{"id":59973,"date":"2023-11-22T10:22:30","date_gmt":"2023-11-22T01:22:30","guid":{"rendered":"https:\/\/monolith.law\/en\/?p=59973"},"modified":"2024-03-08T14:31:45","modified_gmt":"2024-03-08T05:31:45","slug":"difficulty-in-identifying-criminals-on-twitter","status":"publish","type":"post","link":"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter","title":{"rendered":"Is it Impossible to Identify the Culprit of Copyright Infringement on Twitter and Instagram?"},"content":{"rendered":"\n<p>It is generally understood that if you post illegal content on the internet, you could be identified and potentially face claims for damages. However,<\/p>\n\n\n\n<ul>\n<li>In cases of posts on Twitter, Facebook, Instagram, etc.,<\/li>\n\n\n\n<li> that infringe on intellectual property rights such as copyright and trademark rights,<\/li>\n<\/ul>\n\n\n\n<p>it may be impossible to identify the person responsible. From the perpetrator&#8217;s perspective, this means,<\/p>\n\n\n\n<p class=\"has-very-light-gray-background-color has-background\">If you post such content on the aforementioned sites, there is no chance of being identified, no matter how many times you do it. At most, your post will be deleted or your account will be banned. So, you can just keep posting such content with a throwaway account.<\/p>\n\n\n\n<p>This is a problem that is still unclear in terms of how it will be handled in the future. Of course, we are not encouraging such illegal posts, but we will explain what the problem is and why there is such a possibility.<\/p>\n\n\n\n<p>To give an overview, the situation is roughly as follows:<\/p>\n\n\n\n<ol>\n<li>The Provider Liability Limitation Act, which allows for the identification of posters, can be interpreted to mean that you cannot request the disclosure of a person&#8217;s name and address unless you know the IP address at the time of posting.<\/li>\n\n\n\n<li>Twitter, Facebook, and Instagram do not record the &#8220;IP address at the time of posting&#8221; due to their system design, and only retain the &#8220;IP address at the time of login&#8221;.<\/li>\n\n\n\n<li>As for whether you can request the disclosure of a person&#8217;s name and address based on the &#8220;IP address at the time of login&#8221;, courts dealing with intellectual property matters tend to take the stance that &#8220;legally, this is not permissible&#8221;.<\/li>\n<\/ol>\n\n\n\n<p>We will discuss each of these points in turn below.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_53 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#The_Issue_of_%E2%80%9CIP_Address_at_Login%E2%80%9D\" title=\"The Issue of &#8220;IP Address at Login&#8221;\">The Issue of &#8220;IP Address at Login&#8221;<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#What_is_the_Flow_of_Requesting_Disclosure_of_Sender_Information\" title=\"What is the Flow of Requesting Disclosure of Sender Information?\">What is the Flow of Requesting Disclosure of Sender Information?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#The_Meaning_and_Content_of_the_Legal_Provision_%E2%80%9CRelated_to_the_Infringement%E2%80%9D\" title=\"The Meaning and Content of the Legal Provision &#8220;Related to the Infringement&#8221;\">The Meaning and Content of the Legal Provision &#8220;Related to the Infringement&#8221;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#Flow_of_Identifying_the_Poster_in_the_Case_of_Twitter_etc\" title=\"Flow of Identifying the Poster in the Case of Twitter, etc.\">Flow of Identifying the Poster in the Case of Twitter, etc.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#%E2%80%9CPerson_who_logged_in%E2%80%9D_%E2%89%92_%E2%80%9CPerson_who_posted%E2%80%9D\" title=\"&#8220;Person who logged in&#8221; \u2252 &#8220;Person who posted&#8221;\">&#8220;Person who logged in&#8221; \u2252 &#8220;Person who posted&#8221;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#Whether_or_not_a_court_will_allow_the_disclosure_of_names_and_addresses_varies\" title=\"Whether or not a court will allow the disclosure of names and addresses varies\">Whether or not a court will allow the disclosure of names and addresses varies<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#Each_court_makes_its_own_independent_judgment\" title=\"Each court makes its own independent judgment\">Each court makes its own independent judgment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#Handling_of_general_cases_and_intellectual_property-related_cases\" title=\"Handling of general cases and intellectual property-related cases\">Handling of general cases and intellectual property-related cases<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#Tokyo_High_Court_Affirms_Disclosure_of_Names_and_Addresses\" title=\"Tokyo High Court Affirms Disclosure of Names and Addresses\">Tokyo High Court Affirms Disclosure of Names and Addresses<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#The_%E2%80%9CImpersonation%E2%80%9D_Case_of_2017_Heisei_29\" title=\"The &#8220;Impersonation&#8221; Case of 2017 (Heisei 29)\">The &#8220;Impersonation&#8221; Case of 2017 (Heisei 29)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#On_the_Possibility_of_a_Discrepancy_Between_the_Person_Who_Logged_In_and_the_Poster\" title=\"On the Possibility of a Discrepancy Between the Person Who Logged In and the Poster\">On the Possibility of a Discrepancy Between the Person Who Logged In and the Poster<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#The_Intellectual_Property_High_Court_Denied_the_Disclosure_of_Names_and_Addresses\" title=\"The Intellectual Property High Court Denied the Disclosure of Names and Addresses\">The Intellectual Property High Court Denied the Disclosure of Names and Addresses<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#The_Case_of_Unauthorized_Photo_Posting_in_2016_Heisei_28\" title=\"The Case of Unauthorized Photo Posting in 2016 (Heisei 28)\">The Case of Unauthorized Photo Posting in 2016 (Heisei 28)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#Is_the_Conclusion_of_%E2%80%9CUnable_to_Disclose_Names_and_Addresses%E2%80%9D_Unfair\" title=\"Is the Conclusion of &#8220;Unable to Disclose Names and Addresses&#8221; Unfair?\">Is the Conclusion of &#8220;Unable to Disclose Names and Addresses&#8221; Unfair?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#There_is_no_Supreme_Court_decision_and_recent_cases_have_divided_opinions\" title=\"There is no Supreme Court decision, and recent cases have divided opinions\">There is no Supreme Court decision, and recent cases have divided opinions<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#The_case_in_Osaka_in_Heisei_30_2018_recognizes_disclosure\" title=\"The case in Osaka in Heisei 30 (2018) recognizes disclosure\">The case in Osaka in Heisei 30 (2018) recognizes disclosure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#The_Tokyo_District_Court_Intellectual_Property_Division_in_Reiwa_2_2020_does_not_recognize_disclosure\" title=\"The Tokyo District Court Intellectual Property Division in Reiwa 2 (2020) does not recognize disclosure\">The Tokyo District Court Intellectual Property Division in Reiwa 2 (2020) does not recognize disclosure<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#Summary\" title=\"Summary\">Summary<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#The_state_of_being_unidentifiable_is_clearly_unfair\" title=\"The state of being unidentifiable is clearly unfair\">The state of being unidentifiable is clearly unfair<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#Possibility_of_criminal_proceedings\" title=\"Possibility of criminal proceedings\">Possibility of criminal proceedings<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/monolith.law\/en\/internet\/difficulty-in-identifying-criminals-on-twitter\/#Possibility_of_legal_amendment\" title=\"Possibility of legal amendment\">Possibility of legal amendment<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Issue_of_%E2%80%9CIP_Address_at_Login%E2%80%9D\"><\/span>The Issue of &#8220;IP Address at Login&#8221;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2020\/03\/shutterstock_1080775979-1-1024x683.jpg\" alt=\"\" class=\"wp-image-7832\" \/><figcaption class=\"wp-element-caption\">The legal provisions and the process of identifying the poster become problematic.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_the_Flow_of_Requesting_Disclosure_of_Sender_Information\"><\/span>What is the Flow of Requesting Disclosure of Sender Information?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Firstly, the process of identifying the origin of so-called illegal posts, or in legal terms, the request for disclosure of sender information, follows the flow below:<\/p>\n\n\n\n<ol>\n<li>Request the site administrator, where the offender made the post, to disclose the &#8220;IP address at the time of the illegal post&#8221;.<\/li>\n\n\n\n<li>Receive disclosure of the &#8220;IP address at the time of the illegal post&#8221;. If the IP address is known, the provider can be identified.<\/li>\n\n\n\n<li>Request the relevant provider to disclose the &#8220;address and name of the subscriber who was assigned the IP address at the date and time of the illegal post&#8221;.<\/li>\n\n\n\n<li>Receive disclosure of the address and name from the provider.<\/li>\n<\/ol>\n\n\n\n<p>Both of these are permitted based on the following provisions under the Japanese Provider Liability Limitation Law:<\/p>\n\n\n\n<p class=\"has-very-light-gray-background-color has-background\">Those who hold logs related to illegal posts that infringe rights (logs &#8220;related to the infringement&#8221;) must disclose information about the poster that can be understood from the logs. (*)<\/p>\n\n\n\n<p>For the actual text and other details, please refer to another article that explains in detail about the request for disclosure of sender information.<\/p>\n\n\n\n<p><a href=\"https:\/\/monolith.law\/reputation\/provider-liability-limitation-law\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/monolith.law\/reputation\/provider-liability-limitation-law[ja]<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Meaning_and_Content_of_the_Legal_Provision_%E2%80%9CRelated_to_the_Infringement%E2%80%9D\"><\/span>The Meaning and Content of the Legal Provision &#8220;Related to the Infringement&#8221;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Now, the issue here is the phrase &#8220;related to the infringement&#8221; mentioned above. Typically, this refers to the communication at the time of the post, for example, when an illegal post was made on 5chan. It follows the flow mentioned above. However, sites like Twitter, Facebook, and Instagram do not systemically record the &#8220;IP address at the time of the post&#8221;. What is recorded on these sites is only the IP address at the time of login. In other words, if an illegal post is made on Twitter, for example, the user:<\/p>\n\n\n\n<ol>\n<li>First logs in from a certain IP address<\/li>\n\n\n\n<li> Maintains the login status and makes an illegal tweet<\/li>\n<\/ol>\n\n\n\n<p>Although the IP address log at the time of login related to the above 1 is recorded, the IP address at the time of the tweet (post) in 2 is not recorded. This is the same for Facebook, Instagram, and others.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Flow_of_Identifying_the_Poster_in_the_Case_of_Twitter_etc\"><\/span>Flow of Identifying the Poster in the Case of Twitter, etc.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Therefore, when identifying the poster for illegal posts on Twitter and others, the flow is as follows:<\/p>\n\n\n\n<ol>\n<li>Request the site administrator (Twitter Inc.) where the offender made the post to disclose the &#8220;IP address at the time of the illegal post&#8221; &amp; &#8220;IP address at the time of login of the account&#8221;.<\/li>\n\n\n\n<li> Since the &#8220;IP address at the time of the illegal post&#8221; is not saved in the log in the first place, Twitter Inc. discloses only the &#8220;<u>IP address at the time of login of the account<\/u>&#8220;. If the IP address is known, the provider can be identified.<\/li>\n\n\n\n<li> Request the relevant provider to disclose the &#8220;address and name of the subscriber who was assigned the IP address at the date and time of login before and after the illegal post&#8221;.<\/li>\n<\/ol>\n\n\n\n<p>The issue is whether the above 3 is permitted. Part 1 is a common story, so if it is a law firm with know-how, it is possible in the same way as usual reputation damage related lawsuits, and our firm has a track record like the following:<\/p>\n\n\n\n<p><a href=\"https:\/\/monolith.law\/reputation\/instagram-spoofing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/monolith.law\/reputation\/instagram-spoofing[ja]<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"%E2%80%9CPerson_who_logged_in%E2%80%9D_%E2%89%92_%E2%80%9CPerson_who_posted%E2%80%9D\"><\/span>&#8220;Person who logged in&#8221; \u2252 &#8220;Person who posted&#8221;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2020\/03\/shutterstock_1382210507-1024x683.jpg\" alt=\"\" class=\"wp-image-7833\" \/><figcaption class=\"wp-element-caption\">The issue is whether the poster can be identified based on the IP address at the time of login.<\/figcaption><\/figure>\n\n\n\n<p>Common sense would suggest that the:<\/p>\n\n\n\n<ul>\n<li>Subscriber who was assigned the IP address at the date and time of login<\/li>\n\n\n\n<li>Subscriber of the line at the time of the illegal tweet<\/li>\n<\/ul>\n\n\n\n<p>are very likely to match. Services like Twitter require login to post, and normally, there is only one user using a certain account. However, the legal provision has a description like the above (*), and the issue is whether the log at the time of login, which is the problem, can be said to be a log &#8220;related to the infringement&#8221;.<\/p>\n\n\n\n<p>And in fact, Twitter, Facebook, Instagram, as mentioned above, do not record the IP address log at the time of posting in the first place, so if it is said that &#8220;the log at the time of login cannot be said to be a log related to the infringement&#8221;, the disclosure of the address and name in the above 3 becomes impossible, and no matter what kind of illegal post is made, it becomes impossible to identify the offender.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Whether_or_not_a_court_will_allow_the_disclosure_of_names_and_addresses_varies\"><\/span>Whether or not a court will allow the disclosure of names and addresses varies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Each_court_makes_its_own_independent_judgment\"><\/span>Each court makes its own independent judgment<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>To state the conclusion at this point, regarding this issue, the Tokyo High Court and the Intellectual Property High Court (Japanese Intellectual Property High Court) have shown different (interpretable) judgments.<\/p>\n\n\n\n<p>Generally speaking, in court, for example, there may be a situation where the Tokyo District Court and the Osaka District Court show different judgments on a certain issue. Since each judge independently examines a certain issue, it is possible for judgments to diverge. In such cases, as the case progresses to the second and third trials, the Supreme Court (Japanese Supreme Court) will eventually state its opinion, which becomes a &#8220;precedent&#8221;.<\/p>\n\n\n\n<p>Courts generally follow the judgments of the courts directly above them. Therefore, for example, the Tokyo District Court follows the judgment of the Tokyo High Court, and all courts other than the Supreme Court follow the judgment of the Supreme Court, so the judgment of the Supreme Court effectively becomes a rule, a &#8220;precedent&#8221;, that all subsequent courts follow.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Handling_of_general_cases_and_intellectual_property-related_cases\"><\/span>Handling of general cases and intellectual property-related cases<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2020\/03\/shutterstock_243122509-1024x683.jpg\" alt=\"\" class=\"wp-image-7834\" \/><figcaption class=\"wp-element-caption\">Intellectual property-related cases are handled by specialized departments and high courts.<\/figcaption><\/figure>\n\n\n\n<p>To make matters more complicated, the courts in Tokyo, broadly speaking, have two major systems:<\/p>\n\n\n\n<ul>\n<li>For general cases: Tokyo District Court (department handling general cases) \u2192 Tokyo High Court \u2192 Supreme Court<\/li>\n\n\n\n<li> For intellectual property rights cases: Intellectual Property Department of the Tokyo District Court \u2192 Intellectual Property High Court \u2192 Supreme Court<\/li>\n<\/ul>\n\n\n\n<p>General cases and intellectual property rights cases are handled by different high courts even up to the second trial. As a result of this,<\/p>\n\n\n\n<p class=\"has-very-light-gray-background-color has-background\">Even within the same Tokyo courts, there are cases where the Tokyo High Court and the Intellectual Property High Court diverge in their judgments, and in such cases, even at the first trial, the department handling general cases and the Intellectual Property Department may also diverge in their judgments<\/p>\n\n\n\n<p>This phenomenon can occur.<\/p>\n\n\n\n<p>&#8230;The story is complicated, so the introduction inevitably became long, but regarding the issue of &#8220;IP address at login&#8221;, the Tokyo High Court and the Intellectual Property High Court have each made the following judgments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Tokyo_High_Court_Affirms_Disclosure_of_Names_and_Addresses\"><\/span>Tokyo High Court Affirms Disclosure of Names and Addresses<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_%E2%80%9CImpersonation%E2%80%9D_Case_of_2017_Heisei_29\"><\/span>The &#8220;Impersonation&#8221; Case of 2017 (Heisei 29)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The Tokyo High Court made the following judgment in a case involving so-called &#8220;impersonation&#8221; on Twitter, a case of infringement of the right to a name and the right to one&#8217;s likeness.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>\u2460 The mechanism of Twitter involves logging into a set account (sending login information) and posting while logged in (sending infringement information) (the entire gist of the argument), and the sending of login information is essential for the sending of infringement information. \u2461 Article 4, Paragraph 1 of the Japanese law does not specify &#8220;information on the sender of the infringement information,&#8221; but rather broadly stipulates &#8220;information on the sender related to the infringement of rights.&#8221; Therefore, not only the sender information that can be understood from the infringement information itself, but also the sender information that can be understood about the infringement information, can be disclosed. In light of this, even if the sender information is understood when the login information is sent, it can be considered as &#8220;information on the sender related to the infringement of rights&#8221; specified in Article 4, Paragraph 1 of the law.<br><\/p>\n<cite>Tokyo High Court, 2017 (Heisei 29) (Ne) No. 5572<\/cite><\/blockquote>\n\n\n\n<p>It&#8217;s a bit complicated, but essentially,<\/p>\n\n\n\n<ul>\n<li>Due to the mechanism of Twitter, you cannot post without logging in<\/li>\n\n\n\n<li> The wording of the law does not necessarily limit it to &#8220;at the time of posting,&#8221; and &#8220;related to the infringement&#8221; is a somewhat broad provision<\/li>\n<\/ul>\n\n\n\n<p>Therefore, even in cases where only the IP address at the time of login is disclosed, the provider should disclose the name and address, according to the judgment.<\/p>\n\n\n\n<p>For a detailed explanation of why so-called &#8220;impersonation&#8221; can be considered illegal, please refer to the following article.<\/p>\n\n\n\n<p><a href=\"https:\/\/monolith.law\/reputation\/spoofing-dentityright\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/monolith.law\/reputation\/spoofing-dentityright[ja]<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"On_the_Possibility_of_a_Discrepancy_Between_the_Person_Who_Logged_In_and_the_Poster\"><\/span>On the Possibility of a Discrepancy Between the Person Who Logged In and the Poster<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Of course, in abstract terms, there is a possibility that the person who logged in and the person who posted may not be the same. Regarding this issue, the same judgment states,<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>The IP address, etc., held by the defendant is only a part of the IP address and timestamp when the account in question was logged in, and it is recognized that there are a considerable number of IP addresses and timestamps when the account in question was logged in, other than the IP address in question.<br> However, generally, it is not uncommon for the same person to continue logging into the same account for more than a year while being assigned IP addresses from multiple providers. And, as mentioned above, the mechanism of Twitter involves logging into a set account (sending login information) and posting while logged in (sending infringement information). Therefore, regardless of the temporal order, it can be recognized that the <u>probability is high that the person who logged in and the person who posted are the same<\/u>. On the other hand, there are no circumstances that would hinder the above-mentioned identity, such as the account in question being used by a corporation for business purposes, the account user being changed, etc., while the profile of the appellant himself, who was impersonated, etc., continued to be displayed on the top page, and the tweets were used as private.<br><\/p>\n<cite>Tokyo High Court, 2017 (Heisei 29) (Ne) No. 5572<\/cite><\/blockquote>\n\n\n\n<p>To summarize,<\/p>\n\n\n\n<ul>\n<li>Even if the account in question is logged in from various providers&#8217; IP addresses, it is not uncommon for the same person to use multiple lines (e.g., home line, company line, smartphone line, hotel line at a travel destination, etc.)<\/li>\n\n\n\n<li> There doesn&#8217;t seem to be any reason to think that the account is used for business by a corporation, or that the account user has changed, etc.<\/li>\n<\/ul>\n\n\n\n<p>Therefore, the judgment is that disclosure should not be denied based on the above abstract possibilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Intellectual_Property_High_Court_Denied_the_Disclosure_of_Names_and_Addresses\"><\/span>The Intellectual Property High Court Denied the Disclosure of Names and Addresses<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2020\/03\/shutterstock_1049504825-1024x647.jpg\" alt=\"\" class=\"wp-image-7835\" \/><figcaption class=\"wp-element-caption\">The Intellectual Property High Court has also made a judgment on a similar case.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Case_of_Unauthorized_Photo_Posting_in_2016_Heisei_28\"><\/span>The Case of Unauthorized Photo Posting in 2016 (Heisei 28)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In response to this, the Intellectual Property High Court made the following judgment in a case of unauthorized photo posting (copyright infringement) on Instagram:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Article 4, Paragraph 1 of the Provider Liability Limitation Act (abbreviated) stipulates that the &#8220;IP address related to the infringement information&#8221; in Ordinance No. 4 does not include those unrelated to the transmission of the infringement information, and the timestamp unrelated to the transmission of the infringement information does not fall under &#8220;the date and time when the infringement information was sent&#8221; in No. 7. It is appropriate to interpret it this way.<br><\/p>\n<cite> Intellectual Property High Court 2016 (Heisei 28) (Ne) 10101 <\/cite><\/blockquote>\n\n\n\n<p>In simple terms, &#8220;related to the infringement&#8221; means &#8220;at the time of the illegal post&#8221; if you read the text straightforwardly, and it is judged that it is not possible to allow the disclosure of names and addresses based on the IP address at the time of login.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Is_the_Conclusion_of_%E2%80%9CUnable_to_Disclose_Names_and_Addresses%E2%80%9D_Unfair\"><\/span>Is the Conclusion of &#8220;Unable to Disclose Names and Addresses&#8221; Unfair?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>However, in reality, if judged in this way, it would be concluded that it is impossible to disclose names and addresses in services that do not save the IP address log at the time of posting, namely Twitter, Facebook, and Instagram. The plaintiff made such an argument in this case, but the Intellectual Property High Court stated the following about this issue:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>The (law) is a provision established to balance the rights and interests of the sender, such as privacy, freedom of expression, and secrecy of communication, with the interests of the victim, such as injunction and damage compensation. The Provider Liability Limitation Act recognizes the right to request the disclosure of sender information within its scope. And, (abbreviated) the latest login IP address and its timestamp are not included in the rights to request disclosure under the Provider Liability Limitation Act and the Ordinance. Even considering the provisions of the Constitution and their purposes as claimed by the appellant, it is not possible to interpret that the appellant has the right to request the disclosure of sender information not stipulated by law. Therefore, the appellant&#8217;s claim remains a legislative argument and is inappropriate.<br><\/p>\n<cite> Intellectual Property High Court 2016 (Heisei 28) (Ne) 10101 <\/cite><\/blockquote>\n\n\n\n<p>To summarize simply,<\/p>\n\n\n\n<ul>\n<li>Those who post on Twitter, Facebook, Instagram, etc. have rights and interests such as privacy, freedom of expression, and secrecy of communication<\/li>\n\n\n\n<li> Victims who have been infringed upon by such posts also have interests in damage recovery such as requesting deletion and damage compensation<\/li>\n<\/ul>\n\n\n\n<p>Therefore, the right to request the disclosure of sender information under the Provider Liability Limitation Act was established to balance these, and regardless of the discussion of whether to change the law, it is not possible to interpret that disclosure should be allowed even by distorting the wording of the law.<\/p>\n\n\n\n<p>Although it may be difficult to understand, even if the disclosure of names and addresses is not allowed, it is natural that copyright infringement is illegal. Therefore, it is possible to request deletion.<\/p>\n\n\n\n<p><a href=\"https:\/\/monolith.law\/reputation\/copyright-infringement-on-instagram\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/monolith.law\/reputation\/copyright-infringement-on-instagram[ja]<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"There_is_no_Supreme_Court_decision_and_recent_cases_have_divided_opinions\"><\/span>There is no Supreme Court decision, and recent cases have divided opinions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Regarding this issue, the Supreme Court has not yet made a decision. As mentioned above, the Tokyo High Court and the Intellectual Property High Court have made different (interpretable) decisions in the relatively recent years of Heisei 28 and 29 (2016 and 2017), resulting in divided opinions in the first instance since Heisei 30 (2018).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2020\/03\/shutterstock_566238094-1024x683.jpg\" alt=\"\" class=\"wp-image-7836\" \/><figcaption class=\"wp-element-caption\">We will introduce recent case examples.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_case_in_Osaka_in_Heisei_30_2018_recognizes_disclosure\"><\/span>The case in Osaka in Heisei 30 (2018) recognizes disclosure<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>Generally, when companies and various organizations own Twitter accounts and post articles about their activities, it is easy to assume that multiple members of the organization or group will post from the same account, or that multiple people will log into the same account at the same time. However, it is difficult to recognize that the account in question is owned or used by any group or organization (from the account name or username). Also, considering the continuity of the content of the posts in question, it is hard to think that multiple people made these posts separately. There are no specific circumstances that suggest that multiple people were using the account in question to post together, or that multiple people were logging into the account at the same time.<br><\/p>\n<cite> Osaka District Court Heisei 30 (2018) (Wa) No. 1917 <\/cite><\/blockquote>\n\n\n\n<p>The Osaka District Court made the decision that &#8220;if it is an account that appears to be used by the same person, the disclosure of the name and address should be allowed even with the IP address at login.&#8221;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Tokyo_District_Court_Intellectual_Property_Division_in_Reiwa_2_2020_does_not_recognize_disclosure\"><\/span>The Tokyo District Court Intellectual Property Division in Reiwa 2 (2020) does not recognize disclosure<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>The wording of the (law) is clearly aimed at the information of the infringer himself from its text and logic (omitted), and if the personal information such as the address and name related to the IP address of someone other than the person who made each post is disclosed, it would result in unjustly infringing on the secrecy of their communication and privacy. Considering this, it is difficult to immediately derive the above interpretation from the necessity to secure the possibility of the victim&#8217;s legitimate exercise of rights beyond the text and logic of the provision.<br><\/p>\n<cite> Tokyo District Court Reiwa 1 (2019) (Wa) No. 14446 <\/cite><\/blockquote>\n\n\n\n<p>The Intellectual Property Division of the Tokyo District Court, in a case of unauthorized posting of photos on Instagram (copyright infringement), did not make a judgment on whether it is an account that appears to be used by the same person, but prioritized the wording of the legal text.<\/p>\n\n\n\n<p>At least in the courts of Tokyo,<\/p>\n\n\n\n<ul>\n<li>The general civil divisions other than the Intellectual Property Division do not necessarily adhere to the wording of the law, and they make judgments while considering the possibility of allowing the disclosure of the name and address even with the IP address at login<\/li>\n\n\n\n<li> The Intellectual Property Division prioritizes the wording of the law and considers not allowing the disclosure of the name and address in the case of the IP address at login<\/li>\n<\/ul>\n\n\n\n<p>It can be said that there is such a tendency.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_state_of_being_unidentifiable_is_clearly_unfair\"><\/span>The state of being unidentifiable is clearly unfair<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If this judgment continues, it can be said that there is a high possibility that services such as Twitter, Facebook, and Instagram, which do not hold logs of IP addresses at the time of posting and only save logs of IP addresses at the time of login, will not be able to receive disclosure of names and addresses in the Intellectual Property Division of the Tokyo District Court and the Intellectual Property High Court. Furthermore, the Supreme Court has not accepted any appeals on this issue, so it is unclear when we can seek the Supreme Court&#8217;s judgment.<\/p>\n\n\n\n<p>It is clearly unfair to conclude that no matter how much copyright (or intellectual property rights) is infringed on Twitter, Facebook, and Instagram, the poster cannot be identified. This article does not intend to encourage copyright infringement on these sites, but as a law firm that handles many such cases, we must admit that there is currently no clear answer to how to identify the perpetrator of copyright (etc.) infringement on Twitter, Facebook, and Instagram.<\/p>\n\n\n\n<p>Abstractly, there are the following possibilities:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Possibility_of_criminal_proceedings\"><\/span>Possibility of criminal proceedings<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If you can receive disclosure of the login IP address, the provider is known, so it seems possible to sue for copyright infringement and have the police investigate the provider. The above-mentioned Japanese Provider Liability Limitation Act is intended to receive disclosure of names and addresses from providers by civil means, and the police can request log disclosure from providers with their investigative authority.<\/p>\n\n\n\n<p>However, there are concerns about:<\/p>\n\n\n\n<ul>\n<li>How seriously the Japanese police will investigate in cases of copyright infringement, etc.<\/li>\n\n\n\n<li>Since it has been judged at the civil level that &#8220;it cannot be said that the person who logged in and the poster are the same&#8221;, there is a possibility that the same judgment will be made in criminal trials (as a result, the police may tend to avoid handling and investigating cases).<\/li>\n<\/ul>\n\n\n\n<p>These concerns exist.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Possibility_of_legal_amendment\"><\/span>Possibility of legal amendment<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The current Japanese Provider Liability Limitation Act is:<\/p>\n\n\n\n<ul>\n<li>First of all, in principle, victims do not have the right to request disclosure of offender information under the Constitution or the Civil Code.<\/li>\n\n\n\n<li>The Provider Liability Limitation Act is an exception to the above principle, and exceptionally allows disclosure in &#8220;certain cases&#8221;.<\/li>\n<\/ul>\n\n\n\n<p>This law was created with the structure that the &#8220;certain case&#8221; is too narrow, which is the essence of the problem. Although legal amendment is the most fundamental solution, it is not easy in practice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is generally understood that if you post illegal content on the internet, you could be identified and potentially face claims for damages. However, it may be impossible to identify the person respo [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":61420,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[39,21],"acf":[],"_links":{"self":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/posts\/59973"}],"collection":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/comments?post=59973"}],"version-history":[{"count":1,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/posts\/59973\/revisions"}],"predecessor-version":[{"id":61421,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/posts\/59973\/revisions\/61421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/media\/61420"}],"wp:attachment":[{"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/media?parent=59973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/categories?post=59973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/monolith.law\/en\/wp-json\/wp\/v2\/tags?post=59973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}