Feeds

Is France's 'three strikes' anti-piracy banhammer working?

IFPI says yes. We look at the file-sharer numbers

5 things you didn’t know about cloud backup

The global trade group for the record industry IFPI says France's 'graduated response' scheme HADOPI is helping win the war against piracy.

Under the scheme, which began 15 months ago, if a file-sharer receives three warning letters in a year, their account is suspended for a month, and the subscriber may receive a fine of up to €1,500. According to HADOPI (Haute autorité pour la diffusion des oeuvres et la protection des droits sur internet) itself, 736,000 people have received their first letter, 62,000 their second letter, and 165 their third. If this was the only data point we had, it would suggest the scheme has been a terrific success – and everyone (except HADOPI) could go home. But it's not that simple.

According to numbers estimated by Nielsen Research, P2P file-sharing fell by 26 per cent year on year. IFPI also cites figures from South Korea that suggest 70 per cent of file-sharers cease from copyright infringement on receipt of their first warning letter. Another French study is rather less emphatic, however. Ipsos MediaCT suggests that 48 per cent of the age group 15 to 50 say the sanctions have a genuine deterrent effect on their behaviour. How about the real numbers – licensed usage should be increasing while unlicensed usage should be declining.

While the actual number of P2P transactions has fallen – down by 26 per cent, says IFPI – they have been edging back up again.

Is three strikes working?

Bittorrent was never designed to evade copyright enforcement, and P2P file-sharers remain an easy target. So piracy may simply have shifted to other means such as cyberlockers, where it's a little harder to identify the perp.

There's only one number that matters, though, and that's the size of the real, licensed market. Whether HADOPI does help create market growth for income from sound recordings isn't immediately clear. It will be a tragedy for future generations if piracy is deemed 'cured' – trebles all round – and the market nevertheless remains a wasteland, obliging tomorrow's ambitious and talented musicians to look to oligarchs, corporate sponsors or tip-jars to fund their recordings. Or even worse, Simon Cowell. ®

Andrew welcomes your mail.

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
If there are any on our site it is not our fault as we are not a PUBLISHER
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.