Feeds

ISP ordered to drop 'three strikes' rule against pirates

Using IP addresses to ID them invades privacy

Top 5 reasons to deploy VMware with Tegile

The Irish data protection watchdog has ordered the country's largest internet service provider (ISP) to stop using its 'three strikes' system for identifying and warning alleged illegal file-sharers, according to media reports.

The Office of the Data Protection Commissioner in Ireland (ODPC) expressed concern that Eircom's system of using IP addresses to identify alleged copyright infringers invades customers' privacy, the Sunday Times reported, according to a report by thejournal.ie.

Eircom has operated a 'three strikes' system for warning users it suspects of illegal file-sharing that they face being cut off from the internet if they persist with the activity. The system, which Eircom agreed with four major music record companies, had been approved by the Irish Government.

The ODPC would not confirm to Out-Law.com whether the reports were true, but did say its six-month long investigation into Eircom's 'three strikes' system had been "concluded". In June the ODPC launched an investigation into Eircom's system after it sent 'first strike' warning letters to 300 customers wrongly accusing them of illegal file-sharing. At the time Eircom put the wrongful identification of users down to a "software failure caused when the clocks went back last October".

"I can confirm we have concluded our investigation on this matter and have communicated the outcome to Eircom. It has 21 days to respond. Our investigation was commenced on foot of a complaint from an individual who alleged they had received a warning letter about access to copyrighted material in error," the ODPC said in a statement.

Last month the European Court of Justice (ECJ) ruled that although the protection of intellectual property is a fundamental right under EU law, it is not "absolutely protected" and has to be balanced against other fundamental rights. It ruled that a Belgian court had not struck a "fair balance" between the rights of a music royalties collecting society and those of an internet service provider (ISP) and its users when ordering the ISP to filter online traffic in search of copyright infringement.

Under the EU Charter of Fundamental Rights individuals generally have a right to privacy and protection of personal data. The Charter also confers rights on free speech, the freedom to conduct business and states that intellectual property (IP) "shall be protected".

Separate plans to change copyright law in Ireland have been announced by the Irish Government giving rights holders the chance to seek court orders that require ISPs in the country to ban customers' access to pirate content, according to a report in the Irish Times.

In the UK, the Motion Picture Association (MPA) has used provisions under the Copyright, Designs and Patents Act in order to force two major ISPs to cut off customers' access to a copyright infringing website. Under Section 97A of the Act UK courts have the power to grant an injunction against an ISP if it had 'actual knowledge' that someone had used its service to infringe copyright.

The MPA, representing six major film studios including Disney and Fox, won a High Court battle against BT in the summer forcing it to block customers' access to Newzbin2 – a members-only site which collates links to a large amount of illegally-copied material including films, music and computer games, found on Usenet discussion forums. Last week Sky announced that it too had blocked access to Newzbin2 following a court order.

Copyright © 2011, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Internet Security Threat Report 2014

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.