Feeds

ISPs ordered to reveal software file-sharers

UK court rules on hunt for uploaders

Choosing a cloud hosting partner with confidence

Some ISPs provide users with a different IP address every time they connect, known as a 'dynamic' IP address (as opposed to a 'static' IP address). Both types of IP address can be traced to an ISP (since even dynamic addresses allocated will be within a certain range), but to ensure that suspects are caught, FAST time-stamped every IP address at the point of identification. Accordingly, ISPs need to match the customer with the IP address at a specific date and time.

Julian Heathcote Hobbins, Senior Legal Counsel at FAST, told OUT-LAW today that the ISPs have been very supportive of FAST's action. "We see the ISP as innocent in all this," he said. But he explained that the ISPs need to receive a court order to allow them to disclose customer details – otherwise they breach the Data Protection Act.

But he acknowledged that some suspects may escape capture if their ISP no longer holds the data that matches a customer to an IP address at a particular time. ISPs hold such data no longer than necessary. In some cases, that will be a year. In other cases, it will be a much shorter period, perhaps 90 days. The investigation captured data over a 12 month period.

This investigative problem should largely disappear: ISPs will be forced to keep such data for a minimum period when a controversial European Directive, approved by MEPs in December, is implemented in UK law. The UK Government will have discretion to implement the Directive with a period of anything from six months up to two years.

Heathcote Hobbins felt there was no alternative to stronger action against software pirates.

"Traditionally most software owners have relied on notice and take-down procedures and have failed to bring civil or criminal proceedings against the infringers," he said. "We expect to be bringing these actions anytime and anywhere we see software being misused."

FAST director general John Lovelock said: "We can easily take down links, but this does not tackle the root causes of software piracy, because the links will reappear elsewhere in a matter of hours. Instead, we plan to take action a lot further, making an example of the perpetrators to stop them from stealing and passing on the intellectual property of our members for good."

FAST says it will consider working with the Police and Crown Prosecution Service once the individuals have been identified.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Choosing a cloud hosting partner with confidence

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.