Feeds

World's dumbest file-sharer: Judge to the rescue

Verdict may be nullified

Security for virtualized datacentres

Yesterday, WiReD's David Kravets reports, Thomas pointedly asked the appeals specialist retained by the RIAA, Donald Verrilli, why Congress hadn't made it clear that it didn't need to prove anything: The burden of proof is on the defendant, and by passing the Act Congress made its intentions clear.

"If the owner of a video rental store made an unauthorized copyright video available on the shelves of the store," the RIAA argued in its brief, "courts did not require copyright owners to sit monitoring the store and waiting for someone - if they could catch him - to rent or buy the video in question. Rather, the offer to sell, rent or give away the video has always been enough."

The RIAA also argues that shared songs violate its exclusive right to authorise distribution - and that's where courts have found its arguments to be weakest.

"The First Circuit has squarely considered and rejected the proposition that copyright liability arises where the defendant authorized an infringement, but no actual infringement occurred… Authorization is sufficient to give rise to liability, but only if an infringing act occurs after the authorization."

(It's easy to forget, that the law mentions "distribution" merely as an example of the publication right, not the other way around.)

Maritime legal expert Brian Toder - dismissed and then rehired by Thomas as her attorney - says that if the only person who demonstrably downloaded the songs was the RIAA's enforcement contractor MediaSentry, then no liability should be attached.

A dismissal of the original case, hinted at yesterday, would be a sensational verdict - but would still leave the matter unresolved. The verdict would (naturally) be appealed and the matter would head towards federal courts.

You can see why the RIAA has pushed for "intentional inducement to infringe" to be added to the legal code - a move that would make tape recorders illegal. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.