Don't believe every leak you read says EU Commission on CETA
- 11 July, 2012 18:13
The European Commission on Wednesday evening said that the "language being negotiated on CETA regarding Internet is now totally different from ACTA".
On Tuesday a leaked draft of the Canada-E.U. Trade Agreement (CETA) dating from February caused controversy when it was noted by digital rights activists to contain the same text as the Anti-Counterfeiting Trade Agreement (ACTA) which was rejected by the European Parliament over online civil liberty concerns.
However, as confirmed by the Commission Trade spokesman John Clancy on Twitter earlier on Wednesday, the Commission said that the most contested articles in ACTA, related to ISPs being asked to hand over information about subscribers to copyright holders and working with the business community to clamp down on intellectual property infringement, are not part of the current, up-to-date CETA text, nor have they been replaced by anything else.
Referring to other similarities with ACTA, the Commission pointed out that many of the provisions in the CETA intellectual property chapter are based on existing E.U. legislation; namely the 2000 eCommerce Directive; the 2001 Information Society Directive; the 2003 Customs Regulation; and the 2004 Enforcement Directive.
"In some of these cases, the language is also similar to the one contained in the 1996 TRIPS Agreement, an international WTO treaty -- these similarities are very likely to stay in the CETA text, but it is false to say that they originate in ACTA," said Commission sources.
The Commission added that a re-evaluation of the CETA text is currently under way "to take into account the impact of the rejection of ACTA".
The Commission also noted that criminal enforcement is a national competence and that this element of the agreement is negotiated by the European Council representing the member states. "The last time there was a negotiating session on criminal enforcement, during a video-conference in October 2011, no agreement was reached on some of the proposals by Canada which are indeed far-reaching," said the Commission.
In an email, Clancy also scotched rumors that CETA could introduce ACTA through the backdoor, saying there is "no basis for any conspiracy theories."
"These accusations are nonsense. A future E.U.-Canada trade deal will be very similar to the bilateral trade deal with South Korea already up and running for a year and which has not brought about the end of a free Internet."
But as the deal is being conducted in secret some digital activists will be difficult to convince. "I want to see proof!" said Jé²©mie Zimmermann, co-founder of La Quadrature du Net.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.
Bring Your Own Device FAQs
This report covers the frequently asked questions associated with the implications of BYOD devices in the workplace. Any solution in this space needs to be built on simplicity, scalability and security. Click to find out how to address the IT security challenges.
IDC: Delivering Customer Value with Enterprise Flash Deployments
When it comes to flash, “one size does not fit all.” IDC examines recent flash trends in enterprise storage deployments. This includes: highlighting how SSDs are filling in gaps of existing storage systems when coupled with intelligent archiving and automated tiering, the pros and cons of different SSD approaches, and tips to overcome concerns of reliability, manageability and scalability.