Feeds

Indie music label rejects lock-down CDs

'NO copy protection - respect the music'

  • alert
  • submit to reddit

High performance access to file storage

A European indie music label is taking an unusual approach to the issue of CD copy protection - it is branding all its releases with a sticker proclaiming the absence of any such control measure.

While the major labels and other indie labels are considering the use of copy-protected CDs in order to prevent disc contents being quickly ripped and posted on P2P networks, !K7 has rejected the idea.

"Copy protection kills customer relationships," the label says on its website. "That's why, from now on, !K7 releases will carry a new logo: 'NO copy protection - respect the music."

The company believes it's all a matter of trust. "Only those to whom respect is given show respect themselves," it notes. In other words, treat your customers as potential pirates and they'll soon tell you to f**k off and not buy your product.

Such an outcome certainly appears to have prompted labels who once touted copy-protection technology to drop it. In September, for example, Sony Music Entertainment and fellow Japanese label Avex both announced plans to stop using CD lock-down mechanisms.

!K7's approach is founded upon the principle that P2P downloads don't in fact represent lost sales - they're casual listeners who probably wouldn't buy its CDs in any case.

That's not to say the company is happy with the P2P situation. The logo "makes it clear that you've bought a CD and you can use it however you want. It's also clear, therefore, that good music has a prerogative - it has a right to be treated with respect," it says, pointing to the quid pro quo: if we agree not to lock-down CDs, we expect you not to abuse the move. ®

Related stories

Sony Japan dumps lock-down CDs
Microsoft tells music biz to 'back lock-down CD standard'
Review: Macrovision CDS-300 version 7 beta
Macrovision: iPod support for lock-in CDs in Q4
Macrovision preps '99% effective' CD lock-in tech
BMG to punt cheap, no-frills CDs
Lock-down CD scores No.1 hit
Big guns board Intertrust DRM bandwagon
Most songs on iPods 'stolen' - Microsoft CEO
Intel, MS and co. to tout copy-friendly DRM tech
BMG to punt cheap, no-frills CDs

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.