Feeds

No need to panic over IP rights directive

Crying 'Wolf' damages our intellectual freedom

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

Letter: The IP Rights Enforcement Directive was passed yesterday by the European Parliament.

This framework for national legislation has caused a huge amount of controversy and speculation as to how it will eventually appear in law in each of the member states, and sparked protest by civil liberties and consumer rights groups. But have they overstated their case?

Adrian McMenamin, the Press Officer of the European Parliamentary Labour Party, certainly thinks so:

Dear Sir,

The American quoted in your article clearly doesn't understand how EU legislation works. It is now a matter for member states of the EU to translate the directive - which is a framework for law, not the law itself - into their national laws. If member states want to crack down on file sharers the directive approved by the European Parliament makes no odds - they can do that anyway. But given that the directive does not *require* member states to come down hard on individuals swapping files on a small scale there are no grounds for implying that, if they do, it is because of this directive - it will entirely be a matter for member states and their parliaments.

Those arguing against this directive have used scare tactics throughout and as a result have consistently alienated the vast majority of legislators in the European Parliament. Intellectual freedom is a valuable thing and its cause is being damaged by people who constantly cry wolf.

Britain has had laws very similar to those required by the directive for some years now and I do not see police raiding the homes of file sharers on a regular basis and nor do I see the development of OSS being halted - I should know, I have written several Linux kernel modules. Claims that the DMCA is coming to Europe are ridiculous.

A lot of those who opposed this directive did so because they do not believe in any sort of prohibitive intellectual property protection. It's a legitimate argument (though not one I support) but it has been tarnished by their decision to try to scare the living daylights out of people with talk of a coming "police state".

Yours sincerely,

Adrian McMenamin
Press Officer,
European Parliamentary Labour Party
®

3 Big data security analytics techniques

More from The Register

next story
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.