Feeds

JK Rowling badmouths eBay

Auction site 'humiliated' and 'harassed'

High performance access to file storage

The row continues between eBay and Harry Potter author J.K. Rowling.

As the world awaits the seventh and final Potter tome, the Indian Express reports that eBay has filed papers with the High Court in New Delhi, claiming that Rowling and her representatives are causing the company "immense humiliation and harassment." The two parties have long been at odds over the sale of pirated Potter e-books on eBay India, the auction site formerly known as Baazee.com.

In the fall of 2004, after spotting auction listings for unauthorized e-books, Rowling’s representatives filed a civil suit against eBay and four book sellers. eBay promptly removed the listings, but three years later, the court has yet to resolve the case.

With its recent court application, eBay claims the Rowling camp has misrepresented the case in continued conversations with the media. In essence, Rowling says that the court issued an injunction against eBay, but eBay says otherwise.

"J K Rowling and her representatives are spreading misinformation about two stay orders," reads the court application. "The distorted manner in which wide publicity is given in the media - print and electronic - has caused immense harassment and humiliation to eBay and also damaged its goodwill and reputation."

Update

On May 31, the High Court in New Delhi issued an order that side-stepped eBay's application. In the 15-page order, Judge A.K. Sikri acknowledged eBay's complaint, but said he would not rule on such matters until the case goes to trial.

"It is not necessary for me to deal with other arguments," he said, referring to eBay's complaint and other side-squabbles between the company and Rowling's representatives. "I refrain from making much comments on the other arguments as the matter will have to be finally gone into after the evidence is led by both the parties."

"He has denied the application by eBay simply by side-stepping it," says Todd Bonder, an IP lawyer with the international law firm Rosenfeld, Meyer, and Susman. Rowling's counsel did not respond to requests for comment.®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.