gem_id stringlengths 20 25 | id stringlengths 24 24 | title stringlengths 3 59 | context stringlengths 151 3.71k | question stringlengths 1 270 | target stringlengths 1 270 | references list | answers dict |
|---|---|---|---|---|---|---|---|
gem-squad_v2-train-8000 | 5ad00f5877cf76001a68683c | Copyright_infringement | Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a distributor of copyrighted works has some kind of software, dongle or password access device installed in instances of the work, any attempt to bypass such a copy protection scheme may be actionable β though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA β anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers. | What is the U.S. law that doesn't use the WIPO Copyright as it's Title I? | What is the U.S. law that doesn't use the WIPO Copyright as it's Title I? | [
"What is the U.S. law that doesn't use the WIPO Copyright as it's Title I?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8001 | 5ad00f5877cf76001a68683d | Copyright_infringement | Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a distributor of copyrighted works has some kind of software, dongle or password access device installed in instances of the work, any attempt to bypass such a copy protection scheme may be actionable β though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA β anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers. | What is the U.N. law that uses the WIPO Copyright as it's Title I? | What is the U.N. law that uses the WIPO Copyright as it's Title I? | [
"What is the U.N. law that uses the WIPO Copyright as it's Title I?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8002 | 5ad00f5877cf76001a68683e | Copyright_infringement | Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a distributor of copyrighted works has some kind of software, dongle or password access device installed in instances of the work, any attempt to bypass such a copy protection scheme may be actionable β though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA β anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers. | What is it called when someone unintentionally breaks encryption on a movie or game? | What is it called when someone unintentionally breaks encryption on a movie or game? | [
"What is it called when someone unintentionally breaks encryption on a movie or game?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8003 | 5ad00f5877cf76001a68683f | Copyright_infringement | Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a distributor of copyrighted works has some kind of software, dongle or password access device installed in instances of the work, any attempt to bypass such a copy protection scheme may be actionable β though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA β anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers. | Anticircumvention exemptions are generally not seen to be what? | Anticircumvention exemptions are generally not seen to be what? | [
"Anticircumvention exemptions are generally not seen to be what?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8004 | 5ad00f5877cf76001a686840 | Copyright_infringement | Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a distributor of copyrighted works has some kind of software, dongle or password access device installed in instances of the work, any attempt to bypass such a copy protection scheme may be actionable β though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA β anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers. | What are adult safety and public library software used to filter? | What are adult safety and public library software used to filter? | [
"What are adult safety and public library software used to filter?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8005 | 5726d735dd62a815002e9206 | Copyright_infringement | In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web. | What includes Internet portals, software and games? | What includes Internet portals, software and games? | [
"What includes Internet portals, software and games?"
] | {
"text": [
"intermediaries"
],
"answer_start": [
13
]
} |
gem-squad_v2-train-8006 | 5726d735dd62a815002e9207 | Copyright_infringement | In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web. | What examples provide virtual information? | What examples provide virtual information? | [
"What examples provide virtual information?"
] | {
"text": [
"interactive forums and comment facilities"
],
"answer_start": [
165
]
} |
gem-squad_v2-train-8007 | 5726d735dd62a815002e9208 | Copyright_infringement | In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web. | News, universities and libraries and archives are examples of what? | News, universities and libraries and archives are examples of what? | [
"News, universities and libraries and archives are examples of what?"
] | {
"text": [
"aggregators"
],
"answer_start": [
244
]
} |
gem-squad_v2-train-8008 | 5726d735dd62a815002e9209 | Copyright_infringement | In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web. | What is an important element of the World Wide Web? | What is an important element of the World Wide Web? | [
"What is an important element of the World Wide Web?"
] | {
"text": [
"hyperlinks"
],
"answer_start": [
479
]
} |
gem-squad_v2-train-8009 | 5ad00fba77cf76001a686850 | Copyright_infringement | In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web. | What excludes Internet portals, software and games? | What excludes Internet portals, software and games? | [
"What excludes Internet portals, software and games?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8010 | 5ad00fba77cf76001a686851 | Copyright_infringement | In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web. | What includes Internet portals, hardware and games? | What includes Internet portals, hardware and games? | [
"What includes Internet portals, hardware and games?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8011 | 5ad00fba77cf76001a686852 | Copyright_infringement | In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web. | What examples provide actual information? | What examples provide actual information? | [
"What examples provide actual information?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8012 | 5ad00fba77cf76001a686853 | Copyright_infringement | In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web. | News, universities and libraries and archives aren't examples of what? | News, universities and libraries and archives aren't examples of what? | [
"News, universities and libraries and archives aren't examples of what?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8013 | 5ad00fba77cf76001a686854 | Copyright_infringement | In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web. | What is an unimportant element of the World Wide Web? | What is an unimportant element of the World Wide Web? | [
"What is an unimportant element of the World Wide Web?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8014 | 5726d791f1498d1400e8ecc2 | Copyright_infringement | Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed] | Who did early court cases focus on? | Who did early court cases focus on? | [
"Who did early court cases focus on?"
] | {
"text": [
"Internet service providers"
],
"answer_start": [
46
]
} |
gem-squad_v2-train-8015 | 5726d791f1498d1400e8ecc3 | Copyright_infringement | Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed] | What could be sued for under civil or criminal law? | What could be sued for under civil or criminal law? | [
"What could be sued for under civil or criminal law?"
] | {
"text": [
"libel, defamation, or pornography"
],
"answer_start": [
202
]
} |
gem-squad_v2-train-8016 | 5726d791f1498d1400e8ecc4 | Copyright_infringement | Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed] | What was the result of early law on online liability? | What was the result of early law on online liability? | [
"What was the result of early law on online liability?"
] | {
"text": [
"varied widely from country to country"
],
"answer_start": [
442
]
} |
gem-squad_v2-train-8017 | 5726d791f1498d1400e8ecc5 | Copyright_infringement | Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed] | When were the first laws of liability passed? | When were the first laws of liability passed? | [
"When were the first laws of liability passed?"
] | {
"text": [
"mid-1990s"
],
"answer_start": [
553
]
} |
gem-squad_v2-train-8018 | 5ad0100877cf76001a686864 | Copyright_infringement | Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed] | Who didn't early court cases focus on? | Who didn't early court cases focus on? | [
"Who didn't early court cases focus on?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8019 | 5ad0100877cf76001a686865 | Copyright_infringement | Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed] | Who did late court cases focus on? | Who did late court cases focus on? | [
"Who did late court cases focus on?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8020 | 5ad0100877cf76001a686866 | Copyright_infringement | Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed] | What couldn't be sued for under civil or criminal law? | What couldn't be sued for under civil or criminal law? | [
"What couldn't be sued for under civil or criminal law?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8021 | 5ad0100877cf76001a686867 | Copyright_infringement | Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed] | What was the result of early law on offline liability? | What was the result of early law on offline liability? | [
"What was the result of early law on offline liability?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8022 | 5ad0100877cf76001a686868 | Copyright_infringement | Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed] | When were the last laws of liability passed? | When were the last laws of liability passed? | [
"When were the last laws of liability passed?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8023 | 5726d7f05951b619008f7fb1 | Copyright_infringement | The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement. | What law enacted in the U.S. in 1998 gave online intermediaries limited statutory immunity? | What law enacted in the U.S. in 1998 gave online intermediaries limited statutory immunity? | [
"What law enacted in the U.S. in 1998 gave online intermediaries limited statutory immunity?"
] | {
"text": [
"Digital Millennium Copyright Act"
],
"answer_start": [
9
]
} |
gem-squad_v2-train-8024 | 5726d7f05951b619008f7fb2 | Copyright_infringement | The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement. | How is this law characterized in the U.S.? | How is this law characterized in the U.S.? | [
"How is this law characterized in the U.S.?"
] | {
"text": [
"safe harbor"
],
"answer_start": [
429
]
} |
gem-squad_v2-train-8025 | 5726d7f05951b619008f7fb3 | Copyright_infringement | The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement. | In the E.U., what are the governing principles for ISP's? | In the E.U., what are the governing principles for ISP's? | [
"In the E.U., what are the governing principles for ISP's?"
] | {
"text": [
"mere conduit"
],
"answer_start": [
535
]
} |
gem-squad_v2-train-8026 | 5726d7f05951b619008f7fb4 | Copyright_infringement | The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement. | What is it called when intermediaries cannot be given an order by governments to monitor what happens on their services? | What is it called when intermediaries cannot be given an order by governments to monitor what happens on their services? | [
"What is it called when intermediaries cannot be given an order by governments to monitor what happens on their services?"
] | {
"text": [
"no obligation to monitor"
],
"answer_start": [
638
]
} |
gem-squad_v2-train-8027 | 5726d7f05951b619008f7fb5 | Copyright_infringement | The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement. | What was attempted to be amended in 2009 to support new ways to prevent copyright infringement? | What was attempted to be amended in 2009 to support new ways to prevent copyright infringement? | [
"What was attempted to be amended in 2009 to support new ways to prevent copyright infringement?"
] | {
"text": [
"European Telecoms Package"
],
"answer_start": [
892
]
} |
gem-squad_v2-train-8028 | 5ad010c777cf76001a686882 | Copyright_infringement | The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement. | What law rejected in the U.S. in 1998 gave online intermediaries limited statutory immunity? | What law rejected in the U.S. in 1998 gave online intermediaries limited statutory immunity? | [
"What law rejected in the U.S. in 1998 gave online intermediaries limited statutory immunity?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8029 | 5ad010c777cf76001a686883 | Copyright_infringement | The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement. | How is this law characterized in the U.N.? | How is this law characterized in the U.N.? | [
"How is this law characterized in the U.N.?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8030 | 5ad010c777cf76001a686884 | Copyright_infringement | The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement. | In the E.U., what aren't the governing principles for ISP's? | In the E.U., what aren't the governing principles for ISP's? | [
"In the E.U., what aren't the governing principles for ISP's?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8031 | 5ad010c777cf76001a686885 | Copyright_infringement | The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement. | What is it called when intermediaries cannot be given an order by governments to ignore what happens on their services? | What is it called when intermediaries cannot be given an order by governments to ignore what happens on their services? | [
"What is it called when intermediaries cannot be given an order by governments to ignore what happens on their services?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8032 | 5ad010c777cf76001a686886 | Copyright_infringement | The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement. | What was attempted to be amended in 2007 to support new ways to prevent copyright infringement? | What was attempted to be amended in 2007 to support new ways to prevent copyright infringement? | [
"What was attempted to be amended in 2007 to support new ways to prevent copyright infringement?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8033 | 5726d852708984140094d33b | Copyright_infringement | These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website. | What do certain type of intermediaries NOT do? | What do certain type of intermediaries NOT do? | [
"What do certain type of intermediaries NOT do?"
] | {
"text": [
"host or transmit infringing content"
],
"answer_start": [
37
]
} |
gem-squad_v2-train-8034 | 5726d852708984140094d33c | Copyright_infringement | These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website. | What protocol do intermediaries use that include a torrent tracker? | What protocol do intermediaries use that include a torrent tracker? | [
"What protocol do intermediaries use that include a torrent tracker?"
] | {
"text": [
"BitTorrent"
],
"answer_start": [
372
]
} |
gem-squad_v2-train-8035 | 5726d852708984140094d33d | Copyright_infringement | These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website. | What do Torrent files NOT contain? | What do Torrent files NOT contain? | [
"What do Torrent files NOT contain?"
] | {
"text": [
"copyrighted content"
],
"answer_start": [
545
]
} |
gem-squad_v2-train-8036 | 5726d852708984140094d33e | Copyright_infringement | These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website. | What is a torrent site that uses magnet links to share peer-to-peer? | What is a torrent site that uses magnet links to share peer-to-peer? | [
"What is a torrent site that uses magnet links to share peer-to-peer?"
] | {
"text": [
"The Pirate Bay"
],
"answer_start": [
736
]
} |
gem-squad_v2-train-8037 | 5ad0126977cf76001a6868b8 | Copyright_infringement | These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website. | What do certain type of intermediaries do? | What do certain type of intermediaries do? | [
"What do certain type of intermediaries do?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8038 | 5ad0126977cf76001a6868b9 | Copyright_infringement | These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website. | What protocol do intermediaries not use that include a torrent tracker? | What protocol do intermediaries not use that include a torrent tracker? | [
"What protocol do intermediaries not use that include a torrent tracker?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8039 | 5ad0126977cf76001a6868ba | Copyright_infringement | These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website. | What protocol do intermediaries use that exclude a torrent tracker? | What protocol do intermediaries use that exclude a torrent tracker? | [
"What protocol do intermediaries use that exclude a torrent tracker?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8040 | 5ad0126977cf76001a6868bb | Copyright_infringement | These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website. | What do Torrent files contain? | What do Torrent files contain? | [
"What do Torrent files contain?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8041 | 5ad0126977cf76001a6868bc | Copyright_infringement | These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website. | What is a torrent site that uses magnet links to block peer-to-peer? | What is a torrent site that uses magnet links to block peer-to-peer? | [
"What is a torrent site that uses magnet links to block peer-to-peer?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8042 | 5726d8a5708984140094d353 | Copyright_infringement | Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws. | What is the legal status of secondary liability? | What is the legal status of secondary liability? | [
"What is the legal status of secondary liability?"
] | {
"text": [
"subject of ongoing litigation"
],
"answer_start": [
110
]
} |
gem-squad_v2-train-8043 | 5726d8a5708984140094d354 | Copyright_infringement | Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws. | What makes peer-to-peer networks different than other online providers? | What makes peer-to-peer networks different than other online providers? | [
"What makes peer-to-peer networks different than other online providers?"
] | {
"text": [
"decentralised structure"
],
"answer_start": [
145
]
} |
gem-squad_v2-train-8044 | 5726d8a5708984140094d355 | Copyright_infringement | Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws. | What was the initial purpose of the BitTorrent protocol? | What was the initial purpose of the BitTorrent protocol? | [
"What was the initial purpose of the BitTorrent protocol?"
] | {
"text": [
"distribute large files effectively"
],
"answer_start": [
381
]
} |
gem-squad_v2-train-8045 | 5726d8a5708984140094d356 | Copyright_infringement | Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws. | What are the reasons for more complex network configurations in peer-to-peer software development? | What are the reasons for more complex network configurations in peer-to-peer software development? | [
"What are the reasons for more complex network configurations in peer-to-peer software development?"
] | {
"text": [
"to avoid liability as intermediaries"
],
"answer_start": [
549
]
} |
gem-squad_v2-train-8046 | 5ad012bf77cf76001a6868c8 | Copyright_infringement | Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws. | What is the legal status of primary liability? | What is the legal status of primary liability? | [
"What is the legal status of primary liability?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8047 | 5ad012bf77cf76001a6868c9 | Copyright_infringement | Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws. | What makes peer-to-peer networks the same as other online providers? | What makes peer-to-peer networks the same as other online providers? | [
"What makes peer-to-peer networks the same as other online providers?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8048 | 5ad012bf77cf76001a6868ca | Copyright_infringement | Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws. | What was the final purpose of the BitTorrent protocol? | What was the final purpose of the BitTorrent protocol? | [
"What was the final purpose of the BitTorrent protocol?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8049 | 5ad012bf77cf76001a6868cb | Copyright_infringement | Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws. | What wasn't the initial purpose of the BitTorrent protocol? | What wasn't the initial purpose of the BitTorrent protocol? | [
"What wasn't the initial purpose of the BitTorrent protocol?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8050 | 5ad012bf77cf76001a6868cc | Copyright_infringement | Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws. | What are the reasons for more simple network configurations in peer-to-peer software development? | What are the reasons for more simple network configurations in peer-to-peer software development? | [
"What are the reasons for more simple network configurations in peer-to-peer software development?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8051 | 5726d9005951b619008f7fd9 | Copyright_infringement | Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech. | What does Article 10 of the Berne Convention call certain uses that limit copyright? | What does Article 10 of the Berne Convention call certain uses that limit copyright? | [
"What does Article 10 of the Berne Convention call certain uses that limit copyright?"
] | {
"text": [
"fair practice"
],
"answer_start": [
210
]
} |
gem-squad_v2-train-8052 | 5726d9005951b619008f7fda | Copyright_infringement | Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech. | Where are minimal quotations commonly used? | Where are minimal quotations commonly used? | [
"Where are minimal quotations commonly used?"
] | {
"text": [
"journalism and education"
],
"answer_start": [
282
]
} |
gem-squad_v2-train-8053 | 5726d9005951b619008f7fdb | Copyright_infringement | Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech. | What categories do works that would normally be considered infringing fall into? | What categories do works that would normally be considered infringing fall into? | [
"What categories do works that would normally be considered infringing fall into?"
] | {
"text": [
"fair use or fair dealing"
],
"answer_start": [
450
]
} |
gem-squad_v2-train-8054 | 5726d9005951b619008f7fdc | Copyright_infringement | Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech. | What do these statutes represent? | What do these statutes represent? | [
"What do these statutes represent?"
] | {
"text": [
"principles underlying many earlier judicial precedents"
],
"answer_start": [
547
]
} |
gem-squad_v2-train-8055 | 5726d9005951b619008f7fdd | Copyright_infringement | Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech. | What are these statutes essential to? | What are these statutes essential to? | [
"What are these statutes essential to?"
] | {
"text": [
"freedom of speech"
],
"answer_start": [
635
]
} |
gem-squad_v2-train-8056 | 5ad0137b77cf76001a6868dc | Copyright_infringement | Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech. | What does Article 11 of the Berne Convention call certain uses that limit copyright? | What does Article 11 of the Berne Convention call certain uses that limit copyright? | [
"What does Article 11 of the Berne Convention call certain uses that limit copyright?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8057 | 5ad0137b77cf76001a6868dd | Copyright_infringement | Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech. | What does Article 10 of the Berne Convention not call certain uses that limit copyright? | What does Article 10 of the Berne Convention not call certain uses that limit copyright? | [
"What does Article 10 of the Berne Convention not call certain uses that limit copyright?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8058 | 5ad0137b77cf76001a6868de | Copyright_infringement | Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech. | Where are maximum quotations commonly used? | Where are maximum quotations commonly used? | [
"Where are maximum quotations commonly used?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8059 | 5ad0137b77cf76001a6868df | Copyright_infringement | Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech. | What categories do work that wouldn't normally be considered infringing fall into? | What categories do work that wouldn't normally be considered infringing fall into? | [
"What categories do work that wouldn't normally be considered infringing fall into?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8060 | 5ad0137b77cf76001a6868e0 | Copyright_infringement | Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech. | What don't these statutes represent? | What don't these statutes represent? | [
"What don't these statutes represent?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8061 | 5726d944dd62a815002e927e | Copyright_infringement | Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements. | What is it called when a law disallows copyright owners from denying a license for certain uses? | What is it called when a law disallows copyright owners from denying a license for certain uses? | [
"What is it called when a law disallows copyright owners from denying a license for certain uses?"
] | {
"text": [
"compulsory licensing"
],
"answer_start": [
35
]
} |
gem-squad_v2-train-8062 | 5726d944dd62a815002e927f | Copyright_infringement | Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements. | What are two examples of this licensing? | What are two examples of this licensing? | [
"What are two examples of this licensing?"
] | {
"text": [
"compilations and live performances of music"
],
"answer_start": [
180
]
} |
gem-squad_v2-train-8063 | 5726d944dd62a815002e9280 | Copyright_infringement | Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements. | What happens if a royalty is paid to the copyright owner or representative? | What happens if a royalty is paid to the copyright owner or representative? | [
"What happens if a royalty is paid to the copyright owner or representative?"
] | {
"text": [
"no infringement occurs"
],
"answer_start": [
305
]
} |
gem-squad_v2-train-8064 | 5726d944dd62a815002e9281 | Copyright_infringement | Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements. | What country has fair dealing laws? | What country has fair dealing laws? | [
"What country has fair dealing laws?"
] | {
"text": [
"Canada"
],
"answer_start": [
514
]
} |
gem-squad_v2-train-8065 | 5ad013e577cf76001a6868f8 | Copyright_infringement | Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements. | What is it called when a law allows copyright owners from denying a license for certain uses? | What is it called when a law allows copyright owners from denying a license for certain uses? | [
"What is it called when a law allows copyright owners from denying a license for certain uses?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8066 | 5ad013e577cf76001a6868f9 | Copyright_infringement | Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements. | What is it called when a law disallows copyright owners from accepting a license for certain uses? | What is it called when a law disallows copyright owners from accepting a license for certain uses? | [
"What is it called when a law disallows copyright owners from accepting a license for certain uses?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8067 | 5ad013e577cf76001a6868fa | Copyright_infringement | Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements. | What aren't two examples of this licensing? | What aren't two examples of this licensing? | [
"What aren't two examples of this licensing?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8068 | 5ad013e577cf76001a6868fb | Copyright_infringement | Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements. | What happens if a royalty isn't paid to the copyright owner or representative? | What happens if a royalty isn't paid to the copyright owner or representative? | [
"What happens if a royalty isn't paid to the copyright owner or representative?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8069 | 5ad013e577cf76001a6868fc | Copyright_infringement | Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements. | What country has no fair dealing laws? | What country has no fair dealing laws? | [
"What country has no fair dealing laws?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8070 | 5726d98cdd62a815002e9286 | Copyright_infringement | In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators. | Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested? | Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested? | [
"Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested?"
] | {
"text": [
"Europe"
],
"answer_start": [
3
]
} |
gem-squad_v2-train-8071 | 5726d98cdd62a815002e9287 | Copyright_infringement | In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators. | Whose copyright were news aggregators infringing on? | Whose copyright were news aggregators infringing on? | [
"Whose copyright were news aggregators infringing on?"
] | {
"text": [
"news generators"
],
"answer_start": [
216
]
} |
gem-squad_v2-train-8072 | 5726d98cdd62a815002e9288 | Copyright_infringement | In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators. | When was the second part of the case decided? | When was the second part of the case decided? | [
"When was the second part of the case decided?"
] | {
"text": [
"June 2014"
],
"answer_start": [
472
]
} |
gem-squad_v2-train-8073 | 5726d98cdd62a815002e9289 | Copyright_infringement | In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators. | What did the courts rule was NOT infringement? | What did the courts rule was NOT infringement? | [
"What did the courts rule was NOT infringement?"
] | {
"text": [
"temporary web cache of consumers"
],
"answer_start": [
586
]
} |
gem-squad_v2-train-8074 | 5ad0148477cf76001a68690c | Copyright_infringement | In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators. | Where was the Private Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested? | Where was the Private Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested? | [
"Where was the Private Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8075 | 5ad0148477cf76001a68690d | Copyright_infringement | In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators. | Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case not contested? | Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case not contested? | [
"Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case not contested?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8076 | 5ad0148477cf76001a68690e | Copyright_infringement | In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators. | Whose copyright weren't news aggregators infringing on? | Whose copyright weren't news aggregators infringing on? | [
"Whose copyright weren't news aggregators infringing on?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8077 | 5ad0148477cf76001a68690f | Copyright_infringement | In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators. | When was the second part of the case undecided? | When was the second part of the case undecided? | [
"When was the second part of the case undecided?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8078 | 5ad0148477cf76001a686910 | Copyright_infringement | In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators. | What did the courts rule was infringement? | What did the courts rule was infringement? | [
"What did the courts rule was infringement?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8079 | 5726da0f5951b619008f7ff7 | Copyright_infringement | In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes. | If a work must include a degree of originality, what else must it contain to be protected? | If a work must include a degree of originality, what else must it contain to be protected? | [
"If a work must include a degree of originality, what else must it contain to be protected?"
] | {
"text": [
"in a fixed medium"
],
"answer_start": [
110
]
} |
gem-squad_v2-train-8080 | 5726da0f5951b619008f7ff8 | Copyright_infringement | In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes. | What is NOT protected? | What is NOT protected? | [
"What is NOT protected?"
] | {
"text": [
"The idea itself"
],
"answer_start": [
182
]
} |
gem-squad_v2-train-8081 | 5726da0f5951b619008f7ff9 | Copyright_infringement | In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes. | What makes a copy of an original idea infringing? | What makes a copy of an original idea infringing? | [
"What makes a copy of an original idea infringing?"
] | {
"text": [
"it copies that person's unique, tangible expression of the idea"
],
"answer_start": [
289
]
} |
gem-squad_v2-train-8082 | 5726da0f5951b619008f7ffa | Copyright_infringement | In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes. | What limitation is only embodied in case law, rather than statues? | What limitation is only embodied in case law, rather than statues? | [
"What limitation is only embodied in case law, rather than statues?"
] | {
"text": [
"what qualifies as original"
],
"answer_start": [
402
]
} |
gem-squad_v2-train-8083 | 5ad0152b77cf76001a686928 | Copyright_infringement | In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes. | If a work must exclude a degree of originality, what else must it contain to be protected? | If a work must exclude a degree of originality, what else must it contain to be protected? | [
"If a work must exclude a degree of originality, what else must it contain to be protected?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8084 | 5ad0152b77cf76001a686929 | Copyright_infringement | In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes. | If a work must include a degree of originality, what else mustn't it contain to be protected? | If a work must include a degree of originality, what else mustn't it contain to be protected? | [
"If a work must include a degree of originality, what else mustn't it contain to be protected?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8085 | 5ad0152b77cf76001a68692a | Copyright_infringement | In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes. | What is protected? | What is protected? | [
"What is protected?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8086 | 5ad0152b77cf76001a68692b | Copyright_infringement | In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes. | What makes a copy of an unoriginal idea infringing? | What makes a copy of an unoriginal idea infringing? | [
"What makes a copy of an unoriginal idea infringing?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8087 | 5ad0152b77cf76001a68692c | Copyright_infringement | In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes. | What limitation is only embodied in case law, and also in statues? | What limitation is only embodied in case law, and also in statues? | [
"What limitation is only embodied in case law, and also in statues?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8088 | 5726da59dd62a815002e92a2 | Copyright_infringement | In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection. | Which country needs a similarity requirement to determine if the work was copied? | Which country needs a similarity requirement to determine if the work was copied? | [
"Which country needs a similarity requirement to determine if the work was copied?"
] | {
"text": [
"U.S."
],
"answer_start": [
7
]
} |
gem-squad_v2-train-8089 | 5726da59dd62a815002e92a3 | Copyright_infringement | In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection. | What test might courts require software to pass to determine if it is protected or infringing? | What test might courts require software to pass to determine if it is protected or infringing? | [
"What test might courts require software to pass to determine if it is protected or infringing?"
] | {
"text": [
"Abstraction-Filtration-Comparison test"
],
"answer_start": [
191
]
} |
gem-squad_v2-train-8090 | 5726da59dd62a815002e92a4 | Copyright_infringement | In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection. | What has software case law determined about R&D, effort and expense put into creation? | What has software case law determined about R&D, effort and expense put into creation? | [
"What has software case law determined about R&D, effort and expense put into creation?"
] | {
"text": [
"doesn't affect copyright protection"
],
"answer_start": [
485
]
} |
gem-squad_v2-train-8091 | 5ad015bf77cf76001a686944 | Copyright_infringement | In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection. | Which country needs a similarity requirement to determine if the work wasn't copied? | Which country needs a similarity requirement to determine if the work wasn't copied? | [
"Which country needs a similarity requirement to determine if the work wasn't copied?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8092 | 5ad015bf77cf76001a686945 | Copyright_infringement | In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection. | Which country doesn't need a similarity requirement to determine if the work was copied? | Which country doesn't need a similarity requirement to determine if the work was copied? | [
"Which country doesn't need a similarity requirement to determine if the work was copied?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8093 | 5ad015bf77cf76001a686946 | Copyright_infringement | In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection. | What test might courts require hardware to pass to determine if it is protected or infringing? | What test might courts require hardware to pass to determine if it is protected or infringing? | [
"What test might courts require hardware to pass to determine if it is protected or infringing?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8094 | 5ad015bf77cf76001a686947 | Copyright_infringement | In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection. | What test might courts require software to pass to determine if it isn't protected or infringing? | What test might courts require software to pass to determine if it isn't protected or infringing? | [
"What test might courts require software to pass to determine if it isn't protected or infringing?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8095 | 5ad015bf77cf76001a686948 | Copyright_infringement | In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection. | What has hardware case law determined about R&D, effort and expense put into creation? | What has hardware case law determined about R&D, effort and expense put into creation? | [
"What has hardware case law determined about R&D, effort and expense put into creation?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8096 | 5726daa5dd62a815002e92bc | Copyright_infringement | Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased. | Who takes different steps to prevent infringement? | Who takes different steps to prevent infringement? | [
"Who takes different steps to prevent infringement?"
] | {
"text": [
"Corporations and legislatures"
],
"answer_start": [
0
]
} |
gem-squad_v2-train-8097 | 5726daa5dd62a815002e92bd | Copyright_infringement | Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased. | What is the major focus of these steps? | What is the major focus of these steps? | [
"What is the major focus of these steps?"
] | {
"text": [
"preventing or reducing digital methods of infringement"
],
"answer_start": [
163
]
} |
gem-squad_v2-train-8098 | 5726daa5dd62a815002e92be | Copyright_infringement | Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased. | What kinds of legislation are a strategy for preventing infringement? | What kinds of legislation are a strategy for preventing infringement? | [
"What kinds of legislation are a strategy for preventing infringement?"
] | {
"text": [
"civil & criminal"
],
"answer_start": [
249
]
} |
gem-squad_v2-train-8099 | 5726daa5dd62a815002e92bf | Copyright_infringement | Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased. | What does DRM and anti-circumvention laws do? | What does DRM and anti-circumvention laws do? | [
"What does DRM and anti-circumvention laws do?"
] | {
"text": [
"limit the amount of control consumers have"
],
"answer_start": [
490
]
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.