Feeds

BT hauls Digital Economy Act back to court

Last chance for telco to slay the beast

High performance access to file storage

The Court of Appeal has today granted BT permission to appeal against the High Court’s judicial review of the Digital Economy Act. BT had attempted to get sections of the Act repealed in the High Court, but saw most of its arguments thrown out in April. It won a minor point on costs, but the five cornerstones of its argument were rejected.

In May, BT and co-litigator TalkTalk said they would appeal, but this was rejected in June. The Pirate Party, and taxpayer-funded quango Consumer Focus, which is due to be abolished, are also petitioning for a review.

The High Court judge, Mr Justice Kenneth Parker, was particularly damning about the ISPs' challenge, repeatedly indicating that the DEA had not said what the ISPs thought it said. He also pointed out the new Act was fairer than the status quo, pointing to “the tyranny of small decisions that have ruinous economic consequences”.

The appeals stage will be an even higher hurdle for the ISPs, which must now argue that Parker didn’t understand the law. However, he appears to have understood it rather better than the anti-copyright activists.

In July Culture Minister Ed Vaizey had a pop at "the apologists for infringement, those who assert that copyright itself is an outmoded conspiracy, designed to put money into the pockets of corporations at the expense of ordinary people and so called 'real artists'," adding, "Supposedly you can’t be a real artist and make real money."

It used to be dinosaur music companies who preferred expensive litigation to business innovation. Now it’s dinosaur telcos. BT has spent vast sums on fighting the DEA, and its right to defend Newsbinz2, but has yet to launch a music service of its own.

BT's Simon Milner promised us it was working on one in an interview with El Reg in July. This was news to the entire UK music industry.

When we enquired more recently about how it was coming along, nobody at BT knew anything about it. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.