Feeds

World's dumbest file-sharer: Judge to the rescue

Verdict may be nullified

Internet Security Threat Report 2014

Yesterday, WiReD's David Kravets reports, Thomas pointedly asked the appeals specialist retained by the RIAA, Donald Verrilli, why Congress hadn't made it clear that it didn't need to prove anything: The burden of proof is on the defendant, and by passing the Act Congress made its intentions clear.

"If the owner of a video rental store made an unauthorized copyright video available on the shelves of the store," the RIAA argued in its brief, "courts did not require copyright owners to sit monitoring the store and waiting for someone - if they could catch him - to rent or buy the video in question. Rather, the offer to sell, rent or give away the video has always been enough."

The RIAA also argues that shared songs violate its exclusive right to authorise distribution - and that's where courts have found its arguments to be weakest.

"The First Circuit has squarely considered and rejected the proposition that copyright liability arises where the defendant authorized an infringement, but no actual infringement occurred… Authorization is sufficient to give rise to liability, but only if an infringing act occurs after the authorization."

(It's easy to forget, that the law mentions "distribution" merely as an example of the publication right, not the other way around.)

Maritime legal expert Brian Toder - dismissed and then rehired by Thomas as her attorney - says that if the only person who demonstrably downloaded the songs was the RIAA's enforcement contractor MediaSentry, then no liability should be attached.

A dismissal of the original case, hinted at yesterday, would be a sensational verdict - but would still leave the matter unresolved. The verdict would (naturally) be appealed and the matter would head towards federal courts.

You can see why the RIAA has pushed for "intentional inducement to infringe" to be added to the legal code - a move that would make tape recorders illegal. ®

Internet Security Threat Report 2014

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.