Feeds

Consumer body bemoans harsher Euro IP laws

Copyrights and responsibilities

High performance access to file storage

UK quango the National Consumer Council (NCC) has called on European Commission legislators to take a fairer stance on consumer intellectual property rights.

The NCC believes it's disproportionate to invoke ever-tougher penalties for individuals found guilty of infringing intellectual property laws. The key word is 'individuals', because the NCC sees a clear difference between consumers copying content and "organised criminal gangs" doing the same.

There is a difference - the latter are motivated solely by financial gain while consumers generally aren't. At the same time, because technology has made it so easy for consumer to duplicate content, the effect on copyright holders is increasingly the same whoever does the copying.

"The European Commission must think again before bringing in new and tougher intellectual property laws," said the NCC's policy director Jill Johnstone. "Criminal sanctions for infringing copyright holders' rights must be applied only to organised crime - not to individual citizens making use of new technologies."

"Moves are afoot in Brussels to tighten up enforcement of intellectual property laws," she added. "It could mean consumers facing criminal sanctions and a criminal record for sharing creative content."

Alas, just as the EC is failing to differentiate between pirates and those who copy for convenience - which we think are the people the NCC has in mind: those folk who copy CDs so they can also play songs in the car, say - the NCC similarly fails to appreciate there's a difference between a consumer who engages in what might be termed a 'fair use' and another who posts thousands upon thousands of new songs for anyone and everyone to plunder.

"Any new laws must be very clear on this point and must strike a balance between right holders’ interests in getting a fair return and the public and consumer interests of fair access and use, and the encouragement of innovation," added Johnstone.

Her language puts her dangerously close to the techno-utopian camp, but still Johnstone and the NCC are correct on at least one point: future EC legislation does need to define closely what is reasonable copying - ripping a CD so you can play it on your iPod, an act currently illegal in the UK though not in some other European countries - and making it possible for anyone to steal music. In short, there needs to be a clear distinction made between the private and public domains. ®

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.