Feeds

What now for the anti-piracy law?

ISPs 'hoist with their own petard' says judge

The essential guide to IT transformation

Analysis BT and TalkTalk threw the kitchen sink, legally speaking, at the Digital Economy Act and made very little stick.

Reading the ruling, you wonder why they bothered. High Court Judge Kenneth Parker summarised the DEA as "a more efficient, focussed and fair system than the current arrangements". Over and over, he pointed out that the Act didn't actually say what the objecting ISPs thought it said. He reaffirmed the right of ISPs to not become snoops, or comprise their "conduit" role. Any snooping is going to have to be carried out by copyright holders. And the DEA doesn't suddenly make them liable for damages.

Parker gave BT and TalkTalk's lawyers a ticking off. At one point he found the ISPs' legal case so contradictory he said they'd hoisted themselves with their own petard. It wasn't the judge's role to favour one business interest over an other, he reminded them:

"It seems to me that if the Community legislator, as in this instance, has chosen specific language to give effect to a careful balancing of competing interests, the judge must be especially cautious before departing from the plain meaning of the text. To depart from that meaning creates the obvious risk of promoting the interest of one economic sector to the detriment of the other interested sector, and hence of seriously upsetting the balance between competing interests that the legislator has carefully struck," he notes.

The Act didn't actually say what technical sanctions (called "obligations") may eventually be introduced – and none may be. The technical obligations were "indicative, not exhaustive," the judge noted.

Nor did the DEA oblige the ISP to spy on users. "The role of the ISP under the DEA is essentially passive," he points out. The copyright holder must inform the ISP of specific suspected infringements, at which point the ISP must notify the user. It's no different to the role of the DVLC in giving out information identifying the owner of a number plate, said Parker.

Whether the Appeal for a Judicial Review was simply stalling or an expensive publicity stunt is a question that can only be answered by BT. They may wish to appeal, in which case it will drag on, but it's hard to see the EU Courts interpreting things very differently. The Act is sufficiently open-ended, and carefully worded, to see to that.

It's not all plain sailing from here, though.

The purpose of the Act isn't to make scapegoats out of hardcore infringers – who would dearly love to become martyrs for a day – and the determined, net-savvy user can bypass Torrent monitoring fairly easily.

Judge Parker acknowledged as much.

The essential guide to IT transformation

More from The Register

next story
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.