Annual 2019
Annual 2019
ANNUAL REPORT
2019
Developing a digital strategy is a key factor in The reality and context of the digital network
managing twenty-first-century institutions and have brought about major changes in the con-
this year’s AC/E Digital Culture Annual Report, cept of legal protection of works and authors’
the sixth, is an essential working instrument for rights. Current challenges include the need to
strengthening the interaction between Acción balance the interests of creators and users and,
Cultural Española (AC/E) and culture sector at the same time, expand the sources of creativ-
professionals. The performing arts, museums, ity, originality, public domain and compliance
festivals, historical heritage and the book sector with fundamental rights, in accordance with the
are some of the themes we have analysed in WIPO Development Agenda and the Human
depth in past editions. Rights Council of the United Nations.
The Internet is currently the largest platform for This year’s Focus seeks to analyse how distinc-
spreading art and culture, and this trend is un- tive national and regional systems reconcile
stoppable as it goes hand in hand with the pace new objectives in terms of access to works and
of life and the development of the digital society. cultural property with regulatory frameworks for
The emergence of the Internet and the new ICTs creative platforms and for the exchange of visual
has revolutionised the mechanisms for producing art and audiovisual, musical and literary works
and disseminating cultural property, disrupting on the basis of collaboration, innovation and
the traditional standards of authorship. openness. And it does so by taking into account
the many viewpoints on such a complex issue.
The Internet has democratised culture by mak-
ing it accessible to people in all sectors and from Once again, we are relying on the involvement
all walks of life, whereas until only a few years and support of Espacio Fundación Telefónica and
ago works of art were available to much smaller their excellent team to present this new edition
audiences. However, this situation, which might of the Annual Report at an event where experts
seem advantageous at first sight, also entails reflect, and provide practical guidelines, on the
risks, especially for authors and creators, artists, new technologies that affect creators and their
intellectuals, scientists and inventors, who now rights.
have to protect the authorship of their works
and prevent piracy or the plagiarism of what it Ibán García del Blanco
took them so much time and effort to create. Executive President
Although literary plagiarism has always existed, Acción Cultural Española (AC/E)
we have recently witnessed truly striking cases
that have sparked a great deal of controversy.
Digital Trends in Culture
4 CONTENTS
FOCUS 2019: CREATORS AND AUTHORSHIP
IN THE DIGITAL AGE
Introduction
6
DECENTRALISATION AND
SCARCITY - BLOCKCHAIN
AND THE CULTURAL
INDUSTRIES
Sebastian Posth is an entrepreneur and consultant in the publishing industry with a focus
on digital innovation, data analytics, market research and blockchain technology.
Digital Trends in Culture
In 2007, Sebastian founded the first e-book distributor and conversion service on the German
market. He also worked for Arvato (Bertelsmann) as Director Digital Content Distribution. Since
2013, Sebastian is founder and CEO of ‘Publishing Data Networks’, based in Frankfurt am Main.
The company is offering sales and marketing data analytics and market research for e-books and
audiobooks on the German market. As a consultant, Sebastian is offering project management
and product development in the fields of digital innovation and blockchain technology.
structurally change and improve this situation. and the creation of coins, tokens or assets make
Bitcoin, however, provided ‘real digital money’ for the aspect of cryptocurrency an essential part of
the first time in history. the security model of the blockchain technology
itself.
With cryptocurrencies, rather than a network
of centralised institutions, it would be one of
8 DECENTRALISATION AND SCARCITY - BLOCKCHAIN AND THE CULTURAL INDUSTRIES · SEBASTIAN POSTH
Decentralisation their commercial activities, but also for legal
reasons. With offering and running applications,
Bitcoin and other cryptocurrencies have initiated connecting people or maintaining financial or
an ongoing process of innovation and disruption other business transactions, come legal respon-
of the financial industries. And – in the context sibilities and obligations. Most businesses need
of this paper – it is interesting to see how to know their customers and have the power
the underlying structural change will have an to exclude individuals from their services or
effect on other areas or industries as well. To refuse to offer to them in the first place. Users,
fully understand the fundamental and possibly on the other hand, trust known and established
game-changing implications of blockchain brands with their money, data and privacy. In
technology, it is helpful to have a look at how many cases they appreciate their services. In
exactly blockchain makes a difference, and how other cases they depend on them, such as when
it differentiates from the internet as we know it. getting access to a bank account.
It is often said that blockchain can be considered Considering the upsides and downsides of
as a new ‘layer of trust’, that is being added centralised services on the internet, their respon-
‘on top’ of the internet. This is true in many sibilities and power reveal a rather delicate and
ways. Just as the internet allows for direct and fragile infrastructure. It is no coincidence that
immediate exchange of information and data, blockchain and distributed ledger technologies
the blockchain allows for direct and immediate have appeared on the business landscape at a
exchange of value without a centralised and time when the flaws of the current centralised
trusted third party or intermediaries. The term set-up are outnumbering its benefits. Evidence
‘value’ can be understood in the broadest sense: for this can be found by looking at the banking
money, property, licences, engagement, repu- sector, e-commerce or social media platforms:
tation, time, labour, etc. Whereas the internet trust is a value that does not stick, but has to be
needed centralised and trusted institutions in earned and sustained in an iterating manner. And
order to ensure the integrity and legitimacy this is where blockchain comes into play.
of transactions and the transfer of value, the
blockchain networks will take over this role from Blockchain has the potential to disrupt the
now on. power of centralised institutions, companies and
platforms at the same time. As decentralised
In a period of over 15 years, trade has gone commerce emerges, new platforms will arise that
online and social interactions in the broadest will work entirely different in a number of ways.
sense have moved into the cloud. Most compa- Instead of handling and facilitating transactions
nies offer services or access to goods through through their centralised accounts, they will
applications on the internet. But the business support peer-to-peer transactions with various
logic of centralised services on the internet and cryptocurrencies or tokens on different block-
of supply and demand of e-commerce has led chains. Instead of relying on the authority and
to an accumulation of power and control by a reputation of known and trusted enterprises and
limited number of companies. They accepted their brands, transactions will be based on ‘trust
and handled payments and debit management, less trust’, which is established on the block-
Digital Trends in Culture
maintained platform governance or provided chain. No third parties will be needed to oversee
access to services, content and goods or organ- trade any longer, no banks will be needed for
ised logistics and fulfilment. clearing financial transactions or the transfer of
value. International sales will be possible without
It seems all too obvious and legitimate that national currency conversions. Transactions will
businesses need control; not only to perform be borderless, permission-less and censorship
It is the inherent logic of ‘programmable money’, In other words, smart contracts on the Ethereum
that the number of coins, tokens or assets are blockchain are neither smart, nor are they
limited or defined by design. This is where contracts in the common understanding of the
cryptocurrencies derive their value from; their legal term ‘contract’. Instead, smart contracts
10 DECENTRALISATION AND SCARCITY - BLOCKCHAIN AND THE CULTURAL INDUSTRIES · SEBASTIAN POSTH
are deterministic computer programmes that may represent a different value each. In this way,
execute codes according to pre-defined rules, they are not fungible, but simplify transactions,
and that enforce the performance of a defined like the transfer of ownership. Applications that
transaction. Moreover, smart contracts allow use ERC721 tokens will simply attest ownership
basically anyone to create their individual token of specific physical or digital assets by assigning
system for the transfer of value on the blockchain them to the pseudonymous account numbers
or within their decentralised application.6 This of their owners. Apart from the fact that the
way Ethereum has not only drastically simplified ERC721 standard provides a deterministic and
the access to funding capital by allowing compa- computational way of processing transactions,
nies to offer their issued tokens for sale, but also by doing so ‘non-fungible tokens create digital
created new opportunities for innovative business scarcity that can be verified without the need for
models. Transactions triggered by decentralised a centralizing organization to confirm authen-
applications are settled on the native Ethereum ticity. [...] Blockchain technology is significant
blockchain, making use of the underlying security because it enables a decentralized way to main-
of the network and its existing infrastructure such tain distinct, digitally scarce items.’10
as the global network, the broad distribution, the
mining infrastructure and its financial incentives.7
Tokenisation
This model for creating tokens has been proven
to be comparably stable and reliable. Issuance, ERC20 and ERC721 are examples of technical
allocation and transferability are being pro- implementation standards that have been
grammed into an immutable smart contract. On established on the Ethereum blockchain. But
Ethereum, several standards have been estab- tokenisation itself is not limited to the Ethereum
lished to create individual token systems to store network. It is a feature of other blockchains as
or represent value. Here, I would like to mention well, that they support the issuance of individual
two of the standards that allow to create token- new tokens. Nonetheless, Ethereum has become
ised, decentralised services and applications and the most popular platform for start-ups and
have been broadly adopted by the community: developers and needs to be given the credit of
the ERC20 and the ERC721 standard. enabling the rise of new platforms and market-
places.
The ERC20 standard8 supports the creation of
fungible tokens on the Ethereum blockchain. The tokenisation of assets through fungible
This means that the tokens can be issued in and non-fungible tokens can be considered as
a defined, thus limited number by a smart the stimulus for an entire new economic model
contract. These tokens are identical and in- based on blockchain technology and cryptocur-
terchangeable, and they can be used as a unit rencies. Its popularity among the crypto-com-
of account, as a store of value or means of munity is certainly based on the fact that it has
exchange of value of the exact same amount. become comparably easy to create individual
token environments that allow the transfer
The ERC721 standard,9 on the other hand, of value on distributed and decentralised net-
supports the creation of non-fungible tokens works. In fact, it has become so convenient and
Digital Trends in Culture
(NFT) on the Ethereum blockchain. These tokens ubiquitous that many experts in the field are
are limited in number, as well. But unlike ECR20 predicting a ‘tokenisation of everything’.11 The
tokens, the ERC721 tokens are unique, distin- idea implies that every form of asset, digital or
guishable and serialised. They can only be traded physical items or good, property or other storage
as an entire unit and not be split in value. ERC721 of value could eventually be represented by a
are not interchangeable per se, as two tokens token. This is certainly possible from a technical
than 10% of total transactions on the Ethereum claimed ‘world’s largest digital marketplace for
network.12 crypto collectibles’, where you can ‘buy, sell, and
discover exclusive digital assets’ according to the
About 800 non-fungible tokens have been rules of the smart contract and the terms of the
created since then.13 CryptoKitties set the stan- respective platform that issued the tokens that
dard for other platforms like CryptoPepes (cryp- represent the collectables.
12 DECENTRALISATION AND SCARCITY - BLOCKCHAIN AND THE CULTURAL INDUSTRIES · SEBASTIAN POSTH
From cats to digital artwork it is just a small step.
Twentieth-century pop culture has blurred the
boundaries between what has been considered
as trash and prestigious art. So it is not surprising
that the art world has embraced blockchain
quite a bit. Crypto art15 can be found on plat-
forms like SuperRare (superrare.co), Cryptopunks
(larvalabs.com/cryptopunks) or ‘Creeps & Weir-
dos’ (dada.nyc/artgallery), a digital gallery for
rare digital drawings. Projects like Portion (por-
tion.io), Maecenas (maecenas.co) or KnownOri-
gin (knownorigin.io) aim to function as a
‘decentralised exchange’, ‘decentralised gallery’
or ‘decentralised marketplace’ for art and collect-
ables. This means that art can be traded in a
manner that is transparent, censorship resistant
and independent of any specific platform.16
Furthermore, blockchain is being used to deter-
mine the provenance and authenticity of an
artwork. Timestamping as a proof of existence, Homer Pepe, http://rarepepedirectory.com/?p=392
integrity or authenticity can be implemented in
various manners: e.g. the Blockchain Art Collec- swan’19 to the lowest bidder, in order to demon-
tive (blockchainartcollective.com) offers RFID strate the potential of micropayments for the art
chips that can physically be attached to the world. Eventually, the picture was sold for 1
artworks. The embedded code will allow artists millisatoshi, which was at this time equal to
and owners to create digital records on the $0.000000037.20
blockchain that prove authenticity and prove-
nance of a work in the digital record in addition The platform Gods Unchained (godsunchained.
to the paper certificates. And the Codex Proto- com) provides an almost identical reproduction
col (codexprotocol.com) aims to become the
leading decentralised title registry of unique art
items by writing records of attestations and
claims of ownership on the blockchain.
Fortnite gamers cannot monetise their skins, If licences were tokens, they would behave more
axes or gliders. These are not redeemable for like property, without losing the benefits of li-
money, even if they had a value that could be cences for creators and rights owners. The Content
represented in ’real currency’. They cannot be ex- Blockchain Project (content-blockchain.org) – of
changed across different games or platforms, as which the author is a co-initiator – developed a
14 DECENTRALISATION AND SCARCITY - BLOCKCHAIN AND THE CULTURAL INDUSTRIES · SEBASTIAN POSTH
prototype for what the project has called ‘smart industry. Bernstein (bernstein.io) are aiming at
licensing’. The project was initiated in 2016 by a corporate IP, like inventions or designs, that can
consortium of publishing, law and IT companies, be registered to obtain blockchain certificates
to research the possibilities of using blockchain that prove ownership, existence and integrity of
technologies in advancing the content and any IP asset.
media ecosystem. It aims to create technical
foundations for a trading environment dedicated
to digital media content that facilitates new and Self-Sovereign Identity
innovative ways to offer and purchase content
on a decentralised blockchain network. One of Tokenisation has created an entire new way of
the project’s goals has been to simplify the com- thinking about cultural assets, value, ownership
plex process of licence management and distri- and transactions on decentralised marketplaces
bution of digital content by offering a registry of online. Interestingly, on these marketplaces users
rights and licences on an open and transparent do not only own their digital assets – they also
blockchain ledger. On the Content Blockchain own their personal accounts and data. In the age
network it will be possible to create and distrib- of the internet, users were required to register
ute machine as well as human-readable licence and log into an individual platform in order to
offerings, called smart licences.22 These smart use its service. While using a number of services,
licences could be represented by licence tokens, users provided personal information, ratings,
which would include a specific set of rights to reviews, posts, and other data to many individual
use the content in a specific ways. This model companies. This resulted in a growing power of
would allow rights owners to offer licenses to these services and platforms, where access to
retailers (B2B) or users (B2C) alike via tokens on customer data supported market significance in
decentralised marketplaces on the blockchain. a reinforcing circle. Despite all efforts to protect
the customers’ privacy and data through political
The benefits of such a container-model will regulation, in many cases companies have not
become more obvious if we look at B2B sales. been fully transparent about what they actually
In order to sell digital content through relevant do with the user data they aggregate.
retailers and shops, rights owners need to
negotiate licence agreements per individual On decentralised marketplaces users do not
platform. These negotiations can be time-con- necessarily have to register and log into the indi-
suming and complicated for both rights owners vidual platform in order to use a specific service
and retailers. Tokenisation would, by contrast, or to buy or trade items or assets. Users can
allow licensors to publicly offer content licences interact directly with the blockchain or use their
in a simple way. Converting licence offerings into blockchain accounts and public keys to access
token offerings would enable shops, retailers and services on specific platforms. This way, users
even customers to easily sell or resell the tokens can provide as much information to a third party
independent of the dominant market players on as preferred, necessary or requested. To give an
any possible platform – as they would not sell example: a service needs to ensure that a user
the licence, but only the token with the licence is old enough to perform a legal transaction, yet
included. This model has the potential to sim- the user does not need to reveal his/her date of
Digital Trends in Culture
plify any kind of licence trade a great deal. Other birth in order to provide valid and verified infor-
projects and startups focus on a similar model of mation. A lot of research is currently being done
tokenising media content licences on the block- on ‘self-sovereign identity’ (SSI).23 Projects like
chain, like the Crea Project (creaproject.io) and the Sovrin (sovrin.org), Jolocom (jolocom.io), uP-
JAAK (jaak.io), who are working on services for ort (uPort.me), Blockstack (Blockstack.org) and
record labels and other companies in the music others are working on creating standards, provid-
marketplaces supported a fundamental shift in pigeons’ footprints which will steer the thoughts
the economy of cultural production and distri- and the behaviour of the generations to come; in
bution on the internet. By adding a layer of trust Nakamotos’s paper we might have read the quiet
on top of the internet, blockchain technology words that will bring the storm.
certainly has the potential to replace the ‘old
economy’ and cause a second fundamental shift
16 DECENTRALISATION AND SCARCITY - BLOCKCHAIN AND THE CULTURAL INDUSTRIES · SEBASTIAN POSTH
Resources Gods Unchained (godsunchained.com)
Jaak (jaak.io)
List of Mentioned Platforms
Jolocom (jolocom.io)
The following list is a list of projects mentioned in
the paper. They are presented in alphabetical order. KnownOrigin (knownorigin.io)
The references are for informational purposes only.
They must not be understood as a recommenda- Maecenas (maecenas.co)
tion or financial advice to invest, participate or
otherwise engage in the mentioned projects. OpenBazaar (openbazaar.org)
Creeps & Weirdos (dada.nyc/artgallery) List of projects, papers, videos, initiatives and
other resources, dealing with self-sovereign
CryptoCountries (cryptocountries.io) identity:
Cryptopunks (larvalabs.com/cryptopunks)
Literature
Cryptovoxels (cryptovoxels.com)
Andreas M. Antonopoulos, Mastering Ethereum,
Digital Trends in Culture
18 DECENTRALISATION AND SCARCITY - BLOCKCHAIN AND THE CULTURAL INDUSTRIES · SEBASTIAN POSTH
13 See ERC-721 (NFT) Token Tracker, https://ether- 20 See: https://www.reddit.com/r/Bitcoin/com-
scan.io/tokens-nft ments/a82fz0/i_sold_this_tiny_artwork_for_1_mil-
14 Late December 2018, see, ibid. lisatoshi/ec7fw43/
Ignasi Labastida, PhD in Physics. Currently Head of the Office for Knowledge Dissemination
and the Research Unit at the CRAI (Library) of the University of Barcelona. Public leader of
Creative Commons in Spain. He is a member of the Copyright and Open Access Working
Groups of LIBER and member of the Steering Committee of the CIO Community of LERU.
This text is subject to the Creative Commons attribution license available
at https://creativecommons.org/licenses/by/4.0/
rights to decide how and when it can be used outside the authorised purposes requires express
and for what purpose, but also recognises the permission. There is still a belief that if there is
rights of natural and legal persons involved in no direct financial gain anything is allowed – for
its dissemination. The former are what is known example, in the academic field – and this can
as copyright – that is, authors’ rights – and the lead to surprises when people are reported for
latter are related rights. Related rights include copyright infringement.3
come across cases of authors who are already in any kind of legal notice has ‘all rights reserved’
the public domain in their country of origin, but by default. There is still a belief that when a
not in Spain.4 work is on the Internet and there is nothing
about intellectual property rights it can be used
These special situations are also found in other freely without having to request permission.
legal systems. For example, in Britain there is
the first Spanish licences were based on this the emergence of the concept of copyleft in the
second version. 1970s, which was subsequently developed in the
field of software. In the cultural field it is worth
The six current licences can be applied to any recalling Project Gutenberg19 as a pioneering
creation that can be protected by intellectual initiative for disseminating books in the public
property rights. Rights are granted for the same domain in digital format. It is useful to survey
To change the system of scientific communica- Publishing companies were initially wary about
tion, the so-called open access movement arose this type of OA but have gradually come round
in 2001 with the aim of ensuring that all research to the idea of authors depositing a copy of their
results would be accessible to everyone without contributions with institutional repositories,
legal, financial or technical impediments. There albeit with a few restrictions. The first concerns
had been previous initiatives of this kind, but ownership of the exploitation rights. The
the meeting held in Budapest in December 2001 publisher allows a copy of the publication to be
under the auspices of the Open Society Founda- disseminated, but retains exclusive ownership
tions was the starting point for the movement as of the contribution, which is transferred by
it is known today.20 the author as part of the agreement to publish
the article following a peer review. In some
The Budapest meeting gave rise to the Budapest cases, instead of an exclusive transfer of rights,
Open Access Initiative (BOAI),21 which was an exclusive publication licence needs to be
published on 14 February 2002. The document signed – which for practical purposes is the
set out two strategies for achieving the objective same. The second condition some publishers
of open access to research results. These two require in order for a copy to be deposited with
strategies are currently known as green OA a repository is to establish a period of time from
and gold OA. Green OA raises the need for any the publication date during which the whole
author to be able to disseminate a copy of their text cannot be accessed. This period is called
Digital Trends in Culture
publication in a file that is connected to other embargo and can last from six to sixty months,
similar ones, making it possible for users to con- though its usual duration is from twelve to
duct global searches without needing to know twenty-four months. It should be pointed out
about the existence of these files. These files that in some cases publishers do not establish
are called repositories and today most research any kind of embargo. Lastly, there is a third
centres, such as universities, have one.22 condition for granting permission: the version
licences, and some even offer the possibility of of embedding watermarks or other symbols
managing works licensed under non-commercial claiming rights to which they are not entitled. A
clauses. In the latter case the organisation only few institutions use Creative Commons licences
manages the commercial exploitation. There are in their digitisations in an attempt to appear less
examples in the Netherlands, Denmark, Sweden restrictive, but this use is incorrect, as someone
and France.32 cannot license rights they do not own – indeed,
Mayo Fuster Morell is director of research on collaborative economy at the Internet Interdisciplinary
Institute of the Universitat Oberta de Catalunya (Dimmons). She is also faculty affiliate at the
Berkman Klein Center for Internet and Society of Harvard University. She is in charge of the BarCola
group of experts on collaborative economy and collaborative production at Barcelona Council and
organises the event Procomuns: Commons Collaborative Economy and the Sharing Cities Summit.
means of engaging economically in an activity purpose is relatively recent and tends to focus
without losing rights over it, is proving to be a on assessing the diversity of models linked to
crucial issue for the future of culture. the new digital economy, and on detecting the
patterns that characterise this type of economy,
It is not clear whether we are simply dealing which differs from more closed and traditional
with a meeting point between old organisations models.
With respect to open business models, there Although the capacity for visibility in the digital
is confusion between complete business or media has increased with respect to the previous
Digital Trends in Culture
economic sustainability models and income analogue era owing to lower access barriers in
mechanisms based on participatory or collabora- a variety of channels (free profiles on several
tive methods, including more occlusive or hybrid digital platforms and being able to communicate
models (for example, musicians such as NIN and directly with many), it is not as significant as it is
Peter Gabriel are mentioned in this connection). sometimes made out to be in a few professional
A vision is also being shaped of a moment where, fields. Some of the factors that undermine
illustrations, literature, etc.), limited open a structure and internal governance which are
knowledge ... predominantly distributed and – forgive the
repetition – cooperative, with important impact
Examples: Fran Meneses (illustrator), or social transformation values.
writers, musicians (Amanda Palmer)....
impact, is central to all activity and, in some subsector), this precarious situation, exacerbated
cases, is even the main priority when defining a by the recent economic crisis, has led to the
model of economic sustainability to the detri- emergence of not-for-profit initiatives designed
ment of possible profitability. The organisations to create networks for this segment of free,
which belong to this type are generally coop- self-employed professionals, entrepreneurs of
eratives, associations and in a few cases small small-scale initiatives or unemployed, as opposed
- Tuuulibrería bookstore
Traditional cultural spaces and enterprises: theatres, cinemas
and other spaces that are usually linked to the more traditional - Gigamesh bookstore
culture (showbusiness, 20th-century culture, that of the - Calders bookstore
cultural industries, etc.) but display, specifically here, traces of - Orciny Press-Inner Circle
cultural, socio-cultural or economic-cultural innovation.
- sala Beckett
- Utopia 126
- BeAnotherLab
- Apps4Citizens
Transformed creative companies: enterprises, associations,
organisations and initiatives which, despite having the - Coocció
more usual appearance of traditional creative services or - MobilityLab
of emerging creative industries, have embraced open, free, - Domestic Data Streamers
participatory cultural practices in some way.
- Internet Age Media Weekend
- Mandarina
- MOB-Makers of Barcelona
- CreaRSA
- Lamosca
- Txarango
- Metromuster
Isomorphic cooperatives and proto-coops (associations): - RiceUp
organisations usually classifiable as belonging to the
- La Tremenda
creative industries which are established and/or operate as
cooperatives, with links to the social and solidarity economy. - La Hidra Cooperativa
- La Ciudad Invisible
Digital Trends in Culture
- Espai Contrabandos
- La Caníbal bookstore
- Zumzeig Cinecooperativa
- CCCBLab
- Barcelona Photobloggers
- ARSGames
Webs, blogs and diaries: platforms with informative or
- Vilaweb
educational content or news with open and/or free formulas.
- Nativa (Indigestión)
- El Crítico
- Lamosca.tv
- Grupo Open Street Map Barcelona
- Freesound
- Consorcio de Servicios Universitarios de
Cataluña: Memoria Digital de Cataluña,
Digital goods or content platforms: webs and platforms, or Materiales Docentes en Red, Revistas
entities and communities, that operate from 2.0 platforms (for Catalanas con Acceso Abierto, Depósito de la
example, Wikipedia) for sharing digital goods or even those Investigación de Cataluña, Tesis Doctorales en
that could be described as commons. Red
- Hamacaonline
- Filmin
- La Tejedora
- Teatron
- Sharing Academy
- Lektu
Cultural marketplaces: organisations and initiatives belonging
to or playing some part in the so-called platform economy - Myplayz
and/or collaborative economy in a very broad sense; they are - Chefly
often involved in developing new ways of overcoming barriers - Cooncert
between creators and audiences, or in promoting new types of
- Screenly
relationships between both (traditional) agents of culture.
- Azoteas en Cultura (Asociación
Coincidencias)
- Fab Lab Barcelona
- MakerConvent
- TransfoLAB
- Libertar.io
- Makea Tu Vida
- MADE Makerspace
Makers and open design: cases which share links with the so- - Holon
called maker and open design trends, both culturally (in terms
of practices, creation formats, values and common ideas) and - La Deriva, espacio adisciplinar
economically (economic practices and models). - Atta33 Makerspace
- TMDC, Taller para la Materializacion y el
Digital Trends in Culture
- Colectivo Punto 6
- DIYBIO Barcelona
- Platoniq
Citizen science, collective knowledge and generation - Razones Públicas
of urban laboratories: cases that offer services and some - PublicLab
resources for the development of participatory or collaborative
practices, or consultancy in open innovation, or for citizen - Colectivo Vuelta, arquitectos
science, all with a positioning based on civic values. - Lacol, arquitectura cooperativa
- Amical Wikimedia
- Iniciativa Barcelona Open Data
- Taller de Historia de Gracia
- Xnet
Cultural activism and activist art: cultural entities that - Taller de Infografía Popular
approach activism with creative tools or are oriented towards
cultural activism. - Colectivo Enmedio
- Megafone.net
- MakerKids Barcelona
Technological pedagogy for specific groups (children, - Girls in Lab
women ...): initiatives whose purpose is to bring technological
sovereignty closer to specific groups. - Soko Kids
- Tarpuna
- LabCoop
- Can Batlló
- La Escocesa
- DeDO Barcelona / Ableton Live Barcelona
- Audio Commons
- Goteo Barcelona
Organisations and platforms that help or catalyse other - Creativechain
cultural or creative initiatives, or facilitate the circulation of - CreativeMornings Barcelona
new ideas, new practices, or mutual support among members - Ladies, Wine & Design
at different intensities among a specific community. - Extraordinaria
Digital Trends in Culture
- SMartib
- La Fundición
- Gràcia Territori Sonor / Festival LEM
- BccN film festival
- GRAF festival
- La Litera fair
imenting with economic innovations and in • Programme of subsidies for basic structures:
addressing certain types of public or private subsidies that include and/or are oriented
funding is a common feature. Only in one to supporting derivative costs, such as rent-
case (Barcelona Open Data Initiative) was the ing working spaces, for projects with low
intention expressed to adopt a hybrid formula in profitability to help boost their feasibility.
such as cost reduction, speeding up innovation unused means of exploiting the potential public
and creating synergistic ecosystems. actors have failed to tap in these new forms of
production.
FLOSS’s market expansion is advancing with its
own ambiguities and contradictions and is pos-
diversified. There are fab labs that are makerspaces 2011, the Makers of Barcelona space was opened
or workshops driven by grassroots movements (as- in the Arc de Triomf area; with a business model
sociations of amateur and technological activists, based on coworking, it aimed to bring together
coworking creators ...), by universities and educa- freelancers and people from the creative sector
tional entities as a space for learning and research, and makers in a broad sense.
foundations or even partnerships of companies.
Many crowdfunding initiatives, however, were education, cultural heritage and the arts.
unsuccessful. The establishment of a minimum
funding goal required to get the projects off the If the funds raised by the campaigns fall short of
ground meant that when insufficient funds were the established target, the same mechanism is
raised they were not allocated to any campaign activated as for the rest of the campaigns: the
and had to be returned. In addition, the dynam- money committed and displayed is returned at no
In match-funding as practised at Goteo, interest- Most use either conventional digital technology
ing dynamics for channelling significant volumes or paper vouchers. Although they are very
of public or private funds appear to be at work in recent, there are also interesting cases of cur-
the form of a type of donation that encourages rencies generated according to the blockchain
citizens to participate far beyond what the funds protocol to contribute to the commons; their
could achieve on their own. The already increasing development needs to be monitored. Solarcoin,
use of crowdfunding for creator communities in for example, was created in 2014 to fund the
Europe and worldwide is expected to grow even installation of renewable energy generators.
more in the coming years. Therefore, options such
as match-funding and its tendency to associate Whether they involve charging commission on
trans-institutional funding strategies, where each exchange for which the currency is issued,
initiatives with a social impact need to be set in through seigniorage, paying in kind or saving
motion, may lead to an improvement not only in conventional currency through exchanges of
effectiveness, but also in the visibility and local im- collaborations and other mutual favours, the ex-
pact of these still new hybrid financing formulas. amples presented show how complementary and
social currencies are not only instruments that
offer their users funding in general but are also
‘Social currencies for commons employed to fund different types of commons.
and cultural activities’ (Susana
Martín and Yasuyuki Hirota) In the field of public policy, there are a number
of EU-funded projects (Commonfare, B-Min-
Among the trends that are not currently consol- come, Vilawatt, etc.) that aim to promote some
idated but may gain momentum in the coming kind of cultural, social or environmental benefit
years as part of a new wave of economic innova- funded by complementary and social currencies.
tion, there are different cases of complementary These pilot projects are focused on evaluating
and social currencies – specifically the type that the impact of these instruments on the achieve-
help fund what could be called ‘positive exter- ment of the goals, and it will be interesting to
nalities’ or the commons, particularly cultural assess the results when they are completed.
activities.
Complementary and social currencies offer many
There are cases like Chiemgauer, of Bavaria, potential benefits, as they provide an alternative
which allocates 3% of all the currency issued means of funding for all types of infrastructures,
to social purposes. In Catalonia the Turuta was goods or activities for the public good. How-
issued to pay for what the community wished ever, creating an instrument that is accepted
to finance. There is also Peces in Honduras, a as payment by a community is a considerable
currency issued to pay for the services necessary challenge, since the community must be able to
Digital Trends in Culture
to produce biodiesel, in order to reduce the perceive the benefits of accepting an instrument
country’s oil dependence and CO2 emissions. other than conventional money as payment and
And the Brazilian Fuera do Eixo group uses an this requires the team responsible to possess
exchange scheme, similar to a LETS system, great technical and communicative skill and be
whereby members pay each other for all kinds prepared to spend many hours working with the
of auxiliary services and collaborations for people involved.
We wish to stress two main ideas. The first is • Dependence on subsidies prevails. But the
that innovations in cultural practices and eco- range of options is broader and multiple
nomic sustainability reflect each other, feed back sustainability strategies appear.
into each other. They go hand in hand. The sec-
ond is that we are currently between two waves • Emergence and consolidation of crowdfund-
of cultural-economic innovation: that which ing as a means of financing.
took place at the height of the adoption of ICTs
and free culture (2001−11), and that which is
now emerging, in which blockchain technology, Emerging wave:
Digital Trends in Culture
da-digital-us-social-6423549
Resources
Diego Naranjo is a lawyer and cofounder of the human rights organisation Grupo 17 de Marzo. For
the past six years he has been specialising in human rights. He holds a master’s degree in Human
Rights from the European Inter-University Centre for Human Rights and Democratisation in Venice.
Diego joined the NGO European Digital Rights (EDRi) in October 2014 and works on
protecting fundamental rights and freedoms on the Internet. As Senior Policy Advisor at EDRi,
he is concerned with personal data protection, surveillance and privacy, as well as copyright
regulation. He is also a member of the expert group on digital rights of the Spanish Ministry
of Energy, Tourism and Digital Agenda. Before joining EDRi, Diego worked at the European
Digital Trends in Culture
Agency for Fundamental Rights (FRA) and the Free Software Foundation Europe (FSFE).
He co-authored the Council of Europe paper DGI(2014)31, Human Rights Violations
Online, which was prepared by EDRi for the CoE and published on 4 December 2014. He
has contributed to international journals on labour rights and human rights, the journal
La Toga and the journal of the Criminal Tribunal for the Former Yugoslavia, and writes
periodically for the digital publication EDRi-gram, EDRi’s fortnightly e-bulletin.
50 CULTURAL AND INTELLECTUAL CREATION AND THE DIGITAL ENVIRONMENT · DIEGO NARANJO
Most of the ongoing debates on copyright could be to revise the current systems for repre-
reform are centred on strengthening the imple- senting authors and analyse the best strategies
mentation of existing regulations instead of on and structures that can help give visibility to the
the need to amend the regulations themselves. viewpoint of new creators (youtubers, bloggers)
We need to ask whether there is any future in who do not belong to the traditional authors’
the ‘strategy’ of attempting to stem the flow associations (SGAE, Sabam…). Lastly, it is neces-
of downloads and streaming bare-handed; or, sary to review the systems for protecting rights,
worse still, of attempting to stem it with inef- both legal (European directives and regulations,
fective ‘dams’ and digital ‘filters’ that are often laws of Member States) and private (terms of
illegal. Instead, it is necessary to review the pol- service, content filters, requests through the
icies governing copyright protection, bearing in DMCA…), and their compatibility with European
mind new technologies and the fact that, given and national legal systems. For this purpose
the failure of the culture market, many citizens authors, copyright holders, cultural institutions
exercise ‘cultural self-defence’ and attempt to (libraries, museums, private galleries…), digital
access protected and unprotected works using platforms and civil society all need to have a
the means available to them. say in the debate, which is currently dominated
chiefly by copyright holders and copyright
The new policies designed to protect authors’ collecting agencies.
rights are based on forcing private companies
to take their own measures which, if legal in
nature, could be ruled unlawful by courts. This 2. Copyfails: recipes for
phenomenon is known as the ‘privatisation of fixing the existing disaster
law’ whereby the platform services become the
Internet police and judges, deciding on which As I stated in the first section, there are a num-
content should be available and which should be ber of structural problems in copyright regula-
classified as hate crimes, apology of terrorism, tion. Although the suggestions for improving it
pornography or copyright infringements. would provide enough material for a treatise, I
have summed up what I believe to be the main
The copyright system is antiquated, pursues problems in five points.
unrealistic goals and, to ensure its own survival,
implements measures which tend to seriously Listed below are five of the copyfails – failures
compromise several fundamental rights. The in the current copyright system – which, in my
whole system needs to be overhauled to guaran- opinion, need to be analysed in any self-respect-
tee that creators are appropriately remunerated, ing European-wide copyright reform:
while allowing citizens to access culture. An ini-
tial step in this direction would be to harmonise
the whole system of exceptions and limitations Copyfail #1. Harmonising to
at the European level in order to ensure that all make everything equal
Europeans enjoy the same freedoms. This would
allow any citizen to legally make parodies and re- The aim of the InfoSoc Directive2 was to
mixes and use a work for educational and other harmonise the European Union’s then chaotic
Digital Trends in Culture
purposes that do not affect its normal exploita- copyright system. The reason (and the European
tion (an essential part of the Berne Convention’s legal framework) was marked by the Digital
three-step test). A second step would be to have Single Market, which was one of the main goals
the European Union International Property Of- of the European Commission. This ‘harmonising’
fice (EUIPO) draw up a catalogue of alternative directive provides for twenty-one optional
remuneration systems for creators. A third step clauses on users’ freedoms which can be applied
Member States wishing to put the directive • In Austria and Lithuania it is illegal to email
into practice can choose between including or quotations from protected works.9
excluding any of these optional exceptions. As a
result, there are literally more than two million • In some countries, such as France, the use
ways of implementing the directive.4 In an open of copyright-protected works in schools
Internet without boundaries it is unthinkable is much more limited10 than in others like
that flexibilities which do not interfere with Estonia. In Estonia teachers are allowed to
the habitual exploitation of the material should compile works of any kind for educational
not be implemented compulsorily throughout purposes in volumes that are separate from
the EU. This can only be explained by the huge the original, quote unlimitedly and even
capacity of collective management organisations translate and adapt entire works – all of
and multinational media services companies to which would be unheard of in France.
impose their version of the events (the story of
the impoverished author whom the impoverish- Is there anything we can do about it?
ers claim to defend) at the European and state
levels.5 Yes, make all the exceptions and limitations
permitted by international law compulsory, not
Because, evidently, the maximalist copyright optional. Unfortunately, this possibility is cur-
lobbyists have been vehemently opposed to rently not being considered.
any type of copyright flexibility (that is, they
are opposed to the exception to the exception).
Indeed, in 2001, when the directive was adopted, Copyfail #2. Turning private
the lobbyists argued that the only compulsory companies into Internet
exception (relating to temporary copies created police and judges
when content is transferred over the Internet)
Digital Trends in Culture
was impossible to apply and would lead to ‘a The European copyright system needs to be
gaping hole in rightsholders’ protection’.6 Fifteen fully overhauled. But instead of getting down to
years on, it is evident that there is no such hole. work and fixing the system’s problems, European
Yet even today, they are still lobbying against a co-lawmakers seem to have reached the conclu-
more flexible copyright system. They are just as sion (without evidence to back the logic) that
mistaken now as they were then. the best option is for private companies (pref-
52 CULTURAL AND INTELLECTUAL CREATION AND THE DIGITAL ENVIRONMENT · DIEGO NARANJO
erably foreign) to become the private Internet • Accomplished artists can also be victims of
police and that this will solve all the problems. the ‘copyright private police’. Sony Music
deleted a video James Rhodes had recorded
Why is this important? of himself playing a piece by Bach – a
composer who died hundreds of years ago –
Privatised Internet law enforcement undermines in his own living room.14
democracy and poses significantly serious prob-
lems for fundamental rights, especially freedom • The academic and copyright reform activist
of expression. Yet in current copyright debates Larry Lessig had a presentation taken
the focus is nearly always on further developing down on the grounds of a false copyright
privatised law enforcement, not on reforming infringement.15 As if this were not enough, it
copyright legislation to make it work in the happened to him a second time.16
twenty-first century.
How can we fix it?
Why is this a bad idea? To start off with, because
Internet companies are always going to go for By ceasing to promote initiatives (at the time of
the easy option. If they fear legislation, fines or writing we have: the proposal for a EU copyright
bad publicity, it will always be simpler and safer directive, the proposed regulations for prevent-
for them to eliminate perfectly legal content ing the dissemination of terrorist content, etc.)
as collateral damage along with illegal or un- which empower private companies to become
authorised content, just in case. European and Internet censors.
national initiatives for deciding which content
should remain and which should be taken down
evidently lead to censorship and abuse.11 There- Copyfail #3. Not remunerating
fore, using copyright rules to eliminate what creators fairly
politicians deem ‘undesirable’ content12 is a direct
threat to freedom of expression. It also leads to When people talk about reforming copyright
the elimination of rights such as quoting, parody- laws, the official excuse is usually authors’ finan-
ing, etc. (known as ‘fair use’ in the United States) cial situation. And quite right too. Authors use
as a result of algorithms such as YouTube’s their time, talent and passion – and often their
‘contentID’. This has a chilling effect – individuals own money as well – to create cultural works
censor themselves to avoid possible copyright for others to enjoy. They are very often forced
infringements. to hand over part of their rights to a company,
such as a publisher or record label. They might
Let us examine a few examples of how mistaken do so because it gives them the chance to
this initiative is: reach a wider audience – at least compared to
if they attempted to distribute and promote
• ContentID pulled down the video of a their creation themselves. Unfortunately, this
university lecture who was calling for does not always benefit authors; in the case of
harsher copyright legislation to protect musicians, most end up receiving only a tiny part
sporting events13 (remember the exception of the total price for which their work is sold on
Digital Trends in Culture
• Sony Music deleted a talk on copyright Actually, authors’ interests (at least those of
given by a Harvard lecturer. most of them) are a whisper that is barely heard
from beyond the grave Frontier Foundation (EFF) states, the extension
of copyright protection is rejected by university
Copyright protection in the EU extends to as professors,22 technology companies, non-profit
long as seventy years after the author’s death. organisations, and associations of authors and
Various agreements that regulate copyright users .23 Even the US copyright office (which is
54 CULTURAL AND INTELLECTUAL CREATION AND THE DIGITAL ENVIRONMENT · DIEGO NARANJO
not usually accused of favouring ‘piracy’) has technology is the new legislator and decides to
stated that the term is too long and has pro- take our rights away. By definition DRM en-
posed options24 for reducing its duration. croaches on all these freedoms under the guise
of preventing copyright infringements.
How can we fix it?
Why is this important?
By limiting the copyright term to the minimum
period proposed by the WIPO and holding future As stated earlier, if someone puts a lock on
talks aimed at curtailing it even further. something you own, it’s not for your benefit – it
means you are no longer the owner. DRM pro-
tections are digital locks placed on your devices
Copyfail #5. ‘Any time someone without asking for your opinion or permission to
puts a lock on something you own install them and, of course, you are not given the
against your wishes, and doesn’t key. Copyright experts agree that DRM systems
give you the key, they’re not doing it do not achieve the desired aim and are harmful
for your benefit’ (Cory Doctorow) to society, companies and artists.25
In the offline world we can lend our friends a The purpose of copyright is to guarantee that
book, photocopy its pages, quote parts of it artists and creators are rewarded for their work
or sell the book in a second-hand shop. With (so that they can carry on creating) and it should
digital works such as eBooks, CDs and DVDs, we not be used to curb our freedoms and rights of
face technical restrictions that prevent us from access to culture. In short, DRM systems do not
lending an eBook to a friend (unless we lend solve the problem for which they are designed
them our eBook reader as well) or from making (unauthorised copies and exchanges of eBooks,
a copy of a DVD we have bought, even as a music and videos) and add unnecessary restric-
back-up. Even if the law allows this in theory, tions on content that has been legally obtained.
European and international legislation states that
companies can question our rights by imposing How to fix it?
digital rights management (DRM) software that
limits the possibilities of reproducing our digital By banning the installation of DRM technologies
property. without the user’s consent and abolishing the
ban on breaching DRM protection.
DRM is a set of systems used to protect
copyright in electronic media such as music
and films, as well as software. Basically, what it 3. Censorship machines:
does is restrict the user’s ability to access, copy, content filters and their
transfer and convert digital content. As if the impact on human rights
lock were not enough, breaching this protection
(breaking the lock they’ve put on a book that Article 13 of the proposal for a copyright direc-
belongs to you) is illegal according to European tive submitted by the European Commission in
regulations. September 2016 recommends putting responsi-
Digital Trends in Culture
The advocates of the content filters proposed past twenty years.35 Apparently, in the opinion of
in article 13, although aware of the prohibition, copyright maximalists, a filter that reads every
argue that such a system is not a general obliga- line of text that is uploaded (tweets, comments
tion because since the filter would scan specific on the social media, blogs…) does not qualify as
archives (those identified in the database as a violation of privacy.
protected by copyright) this would ‘only’ amount
56 CULTURAL AND INTELLECTUAL CREATION AND THE DIGITAL ENVIRONMENT · DIEGO NARANJO
Claim 3: The complaints mechanism agencies, who claim (no doubt rightly) that they
for users will compensate for cases do not receive enough from companies like
where the filters do not work YouTube and SoundCloud. Although this may be
true, it seems to be chiefly a problem of abuse
The proposed mechanism to enable users to get of their dominant position. The most logical
round the problems of the filters will be ineffec- option would be to address copyright issues with
tive in practice because companies will have to copyright solutions, and problems of anticom-
choose between: petition rules with strategies designed to ensure
there is competition. But logic often keeps a
Creating a specific mechanism in their company safe distance from legislation so as not to affect
for analysing the legality of all content uploads private interests.
and checking whether they come under any of
the national exceptions for educational purposes,
parody, quotation, etc., or Claim 5: If we include a mention
of the European Charter of
Going down the simpler and cheaper route of Fundamental Rights, it will
declaring everything that is picked up by the serve as a talisman against the
filters to be a breach of their terms of service; ills we are creating ourselves
that is, of companies’ private laws which do
not enshrine the prerogatives established by The European Charter of Fundamental Rights is
the European Charter of Fundamental Rights a fundamental legal instrument of the European
for restrictions of rights. The Wild West exists Union and applies directly to the European
online. Commission and the Member States. To insert a
clause specifying that a particular measure must
The European Commission’s proposal is based on respect fundamental rights does not add any-
the – scientifically unfounded – hope that com- thing in practice. More importantly, it is legally
panies will choose the complicated and difficult incorrect and meaningless with respect to the
route for tackling users’ complaints instead of measures chosen by private companies, to which
the cheaper and simpler way. the Charter does not apply (directly).
Claim 4: Article 13 will fix the Claim 6: Content filters are cheap and
so-called value gap between any company can implement them
platforms and right holders
Another argument that is fairly widespread
The record industry recognises year after year among Euro MPs and promoters of filters in
(see its annual reports of 201736 and 201837) that other institutions is that these filters are cheap39
its profits are continuing to grow. In 2017 alone and affordable for any company (including
this increase amounted to 60.4% for online SMEs), even though giants like YouTube and
content (streaming), and the overall growth SoundCloud have invested millions of euros in
figure was 5.9%. Aside from this growth – which that technology.40
Digital Trends in Culture
ecosystem, for fundamental rights and for the use of their works and the fixations of their
European online companies. It is high time the performances’
political class stopped believing in these false
claims and rejected content filtering outright in http://www.ivir.nl/publicaties/download/1593
the copyright directive and in any other future
regulations that attempt to propose it.
58 CULTURAL AND INTELLECTUAL CREATION AND THE DIGITAL ENVIRONMENT · DIEGO NARANJO
‘Study on the conditions applicable to contracts ‘How copyright extension in sound recordings
relating to intellectual property in the European actually works’
Union’
https://www.youtube.com/watch?gl=G-
http://www.ivir.nl/publicaties/download/334 B&hl=en-GB&v=kijON_XODUk
‘Median earnings of professional authors fall ‘Proposed EU Copyright Term Extension Faces
below the minimum wage’ (20.04.2015) Vocal Opposition in Parliament’
https://www.theguardian.com/books/2015/ http://www.ip-watch.org/2009/01/27/
apr/20/earnings-authors-below-minimum-wage eu-copyright-term-extension-meets-vocal-oppo-
sition-in-parliament/
‘How much do musicians really make from
Spotify, iTunes and YouTube?’
Copyfail #5
https://www.theguardian.com/technology/2015/
apr/03/how-much-musicians-make-spotify- ‘Amazon Erases Orwell Books from Kindle’
itunes-youtube (17.07.2009)
http://www.nytimes.com/2009/07/18/technol-
Copyfail #4 ogy/companies/18amazon.html
‘The second enclosure movement and the DRM Frequently Asked Questions
construction of the public domain’
https://www.defectivebydesign.org/faq
https://law.duke.edu/pd/papers/boyle.pdf
Electronic Frontier Foundation: DRM
‘Legal Frameworks and Technological Protection
of Digital Content: Moving Forward Towards a https://www.eff.org/issues/drm
Best Practice Model’
‘Amazon wipes customer’s Kindle and deletes
http://papers.ssrn.com/sol3/papers.cfm?ab- account with no explanation’ (22.10.2012)
stract_id=908998
https://www.theguardian.com/money/2012/
‘The missing decades: the 20th century black oct/22/amazon-wipes-customers-kindle-de-
hole in Europeana’ letes-account
http://pro.europeana.eu/blogpost/the-missing- DRM.info
decades-the-20th-century-black-hole-in-europe-
ana http://drm.info/what-is-drm.en.html
Digital Trends in Culture
https://wiki.openrightsgroup.org/wiki/Copy-
right_Extension
@glynmoody
@eLAWnora
@copyfighters
@mmasnick
Digital Trends in Culture
@PDLI_
@bufetalmeida
@X_net_
60 CULTURAL AND INTELLECTUAL CREATION AND THE DIGITAL ENVIRONMENT · DIEGO NARANJO
14 He tells of this in a tweet: https://
Notes
twitter.com/jrhodespianist/sta-
tus/1036929244654460928?lang=en
1 See http://copyrightexceptions.eu/#Art.%205.1
15 https://www.techdirt.com/arti-
2 https://eur-lex.europa.eu/legal-content/ES/TXT/
cles/20090428/1738424686.shtml00
PDF/?uri=CELEX:32001L0029&from=EN
16 https://www.techdirt.com/arti-
3 It is worth noting how copyright, which is a
cles/20100302/0354498358.shtml
limitation (an exception) to freedom of expression,
is transformed as if by Orwellian art into the norm,
17 See https://www.theguardian.com/technol-
and the exceptions to these restrictions are called ogy/2015/apr/03/how-much-musicians-make-spoti-
‘exceptions and limitations’ (exceptions to the fy-itunes-youtube
exceptions, that is). 18 http://www.wipo.int/treaties/en/text.jsp?-
4 https://edri.org/edrigramnumber9-22copy- file_id=283698
right-combinatronics/ 19 https://www.eff.org/issues/trips
5 See Corporate Europe Observatory (CEO), 20 http://www.authorama.com/free-culture-18.html
Copyright Directive: how competing big business 21 https://www.theguardian.com/technology/2008/
lobbies drowned out critical voices, 2018. Available dec/06/cory-doctorow
at https://corporateeurope.org/power-lob-
22 http://papers.ssrn.com/sol3/papers.cfm?ab-
bies/2018/12/copyright-directive-how-compet-
stract_id=2185402
ing-big-business-lobbies-drowned-out-critical
23 https://www.eff.org/document/letter-tpp-copy-
6 https://edri.org/copyright-exceptions-and-limita-
right-term-extension-proposals
tions/
24 http://judiciary.house.gov/_files/hearings/print-
7 https://www.communia-association.
ers/113th/113-20_80067.pdf
org/2016/05/20/the-copyright-joke/
25 http://craphound.com/content/Cory_Doc-
8 http://the1709blog.blogspot.be/2015/11/one-year-
torow_-_Content.pdf
on-private-copying-exception.html
26 https://www.eff.org/deeplinks/2018/06/
9 https://medium.com/copyright-untangled/5-outra-
internet-luminaries-ring-alarm-eu-copyright-filter-
geous-things-educators-can-t-do-because-of-copy-
ing-proposal
right-ac447dcc6e09#.yeuy4d6bg
27 https://www.ohchr.org/Documents/Issues/Opin-
10 http://oerpolicy.eu/oer-and-copyright-mapping-
ion/Legislation/OL-OTH-41-2018.pdf
exempted-uses-in-europe/
28 https://www.liberties.eu/en/news/delete-arti-
11 https://edri.org/wp-content/uploads/2014/02/
cle-thirteen-open-letter/13194
EDRi_HumanRights_and_PrivLaw_web.pdf
29 https://savecodeshare.eu/
12 https://www.eff.org/deeplinks/2014/12/copy-
right-law-tool-state-internet-censorship 30 https://papers.ssrn.com/sol3/papers.cfm?ab-
stract_id=3054967
13 https://www.techdirt.com/arti-
cles/20140903/06114628400/premier-league-uses- 31 https://edri.org/scarlet_sabam_win/
copyright-to-pull-down-youtube-video-professor- 32 https://edri.org/sabam_netlog_win/
advocating-stronger-copyright-premier-league.
Digital Trends in Culture
33 https://edri.org/scarlet_sabam_win/
shtml
62 CULTURAL AND INTELLECTUAL CREATION AND THE DIGITAL ENVIRONMENT · DIEGO NARANJO
CONSUMER TRENDS IN
INFORMATION AND THE
MEDIA IN THE CULTURE
INDUSTRY: FAKE NEWS AND
THE AUDIENCE
Javier Lorenzo Rodríguez holds a European PhD in Political Science from Universidad Carlos III de
Madrid, and an MA in Information Society and New Technologies. He is an Assistant Professor
of Political Science in the Department of Social Sciences at Universidad Carlos III de Madrid.
His research agenda has been focused on the impact of the Information and Communication
Technologies on political and social behavior, especially in two directions: On one hand, the political
elites’ online behavior, mainly on Social Media, applying computational methods. On the other
hand, he analyses the effects of these ICT on the social behavior of youth. Both research lines
Digital Trends in Culture
have been developed in a successful research activity funded by competitive grants at international
level (H2020), National Research Programmes or funded by Public Authorities such as INJUVE,
Ministry of Domestic Affairs, Ministry of Labour, etc. The results of his research can be easily found
in top international journals (European Union Politics), well kwown publishers (Routledge, Peter
Lang) and awards (Fundación Alternativas). Moreover, he has been research fellow at the Social
Media and Political Participation Lab at New York University, in which he is currently involved.
endum and the debate over leaving the EU has anisms to those in the political sphere.14 So it is
triggered a constant flow of fake news or news not only a political problem related to the media,
that is intentionally biased.6. technology and globalisation, it is also a social
phenomenon that takes its cue from a series of
Moreover, the interference of Russia in the consumer habits regarding information, which
elections in France7 and Italy8 and the increased affects particularly vulnerable social groups.
64 CONSUMER TRENDS IN INFORMATION AND THE MEDIA IN THE CULTURE INDUSTRY · JAVIER LORENZO
In a bid to better understand the challenge 2. What does the term
democracies face with the spread of fake news, ‘fake news’ refer to?
this article will try first to clarify what we mean
by fake news, how it is generated and in what The first challenge is to nail down the exact
way it is spread. It will then compare the interna- meaning of the term. In the Collins dictionary,
tional landscape in this respect with that of it is described as ‘false, often sensational infor-
Spain, focusing particularly on the social angle mation disseminated under the guise of news
with accompanying explanations. Finally, it will reporting’. But what exactly are we calling ‘fake’?
summarise several solutions that are currently Is this information that has not been verified or
being discussed or applied, and make recommen- balanced?
dations.
According to the European Commission,
‘Disinformation is defined as information that
can be found to be false or misleading, that
is created, presented and spread to make a
profit or to deliberately mislead the population
and which can cause public harm.’ (European
Commission 2018)
the average reader stops after the first two from the truth, basically that which is generated
paragraphs, so only the headline and the start of by government and partisan media. However,
the news story needs to look and feel legitimate. none of these filters act with the same degree of
As far as the content is concerned, the key lies efficiency in the digital world where any individ-
in the use of simple cognitive structures, making ual with an Internet connection and an online
connections with an individual’s experience and profile can both receive and generate informa-
66 CONSUMER TRENDS IN INFORMATION AND THE MEDIA IN THE CULTURE INDUSTRY · JAVIER LORENZO
tion in the form of amateur journalism, with few characterising elements, such as the structure
controls to ensure its veracity. If we add to this of the network, its reach, the behaviour of the
the immediacy of publication and its ability to go algorithms and the technological resources that
viral within a short space of time, the possibility multiply the effects of these.
of filtering the information for the truth be-
comes even more remote. Whether a message goes viral on platforms
such as Facebook or Twitter depends on the
makeup of the propagator’s contact network. If
user A has two million followers, as do celeb-
rities for example, a tweet can spread quickly
to 10,000 people but with a superficial effect.
On the other hand, if user B posts a tweet on
his network of 20 followers, and each of these
followers retweets it on their network which
also has 20 followers and so on, they will reach
10,000 followers more consistently than user
A. The reach of user B’s tweet goes deeper that
that of A, with a chain of retweets, enabling it
Moreover, the limited space afforded by social go viral in a way that the tweet of user A never
media for content means a more direct type of can (Vosoughi et al., 2018). In other words,
language, lack of context and the omission of it all depends on the position the generator
detailed explanations. It is more about getting a has among his network of contacts and the
‘like’ and the polarisation for or against what has chances of this information being replicated
been posted, leaving little space for reflection. If by a third party. Undoubtedly, the bigger the
we combine the characteristics of social media network, the more likely the information is to
with the aforementioned false information, they be propagated.
form a perfect and dangerous duo (Guess, Nyhan
and Reifler, 2018). This logic is what these platforms use as the
foundation for their business, which is none
Proof of this comes in the shape of a study other than to generate money from publicity,
by Vosoughi on the spread of fake news on based on two main principles, one of which is to
Twitter20 (Vosoughi, Roy and Aral, 2018). A piece attract the largest number of users possible who
of fake news reaches 1,500 users six times as should spend as much time as possible on their
fast as a conventional news item, beating real platforms. The bigger the network, the more
news in all areas, be it business, entertainment, clients and the more attractive it is to publicity
culture, science, technology or health, which companies. Given greater exposure, the more
makes it even more useful in the field of politics. probable it is that said user sees the publicity
A tweet regarding real news is not retweeted in and clicks on it.
general more than 10 times, while a piece of fake
news can reach 19 retweets 10 times as fast as The other principle and main added value for
a real news item gets 10 retweets. In an analysis these platforms is the availability of personal in-
Digital Trends in Culture
of feelings, they discovered that the tweets formation on the users whose profile is on these
containing fake news tend to involve terms platforms, including their age, gender, profession
associated with surprise or disgust while those and preferences as well as their habits con-
related to real information are linked to sadness cerning information and consumption – which
or trust. In order to understand the logic of how profiles they follow, what products they look for,
this works it makes sense to identify some of the their voting preferences etc. This information
68 CONSUMER TRENDS IN INFORMATION AND THE MEDIA IN THE CULTURE INDUSTRY · JAVIER LORENZO
press offline has been applied to all areas of from a particular subject or manipulating public
news on social media. The conversations about opinion in their interest. Although some pages
information related to climate change or immi- and mechanisms have been appearing which
gration or the polling on any reality are ideal can detect this kind of fake information, the
areas to target, either to draw attention away level of sophistication is increasing all the time,
from the truth or to make fake news go viral. which makes it increasingly hard to detect. In
Celebrities, political parties and journalists have the case of the regional elections in Catalonia,
all been victims of these trolls.24 for example, they were able to generate 35%
of the traffic of the conversation related to the
campaign. In fact, one way of spotting a piece of
disinformation is by checking if a post acquires
a disproportionate popularity on Facebook or
Twitter despite the fact that the origin of the
information comes from a dubious source.25
profiles that are artificially created which, based nalists on social media. So the problem stems
on a series of search algorithms, send or repeat from how heterogeneous or homogeneous the
information automatically and continuously, network of each user is, regarding the consump-
taking over discussions on social media and tion of information, something that is closely
turning the desired fake news into a trending related to social, economic and educational
topic, thereby managing to distract attention background.
Fifty-four percent of those polled express In light of the data, there are two explanations
concern about the proliferation of fake news, for the variations in the perceptions of, concerns
with far higher percentages in Brazil (85%), Spain about and exposure to fake news in those polled
(69%) and the US (64%) for political information. in the cited countries. In the first place, the
The main culprits of the propagation of fake different media markets have a different relation-
news are thought by those surveyed to be media ship with society and also with the authorities,
empires (75%) and social media platforms (71%), depending on the political, economic and social
but their concern revolves more around the risk model of each country (Mazzoleni, 2012).
of consuming bad journalism and information
that is one-sided than news that is entirely This could explain the greater trust in the media
invented. in countries in central and northern Europe
compared with the Mediterranean countries and
The desire for public intervention to tackle the new democracies such as Hungary or Romania.
Digital Trends in Culture
70 CONSUMER TRENDS IN INFORMATION AND THE MEDIA IN THE CULTURE INDUSTRY · JAVIER LORENZO
actions tend to perceive a greater risk and Similar behaviour can be found among different
declare themselves to have felt exposed with social and economic levels, although in this
greater frequency. respect, those with more resources and a higher
level of education continue to consume more
To summarise, the majority of those polled con- magazines and press while those with fewer
sider that the problem of misleading information resources have a strong preference for the tele-
stems from online sources. However, the almost vision, with a sharp drop in access to Internet;
imperceptible difference in the answers of those while 92% of those with more resources use the
who only get their news offline and those who Internet, the figure drops to 39% among those
get it exclusively online is noteworthy. with fewer resources. (AIMC, 2018).
72 CONSUMER TRENDS IN INFORMATION AND THE MEDIA IN THE CULTURE INDUSTRY · JAVIER LORENZO
youngest age group; and it is worth noting that spectrum, there is poorer and less access among
those in the youngest age bracket are most those further to the right. This is a worrying
active and numerous in the use of social media. piece of data, given that we know from earlier
studies that in polarised scenarios, voters who
But when separating the data according to social are aligned with the extremes on the ideological
and economic factors, the heat map is clearly spectrum tend to be exposed more frequently to
green among the wealthier while red is predo disinformation, particularly those sympathising
minant among those with fewer resources, but with the extreme right.
also among the new and old middle classes. This
indicates a worrying technological imbalance, This review of the access and use of the Internet
given that only those with higher education and corroborates Belén Barreiro’s classification of
more resources use the Internet extensively, pro- wealthy digitals, impoverished digitals, rescued
ducing a worrying bias with regard to access to analogues and analogues that have not been res-
information and to the digital society in general. cued, depicting a social division that exacerbates
the vulnerability of those who not only have a
Finally, with regard to ideology, while there is lower level of education and fewer resources,
a more intense use of the Internet and social but who are also more vulnerable in terms of
media by those on the left of the ideological technology (Barreiro, 2017).
74 CONSUMER TRENDS IN INFORMATION AND THE MEDIA IN THE CULTURE INDUSTRY · JAVIER LORENZO
publishing of the plan against misleading The steps taken are:
information from the Spanish Government
– initially at least in conjunction with the • A public survey and euro barometer.
French Government, there have not been any
major developments. • A conference with all the stakeholders
involved.
In the EU’s parliamentary debate, statements The commission of experts are proposing short-
against hate speech were combined with state- and long-term measures that are linked and
ments on the defence of freedoms and European mutually reinforce each other, as follows:
values. Taking a more practical approach, the
European Commission has embarked on a • Improve the transparency of news online,
series of policies and public initiatives to tackle making it adequate and compatible with
the phenomenon of fake news on the digital personal data protection regarding systems
market. To do this, it has involved stakeholders that allow its circulation online.
and companies in the sector as well as a group
of experts. The first move has been to develop • Promote training and education the media
a code of good practice, signed by technology to counter misleading information and
companies such as Google and Facebook, as well help users to navigate through the digital
as the majority of press associations and national environment.
communication regulators in the sector.
• Develop tools to empower users and
This plan is based on the following: journalists, allowing them to identify and
stop malicious news, and encouraging them
• Four principles guide the action:29 to report such activity using technological
tools.
• Improve transparency regarding the way
information is produced or sponsored; • Safeguard the diversity and sustainability of
the European media ecosystems.
Digital Trends in Culture
• Diversity of information;
• Promote on-going research into the impact
• Credibility of information; of disinformation in Europe in order to
evaluate the impact of new measures ad-
• Inclusive solutions with broad stakeholder opted by the different players involved, and
involvement. constantly adjust the necessary responses.
76 CONSUMER TRENDS IN INFORMATION AND THE MEDIA IN THE CULTURE INDUSTRY · JAVIER LORENZO
Another way of tackling misleading information 6.4. Civil Society
is to create solid and attractive narratives which
incorporate correct information and which focus From the point of view of demand, the best
on facts that go beyond simply exploding the tool is to increase awareness of how the rules
myth of other information, a technique known of the game operate and encourage users to
as de-biasing. This kind of information is closely consider what they are consuming with a critical
linked to what is known as data journalism and eye. That would lead to a militant awareness,
with phenomena such as Politibot, which, via the allowing us to reflect on what each of us says
Telegram channel, links information with data to and shares and its ethical consequences: putting
expose hoaxes and biased information. information in context, verifying that what I am
sharing or expressing on my social media sites
is in line with my preferences and ethical con-
6.3. Platforms victions and calculating the undesirable effects.
The digital footprint, which is the trace of our
Mark Zuckerberg declared in his hearing before activities on these platforms, is registered and it
the US Congress that his main aim for 2018 was could come back at us when we least expect it
to clean up the abuse and bullying on his plat- (Phillips and Milner, 2017).
form, and also tackle fake news. That same year,
he modified the algorithms in order to increase Other recommendations involve asking ourselves
the visibility of posts from friends and families what we don’t know about the information we
and groups which would take precedence over are sharing. How and where has the information
paid posts.31 However, these controls do not come from in the first place? What has happened
correct all the errors. According to Full Fact, to the people involved in it? Have they given
Facebook users can report content they consider their consent at any point? In this case, the germ
to be false and the team will check if the news is of misleading information and manipulation is
true, false, a mixture of both, adjusted content found in what we don’t see, and in what we
or otherwise. But they can only check images, don’t know (Philips and Milner).
videos and articles reported by users. Other
kinds of material, such as satire and opinion,
falls beyond their reach. If something appears to Conclusions
be false, this will appear at the end of the news
item, but the item itself will not be eliminated. The data included in this article indicates that
the public feels secure to an extent when it
In the case of Twitter, the structure of the user’s comes to identifying fake news and trust their
network can be analysed using sites such as ability to filter out this kind of information.
Otherside.site, which allows you to see the wall This confidence is greater in those with a
of the other user and compare it to your own. higher level of education. However, all those
For Facebook users, Politecho.org is an extension polled recognise that they have difficulty
that can be installed in the search engine and distinguishing information that has not been
which shows up the political bias of your friends checked or whose bias is the product of poor
on Facebook. journalism. This difficulty is greater among the
Digital Trends in Culture
78 CONSUMER TRENDS IN INFORMATION AND THE MEDIA IN THE CULTURE INDUSTRY · JAVIER LORENZO
bre-cataluna_2017093059cf72300cf20201565be9cb. 25 Berkman Klein Center, https://cyber.harvard.edu/
html publications/2017/08/mediacloud
15 According to the Oxford Dictionary: ‘relating to 26 Professor of Journalism from the University of
or denoting circumstances in which objective facts Ithaca, New York, in an interview https://www.bbc.
are less influential in shaping public opinion than com/news/blogs-trending-37846860
appeals to emotion and personal belief’. https:// 27 http://www.digitalnewsreport.org/survey/2018/
elpais.com/internacional/2016/11/16/actuali- misinformation-and-disinformation-unpacked/
dad/1479316268_308549.html
28 Millions of visitors in the last month, according
16 Claire Wardle is co-founder of the First Draft to The General Study of Media: Internet Audience,
News, a non-profit making entity dedicated to the October-November, 2018.
search and contrasting of the truth situated in the
29 https://ec.europa.eu/digital-single-market/en/
Shorenstein Centre at Harvard University (https://
fake-news-disinformation
www.bbc.com/news/blogs-trending-42724320).
30 International Fact-Checking Network, which
17 https://digitalsevilla.com/
covers media such as The Washington Post, Rai, Le
18 https://casoaislado.com/ Monde, France Info and organisations such as Full
19 Allen Montgomery, director of National Report, in Fact, Chequeado, Google News and Facebook.
an interview with the BBC (https://www.bbc.com/ 31 https://www.bbc.co.uk/news/resources/idt-sh/
news/blogs-trending-37846860). the_godfather_of_fake_news
20 Analysis of 126,000 news items published in the 32 https://www.snopes.com/
last 10 years in English on Twitter.
33 https://www.bbc.com/news/blogs-trend-
21 https://www.washingtonpost.com/news/the-fix/ ing-37846860
wp/2017/02/23/why-fact-checking-doesnt-change-
34 Media Matters, 17 November, 2016, https://
peoples-minds/?utm_term=.2ad319b1baa0
www.mediamatters.org/video/2016/11/17/
22 https://cyber.harvard.edu/publications/2017/08/ president-obama-theres-so-much-active-mis-
mediacloud information-looks-same-actual-informa-
23 https://www.weforum.org/ tion-when-its-facebook/214518
agenda/2016/01/q-a-walter-quattrociocchi-digi-
tal-wildfires/
24 https://www.theguardian.com/world/2018/
jun/14/doxxing-assault-death-threats-the-new-dan-
gers-facing-us-journalists-covering-extremism
Daniela Bosé is currently Director of Palacio Vistalegre Arena (Madrid). She has previously
worked as General Director of BMG for Spain and Portugal, director of Sony Music
Entertainment’s Business and Rights Development wing, associate director of the Ministry
of Culture’s cabinet, managing director of Universal Music Publishing for Spain and
Portugal, vice president of SGAE, patron of the SGAE Foundation, vice president of the
Professional Organisation of Editors (OPEM) and advisor to Celesa and Crea SGR.
She has a business degree, specialising in business management, from the Complutense
Digital Trends in Culture
Ever since –and for several decades now – mu- With regard to to video platforms, these
sical creation and production software such as programmes offer low cost music that can be
Protools,1 Logic2 and Cubase3 have been used by used in millions of clips. This allows the film and
musicians and producers. videogame industries to create personalised
soundtracks that are free from rights.
Record companies and the way users consume
have also been subject to many changes, starting In the conclusions, we will look at various
with the hardware – there has been a shift from aspects such as the originality and quality of
vinyl to CDs; from downloads to what we do compositions created by intuitive algorithms as
now, which is listen online. well as the short-term future of artificial intelli-
gence in the music industry, taking into consider-
With the advent of artificial intelligence, the ation too the question of legislation with regard
music ecosystem has changed; the value chain to author’s rights on these pieces that have been
and the way in which the industry’s agents relate either generated in collaboration with artificial
to one another has undergone a transformation. intelligence or by artificial intelligence alone.
There is still no general artificial intelligence, Using these statements as a departure point, we
only various specialised artificial intelligences. will move on to analyse what the impact on the
value chain and on the music industry’s agents
In the realm of music, it is being successfully has been.
applied to composition, production and con-
sumption. Using AI, we can choose the musical
instruments and voices we want for our songs 3.1. Composers
and also produce them. The intuitive algorithms
and the automatic learning systems – known The benefits for the composers are obvious,
as machine learning – are also used to identify since technology together with innovation
musical trends and so get consumer preferences allows music to be created with an algorithm.
right. Playing musical instruments and composing
songs is now within everyone’s reach.
Niland8
Mediachain Labs 10
Siri
Acquired in 2017, this uses blockchain technology
– which facilitates the transfer of digital data Acquired in 2010, this is a virtual assistant with a
through encryption – to assign the copyright voice command.
Acquired in 2018, this is a machine learning The property of Sony Computer Sciences Labo-
company for intelligent connected devices ratories (Sony CSL), Flow Machine has created
specialising in the creation of AI software for songs such as Daddy’s Car and Ballad of Mr.
hardware such as cameras and speakers. Shadow. The first is the result of having asked it
to compose a song in the style of The Beatles.
With the above technology, Apple offers Genius With the second, it is seeking to emulate the
Playlist that comes from iTunes or For You and style of Cole Porter, George Gershwin or Duke
My New Music Mix where the user chooses a Wellington, among others. To do this, it has at
song they like, which then generates an immedi- its disposal a database of thousands of songs of
ate playlist with similar types of song. different musical styles but it still requires human
intervention when it comes to selecting the style
3.3.3. Amazon Music and the melody.
Digital Trends in Culture
2017 Vodafone video20 ‘The future is amazing’ AI has had a negative impact when it comes to
the resale of tickets. The bots buy tickets en
Jukedeck21 masse, and even block access to the websites
that belong to the concert’s promoters. These
This online platform offers editable tracks in programmes are capable of buying practically
various styles that can be modified in length or all the tickets on sale in a matter of minutes,
tempo to suit the needs of the user. It allows for preventing human users from legitimately
music to be acquired at low cost. accessing them.
2018 Vodafone video22 ‘The future is amazing’ The brokers – those who work in the buying and
selling of tickets – then shift these tickets over
to secondary markets to sell at far higher prices
5. AI applications in music than what they were originally going for.
As we have mentioned, the creation of music has Consequently, interesting questions arise: what
been undergoing a transformation; the era when then happens when there is no human involved
composers used a pen and paper to compose in the creative process? Should we assume that
and played their scores with instruments from these creations are copyright-free? If so, can
different periods are a thing of the past. anyone make free use of them for advertising,
for example?
After the 1970s, electronic music became popu-
lar; synthesisers are the new musical instruments From a purely commercial angle, this conclu-
and as such they are a tool for musical composi- sion would prove problematic for companies
tion. As a support for human composition, AI is like Spotify, Apply, Amazon and Google that
also considered a tool, generating a process of have invested millions of dollars in acquiring
‘assisted creation’. start-ups to generate, among other things,
AI content.
But if AI brings creativity to the table, it is then
not considered just a support tool for human
creators; we would then understand that AI is a 7.2. AI as the creator with regard
creative entity in itself. to intellectual property rights
Another option is to establish that the pieces of • Audio Internet (Siri, Alexa, Google Home,
work generated by AI are in reality works that etc.): these intelligent assistants will be our
Digital Trends in Culture
https://elfuturoesapasionante.elpais.com/ https://www.lavanguardia.com/cien-
asi-es-la-inteligencia-artificial-que-ha-crea- cia/20180717/45948321612/francois-pachet-musi-
do-la-musica-de-este-articulo/ ca-inteligencia-artificial.html
https://elpais.com/elpais/2018/08/07/cien- https://www.google.es/amp/s/www.bbva.com/
cia/1533664021_662128.html es/inteligencia-artificial-resucita-beatles-bach/
amp/
Vodafone
WIPO
https://m.youtube.com/watch?v=fhLsS_NCFx0
http://www.wipo.int/wipo_magazine/
https://m.youtube.com/watch?v=ss2uaGsHWao en/2017/05/article_0003.html
RTVE http://www.wipo.int/edocs/pubdocs/en/
wipo_pub_econstat_wp_30.pdf
http://www.rtve.es/noticias/20161216/inteligen-
cia-artificial-aprende-bach-para-componer-musi- Kalin Hristov en IDEA. The Law Review of the
ca-clasica/1455403.shtml Franklin Pierce Center for Intellectual Property
Isaac Baltanás is the consultant for Podcast Pro, Audio Manager of Storytel Spain and professor
of audio publicity at the Pompeu Fabra University. He has clocked up more than 3,000 hours on
air and more than a thousand publicity slots. He has also recorded dozens of audio books. Isaac’s
career has taken him through all the audio formats, from conventional radio to binaural podcasting.
In recent years, he has focused on audio techniques with which to refine marketing strategies.
perfect book.
One of the first things that we learn when
working closely with the podcast is that, unlike These are examples of how a publishing house
radio, it can tackle very specific material without can make use of the podcast to promote its
losing the audience or the profitability of the merchandise, usher people towards paper or
production. Very specific themes can be dealt the e-book and drive up sales. The book sector
offer the audio adaptation of Spanish-speaking nomic context is different.31 Podcasts and audio
authors using studied production techniques. It books have different business models. Even so, a
is a very effective way of allowing the listener to podcast can be turned into a very effective tool
enjoy stories that they perhaps might not have with regard to the audio book. Remember that
considered reading. To foster reading, there is an the podcast and the audio book use the same
endless list of audio publications such as Adven- audio format, which means that the natural
bodies of the relevant country. An example of this exhibitions around the world.
kind of podcast could be the Audio Sofa,33 which
comes under the Cadena Ser umbrella, Pop Shop In 2016, the San Francisco Art Museum launched
Podcast34 from Billboard or The New York Times its Raw Material43 project that links the artists
Popcast35 that depends upon the legal protection exhibiting in the museum with an in-depth
of the legendary communications group. exploration of modernism.
If there are podcasts that help you learn to be There are sculpture podcasters who use the audio
a better writer, there are also podcasts that format as a channel for promotion or educational
help you to become a better actor. This is the ends. One example is the State of the Art,55 a
case in podcasts such as Theatre People,49 Actor podcast with a huge audience that gives us a
CEO50 and Inside Acting.51 The arts are so diverse serialised account from Brazil of the sculpture
but the podcast has found all kinds of creative movements throughout history. Also serialised
formulas to reflect culture in general, including but with a broader vision, Contemporary art
the most visual arts such as architecture. territories56 spends time examining the tendencies
Digital Trends in Culture
The Architecture podcast But just as podcasts can fill us in on the history
of sculpture, on-demand audio can be a great
Architecture has been no exception with regard tool when it comes to escapism, hence the huge
to the podcast. In A minute in New York52 we can selection of recreational podcasts.
people. This is what entertainment podcasts ademic levels. Similarly, we have Sciences,67 one of
teach us. The history of podcasting on a global the most popular educational podcasts in Spanish
level has shown that this is a good part of the that explains the latest developments in scientific
formula for success when it comes to audio research. As we have said, all the podcasts aspire
production (Guberto, 2018). It is precisely the in one way or another to be entertaining and
elements of an entertainment podcast that can this makes them as user-friendly as possible.
But the podcast can be a teaching tool beyond But information can be presented in very differ-
school and university. For example, there are ent formats. The podcast has triggered a revival
lists of subscription podcasts that make com- of radio genres that might have died out such as
pelling listening for businessmen, marketing the audio documentary.
departments and entrepreneurs70 as they offer
integrated and up-to-date information on the
latest trends in the sector. Each episode presents The audio documentary,
us with new data, new analyses and also new the diamond of the
tools that facilitate professional development. information podcast
The podcast can be used for educational pur- This genre is one of the most elaborate but also
poses but also to keep people informed on past one of the richest and most appealing to the
and present developments, which is why the listener. Perhaps the most famous documentary
informative podcast has been so successful. podcast in recent years has been Serial73 from the
makers of This American Life,74 the brilliant radio
show that is available from 500 radio stations in
The Information Podcast the US.
have a natural ally with which to promote their Smith, Cote, Limetown: The Prequel to the #1
contents. We could say the same for podcasts Podcast, 2018.
on music, if it weren’t for the legal framework
concerning authors’ rights that does not concur Woessner, Stephen, Profitable Podcasting, 2017.
http://podcastpro.audio/blog/equipo-basico-pa- https://twitter.com/podcastmovement
ra-empezar-tu-podcast
https://twitter.com/PatFlynn
https://www.um.es/ead/red/23/laaser.pdf
https://twitter.com/johnleedumas
https://www.theguardian.com/education/2007/
sep/18/link.link16
Other links of interest
http://www.santillanalab.com/proyecto-au-
dio-escolar/ https://www.rug.nl/education/international-stu-
dent-blog/blog-07-04-2018-10-best-podcast-
https://www.nytimes.com/2018/04/19/learning/ picks-from-a-university-student
lesson-plans/project-audio-teaching-students-
how-to-produce-their-own-podcasts.html https://www.rug.nl/education/international-stu-
dent-blog/blog-07-04-2018-10-best-podcast-
http://www.readingrockets.org/article/creat- picks-from-a-university-student
ing-podcasts-your-students
https://www.teachthought.com/education/50-
https://thecornerstoneforteachers.com/12-of- of-the-best-podcasts-for-high-school-students/
my-favorite-podcasts-for-teachers/
https://www.edutopia.org/podcasting-stu-
https://www.thepodcasthost.com/enradio dent-broadcasts
https://www.wamda.com/2018/12/pod- https://www.learnoutloud.com/Podcast-Di-
casts-digitising-oral-tradition rectory/Self-Development/Instructional/
KidCast-Learning-and-Teaching-with-Podcast-
ing-Podcast/23111
Tweets
http://www.teachhub.com/technology-class-
https://twitter.com/aormaechea room-how-why-use-podcasts
https://twitter.com/ViaPodcast https://thecornerstoneforteachers.com/12-of-
my-favorite-podcasts-for-teachers/
https://twitter.com/alonsodeblas
https://www.realinfluencers.es/2016/10/25/
https://twitter.com/mmarianop los-mejores-podcasts-de-educacion/
https://twitter.com/Podnews https://www.finalsite.com/blog/p/~board/b/
post/5-steps-to-start-a-school-podcast
Digital Trends in Culture
https://twitter.com/podcastplaylist
18 http://caracol.com.co/programa/el_club_de_lec-
45 http://thememorypalace.us/
tura/ 46 https://blog.rtve.es/apuntesdecineyteatro/
19 https://itunes.apple.com/us/podcast/la-bibliote- 47 http://www.rtve.es/alacarta/audios/la-sala/
ca-del-te 48 http://www.honestactors.com/
51 http://insideacting.net/
67 http://cienciaes.com/
52 https://un-minuto-en-nueva-york.tumblr.com/
68 http://www.stuffyoushouldknow.com/podcasts
53 https://player.fm/series/series-2395591
69 https://www.thepodcasthost.com/enradio
54 https://player.fm/series/archispeak
70 https://www.entrepreneur.com/article/311282
55 http://oestadodaarte.com.br/a-escultura-grega/
71 https://www.nytimes.com/spotlight/podcasts
56 https://www.podomatic.com/podcasts/territorios
72 http://analytics.podtrac.com/industry-rankings/
57 https://elterrat.com/radio/nadie-sabe-nada/
73 https://serialpodcast.org/
58 http://marcmeetsobama.com/
74 https://www.thisamericanlife.org/
59 http://marcmeetsobama.com/
75 https://www.vanityfair.com/hollywood/2015/09/
serial-podcast-second-season-sarah-koenig
60 https://en.wikipedia.org/wiki/Limetown
76 https://www.podiumpodcast.com/v-las-cloacas-
61 https://en.wikipedia.org/wiki/Limetown
del-estado/
62 http://www.santillanalab.com/proyecto-audio-es- 77 https://www.franceculture.fr/emissions/la-fabri-
colar/
que-de-lhistoire
63 http://eledelengua.com/archivo-podcast/ 78 https://www.abc.net.au/radionational/programs/
64 https://thecornerstoneforteachers.com/truth-for- earshot/
teachers-podcast/ 79 https://tttakeaway.libsyn.com/
65 https://bedleybros.podomatic.com/ 80 http://radioambulante.org/
Digital Trends in Culture
Having an effective system for protecting responses and solutions, carrying out intense and
intellectual property rights should be a priority decisive regulatory activity in the field of intel-
concern for any state, since the degree of lectual property, and have attempted to modify
guarantees and protection adopted by the latter rules and progress towards greater efficiency in
is a reflection of a country’s modernity and the their enforcement.
health of its legal development, as well as its
economic and cultural progress. Concentrating on this passionate and complex
legal challenge, this second part of the publica-
In this connection, when surveying the state tion, Focus 2019, sets out to make readers think
of technology and its impact on intellectual and provides practical guidelines on some of the
property rights, it is necessary to remember a main copyright issues raised by new technologies
basic feature of Spain’s legal system, namely that that affect creators and their rights. Adopting
the Constitution provides maximum protection strict and firm respect for authorship, it begins
to creative freedom in the literary, artistic, with an article on ‘Use of copyright and respect
scientific and technical fields as a fundamental for authorship: plagiarism and appropriate use
right (Article 20.2), and to private property (the of the quotation limit’ (Rosa de Couto Gálvez),
Creators and Authorship in the Digital Age
scope of Article 33 includes private ownership of a topical and controversial subject. The article
intangible objects). The Constitution protects highlights ‘authorship’ as a core aspect of intel-
freedom to create, and the result of this free- lectual property rights and analyses what consti-
dom: intellectual property, ownership and rights tutes plagiarism or the unlawful appropriation of
over the product of the exercise of a person’s the authorship of someone else’s work; what can
freedom and the creativity. be plagiarised, defining plagiarists and plagia-
rised authors; and what constitutes evidence
Given this complex web of social, legal, political of plagiarism. It likewise studies good practice
and technological factors, over the past two in the legal use of the quotation limit and the ap-
decades lawmakers have been working on propriate and respectful exercise of authorship,
106 Introduction
which entails compliance with the requirements for the company. The issues discussed range
established in article 32 of the consolidated text from employers’ duty to inform employees of
of Spain’s Intellectual Property Law. their obligations in terms of intellectual property
and the proper use of technological resources at
The next article, ‘Preventive and probative their disposal in the workplace to employees’ ob-
measures for the legal protection of intellectual ligation to collaborate and respect the intellec-
property works: Intellectual Property Registry, tual property rights that the company acquires
copyright symbols ©, ISBN, ISSN and legal to a work that is the product of the employment
deposit’ (Rosa de Couto Gálvez), examines the relationship and is protected by these special
systems that protect intellectual property rights, rules on intangible assets and by intellectual and
providing examples of good practice related to industrial property rules.
prevention and protecting rights and ownership
before a dispute arises, instruments of legal The next topic to be analysed is ‘Good practice
certainty such as the Intellectual Property and procedures for protecting the intellectual
Registry which establishes, as a preventive and property rights to content in the digital age’
probative measure, the legal presumptions of (José Manuel Tourné). The article explores how
ownership (of the subject registered as author difficult and costly it is to produce any work,
or owner), and the presumptions of existence from a film or video game to a song or book,
and accuracy of the registered rights. This article and the significant creative effort involved. The
indicates what kinds of works can be registered, success of these endeavours is hampered by
all those which are protected by intellectual piracy, whose sole purpose is to save money, as
property legislation, such as literary, artistic, analysed by the Coalition of Content Creators
visual, musical and audiovisual creations, videog- and Industries, according to which more than
ames, multimedia works, computer programmes, 50% of users who access pirated content do so
designs and plans, among others. It lists those because they are unwilling to pay for something
which are registrable and the requirements for that they might not like or because they are
each one, as well as good practice in registration. already paying for the Internet connection and
do not want to spend more.
Another article takes a look at ‘Judicial measures
vis-à-vis the infringement of intellectual property The Focus ends with a highly topical subject:
rights’ (Isabel Fernández-Gil) that can be used if ‘Blockchain and smart contracts. Legal implica-
these rights have been violated and the method, tions in the field of intellectual property’ (José
means and form of carrying them out through the María Anguiano), which also studies ‘smart
various channels provided by the legal system. property’ or ‘crypto-property’, an effective means
of exchanging money that is also applicable to
The following article deals with the intellectual intellectual property works and rights, which
property rights to a work arising from employ- can be transferred using this protocol by ‘to-
Creators and Authorship in the Digital Age
ment activity and the accountability of compa- kenising’ the asset or right to be transferred.
nies and workers, as well as the proper exercise Tokens in a digital environment are simply ‘data’
of technological supports or tools, in the study (information) that represents assets or rights and
on ‘Intellectual property and compliance. Good operate in a similar way to securities; therefore,
use of technological resources and account- possession grants ownership of that particular
ability’ (Vicente Navarro). This article proposes asset or right and makes it possible for the
good practices in compliance with the rules of owner to dispose of it by transferring it to a new
intellectual property and the protection of the owner through ‘smart contracts’. The essay also
organisation’s intangible assets – its intellectual analyses how smart contracts are finalised and,
property rights, which have an economic value accordingly, verified.
Professor at the Faculty of Law of the Universidad Isabel Fernández-Gil Viega has been practising law
Pontificia Comillas ICAI-ICADE, with a doctorate in Law since 1982 and has been adjunct lecturer in Civil Law,
from the Universidad Carlos III in Madrid; president initially at the Universidad Carlos III in Madrid until
Creators and Authorship in the Digital Age
(March 2012 to December 2015) and member (since 2005 and since then in the Department of Private Law
December 2015) of the First Section for Mediation and at the Universidad Pontificia Comillas (ICADE), where
Arbitration of the Intellectual Property Commission she teaches civil law subjects. She is also the director of
attached to the Spanish Ministry of Culture and Sport. the university masters degree in Intellectual Property at
Since 2002 she has been a corresponding member of this university, where she teaches and also collaborates
the Real Academia de Jurisprudencia y Legislación, by giving lectures for the masters degree in Access to
and a member of the 16th Section on Property the Legal Profession, and is a tutor for the bachelors
Registry Law. Director of the masters on Intellectual and masters degree dissertation projects carried out
Property at the Universidad Pontificia Comillas and the by the students. Her research work is focused on the
university’s higher course on Intellectual Property. study and protection of intellectual property rights.
108 Introduction
1. Copyright use and respect for authorship:
plagiarism and appropriate use of the
quotation limit
1. Introduction
of ‘author’: ‘The individual who creates any […]
This survey of the legal system of copyright work shall be deemed the author thereof’.
begins with an essential statement: recognition
of and respect for authorship is the backbone of It thus establishes and lists the necessary requi
intellectual property. Strict and firm respect for sites for a work to be protectable and defines
authorship entails having a robust and secure and clearly protects ‘authorship’, granting it not
legal system for protecting intellectual property only economic but also moral rights linked to the
rights. Authorship has been defined since the exercise of a subject’s creativity, intelligence and
very first intellectual property legislation in Spain creative freedom. These moral rights are inalien-
– a reflection of international and European able, non-transferable and of unlimited duration.
law; article 1 establishes that ‘the intellectual
property in a literary, artistic or scientific work Authorship is regulated among moral rights,
shall pertain to the author thereof by virtue of which protect and link the author to the pro-
the mere fact of its creation’ (from the consoli- tected work as a result of their freedom and
dated text of the Law on Intellectual Property, creative personality. In this sense, authorship is
Creators and Authorship in the Digital Age
1996).1 The work must be original and expressed the main moral right of intellectual property, and
in some format, and from this moment onwards is non-transferable and inalienable. Authorship is
the author is the sole and exclusive holder of the foundation of intellectual property rules and
the intellectual property rights, as a special regulations. For all the above reasons, unlawful
property, including moral and economic rights, appropriation of the authorship of another
which are enforceable erga omnes, such as right person’s work, plagiarism, is the most serious
of reproduction, distribution, communication infringement of intellectual property rights be-
to the public and transformation. And article 5 cause it affects the principal right of the author.
of the same text establishes the legal definition
Plagiarism is the most serious injury to intellec- The civil actions that can be brought, besides
tual property rights, since it affects authorship, claiming economic losses arising from unautho-
which is the main moral right of intellectual rised exercise of rights, also include reparation
property, being non-transferable and inalienable, of the moral damage caused by plagiarism,
and the basis of copyright rules and regulations. for appropriating someone else’s authorship;
Creators and Authorship in the Digital Age
c) The degree of unlawful dissemination of There are numerous judgements that do not
the work (for example, if the plagiarised recognise the publisher’s criminal liability but do
reproduction can be Googled, or if the hold them economically or civilly liable.
plagiarist’s work is published and distrib-
uted in other countries as well as Spain).
3. Unlawful appropriation of the
And with respect to the quantification of the authorship of someone else’s
economic compensation for the exploitation work: plagiarised and plagiarists
rights exercised, the law employs a modern, ob-
jective criterion that reflects European systems All authors of works protected by intellectual
such as that of Germany, giving the aggrieved property rights can be harmed by the unlawful
party the option of choosing from the following appropriation of authorship of their work,
alternatives: whether this authorship is individual, collective
or joint. For example, an author of a scientific
1. The aggrieved party or plagiarised author work written in collaboration with a research
can claim economic damage, or lucrum group may find that their part of the authorship
cessans (loss of earnings: difference bet of the work has been subjected to plagiarism.
ween current wealth and that which they
would otherwise have obtained). A special case is authors who sign with a
pseudonym, or anonymous works. They, too, are
2. They can claim the earnings obtained by protected by the rules of copyright, although
the plagiarist (the earnings of the person proving authorship may pose a problem.
who committed unlawful plagiarism).
In other cases, ignorance of authorship (‘orphan
3. They can claim the market value (objective works’) makes the protection of authorship more
criterion) of the rights to the plagiarised vulnerable. But not knowing who the author is
Creators and Authorship in the Digital Age
work, the money the aggrieved party no excuse for allowing or facilitating the appro-
would have received for exercising their priation of someone else’s intellectual creation or
rights if the plagiarist had requested a creative activity.
licence and paid the established fees.
As for the person who performs the unlawful act
of plagiarising, plagiarism, it can be carried out
by anyone who appropriates someone else’s cre-
ative activity, the authorship of a work protected
by intellectual property rights.
an expression of the author’s creativity, and its presumption of existence and accuracy of
external expression as a form of presenting this registry records, of the rights and ownership
creative activity in a medium. recorded in the Registry).
That is why works containing sections that are • Earlier publication or edition of the original
common knowledge or lacking in originality are work.
not protected, because they are a mechanical
result that does not involve creative intelligence. • Proof that the protected work was exhib-
ited at an earlier date than the plagiarist’s
work.
• Means providing information on authorship There are various types that have been identified
and rights, such as the copyright symbol ©, in the many judicial decisions issued on plagia-
the legal deposit, the ISBN, or the ISNN. rism:
Each of these means involves an expert’s report • Plagiarism can be literal, concealed, partial,
confirming that the plagiarised work existed or total.
at an earlier time compared to the plagiarist’s
work. For example, recordings made on the hard • Some types have particular features relating
disk of a computer or on a recording device that to the plagiarised object or work.
attest to the earlier existence of the documents
that gave rise to the protected and plagiarised • In other cases, these particular characteris-
work are admissible as evidence in a trial. tics stem from the plagiariser.
In other cases, when the work in question was • The activity that constitutes plagiarism will
produced jointly or is a collaborative effort differ in scope depending on the rights that
involving several authors, in order to avoid the are infringed by the reproduction, distribu-
problem of improper identification of authorship, tion and communication to the public of the
it is necessary to specify the authorship clearly work resulting from plagiarism.
and unmistakeably in each part or article of the
final work. Similarly, when a text is signed jointly • In other cases, the seriousness or extent
by several authors, this joint authorship must be of the plagiarism will stem from the fact
perfectly defined and established. For example, that several works have been plagiarised
in a research group it is necessary to prove and (volume or number of works that have been
define the authorship of the parts of the result- plagiarised) and/or that the plagiarist has
Creators and Authorship in the Digital Age
• The moral right of authorship of the work. • By proof of ‘the existence of one or several
works resulting from plagiarism’.
• The moral right of integrity of the work.
Partial plagiarism and infringement of the • By proof of the ‘exploitation rights’ exer-
right of transformation (for example, the cised (harmed) by the plagiarist: reproduc-
plagiarist’s work is translated into another tion of the plagiarist’s work or works.
language other than that in which the
original plagiarised work is written). • By proof of ‘the distribution and public
communication made by the plagiarist’:
• The economic right of reproduction. for example, when the plagiarist has given
lectures on a plagiarised publication, they
• The economic right of distribution and have disseminated the works resulting from
communication to the public. their plagiarism on the Internet (written,
music, visual, audiovisual and scientific
Creators and Authorship in the Digital Age
First and foremost, quoting from a work entails The above case therefore constitutes unlawful
using part of the work, but respecting the au- appropriation of the authorship of somebody
thorship, because the author is unquestionably else’s work, plagiarism, as it entails inappropriate
identified. This legal limit on quotation is regu- or non-existent use of quotation. Breach of the
lated in article 32 of the TRLPI and permits the rules on quotation, of the legal requirements
use of a protectable work, without the consent that constitute legal use of the works for quota-
of its author or the holder of intellectual property tion pursuant to article 32 of the TRLPI has the
rights. However, the main problem consists in de- legal consideration of plagiarism, because the
termining how a work can be quoted from while authorship of the work used by the plagiarist
appropriately ensuring that the author’s rights is not identified, or is identified incorrectly.
are protected. The answer is easy: it lies in article The authorship of the paragraphs, images,
32, which specifies the legal requisites for citing text, three-dimensional, visual, musical, cine-
from a work in a legally permitted manner and matographic or multimedia work, web content,
defines the circumstances under which quotation etc., is not specified clearly. The plagiarist does
is permitted and for what purposes. The first not respect or identify the author, and deceives
paragraph of article 32.1 thus establishes that: readers by passing off another author’s intellec-
Creators and Authorship in the Digital Age
the reasons why intellectual property rights are others, unless authorised by the author
not respected – and which gives rise to errone- or rightsholder); and registrable in the
ous and conflicting interpretations – is lack of Registry of Intellectual Property, with
knowledge of these regulations or of the special all the implications of publication in an
legislation on copyright and related rights, which official registry as an institutional system
date back to more than a century ago. of preventive protection and a means of
proof in the event of conflict.
Suffice it to recall that, among others, two of
the core principles of the Spanish Intellectual
Property Law are:
118 2. PREVENTIVE AND PROBATIVE MEASURES FOR THE LEGAL PROTECTION OF INTELLECTUAL PROPERTY WORKS
2. The registration of works as protection of their status as author or holder
declaratory of existing intellectual of intellectual property rights. The period for
property ownership and rights registering the published works was short,
one year. However, the registry system could
Registering intellectual property rights in this not be described as establishing ‘constitutive
special registry is a mechanism for ensuring legal registration’, but rather as regulating the ‘neces-
certainty and for publishing or declaring existing sary registration’, since the benefits of the law
ownerships and rights, as well as an effective extended back to the period prior to registration,
means of protection and of providing proof in provided registration took place.5
lawsuits or disputes.
Subsequent legislation established a preventive
It is unquestionable that the extent to which a registry system based on voluntary registration
country fosters intellectual creation and systems in the Intellectual Property Registry as a means
for protecting it is a relevant indicator of that of declaratory public registration of the intel-
country’s wealth and progress in the fields of lectual work, which already existed from the
culture, economy, science and politics. This is moment it was created. This rule is in keeping
the reason why lawmakers establish a measure with the provisions of international conventions
for providing works with institutional, public on copyright. Thus, the Registry is designed
protection – registry protection. Concern about as a public means of protecting intellectual
effective protection has always been evident, property rights relating to works, performances
and the first law on intellectual property referred or productions protected by the law, based on
to the need to register works in order to obtain registry organisation criteria: the public nature of
and fully enjoy the relevant rights. the Registry and the presumption that registered
rights exist and they belong to the holder in
Today, according to current copyright legisla- the form stated in the respective entry, unless
tion, going to the Intellectual Property Registry there is evidence to the contrary. These are the
is optional, and registering a work is a statement characteristics that define the Registry pursuant
of the ownership and intellectual property rights to Royal Decree 281/2003 of 7 March6 adopting
which existed from the moment it was created. the current Rules of the General Registry of
However, the legal scope of public registration Intellectual Property. Only two precepts, articles
is often unknown, even though it provides a 144 and 145 of the consolidated text of the
high degree of legal certainty and effectiveness Intellectual Property Law of 1996, recognise this
and is easily accessible and affordable for public protection mechanism.
anyone wishing to benefit from its regulatory
safeguard, registry protection, as it offers all the Before continuing with this study of the Intel-
beneficial presumptions of existence, accuracy lectual Property Registry, I would like to clarify
and ownership. a few legal concepts or situations that are far
Creators and Authorship in the Digital Age
for processing and deciding on applications to scientific work, because according to article 4 of
register or annotate the intellectual property the Law on Invention Patents and Utility Models
rights of an author or rightsholder. However, the (Ley de Patentes de Invención y Modelos de
structure and organisation are established by a Utilidad), it already enjoys registry protection
single General Registry of Intellectual Property through the public registry system of the In-
(Registro General de la Propiedad Intelectual), dustrial Property Registry, currently the Spanish
which is made up of the Territorial Registries and Patent and Trademark Office (Oficina Española
the Central Registry (Registro Central).7 There is de Patentes y Marcas).
also a Registry Coordination Commission,8 which
120 2. PREVENTIVE AND PROBATIVE MEASURES FOR THE LEGAL PROTECTION OF INTELLECTUAL PROPERTY WORKS
Also, since the aforementioned Royal Decree • Assignment of the right to communicate
281/2003, there has been no legal doubt that it it to the public (for example, so that the
is also been possible to register videogames and assignee can disseminate the work in a
websites wholly or in part in this Intellectual network).
Property Registry as multimedia works.
• And/or assignments of the right to
What is actually published in the Intellectual transform the intellectual property work
Property Registry? According to the interpreta- (for example, so that the assignee can
tion of article 1 of the regulations of the Intellec- translate an existing work into another
tual Property Registry (Royal Decree 281/2003), language).
the entry is structured into two sections:
Entering the work in the registry entails The subjects who can request the registration of
safeguarding the presumption of owner- the works are listed in detail in articles 11 and 13
ship (the work is owned by the author or of the aforementioned regulations of 2003. The
registered rightsholder) and the presump- following situations are specified:
tion of the existence of the work vis-à-vis
third parties (it provides proof in the event 1. In first place, the authors and other original
of a dispute). And as real rights with an holders of the intellectual property rights
economic value, it is possible to record are entitled to apply for the registration or
other acts that would affect the registered annotation of rights with respect to their
work, such as embargo or mortgage work. In the case of collective works, it is
annotations. the person (natural or legal) that publishes
or discloses it. In composite or derivative
2. The registration or annotation of acts and works, it is the author or authors with
contracts involving the creation, transfer, proof of the authorisation of the author
modification or extinction of real rights to of the pre-existing work. And in the cases
the registered work, that is, registrations of authors who use a pseudonym or sign
of rights to the registered work that are as- or anonymous authors, the person who
signed (to assignees). These new holders of validly exercises the intellectual property
intellectual property rights can also protect rights may apply for registration.
their rights (acquired through assignment)
by registering or annotating them in this 2. Successive holders of intellectual property
Creators and Authorship in the Digital Age
special registry. Possible examples are: rights as a result of inter vivos or mortis
causa transfers may also apply for registra-
• The registration of assignments (through tion or annotation:
assignment contracts) of the right to
reproduce the registered work (for • Rightsholders through assignment of
example, through a publishing contract). rights of reproduction, distribution (for
publishing, for example) or communica-
• Assignment of the right to distribute it tion to the public.
(for example, in a publishing contract
that also includes reproduction rights).
What are the requirements for registering works? g) Place and date of submittal of the applica-
It is necessary to comply with general require- tion for registration.
ments, which are established for all works, and
special requirements depending on the type of h) Signature of the applicant (or even an
work to be registered (artistic, audiovisual, sci- authorised person with proof of represen-
entific, literary, musical, computer programmes, tation).
databases, multimedia works, webs pages, video
games, etc.). i) Proof, if applicable, of payment of the
corresponding fee (the cost of registration
It should be remembered that technologies is often very low, about 14 euros).
Creators and Authorship in the Digital Age
122 2. PREVENTIVE AND PROBATIVE MEASURES FOR THE LEGAL PROTECTION OF INTELLECTUAL PROPERTY WORKS
works and plays in general, which can be pro- and the intellectual property rights they hold.
tected by intellectual property rights, paragraph The registry system serves an evident preventive
a) of article 14 of the 2003 regulations specifies purpose as it provides information on who the
the requirements for registering these works.9 owner is and what rights they hold, and there-
fore registering or annotating these intellectual
Other copyrightable works are web pages property rights and their ownership is an effec-
(referred to ‘electronic and multimedia pages’), tive means of proof in the event of a dispute.
for which section o) of article 14 states the
registration requirements. In this connection, it is important to highlight
the ‘legal presumptions’ granted to the regis-
In addition to the two examples mentioned tered rightsholder (author, holder or assignee of
above, for practical purposes and to demonstrate rights) regarding the contents and scope of the
the simplicity and legal certainty offered by the intellectual property right registered. Specifically:
registry system, the various sections of this arti-
cle 14 of the regulations of the Intellectual Prop- 1. With respect to the presumption of own-
erty Registry (Royal Decree 281/2003) describe, ership or authorship of the person whose
in a non-exclusive list, the types of works pro- name appears in the Registry, article 27 of
tected by the rules of intellectual property, and the regulations of the Intellectual Property
the specific requirements for each of them to be Registry (2003) establishes the effective-
registered in the Intellectual Property Registry. ness of registering the work, stating that
They include musical compositions, choreogra- ‘it shall be presumed, unless proven oth-
phies and pantomimes, cinematographic works erwise, that the registered rights exist and
and other audiovisual works, sculptures, draw- belong to their holder in the form specified
ings and paintings, engravings and lithographs, in the related entries’.
comics, other artworks, photographic works,
projects, plans and designs of architectural and 2. Regarding the presumption of the exis-
engineering works, models, graphics, plans and tence of registered rights. Article 27 of the
designs related to topography, geography and, regulations of the Intellectual Property
in general, to science, computer programmes, Registry likewise establishes the presump-
databases or electronic and multimedia pages, tion that the published rights exist and are
the performances of performers, phonographic as recorded in the registry.
productions, audiovisual recording productions,
simple photographs, editorial productions 3. Consequently, it is not possible to register
provided for in the Intellectual Property Law, or annotate rights that are incompatible
and any other protected works or productions with another right that is already regis-
not included in the previous sections.10 tered or annotated. Such a case would
arise, for example, if a person tried to
Creators and Authorship in the Digital Age
sholder) has previously been registered, the works protected by intellectual property are
purchaser (new assignee) cannot register currently regulated by Law 23/2011 of 29 July
their acquired right in the Registry. on Legal Deposit and by Royal Decree 635/2015
of 10 July, which regulates the legal deposit of
5. Another legal effect is the publication online publications.
of the registry entries. The public nature
the Registry grants is a core principle of The purpose of this legislation is to regulate this
the protection of intellectual property legal concept, the legal deposit, which is defined
rights. It takes the form of three types of in article 1 of the abovementioned Law 23/2011.11
124 2. PREVENTIVE AND PROBATIVE MEASURES FOR THE LEGAL PROTECTION OF INTELLECTUAL PROPERTY WORKS
Its purpose is to preserve and facilitate access However, the legal scope of legal deposit and
to works protected by intellectual property the Intellectual Property Registry cover two very
rights. The preamble states that ‘the book, different areas. Legal deposit allows works that
sound, visual, audiovisual and digital heritage of are disseminated or published to be identified,
the cultures of Spain is one of the richest and because its purpose is to preserve and make
most representative in the world and must be accessible a country’s culture, but it does not
preserved for the benefit of present and future facilitate the protection of unpublished works.
generations’, so that it can be accessible to all In contrast, the task of protecting authorship,
citizens and contribute to their cultural, social ownership and rights to works protected by
and economic development. intellectual property rules, published or not, falls
to the registry system, the Intellectual Property
Law 10/2007 of June 22 on Reading, Books and Registry, as a means of preventive protection
Libraries stated that it is the duty of the state to and of providing proof of registered ownership
regulate the legal deposit insofar as the essential and existing rights to the works.
mission of the latter is to preserve culture and to
allow anyone to access the cultural, intellectual The ISBN and ISSN, numerical codes for identify-
and book heritage, while helping protect copy- ing protected works with which they ensure and
right in the field of intellectual property. facilitate the specification and protection of the
works and their author or owner, have a similarly
In order to achieve this goal, especially, the informative purpose. An ISBN is an international
publishing sector has the legal obligation to standardised code for books (International Stan-
submit to the public administrations’ repositories dard Book Number), whereas the ISSN (Interna-
copies or samples of publications of all types and tional Serial Standard Number) is an international
in any medium, including online publications. standardised number for serial and periodical
publications, magazines, newsletters, etc.
Given the state of technology, the European
institutions have warned about ‘the challenges The ISBN code on monographs, in any medium,
posed by the deposit of book, sound, visual, is regulated by Royal Decree 2063/200814 of 12
audiovisual and digital heritage in a digital December implementing Law 10/2007 of 22 June
environment and have proposed solutions aimed on Reading, Books and Libraries with respect to
at exploring new techniques for gathering ma- the ISBN. Article 1 defines what this enumera-
terial online for dissemination and conservation tion entails, determining the purpose and scope
purposes’ (Preamble to the 2011 law). of this rule:
According to article 4 of this law, copies of ‘all The International Standard Book Number, ISBN,
kinds of publications, produced or published is the number created internationally to assign
in Spain, by any production, publication or each book a numerical code that identifies it and
Creators and Authorship in the Digital Age
dissemination procedure, and distributed or makes it possible to coordinate and standardise the
communicated in any medium or by any means, identification of any book in order to locate it and
tangible or intangible’ are to be deposited. facilitate its market circulation.
Sections 2 and 3 of the article specify the publi-
cations that must be deposited for the purpose It adds that the ISBN must be displayed on all
of conservation, dissemination of knowledge and publications that are included in section a) annex
culture, and protection of intellectual property I of this Royal Decree.
rights.12 The Biblioteca Nacional, Spain’s national
library, is the repository for the published works Section b) of annex I lists exempted publications,
submitted.13 including music scores, since ‘their commercial
126 2. PREVENTIVE AND PROBATIVE MEASURES FOR THE LEGAL PROTECTION OF INTELLECTUAL PROPERTY WORKS
9. Bibliography Piñol Espasa, José Agustín, ‘El registro de la
propiedad intelectual’, in Felipe Palau Ramírez
Couto Gálvez, Rosa de, ‘Medida preventiva y and Guillermo Palao Moreno (dirs.), Comentarios
probatoria que ampara los derechos sobre la a la Ley de Propiedad Intelectual, Valencia, Tirant
obra científica’, in Rosa de Couto Gálvez y Celia lo Blanch, 2017, pp. 1649−62.
Sánchez-Ramos (coords.), Propiedad intelectual e
industrial de la obra científica. 3. Patentes, Madrid, Rams Ramos, Leonor, ‘Aspectos administrativos
Universidad Complutense / Universidad Pontifi- en la evolución del Registro General de Propie-
cia Comillas, 2010, pp. 57−67. dad Intelectual como mecanismo de protección’,
Revista Crítica de Derecho Inmobiliario, no. 686,
Hernández Torres, Estefanía, Patrimonio histórico 2004, pp. 2779−824.
y Registro de la Propiedad, Madrid, Reus / Regis-
tradores de la Propiedad, 2018. Rodríguez-Toquero y Ramos, Pilar, ‘Registro y
propiedad intelectual’, Anuario de la Facultad de
Martínez Posada, Rosa, ‘El registro general de la Derecho de Alcalá de Henares, no. 6, 1996−1997,
propiedad intelectual’, in Eduardo Serrano Gó- pp. 41−58.
mez (coord.), Administraciones públicas y propie-
dad intelectual, Madrid, Reus, 2007, pp. 73−98. Vives-Gràcia, Josep, ‘Aspectos de propiedad in-
telectual en la creación y gestión de repositorios
Miserachs Rigalt, Antonio, ‘La inscripción de una institucionales’, El Profesional de la Información,
obra en el registro de la propiedad intelectual’, El vol. 14, no. 4, 2005, pp. 267−78.
Libro Español: Revista Mensual del Instituto Nacio-
nal del Libro Español, no. 103−4, 1966, pp. 477−83.
Article 27 of the Universal Declaration of Human thorisation of the holders of the related intellec-
Rights16 states that ‘everyone has the right to the tual property rights or their assignees.
protection of the moral and material interests
resulting from any scientific, literary or artistic Swiftly combating these illegal activities and
production of which he is the author’. This is offences against intellectual property rights
repeated in very similar terms in article 15 of the should be a priority, since for every minute an
International Covenant on Economic, Social and unlawful act and, accordingly, an infringement
Cultural Rights17 and in articles 348 and 428 of takes place, the risk of irreparable damage to
the Spanish Civil Code,18 which define property the author’s or the artist’s moral and economic
as the right to enjoy and make use of something rights increases exponentially. Immediate action
change in their intellectual or moral convictions, • Reproduction, in any medium, without the
after paying damages to the holders of the assistance of third parties, of works already
exploitation rights, etc. It also grants them a set made available to the public, if carried out
of economic rights: the exclusive right to exploit by an individual exclusively for their private
their work in any way and, especially, the right to (and not professional or business) use,
reproduce, distribute, communicate to the public and without direct or indirect commercial
and transform the work. The above actions purposes; the reproduction must be made
cannot be carried out without their authorisation from a legal source and the conditions of
except in the cases provided for by the Law on access to the work or other subject-matter
Intellectual Property. must not be violated and the resulting copy
for the exclusive use of abovementioned both in-person and distance teaching, or for
beneficiaries or of an authorised organisa- the purpose of scientific research and to the
tion established in any Member State of the extent justified by the non-commercial aim
European Union. pursued.
will be paid through collecting societies. • The reproduction, distribution and open
communication, through paintings,
• The reproduction, distribution and commu- drawings, photographs and audiovisual
nication to the public of works and articles procedures of works permanently located
on topical subjects disseminated by the in parks, streets, squares or other thorough-
media, citing the source and the author if fares.
the work was published under a by-line and
provided that no reserved copyright notice • Reproductions of works, when they are
appeared in the original, notwithstanding made for non-profit purposes by museums,
the author’s right to collect the agreed libraries, record libraries, film libraries and
with reasonable indications of knowing about LPI, as it would not be appropriate to speak of a
it; anyone with a direct economic interest in the private use, is making these files available to the
results of the infringing conduct who has the public and therefore performs an act of communi-
ability to influence the conduct of the offender; cation to the public provided for in article 20.2.1) of
and intermediaries whose services are used by a the LPI’.
third party to infringe intellectual property rights Therefore, fixing musical recordings on the hard
recognised by this law, though the acts of such disk of a computer, in that it allows them to be
intermediaries do not in themselves constitute communicated or copies to be made, constitutes
an infringement, notwithstanding the provisions an act of reproduction (article 18). In addition,
of Law 34/2002 of 11 July21 on Information Soci- these recordings are made available to many
Once the offenders have been identified, f) That the instruments whose sole purpose
the holder of the violated rights and/or the is to facilitate the unauthorised suppres-
collecting society may apply for an injunction sion or neutralisation of any technical
restraining the illegal activity via registered fax or device whatsoever used to protect a
any reliable means of notification, and demand computer programme be confiscated,
compensation for the material and moral dam- disabled and, if necessary, destroyed at the
ages caused. Specifically, depending on the type infringer’s expense.
of infringement, it is necessary to request that:
g) That the instruments used to facilitate the
a) The infringing exploitation or the activity unauthorised suppression or neutralisation
that constitutes infringement be sus- of any technical device whatsoever used
pended. to protect works or services, even if that
Creators and Authorship in the Digital Age
b) The money that the aggrieved party would 5.1. Civil procedure
have received as remuneration, if the
infringer had requested a licence to use Going down this route makes it possible to
the copyright in question. request precautionary measures in cases where
the infringement has already occurred or there
It is worth noting that the CJEU (Fifth are good and reasonable and grounds to fear
Chamber) Judgment of 17 March 2016, Rec. that it will occur imminently. The request may
C-99/2015, states: be made prior to filing the corresponding claim
(in this case the remedies will be of no effect
Creators and Authorship in the Digital Age
Article 13(1) of Directive 2004/48/EC of the if the claim is not filed within twenty days), or
European Parliament and of the Council of 29 April at the same time. Once the request has been
2004 on the enforcement of intellectual property submitted, the judicial authority may give orders
rights must be interpreted as permitting a party for appropriate precautionary measures needed
injured by an intellectual property infringement, to urgently protect the rights, especially:
who claims compensation for material damage as
calculated, in accordance with heading (b) of the 1. The seizure and deposit of revenue earned
second subparagraph of Article 13(1) of that direc- through the unlawful activity in question
tive, on the basis of the amount of royalties or fees or, where appropriate, the deposit of
which would have been due to him if the infringer amounts payable by way of remuneration.
3. Seizure of copies produced or used and of It must be borne in mind that the statute of
the material used mainly for the reproduc- limitations for filing a claim for damages is five
tion or communication to the public. years from the date it may be exercised by the
person entitled to do so.
4. Seizure of the equipment, devices,
products and components referred to in It is also customary to prepare the trial through
articles 102.c) and 196.2 and those used for the so-called ‘preliminary investigations’ (diligen-
the suppression or alteration of data for cias preliminares), which can be defined as the set
the electronic management of the rights of actions whereby the court with jurisdiction is
referred to in article 198.2. asked to make specific enquiries to gather the
information required to ensure that the future
5. Seizure of the equipment, devices and trial may be effective. The Supreme Court, in its
materials referred to in article 25, which judgment of 20 June 1986, defined them as ‘the
will stand encumbered for payment of the set of actions aimed at clarifying the issues that
reparation claimed and the appropriate may arise prior to the commencement of judicial
damages. proceedings in the principal action, and they are
therefore a clarifying process that lacks enforce-
6. The suspension of services provided by ability’. In other words, we may conclude that
intermediaries to third parties who use this term refers to actions aimed at ensuring that
them to infringe intellectual property the requesting party obtains the information
rights, notwithstanding the provisions needed to prepare the proceedings to defend
of Law 34/2002 of July 11 on Information their legitimate rights or interests.
Society Services and Electronic Commerce.
With respect to intellectual property, they are
Both injunctions and precautionary measures regulated in article 256 of the Civil Procedure
may also be requested, when appropriate, Law (Ley de Enjuiciamiento Civil),24 sections 10
against intermediaries whose services are used and 11, and are used, among other purposes, to
by a third party to infringe intellectual property gather information about the possible infringer
rights recognised under this law, even though and the origin and distribution networks of
the acts of such intermediaries do not in works, goods or services; and to identify the
Creators and Authorship in the Digital Age
in criminal procedural legislation from being Once the proceedings have been initiated, the
taken. judge will decide on all the evidence leading to
the clarification of the offence in question and
Offences against intellectual property are its perpetrators. Following the completion of
defined in articles 270 to 272 of the Criminal the investigation, the intermediate procedural
Code, the most common type, within those that stage begins during which the proceedings will
infringe copyright and intellectual property, be- be discontinued or the offences will be defined
ing plagiarism or the copying of books, paintings, by both the Public Prosecutor’s Office and the
music scores, doctoral theses, scientific works, accusation and defence. The oral phase then
computer programmes, photographs, etc. begins, consisting of the oral trial, which ends
no notification is received the application will be the weighing of digital evidence by the relevant
deemed to have been refused, pursuant to article authorities must be respected unless it is arbi-
158 ter-3 of the LPI. In addition, it requires the trary, illogical or irrational, since it is entrusted by
involvement of the central administrative courts, law to the good judgement of the judge; where
which will be responsible for authorising, on there are various opinions, the judges can heed
the one hand, the request for the collaboration them all or only one of them and dispense with
of the providers of intermediation services by the others, or select partially the data deemed
handing over the data at their disposal to allow appropriate to submit them to the reasoning of
the responsible party to be identified (article good judgement, that is, loyally and objectively in
18 RD 1889/2011), and, on the other hand, the relation to what has been discussed.
Vicente Navarro
for a new type of corporate risk – the criminal risk and makes it possible to facilitate the imple-
(criminal liability of the company); this makes it mentation of a compliance management system
necessary for companies (regardless of their size) in small organisations, as well as to develop a
to establish a new legal framework for imple- compliance superstructure, since it is perfectly
menting prevention programmes that are effec- adaptable to the degree of maturity of an
tive and that allow them to detect and prevent organisation’s compliance management system
any criminal risks arising from their organisation. and to the nature and complexity of its activities.
Likewise, it can be useful in relation to any risk
However, despite the fact that compliance of regulatory noncompliance, such as risks linked
is gaining importance today as a function, to intellectual property.
Unless an organisation’s innovative ideas, The regulatory body in Spain is the Spanish
new designs and models, and trademarks are Patent and Trademark Office (Oficina Española
protected in accordance with the legislation de Patentes y Marcas, OEPM), while in Europe it
governing intellectual property rights, any is the European Patent Office (EPO).
other company may use them for free, with no
limitations of any kind. However, when they In the patent process, the applicant requests
are protected by intellectual property rights, protection for their invention in one or more
these assets acquire a specific value for the countries, and each country decides whether to
company, because they become property rights provide patent protection in its territory. The
that cannot be sold or used without the holder’s Patent Cooperation Treaty (PCT), managed by
authorisation. the World Intellectual Property Organization
(WIPO), facilitates the submission of a single
Organisations are attaching increasing impor- international patent application to obtain pro-
tance to intellectual property assets by including tection in several countries.
them on their balance sheets and conducting
technology and intellectual property audits on a As a rule, patent protection usually lasts for
regular basis. twenty years, during which time the company
that owns it enjoys a monopoly on selling the
Many organisations have come to realise that product or the patent, and on assigning the use
their intellectual property assets are, in fact, of the patented invention. After this period, the
more valuable than their material assets. patent becomes public domain.
Intellectual property rights can be divided into: All patent holders must, in exchange for protec-
tion, publish information about their invention,
1. Moral rights, which are inalienable. in order to enrich the world’s technical knowl-
edge. This information includes a description of
2. Economic rights, which may be sold, as- the invention, which may be accompanied by
signed or even mortgaged by their holder drawings, plans or diagrams.
if wished.
Creators and Authorship in the Digital Age
Geographical indications provide protection Both copyright and related rights include other
against the unfair competition of products types of rights, the so-called moral rights, which
that do not meet the requirements of origin basically include, according to article 14 of
and quality. States are responsible for ensuring Spain’s current Intellectual Property Law, the
compliance at the national level, and WIPO is following:
responsible at the international level.
1. To decide if whether the work is to be made
available to the public and, if so, in what form.
3.5. Copyright and related rights 2. To determine whether such communication
should be effected in their name, under a pseud-
Copyright covers the rights creators enjoy over onym or sign, or anonymously.
their literary, artistic and scientific works by 3. To claim authorship of the work.
virtue of the mere fact of having created them, 4. To demand respect for the integrity of the work
as established in article 1 of the current Spanish and object to any distortion, modification, alter-
Intellectual Property Law. It encompasses, ation or any act that may be detrimental to their
among other creations, novels, poems, plays, legitimate interests or to their reputation.
reference documents, newspapers, computer 5. To alter the work subject to respect for the
programmes, databases, films, photographs, acquired rights of third parties and the protection
musical compositions, choreographies, paintings, requirements of goods of cultural interest.
sculpture, architecture, drawings, advertising, 6. To withdraw the work from circulation due to
Creators and Authorship in the Digital Age
The protection offered to plant varieties is c) Violation of secrets and espionage. There
twenty-five years for trees and vines and twenty is, however, a requirement in order for
years for other plants. this conduct to be considered unfair
competition: ‘that the violation has been
carried out in order to gain an advantage
3.7. Unfair competition for oneself or for a third party, or to harm
the holder of the secret’.
In recent years, unfair competition has become
one of the chief sources of intellectual property This law was subsequently qualified by Law
disputes in the business world. In general, unfair 29/2009 of 30 December, which modifies the
competition is taken to mean any act of compe- legal framework for unfair competition and ad-
tition that is contrary to honest practices in the vertising to improve the protection of consumers
industrial and commercial sphere. However, the and users.
concept appears somewhat vague, since what
constitutes honest practice for one company Articles 5 and 6 accordingly add theft of informa-
may not qualify as such for another, which is tion to competition:
why in many cases disputes of this kind often
end up in the courts. Art. 5: Any behaviour that is objectively contrary
to the requirements of good faith is considered
In Spain, articles 11, 12 and 13 of Law 3/1991 disloyal.
Creators and Authorship in the Digital Age
of 10 January on Unfair Competition (Ley de Art. 6: The risk of association with respect to the
Competencia Desleal) clearly define three types origin of the service is sufficient to substantiate the
of conduct that would be considered unfair disloyalty of a practice.
competition:
As we have seen, unfair competition is an aspect
a) Acts of imitation, since they take advan- closely related to intellectual property. The laws
tage of others’ reputation and effort. of unfair competition seek to broaden the scope
This article also classifies as unfair ‘the of intellectual property laws.
ments are committed in the physical world or in 2. In accordance with the rules established in
cyberspace, are reflected in the following articles article 66 bis, judges and courts may also impose
of the Criminal Code: the penalties included in letters b) to g) of section
7 of article 33.
a) On the discovery and disclosure of secrets:
articles 197 to 200. Therefore, the Spanish Criminal Code is particu-
larly harsh in its punishment of offences against
b) On fraud: articles 248 to 249. intellectual property and industrial property
and the disclosure of secrets in the corporate
c) On damages: article 264. environment.
been legally entrusted with the function taken at the border to prevent the entry and
of supervising the effectiveness of the circulation of allegedly infringing products,
internal controls of the legal entity; and damages (civil liability) can be claimed.
The evolution of the use of new technologies Just as corporate technological resources are
and the diversity of corporate resources and regulated, so should the use of personal techno-
technological devices available to employees logical devices for professional purposes – cur-
to carry out their work regardless of their rently known as Bring Your Own Device or
geographical location have marked a major BYOD – be moderated. With respect to the
breakthrough in the development of any busi- company’s control of the use of corporate
ness, but they have also given rise to the need technological resources or company-owned
for companies to manage the risks and abuses computer resources, such as computers (desktop
associated with their use. and laptop), telephone terminals (landline and
and the technological means used to carry out to perform the work entrusted to them:
the checks.
a) Intellectual property
Notwithstanding the foregoing, it should be
noted that there is a recent ruling of the Crim- a.1. Agree that, according to articles 51 and 97.4
inal Chamber of the Supreme Court of 16 June of the Intellectual Property Law, rights over
2014 (STS 2844/2014, Appeal 2229/2013) which is any creations that have been developed in the
relevant to employers’ access to corporate email context of the employment relationship will
because it establishes a new criterion, question- automatically and exclusively belong to the
ing the sufficiency of these requirements for organisation.
receive any kind of material that is indecent or Compliance and the compliance function in banks,
inappropriate to the performance of their work, Bank for International Settlements, January 2005,
or any other type of unlawful material. These http://www.bis.org/publ/bcbs113.pdf
uses will be limited to those which are socially
permitted (article 87 LOPDGG). O’Brien, M., ‘How Corporate Compliance helps
your organization to be accountable’, CARF
b.2. If the organisation detects that a worker has Connection Review, CARF International, Tucson,
used these professional tools improperly, has Arizona, 2006.
viewed, downloaded, sent or received indecent
Today no one doubts that the information soci- article, that both digital technology and the
ety has transformed and is transforming the lives Internet offer the content industries an excellent
of human beings in an essential way and with an opportunity to foster direct connection between
impact – as Alvin Toffler pointed out some time creators and their audience and to expand the
ago – that is proving to be as great as that of the business models for enjoying a song, a movie, a
agriculture or industrial revolutions in the past. book or a video game.
154 5. GOOD PRACTICE AND PROCEDURES FOR PROTECTING THE INTELLECTUAL PROPERTY RIGHTS TO CONTENT…
meaningful participation by all in intellectual If we analyse in detail what it costs to make
property issues and knowledge sharing through full a film, it becomes clear that, although their
awareness and capacity building is a fundamental turnover appears very sizeable, these industries
part of an inclusive Information Society. take a very long time to make profits, which are
furthermore quite meagre. Making movies is an
It is obvious that the development of the infor- exciting experience, but it is not cost-free. Be-
mation society and the adaptation of the content fore you even start to shoot the first frame, you
industries to this new business model go hand in have to organise the production, seek funding,
hand. However, the first years of the twenty-first investors; you have to hire screenwriters, search
century have witnessed a clash between the for locations, recruit the crew, etc. Even search-
cultural industries and the new companies that ing for locations requires forking out significant
were created to underpin the information society, sums on travel, professional services, insurance,
especially Internet service providers. Both indus- etc.
tries need to get on in order to provide consumers
with the service they demand, namely fast and Once the funding has been secured – for which
easy access to content using new technologies. the producers often have to mortgage their
The ‘totally free’ model that some advocated as own property – it is necessary to schedule the
part of the wide-ranging space of freedom that shooting and make all the accommodation
the Internet was meant to be is as indefensible as arrangements for the entire cast and crew:
the monopoly on the sale of content and unfair actors, technicians, costume suppliers, carpen-
conditions that others tried to impose. ters, electricians and the long list of profes-
sionals involved in making the film; if you have
Public institutions immediately realised it was ever stayed right until the end of the screening
necessary to regulate the development of the of any feature film, you will have noticed the
information society by protecting the holders of hundreds of professionals who appear in the
content rights and at the same time allowing the credits. However, the investment does not end
information society to develop unhindered. And there: after filming comes post-production, to
the reasons for the ensuing intense regulatory incorporate music, image and sound effects, and
activity are rooted in the economic data that only after montage does the film acquire its true
both sectors represent. personality and can be marketed. To have come
this far it is necessary to have applied for public
From the perspective of the holders of intellec- subsidies, many of which are not paid until the
tual property rights, the European Union has es- film has been released and has achieved mini-
timated that intellectual property (including both mum box-office results. The pre-sale of rights
intellectual and industrial property) accounts for and even the contribution of a television channel
five trillion euros; this represents 39% of gross will probably have supplied some of the cash
domestic product and 26% of jobs; no less than needed to undertake the project, but there are
Creators and Authorship in the Digital Age
56,500,000 jobs throughout the European Union further very sizeable investments that need to be
are provided directly by the intellectual and made: a producer has to study very carefully how
industrial property industries. In addition, these to sell the film in the different channels and start
industries pay their workers wages of up to 40% necessarily by operating in cinemas, protecting
above the average (according to a study by the this business for at least three or four months,
Office for Harmonization in the Internal Market, which is what is known as release windows; to
OHIM, and the European Patent Office, EPO, do so, it must invest further significant amounts
September 2013). These are compelling reasons in marketing expenses. In other words, after
for taking piracy seriously and providing owners having made an investment of around 10 million
with the tools they need to protect their rights. euros for a top category film (A) that will be seen
156 5. GOOD PRACTICE AND PROCEDURES FOR PROTECTING THE INTELLECTUAL PROPERTY RIGHTS TO CONTENT…
after its cinema premiere. Nowadays, the release After televisions, which are owned by 99%
process is very fast and audiences can choose of homes, mobile phones are the electronic
from a wide range of options that also include devices with the greatest presence in homes:
films that have not been commercially released 98%, followed at some distance by computers
but become popular thanks to the Internet. All (79.5%) and landlines (75.8%), which are gradually
this is leading to changes in the business model dwindling.
and makes it necessary to devote efforts to
informing people about what is available in Tablets are present in 54.5% of households,
different areas. In this field, now that nearly 5 surpassing DVD or Blu-ray players (53.5%).
billion people in the world own smartphones, the
presence of content on the Internet is essential. As for the Internet, more than 70% of people use
Indeed, according to data published by Google, it daily and more than 80% at least once a week.
43% of consumers use at least two different Although online purchases have been making
devices to sequentially access the same content. a comeback over the past three years, they are
Whereas mobile phones are the most commonly still well behind other Internet uses: only 43%
used device to access content first thing in the of people have bought goods over the Internet,
morning, they are replaced by computers during whereas 75.8% use it to view content on ‘sharing
working hours, and tablets are the devices most sites’, evidencing that the idea of the
Internet as
frequently used between eight in the afternoon a free space remains powerfully present.
and midnight, according to Comscore Device
Essentials 21 January 2013. The conclusion is simple and has been frequently
denounced by the holders of intellectual
property rights: citizens do not bargain when
acquiring computers, smartphones or high-speed
connections to access content – one of the most
frequent activities – yet they are reluctant to pay
for content itself.
homes published every year by Spain’s National We have already mentioned how difficult and
Institute of Statistics (Instituto Nacional de expensive it is to make a film or produce a video
Estadística, INE) reveals very significant data: the game. Creating a song or writing a book also
percentages of homes that own a computer of require considerable creative effort and success
some kind has gone from 55% in 2006 to almost is not always easy; and then, when it happens,
80% in 2018; the percentage with access to the piracy appears. Make no mistake, only successful
Internet has risen from 40% in 2006 to over 86% works are pirated; pirates have no need to take
in 2018; and the percentage of broadband con- risks, they go for the safe option. Therefore,
nections is up from less than 30% in 2006 to more any newly released film, album, video game or
than 86%, the same as Internet access, in 2018 book can be accessed free of charge via various
158 5. GOOD PRACTICE AND PROCEDURES FOR PROTECTING THE INTELLECTUAL PROPERTY RIGHTS TO CONTENT…
These figures are fully consonant with the Forqué Award for his film Atrapa la bandera, it
amounts that those sectors have failed to earn took more than 355,000 hours to make.
compared to their historical highs in previous
years. Ultimately, the bare figures also translate What can we do about this problem?
into jobs: the aforementioned content industries
employ about 70,000 people in our country, but
more than 20,000 jobs could have been created 4. Procedures for protecting
in 2017 had it not been for piracy. What is more, the intellectual property rights
the public coffers ceased to receive 371 million to content in the digital age
euros from all sectors in the form of VAT and 203
million additional euros in personal income tax. We will focus on answering the question asked
in the title of this work. The strategies are very
well defined and were suggested by the World
Intellectual Property Organization (WIPO) many
years ago: only a combination of suitable legisla-
tion, the implementation of laws and awareness
will make it possible to combat piracy effectively.
I would add a fourth strategy that the digital age
is very clearly calling for, namely the promotion
of new business models: the industry has had,
and must continue, to make a notable effort
to ensure that users can directly access their
content in an affordable and simple way; further
effort needs to be made to offer what consumers
are demanding. We will now examine the stage
Spain is at in developing these strategies.
as an offence in articles 270 and the following The Intellectual Property Law of November 1987,
in the Penal Code; the Supreme Court has very with its successive reforms, ended up incorpo-
aptly called it parasitism. And, of course, it rating the consolidated text of the Intellectual
causes damage, but not only to the well-known Property Law (TRLPI) of 1996 which, during the
actors or actresses of Hollywood or our country, following years, progressively incorporated a few
or even only to the industries: as I mentioned, modifications and the European directives aimed
the credits of any film list the names of hundreds at regulating the information society.
of people whose work was essential to making
the film and who are not at all known. As Nicolás The consolidated text of the Intellectual Property
Matjí pointed out when receiving the José María Law clearly states that we are dealing with a type
always been welcomed by users of the latter’s earliest of them all – Directive 1995/46 on data
repertoire. The legitimate activity performed protection has continued to progress in subse-
by collecting societies has not been fully under- quent years, helping to anonymise many types
stood and has sometimes been used as a pretext of Internet conduct and, despite being designed
for legitimising piracy or its use. Similarly, the to protect everyone’s rights, also hinders the
different approach to the distribution of rights in investigation of infringements committed on the
the United States – handled through ‘copyright’ Web. The implementation of these directives
– has led to a few misunderstandings: there, was always surrounded by a lot of media noise
authors are hired to produce a film and enjoy and initially failed to strike a balance between
no further rights than those established in their the various interests at stake:
160 5. GOOD PRACTICE AND PROCEDURES FOR PROTECTING THE INTELLECTUAL PROPERTY RIGHTS TO CONTENT…
• The LSSI granted service providers much without prejudice to any other sanctions and
larger safe havens than those initially remedies available, rightholders should have the
provided for by the directive, to the possibility of applying for an injunction against an
extent that, if there was no order from a intermediary who carries a third party’s infringe-
‘competent authority’, the service provider ment of a protected work or other subject-matter
was completely exempt from liability with in a network.
respect to the content that it hosted or
accessed through them. Or the one established by recital 38:
• The wording of article 31.2 establishing the Digital private copying is likely to be more
limit on private copying was unfortunate widespread and have a greater economic impact.
and in Spain led the limit to be confused Due account should therefore be taken of the
with users’ right to make copies for their differences between digital and analogue private
personal use as soon as they had paid copying and a distinction should be made in
for the so-called ‘private copying levy’, certain respects between them.
which sparked growing controversy. Some
politicians and even government officials Far from following the problem-solving recom-
defended this ‘right’ of users even though it mendation attributed to Napoleon, the Spanish
actually constrained the copyright holders’ government thought that setting up a commit-
rights and was designed to act as a buffer tee was the best way of reaching agreements
against the legitimate prosecution of on self-regulation rather than imposing legal
anyone making unlicensed copies of the limitations that were not very popular with most
rightsholder’s work. of the population.
• The right to information enshrined in article On 28 January 2000, through RD 114/2000, the
8.1 of the 2004 Directive was not incorpo- Inter-ministerial Committee was set up to clamp
rated into the reform of article 256 of the down on activities that violated intellectual
Civil Procedure Law (Ley de Enjuiciamiento and industrial property rights. This legislation
Civil) until 2014. For a long time this de- formalised the existence of an ‘anti-piracy
prived holders of intellectual property rights commission’ which the Subdirectorate General
of the opportunity to file the civil actions for Intellectual Property had been pressing for to
that have proven highly effective following channel the various proposals submitted to the
the actions brought by the Promusicae and government by victims of piracy. The purpose of
MPA associations. the RD was to combat ‘unlawful activities com-
monly known as piracy’ given the harmful effects
Given all the media noise and the protests of the they had not only on the owners but also on the
promoters of excessively large freedoms for the market, ‘consumers, companies, society, as well as
Creators and Authorship in the Digital Age
Internet, Spanish legislators ignored some of the the state itself’. The purpose of the commission
recommendations made by the directives, such was ‘to study and coordinate specific measures to
as that provided by recital 59 of the copyright ensure the best reaction of the Public Administra-
directive: tion to unlawful activities of this kind’.
In the digital environment, in particular, the There was no doubt about it: piracy had harmful
services of intermediaries may increasingly be used effects on society as a whole and was illegal,
by third parties for infringing activities. In many and the government was creating a commission
cases such intermediaries are best placed to bring to study and coordinate measures against it. Its
such infringing activities to an end. Therefore, results were non-existent.
162 5. GOOD PRACTICE AND PROCEDURES FOR PROTECTING THE INTELLECTUAL PROPERTY RIGHTS TO CONTENT…
There were plenty of good intentions, but they direct their users if they do not have effec-
neither were self-regulation agreements reached tive knowledge that the information to which
nor were the essential legislative reforms they refer or which they recommend is unlawful
addressed, as the courts of justice would soon or that it damages third-party goods or rights’.
make clear. And because the aforementioned law indicates
that effective knowledge only exists ‘when a
The security forces, usually the fastest off the competent body has declared the illegality of
mark when it came to practical decisions, began the data, given orders for it to be withdrawn or
investigating websites providing links, which made inaccessible, or the existence of the injury
were the main driving force behind Internet has been declared, and the provider knew of
piracy. They proceeded to intercept and close the related decision, notwithstanding detection
down many of them in the so-called ‘Internet and content removal procedures that providers
Download Operations’: in 2006 and 2007, the implement through voluntary agreements and
Technological Research Brigade (BIT) of the other means of effective knowledge that could
National Police Force (CNP) and the Civil Guard be established’, if there is no declaration of
Computer Fraud Group completed several illegality, the service provider cannot be held
investigations of the webmasters of these sites accountable.
and proved that the owners of these pages
providing links were often the same people who Secondly, in line with the doctrine cited (Ortega
obtained the files (by making recordings of films Díaz and Garrote Fernández Díez), the court
shown in cinemas, for example) and uploaded holds that there are two types of links: surface
them. The operations were reported on by the and deep. The former do not infringe intellectual
Ministry of the Interior with the support of the property rights as they merely help a user locate
ministries of Culture and, occasionally, Industry, content ‘without having to type the name of the
but differences were beginning to appear in the page’.
criteria and perspectives of the two government
departments. The court disregarded the allegations of the
private prosecutors, who claimed that the link
The court investigations soon revealed the short- page had, in turn, uploaded unlicensed content
comings of our regulatory framework, which had and stored it in cyberlockers, to all of which
been lagging behind in the implementation of the second paragraph of the abovementioned
European directives. article 17 would have been applicable: ‘The
exemption from liability established in section 1
On 11 September 2008, the Provincial Court of will not apply in the event that the recipient of
Madrid rejected the appeal of the intellectual the service acts under the direction, authority
property rightsholders who had filed a complaint or control of the provider that facilitates the
against the activity of the Sharemula link page location of such content’.
Creators and Authorship in the Digital Age
All this coincided with the end of the term of of- the Hadopi law and courts of justice, the United
fice and of the hopes content owners had pinned Kingdom (Newzbin), the Netherlands (Mini-
on José Luis Rodríguez Zapatero’s government, nova, Leaseweb and KPN), Germany (Marion’s
which made it clear that the strategy of ‘appro- Cookbook, Rapidshare/GEMA and Hansenet)
priate legislation’ needed to be tweaked in Spain. and Sweden (The Pirate Bay), as well as in the
Rodríguez Zapatero’s second term addressed United States (DMA), New Zealand and Korea.
the – hugely unpopular – challenge of revising In all the above cases, the courts ruled that
the legislation in force and creating an ad hoc the service providers had the duty to perform
‘competent authority’ to allow swift and effective surveillance and/or prevention tasks once they
procedures for taking down illegal content. had knowledge of the illegality of the content,
164 5. GOOD PRACTICE AND PROCEDURES FOR PROTECTING THE INTELLECTUAL PROPERTY RIGHTS TO CONTENT…
and to implement measures such as blocking or safeguarding intellectual property rights against
takedowns. violation by those responsible for information
society services. The Section may adopt measures
The result was the forty-third final provision to interrupt the provision of an information society
of the LES amending Law 34/2002 of 11 July service that violates intellectual property rights or
on Information Society Services and Electronic to take down content that violates the aforemen-
Commerce, Royal Legislative Decree 1/1996 of tioned rights provided that the provider, directly or
12 April approving the Consolidated Text of the indirectly, acts with a profit motive or has caused,
Intellectual Property Law and Law 29/1998 of or is likely to cause, economic damage.
13 July governing Contentious-Administrative
Jurisdiction, for the protection of intellectual Final provision 43 of the LES requires that the
property within the information society and action of the Second Section be adapted to
electronic commerce. a notification procedure with the option of
voluntary takedown and that the adoption of
The first modification introduced by the LES measures aimed at interrupting the service or
was aimed at making service providers account- taking down the content be carried out with the
able when intellectual property is violated. To authorisation of the court, namely the Chamber
do so, it incorporated a new principle in article 8 for Contentious-Administrative Proceedings of
of the LSSI: the Audiencia Nacional.
1. In the event that a certain information society Since its creation, the Second Section of the
service infringes or could infringe the principles Intellectual Property Commission has had to
expressed below, the competent bodies for its adapt to a few reforms to improve its results
protection, exercising the functions legally as- based on experience. It is currently regulated by
signed to them, may adopt the necessary measures article 195 of the TRLPI. However, in order for
to interrupt its provision or to remove the data it to begin operating it was necessary to adopt
that violate them. The principles referred to in this regulations whose procedure illustrates very
section are the following: clearly the weakness of the awareness-raising
[...] e) The safeguarding of intellectual property rights. strategy that we will examine later. Suffice it to
say, for the time being, that it was the following
Secondly, it allowed a competent body to re- government, that of Mariano Rajoy, that finally
quest from service providers the data related to approved the regulations on 30 December 2011.
the person responsible for an information society
service that has allegedly violated the aforemen- RD 1889/2011 of 30 December regulating the
tioned principles. functioning of the Intellectual Property Commis-
sion stemmed from a very clear aim:
However, at the behest of the parliamentary op-
Creators and Authorship in the Digital Age
position groups, it was established that judicial The digital revolution is providing a formidable
authorisation would be required for this data to opportunity for the creation and dissemination
be handed over. Logically, the LES also created of cultural content, but it has also given rise to
the competent body: the Second Section of the new ways of infringing intellectual property rights,
Intellectual Property Commission: [...] and is causing, in addition to the violation of
intellectual property rights through Internet pages,
It falls to the Second Section, which will act in huge losses to the cultural industries sector and
accordance with the principles of objectivity and the consequent loss of jobs and wealth in a sector
proportionality, to exercise the functions provided that generates nearly 4 percent of Spain’s Gross
for in articles 8 and similar of Law 34/2002, for Domestic Product [...]
particular by offering orderly and classified lists of measures that are essential to investigating
links to the works and content referred to above, Internet offences is not always granted;
even if those links had initially been provided by this makes it very difficult to determine the
the recipients of their services. identity of whoever is hiding behind an IP
address.
The 2015 reform of the Penal Code also reme-
died the mistake made in 2010, when, in order • The civil route: in this field, the enforcement
to reduce the penalties for street vendors, the of articles 138 and 139 of the TRLPI has
legal description of the offence was modified, obtained positive results within more reason-
making it a result offence requiring impossible able time periods: Commercial Court no. 6 of
166 5. GOOD PRACTICE AND PROCEDURES FOR PROTECTING THE INTELLECTUAL PROPERTY RIGHTS TO CONTENT…
Barcelona, in ordinary proceedings 666/2016, draft approving the implementing regulations of
issued a judgement resolving a lawsuit the ‘Sinde Law’ and, together with the ruling of
brought by several film producers against the Court of Justice of the European Union on
Internet access providers. The court made the so-called ‘Svensson case’ (C-466/12), laid the
it clear that the applicant film producers foundations for considering that the provision of
own a number of works that two web pages links constitutes communication to the public,
made available to a new audience without both in the regulations of the Second Section
the consent of their owners and ordered of the Intellectual Property Commission and,
that the defendants block or prevent their subsequently, in the Criminal Code and in the
clients from accessing the aforementioned TRLPI.
web pages from Spain, informing them of
the technical measures they will adopt and The enforcement of laws is directly related to so-
of the steps taken , and also ordered them to ciety’s awareness of certain problems. As we will
foot the cost of these measures. see, Spanish society was much more in favour of
freedom to share content on the Internet than
• The administrative route: via the Second of protecting intellectual property rights.
Section of the Intellectual Property Com-
mission. Although slower than desirable, In Gijón, Vigo, El Vendrell and Calafell, to cite
it is making headway and has already had some examples, measures were adopted or
a considerable number of pirate websites publicly requested by their municipal officials
blocked or taken down. The aforemen- not to prosecute street sales, ‘even if illegal’, of
tioned legislative reforms will also allow for products whose distribution violated intellectual
additional penalties for repeat offenders or or industrial property rights. Similarly, in some
failure to collaborate. This route has proven communities, courts of justice or certain judges
to be highly effective in Italy, which copied argued that hawking should be considered an
the Spanish model and devoted many more atypical activity in that it should be excluded
human and material resources to it. from articles 270, 273 and 274 of the Penal Code
and that action should be taken against it using
The enforcement of laws is essential to the other routes such as civil or criminal. This inter-
effectiveness of the strategies and to ensuring pretation extended to many examined cases of
that their action is combined with impetus at copyright fraud on the Internet. The differences
the legislative level. The influence of Decision in judges’ opinions was reflected in contradictory
530/2011 of the Provincial Court of Vizcaya decisions in very similar cases and the problem
published in mid-October 2011 is a good example was only resolved following the adoption of the
of the foregoing, as it sentenced the people abovementioned legislative reforms.
responsible for the fenixP2P.com and MP3-es.
com websites to a year’s imprisonment for
Creators and Authorship in the Digital Age
168 5. GOOD PRACTICE AND PROCEDURES FOR PROTECTING THE INTELLECTUAL PROPERTY RIGHTS TO CONTENT…
José Manuel Tourné Alegre holds a Law degree from the
allow films to be premiered simultaneously on all
Universidad Complutense of Madrid, is a commercial
channels, or even in all countries, but the ‘release investigator, earned a diploma from Upime in October
windows’ between them are shorter, and that 1990, and has been a practising lawyer at ICAM since
suits consumers. 1984. He has taught postgraduate courses at the
Universidad Pontificia Comillas since 2001 and has
I am convinced that protecting intellectual prop- worked at the Federación para la Protección de la
erty will continue to be a priority, but not only Propiedad Intelectual de la Obra Audiovisual (FAP)
for the rightsholders – it will also be important for more than thirty years, having held the post of
for the rest of those interested in the develop- director general. He is also president of the Unión
ment of the information society as a responsible Videográfica Española (UVE) and a member of the
and secure environment. board of the International Video Federation (IVF).
As part of his work he has been directly involved in
drafting and enforcing the European laws and directives
related to the protection of intellectual property.
The term was coined in an article published in Bitcoin is just one of the various phenomena
2008 under the pseudonym ‘Satoshi Nakamoto’33 behind a trend of thought that is emerging
which described the functioning of the famous strongly. To understand it, it is necessary to
crypto-Bitcoin. The author or authors of the examine the philosophy behind the Internet, the
article also own the private key that was used exchange of files, open code and Blockchain.
to sign the first transaction carried out using
170 6. Blockchain and smart contracts. Legal implications in the intellectual property field
Anarcho-capitalism and Our identities have no bodies, so, unlike you, we
crypto-anarchism cannot obtain order by physical coercion. We
believe that from ethics, enlightened self-interest,
The first of these terms, anarcho-capitalism,34 and the commonweal, our governance will emerge.
was coined in 1950 by Murray N. Rothbard of the Our identities may be distributed across many of
Austrian School of Economics and expresses a your jurisdictions. The only law that all our con-
trend of thought that combines political anar- stituent cultures would generally recognize is the
chism – advocating the rejection of centralised Golden Rule. We hope we will be able to build our
forms of power such as the state – with the particular solutions on that basis. But we cannot
defence of private property and the free market. accept the solutions you are attempting to impose.
His followers hold that the markets behave We must declare our virtual selves immune to your
better without interference of any kind, through sovereignty, even as we continue to consent to
self-regulation, and advocate the disappearance your rule over our bodies. We will spread ourselves
of states’ tax-raising, regulatory and authorita- across the Planet so that no one can arrest our
tive powers. Basically, they pursue a shift from thoughts.
trust to consensus.
A trend within anarcho-capitalism is crypto-
Its influence is growing, as is its economic sway. anarchism.36 Its followers, jealous of their
The collaborative economy is a good example of privacy – which is increasingly threatened by
the social and economic revolution that it can technology – speak of the use of encryption
trigger. The latest decisions of the CJEU (taxi algorithms to preserve the privacy of communi-
drivers of Barcelona vs Uber) and of the Euro- cations. Their ability to anticipate the social and
pean Commission (penalising the irregularities economic effects of technological evolution is
of the tax arrangements between Apple and the uncanny. Back in 1992, Timothy C. May stated
Irish Government) show how states are reacting in the Crypto Anarchist Manifesto that:37
to the anarchist craze.
Computer technology is on the verge of providing
The struggle is by no means new. Back in 1996, the ability for individuals and groups to commu-
John Perry Barlow penned his ‘Declaration of nicate and interact with each other in a totally
Independence of Cyberspace’ on the occasion of anonymous manner. Two persons may exchange
the Davos (Switzerland) World Economic Forum messages, conduct business, and negotiate elec-
summit and in reaction to the passing of the tronic contracts without ever knowing the True
US Telecommunications Reform Act.35 Analysed Name, or legal identity, of the other. Interactions
from the perspective of hindsight, its contents over networks will be untraceable, via extensive
are revealing. It anticipates the efficiency of re- routing of encrypted packets and tamper-proof
electronic anonymity at avoiding, at least partly, boxes which implement cryptographic protocols
the state ‘yoke’: with nearly perfect assurance against any tamper-
Creators and Authorship in the Digital Age
172 6. Blockchain and smart contracts. Legal implications in the intellectual property field
What if we bring in computing? Although banks can prevent double spending by
achieving an agile and secure cash flow, they do
It may be inferred from the foregoing that so in a centralised manner. With the involvement
anarcho-money is a utopian pursuit in an ana- of financial institutions, electronic money is
logue environment. It might be feasible for small obtained, but not anarcho-money. Neither are
communities, but it would soon become inviable. the transactions anonymous nor is their account-
Currently, money is primarily electronic and ing performed in a decentralised or collaborative
fiduciary. If we consider direct transactions that manner.
use computers as well as credit and debit cards,
about 90% of transactions in developed coun- To achieve this, we need a single computerised
tries are electronic. The issuance and circulation ledger in which transactions are recorded in a
of new money is the responsibility of states, collaborative manner (the contents of the entry
which act in a coordinated manner through the are decided on by a group of people acting in a
IMF based on macroeconomic parameters and coordinated or consensual manner). In order for
political decisions. this ledger to have the potential to verify, it must
meet three probatory requirements: (i) authen-
Bearing in mind the predominantly electronic ticity, (ii) unambiguity and (iii) integrity.
nature of money, is it possible, with the aid
of computer programmes and mathematical
algorithms, to emulate the functioning of bearer Authenticity of the distributed ledger
money in an agile and reliable environment? To
achieve this, it should be stressed, we would A computerised record, as a means of verifying
have to receive all payment orders, verify the the existence of a payment, must be authentic.
identity of the debtor, update the balance and We will take authentic to mean that it faithfully
record the transaction in an accounting record – reflects the transactions carried out. Since, in
and do all this in a decentralised manner. order to be able to dispose of the money, it is
necessary to check, by consulting the record,
With electronic money, the problem of double that the available transactions have not been
spending is solved by involving third parties: previously spent, its authenticity is vital in order
through the coordination of the accounting to prevent the money being disposed of more
systems of the intermediaries who come than once.
between creditor and debtor. They act as agents
who implement an order to receive or pay At present, the authenticity of the entries in
money. If the electronic transfer of the money any registry is based on trust. When you want
were direct, without the involvement of third to guarantee the authenticity of the entry you
parties to verify the existence of the balance and entrust a non-involved third party to do so and
coordinate the accounting entries, the debtor look after the registry where it is recorded.
Creators and Authorship in the Digital Age
could always question the existence of previous Basically we are talking about third-party proof,
transactions that would have deprived them of in which the third party can be authorised to
their right to dispose of the money. The inter- guarantee the authenticity and immutability of
mediaries act as witnesses to the transaction. these entries.
As their testimony is electronic, they have a
computer record that attests to the existence From an anarchist perspective, the custodian of
of the payment order and its completion. a centralised registry is also corruptible. They
Banks, however, are centralised intermediaries can always modify the registry for the benefit of
and therefore do not comply with an essential those involved in the transactions recorded in
requisite of anarcho-money: decentralisation. the entries. In other words, they can be criticised
But how can we achieve an authentic, de- In a war scenario, a group of m Byzantine gener-
centralised registry? An alternative to using als lead various armies that are laying siege to an
centralised intermediaries is to ensure that the enemy city. They have to agree on whether to
work is sufficiently shared between them so that attack or retreat in a coordinated manner. There
no scheming takes place. How can we achieve a is only one general who can issue the order (the
shared intermediary? By having a large number commander). The rest are lieutenants.
of people receive the payment orders and check
that the balance is large enough to go ahead The generals communicate through messengers.
with them. And how can I trust the honesty of Their messages can only transmit two possible
all these new intermediaries and be sure they do commands: ‘attack’ or ‘retreat’. The commander
not come to agreements on their verifications? gives the order to all the lieutenants, who in
There are two ways. The first is to make sure turn report on it to each other. In the end they
they do not know each other. Anonymity makes all receive a number of messages equal to the
scheming more difficult. The second is to use number of generals involved in the siege minus
consensus algorithms. themselves.
called the ‘Byzantine generals problem’.40 tain communicative context. The mathematical
formulation of the solution to the Byzantine
The Byzantine generals problem is a metaphor generals problem is m = 3 (t) +1, where m is the
for something that occurs in computer systems number of generals involved and t the number of
that have a common goal: to agree on a ‘joint traitors.
action’ starting from a hierarchical structure.
One of the nodes, which is ranked more highly, If we replace the generals with computers
sends an order that the rest of the nodes have to (nodes), we have a suitable formula for achieving
send on to each other. It is based on the premise a consensus on which of the verifications of the
that some of the nodes are not reliable and various third parties should finally be entered in
174 6. Blockchain and smart contracts. Legal implications in the intellectual property field
our collaborative accounting. The verification access a repository where a public key, known
that has greater consensus among those who to all users of the system, was univocally linked
participate in the system will be recorded.41 to a private one, which was known only to the
person to whom it is assigned. Files could thus
be sent encrypted without the need to reveal
Unambiguity the decryption key. For this purpose, the signee
encrypts the message with their private key. To
Another of the requisites of the registry that verify the identity of the issuer, the person who
records the payments is that it must be able to receives it applies their correlative public key. If
assign the disposal and receipt of the transac- the message is decrypted, it means that it was
tions to specific people. If A pays B, it must be previously encrypted with the private key that
able to deduct the amount paid from A’s account only the signee has.
and add it to B’s. However, since the object of
the anarchist system is anonymity, how is it pos- However, there is an essential difference in the
sible to grant someone ownership of the money way ‘asymmetric key cryptography’ is used in
while preserving their anonymity? The answer is Bitcoins. To download a Bitcoin wallet it is not
by assigning ‘cryptographic keys’ that grant the necessary to prove, or even show, your identity.
‘owner’ exclusive access to a file (wallet), which The person who knows/possesses the private
is the only one from which payments can be key is therefore the only one who can access
received or made. the wallet and dispose of the associated funds
without having to declare his/her identity. We
Exclusive access to the electronic wallet is are talking about a ‘key’ with cryptographic secu-
obtained using the same technology as for rity that has the abovementioned fundamental
electronic signatures, which is known as ‘Public advantage of anonymity and the consequent
Key Infrastructure’ (PKI). Although this article disadvantage that losing or forgetting it entails
does not intend to examine issues related to losing the associated funds.
electronic signatures, it seems essential to make
a few brief points. As the generated keys are not only asymmetric,
but also two-way – I can encrypt with the public
Signing a file can consist of ‘encrypting’ its con- key and decrypt with the private one44 – the
tents using an ‘algorithm’42 to attribute identity Bitcoin cryptocurrency uses this feature to assign
to the holder of the key for decrypting it. Until the ‘wallet address’ to the recipients of the
the early 1980s, only ‘symmetric encryption algo- payments, which is the ‘hash function’ of each
rithms’ were known. The algorithm encrypts the one’s public key, as we shall see in due course.
text and generates the decryption key. Sending
signed files electronically had the disadvantage It works simply. When a ‘Bitcoin wallet’ is
that, along with the signed file, it was necessary requested, software that generates both keys
Creators and Authorship in the Digital Age
to send the decryption key – which de facto (public and private) is downloaded and the public
invalidated the procedure for the issuance of key is ‘exported’45 to the system, becoming
statements between remote unknown users. It indissolubly linked to its corresponding private
is rather like sending a locked safe with the key key that is associated with the requester’s wallet.
that opens it sellotaped to one side. Nobody, however, requires the requester even
to show their identity. This means that anyone
The first asymmetric encryption algorithms were can request and obtain an unlimited number
formulated in the 1980s.43 Following their inven- of wallets and perform as many transactions as
tion, it became possible for any of the parties to they wish anonymously.
176 6. Blockchain and smart contracts. Legal implications in the intellectual property field
Merkle’s design is based on a set of transactions, hashes. The hash summarising a transaction is
which must be even in number. They are incorporated into the next one, just as the hash
grouped into pairs, and each pair is hashed. The that represents a block of transactions is also
resulting hash values are then grouped into pairs incorporated into the next block. Hashes act
which are in turn hashed, and so on until you get as pointers which link transactions to others.
a single hash known as the ‘root of the tree’ or Accordingly, if someone wants to tamper with
‘root hash’. the chain, they will have to take into account
this feature and the mathematical difficulty it
poses. In addition, the security of the procedure
increases constantly, as every ten minutes a new
block is added to the chain.
case the block transactions. a previous transaction of, say, five Bitcoins, you
lose all of it. Bitcoin thus functions in the same
3. The number of transactions does not vary way as cash: you transfer the whole amount (you
the size of the ‘root hash’ (its size is the lose possession of it). If you expect change, you
same whether it groups together only four will be the recipient of a new transaction. This
transactions or a million). will be for the result of subtracting what you
have actually spent from the value of the trans-
The result of applying these algorithms – the action you use. For example: if you intend to pay
hash – is inherent in this technology. The chain three Bitcoins and have a transaction of five, you
of blocks that is formed is a concatenation of will get a two-Bitcoin transaction back.
The input information includes: (i) the hash of The user of the ‘cryptocurrency’ might want to
the preceding transaction, signed (encrypted) pay different payees with a single transaction or
with the private key of the person who was require change. Therefore, both the input and
previously the payee and is now transferring the the output can also be multiple. For example, I
amount – or, to put it another way, the signature might use several transactions to make a single
of the hash of the transaction that provided payment. If I have two transactions, one of three
them with the Bitcoins they now have; and (ii) Bitcoins and another of two, I can use both
their public key, so that when the transaction is to settle a debt of five Bitcoins I owe a single
verified the information encrypted in the previ- recipient of the transaction (multiple input).
ous input line can be accessed. In short, it When the amount of the previous transaction
includes the information needed to link that is greater than the number of Bitcoins that I
transaction with the previous one (which is want to transfer, I arrange a ‘multiple output’,
spent), giving rise to the first links in the famous where one of the payees transfers back Bitcoins.
chain. The amount of this transaction is the difference
between the balance of the input and that of the
output. As stated above, this is a new transac-
tion, for the amount of the change, where the
spender is also a payee.
the recipient of the transaction. Therefore, the asymmetric encryption keys, (ii) exports the public
output incorporates the information needed to key to the system (signature verification data) and
ensure that the transfer reaches its destination. (iii) enables the private key (signature creation
data) to be used by the person who has down-
Once both the input and the output have been loaded it. Once the wallet is installed, system
recorded, the hash of the entire transaction users are equipped to operate (send and receive
(input + output) is calculated. The result of this payments). As has been said, nobody requires
calculation is the header of each of the trans- them to even show their identity. To be able to
actions and will act as a pointer that links this spend, it is sufficient for someone to send a signed
transaction with the subsequent ones (those that transaction to the system (with their private key).
178 6. Blockchain and smart contracts. Legal implications in the intellectual property field
Miners To achieve this, those who decide to become
miners install a computer programme that func-
People become miners voluntarily, and do tions in a distributed manner and generates for
not need to prove their merits or meet any each of them an updated version of the universal
subjective requirements. Their task is twofold: ledger incorporating all the transactions mined
to perform the collaborative management of to date. They start by verifying the input of each
the accounting record, called a ledger, which transaction. To do so, the installed software
underpins the cryptocurrency, and to issue new performs three checks:
money units. In short, they help create a chrono-
logical and universal master register where each (i) That the transfer has been signed with a
and every one of the transactions carried out private key correlating with the public key
by those who pay with Bitcoins are recorded, in associated with the wallet.
Creators and Authorship in the Digital Age
180 6. Blockchain and smart contracts. Legal implications in the intellectual property field
each other to add theirs to the chain (remember mean that the amount defrauded would have
that the hash is a hexadecimal string of char- to be very substantial to make the effort worth-
acters, making no apparent sense, which rep- while.
resents the block formed by each of the miners).
It might also be thought that the miners with the
Each one must find a new hash that is the result greatest processing power enjoy an advantage
of combining a random number with the hash when it comes to finding the nonce. However, it
of their block, so that this new hash begins with should be remembered that each miner’s block
a set number of zeros. The specific number of hash is different from those of the rest of the
zeros that precede the rest of the characters in miners because each one incorporates an output
the hash is established automatically by the sys- recorded by them that includes the hash of their
tem according to the number of transactions and wallet address, which will be rewarded if their
miners there are. The correction factor expects block is finally added. For this reason, the com-
about ten minutes to be spent on solving each putational challenge will be different for each of
challenge. the miners and, consequently, they will all have
similar possibilities of solving it and accordingly of
To find this hash, they add a figure to their block adding their block to the chain. As it is a chal-
hash and run the ‘distillation algorithm’ to get a lenge that is solved by computing power or brute
new hexadecimal sequence of characters that force (trial and error), no one knows in advance if
must meet the requirement. Imagine that the a miner is going to find the nonce immediately or
miner begins adding the number 1 to their hash. will require several hundred thousand attempts
They run the algorithm and find that the result before hitting on the right combination. This
(the new hash) does not meet the established ensures sufficient randomness to make luck a
requirement (it is not preceded by the number decisive factor in solving the challenge. It would
of zeros required). So they try again, adding a 2 take 50% of miners’ pooled computing power to
instead of a 1 and so on until the resulting hash gain an advantage in the challenge.
meets the mathematical requirement (to be
preceded by a particular number of zeros). The
figure which, when added to the hash of the Adding new blocks to the chain.
miner’s block, meets the condition established by The necessary consensus on the
the computational challenge receives the name winner of the proof of work
of nonce.
When a miner manages to solve the compu-
The challenge poses an initial drawback. The tational challenge they send their block to the
miners taking part in the race are anonymous system so that the others receive it and use
and might have conspired to alter the master its hash to put together the next one. Before
register. By pooling their computing power, accepting the block, the rest of the miners verify
Creators and Authorship in the Digital Age
they could add non-authentic transactions to not only the transactions, but also that the miner
the chain or prevent the necessary consensus has completed the proof of work. To do this,
that guarantees the authenticity of the ledger. their computers verify that the hash resulting
It is estimated that this could be accomplished from the combination of the block hash and the
with computing power higher than 50% of that nonce starts with the established number of
of all miners combined. However, when there zeros. However, adding blocks to the chain is not
is a sufficient number of miners, if a demanding as simple as it seems.
computational challenge is also established, the
high cost (in terms of hardware and electricity) To start off with, the distributed nature of the
of achieving superior computing power would invention poses a disadvantage. The chain is
wants to accept a line they know that will finally is completed approximately every ten minutes,
be discarded. It should be borne in mind that the Bitcoins are constantly created. Indeed, miners
likelihood of the disloyal line prevailing progres- participating in the system do not spend their
sively decreases as every ten minutes a new block money on acquiring the appropriate hardware
is added to the chain. That is why it is often said and on paying for the electricity consumed by
that Bitcoin transactions are not definitively their equipment just for the fun of it. They are
registered (they can still be cancelled) until an out to make money. They invest to obtain the
hour after the block was mined. If a fork occurs, reward that is transferred to the miner whose
the problem can be understood to have been block is added to the chain. This reward consists
resolved when five new blocks have been added of a decreasing amount of Bitcoins: it is halved
182 6. Blockchain and smart contracts. Legal implications in the intellectual property field
every 210,000 blocks (approximately every four To sum up, miners can be doubly rewarded:
years), until it reaches the 21 million Bitcoins that by the system and by the people who order
are planned to be issued. It is assumed that no transactions (who pay). At present, the former
new Bitcoins will be issued after that. Up until method is more significant, but direct rewards
November 2011, the reward was 50 Bitcoins for (transaction mining fees) will gradually become
each block that was added to the chain. From prevalent as the other type, rewards paid by the
this date until July 2016 it was 25. Since then it system, progressively decrease.
has been 12.5, which at the current exchange rate
is the by no means negligible sum of $128,500.
It is reckoned that these rewards paid by the Blockchain as a means of proof
system will have disappeared by 2140. After that
miners will rely on the people who order the From a legal perspective, Blockchain is above all
payments for their remuneration. This will mean a means of proof and allows the procedure to
that Bitcoin users will have to include in their be adduced or produced as evidence supporting
transfers an output for the miner who completes parties’ claims in the event of a dispute.
each block.
The adduction or production of such evidence,
This is not miners’ only source of income. They especially if challenged, requires a judicial deci-
also receive ‘transaction fees’ or Bitcoin mining sion. To assess this type of evidence, the legal
fees. Everyone who makes transactions (those community may, in my opinion, choose between
who pay) includes in the output a small payment regarding it as a mathematical procedure, ad
of, say, 0.0001 BTC for the miner who manages matematicatem,52 consisting of immutable statis-
to complete the block that adds that transaction tical realities, or analysing in depth the different
to the chain. Miners’ income is therefore sup- procedures used and weighing up their effective-
plemented by the incentives incorporated in the ness as sources of particular evidence. Actually,
transactions that make up their block. nowadays it is easy to find examples of the
isolated use of these technologies. For instance,
To understand this properly, it is necessary to electronic third-party evidence is often used. 53
realise that when transactions are signed they The third parties do not merely attest to what
are not immediately verified, but go to a sort of occurs digitally. Some also disclose transaction
‘waiting room’ called ‘Mempool’,51 where they re- hashes to guarantee their integrity. The truth is,
main in ‘limbo’. Miners pick out the transactions however, is that no real legal controversy has yet
from the Mempool to verify them and add them arisen over the provision of certificates by these
to their block. We might be forgiven for thinking intermediaries.
that miners pick transactions at random, but this
is not the case. There are ‘block explorers’ on the Electronic signatures are also commonly used
market which are capable of viewing the data in traffic. Most of those employed so far are
Creators and Authorship in the Digital Age
contained in blocks, including the transaction not signatures based on the use of ‘public key
fees each one offers. This means that users of infrastructure’. Although ‘qualified’ electronic
the cryptocurrency can be assured of the agility signatures are scarcely used, traffic operates with
of the transaction and miners – who, as stated others which, despite not enjoying rebuttable
earlier, are in it for the money – get their reward. presumption (iuris tantum) of authenticity, have
Miners thus usually choose to verify and add to not so far deserved particular judicial reproach.
their block transactions that offer the highest
transaction fees. Therefore, transactions with Although Blockchain seems mathematically
higher fees are quickly picked out of the Mem- invulnerable, questions nevertheless arise in
pool, while others can take days to be confirmed. connection with its evidentiary value. The
184 6. Blockchain and smart contracts. Legal implications in the intellectual property field
one that was previously deposited. This proves exchange activities by taking money and dis-
that the file has not been modified since the pensing products. The machine also incorporates
date of the deposit. Having distributed hashes the necessary security mechanisms so that the
is a useful procedure for proving integrity cost of breaking into it to access the products
without having to indiscriminately disclose the without paying is higher than what the stolen
contents of the document whose integrity is goods are worth. Vending machines are there-
to be proved. In order to alter its contents, it is fore useful with their current security measures,
necessary for everyone who receives the hash to because they dispense cheap products: soft
agree to do so. drinks, snacks, chocolate bars… It is not worth
anyone’s while smashing up these machines to
Therefore, given the nature of these technol- get their hands on these products. If they were
ogies, it is possible to consider new ways of com- to dispense diamonds they would probably be
bining them to meet other needs. For one thing, frequently broken into.
it is possible to decentralise the registration
of any right or property that is digitally repre- The unstoppable technological developments of
sentable. If it is possible to keep a distributed recent years and the emergence of phenomena
ledger that allows the exchange of money, it will such as Blockchain have led Szabo’s ideas,
also be possible to create crypto-ledgers that which had previously gone unnoticed, to gain
provide evidence of the transfer of other rights unusual prominence. Indeed, as a result of
or properties, including, of course, intellectual digital breakthroughs, chiefly Blockchain, Szabo’s
property. These possible alternative uses of this hitherto utopian ideas are now realisable. We
technology have been dubbed Blockchain 2.0, are no longer talking about simple mechanical
the best example of which is the so-called ‘smart devices, but about a combination of digital
contracts’. systems, data communication networks and
Internet-connected devices that makes it
possible to apply his idea beyond the limited
Smart contracts scope of vending machines.
The term was coined in an article published Smart contracts are the main example of what
in 1996 by the American lawyer and computer has been called ‘Blockchain 2.0’ and could turn
scientist Nick Szabo in the magazine Extropy out to be a legal revolution. They are based on
(‘Smart contracts: building blocks for digital free the idea of translating the contents of contracts
markets’). Many believe that Szabo is the person into a computer code that is signed by the
behind the pseudonym ‘Satoshi Nakamoto’, the parties to the contract. Contracts would thus be
creator of Bitcoin (Blockchain), although he has self-executing, regardless of the parties’ subse-
always denied it. quent wishes.
Creators and Authorship in the Digital Age
He examined how vending machines work and To gain a more detailed idea of what smart
anticipated that with digital and mechanical contracts entail, it is necessary to view them in
advances, the execution of increasingly complex connection with two other recent phenomena:
contracts could be automated. He reckoned that Blockchain and smart properties. All three make
hardware and software systems could emulate up an ecosystem that needs to be considered
the entire contractual life cycle, replacing all jointly. We have already commented in depth on
human involvement in the process. According to Blockchain as a proof of record procedure. Let us
Szabo, the vending machine meets two critical now take a look at property and smart contracts.
requirements in contracting: first, it performs
smart property emulates traditional property. The legislation does not consider this infor-
mation (data) to be ‘things’ or ‘rights’ or even
‘values’ but simply ‘information’. Therefore, for
Legal status of smart property the Arizona legislator, crypto-ownership merely
amounts to the right to access and/or transmit
It is not easy to find normative references to this certain information (data).
term. The Swiss electronic signature law defines
it as part of the ecosystem. The wording links The state of Vermont has also amended its legis-
smart property to distributed ledgers (Block- lation by introducing provisions that incorporate
chain) and smart contracts, defining it as digital legal presumptions linked to the use of these
186 6. Blockchain and smart contracts. Legal implications in the intellectual property field
technologies: that Blockchain files referring to ordinary contracts are limited to incorporating
fact or records are presumed to be authentic. promises of future provision of services, smart
However, this presumption does not extend to contracts actually execute them.
the truthfulness, validity or legal status of their
actual contents (the files). Therefore, the law When programming a smart contract, the
establishes that the burden of proving that a file contractware that is run is conditional. It follows
is not authentic falls to the person against whom the scheme ‘if this happens ..., do that; if this
the fact operates. happens ... do something else’. It is, in short, a
code that is easily adapted to the terms of the
We are therefore dealing with sui generis titles contract and simple to run. This is why calling
that grant the holder the right to access a data- contracts of this type smart is usually criticised.
base (the distributed ledger). They are therefore The reason is the modern meaning of the term
a means of proof without specific legal effects. ‘artificial intelligence’, referring to machines that
If the token has been transferred by means of a have ‘cognitive independence’, which is achieved
contract (smart contract), the parties could be through what has been called ‘neuronal comput-
bound by this agreement, but it is questionable ing’. It enables machines to learn by themselves
whether the token would be enforceable against and provide answers that are sometimes unpre-
third parties. dictable. However, conditional coding does not
produce machines with cognitive independence
and unpredictable responses. Quite the op-
Smart contracts posite. The legal certainty of smart contracts
depends on the predictability of the machine in
These are the third component of the ecosys- specific circumstances that have been previously
tem. Smart properties can be automatically programmed. Therefore, these contracts are not
transferred by running a computer code. Smart smart in this sense.
contracts are nothing but a computer code
(contractware) that is stored in a distributed
ledger and whose execution guarantees that the How smart contracts work
data obtained from it will likewise be stored in
this ledger. There are three stages in the lifecycle of a con-
tract: drafting, finalisation and implementation.
The contractware is the translation of the legal The first phase entails informing, negotiating and
language (the contents of the contract) into a writing down the agreement to be formalised;
computer code. This codification incorporates the next is a meeting of wills based on the
not only the agreements reached, but also the premises established in the first phase. In the
consequences that could derive from compliance third phase, implementation, the parties proceed
or non-compliance with them. If, for example, to deliver (or not) the promised services.
Creators and Authorship in the Digital Age
188 6. Blockchain and smart contracts. Legal implications in the intellectual property field
IoT devices are simply devices that are connected implications. It can be used, for example, for
to the Internet. Currently, our smartphones or property rentals. With ‘smart locks’ you can
smart televisions are already connected to the arrange for the person who has signed the smart
Internet and are therefore considered IoT. If we rental contract to open the door of a building.
run the weather app on our smartphones, we We are dealing with a sort of ‘handing over of
can view weather forecasts for anywhere in the the keys’ in that this procedure is used to grant
world. This information can be provided by an access to movable or immovable property to
oracle (for example, the Aemet website) or by an someone who has formalised the related smart
‘Internet device’ (or a network of them) equipped contract.
with sensors capable of capturing the infor-
mation and sending it in real time to a server Another common use of ‘triggers’ is to automate
or several servers. More and more connected motor vehicle financing contracts. Smart con-
devices are being developed with sensors that tracts can be formalised whereby the monthly
capture the most varied information that can payment is deducted from the account (wallet) of
serve as data inputs in smart contracts, and IoT the buyer who has arranged to pay for their car
devices are becoming increasingly widespread in instalments. A rule is also codified according
all over the world. The consultancy firm Gartner to which, when the buyer has defaulted on three
reckons that by 2020 there will be a whopping instalments, a mechanism built into the pro-
20.4 billion connected devices in the world. gramme that connects it to the vehicle is exe-
cuted: it sends a stop instruction (the user cannot
The result of executing the computer code, once re-start the vehicle) and geolocates it so that it
the variables have been entered, is new data that can be repossessed by the finance company.
is called the data exit.
Smart contracts can provide for deferred or cash
This information (data exit) can be stored in a payments. When the payments are deferred, as
distributed ledger (blockchain) in such a way that in the above example of hire purchase of motor
there is an irreversible and permanent record vehicles, the finance company owns the vehicles
of the result of this execution. For example, the whose acquisition it finances. If the borrower
result of implementing a smart contract might does not pay, ownership of that vehicle is not
be the change of ownership of a smart property transferred (ownership is not modified in the
(tokenised) or a transfer of cryptocurrency to ledger). If the payment is made in cash, the code
one of the parties’ wallets. can be programmed in such a way that the buyer
transfers the amount to the address stipulated
The destination of the data exit can also be in the code and it remains in deposit until the
IoT devices. When we speak of smart contract other party fulfils their contractual obligation.
‘triggers’, we mean that the result of running Imagine that the acquisition of some tokens that
the code can have mechanical consequences (as represent a share in a specific company is agreed
Creators and Authorship in the Digital Age
with the vending machines to which Nick Szabo on. The code calls on the parties to honour their
referred). Take, for example, carsharing, which respective obligations. The selling party forwards
is common in cities. Users search for available the signed transfer of the tokens to the address
vehicles on their devices and choose the nearest of the smart contract and the buyer transfers the
once. To access them, a code is sent to the users. established sum to the same address. Consulting
The ‘challenge code’ is sent to the chosen vehicle the distributed ledger, the code verifies that
via the Internet, so that only the registered user the tokens have not already been transferred
who has reserved that vehicle can access it. This and that the payment is for the agreed amount.
technique, increasingly used in English-speaking Having checked these facts, the code then adds
countries, has multiple uses and evident legal the change of ownership of the tokens to the
ferable records and tokens is that the former are and signed (as stated, transactions are signed
sets of data and the second are sets of data too, using asymmetric key cryptography-electronic
only associated with a computer code (computer signatures). However, UNCITRAL does not seem
programme) which can make the agreements to have had a self-executing code in mind, so
self-executing, dispensing with the subsequent that its equivalence to a paper document may
will of the parties. That is, ownership is trans- not be sufficient to provide satisfactory answers
ferred automatically through the execution of to the legal questions that may arise.
the programme when the parties comply with
the agreed requirements. It is also appropriate to analyse the requirements
of the UNCITRAL rules for drawing up contracts.
190 6. Blockchain and smart contracts. Legal implications in the intellectual property field
As the offer and acceptance of an electronic rules or the competent jurisdiction for settling
transaction are merely ‘data messages’, and the disputes that may arise from the execution of
term is defined in the MLETR as information this code.
generated, sent, received or stored by electronic
means, it may be taken to include interactions
using computer codes (smart contracts). The Legal importance of smart contracts
principle of the written form is met in that the
formalised contract is available for subsequent We must begin by accepting, even if only theo-
consultation, as may be the case of smart retically, the normative capacity of a computer
contracts. The signature requirement is fulfilled code. It must be accepted as a de facto issue,
in that the electronic signature method used is since the execution of a computer code on
authentically identificatory. As stated earlier, the users’ computers may influence their conduct or
use of asymmetric key cryptography (assignment that of third parties affected by the execution.
of a public and private key to the signee) will We might therefore speak of the ‘sui generis
only be identificatory if the receiver and user of regulatory capacity’ of smart contracts, since
those keys has been identified before they are they can coincide in their effects with the law
assigned. However, if asymmetric key cryptog- and with traditional contracts. Take, for instance,
raphy is used in the same way as in Bitcoin (it is a social network’s rules of use that condition its
not obligatory even for identity to be provided millions of users worldwide: how to post, sup-
when asymmetric keys are assigned), the signa- port, report or withdraw content; conditions for
ture must be understood to be anonymous and, accessing the site, etc. They create a habit that
accordingly, not identificatory, thereby failing is influenced by programming. The user of that
to meet the requirements: that the contract be computer programme (the social network’s code)
signed by the parties. The signature merely links will find it difficult to deviate from the standards
the electronic expression of will to a specific programmed by its creators.
identity.
While it is true that there are similarities between
The integrity requirement is, however, easily met legal regulations and a computer code there
in smart contracts. It should not be forgotten are also considerable differences. The main one
that we are talking about a code and data stored is probably that a computer code is created by
in a distributed ledger under Blockchain proto- private actors, while the regulatory responsi-
col. As this protocol is merely a concatenation bility of lawmakers almost also falls to already
of hashes of transaction blocks that are stored legitimised agents (legislators and judges) whose
in a shared ledger, it is indeed difficult to tamper mission is to safeguard the common good. In
with what has been signed. addition, these agents have their own jargon and
grammar rules that are difficult for individuals
In short, it seems that the UNCITRAL rules on unfamiliar with these disciplines to assimilate. For
Creators and Authorship in the Digital Age
electronic contracts are not so alien to Block- example, a smart contract will only be governed
chain. After all, smart contracts are simply the by the rules provided for in its design. From
culmination of digital contracting processes. The a computing perspective, it is difficult for the
rules on electronic signatures or communications programmer to take into account, when design-
in contracting processes are clearly applicable. ing the programme, the causes for rendering the
The express legal provisions on electronic contract null and void unless specific instructions
transferable records legitimise securities and are received in this regard. Therefore, it is possi-
electronic registers as proof. However, the regu- ble for there to be discrepancies between both
lations do not include express provisions on the systems (legal and the computing) that lead to
self-execution of contracts or on the applicable the execution of smart contracts that go against
This is no trivial matter. Contracts are essential clarify the claims that may arise ex post, after
tools that support both social and economic the breach of any of the contractual terms. The
aspects of our way of life. Until now, nobody had fact that smart contracts cannot be breached
questioned the principle that the execution of means that it will not be necessary to remedy or
contracts requires the support of legal systems. correct the harmful effects of non-compliance,
However, as stated, technological breakthroughs as these cannot exist. The foregoing, however,
have given rise to speculation about the possibil- does not mean that contract law will cease to
ity that contract law will be largely displaced by be applicable. It may so happen that the parties
these inventions. The most enthusiastic advo- have not been sufficiently exhaustive in provid-
cates do not just believe that smart contracts ing for possible situations that may arise from
192 6. Blockchain and smart contracts. Legal implications in the intellectual property field
the particular contractual relationship. Another participants in The DAO were subject were based
possibility is that errors in the code cause the on the ‘code is law’ philosophy, that is, they were
contract not to behave as planned by the parties. bound solely by the execution of the code.
External and unrelated circumstances may also
arise that influence the fulfilment or execution The Ethereum platform is governed by the
of the agreement. In these cases, and probably in Ethereum Foundation, which makes decisions
many others, it will not be possible to dispense by consensus (vote) among its members. The
with contract law or traditional legal systems. incident triggered a heated debate between
In addition, law, with its fundamental mission them about what action to take. Some regarded
of order and justice, cannot ignore phenomena it as a theft (misappropriation) that needed to be
such as the following. remedied. Others viewed it as a typical vulner-
ability of the code and therefore a risk inherent
in smart contracts. The latter were in favour of
The attack on ‘The DAO’ as a acting accordingly, believing that the investors in
paradigm for considering the legal The DAO should assume the losses.
implications of smart contracts
In the end it was decided to implement a hard
DAO (Decentralised Autonomous Organisation) fork. Consensual tampering with the chain
refers to a company that operates (at least from makes it possible to generate a new line of
a corporate point of view) by executing one or blocks. It starts with the block before the one
several smart contracts. Those who participate containing the fraudulent transfer or any other
in a DAO, usually through an ICO, exchange transfer that, for some reason, you wish to
cryptocurrency for ownership of tokens. This exclude from the distributed ledger. To achieve
transaction gives them, among other rights, the this, most of the nodes that act as miners of the
power to vote on certain issues related to the system must agree to choose the new line of the
activity of the company. chain that does not include the transfer that is
to be excluded. The participants in the protocol
In May 2016, a decentralised management risk thus managed to avoid corporate damage
capital fund was created: a DAO whose activity resulting from the loss of the 60 million dollars
focused on investing in start-ups related to that were transferred.
Blockchain and smart contracts using the Ethe-
reum platform. It was called ‘The DAO’ and was This decision sparked a disagreement within
the largest crowdfunding operation in history the Ethereum Foundation, which was settled
(150 million dollars and 11,000 investors around by splitting it into two platforms: Ethereum and
the world). The DAO was managed exclusively Ethereum Classic. This is a paradigmatic case of
through a smart contract executed on this whether ‘code is law’ or whether law and justice
platform. should prevail over code.
Creators and Authorship in the Digital Age
technological innovation to ascertain the impact Therefore, it can be categorically concluded that
that these advances may have on the cultural Blockchain does not solve the main problem
industry. In this context, many people wonder currently faced by the cultural industries: the in-
about the possible consequences of Blockchain’s fringement of rightsholders’ intellectual property
appearance on the creation and distribution of rights, depriving them of their legitimate right to
intellectual creations. control the reproduction and dissemination of
copies of their protected creations.
Some claim that Blockchain can enable com-
pletely new protection systems to be put in However, Blockchain can be useful to the cul-
place to combat copying and the enjoyment of tural industries in other areas. A good example
194 6. Blockchain and smart contracts. Legal implications in the intellectual property field
is registries recording ownership of the creations Finally, returning to the probative value of Block-
(the intellectual property registries). Indeed, this chain, in order for this protocol to have probative
technology (Blockchain) is also known as distrib- potential, it is important for the computer code
uted ledger technology and whereas it is of no that controls it to be open source; this undoubt-
use in protecting against unlawful reproductions, edly means that the validating procedure affects
it can be used to prove the ownership of intel- another invention of anarchism that influences
lectual property and owners’ assignment of their intellectual property rights: copyleft.
rights. When dealing with distributed ledgers,
the integrity of the entries does not depend on Indeed, to properly understand Blockchain’s
the trust placed in specific institutions, individu- probative strength, it should be remembered
als or legal entities, but on an activity carried out that it is a distributed ledger that is generated
by anonymous volunteers through consensus. in a consensual manner by various nodes. The
nodes that reach a consensus (miners) are not
Nevertheless, registering the authorship or first controlled by the owners of the computers, but
ownership of intellectual property still stems by the logic programmed and installed in them,
from a unilateral declaration of the supposed by the computer programme that instructs them
author and/or owner. However, there are no to implement the mathematical procedures
technological mechanisms for detecting foresee- referred to above. It might be objected that
able lies in these initial statements of ownership, this is not decentralised but simply distributed
and this could result in entries in the intellectual consensus and that whoever controls the
property registry that turn out to be fraudulent software run on the miners’ computers controls
and, consequently, could harm the legitimate the distributed consensus process. Under these
interests of the true owners. circumstances, the programme (software) editor
could always change the programming to cor-
It is also common to hear about this technology rupt the authenticity or integrity of the ledger.
(mainly Blockchain 2.0 and smart contracts)
being used to finance the production of intel- Bitcoin solves this problem with ‘open source’.
lectual property. The people who talk about this In the 1970s, an American computer scientist,
are basically referring to the crowdfunding of the Richard Stallman, developed an ‘interpreter’
work in question. The owner of the rights (to a of the LISP programming language, which
film, for example) decides to ‘tokenise’ the work interested the Symbolics company. Stallman
(that is, assign shares in the exploitation rights, agreed to grant them the right to analyse and
establishing as a unit of measurement tokens modify the source code of his programme. As a
with a certain value). Thus, if the estimated cost result, Symbolics caused it to evolve and when
of producing the film is a million euros, I can Stallman wanted to access the modifications, the
issue tokens representing shares of ownership of company refused. He then decided to abolish
the rights to the work of, for example, 100 euros these practices and created his own copyright
Creators and Authorship in the Digital Age
each, so that I would end up issuing a total of licence: the General Public Licence – the GNU
10,000 tokens worth 100 euros each. This would GPL licence, which is still the most widely used
grant the purchasers the right to (i) a fractional today by developers around the world.
part of the profits obtained from the exploitation
of the work and (ii) certain voting rights related Stallman provides the best explanation:
to how the film would be exploited. The pro-
cedure would be similar to the one used in the The simplest way to make a program free software
ICO (Initial Coin Offering) mentioned earlier in is to put it in the public domain, uncopyrighted.
connection with The DAO case. This allows people to share the program and
their improvements, if they are so minded. But
Open source licences may also include restric- miners does not seem the optimal scenario for
tions such as incorporating the name of the holding someone accountable for the malfunc-
original authors and the text of the licence tioning of the ‘chain’.
within the code that is supplied; allowing the
modification of the code only for private use,
and not allowing it to be subsequently sold; or Appendix 1. Consensus algorithms.
authorising the redistribution of the software The Byzantine generals problem
exclusively for non-commercial uses, etc. As the
restrictions are established by the first licensor, In 1982, Leslie Lamport, Robert Shostak and
they get to choose the specific form of licensing Marshall Pease published a paper57 that drew
196 6. Blockchain and smart contracts. Legal implications in the intellectual property field
conclusions from work carried out for the to retreat). If a lieutenant is a traitor, he may,
US government. The mathematical formula in order to confuse the rest of the lieutenants
examined in the paper was originally used to and lead them to believe that the traitor is the
control the launching of ballistic missiles via the commander, report that he was sent the oppo-
Internet. The aim was to establish the reliability site order to that which he really received (if he
of communications in open networks in extreme was ordered to attack, he will report he was told
cases where there are presumed to be nodes to retreat, and vice versa).
that aim to disrupt them or create misleading
impressions about their content. It has become To solve the problem, it is necessary to formulate
a key feature of any distributed computing algorithms that allow one of these two objec-
scheme, such as TCP/IP protocol or P2P. The tives to be achieved alternately:
mathematical formula solves what has been
called the ‘Byzantine generals problem’. 58 The 1. That all loyal lieutenants make the same
Byzantine generals problem is a metaphor for decision.
something that occurs in computer systems that
have a common goal: to agree on a ‘joint action’ 2. That, if the commander is loyal, all loyal
starting from a hierarchical structure. One of lieutenants obey the order he gave.
the nodes, which is ranked more highly, sends
an order that the rest of the nodes have to send It is based on the following premises:
on to each other. It is based on the premise that
some of the nodes are not reliable and deliber- a) The messages that are sent arrive correctly
ately send false information to the rest. This is (the messengers are not captured on the
how it goes: way).
The generals communicate through messengers. d) The absence of a message can be de-
Their messages can only transmit two possible tected.
commands: ‘attack’ or ‘retreat’. The commander
gives the order to all the lieutenants, who in e) In the absence of a message, a default or-
turn report on it to each other. In the end they der is executed. This avoids the problem of
all receive a number of messages equal to the a lieutenant being a traitor and in addition
Creators and Authorship in the Digital Age
198 6. Blockchain and smart contracts. Legal implications in the intellectual property field
In figure 4, the commander is loyal. So are If we replace the generals with computers
lieutenants 1 and 2. On this occasion the traitor (nodes), we find a suitable formula for achieving
is lieutenant 3. Everyone receives the order to consensus on which of the verifications of the
attack from the commander. Lieutenants 1 and 2 many miners is the one that will finally be added
also transmit an order to attack. Lieutenant 3, to our collaborative accounting. The verification
however, transmits an order to withdraw. Given that has greater consensus among the system
the contradictory nature of the orders received, participants will be added.
the loyal lieutenants apply the Lamport formula.
Again, there are 4 generals and one is a traitor.
The arithmetic is the same as long as the num-
ber of generals and/or traitors does not vary (4 = José María Anguiano holds a Law degree from the
4). The decision of Lieutenant 3 is again to Universidad Complutense of Madrid and has been
attack. If there were two traitors, the number of practising as a lawyer for more than twenty years. He
divides his time between the academic and business
generals needed to reach a consensus would be
worlds, as he is a lecturer at ICADE’s university master
seven, if there were three traitors, ten generals
degree in Intellectual Property, a partner at the Garrigues
would be necessary and so on.
law firm, and vice-president and founder of Act Logalty.
21 http://noticias.juridicas.com/base_datos/Admin/
and deciding on applications for registration and
l34-2002.html
annotation and, as the case may be, cancellations
(second transitional provision of Royal Decree
22 http://noticias.juridicas.com/base_datos/Admin/
281/2003 of 7 March adopting the Rules of the l34-2002.html
General Registry of Intellectual Property). 23 https://www.boe.es/buscar/act.
8 The functions of the Commission include ensuring php?id=BOE-A-2002-13758
uniformity in the action of the Territorial Registries, 24 https://www.boe.es/buscar/act.
and article 5 of Royal Decree 281/2003 specifies in php?id=BOE-A-2000-323
detail the composition and essential functions of
200 NOTES
25 http://www.culturaydeporte.gob.es/cultu- 42 A set of well-defined, orderly and finite instruc-
ra-mecd/areas-cultura/propiedadintelectual/ tions or rules that make it possible to perform
lucha-contra-la-pirateria/marco-juridico/via-civil. an activity by means of a sequence of steps that
html do not pose any doubts to the person who is to
26 https://www.boe.es/buscar/doc. perform the activity. Starting from an initial state
php?id=BOE-A-2011-20652 and input, by following the sequence of steps,
one arrives at a final state and reaches a solution.
27 http://www.oepm.es/cs/OEPMSite/contenidos/
Algorithmics is the study of algorithms. Source:
ponen/sem_jueces_03/Modulos/tirado.pdf
Wikipedia.
28 https://www.boe.es/buscar/act.php?id=BOE-A- 43 During the early 1980s, two Americans (Diffie
2000-323&p=20151028&tn=1
and Hellman) formulated asymmetric encryption
29 World Interllectual Property Organization, ‘What algorithms for the first time, in such a way that
is a patent?’, http://www.wipo.int/patents/en/ the participants in the traffic were given a pair of
30 World Intellectual Property Organization, ‘What computationally asymmetric keys between them:
is a trademark?’, http://www.wipo.int/trademarks/ the public and private key. Accordingly, if I encrypt
en/trademarks.html with the public key, I can decrypt with the private
key and vice versa; if I encrypt with the private key,
31 World Intellectual Property Organization, ‘What
I can decrypt with the public one. One of the keys
is an industrial design?’, http://www.wipo.int/
(the private one) is only known by the person who
designs/en/
applies it (signature) and the other one (the public
32 World Intellectual Property Organization, ‘What is one) can be known to everyone involved in the
a geographical indication?’, http://www.wipo.int/ traffic.
geo_indications/en/
44 This feature is also used to place electronic
33 Satoshi Nakamoto, ‘Bitcoin: A Peer-to-Peer communications in ‘envelopes’. The proprietary
Electronic Cash System’, 2008, https://Bitcoin.org/ envelope that is generated can only be ‘opened’ by
Bitcoin.pdf the holder of the private key. So, if I want to send
34 https://en.wikipedia.org/wiki/Anarcho-capitalism a file confidentially, I encrypt it with the public key
35 https://revistas.uca.es/index.php/periferica/ of the recipient. In this way only the recipient, the
article/view/943 only person who knows the private key, can ‘open’
the digital envelope and access the contents of the
36 https://en.wikipedia.org/wiki/Crypto-anarchism
file.
37 https://www.activism.net/cypherpunk/crypto-an- 45 Cryptographic keys (public and private) are
archy.html
generated in native format (on the device where
38 https://www.Bitcoin.com/info/what-is-Bitcoin- the private one is to be saved). After both keys are
double-spending generated, the ‘public one’ is ‘exported’ (transmit-
39 https://people.eecs.berkeley.edu/~luca/cs174/ ted) to the validation repository. As stated above,
Creators and Authorship in the Digital Age
202 NOTES
Bibliography
Agúndez Fernández, Antonio, Estudio jurídico del obra científica’, in Rosa de Couto Gálvez y Celia
plagio literario, Granada, Comares, 2005. Sánchez-Ramos (coords.), Propiedad intelectual e
industrial de la obra científica. 3. Patentes, Madrid,
Álvarez Muñoz, Guadalupe, ‘El plagio científ- Universidad Complutense/Universidad Pontificia
ico’, Actualidad Médica, t. 103, no. 804, 2018, Comillas, 2010, pp. 57−67.
pp. 106−7.
Couto Gálvez, Rosa de, et al., La tutela de la obra
Ascom, Libro blanco sobre la función de compli- plástica en la sociedad tecnológica. Consideración
ance, March 2017, https://www.asociacioncom- especial del derecho a la propia imagen y de otros
pliance.com/wp-content/uploads/2017/08/ activos inmateriales (awarded the prize for Mejor
Libro-Blanco-Compliance-ASCOM.pdf Estudio Jurídico in 2004 by the Fundación Arte y
Derecho and Vegap), Madrid, Trama, 2005.
Bercovitz Rodríguez-Cano, Rodrigo (coord.),
Comentarios a la Ley de Propiedad Intelectual, Echavarría Arcila, María Alejandra, ‘¿Qué es el
Madrid, Tecnos, 2017. plagio? Propuesta conceptual del plagio punible’,
Revista Facultad de Derecho y Ciencias Políticas,
Comité de Supervisión Bancaria de Basilea, no. 121, 2014, pp. 699−720.
Compliance and the compliance function in banks,
Creators and Authorship in the Digital Age
Bank for International Settlements, January 2005, Giuriati, Domenico, El plagio, Pamplona, Ana-
http://www.bis.org/publ/bcbs113.pdf lecta, 2005.
Cortés Fernández, Blanca, ‘El fair use en infrac- González-Meneses, Manuel, Entender Blockchain.
ciones de derechos de propiedad intelectual: el Una introducción a la tecnología de registro,
uso inocuo’, Boletín de Propiedad Intelectual, Indus- Pamplona, Aranzadi, 2017.
trial y Nuevas Tecnologías, no. 1, July 2012, pp. 6−8.
Gutiérrez Gutiérrez, Angélica, ‘El plagio literario’,
Couto Gálvez, Rosa de, ‘Medida preventiva y Derecho y Cambio Social, no. 23, 2011.
probatoria que ampara los derechos sobre la
Olmo, Juan Pablo, ‘La función de cumplimiento’, (Navarra), Thomson Reuters Aranzadi, 2015.
Gerencia de Riesgos y Seguros, no. 117, Madrid,
Instituto de Ciencias del Seguro, Fundación Vega Vega, José Antonio, El plagio como infrac-
Mapfre, 2013. ción de los derechos de autor, Madrid, Reus, 2018.
Piñol Espasa, José Agustín, ‘El registro de la Vives-Gràcia, Josep, ‘Aspectos de propiedad in-
propiedad intelectual’, in Felipe Palau Ramírez telectual en la creación y gestión de repositorios
and Guillermo Palao Moreno (dirs.), Comentarios institucionales’, El Profesional de la Información,
a la Ley de Propiedad Intelectual, Valencia, Tirant vol. 14, no. 4, 2005, pp. 267−78.
lo Blanch, 2017, pp. 1649−1662.
204 Bibliography
http://noticias.juridicas.com/base_datos/Ad- https://www.boe.es/buscar/act.php?id=BOE-A-
min/l34-2002.html 2000-323&p=20151028&tn=1
http://www.culturaydeporte.gob.es/cultura-mecd/ https://www.boe.es/buscar/act.
areas-cultura/propiedadintelectual/lucha-con- php?id=BOE-A-2002-13758
tra-la-pirateria/marco-juridico/via-civil.html
https://www.boe.es/buscar/doc.
http://www.oepm.es/cs/OEPMSite/contenidos/ php?id=BOE-A-2003-6247
ponen/sem_jueces_03/Modulos/tirado.pdf
https://www.boe.es/buscar/doc.
https://blog.bit2me.com/es/manifiesto-crip- php?id=BOE-A-2011-13114
toanarquista
https://www.boe.es/buscar/doc.
https://boe.es/buscar/act. php?id=BOE-A-2011-20652
php?id=BOE-A-1996-8930
https://www.boe.es/buscar/pdf/1995/BOE-A-
https://en.wikipedia.org/wiki/Anarcho-capitalism 1995-25444-consolidado.pdf
https://en.wikipedia.org/wiki/Crypto-anarchism https://www.boe.es/diario_boe/txt.
php?id=BOE-A-1977-10734
https://es.wikipedia.org/wiki/Problema_de_los_
generales_bizantinos https://www.boe.es/diario_boe/txt.
php?id=BOE-A-2015-3439
https://people.eecs.berkeley.edu/~luca/cs174/
byzantine.pdf https://www.boe.es/legislacion/documentos/
ConstitucionCASTELLANO.pdf
https://revistas.uca.es/index.php/periferica/
article/view/943 https://www.investopedia.com/terms/m/
merkle-tree.asp
https://www.bitcoin.com/info/what-is-bitcoin-
double-spending World Intellectual Property Organization, ‘What
is a trademark?’, http://www.wipo.int/trade-
https://www.bitcoinmining.com/bitcoin-min- marks/en/trademarks.html
ing-fees/
World Intellectual Property Organization, ‘What
https://www.boe.es/boe/dias/2009/01/12/pdfs/ is a patent?’, http://www.wipo.int/patents/en/
BOE-A-2009-504.pdf
Creators and Authorship in the Digital Age
BOARD OF DIRECTORS
President
Ibán García del Blanco
Members
Miguel Albero Suárez
Manuel Ángel de Miguel Monterrubio
Luis Manuel García Montero
Carlos Guervós Maíllo
María Ángeles González Rufo
Francisco Javier González Ruiz
José Lucio Gutiérrez Pedrosa
Javier Rivera Blanco
Amador Luis Sánchez Rico
Cristina Serrano Leal
Camilo Vázquez Bello
Secretary
Miguel Ángel Sampol Pucurull
MANAGEMENT
President
Ibán García del Blanco
Director of programmes
Santiago Herrero Amigo
Director of production
Pilar Gómez Gutiérrez
Digital Trends in Culture
206 CREDITS
ORGANISED AND PUBLISHED BY ACKNOWLEDGEMENTS
Acción Cultural Española (AC/E) We are grateful to all the organisations and
people whose experiences are mentioned as
Coordinator examples of digital practice in the various chap-
Raquel Mesa (AC/E) · @RaquelInesMesa ters of this study.
Editor
Ana Martín Moreno
Cover image
Idea with human hand
© Fairywong / Getty Images
ISBN: 978-84-17265-02-1