commit cd10fedd51e66b005d8fe043821c4c8748d6fdc8
Author: gus <[email protected]>
Date: Tue Apr 21 13:00:53 2020 -0400
Update Response template for Tor relay operator to ISP - 2020 edition
---
.../tor-dmca-response/contents.lr | 27 ++++++++++++++--------
1 file changed, 17 insertions(+), 10 deletions(-)
diff --git
a/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
b/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
index 1bbccb8..847ce19 100644
---
a/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
+++
b/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
@@ -6,15 +6,23 @@ title: Response template for Tor relay operator to ISP
---
body:
-Written by the Electronic Frontier Foundation ([EFF](https://www.eff.org/)).
Last updated May 31, 2011.
+Written by the Electronic Frontier Foundation ([EFF](https://www.eff.org/)).
Last updated March 27, 2020.
-Note to Tor relay operators: In this litigious era, anyone providing routing
services may face copyright complaints for transmitted content. Fortunately,
the Digital Millennium Copyright Act safe harbors should provide protections
from many of them both to you and to your upstream provider. If your Internet
host forwards a DMCA copyright complaint to you, you can use this template to
write a response, though you will need to customize it to your situation.
Please also ensure all the statements are true for you. (The Tor Project has an
[abuse collection of
templates](/relay/community-resources/tor-abuse-templates/) to help you respond
to other types of abuse complaints, too.) Before sending any response to your
ISP, you may want to seek the advice of an attorney licensed to practice in
your jurisdiction.
+Note to Tor relay operators: In this litigious era, anyone providing routing
services may face copyright complaints for transmitted content.
+Fortunately, copyright law should provide protections from many of them both
to you and to your upstream provider.
+If your Internet host forwards a copyright complaint to you, you can use this
template to write a response, though you will need to customize it to your
situation.
+Please also ensure all the statements are true for you.
+(The Tor Project has an [abuse collection of
templates](/relay/community-resources/tor-abuse-templates/) to help you respond
to other types of abuse complaints, too.)
+Before sending any response to your ISP, you may want to seek the advice of an
attorney licensed to practice in your jurisdiction.
-This template letter is for informational purposes only and does not
constitute legal advice. Whether and how you should respond when you or your
ISP has received a DMCA notice will turn on the particular facts of your
situation. This template is intended as a starting point, but you should tailor
it to your own circumstances. In addition, it's up to you to comply with your
ISP's terms of service. If you're not comfortable including so much legal
explanation, feel free to invite the ISP to contact EFF for a fuller discussion.
+This template letter is for informational purposes only and does not
constitute legal advice.
+Whether and how you should respond when you or your ISP has received a
copyright notice will turn on the particular facts of your situation.
+This template is intended as a starting point, but you should tailor it to
your own circumstances.
+In addition, it's up to you to comply with your ISP's terms of service.
+If you're not comfortable including so much legal explanation, feel free to
invite the ISP to contact EFF for a fuller discussion.
-If you do not believe the safe harbors apply to your particular situation,
don't use this template as a basis for your response. Specific information
about safe harbor qualification for "transitory digital network communications"
is provided on the Chilling Effects website
[here](https://www.chillingeffects.org/dmca512/faq.cgi#QID586) and also in the
template, below.
-
-Also, if you received this document from anywhere other than the EFF web site
or
[tor-dmca-response](/relay/community-resources/eff-tor-legal-faq/tor-dmca-response),
it may be out of date. Follow the link to get the latest version.
+Also, if you received this document from anywhere other than the EFF web site
or
[tor-dmca-response](/relay/community-resources/eff-tor-legal-faq/tor-dmca-response),
it may be out of date.
+Follow the link to get the latest version.
```
@@ -22,14 +30,13 @@ Dear [ISP]:
Thank you for forwarding me the notice you received from [copyright claimant]
regarding [content]. I would like to assure you that I am not hosting the
claimed infringing materials, and furthermore, the Digital Millennium Copyright
Act's ("DMCA") safe harbors likely protect you from liability arising from this
complaint. The notice is likely based upon misunderstandings about the law and
about some of the software I run.
-
-As you know, the DMCA creates four "safe harbors" for service providers to
protect them from copyright liability for the acts of their users, when the
ISPs fulfill certain requirements. (17 U.S.C. 512) The DMCA's requirements vary
depending on the ISP's role. You may be familiar with the "notice and takedown"
provisions of section 512(c) of the DMCA; however, those do not apply when an
ISP merely acts as a conduit. Instead, the "conduit" safe harbor of section
512(a) of the DMCA has different and less burdensome eligibility requirements,
as the D.C. Circuit Court of Appeals held in RIAA v. Verizon (see
https://www.eff.org/sites/default/files/filenode/RIAA_v_Verizon/20030121-riaa-v-verizon-order.pdf)
and the Eighth Circuit Court of Appeals confirmed in RIAA v. Charter (see
https://w2.eff.org/IP/P2P/Charter/033802P.pdf).
+As you know, the DMCA creates four "safe harbors" for service providers to
protect them from copyright liability for the acts of their users, when the
ISPs fulfill certain requirements. (17 U.S.C. 512) The DMCA's requirements vary
depending on the ISP's role. You may be familiar with the "notice and takedown"
provisions of section 512(c) of the DMCA; however, those do not apply when an
ISP merely acts as a conduit. Instead, the "conduit" safe harbor of section
512(a) of the DMCA has different and less burdensome eligibility requirements,
as the D.C. Circuit Court of Appeals held in RIAA v. Verizon (see
https://scholar.google.com/scholar_case?case=15815830240179540527) and the
Eighth Circuit Court of Appeals confirmed in RIAA v. Charter (see
https://scholar.google.com/scholar_case?case=11547531128234336420).
Under DMCA 512(a), service providers like you are typically protected from
damages for copyright infringement claims if you also maintain "a policy that
provides for termination in appropriate circumstances of subscribers and
account holders of the service provider's system or network who are repeat
infringers." If you have and implement such a policy, and you otherwise qualify
for the safe harbor, you should be free from fear of copyright damages.
-As for what makes a reasonable policy, as the law says, it's one that
terminates subscribers who are repeat infringers. The notification you received
is certainly not proof of the "repeat infringement" that is required under the
law before you need to terminate my account. In fact, it's not even proof of
any copyright infringement; a notice claiming infringement is not the same as a
determination of infringement. I have not infringed any copyrights and do not
intend to do so. Therefore, you should continue to be protected under the DMCA
512(a) safe harbor without taking any further action.
+The copyright notice you received was likely triggered by a program I run
called Tor. Tor is network software that helps users to enhance their privacy,
security, and safety online. It does not host any content. Rather, it is part
of a network of nodes on the Internet that simply pass packets among themselves
before sending them to their destinations, just as any Internet intermediary
does. The difference is that Tor tunnels the connections such that no hop can
learn both the source and destination of the packets, giving users protection
from nefarious snooping on network traffic. The result is that, unlike most
other Internet traffic, the final IP address that the recipient receives is not
the IP address of the sender. Tor protects users against hazards such as
harassment, spam, and identity theft. Initial development of Tor, including
deployment of a public-use Tor network, was a project of the U.S. Naval
Research Laboratory, with funding from ONR and DARPA. (For more on Tor, see
https://www.torproject.org/.) I hope, as an organization committed to
protecting the privacy of its customers, you'll agree that this is a valuable
technology.
-You may be curious about what prompted the faulty notice. It was likely
triggered by a program I run called Tor. Tor is network software that helps
users to enhance their privacy, security, and safety online. It does not host
any content. Rather, it is part of a network of nodes on the Internet that
simply pass packets among themselves before sending them to their destinations,
just as any Internet intermediary does. The difference is that Tor tunnels the
connections such that no hop can learn both the source and destination of the
packets, giving users protection from nefarious snooping on network traffic.
The result is that, unlike most other Internet traffic, the final IP address
that the recipient receives is not the IP address of the sender. Tor protects
users against hazards such as harassment, spam, and identity theft. Initial
development of Tor, including deployment of a public-use Tor network, was a
project of the U.S. Naval Research Laboratory, with funding from ONR and DA
RPA. (For more on Tor, see https://www.torproject.org/.) I hope, as an
organization committed to protecting the privacy of its customers, you'll agree
that this is a valuable technology.
+While the Tor node that I run may appear to be the source of material that is
alleged to be copyright-infringing, I do not host that material. I do not
select the material transmitted through the Tor node that I run, and I have no
practical means of either identifying the source of such material or preventing
its transmission. I do nothing to encourage or promote the use of the Tor
network for copyright infringement. For these reasons, I am not an infringer of
copyright in any materials that are transmitted through the Tor node that I
run, either directly or under a theory of contributory or vicarious liability.
Therefore, you should continue to be protected under the DMCA 512(a) safe
harbor without taking any further action.
Thank you for working with me on this matter. As a loyal subscriber, I
appreciate your notifying me of this issue and hope that the protections of
DMCA 512 put any concerns you may have to rest. If not, please contact me with
any further questions.
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits