Feeds

LibDems score copyright coup

Blocking by network address extended, after Lords hijack

Top three mobile application threats

"Preventing access to specified online locations for the prevention of online copyright infringement In Part 1 of the Copyright, Designs and Patents Act 1988, after section 97A insert—

"97B Preventing access to specified online locations for the prevention of online copyright infringement

(1) The High Court (in Scotland, the Court of Session) shall have power to grant an injunction against a service provider, requiring it to prevent access to online locations specified in the order of the Court for the prevention of online copyright infringement.

(2) In determining whether to grant an injunction under subsection (1), the Court shall have regard to the following matters—

   (a) whether a substantial proportion of the content accessible at or via each specified online location infringes copyright,

   (b) the extent to which the operator of each specified online location has taken reasonable steps to prevent copyright infringement content being accessed at or via that online location or taken reasonable steps to remove copyright infringing content from that online location (or both),

    (c) whether the service provider has itself taken reasonable steps to prevent access to the specified online location,

    (d) any issues of national security raised by the Secretary of State.

    (e) the extent to which the copyright owner has made reasonable efforts to facilitate legal access to content,

    (f) the importance of preserving human rights, including freedom of expression, and the right to property, and

    (g) any other matters which appear to the Court to be relevant.

    (3) An application for an injunction under subsection (1) shall be made on notice to the service provider and to the operator of each specified online location in relation to which an injunction is sought and to the Secretary of State.

(4) Where —

   (a) the Court grants an injunction under subsection (1) upon the application of an owner of copyright whose copyright is infringed by the content accessible at or via each specified online location in the injunction, and

   (b) the owner of copyright before making the application made a written request to the service provider giving it a reasonable period of time to take measures to prevent its service being used to access the specified online location in the injunction, and no steps were taken, the Court shall order the service provider to pay the copyright owner's costs of the application unless there were exceptional circumstances justifying the service provider's failure to prevent access despite notification by the copyright owner.

(5) In this section— "copyright owner" includes a licensee with an exclusive licence within the meaning of section 92 of this Act, "infringing content" means content which is produced or made available in infringement of copyright, "online location" means a location on the internet, a mobile data network or other data network at or via which copyright infringing content is accessible, "operator" means a person or persons in joint or sole control of the decisions to make content accessible at or via an online location, and "service provider" has the meaning given to it by section 97A(3) of this Act.

(6) Subsections (1) to (5) shall come into force on such day as the Secretary of State may by order appoint not less than 3 months and not more than 12 months after subsections (1) to (5) have been notified to the Commission of the European Communities ("the Commission") in accordance with the obligations of notification imposed by Directive 98/34/EC.

(7) If any comments are received from Member States of the European Union or the Commission after subsection (1) to (5) have been so notified and the Secretary of State reasonably considers amendments are necessary to give effect to such comments, he may make the necessary regulations within the period referred to in subsection (6)(a), to amend subsections (1) to (5).""

Build a business case: developing custom apps

More from The Register

next story
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.