Feeds

UK appeal court dismisses mod chip conviction

Devices not responsible for copyright infringement

The Power of One Brief: Top reasons to choose HP BladeSystem

The UK court of appeal this week ruled that games console mod chips do not bypass copy protection systems and are, therefore, effectively legal here.

The ruling comes more than six months after Neil Stanley Higgs of Speedwell Road, Speedwell, Bristol was found guilty at Bristol Crown Court of 26 offences under a 2003 amendment to the 1988 Copyright, Designs and Patents Act.

At the time, Higgs vowed to appeal against the verdict - reached unanimously by the jury - and just as well: this week, the appeal court quashed all charges against him.

Higgs argued that the mod chips did not infringe copyright because that action had already taken place.

modchip2_SM

An Xecuter 3CE mod chip board

The games industry hates mod chips because they allow consoles to play copies of games. Gamers who've modified their consoles this way maintain they do so to allow them to use back-up copies of games if discs become damaged, but the industry claims it's done to allow them to play titles they haven't paid for.

Higgs essentially told the court that the copyright infringement was not carried out by the mod chip but by the user who copies the original disc. As such, he could be no more responsible for the infringement than, say, Sony is when one of its PCs is used to make an unauthorised copy of a DVD.

In 2005, the High Court of Australia also ruled that mod chips are legal Down Under for the same reason. However, Australia changed the law the following year to ban the use of the chips.

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.