Feeds

Valenti backs away from P2P hack bill

Not good enough for Hollywood

  • alert
  • submit to reddit

Reducing security risks from open source software

House Hollywood sock puppet Howard Berman (Democrat, California) may have gone too far in licking the boots of his benevolent patrons. Indeed, he's gone and licked the shine clear off Motion Picture Ass. of America President Jack Valenti's boots, as this article from Reuters indicates.

"We're pleased that a bipartisan group of lawmakers ... want to curb the explosion of Internet piracy," the wire service quotes the previously-supportive Valenti as saying. "However, there are aspects of the bill we believe need changing as it moves through the legislative process. We look forward to working with Congress in this regard."

The bee in Valenti's bonnet is most likely the loose language in Berman's bill.

"A copyright owner shall not be liable in any criminal or civil action for disabling, interfering with, blocking, diverting, or otherwise impairing the unauthorized distribution, display, performance, or reproduction of his or her copyrighted work on a publicly accessible peer-to-peer file trading network, if such impairment does not, without authorization, alter, delete, or otherwise impair the integrity of any computer file or data residing on the computer of a file trader."

That can't be good. It means that anyone with a copyright will be allowed to hack the daylights out of anyone, including MPAA Headquarters, so long as they have a 'reasonable suspicion' of infringement and notify the DoJ of their intent at least seven days before commencing the attack.

Somehow, Valenti failed to impress on the over-eager Berman's mind that this legislation is for media giants only.

The second part of the problem is in Berman's extending protections to the victims of such attacks for damages exceeding $50. Again, he's gone over the top in his eagerness to delight his masters. Or, said another way, if anyone attacked can claim $50 or more in harm, the attacker loses his legal protection. Good grief; has Berman gone mad? Everyone and his brother will be able to claim that.

So, while Recording Industry Ass. of America (RIAA) President Hillary Rosen still welcomes the Berman Gift; Hollywood Honcho Valenti is stepping back until his team of Ass. lawyers and lobbyists can draft a proper bill for Berman, and send him to the House floor armed with the right stuff. ®

Related Story

Congress to turn hacks into hackers

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.