Feeds

LibDems score copyright coup

Blocking by network address extended, after Lords hijack

High performance access to file storage

"Preventing access to specified online locations for the prevention of online copyright infringement In Part 1 of the Copyright, Designs and Patents Act 1988, after section 97A insert—

"97B Preventing access to specified online locations for the prevention of online copyright infringement

(1) The High Court (in Scotland, the Court of Session) shall have power to grant an injunction against a service provider, requiring it to prevent access to online locations specified in the order of the Court for the prevention of online copyright infringement.

(2) In determining whether to grant an injunction under subsection (1), the Court shall have regard to the following matters—

   (a) whether a substantial proportion of the content accessible at or via each specified online location infringes copyright,

   (b) the extent to which the operator of each specified online location has taken reasonable steps to prevent copyright infringement content being accessed at or via that online location or taken reasonable steps to remove copyright infringing content from that online location (or both),

    (c) whether the service provider has itself taken reasonable steps to prevent access to the specified online location,

    (d) any issues of national security raised by the Secretary of State.

    (e) the extent to which the copyright owner has made reasonable efforts to facilitate legal access to content,

    (f) the importance of preserving human rights, including freedom of expression, and the right to property, and

    (g) any other matters which appear to the Court to be relevant.

    (3) An application for an injunction under subsection (1) shall be made on notice to the service provider and to the operator of each specified online location in relation to which an injunction is sought and to the Secretary of State.

(4) Where —

   (a) the Court grants an injunction under subsection (1) upon the application of an owner of copyright whose copyright is infringed by the content accessible at or via each specified online location in the injunction, and

   (b) the owner of copyright before making the application made a written request to the service provider giving it a reasonable period of time to take measures to prevent its service being used to access the specified online location in the injunction, and no steps were taken, the Court shall order the service provider to pay the copyright owner's costs of the application unless there were exceptional circumstances justifying the service provider's failure to prevent access despite notification by the copyright owner.

(5) In this section— "copyright owner" includes a licensee with an exclusive licence within the meaning of section 92 of this Act, "infringing content" means content which is produced or made available in infringement of copyright, "online location" means a location on the internet, a mobile data network or other data network at or via which copyright infringing content is accessible, "operator" means a person or persons in joint or sole control of the decisions to make content accessible at or via an online location, and "service provider" has the meaning given to it by section 97A(3) of this Act.

(6) Subsections (1) to (5) shall come into force on such day as the Secretary of State may by order appoint not less than 3 months and not more than 12 months after subsections (1) to (5) have been notified to the Commission of the European Communities ("the Commission") in accordance with the obligations of notification imposed by Directive 98/34/EC.

(7) If any comments are received from Member States of the European Union or the Commission after subsection (1) to (5) have been so notified and the Secretary of State reasonably considers amendments are necessary to give effect to such comments, he may make the necessary regulations within the period referred to in subsection (6)(a), to amend subsections (1) to (5).""

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.