Feeds

Virgin Media in talks to trial three strikes regime against P2P

Second time lucky for the BPI?

Gartner critical capabilities for enterprise endpoint backup

Virgin Media could soon become the second major ISP to attempt to implement a "three strikes" system against illegal filesharers in partnership with the record industry.

The cable company is in talks with the British Phonographic Industry (BPI) to trial a system of warnings, followed by disconnection, for the most persistent copyright infringers.

It's the same scheme that Tiscali briefly put in place last summer. That led to 4 customers being disconnected after allegedly ignoring the warnings, but relations between Tiscali and the BPI collapsed in a row over how the costs should be shared.

In a statement today, Virgin Media said: "We have been in discussions with rights holders organisations about how a voluntary scheme could work. We are taking this problem seriously and would favour a sensible voluntary solution."

A spokesman promised that customers will be told when any trial begins, but couldn't say when that will be.

Under the proposed three strikes rules, BPI enforcement agents will detect IP numbers participating in copyright-infringing peer to peer networks. They will alert the ISP, which will voluntarily send out warnings to stop or face disconnection from the net.

ISPs are under huge government pressure to agree to the scheme, or face legislation.

Similar moves are afoot in France and Japan. ®

Boost IT visibility and business value

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.