zoekresultaten behorende bij een bepaalde zoekterm niet voor iedereen hetzelfde zijn. Dit personaliseren van zoekresultaten heeft aanzienlijke maatschappelijke en juridische gevolgen.
|
E.J. Dommering De door het recht bestuurde wereld is altijd virtueel geweest: Daar heeft de computer niets aan veranderd Journal Article NJB, (19), pp. 1266-1272, 2013. @article{,
title = {De door het recht bestuurde wereld is altijd virtueel geweest: Daar heeft de computer niets aan veranderd}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/NJB_2013_19.pdf}, year = {2013}, date = {2013-05-30}, journal = {NJB}, number = {19}, pages = {1266-1272}, abstract = { In dit artikel wordt de uitspraak van de Hoge Raad in de zaak \textit{RuneScape } beschouwd vanuit de invalshoek van het begrip informatie en de betekenis daarvan in maatschappelijke en juridische processen, die naar hun aard altijd virtuele elementen hebben bevat. De stelling van de auteur is dat informatietechnologie scherper zichtbaar heeft gemaakt dat dit zo is, zodat we met nieuwe ogen naar een oude wereld kijken. De scheidslijn die computercriminaliteit met begrippen als materieel en immaterieel goed en ‘gegevens’ en ‘goederen’ heeft getrokken, heeft tot een toenemende verwarring geleid die de rechtszekerheid schaadt.
}, In dit artikel wordt de uitspraak van de Hoge Raad in de zaak RuneScape beschouwd vanuit de invalshoek van het begrip informatie en de betekenis daarvan in maatschappelijke en juridische processen, die naar hun aard altijd virtuele elementen hebben bevat. De stelling van de auteur is dat informatietechnologie scherper zichtbaar heeft gemaakt dat dit zo is, zodat we met nieuwe ogen naar een oude wereld kijken. De scheidslijn die computercriminaliteit met begrippen als materieel en immaterieel goed en ‘gegevens’ en ‘goederen’ heeft getrokken, heeft tot een toenemende verwarring geleid die de rechtszekerheid schaadt.
|
C.A. Jasserand Hosting providers’ liability: Cour de Cassation puts an end to the notice and stay down rule Journal Article Journal of Intellectual Property Law & Practice, (3), pp. 192-193, 2013. @article{,
title = {Hosting providers’ liability: Cour de Cassation puts an end to the notice and stay down rule}, author = {C.A. Jasserand}, url = {http://jiplp.oxfordjournals.org/content/8/3/192.full?keytype=ref&ijkey=RYEiqCDHLNoOVhF}, year = {2013}, date = {2013-03-26}, journal = {Journal of Intellectual Property Law & Practice}, number = {3}, pages = {192-193}, abstract = { In applying the rules on hosting providers' liability, French lower courts have shifted from a notice and take down rule (provided by Article 14 of the E-Commerce Directive and Article 6 of the French implementing law) to a notice and stay down rule (created by the judges). This interpretation was confirmed in 2011 by the Paris Court of Appeal but overruled by the Cour de cassation on 12 July 2012.
}, In applying the rules on hosting providers' liability, French lower courts have shifted from a notice and take down rule (provided by Article 14 of the E-Commerce Directive and Article 6 of the French implementing law) to a notice and stay down rule (created by the judges). This interpretation was confirmed in 2011 by the Paris Court of Appeal but overruled by the Cour de cassation on 12 July 2012.
|
E.J. Dommering Het bestuur als de tovenaarsleerling van ICT Journal Article NJB, (2), pp. 109-115, 2012. @article{,
title = {Het bestuur als de tovenaarsleerling van ICT}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/NJB_2012_2.pdf}, year = {2012}, date = {2012-01-17}, journal = {NJB}, number = {2}, pages = {109-115}, abstract = { De WRR heeft in het rapport i-Overheid een belangrijk onderwerp op de agenda gezet. Het Rathenau Instituut ging hem daarin in 2010 al voor. ICT is een instrument waarmee de nationale en Europese bestuurlijke bureaucratieën en organisaties in het middenveld steeds meer macht over de burgers krijgen, maar ook steeds meer privacyrisico's creëren. ICT blijkt geen 'neutraal' instrument, maar één dat een voortgaande verschuiving van de macht richting bestuur binnen de trias politica versterkt. De reactie van de regering is wat lauw gezien de urgentie van het probleem.
}, De WRR heeft in het rapport i-Overheid een belangrijk onderwerp op de agenda gezet. Het Rathenau Instituut ging hem daarin in 2010 al voor. ICT is een instrument waarmee de nationale en Europese bestuurlijke bureaucratieën en organisaties in het middenveld steeds meer macht over de burgers krijgen, maar ook steeds meer privacyrisico's creëren. ICT blijkt geen 'neutraal' instrument, maar één dat een voortgaande verschuiving van de macht richting bestuur binnen de trias politica versterkt. De reactie van de regering is wat lauw gezien de urgentie van het probleem.
|
J.P. Poort Assessing the value of flexibility in the Dutch office sector using real option analysis Presentation Rotterdam, 26.07.2011. @misc{,
title = {Assessing the value of flexibility in the Dutch office sector using real option analysis}, author = {J.P. Poort}, url = {http://www.ivir.nl/publicaties/download/13%20-%20Poort%20&%20Hoo%20-%20Assessing%20the%20Value%20of%20Flexibility%20in%20the%20Dutch%20Office%20Sector%20using%20Real%20Option%20Analysis.pdf}, year = {2011}, date = {2011-07-26}, publisher = {TU Delft}, address = {Rotterdam}, note = { Proceedings of conference "Building networks for a brighter future"
}, |
Engers, T.M. van; Abel, W.; van Eijk, N.; Jasserand, C.A.; Wiersma, C. Moving Towards Balance: A study into duties of care on the Internet Technical Report 2010. @techreport{,
title = {Moving Towards Balance: A study into duties of care on the Internet}, author = {Engers, T.M. van and Abel, W. and van Eijk, N. and Jasserand, C.A. and Wiersma, C.}, url = {http://www.ivir.nl/publicaties/download/Moving_Towards_Balance.pdf}, year = {2010}, date = {2010-11-09}, pages = {125}, publisher = {WODC / University of Amsterdam}, abstract = { Commissioned by the WODC (Research and Documentation Centre of the Ministry of Security and Justice), research has been conducted on duties of care on the Internet, more specifically from the perspective of Internet service providers. The situation in four countries - the Netherlands, the UK, Germany and France - was researched. The (self-)regulation with respect to five separate themes (Internet security and safety, child pornography, copyright, identity fraud and the trade in stolen goods through Internet platforms) was identified. In addition to this, a significant number of interviews with stakeholders were conducted.
}, <p>
Commissioned by the WODC (Research and Documentation Centre of the Ministry of Security and Justice), research has been conducted on duties of care on the Internet, more specifically from the perspective of Internet service providers. The situation in four countries - the Netherlands, the UK, Germany and France - was researched. The (self-)regulation with respect to five separate themes (Internet security and safety, child pornography, copyright, identity fraud and the trade in stolen goods through Internet platforms) was identified. In addition to this, a significant number of interviews with stakeholders were conducted.</p> |
E.J. Dommering Ik surf, dus ik ben (er geweest) Miscellaneous 2010. @misc{,
title = {Ik surf, dus ik ben (er geweest)}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/Wie_is_u_Dommering_2010.pdf}, year = {2010}, date = {2010-06-10}, booktitle = {Wie is U? Identiteit, privacy en politiek, The Next Ten Years}, publisher = {XS4ALL}, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
N.A.N.M. van Eijk De mythe van onbelemmerde toegang tot internet Journal Article BTG Magazine, 2010 (70), pp. 28, 2010. @article{,
title = {De mythe van onbelemmerde toegang tot internet}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/BTG_magazine_70.pdf}, year = {2010}, date = {2010-05-20}, journal = {BTG Magazine}, volume = {2010}, number = {70}, pages = {28}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
N.A.N.M. van Eijk Zelfregulering: denken in alternatieven Journal Article Computerrecht, (2), pp. 52, 2010. @article{,
title = {Zelfregulering: denken in alternatieven}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/computerrecht_2010_2.pdf}, year = {2010}, date = {2010-04-29}, journal = {Computerrecht}, number = {2}, pages = {52}, note = {Editorial.}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
N.A.N.M. van Eijk; J.P. Poort Legal, Economic and Cultural Aspects of File Sharing Journal Article Communications & Strategies, (77), pp. 35-54, 2010. @article{,
title = {Legal, Economic and Cultural Aspects of File Sharing}, author = {N.A.N.M. van Eijk and J.P. Poort}, url = {http://www.ivir.nl/publicaties/download/Communications&Strategies_2010.pdf}, year = {2010}, date = {2010-04-16}, journal = {Communications & Strategies}, number = {77}, pages = {35-54}, abstract = {This contribution seeks to identify the short and long-term economic and cultural effects of file sharing on music, films and games, while taking into account the legal context and policy developments. The short-term implications examined concern direct costs and benefits to society, whereas the long-term impact concerns changes in the industry's business models as well as in cultural diversity and the accessibility of content. It observes that the proliferation of digital distribution networks combined with the availability of digital technology among consumers has broken the entertainment industries' control over the access to their products. Only part of the decline in music sales can be attributed to file sharing. Despite the losses for the music industry, the increased accessibility of culture renders the overall welfare effects of file sharing robustly positive. As a consequence the entertainment industries, particularly the music industry, have to explore new models to sustain their business.}, keywords = {}, pubstate = {published}, tppubtype = {article} } This contribution seeks to identify the short and long-term economic and cultural effects of file sharing on music, films and games, while taking into account the legal context and policy developments. The short-term implications examined concern direct costs and benefits to society, whereas the long-term impact concerns changes in the industry's business models as well as in cultural diversity and the accessibility of content. It observes that the proliferation of digital distribution networks combined with the availability of digital technology among consumers has broken the entertainment industries' control over the access to their products. Only part of the decline in music sales can be attributed to file sharing. Despite the losses for the music industry, the increased accessibility of culture renders the overall welfare effects of file sharing robustly positive. As a consequence the entertainment industries, particularly the music industry, have to explore new models to sustain their business.
|
N.A.N.M. van Eijk Technologieneutraliteit: 'Dit is geen frequentie' Journal Article BTG Magazine, (68), pp. 14, 2010. @article{,
title = {Technologieneutraliteit: 'Dit is geen frequentie'}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/BTG_magazine_68.pdf}, year = {2010}, date = {2010-03-03}, journal = {BTG Magazine}, number = {68}, pages = { 14}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
E.J. Dommering De vorige en de volgende vijfentwintig jaar Journal Article Computerrecht, (3), pp. 99, 2009. @article{,
title = {De vorige en de volgende vijfentwintig jaar}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/Computerrecht_2009_3.pdf}, year = {2009}, date = {2009-11-25}, journal = {Computerrecht}, number = {3}, pages = {99}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
(Ed.) 'Internetheffing is voorstel uit vorig tijdperk' Periodical 2009. @periodical{,
title = {'Internetheffing is voorstel uit vorig tijdperk'}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/Brinkman_commissie_NRC_Handelsblad.pdf}, year = {2009}, date = {2009-06-26}, journal = {NRC Handelsblad}, pages = {7}, note = { 23 juni 2009
}, |
J.V.J. van Hoboken Legal Space for Innovative Ordering. On the Need to Update Selection Intermediary Liability in the EU Journal Article International Journal of Communications Law & Policy, (13), pp. 2-21, 2009. @article{,
title = {Legal Space for Innovative Ordering. On the Need to Update Selection Intermediary Liability in the EU}, author = {J.V.J. van Hoboken}, url = {http://www.ivir.nl/publicaties/download/legal_space_for_innovative_ordering.pdf}, year = {2009}, date = {2009-03-30}, journal = {International Journal of Communications Law & Policy}, number = {13}, pages = {2-21}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
N.A.N.M. van Eijk File sharing, dat doen we toch allemaal? Journal Article BTG Magazine, (65), pp. 14, 2009. @article{,
title = {File sharing, dat doen we toch allemaal?}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/BTG_magazine_2009.pdf}, year = {2009}, date = {2009-03-18}, journal = {BTG Magazine}, number = {65}, pages = {14}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
N. Helberger; N.A.N.M. van Eijk Ups and downs. Economic and cultural effects of file sharing on music, film and games (authorised translation) Technical Report 2009. @techreport{,
title = {Ups and downs. Economic and cultural effects of file sharing on music, film and games (authorised translation)}, author = {N. Helberger and N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/Ups_And_Downs_authorised_translation.pdf}, year = {2009}, date = {2009-02-27}, note = { Onderzoek door een consortium van TNO Informatie- en Communicatietechnologie, SEO Economisch Onderzoek en het Instituut Voor Informatierecht, in opdracht van de ministeries van OCW, EZ en Justitie, februari 2009.
}, |
N. Helberger; N.A.N.M. van Eijk; J.P. Poort Ups and downs. Economische en culturele gevolgen van file sharing voor muziek, film en games Technical Report 2009. @techreport{,
title = {Ups and downs. Economische en culturele gevolgen van file sharing voor muziek, film en games}, author = {N. Helberger and N.A.N.M. van Eijk and J.P. Poort}, url = {http://www.ivir.nl/publicaties/download/Ups_And_Downs.pdf}, year = {2009}, date = {2009-01-20}, note = { Onderzoek door een consortium van TNO Informatie- en Communicatietechnologie, SEO Economisch Onderzoek en het Instituut Voor Informatierecht, in opdracht van de ministeries van OCW, EZ en Justitie, januari 2009.
}, |
N.A.N.M. van Eijk Over oude tijden die herleven en het konijn uit de hoge hoed Journal Article Mediaforum, (10), pp. 297, 2007. @article{,
title = {Over oude tijden die herleven en het konijn uit de hoge hoed}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/Mf_2007_10.pdf}, year = {2007}, date = {2007-11-01}, journal = {Mediaforum}, number = {10}, pages = {297}, note = {Opinie}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
N.A.N.M. van Eijk Annotatie bij Rb. 's-Gravenhage 21 februari 2007 (XS4ALL / Staat der Nederlanden) Miscellaneous 2007. @misc{,
title = {Annotatie bij Rb. 's-Gravenhage 21 februari 2007 (XS4ALL / Staat der Nederlanden)}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/Annotatie_Computerrecht_2007_3.pdf}, year = {2007}, date = {2007-07-04}, journal = {Computerrecht}, number = {3}, pages = {161-165}, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
E.J. Dommering Veilig Internet Presentation 16.02.2007. @misc{,
title = {Veilig Internet}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/1265.pdf}, year = {2007}, date = {2007-02-16}, note = { Presentatie gehouden op 5 februari 2007 tijdens een debat georganiseerd door De Balie en XS4ALL over filteren op Internet.
}, |
E.J. Dommering Regulating technology: Code is not law Miscellaneous 2006. @misc{,
title = {Regulating technology: Code is not law}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/Regulating_technology.pdf}, year = {2006}, date = {2006-11-23}, booktitle = {Coding Regulation: Essays on the Normative Role of Information Technology, E.J. Dommering & L.F. As}, pages = {1-17}, abstract = { Een analyse van de rol van technologie in de samenleving en de regulering van de risico's van technologie.
}, Een analyse van de rol van technologie in de samenleving en de regulering van de risico's van technologie.
|
E.J. Dommering; L.F. Asscher Coding Regulation: Essays on the Normative Role of Information Technology Book T.M.C. Asser Press, The Hague, 2006. @book{,
title = {Coding Regulation: Essays on the Normative Role of Information Technology}, author = {E.J. Dommering and L.F. Asscher}, url = {http://www.ivir.nl/publicaties/download/1269.pdf}, year = {2006}, date = {2006-11-09}, publisher = {T.M.C. Asser Press}, address = {The Hague}, series = {Information Technology & Law Series}, abstract = { The collected essays in this book concern the intriguing matter of the interaction between law and technology and the normative role of information technology. More precisely, they focus on the way information and communication technologies regulate human behaviour. Can information technology be an alternative to legal regulation and, if so, what are the risks? The issues raised in this book were discussed during a conference entitled \textit{Code as Code}, held in Amsterdam. The report of the debate between leading experts who attended the conference forms the round-up in the book, as do the proposals for a future agenda for research.
}, The collected essays in this book concern the intriguing matter of the interaction between law and technology and the normative role of information technology. More precisely, they focus on the way information and communication technologies regulate human behaviour. Can information technology be an alternative to legal regulation and, if so, what are the risks? The issues raised in this book were discussed during a conference entitled Code as Code, held in Amsterdam. The report of the debate between leading experts who attended the conference forms the round-up in the book, as do the proposals for a future agenda for research.
|
N. Helberger Christophe R. vs Warner Music: French court bans private-copying hostile DRM Journal Article INDICARE Monitor, 2006. @article{,
title = {Christophe R. vs Warner Music: French court bans private-copying hostile DRM}, author = {N. Helberger}, url = {http://www.indicare.org/tiki-read_article.php?articleId=180}, year = {2006}, date = {2006-03-07}, journal = {INDICARE Monitor}, abstract = { France is one of the European countries where a particularly vivid public discussion about DRM and the private copying exception took place. This is thanks to the efforts of French consumer organisations taht initiated a number of court cases dealing with complaints of consumers about CDs and DVDs that could, among others, not be copied and ripped because of technical protection measures in place. This article discusses that latest DRM decision in France, a decision that went one step further than its predecessors when dealing with the difficult question of the relationship between DRM and private copying.
}, France is one of the European countries where a particularly vivid public discussion about DRM and the private copying exception took place. This is thanks to the efforts of French consumer organisations taht initiated a number of court cases dealing with complaints of consumers about CDs and DVDs that could, among others, not be copied and ripped because of technical protection measures in place. This article discusses that latest DRM decision in France, a decision that went one step further than its predecessors when dealing with the difficult question of the relationship between DRM and private copying.
|
N. Helberger The Sony BMG rootkit scandal Journal Article INDICARE Monitor, 2006. @article{,
title = {The Sony BMG rootkit scandal}, author = {N. Helberger}, url = {http://www.indicare.org/tiki-read_article.php?articleId=165}, year = {2006}, date = {2006-02-14}, journal = {INDICARE Monitor}, abstract = { The article will have a closer look at the charges of the EFF and a Californian lawyer against Sony BMG's latest DRM strategy. The Sony BMG case adds a number of new dimensions to the DRM and Consumer debate. The article will highlight some aspects, also against the background of similar recent case law in Europe.
}, The article will have a closer look at the charges of the EFF and a Californian lawyer against Sony BMG's latest DRM strategy. The Sony BMG case adds a number of new dimensions to the DRM and Consumer debate. The article will highlight some aspects, also against the background of similar recent case law in Europe.
|
N. Helberger Using competition law as tool to enforce access to DRM...and failing Journal Article INDICARE Monitor, 2005. @article{,
title = {Using competition law as tool to enforce access to DRM...and failing}, author = {N. Helberger}, url = {http://www.indicare.org/tiki-read_article.php?articleId=150}, year = {2005}, date = {2005-11-02}, journal = {INDICARE Monitor}, abstract = { Apple's tight control over the FairPlay DRM system has caused many iPod users to complain that they cannot play certain files on their iPod, namely the files they bought from other online services, using a different DRM system. The proprietary control over FairPlay is also a thorn in the flesh of iTunes rivals who sought various ways to get around FairPlay's lack of interoperability. The French enterprise VirginMega tried it the legal way and so did it come that Apple's FairPlay was probably also the first case in which a competition authority in Europe had to decide if access to a Digital Rights Management system can be enforced on grounds of competition law.
}, Apple's tight control over the FairPlay DRM system has caused many iPod users to complain that they cannot play certain files on their iPod, namely the files they bought from other online services, using a different DRM system. The proprietary control over FairPlay is also a thorn in the flesh of iTunes rivals who sought various ways to get around FairPlay's lack of interoperability. The French enterprise VirginMega tried it the legal way and so did it come that Apple's FairPlay was probably also the first case in which a competition authority in Europe had to decide if access to a Digital Rights Management system can be enforced on grounds of competition law.
|
J.J.C. Kabel Waarom wij (nog) niet mogen gokken op het internet Journal Article Nota Bene, (4), pp. 33-37, 2004. @article{,
title = {Waarom wij (nog) niet mogen gokken op het internet}, author = {J.J.C. Kabel}, url = {http://www.ivir.nl/publicaties/download/Notabene.pdf}, year = {2004}, date = {2004-03-09}, booktitle = {Verenigingsblad van de Juridische Faculteit der Amsterdamse studenten}, journal = {Nota Bene}, number = {4}, pages = {33-37}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
J.J.C. Kabel Spam: A Terminal Threat to ISPs? The legal position of ISPs concerning their Anti-Spam Policies in the EU after the Privacy & Telecom Directive Journal Article Computer Law Review International (voortz. van Computer und Recht International), (1), pp. 1-5., 2003. @article{,
title = {Spam: A Terminal Threat to ISPs? The legal position of ISPs concerning their Anti-Spam Policies in the EU after the Privacy & Telecom Directive}, author = {J.J.C. Kabel}, url = {http://www.ivir.nl/publicaties/download/anti-spam-policies.pdf}, year = {2003}, date = {2003-09-17}, journal = {Computer Law Review International (voortz. van Computer und Recht International)}, number = {1}, pages = {1-5.}, keywords = {}, pubstate = {published}, tppubtype = {article} } |