Feeds

ISPs face down Tories on file sharing

Cameron plan for internet police state rejected

High performance access to file storage

ISPs have given David Cameron's call for them to block P2P music sharing short shrift, repeating their stance that they are not "the gatekeepers of the internet", as he insists.

ISPA, the industry trade association, told The Register it would be writing to the Conservative leader to explain its position.

In a speech to record industry bigwigs this week, Cameron said internet providers should be responsible for clamping down on piracy, comparing the problem to paedophilia and hate mongering.

He said: "ISPs can block access and indeed close down offending file-sharing sites.

"They have already established the Internet Watch Foundation to monitor child abuse and incitement to racial hatred on the internet. They should be doing the same when it comes to digital piracy."

A spokesman for ISPA said: "The Internet Watch Foundation is very focused in what it does and has taken a long time to get there working with the police. Unlike distributing images of child abuse, copyright infringement can be a civil offence.

"Any kind of blocking has to be the preserve of the courts."

The internet industry has consistently resisted years of attempts to turn it into a policeman for rights owners. The European E-commerce Directive recognises ISPs as "mere conduits" who are only liable if they attain "actual knowledge" of illegal content. The Conservatives appear to want to create a system which forces them to attain that knowledge.

In response to Cameron's comments, Malcolm Hutty, public affairs chief at Linx, the organisation which runs inter-ISP traffic, said: "Our technical experience shows that removal at source is the only effective solution: attempting to block traffic within the network is simply far too easy to get around for anyone who wants to.

"Blocking child abuse images may occasionally help protect users from inadvertently being exposed to such content, but this is quite different from preventing access to music sharing sites that users are actively seeking out."

Despite the industry's steadfastness on monitoring, Cameron's comments, combined with news that a Belgian ISP has been ordered to clean up copyright-infringing material from its network, are likely to reignite the issue.

ISPA's policies on P2P and content liability are here and here. Cameron's speech is here. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.