Feeds

ACTA draft falls from skies

This one looks final

Security for virtualized datacentres

The EU has published a final draft of the international counterfeiting treaty on behalf of the WTO. The process has been underway since 2007, and this version will become final, pending legal review.

It's principally aimed at commercial pirates and traders who counterfeit fashion goods and DVDs on an industrial scale - a formidable black economy that's sometimes indistinguishable from organised crime. And what gangster wouldn't want this in their 'portfolio'? Fake perfume smells a lot nicer than the waste disposal business.

ACTA also strays into trademarks and internet policy. The Union was an observer in the proceedings, and doesn't expect to do much with it.

"ACTA will not change the body of EU law as it is already considerably more advanced than the current international standards," it said last month (pdf), citing a bunch of legislation including the Commerce Directive the Copyright Directive, and IPR regulations and directives. Nation states such as the UK and France are even further down the line.

Australia confirmed it had no need to change its law, either, welcoming the clarifying of language to target "commercial scale" counterfeiting operations.

Over the past year ACTA has provoked much bin-shouting on the interwebs - based on a fairly simple misunderstanding of what it is. Unlike most of the WTO's agreements which are multilateral and therefore binding, ACTA is plurilateral, and voluntary. That hasn't stopped bloggers bloviating about dark conspiracies.

But then that's activist copyright bloggers for you. They seem to need to live in a perpetual state of persecution, and if something to persecute them doesn't exist, they'll just make it up. ®

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Special pleading against mass surveillance won't help anyone
Protecting journalists alone won't protect their sources
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Bill Gates, drugs and the internet: Top 10 Larry Ellison quotes
'I certainly never expected to become rich ... this is surreal'
Big Content Australia just blew a big hole in its credibility
AHEDA's research on average content prices did not expose methodology, so appears less than rigourous
EMC, HP blockbuster 'merger' shocker comes a cropper
Stand down, FTC... you can put your feet up for a bit
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.