Feeds

Cable & Wireless likely to suspend file-sharers' accounts

Plug pull likely for P2Pers

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

The 42 Cable & Wireless customers accused by the music industry of unauthorised file-sharing look likely to have their accounts withdrawn in line with a demand from industry body the British Phonographic Industry (BPI).

The BPI wrote to C&W demanding that the 42 accounts be withdrawn because users were uploading music without permission. They now look likely to get their way.

"Cable & Wireless and its ISP, Bulldog, have an acceptable use policy that covers illegal file-sharing," said a statement from C&W. "This would normally mean that any accounts used for illegal file-sharing are closed. We will take whatever steps are necessary to put the matter right."

A further 17 users of Tiscali's internet service could face the same action, though Tiscali was less certain in its response to the BPI 's demand.

"Tiscali received the letter from the BPI by email at 10.15 this morning and we will be dealing with the request in the normal manner," said a statement. "We do not automatically suspend customer accounts on request, but on occasion do so pending investigation. We are reviewing the information they have provided and will respond appropriately."

This is the first time that the BPI has moved to have internet users' accounts suspended, and is intended to enable the group to take action against a greater number of people at one time than before, the body said.

"We have said for months that it is unacceptable for ISP s to turn a blind eye to industrial-scale copyright infringement," BPI Chairman Peter Jamieson. "We are providing Tiscali and Cable & Wireless with unequivocal evidence of copyright infringement via their services. It is now up to them to put their house in order and pull the plug on these people."

The BPI does not actually know the identities of the alleged file-sharers, but the ISP s do. "Whenever an individual uses a file-sharing network they reveal the unique IP address for the internet account being used at that time," said a BPI statement. "The BPI is able to identify from the IP address which ISP provides the service. But only the ISP knows to which individual the IP address belongs."

"Both Tiscali and Cable & Wireless state in their terms of use for subscribers that internet accounts should not be used for copyright infringement," said BPI general counsel Roz Groome. "We now invite them to enforce their own terms of use."

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Sea-Me-We 5 construction starts
New sub cable to go live 2016
EE coughs to BROKEN data usage metrics BLUNDER that short-changes customers
Carrier apologises for 'inflated' measurements cockup
Comcast: Help, help, FCC. Netflix and pals are EXTORTIONISTS
The others guys are being mean so therefore ... monopoly all good, yeah?
Surprise: if you work from home you need the Internet
Buffer-rage sends Aussies out to experience road rage
EE buys 58 Phones 4u stores for £2.5m after picking over carcass
Operator says it will safeguard 359 jobs, plans lick of paint
MOST iPhone strokers SPURN iOS 8: iOS 7 'un-updatening' in 5...4...
Guess they don't like our battery-draining update?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.