Feeds

BitTorrent crackdown cops fail to pay music copyright fees

Six OiNK accused in court today

Intelligent flash storage arrays

Cleveland Police, the force that will today bring six people to court for alleged involvement in the OiNK BitTorrent network, does not pay licensing fees to legally play music in its canteens, it has emerged.

Rumours that Cleveland Police was infringing copyright law have been circulating for several months. Yesterday the Middlesborough Gazette reported the force admitted the transgression and said it had not decided whether to pay its Performing Rights Society (PRS) subs.

The PRS collects royalties for artists and record companies from non-domestic performance of recorded copyright music.

A spokeswoman confirmed Cleveland Police's position to El Reg today.

A statement from Cleveland Police Deputy Chief Constable Derek Bonnard said: "We continue to assess the position and are seeking advice to determine if we are required by law to spend a significant amount of public money, which we consider is better committed to crime fighting, in this way."

The PRS argues that police forces are required to pay the same as other organisations. It issued a High Court writ against police in Lancashire earlier this year for the same infringment Cleveland has admitted.

PRS said only 11 forces nationwide have paid for the legal right to play copyright music in staff areas. Action against the Lancashire Constabulary has been suspended while the parties attempt to negotiate a settlement.

Depending on where and how it it plays copyright music, Cleveland Police can expect a PRS bill of between a few hundred and a few thousand pounds.

Alan Ellis, the 25-year-old administrator of OiNK, will face Teesside magistrates today on a charge of conspiracy to defraud. Five individuals who were arrested following last year's raids on Ellis and OiNK's servers will also appear, accused of criminal copyright infringement for uploading new trackers to the site.

All of the alleged offences could carry prison sentences. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.