Feeds

Dutch court convicts teens for stealing pixels

Your +5 magic amulet or your life

Designing a Defense for Mobile Applications

A pair of Dutch teenagers have been convicted of theft for stealing virtual items from a classmate.

Leeuwarden district court sentenced the boys, aged 14 and 15 to community service for punching, kicking, and threatening their 13-year-old victim with a knife until he agreed to transfer a virtual amulet and mask from the game Runescape to their own accounts.

Radio Netherlands reports the attacks occurred in September 2007. Apparently, the issue wasn't the assault on the lad, but on whether virtual items should be considered tangible goods that can be stolen.

The prosecutor argued because the items have value to the owner, they should be considered real and tangible. He also noted Runescape objects can be sold for money in the real world.

As with many online games, Runescape's Terms and Conditions specifically forbids exchanging game items for real-life money or benefits, although this doesn't stop many from making such trades on sites like eBay.

A lawyer representing the culprits argued that legally, the items don't exist and therefore can't be stolen, RNW reports.

The court rejected the defense's argument, stating that "these virtual goods are goods, so this is theft," in a summary of its ruling. It cited an earlier decision that electricity can be considered a material object for the purpose of criminal law and that stealing electricity is theft. The same principle can be applied to virtual objects in this case, it ruled.

The 15-year-old was sentenced to 200 hours service, while the 14-year-old got 160 hours. ®

Application security programs and practises

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.