Feeds

Now Hollywood is chasing UK downloaders

And getting the wrong guy

The Essential Guide to IT Transformation

Here's the full infringement notice, minus private information, standard email disclaimers and some XML designed for automated processing at cooperating ISPs.

Dear Sir or Madam,
We have received a complaint regarding an allegation of Copyright Infringement. We were supplied an IP address of the system that was sharing the alleged copyrighted material, which we traced to your PIPEX ADSL account.

As I am sure you are aware, this breaches our Acceptable Use Policy, (http://www.pipex.net/legal/aup/) and many copyright laws, namely the Berne Convention. Please reply to this email within 7 days stating that your PIPEX account will not be used for copyright infringement or any breaches of the law or the PIPEX Acceptable Use Policy. Failure to respond or further infringements will cause your account to be temporarily suspended,and could also result in your account being terminated.

We have included the original complaint for you to view.

-------

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Notice ID: 214-847612 Notice Date: 18 Aug 2008 18:03:32 GMT Freedom To Surf PLC

Dear Sir or Madam:

BayTSP, Inc. ("BayTSP") swears under penalty of perjury that MetroGoldwyn Mayer (collectively, "MGM") has authorized BayTSP to act as its non-exclusive agent for copyright infringement notification. BayTSP's search of the protocol listed below has detected infringements of MGM's copyright interests on your IP addresses asdetailed in the attached report.

BayTSP has reasonable good faith belief that use of the material inthe manner complained of in the attached report is not authorized by MGM, its agents, or the law. The information provided herein is accurate to the best of our knowledge. Therefore, this letter is an official notification to effect removal of the detected infringement listed in the attached report.

The Berne Convention for the Protection of Literary and Artistic Works, the Universal Copyright Convention, as well as bilateral treaties with other countries allow for protection of client's copyrighted work even beyond U.S. borders. The attached documentation specifies the exact location of the infringement. We hereby request that you immediately remove or block access to the infringing material, as specified in the copyright laws, and insure that the user refrains from using or sharing with others, unauthorized MGM materials in the future. Further, we believe that the entire Internet community benefits when these matters are resolved cooperatively.

We urge you to take immediate action to stop this infringing activity and inform us of the results of your actions. We appreciate your efforts toward this common goal. Please respond indicating the actions you have taken to resolve thismatter. The provided link has been assigned to this matter: http://webreply.baytsp.com...

For email correspondence, please reference the above Notice ID in the subject line: mailto:mgm2@copyright-compliance.com?subject=RE: Notice ID 214-847612 Unauthorized Use of Metro Goldwyn Mayer Property.

Nothing in this letter shall serve as a waiver of any rights orremedies of MGM with respect to the alleged infringement, all of which are expressly reserved. Should you need to contact me, I may bereached at the following address: Mark Ishikawa, Chief Executive Officer BayTSP, Inc. PO Box 1314 Los Gatos, CA 95031v: 408-341-2300f: 408-341-2399 paramount@copyright-compliance.com

Evidentiary Information:

Notice ID: 214-847612
Recent Infringement Timestamp: 16 Aug 2008 06:48:42 GMT
Infringed Work: Stargate Atlantis
Infringing FileName: Stargate.Atlantis.S05E02.HDTV.XviD-0TV.avi
Infringing FileSize: 367061894
Protocol: BitTorrent
Infringing URL: http://tracker.mightynova.com:80/announce
Infringers IP Address: *******
Infringer's DNS Name: i-***-***-*-***.freedom2surf.net
Infringer's User Name: *******
Initial Infringement Timestamp: 16 Aug 2008 06:48:42 GMT

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.