Feeds

EC IP enforcement ‘threatens more SCO-style attacks’

Has 'pulling a SCO' entered the English language?

  • alert
  • submit to reddit

Boost IT visibility and business value

Campaigners issued a call to arms today ahead of a far-reaching directive on intellectual property rights due to go through the European Parliament's Legal Affairs committee next Monday.

The Foundation for a Free Information Infrastructure (FFII) expressed dismay at the progress of the contentious measures, which it has campaigned against for months. It said there were "serious unanswered concerns from across the EU - including the UK House of Lords".

The FFII is incensed at the inordinate haste with which the influential Legal Affairs committee is poised to rubber stamp the revised directive. The final text of the directive was released to the public only on Tuesday.

"It will have been only six days since the final text, drafted in secret without any public analysis of its detailed national implications" comes up for consideration, the FFII said.

'Nuclear weapons' of IP enforcement

Originally intended as a means to clamp down on criminal counterfeiting and piracy, the legislation has been widened in scope to apply to all types of intellectual property cases. The directive will cover everything from routine commercial disputes to the "American-style pursuit of individual teenage internet file sharers," the FFII warned.

The FFII is keenly to highlight the availability of "nuclear weapons" of IP enforcement law that would be introduced through the directive.

These include measures such as Anton Piller orders (secret court authorisations of raids for evidence by the plaintiff's agents); Mareva injunctions (freezing of assets, even before a case has been discussed in Court); new powers to demand the disclosure of very extensive commercial and personal information; and the admissibility of denunciations by anonymous witnesses as court evidence.

"In Europe these kinds of investigatory procedures are more usually associated with criminal proceedings with a much higher standard of proof, and are quite alien to the civil (non-criminal) justice systems of most of the member states," the FFII argues.

House of Lords' concerns

In June an earlier draft of the Directive was examined by a House of Lords scrutiny committee, chaired by Lord Scott of Foscote, the Law Lord who wrote the 1996 "Supergun" Arms to Iraq report. The committee expressed a number of concerns about the directive - such as the compatibility of
the directive with domestic law and the "challenges they may pose for human rights" - and declined to pass the directive.

No public assessment has yet been published on any of these points, the FFII reports.

The FFII is concerned that, without better defined safeguards, the Directive "may lead to a far more aggressive, lawyer-driven legal environment for creative businesses".

"It may provide the means for aggressive litigators holding dubious intellectual property rights to 'pull a SCO' and use the powers of the Directive to seriously harass and potentially to inflict lasting damage on small innovative businesses," it added.

FFII believes the directive should be limited to its original proposed scope, namely "commercially organised recklessly intentional copyright and trademark infringement". The European Parliament should allow at least a month from the publication of the Council draft text (17 Feb 2004) until the final closing date for amendments.

"This Directive is simply too important to get wrong," the FFII added. ®

Related Stories

European Parliament castrates software patent regs
Protesters to march against EU software law
Open source prepares to kiss EU patent ass goodbye

External Links

Proposed safeguards, and why FFII believes they are inadequate
Official text of the directive (PDF)
Legislative timetable, and contact details for relevant UK MEPs
Foundation for Information Policy Research pages on the Directive can be found here and here

Application security programs and practises

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.