Font Size: a A A

Research On Private Copy In Network Environment

Posted on:2014-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:B YuFull Text:PDF
GTID:2176330422957530Subject:Economic Law
Abstract/Summary:PDF Full Text Request
Nowadays, private copying problems frequently appeared in the development ofthe network technology. With the rapid development of network technology, privatecopying becomes more and more easily. The rights of copyright owners have beenhitherto unknown impingement. Involving the private copy of tort disputes on the risesignificantly, in the network environment of the dispute is no exception. For theseviolations, who is responsible for, how to restore the loss caused to the copyright. Andhow the private copy under network environment is qualitative, how to treat thecopyright owners of copyright status and to retain belongs to the social public the scopeof copyright law, the theory origin and the purpose of legislation. These issues deservefurther analysis. The study on the private copy under network environment is discussed,this paper is divided into five parts:The first part will be on personal duplication in the network environment is ageneral overview. Elaborates the connotation of the private copy and form under thenetwork environment, and points out that the object of this research is only a permanentcopy private copy of not including temporary copy.The second part is to the nature of the private copying behavior analysis. Points outthat the private copying is it right? The legal arguments and properties are difficult todetermine because of copyright legislation is not clear, ambiguous and diversifiedprivate copy copy to.The third part will be the private copy of the existing norms model detailedcomparative analysis. Respectively to the copyright compensation system, technicalprotection measures and digital rights management information content are introduced.The fourth part is to analyse the existing problem of private copy under networkenvironment. First of all, defects on the existing strategies of private copying behaviorproblems were discussed, a detailed analysis on the copyright compensation system,technological protection measures and digital rights management information content and shortcomings. Secondly, to discuss issues related to private copying under thenetwork environment brings, and points out that the influence of the private copy undernetwork environment of copyright law, specific performance respectively in threeaspects: the interests of balance, have been imbalance; rational use is no longerreasonable, the nature began to be questioned; judicial protection has been inadequate,need to find problems from other sources solution. Finally, to discuss issues related tocopyright legal system copy private under the network environment in China, focusedon the analysis to our country present stage for the lack of private copying measures andChina’s "copyright law" provisions of the private copy of detailed.The fifth part is to perfect the legal system of the private copy under networkenvironment analysis. On the reasonable position of network of private copying,specific analysis from the nature of the position and range position. And then improvethe existing strategies of private copying behavior analysis, focusing on thecompensation system of copyright, technology protection measures and the advantagesof digital rights management information analysis, pointed out that the most effectivemethod should be their merge each other, complement each other, can play the efficacyand the maximum role. Finally, the private copying of copyright legislation put forwardsome suggestions: first, the "standard" three step test law enacted into law, on China’s"copyright law""rights" in this section. Second, the provisions of the personaldownloading illegal dissemination behavior. Third, the "personal appreciation" out ofthe reasonable use. Fourth, establish the copyright compensation system.
Keywords/Search Tags:private copy, the copyright compensation system, rightsmanagement information
PDF Full Text Request
Related items