Feeds

Now Hollywood is chasing UK downloaders

And getting the wrong guy

The Power of One Infographic

Here's the full infringement notice, minus private information, standard email disclaimers and some XML designed for automated processing at cooperating ISPs.

Dear Sir or Madam,
We have received a complaint regarding an allegation of Copyright Infringement. We were supplied an IP address of the system that was sharing the alleged copyrighted material, which we traced to your PIPEX ADSL account.

As I am sure you are aware, this breaches our Acceptable Use Policy, (http://www.pipex.net/legal/aup/) and many copyright laws, namely the Berne Convention. Please reply to this email within 7 days stating that your PIPEX account will not be used for copyright infringement or any breaches of the law or the PIPEX Acceptable Use Policy. Failure to respond or further infringements will cause your account to be temporarily suspended,and could also result in your account being terminated.

We have included the original complaint for you to view.

-------

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Notice ID: 214-847612 Notice Date: 18 Aug 2008 18:03:32 GMT Freedom To Surf PLC

Dear Sir or Madam:

BayTSP, Inc. ("BayTSP") swears under penalty of perjury that MetroGoldwyn Mayer (collectively, "MGM") has authorized BayTSP to act as its non-exclusive agent for copyright infringement notification. BayTSP's search of the protocol listed below has detected infringements of MGM's copyright interests on your IP addresses asdetailed in the attached report.

BayTSP has reasonable good faith belief that use of the material inthe manner complained of in the attached report is not authorized by MGM, its agents, or the law. The information provided herein is accurate to the best of our knowledge. Therefore, this letter is an official notification to effect removal of the detected infringement listed in the attached report.

The Berne Convention for the Protection of Literary and Artistic Works, the Universal Copyright Convention, as well as bilateral treaties with other countries allow for protection of client's copyrighted work even beyond U.S. borders. The attached documentation specifies the exact location of the infringement. We hereby request that you immediately remove or block access to the infringing material, as specified in the copyright laws, and insure that the user refrains from using or sharing with others, unauthorized MGM materials in the future. Further, we believe that the entire Internet community benefits when these matters are resolved cooperatively.

We urge you to take immediate action to stop this infringing activity and inform us of the results of your actions. We appreciate your efforts toward this common goal. Please respond indicating the actions you have taken to resolve thismatter. The provided link has been assigned to this matter: http://webreply.baytsp.com...

For email correspondence, please reference the above Notice ID in the subject line: mailto:mgm2@copyright-compliance.com?subject=RE: Notice ID 214-847612 Unauthorized Use of Metro Goldwyn Mayer Property.

Nothing in this letter shall serve as a waiver of any rights orremedies of MGM with respect to the alleged infringement, all of which are expressly reserved. Should you need to contact me, I may bereached at the following address: Mark Ishikawa, Chief Executive Officer BayTSP, Inc. PO Box 1314 Los Gatos, CA 95031v: 408-341-2300f: 408-341-2399 paramount@copyright-compliance.com

Evidentiary Information:

Notice ID: 214-847612
Recent Infringement Timestamp: 16 Aug 2008 06:48:42 GMT
Infringed Work: Stargate Atlantis
Infringing FileName: Stargate.Atlantis.S05E02.HDTV.XviD-0TV.avi
Infringing FileSize: 367061894
Protocol: BitTorrent
Infringing URL: http://tracker.mightynova.com:80/announce
Infringers IP Address: *******
Infringer's DNS Name: i-***-***-*-***.freedom2surf.net
Infringer's User Name: *******
Initial Infringement Timestamp: 16 Aug 2008 06:48:42 GMT

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.