gem_id
stringlengths
20
25
id
stringlengths
24
24
title
stringlengths
3
59
context
stringlengths
151
3.71k
question
stringlengths
1
270
target
stringlengths
1
270
references
list
answers
dict
gem-squad_v2-train-8000
5ad00f5877cf76001a68683c
Copyright_infringement
Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a distributor of copyrighted works has some kind of software, dongle or password access device installed in instances of the work, any attempt to bypass such a copy protection scheme may be actionable – though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA – anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers.
What is the U.S. law that doesn't use the WIPO Copyright as it's Title I?
What is the U.S. law that doesn't use the WIPO Copyright as it's Title I?
[ "What is the U.S. law that doesn't use the WIPO Copyright as it's Title I?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8001
5ad00f5877cf76001a68683d
Copyright_infringement
Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a distributor of copyrighted works has some kind of software, dongle or password access device installed in instances of the work, any attempt to bypass such a copy protection scheme may be actionable – though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA – anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers.
What is the U.N. law that uses the WIPO Copyright as it's Title I?
What is the U.N. law that uses the WIPO Copyright as it's Title I?
[ "What is the U.N. law that uses the WIPO Copyright as it's Title I?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8002
5ad00f5877cf76001a68683e
Copyright_infringement
Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a distributor of copyrighted works has some kind of software, dongle or password access device installed in instances of the work, any attempt to bypass such a copy protection scheme may be actionable – though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA – anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers.
What is it called when someone unintentionally breaks encryption on a movie or game?
What is it called when someone unintentionally breaks encryption on a movie or game?
[ "What is it called when someone unintentionally breaks encryption on a movie or game?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8003
5ad00f5877cf76001a68683f
Copyright_infringement
Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a distributor of copyrighted works has some kind of software, dongle or password access device installed in instances of the work, any attempt to bypass such a copy protection scheme may be actionable – though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA – anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers.
Anticircumvention exemptions are generally not seen to be what?
Anticircumvention exemptions are generally not seen to be what?
[ "Anticircumvention exemptions are generally not seen to be what?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8004
5ad00f5877cf76001a686840
Copyright_infringement
Title I of the U.S. DMCA, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act has provisions that prevent persons from "circumvent[ing] a technological measure that effectively controls access to a work". Thus if a distributor of copyrighted works has some kind of software, dongle or password access device installed in instances of the work, any attempt to bypass such a copy protection scheme may be actionable – though the US Copyright Office is currently reviewing anticircumvention rulemaking under DMCA – anticircumvention exemptions that have been in place under the DMCA include those in software designed to filter websites that are generally seen to be inefficient (child safety and public library website filtering software) and the circumvention of copy protection mechanisms that have malfunctioned, have caused the instance of the work to become inoperable or which are no longer supported by their manufacturers.
What are adult safety and public library software used to filter?
What are adult safety and public library software used to filter?
[ "What are adult safety and public library software used to filter?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8005
5726d735dd62a815002e9206
Copyright_infringement
In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web.
What includes Internet portals, software and games?
What includes Internet portals, software and games?
[ "What includes Internet portals, software and games?" ]
{ "text": [ "intermediaries" ], "answer_start": [ 13 ] }
gem-squad_v2-train-8006
5726d735dd62a815002e9207
Copyright_infringement
In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web.
What examples provide virtual information?
What examples provide virtual information?
[ "What examples provide virtual information?" ]
{ "text": [ "interactive forums and comment facilities" ], "answer_start": [ 165 ] }
gem-squad_v2-train-8007
5726d735dd62a815002e9208
Copyright_infringement
In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web.
News, universities and libraries and archives are examples of what?
News, universities and libraries and archives are examples of what?
[ "News, universities and libraries and archives are examples of what?" ]
{ "text": [ "aggregators" ], "answer_start": [ 244 ] }
gem-squad_v2-train-8008
5726d735dd62a815002e9209
Copyright_infringement
In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web.
What is an important element of the World Wide Web?
What is an important element of the World Wide Web?
[ "What is an important element of the World Wide Web?" ]
{ "text": [ "hyperlinks" ], "answer_start": [ 479 ] }
gem-squad_v2-train-8009
5ad00fba77cf76001a686850
Copyright_infringement
In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web.
What excludes Internet portals, software and games?
What excludes Internet portals, software and games?
[ "What excludes Internet portals, software and games?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8010
5ad00fba77cf76001a686851
Copyright_infringement
In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web.
What includes Internet portals, hardware and games?
What includes Internet portals, hardware and games?
[ "What includes Internet portals, hardware and games?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8011
5ad00fba77cf76001a686852
Copyright_infringement
In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web.
What examples provide actual information?
What examples provide actual information?
[ "What examples provide actual information?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8012
5ad00fba77cf76001a686853
Copyright_infringement
In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web.
News, universities and libraries and archives aren't examples of what?
News, universities and libraries and archives aren't examples of what?
[ "News, universities and libraries and archives aren't examples of what?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8013
5ad00fba77cf76001a686854
Copyright_infringement
In addition, intermediaries are now also generally understood to include Internet portals, software and games providers, those providing virtual information such as interactive forums and comment facilities with or without a moderation system, aggregators of various kinds, such as news aggregators, universities, libraries and archives, web search engines, chat rooms, web blogs, mailing lists, and any website which provides access to third party content through, for example, hyperlinks, a crucial element of the World Wide Web.
What is an unimportant element of the World Wide Web?
What is an unimportant element of the World Wide Web?
[ "What is an unimportant element of the World Wide Web?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8014
5726d791f1498d1400e8ecc2
Copyright_infringement
Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed]
Who did early court cases focus on?
Who did early court cases focus on?
[ "Who did early court cases focus on?" ]
{ "text": [ "Internet service providers" ], "answer_start": [ 46 ] }
gem-squad_v2-train-8015
5726d791f1498d1400e8ecc3
Copyright_infringement
Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed]
What could be sued for under civil or criminal law?
What could be sued for under civil or criminal law?
[ "What could be sued for under civil or criminal law?" ]
{ "text": [ "libel, defamation, or pornography" ], "answer_start": [ 202 ] }
gem-squad_v2-train-8016
5726d791f1498d1400e8ecc4
Copyright_infringement
Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed]
What was the result of early law on online liability?
What was the result of early law on online liability?
[ "What was the result of early law on online liability?" ]
{ "text": [ "varied widely from country to country" ], "answer_start": [ 442 ] }
gem-squad_v2-train-8017
5726d791f1498d1400e8ecc5
Copyright_infringement
Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed]
When were the first laws of liability passed?
When were the first laws of liability passed?
[ "When were the first laws of liability passed?" ]
{ "text": [ "mid-1990s" ], "answer_start": [ 553 ] }
gem-squad_v2-train-8018
5ad0100877cf76001a686864
Copyright_infringement
Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed]
Who didn't early court cases focus on?
Who didn't early court cases focus on?
[ "Who didn't early court cases focus on?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8019
5ad0100877cf76001a686865
Copyright_infringement
Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed]
Who did late court cases focus on?
Who did late court cases focus on?
[ "Who did late court cases focus on?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8020
5ad0100877cf76001a686866
Copyright_infringement
Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed]
What couldn't be sued for under civil or criminal law?
What couldn't be sued for under civil or criminal law?
[ "What couldn't be sued for under civil or criminal law?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8021
5ad0100877cf76001a686867
Copyright_infringement
Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed]
What was the result of early law on offline liability?
What was the result of early law on offline liability?
[ "What was the result of early law on offline liability?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8022
5ad0100877cf76001a686868
Copyright_infringement
Early court cases focused on the liability of Internet service providers (ISPs) for hosting, transmitting or publishing user-supplied content that could be actioned under civil or criminal law, such as libel, defamation, or pornography. As different content was considered in different legal systems, and in the absence of common definitions for "ISPs," "bulletin boards" or "online publishers," early law on online intermediaries' liability varied widely from country to country. The first laws on online intermediaries' liability were passed from the mid-1990s onwards.[citation needed]
When were the last laws of liability passed?
When were the last laws of liability passed?
[ "When were the last laws of liability passed?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8023
5726d7f05951b619008f7fb1
Copyright_infringement
The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement.
What law enacted in the U.S. in 1998 gave online intermediaries limited statutory immunity?
What law enacted in the U.S. in 1998 gave online intermediaries limited statutory immunity?
[ "What law enacted in the U.S. in 1998 gave online intermediaries limited statutory immunity?" ]
{ "text": [ "Digital Millennium Copyright Act" ], "answer_start": [ 9 ] }
gem-squad_v2-train-8024
5726d7f05951b619008f7fb2
Copyright_infringement
The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement.
How is this law characterized in the U.S.?
How is this law characterized in the U.S.?
[ "How is this law characterized in the U.S.?" ]
{ "text": [ "safe harbor" ], "answer_start": [ 429 ] }
gem-squad_v2-train-8025
5726d7f05951b619008f7fb3
Copyright_infringement
The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement.
In the E.U., what are the governing principles for ISP's?
In the E.U., what are the governing principles for ISP's?
[ "In the E.U., what are the governing principles for ISP's?" ]
{ "text": [ "mere conduit" ], "answer_start": [ 535 ] }
gem-squad_v2-train-8026
5726d7f05951b619008f7fb4
Copyright_infringement
The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement.
What is it called when intermediaries cannot be given an order by governments to monitor what happens on their services?
What is it called when intermediaries cannot be given an order by governments to monitor what happens on their services?
[ "What is it called when intermediaries cannot be given an order by governments to monitor what happens on their services?" ]
{ "text": [ "no obligation to monitor" ], "answer_start": [ 638 ] }
gem-squad_v2-train-8027
5726d7f05951b619008f7fb5
Copyright_infringement
The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement.
What was attempted to be amended in 2009 to support new ways to prevent copyright infringement?
What was attempted to be amended in 2009 to support new ways to prevent copyright infringement?
[ "What was attempted to be amended in 2009 to support new ways to prevent copyright infringement?" ]
{ "text": [ "European Telecoms Package" ], "answer_start": [ 892 ] }
gem-squad_v2-train-8028
5ad010c777cf76001a686882
Copyright_infringement
The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement.
What law rejected in the U.S. in 1998 gave online intermediaries limited statutory immunity?
What law rejected in the U.S. in 1998 gave online intermediaries limited statutory immunity?
[ "What law rejected in the U.S. in 1998 gave online intermediaries limited statutory immunity?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8029
5ad010c777cf76001a686883
Copyright_infringement
The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement.
How is this law characterized in the U.N.?
How is this law characterized in the U.N.?
[ "How is this law characterized in the U.N.?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8030
5ad010c777cf76001a686884
Copyright_infringement
The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement.
In the E.U., what aren't the governing principles for ISP's?
In the E.U., what aren't the governing principles for ISP's?
[ "In the E.U., what aren't the governing principles for ISP's?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8031
5ad010c777cf76001a686885
Copyright_infringement
The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement.
What is it called when intermediaries cannot be given an order by governments to ignore what happens on their services?
What is it called when intermediaries cannot be given an order by governments to ignore what happens on their services?
[ "What is it called when intermediaries cannot be given an order by governments to ignore what happens on their services?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8032
5ad010c777cf76001a686886
Copyright_infringement
The U.S. Digital Millennium Copyright Act (1998) and the European E-Commerce Directive (2000) provide online intermediaries with limited statutory immunity from liability for copyright infringement. Online intermediaries hosting content that infringes copyright are not liable, so long as they do not know about it and take actions once the infringing content is brought to their attention. In U.S. law this is characterized as "safe harbor" provisions. Under European law, the governing principles for Internet Service Providers are "mere conduit", meaning that they are neutral 'pipes' with no knowledge of what they are carrying; and 'no obligation to monitor' meaning that they cannot be given a general mandate by governments to monitor content. These two principles are a barrier for certain forms of online copyright enforcement and they were the reason behind an attempt to amend the European Telecoms Package in 2009 to support new measures against copyright infringement.
What was attempted to be amended in 2007 to support new ways to prevent copyright infringement?
What was attempted to be amended in 2007 to support new ways to prevent copyright infringement?
[ "What was attempted to be amended in 2007 to support new ways to prevent copyright infringement?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8033
5726d852708984140094d33b
Copyright_infringement
These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website.
What do certain type of intermediaries NOT do?
What do certain type of intermediaries NOT do?
[ "What do certain type of intermediaries NOT do?" ]
{ "text": [ "host or transmit infringing content" ], "answer_start": [ 37 ] }
gem-squad_v2-train-8034
5726d852708984140094d33c
Copyright_infringement
These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website.
What protocol do intermediaries use that include a torrent tracker?
What protocol do intermediaries use that include a torrent tracker?
[ "What protocol do intermediaries use that include a torrent tracker?" ]
{ "text": [ "BitTorrent" ], "answer_start": [ 372 ] }
gem-squad_v2-train-8035
5726d852708984140094d33d
Copyright_infringement
These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website.
What do Torrent files NOT contain?
What do Torrent files NOT contain?
[ "What do Torrent files NOT contain?" ]
{ "text": [ "copyrighted content" ], "answer_start": [ 545 ] }
gem-squad_v2-train-8036
5726d852708984140094d33e
Copyright_infringement
These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website.
What is a torrent site that uses magnet links to share peer-to-peer?
What is a torrent site that uses magnet links to share peer-to-peer?
[ "What is a torrent site that uses magnet links to share peer-to-peer?" ]
{ "text": [ "The Pirate Bay" ], "answer_start": [ 736 ] }
gem-squad_v2-train-8037
5ad0126977cf76001a6868b8
Copyright_infringement
These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website.
What do certain type of intermediaries do?
What do certain type of intermediaries do?
[ "What do certain type of intermediaries do?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8038
5ad0126977cf76001a6868b9
Copyright_infringement
These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website.
What protocol do intermediaries not use that include a torrent tracker?
What protocol do intermediaries not use that include a torrent tracker?
[ "What protocol do intermediaries not use that include a torrent tracker?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8039
5ad0126977cf76001a6868ba
Copyright_infringement
These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website.
What protocol do intermediaries use that exclude a torrent tracker?
What protocol do intermediaries use that exclude a torrent tracker?
[ "What protocol do intermediaries use that exclude a torrent tracker?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8040
5ad0126977cf76001a6868bb
Copyright_infringement
These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website.
What do Torrent files contain?
What do Torrent files contain?
[ "What do Torrent files contain?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8041
5ad0126977cf76001a6868bc
Copyright_infringement
These types of intermediaries do not host or transmit infringing content, themselves, but may be regarded in some courts as encouraging, enabling or facilitating infringement by users. These intermediaries may include the author, publishers and marketers of peer-to-peer networking software, and the websites that allow users to download such software. In the case of the BitTorrent protocol, intermediaries may include the torrent tracker and any websites or search engines which facilitate access to torrent files. Torrent files don't contain copyrighted content, but they may make reference to files that do, and they may point to trackers which coordinate the sharing of those files. Some torrent indexing and search sites, such as The Pirate Bay, now encourage the use of magnet links, instead of direct links to torrent files, creating another layer of indirection; using such links, torrent files are obtained from other peers, rather than from a particular website.
What is a torrent site that uses magnet links to block peer-to-peer?
What is a torrent site that uses magnet links to block peer-to-peer?
[ "What is a torrent site that uses magnet links to block peer-to-peer?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8042
5726d8a5708984140094d353
Copyright_infringement
Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws.
What is the legal status of secondary liability?
What is the legal status of secondary liability?
[ "What is the legal status of secondary liability?" ]
{ "text": [ "subject of ongoing litigation" ], "answer_start": [ 110 ] }
gem-squad_v2-train-8043
5726d8a5708984140094d354
Copyright_infringement
Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws.
What makes peer-to-peer networks different than other online providers?
What makes peer-to-peer networks different than other online providers?
[ "What makes peer-to-peer networks different than other online providers?" ]
{ "text": [ "decentralised structure" ], "answer_start": [ 145 ] }
gem-squad_v2-train-8044
5726d8a5708984140094d355
Copyright_infringement
Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws.
What was the initial purpose of the BitTorrent protocol?
What was the initial purpose of the BitTorrent protocol?
[ "What was the initial purpose of the BitTorrent protocol?" ]
{ "text": [ "distribute large files effectively" ], "answer_start": [ 381 ] }
gem-squad_v2-train-8045
5726d8a5708984140094d356
Copyright_infringement
Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws.
What are the reasons for more complex network configurations in peer-to-peer software development?
What are the reasons for more complex network configurations in peer-to-peer software development?
[ "What are the reasons for more complex network configurations in peer-to-peer software development?" ]
{ "text": [ "to avoid liability as intermediaries" ], "answer_start": [ 549 ] }
gem-squad_v2-train-8046
5ad012bf77cf76001a6868c8
Copyright_infringement
Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws.
What is the legal status of primary liability?
What is the legal status of primary liability?
[ "What is the legal status of primary liability?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8047
5ad012bf77cf76001a6868c9
Copyright_infringement
Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws.
What makes peer-to-peer networks the same as other online providers?
What makes peer-to-peer networks the same as other online providers?
[ "What makes peer-to-peer networks the same as other online providers?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8048
5ad012bf77cf76001a6868ca
Copyright_infringement
Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws.
What was the final purpose of the BitTorrent protocol?
What was the final purpose of the BitTorrent protocol?
[ "What was the final purpose of the BitTorrent protocol?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8049
5ad012bf77cf76001a6868cb
Copyright_infringement
Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws.
What wasn't the initial purpose of the BitTorrent protocol?
What wasn't the initial purpose of the BitTorrent protocol?
[ "What wasn't the initial purpose of the BitTorrent protocol?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8050
5ad012bf77cf76001a6868cc
Copyright_infringement
Nevertheless, whether and to what degree any of these types of intermediaries have secondary liability is the subject of ongoing litigation. The decentralised structure of peer-to-peer networks, in particular, does not sit easily with existing laws on online intermediaries' liability. The BitTorrent protocol established an entirely decentralised network architecture in order to distribute large files effectively. Recent developments in peer-to-peer technology towards more complex network configurations are said to have been driven by a desire to avoid liability as intermediaries under existing laws.
What are the reasons for more simple network configurations in peer-to-peer software development?
What are the reasons for more simple network configurations in peer-to-peer software development?
[ "What are the reasons for more simple network configurations in peer-to-peer software development?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8051
5726d9005951b619008f7fd9
Copyright_infringement
Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.
What does Article 10 of the Berne Convention call certain uses that limit copyright?
What does Article 10 of the Berne Convention call certain uses that limit copyright?
[ "What does Article 10 of the Berne Convention call certain uses that limit copyright?" ]
{ "text": [ "fair practice" ], "answer_start": [ 210 ] }
gem-squad_v2-train-8052
5726d9005951b619008f7fda
Copyright_infringement
Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.
Where are minimal quotations commonly used?
Where are minimal quotations commonly used?
[ "Where are minimal quotations commonly used?" ]
{ "text": [ "journalism and education" ], "answer_start": [ 282 ] }
gem-squad_v2-train-8053
5726d9005951b619008f7fdb
Copyright_infringement
Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.
What categories do works that would normally be considered infringing fall into?
What categories do works that would normally be considered infringing fall into?
[ "What categories do works that would normally be considered infringing fall into?" ]
{ "text": [ "fair use or fair dealing" ], "answer_start": [ 450 ] }
gem-squad_v2-train-8054
5726d9005951b619008f7fdc
Copyright_infringement
Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.
What do these statutes represent?
What do these statutes represent?
[ "What do these statutes represent?" ]
{ "text": [ "principles underlying many earlier judicial precedents" ], "answer_start": [ 547 ] }
gem-squad_v2-train-8055
5726d9005951b619008f7fdd
Copyright_infringement
Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.
What are these statutes essential to?
What are these statutes essential to?
[ "What are these statutes essential to?" ]
{ "text": [ "freedom of speech" ], "answer_start": [ 635 ] }
gem-squad_v2-train-8056
5ad0137b77cf76001a6868dc
Copyright_infringement
Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.
What does Article 11 of the Berne Convention call certain uses that limit copyright?
What does Article 11 of the Berne Convention call certain uses that limit copyright?
[ "What does Article 11 of the Berne Convention call certain uses that limit copyright?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8057
5ad0137b77cf76001a6868dd
Copyright_infringement
Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.
What does Article 10 of the Berne Convention not call certain uses that limit copyright?
What does Article 10 of the Berne Convention not call certain uses that limit copyright?
[ "What does Article 10 of the Berne Convention not call certain uses that limit copyright?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8058
5ad0137b77cf76001a6868de
Copyright_infringement
Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.
Where are maximum quotations commonly used?
Where are maximum quotations commonly used?
[ "Where are maximum quotations commonly used?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8059
5ad0137b77cf76001a6868df
Copyright_infringement
Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.
What categories do work that wouldn't normally be considered infringing fall into?
What categories do work that wouldn't normally be considered infringing fall into?
[ "What categories do work that wouldn't normally be considered infringing fall into?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8060
5ad0137b77cf76001a6868e0
Copyright_infringement
Article 10 of the Berne Convention mandates that national laws provide for limitations to copyright, so that copyright protection does not extend to certain kinds of uses that fall under what the treaty calls "fair practice," including but not limited to minimal quotations used in journalism and education. The laws implementing these limitations and exceptions for uses that would otherwise be infringing broadly fall into the categories of either fair use or fair dealing. In common law systems, these fair practice statutes typically enshrine principles underlying many earlier judicial precedents, and are considered essential to freedom of speech.
What don't these statutes represent?
What don't these statutes represent?
[ "What don't these statutes represent?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8061
5726d944dd62a815002e927e
Copyright_infringement
Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements.
What is it called when a law disallows copyright owners from denying a license for certain uses?
What is it called when a law disallows copyright owners from denying a license for certain uses?
[ "What is it called when a law disallows copyright owners from denying a license for certain uses?" ]
{ "text": [ "compulsory licensing" ], "answer_start": [ 35 ] }
gem-squad_v2-train-8062
5726d944dd62a815002e927f
Copyright_infringement
Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements.
What are two examples of this licensing?
What are two examples of this licensing?
[ "What are two examples of this licensing?" ]
{ "text": [ "compilations and live performances of music" ], "answer_start": [ 180 ] }
gem-squad_v2-train-8063
5726d944dd62a815002e9280
Copyright_infringement
Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements.
What happens if a royalty is paid to the copyright owner or representative?
What happens if a royalty is paid to the copyright owner or representative?
[ "What happens if a royalty is paid to the copyright owner or representative?" ]
{ "text": [ "no infringement occurs" ], "answer_start": [ 305 ] }
gem-squad_v2-train-8064
5726d944dd62a815002e9281
Copyright_infringement
Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements.
What country has fair dealing laws?
What country has fair dealing laws?
[ "What country has fair dealing laws?" ]
{ "text": [ "Canada" ], "answer_start": [ 514 ] }
gem-squad_v2-train-8065
5ad013e577cf76001a6868f8
Copyright_infringement
Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements.
What is it called when a law allows copyright owners from denying a license for certain uses?
What is it called when a law allows copyright owners from denying a license for certain uses?
[ "What is it called when a law allows copyright owners from denying a license for certain uses?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8066
5ad013e577cf76001a6868f9
Copyright_infringement
Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements.
What is it called when a law disallows copyright owners from accepting a license for certain uses?
What is it called when a law disallows copyright owners from accepting a license for certain uses?
[ "What is it called when a law disallows copyright owners from accepting a license for certain uses?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8067
5ad013e577cf76001a6868fa
Copyright_infringement
Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements.
What aren't two examples of this licensing?
What aren't two examples of this licensing?
[ "What aren't two examples of this licensing?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8068
5ad013e577cf76001a6868fb
Copyright_infringement
Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements.
What happens if a royalty isn't paid to the copyright owner or representative?
What happens if a royalty isn't paid to the copyright owner or representative?
[ "What happens if a royalty isn't paid to the copyright owner or representative?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8069
5ad013e577cf76001a6868fc
Copyright_infringement
Another example is the practice of compulsory licensing, which is where the law forbids copyright owners from denying a license for certain uses of certain kinds of works, such as compilations and live performances of music. Compulsory licensing laws generally say that for certain uses of certain works, no infringement occurs as long as a royalty, at a rate determined by law rather than private negotiation, is paid to the copyright owner or representative copyright collective. Some fair dealing laws, such as Canada's, include similar royalty requirements.
What country has no fair dealing laws?
What country has no fair dealing laws?
[ "What country has no fair dealing laws?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8070
5726d98cdd62a815002e9286
Copyright_infringement
In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators.
Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested?
Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested?
[ "Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested?" ]
{ "text": [ "Europe" ], "answer_start": [ 3 ] }
gem-squad_v2-train-8071
5726d98cdd62a815002e9287
Copyright_infringement
In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators.
Whose copyright were news aggregators infringing on?
Whose copyright were news aggregators infringing on?
[ "Whose copyright were news aggregators infringing on?" ]
{ "text": [ "news generators" ], "answer_start": [ 216 ] }
gem-squad_v2-train-8072
5726d98cdd62a815002e9288
Copyright_infringement
In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators.
When was the second part of the case decided?
When was the second part of the case decided?
[ "When was the second part of the case decided?" ]
{ "text": [ "June 2014" ], "answer_start": [ 472 ] }
gem-squad_v2-train-8073
5726d98cdd62a815002e9289
Copyright_infringement
In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators.
What did the courts rule was NOT infringement?
What did the courts rule was NOT infringement?
[ "What did the courts rule was NOT infringement?" ]
{ "text": [ "temporary web cache of consumers" ], "answer_start": [ 586 ] }
gem-squad_v2-train-8074
5ad0148477cf76001a68690c
Copyright_infringement
In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators.
Where was the Private Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested?
Where was the Private Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested?
[ "Where was the Private Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case contested?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8075
5ad0148477cf76001a68690d
Copyright_infringement
In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators.
Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case not contested?
Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case not contested?
[ "Where was the Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd case not contested?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8076
5ad0148477cf76001a68690e
Copyright_infringement
In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators.
Whose copyright weren't news aggregators infringing on?
Whose copyright weren't news aggregators infringing on?
[ "Whose copyright weren't news aggregators infringing on?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8077
5ad0148477cf76001a68690f
Copyright_infringement
In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators.
When was the second part of the case undecided?
When was the second part of the case undecided?
[ "When was the second part of the case undecided?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8078
5ad0148477cf76001a686910
Copyright_infringement
In Europe, the copyright infringement case Public Relations Consultants Association Ltd v Newspaper Licensing Agency Ltd had two prongs; one concerned whether a news aggregator service infringed the copyright of the news generators; the other concerned whether the temporary web cache created by the web browser of a consumer of the aggregator's service, also infringed the copyright of the news generators. The first prong was decided in favor of the news generators; in June 2014 the second prong was decided by the Court of Justice of the European Union (CJEU), which ruled that the temporary web cache of consumers of the aggregator did not infringe the copyright of the news generators.
What did the courts rule was infringement?
What did the courts rule was infringement?
[ "What did the courts rule was infringement?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8079
5726da0f5951b619008f7ff7
Copyright_infringement
In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes.
If a work must include a degree of originality, what else must it contain to be protected?
If a work must include a degree of originality, what else must it contain to be protected?
[ "If a work must include a degree of originality, what else must it contain to be protected?" ]
{ "text": [ "in a fixed medium" ], "answer_start": [ 110 ] }
gem-squad_v2-train-8080
5726da0f5951b619008f7ff8
Copyright_infringement
In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes.
What is NOT protected?
What is NOT protected?
[ "What is NOT protected?" ]
{ "text": [ "The idea itself" ], "answer_start": [ 182 ] }
gem-squad_v2-train-8081
5726da0f5951b619008f7ff9
Copyright_infringement
In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes.
What makes a copy of an original idea infringing?
What makes a copy of an original idea infringing?
[ "What makes a copy of an original idea infringing?" ]
{ "text": [ "it copies that person's unique, tangible expression of the idea" ], "answer_start": [ 289 ] }
gem-squad_v2-train-8082
5726da0f5951b619008f7ffa
Copyright_infringement
In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes.
What limitation is only embodied in case law, rather than statues?
What limitation is only embodied in case law, rather than statues?
[ "What limitation is only embodied in case law, rather than statues?" ]
{ "text": [ "what qualifies as original" ], "answer_start": [ 402 ] }
gem-squad_v2-train-8083
5ad0152b77cf76001a686928
Copyright_infringement
In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes.
If a work must exclude a degree of originality, what else must it contain to be protected?
If a work must exclude a degree of originality, what else must it contain to be protected?
[ "If a work must exclude a degree of originality, what else must it contain to be protected?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8084
5ad0152b77cf76001a686929
Copyright_infringement
In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes.
If a work must include a degree of originality, what else mustn't it contain to be protected?
If a work must include a degree of originality, what else mustn't it contain to be protected?
[ "If a work must include a degree of originality, what else mustn't it contain to be protected?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8085
5ad0152b77cf76001a68692a
Copyright_infringement
In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes.
What is protected?
What is protected?
[ "What is protected?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8086
5ad0152b77cf76001a68692b
Copyright_infringement
In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes.
What makes a copy of an unoriginal idea infringing?
What makes a copy of an unoriginal idea infringing?
[ "What makes a copy of an unoriginal idea infringing?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8087
5ad0152b77cf76001a68692c
Copyright_infringement
In order to qualify for protection, a work must be an expression with a degree of originality, and it must be in a fixed medium, such as written down on paper or recorded digitally. The idea itself is not protected. That is, a copy of someone else's original idea is not infringing unless it copies that person's unique, tangible expression of the idea. Some of these limitations, especially regarding what qualifies as original, are embodied only in case law (judicial precedent), rather than in statutes.
What limitation is only embodied in case law, and also in statues?
What limitation is only embodied in case law, and also in statues?
[ "What limitation is only embodied in case law, and also in statues?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8088
5726da59dd62a815002e92a2
Copyright_infringement
In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection.
Which country needs a similarity requirement to determine if the work was copied?
Which country needs a similarity requirement to determine if the work was copied?
[ "Which country needs a similarity requirement to determine if the work was copied?" ]
{ "text": [ "U.S." ], "answer_start": [ 7 ] }
gem-squad_v2-train-8089
5726da59dd62a815002e92a3
Copyright_infringement
In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection.
What test might courts require software to pass to determine if it is protected or infringing?
What test might courts require software to pass to determine if it is protected or infringing?
[ "What test might courts require software to pass to determine if it is protected or infringing?" ]
{ "text": [ "Abstraction-Filtration-Comparison test" ], "answer_start": [ 191 ] }
gem-squad_v2-train-8090
5726da59dd62a815002e92a4
Copyright_infringement
In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection.
What has software case law determined about R&D, effort and expense put into creation?
What has software case law determined about R&D, effort and expense put into creation?
[ "What has software case law determined about R&D, effort and expense put into creation?" ]
{ "text": [ "doesn't affect copyright protection" ], "answer_start": [ 485 ] }
gem-squad_v2-train-8091
5ad015bf77cf76001a686944
Copyright_infringement
In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection.
Which country needs a similarity requirement to determine if the work wasn't copied?
Which country needs a similarity requirement to determine if the work wasn't copied?
[ "Which country needs a similarity requirement to determine if the work wasn't copied?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8092
5ad015bf77cf76001a686945
Copyright_infringement
In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection.
Which country doesn't need a similarity requirement to determine if the work was copied?
Which country doesn't need a similarity requirement to determine if the work was copied?
[ "Which country doesn't need a similarity requirement to determine if the work was copied?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8093
5ad015bf77cf76001a686946
Copyright_infringement
In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection.
What test might courts require hardware to pass to determine if it is protected or infringing?
What test might courts require hardware to pass to determine if it is protected or infringing?
[ "What test might courts require hardware to pass to determine if it is protected or infringing?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8094
5ad015bf77cf76001a686947
Copyright_infringement
In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection.
What test might courts require software to pass to determine if it isn't protected or infringing?
What test might courts require software to pass to determine if it isn't protected or infringing?
[ "What test might courts require software to pass to determine if it isn't protected or infringing?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8095
5ad015bf77cf76001a686948
Copyright_infringement
In the U.S., for example, copyright case law contains a substantial similarity requirement to determine whether the work was copied. Likewise, courts may require computer software to pass an Abstraction-Filtration-Comparison test (AFC Test) to determine if it is too abstract to qualify for protection, or too dissimilar to an original work to be considered infringing. Software-related case law has also clarified that the amount of R&D, effort and expense put into a work's creation doesn't affect copyright protection.
What has hardware case law determined about R&D, effort and expense put into creation?
What has hardware case law determined about R&D, effort and expense put into creation?
[ "What has hardware case law determined about R&D, effort and expense put into creation?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-8096
5726daa5dd62a815002e92bc
Copyright_infringement
Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased.
Who takes different steps to prevent infringement?
Who takes different steps to prevent infringement?
[ "Who takes different steps to prevent infringement?" ]
{ "text": [ "Corporations and legislatures" ], "answer_start": [ 0 ] }
gem-squad_v2-train-8097
5726daa5dd62a815002e92bd
Copyright_infringement
Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased.
What is the major focus of these steps?
What is the major focus of these steps?
[ "What is the major focus of these steps?" ]
{ "text": [ "preventing or reducing digital methods of infringement" ], "answer_start": [ 163 ] }
gem-squad_v2-train-8098
5726daa5dd62a815002e92be
Copyright_infringement
Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased.
What kinds of legislation are a strategy for preventing infringement?
What kinds of legislation are a strategy for preventing infringement?
[ "What kinds of legislation are a strategy for preventing infringement?" ]
{ "text": [ "civil & criminal" ], "answer_start": [ 249 ] }
gem-squad_v2-train-8099
5726daa5dd62a815002e92bf
Copyright_infringement
Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased.
What does DRM and anti-circumvention laws do?
What does DRM and anti-circumvention laws do?
[ "What does DRM and anti-circumvention laws do?" ]
{ "text": [ "limit the amount of control consumers have" ], "answer_start": [ 490 ] }