Feeds

Google Perfect 10 thumbnails 'breach copyright'

Search engine giant stung by nude pics ruling

Top three mobile application threats

Google has been held liable for infringing the copyright of images purloined by others from adult website Perfect 10. Thumbnail images displayed in Google Image Search breached Perfect 10 copyright, according to a preliminary ruling in a US Federal Court this week.

But US District Court Judge Howard Matz held Google was not responsible if surfers clicked on thumbnails that directed them to full size porno images hosted on third party websites, taken without permission from the official Perfect 10 site. Perfect 10 argued that these hi-res pictures constituted a copyright infringement by Google as well as the third-party sites. Matz rejected this argument and proposed a narrow preliminary injunction that respected Perfect 10's copyrights while upholding Google's broader right to catalogue online images, AP reports.

No trial date has been fixed. Perfect 10 said it was confident it would win on both strands of its case at trial. Google said the preliminary ruling would only effect searches relating to Perfect 10 adding that it would contest any injunction. "While we're disappointed with portions of the ruling, we are pleased with Judge Matz's favourable ruling on linking and other aspects of Google image search," Google spokesman Michael Kwun said.

Perfect 10 is also suing Amazon-run A9, which uses Google technology, over the same issue. The courts are yet to consider the A9 portion of the case. ®

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.