Feeds

Techies blast big media over copyright warnings

More like copywrong warning, am I right? I'll get my coat

High performance access to file storage

A trade group that includes Google, Microsoft, Yahoo! and other big names in tech is asking federal regulators to clean up allegedly misleading language in copyright warnings.

The Computer & Communications Industry Association announced today it has filed a complaint with the Federal Trade Commission on behalf of consumers. The trade group claims that several corporations have misled the public for years by misrepresenting their rights through warnings that include "deceptive and threatening statements."

The complaint was filed against Major League Baseball, the National Football League, NBC/Univeral, DreamWorks, Harcourt Inc. and Penguin Group.

“Every one of us has seen or heard that copyright warning at the beginning of a sports game, DVD or book,” said CCIA CEO Ed Black, during a press conference at the National Press Club. “These corporations use these warnings not to educate their consumers, but to intimidate them.”

The complaint asks the FTC to flatten the current language in copyright warnings, and launch a campaign to educate consumers of their rights under fair use laws.

According to the CCIA, some copyright holders threaten criminal and civil penalties against consumers exercising constitutionally guaranteed rights. Therefore the warnings violate the FTC's mandate against unfair or deceptive practices in commerce.

"There is nothing unlawful, untruthful, or inaccurate about the warning labels on our movies, which adhere to long accepted legal standards and are nearly identical to the warnings used by some of CCIA's own members," NBC/Universal said in a statement.

The CCIA maintains the overreaching warnings reduce demand for new and innovative products and services in digital media. Consumers are confused about their rights to legally acquire the media, and avoid products out of confusion or fear, the group claims. ®

FBI Warning

Some allege the warnings are worded a bit strongly.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.