Feeds

Record industry refused Jammie Thomas appeal

Judge scratches 'making available'

Choosing a cloud hosting partner with confidence

The judge in the Jammie Thomas filesharing case has refused the Recording Industry Ass. of America's (RIAA) attempt to revive arguments that "making [music files] available" is copyright infringement.

The record industry had been asking to appeal a decision in September, when federal judge Michael J. Davis ruled that his advice to the jury in the original Jammie Thomas trial was wrong. In 2007 she was ordered to pay $220,000 for sharing 24 songs, after jurors were told that "making available" was equal to distribution.

Last week Davis denied the RIAA an "interlocutory" appeal against his change of heart. He said there was "no substantial ground for a difference of opinion" on the matter, and that an appeal would not "materially advance the ultimate termination of the litigation", copyright lawyer Ray Beckerman noted.

Davis also said that even if his original instruction was correct, the court still had to address whether the damages award to the RIAA were constitutional. In his September ruling, which granted Thomas a retrial, Davis said: "Her alleged acts were illegal, but common. Her status as a consumer who was not seeking to harm her competitors or make a profit does not excuse her behavior. But it does make the award of hundreds of thousands of dollars in damages unprecedented and oppressive."

The retrial will now go ahead.

The RIAA's critics have long believed that without recourse to the "making available" argument to allege copyright infringement, many of its actions against individual filesharers would fail. Thomas' remains the only case where damages have been awarded to the record industry, out of thousands filed (although others have settled out of court for much smaller amounts).

It now looks set to remain so.

Earlier in December, the RIAA said it would stop suing individuals and instead try to get ISPs to warn their customers to stop, and cut them off if they don't.

The new tactic has been modeled on the French "three strikes" proposal. A similar system of warnings is being trialed in the UK, although ISPs have refused to sever customers' broadband connections. ®

Intelligent flash storage arrays

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
Inside the EYE of the TORnado: From Navy spooks to Silk Road
It's hard enough to peel the onion, are you hard enough to eat the core?
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.