{"id":5007,"date":"2017-03-02T20:40:54","date_gmt":"2017-03-02T20:40:54","guid":{"rendered":"http:\/\/sls.gmu.edu\/cpip\/?p=5007"},"modified":"2026-02-03T21:00:25","modified_gmt":"2026-02-03T21:00:25","slug":"trusted-notifier-program-defended-against-misleading-rhetoric","status":"publish","type":"post","link":"https:\/\/blogs.uakron.edu\/ualawip\/2017\/03\/02\/trusted-notifier-program-defended-against-misleading-rhetoric\/","title":{"rendered":"[Archived Post] Trusted Notifier Program Defended Against Misleading Rhetoric"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-934 size-thumbnail\" src=\"https:\/\/cip2.gmu.edu\/wp-content\/uploads\/sites\/31\/2013\/01\/Technology-2-150x150.jpg\" alt=\"a laptop screen\" width=\"150\" height=\"150\" \/>One year ago, domain name registry Donuts, Inc. and the Motion Picture Association of America (MPAA) entered into an agreement termed the Trusted Notifier Program in a joint effort to combat piracy. The voluntary initiative \u201cintroduced a new way to work towards mitigation of clear and pervasive cases of copyright infringement,\u201d and according to <a href=\"http:\/\/www.donuts.domains\/donuts-media\/blog\/the-trusted-notifier-program-summary-of-one-year-of-mpaa-referrals\" target=\"_blank\" rel=\"noopener\">Donuts&#8217; one-year summary<\/a>, has been a success for \u201crights owners, registrants and the public at large.\u201d<\/p>\n<p>While the program and similar voluntary agreements are not without their detractors, it\u2019s important to separate good-faith criticism from misleading rhetoric. In an <a href=\"http:\/\/www.circleid.com\/posts\/print\/20170301_notice_takedown_borders_and_scale\/\" target=\"_blank\" rel=\"noopener\">article<\/a> posted this week, tech pioneer and Internet security expert Paul Vixie responds to a recent <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2920805\" target=\"_blank\" rel=\"noopener\">paper <\/a>criticizing the Internet Corporation for Assigned Names and Numbers (ICANN), trade associations, and standards organizations for implementing a \u201cprivately ordered online content regulation.\u201d<\/p>\n<p>The rebuttal deconstructs University of Idaho Law Professor Annmarie Bridy\u2019s paper piece by piece, exposing many of the claims as unsubstantiated or misleading. Among other things, Mr. Vixie\u2019s article provides the following evaluations:<\/p>\n<ul>\n<li>No evidence is offered in support of the claim that the sole or primary purpose of voluntary efforts such as the Trusted Notifier Program has been to develop a \u201clarge-scale program of privately ordered online content regulation.&#8221;<\/li>\n<li>Claims that \u201cless sophisticated and economically powerful\u201d ICANN stakeholders take a backseat to rights-holder organization influence have been demonstrated to be false by the existence of new generic top-level domain (gTLD) programs.<\/li>\n<li>No evidence is offered in support of the claim that copyright owners &#8220;appear to be laying the groundwork for a broad program of DNS-based enforcement, with the long-term goal of implementing a UDRP-like procedure for claims of piracy and counterfeiting that are wholly unrelated to any bad-faith or confusing use of domain names.&#8221;<\/li>\n<li>The unregulated nature of the Internet has acted as a \u201cstay out of jail free\u201d card for millions of criminals, and some redress and balance is both inevitable and necessary.<\/li>\n<\/ul>\n<p>In conclusion, Vixie notes that the Trusted Notifier Program represents the engagement of Internet industry stakeholders with rights-holder communities to create efficient takedown-related activities, which is exactly what the Internet technical community told rights holders they should pursue instead of SOPA. The article advises that \u201casking interested parties not to cooperate on matters of their aligned interest will never be effective. Notice and takedown, at scale, without borders, requires mutual cooperation. And that&#8217;s what the Trusted Notifier Program is meant to effect.\u201d<\/p>\n<p><strong>March 27, 2017, update<\/strong>: Bridy&#8217;s response to Vixie&#8217;s post can be read <a href=\"http:\/\/cyberlaw.stanford.edu\/blog\/2017\/03\/response-paul-vixie%E2%80%99s-notice-takedown-borders-and-scale%E2%80%9D\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One year ago, domain name registry Donuts, Inc. and the Motion Picture Association of America (MPAA) entered into an agreement termed the Trusted Notifier Program in a joint effort to combat piracy. The voluntary initiative \u201cintroduced a new way to work towards mitigation of clear and pervasive cases of copyright infringement,\u201d and according to Donuts&#8217; [&hellip;]<\/p>\n","protected":false},"author":3627,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[337,345,711,842,1028],"class_list":["post-5007","post","type-post","status-publish","format-standard","hentry","category-copyright","tag-copyright-2","tag-copyright-infringement","tag-intellectual-property","tag-kevin-madigan","tag-notice-and-takedown"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/posts\/5007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/users\/3627"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/comments?post=5007"}],"version-history":[{"count":1,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/posts\/5007\/revisions"}],"predecessor-version":[{"id":15812,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/posts\/5007\/revisions\/15812"}],"wp:attachment":[{"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/media?parent=5007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/categories?post=5007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uakron.edu\/ualawip\/wp-json\/wp\/v2\/tags?post=5007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}