Feeds

Recording industry puts stake in ground with Jammie Thomas case

Copyrights and wrongs

Remote control for virtualized desktops

Even when the RIAA, Business Software Alliance (BSA) and Motion Picture Association of America (MPAA) are trying to do the right thing and go after genuine infringing activity, the fact that computers may be a shared resource (with kids and adults using the same computer) or the fact that servers can be hijacked, or people's general ignorance about security makes for potentially serious civil and criminal consequences for people who are doing nothing wrong.

Then there is the problem of derivative liability. Sure, if I download copyrighted songs I should have some liability. But if I do it at work, should my employer have liability? If I do it at school, should the university be forced to pay too? What about the company that makes the software that furthers the infringement? Should they all be forced to pay? Should they also be forced to pony up records relating to my activity? The answer to the latter is probably yes.

One of the biggest problems with copyright infringement is the general sense among those infringing that they are not doing anything particularly "wrong". First, as I noted, there is an awful lot of infringing activity that quite frankly is done deliberately and willfully but not wrongfully.

Part of the problem deals with what I would call the iPod phenomenon. If I went into a Tower Records (OK, there are no more Tower Records, but stay with me here), and slip a CD into my pocket without paying, it's pretty clear I am committing a crime. It's also pretty clear that, at best what I stole was worth whatever was on the sticker, say 20 bucks. That's because I have some physical manifestation of the intellectual property.

On the other hand, let's say my buddy loans me the same CD, and I listen to it without paying. No problem. Now I make a copy of one of the 20 tracks to listen to later. An infringement? Sure. What's the damages? Let's assume that the only way you can get the song is to buy the entire CD. Are the damages $20? One buck? $150,000? Clearly I acted "willfully" when I copied the song, so there is the potential for statutory damages.

Finally, when what I own is just zeros and ones on a digital device (a track on my iPod) and not what is perceived to me as a digital manifestation of that intellectual property, I may feel as if I haven't stolen anything. I don't steal a song when I listen to it on the radio, and I don't feel like I have stolen it when I record it from the radio, even though the copyright law might consider the latter an infringement.

Ultimately, the recording industry is using the copyright law against Ms Thomas to place a stake in the ground. In an effort to prevent piracy generally, they are seeking draconian penalties against this individual. Let's just hope that Scott Adams doesn't try to do the same thing about all the "Dilbert" cartoons on the walls of my office.

This article originally appeared in Security Focus.

Copyright © 2007, SecurityFocus

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.