Feeds

The cat ate my torrents: ISOHunt founder earns injunction

Freetards' friend Fung feels legal fist

Beginner's guide to SSL certificates

ISOHunt founder Gary Fung's insistence on pandering to freetards has again cost him dear.

Last week his appeal case earned him a permanent injunction, including possible jail time if he breaches the order. Fung was appealing against a suit originally filed by Hollywood (Columbia Pictures is the named plaintiff) against his torrent tracker in 2006.

Fung's lawyers had argued that in the landmark 2005 Grokster case, the supremes had only intended liability to apply to devices. Judge Stephen Wilson rejected this cat-ate-the-homework defence.

He pointed out that the Supreme Court had referred to devices, products and tools interchangeably. "The clear import of the Supreme Court's opinion was that a defendant may be secondarily liable for his conduct and activities, separate and apart from any products, devices or tools he distributes," ruled Wilson.

Fung is enjoined from copyright infringement activity - not restricted to torrents - and has 14 days to comply. Five years after the Grokster ruling, there still seems to be some ignorance about the implications for secondary infringement. Why aren't authors of FTP software thrown in jail?

As with the recent LimeWire ruling, the ISOHunt is pretty clear.

Fung and chums were judged to have actively encouraged infringement and their "very business model, at its core, depends on copyright infringement", Judge Wilson pointed out. Fung failed to take steps to mitigate the infringement, keeping a Top 20 TV shows and Top Searches features prominent.

In other words, there are several hurdles before you can merit a secondary infringement judgment, and Fung jumped them all: you have to be pretty determined to earn one.

The judgment is here. ®

Choosing a cloud hosting partner with confidence

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.