Feeds

Eminem sues over ringtones

Er, can you hear the difference?

Internet Security Threat Report 2014

Eminem’s publishers on Tuesday filed a complaint against five ringtone firms, alleging that they are using the rap star’s songs as mobile phone ringtones without permission, according to the Associated Press.

Publishing firms Eight Mile Style and Martin Affiliated are seeking an injunction from the US District Court in Detroit against Matrix M LLC, Cellus USA, FanMobile, MyPhoneFiles and Nextones.com, says the Associated Press.

Reports suggest that the publishing companies may also target karaoke firms using Eminem songs without authorisation.

Eminem, born Marshall Mathers, is no stranger to copyright actions. Last year his publishing company hit Apple Computer with a copyright infringement suit over an advert shown on MTV and on the Apple web site, which included a boy singing part of Eminem's hit "Lose Yourself". The rapper had not given his permission.

The case settled amicably in May this year, for an undisclosed sum.

Copyright © 2005, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Intelligent flash storage arrays

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.