Feeds

LibDems score copyright coup

Blocking by network address extended, after Lords hijack

Beginner's guide to SSL certificates

"Preventing access to specified online locations for the prevention of online copyright infringement In Part 1 of the Copyright, Designs and Patents Act 1988, after section 97A insert—

"97B Preventing access to specified online locations for the prevention of online copyright infringement

(1) The High Court (in Scotland, the Court of Session) shall have power to grant an injunction against a service provider, requiring it to prevent access to online locations specified in the order of the Court for the prevention of online copyright infringement.

(2) In determining whether to grant an injunction under subsection (1), the Court shall have regard to the following matters—

   (a) whether a substantial proportion of the content accessible at or via each specified online location infringes copyright,

   (b) the extent to which the operator of each specified online location has taken reasonable steps to prevent copyright infringement content being accessed at or via that online location or taken reasonable steps to remove copyright infringing content from that online location (or both),

    (c) whether the service provider has itself taken reasonable steps to prevent access to the specified online location,

    (d) any issues of national security raised by the Secretary of State.

    (e) the extent to which the copyright owner has made reasonable efforts to facilitate legal access to content,

    (f) the importance of preserving human rights, including freedom of expression, and the right to property, and

    (g) any other matters which appear to the Court to be relevant.

    (3) An application for an injunction under subsection (1) shall be made on notice to the service provider and to the operator of each specified online location in relation to which an injunction is sought and to the Secretary of State.

(4) Where —

   (a) the Court grants an injunction under subsection (1) upon the application of an owner of copyright whose copyright is infringed by the content accessible at or via each specified online location in the injunction, and

   (b) the owner of copyright before making the application made a written request to the service provider giving it a reasonable period of time to take measures to prevent its service being used to access the specified online location in the injunction, and no steps were taken, the Court shall order the service provider to pay the copyright owner's costs of the application unless there were exceptional circumstances justifying the service provider's failure to prevent access despite notification by the copyright owner.

(5) In this section— "copyright owner" includes a licensee with an exclusive licence within the meaning of section 92 of this Act, "infringing content" means content which is produced or made available in infringement of copyright, "online location" means a location on the internet, a mobile data network or other data network at or via which copyright infringing content is accessible, "operator" means a person or persons in joint or sole control of the decisions to make content accessible at or via an online location, and "service provider" has the meaning given to it by section 97A(3) of this Act.

(6) Subsections (1) to (5) shall come into force on such day as the Secretary of State may by order appoint not less than 3 months and not more than 12 months after subsections (1) to (5) have been notified to the Commission of the European Communities ("the Commission") in accordance with the obligations of notification imposed by Directive 98/34/EC.

(7) If any comments are received from Member States of the European Union or the Commission after subsection (1) to (5) have been so notified and the Secretary of State reasonably considers amendments are necessary to give effect to such comments, he may make the necessary regulations within the period referred to in subsection (6)(a), to amend subsections (1) to (5).""

Security for virtualized datacentres

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
OECD lashes out at tax avoiding globocorps' location-flipping antics
You hear that, Amazon, Google, Microsoft et al?
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.