Feeds

Son of Hadopi: The Revenge

Three strikes, take two...

Top three mobile application threats

The French government is soldiering on with its three strikes legislation, Hadopi. After rejection by the French Supreme Court on constitutional grounds in June, Hadopi fils returns to the Senate this afternoon. This time persistent file sharers who have been warned, then disconnected, will have the right to appeal the termination before a court.

The Hadopi bill is named after the bureucratic agency which oversees the process: the Haute Autorité pour la Diffusion des Oeuvres et la Protection des Droits sur Internet. H2 is expected to pass a 3pm vote, then is up for examination by a panel of MPs. It then goes to a second vote next week. Backers are confident it will be firing out warnings by the end of the year.

Christine Albanel, French culture minister

The legislation was devised by former French Culture Minister Christine Albanel (pictured).

But aren't we expected to follow suit? Recent headlines recently hinted at an shadowy international conspiracy, seeing an imminent purge of freedom loving citizens from the interwebs.

Actually, no.

Disconnections are dead in the UK - except in the minds of a few lobby groups. Each has its own reasons, but these wish to pretend otherwise, including the BPI, the ERA and the Open Rights Group - the latter seizing on an opportunity to collect email addresses. They were joined by the "Coalition of the Wealthy" - the pop stars' lobby group the Featured Artists Coalition.

In its recent statement, the Business and Industry Department pointed out that permanent disconnections raised legal issues, and Mandelson confirmed that the "third strike" wouldn't be a disconnection with a column here

"I made clear to the content industry that we would consider legislation that includes temporary account suspension only if it was seen as the sanction of last resort," he wrote.

It's your problem, he told the music business - sort it out yourselves.

UK Music, which represents a range of interests in the music business, backs temporary suspension of 72 hours for infringers who ignore three warnings, leading to two months on the bench for downloaders who ignore five warnings.

So why the fuss about disconnections, then? Some people find this war so enjoyable, they don't want it to stop. Even if it means making stuff up. ®

Top three mobile application threats

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.