Feeds

Stelios protests at threat of music biz CD burning gag

Easy...

  • alert
  • submit to reddit

High performance access to file storage

EasyInternetCafe - the high street Internet café chain - is to protest outside the High Court in London tomorrow against the threat of a gagging order from the music industry.

The British Phonographic Industry (BPI) is to apply for an injunction against both easyInternetCafe and the easyGroup from publicly discussing the ongoing battle between the two parties.

The row centres on a demand from the music industry for £100,000 in lost revenues after it claimed easyInternetCafe allowed people to burn music onto CDs.

When the BPI first launched its complaint it had demanded an eye-watering £1m.

Originally the BPI warned easyInternetCafe that it would get "bad PR" (shurely 'far more customers?' - Ed) if it became public knowledge that easyInternetCafe customers had been downloading music files protected by copyright onto CDs in its stores.

But easyInternetCafe claims it's got nothing to hide, and even opened its doors for the BPI to check its computer records. It also maintains it stopped allowing people to burn CDs a year ago.

Said the company in a statement: "Now the BPI have done an about-turn and are attempting to gag easyInternetCafe from discussing anything further, presumably because they are embarrassed that it has become public knowledge they have tried to extort as much as £1 million from easyInternetCafe"

So, tomorrow easyGroup boss, Stelios, and a bunch of loyal workers will dress up in orange boiler suits and take part in a public protest outside the High Court.

They will carry banners that will defend their right to free speech by declaring: "We will not be gagged".

They will also run with placards calling for the "music industry cartel" to stop "milking the consumer with their over-priced products". Oh, and they'll also call for the legalisation of music downloads.

Sounds like it could be a real hoot. ®

Related Story

EasyEverything fights music biz over download demands

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.