Feeds

LibDems score copyright coup

Blocking by network address extended, after Lords hijack

The Power of One Infographic

"Preventing access to specified online locations for the prevention of online copyright infringement In Part 1 of the Copyright, Designs and Patents Act 1988, after section 97A insert—

"97B Preventing access to specified online locations for the prevention of online copyright infringement

(1) The High Court (in Scotland, the Court of Session) shall have power to grant an injunction against a service provider, requiring it to prevent access to online locations specified in the order of the Court for the prevention of online copyright infringement.

(2) In determining whether to grant an injunction under subsection (1), the Court shall have regard to the following matters—

   (a) whether a substantial proportion of the content accessible at or via each specified online location infringes copyright,

   (b) the extent to which the operator of each specified online location has taken reasonable steps to prevent copyright infringement content being accessed at or via that online location or taken reasonable steps to remove copyright infringing content from that online location (or both),

    (c) whether the service provider has itself taken reasonable steps to prevent access to the specified online location,

    (d) any issues of national security raised by the Secretary of State.

    (e) the extent to which the copyright owner has made reasonable efforts to facilitate legal access to content,

    (f) the importance of preserving human rights, including freedom of expression, and the right to property, and

    (g) any other matters which appear to the Court to be relevant.

    (3) An application for an injunction under subsection (1) shall be made on notice to the service provider and to the operator of each specified online location in relation to which an injunction is sought and to the Secretary of State.

(4) Where —

   (a) the Court grants an injunction under subsection (1) upon the application of an owner of copyright whose copyright is infringed by the content accessible at or via each specified online location in the injunction, and

   (b) the owner of copyright before making the application made a written request to the service provider giving it a reasonable period of time to take measures to prevent its service being used to access the specified online location in the injunction, and no steps were taken, the Court shall order the service provider to pay the copyright owner's costs of the application unless there were exceptional circumstances justifying the service provider's failure to prevent access despite notification by the copyright owner.

(5) In this section— "copyright owner" includes a licensee with an exclusive licence within the meaning of section 92 of this Act, "infringing content" means content which is produced or made available in infringement of copyright, "online location" means a location on the internet, a mobile data network or other data network at or via which copyright infringing content is accessible, "operator" means a person or persons in joint or sole control of the decisions to make content accessible at or via an online location, and "service provider" has the meaning given to it by section 97A(3) of this Act.

(6) Subsections (1) to (5) shall come into force on such day as the Secretary of State may by order appoint not less than 3 months and not more than 12 months after subsections (1) to (5) have been notified to the Commission of the European Communities ("the Commission") in accordance with the obligations of notification imposed by Directive 98/34/EC.

(7) If any comments are received from Member States of the European Union or the Commission after subsection (1) to (5) have been so notified and the Secretary of State reasonably considers amendments are necessary to give effect to such comments, he may make the necessary regulations within the period referred to in subsection (6)(a), to amend subsections (1) to (5).""

Mobile application security vulnerability report

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.