Feeds

Landmark ISP piracy case could kick thousands offline

Global copyright ripples ahead as Aussies set to fall off net

High performance access to file storage

A landmark Australian court case could see thousands of Australians losing their internet connection, and has major implications worldwide for the law on copyright.

The landmark case started on 6 October in Sydney's Federal Court. A group of 34 film companies, represented by the Australian Federation Against Copyright Theft (AFACT) have taken iiNet, Australia’s third-largest ISP, to court over claims that they have allowed users to share copyright material illegally.

In their opening statement, AFACT lawyers claimed that they had found almost 98,000 iiNet customers had illegally shared material online within a 59-week period. The most pirated films during that period were Wanted and Hancock.

iiNet’s defence will rest on three key arguments. First, they intend to explain that it is impossible for ISPs to police the multitude of digital fragments that are carried across file-sharing networks.

Second, they will point out that this activity takes place despite their efforts to the contrary: they have not given any authorisation for users to breach copyright during file-sharing. Finally, they will argue that the monitoring of user downloads would be a breach of privacy.

In his opening remarks, iiNet’s barrister Richard Cobdem SC also suggested that downloaders could be confused because many film producers already have contractual relationships with sites that promote downloads. The BitTorrent website that hosts the software and promotes downloading displays the logos of Fox, Paramount and Warner Brothers, who are applicants in the AFACT claim.

He added that the film industry was requiring ISPs to carry out an impossible task: if all the copyright notices iiNet received from film studios over a five month period were printed, it would take 180 large folders and more than 12 trolleys to bring them into the court.

This week, presiding judge Justice Cowdroy ruled that a series of documents AFACT had sought to have excluded from the trial should be included and considered. This would enable the court to evaluate the current copyright notice procedure – and determine whether it was reasonable.

Since then, the court has heard evidence from DTecNet, the company engaged by AFACT to investigate allegations of copyright infringement, and from a number of US film industry executives interviewed by video link.

Justice Cowdroy has also expressed an interest in watching a live demo of BitTorrent.

Chief Executive of iiNet Michael Malone said he welcomed the opportunity to defend his company’s position and was confident of iiNet’s position. "iiNet has never supported or encouraged breaches of the law, including infringement of the Copyright Act.

"We do not, and never have supported, encouraged or authorised illegal sharing or downloading of files in breach of copyright laws. I am very confident that we will be vindicated and these allegations will be dismissed as unfounded, unproven and untrue."

Lawyers for the film industry claim that iiNet has done "nothing" to discourage copyright infringement on its network.

Instead, "when caught between a rock and a hard place, when push comes to shove they [iiNet] will not enforce" terms and conditions in its standard customer agreement that enables the ISP to cut off the services of users who have infringed copyright.

The consequences of this case cannot be understated. If AFACT win, then Australian ISPs could be forced to monitor and cut off customers who share pirated movies – and those who do engage in illegal downloads could see their connection terminated by their ISPs.

The case is significant, as it represents the film industry attempting to clamp down on file-sharing through the legal system, rather than by lobbying for new laws on the issue, as is presently the case in Europe. Again, a victory in Australia could see a number of carbon copy cases being mounted in other jurisdictions.

The court case is expected to continue into mid-November. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.