Feeds

Woman forces US record industry to drop file-sharing case

Dangerous precedent set

The Power of One Infographic

A group of US record labels agreed to drop a music piracy case in the US after the alleged file-sharer argued that it could not be proved that she downloaded any illegal music. The case may set a precedent that undermines scores of other music piracy cases.

Tammie Marson of Palm Desert, California refused to pay the initial $3,500 demanded by a group of record labels and opted to fight the case in court. Marson and her lawyer Seyamack Kouretchian of Coast Law Group argued that the fact that Marson's computer contained illegal music files downloaded over her internet connection was not proof that she had committed a crime.

The record companies – Virgin, Sony BMG, Arista, Universal and Warner Brothers – agreed to dismiss the case and pay their own legal costs.

"They don't take these cases to trial, they either settle or dismiss," Kouretchian told OUT-LAW. "It was our position that they could not ever prove that Tammie Marson downloaded this music or that Tammie Marson made it available. It was just an absolute impossibility. The best they could ever prove was somebody had used Tammie Marson's internet account to download the music or make it available. That's the best they could ever do."

Marson argued that as a cheerleader teacher she had had hundreds of girls through her house, any one of whom could have used her computer. She also used a wireless internet network, meaning that people outside of her house could have used her internet connection. "She doesn't even know what a shared folder is," said Kouretchian.

If this becomes a popular defence it could seriously hamper a huge number of file-sharing lawsuits taken in the US against individuals. It also looks to be a trend in defence against movie file-sharing law suits.

Software executive Shawn Hogan is using a similar argument in his response to a film industry case against him. He has decided to fight the case rather than pay the $2,500 demanded of him, even though it will cost him far more than that. His case is that he did not commit an offence and that the film industry cannot prove that he did.

"They're completely abusing the system. I would spend well into the millions on this [lawsuit]," he told Wired magazine.

Kouretchian said that Marson chose to take a similarly principled stand. "Copyright is my area of expertise, we weren't going to fold. They tested the waters with us to see if my client was prepared to go the distance," he said. "We weren't going to be fooled by the allegations and the threats."

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Mobile application security vulnerability report

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.