Feeds

Google's 'Musicblogocide' - blame the DMCA

Er, they're obeying the (crap) law

Choosing a cloud hosting partner with confidence

The world is calling it "Musicblogocide 2010." We call it yet another demonstration that the DMCA takedown is a ridiculously blunt instrument.

As reported by The Guardian, Google recently destroyed six popular music blogs hosted on its Blogger service after receiving repeated notices alleging that the sites were housing unauthorized copyrighted content.

According to Google, the blogs - Pop Tarts, Masala, I Rock Cleveland, To Die By Your Side, It's a Rap, and Living Ears - had violated its terms of service, which says Google will respond to notices of alleged copyright infringement in compliance with the US Digital Millennium Copyright Act (DMCA).

At least some of the music bloggers claim they were not hosting unauthorized content. "I assure you that everything I've posted for, let's say, the past two years, has either been provided by a promotional company, came directly from the record label, or came directly from the artist," one blog owner said.

But whether the content was authorized or not, Google is merely sticking to policy.

Last summer, the company updated its DMCA policy so that if it received a takedown notice for a particular blog, it would change the post to "draft status" - so that it's no longer publicly accessible - and notify the user via email as well as the Blogger dashboard. This was actually a policy improvement. Previously, when a takedown was received, Google simply deleted the post.

On top of this, if Google receives multiple DMCA complaints about the same blog and the company has no indication that the copyrighted content in question is authorized, it will remove the entire blog. As the DMCA requires. In order to protect themselves from deletion, bloggers must file DMCA counterclaims when they believe takedown notices are in error.

"Inevitably, we occasionally receive DMCA complaints even though the blogger does have the legal right to link to the music in question," the company said in a blog post of its own following complaints of Musicblogocide 2010.

"Whether this is the result of miscommunication by staff at the record label, or confusion over which MP3s are 'official,' it happens. If this happens to you, it is imperative that you file a DMCA counter-claim so we know you have the right to the music in question. Otherwise, this could very well constitute repeat offenses, compelling us to take action."

It would seem the music bloggers aren't versed in the ways of DMCA claims and counterclaims. But you can't blame Google for that. Blame the DMCA. ®

Security for virtualized datacentres

More from The Register

next story
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.