Feeds

Son of Hadopi: The Revenge

Three strikes, take two...

Remote control for virtualized desktops

The French government is soldiering on with its three strikes legislation, Hadopi. After rejection by the French Supreme Court on constitutional grounds in June, Hadopi fils returns to the Senate this afternoon. This time persistent file sharers who have been warned, then disconnected, will have the right to appeal the termination before a court.

The Hadopi bill is named after the bureucratic agency which oversees the process: the Haute Autorité pour la Diffusion des Oeuvres et la Protection des Droits sur Internet. H2 is expected to pass a 3pm vote, then is up for examination by a panel of MPs. It then goes to a second vote next week. Backers are confident it will be firing out warnings by the end of the year.

Christine Albanel, French culture minister

The legislation was devised by former French Culture Minister Christine Albanel (pictured).

But aren't we expected to follow suit? Recent headlines recently hinted at an shadowy international conspiracy, seeing an imminent purge of freedom loving citizens from the interwebs.

Actually, no.

Disconnections are dead in the UK - except in the minds of a few lobby groups. Each has its own reasons, but these wish to pretend otherwise, including the BPI, the ERA and the Open Rights Group - the latter seizing on an opportunity to collect email addresses. They were joined by the "Coalition of the Wealthy" - the pop stars' lobby group the Featured Artists Coalition.

In its recent statement, the Business and Industry Department pointed out that permanent disconnections raised legal issues, and Mandelson confirmed that the "third strike" wouldn't be a disconnection with a column here

"I made clear to the content industry that we would consider legislation that includes temporary account suspension only if it was seen as the sanction of last resort," he wrote.

It's your problem, he told the music business - sort it out yourselves.

UK Music, which represents a range of interests in the music business, backs temporary suspension of 72 hours for infringers who ignore three warnings, leading to two months on the bench for downloaders who ignore five warnings.

So why the fuss about disconnections, then? Some people find this war so enjoyable, they don't want it to stop. Even if it means making stuff up. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.