Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-vfjqv Total loading time: 0 Render date: 2024-04-29T09:01:00.003Z Has data issue: false hasContentIssue false

4 - New actors on a new stage : intermediary liability in the Internet world

Published online by Cambridge University Press:  05 June 2012

Chris Reed
Affiliation:
Queen Mary University of London
Get access

Summary

As we have seen in Chapters 1 and 2, the internet technologies require the participation of intermediaries to make transactions possible. Although intermediaries such as banks or commercial agents play an important part in physical world commerce, there are fundamental differences between physical world and internet intermediaries:

  • Physical world intermediaries are conscious actors in the transaction, whereas internet intermediaries are often unconscious actors.

  • Physical world intermediaries have a prior, legal relationship with one of the primary actors; internet intermediaries more commonly have no pre-existing relationship.

In essence, internet intermediaries play one of two roles in an information transaction. They may provide services to one or more of the parties, including fundamental communications services such as access, information storage, etc. Alternatively, they may provide some additional service which facilitates a transaction between end users, eg identifying one of the parties, providing search facilities, etc. Liability for providing defective services of this kind will be based on established legal principles, although the application of those principles to previously unknown types of service may not be obvious.

More important, though, is the role of intermediaries in relaying information through TCP/IP packet switching. This raises the question of their potential liability for the third party information content of those packets. Although these intermediaries operate via software which processes information automatically and in ignorance of its content or the nature of the transaction, in some cases they are the most easily identified targets for legal action if information content which they carry infringes a third party's rights.

Type
Chapter
Information
Internet Law
Text and Materials
, pp. 89 - 139
Publisher: Cambridge University Press
Print publication year: 2004

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×