Feeds

US Trans-Pacific Partnership proposal leaked

NGO publishes Washington wish-list

Intelligent flash storage arrays

The group Knowledge Ecology International has scored a leaked copy of the IP protections the United States has proposed for the so-far-secret Trans-Pacific Partnership treaty.

The multi-lateral treaty negotiations include Australia, Brunei Darussalam, Chile, Malaysia, New Zealand, Peru, Singapore, the United States and Vietnam.

The IP protections proposed by the US are essentially an American wish-list that would, in some interpretations, override consumer protections that already exist in individual nations (parallel importation rights of CDs, for example, seems under threat were the US proposal adopted).

Most disturbing for ISPs – apart, of course, from the secrecy of the negotiations – the treaty would impose on signatories an obligation to put content industries' wishes into law.

If the treaty were adopted, an "effective notification" of a claimed infringement would be sufficient to place ISPs under obligation to the content owner. If the side-letter offered in the document were adopted as a definition of "effective", the bar for effectiveness is set fairly low: the letter would have to identify the claimant, the work, express the claimant's belief that the information is accurate, and carry a signature.

The treaty would also require countries to legislate that ISPs "publicly designate" someone to deal with the vast quantity of frequently inaccurate notifications generated by content industry spambots notifications.

Further, the proposed US text demands that ISPs adopt termination policies – and that they implement service monitoring.

Privacy also takes a battering, with the proposal demanding that if an ISP has received “effective notification” of a “claimed infringement”, it should identify the alleged infringer (you read that right: your privacy would be overridden not by a court order, but merely by an effective notification of a claim). ®

Remote control for virtualized desktops

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.