Feeds

Congress mulls 'post-Grokster' legislation

Considering the coup de grâce

  • alert
  • submit to reddit

High performance access to file storage

The Senate Judiciary Committee on Wednesday welcomed testimony from parties seeking the legislative final solution to P2P networks during a Capitol Hill hearing confidently entitled "Protecting Copyright and Innovation in a Post-Grokster World."

The labels are clearly encouraged by the recent Supreme Court decision in MGM vs Grokster, which holds that the makers and distributors of technology used primarily to violate copyrights may be liable for infringement, and would like to see the spirit of that decision enshrined in new laws.

However, since that decision, file sharing networks have begun to capitulate, so additional laws are not needed now, at least until the ruling's implications have a chance to emerge in courtroom dramas across the country. But no doubt the labels are eager to press their advantage, and no doubt they're dissatisfied with the Supreme Court's rather fair interpretation of the law.

Aside from content-industry angels like US Senator Dianne Feinstein (Democrat, California), who fretted openly that P2P is "going to destroy the intellectual property industries," the Committee's mood overall was cautious, with Chairman Arlen Specter (Republican, Pennsylvania) content to wait and see. "At least in the short term, I think we'll carry out the wishes of those who want [Congress] to do nothing," Specter said in conclusion.

Additionally, the Committee heard a lament from US Registrar of Copyrights Marybeth Peters, who decried the outdated methods by which artists are paid royalties, and warned that the process has got to be brought in line with current technological realities. She did not, however, think that Congress should hurry to begin writing new legislation.

At this point, it appears that the Committee might give the courts a chance to make sense of existing law, and perhaps step in later if that yields confusion and inconsistency, or fails to satisfy the industry's lust for total content control in the guise of copyright protection. ®

Related stories

Mashboxx appoints music industry insider as CEO
Good ship P2P burns to the waterline
WinMX and eDonkey: offline, doors closed
Mashboxx in Grokster 'takeover talks'
RIAA calls time on P2Pers

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.