Feeds

First RIAA file-sharing trial begins

Accused mom gets jury of her peer-to-peers

The Power of One eBook: Top reasons to choose HP BladeSystem

30-year-old single mother of two Jammie Thomas appeared in court today in Minnesota to answer allegations that she illegally shared 1,702 songs on the Kazaa file-sharing network.

Thomas is the first of approximately 26,000 US citizens accused by the Recording Industry of America of illegal file-sharing to reach a civil judge and jury.

Most have settled with the RIAA, rather than face its litigious might. Thomas said she had rejected such offers because she refused to be bullied.

The RIAA is seeking over $1.2m in compensation. The suit will focus on only 26 songs for damages, as set by federal law, of $750 to $30,000 for each alleged copyright violation.

Thomas' council, Brian Toder, says the record companies haven't proven that Thomas shared the songs. The RIAA says the lawsuit will "communicate that there are consequences for breaking the law and encourage fans to turn to legal online services."

The RIAA claims on February 21, 2005, investigators at SafeNet found the 1,702 songs being shared under Thomas' online handle, "tereastarr" and her IP address. The RIAA said Thomas has used the screen name online for "many years," leading them to believe it was her.

There are no claims that either child — ages 11 and 13 — were involved in the music sharing, although the RIAA has historically gone after the parent first.

Shortly after receiving settlement letters from the labels, Thomas had the hard drive in her PC replaced at Best Buy. She says the switch was made to repair the drive, while the RIAA accuses Thomas of attempting to conceal evidence.

The RIAA will perhaps be hard-pressed now to produce evidence that Thomas was in fact the one sharing the music. On top of unavailable evidence, on Monday, her attorney succeeded in having 784 documents thrown out of court because the RIAA missed a deadline.

Jury selection and opening arguments began this morning in Duluth federal court. US District Judge Michael Davis presided over the trial. It is expected to conclude on Thursday. ®

Top three mobile application threats

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.