Feeds

Obama refuses to respond to MPAA bribery claim petition

Poor wording breaks petition’s T&Cs

The Power of One Infographic

The White House has said it won’t be responding to a petition calling for an investigation into whether comments by MPAA head Chris Dodd about paying for political support constituted an admission of bribery.

Shortly after SOPA and PIPA were kicked into the long grass by nervous legislators, Dodd - himself a former senator – remarked to Fox News that his organization was “watching very carefully” and would not be writing campaign donation checks to politicians who ceased to support it. The comments sparked a petition to the White House and it gained the requisite 30,000 signatures needed to trigger a response within hours.

“The White House declines to comment on this petition because it requests a specific law enforcement action,” came the government’s response, entitled "Why we can't comment".

According to the terms and conditions of the petitioning system: "To avoid the appearance of improper influence, the White House may decline to address certain procurement, law enforcement, adjudicatory, or similar matters properly within the jurisdiction of federal departments or agencies, federal courts, or state and local government in its response to a petition."

The crucial word here is “may”, and in this case the White House has chosen to exercise this option. It may also indicate that a petition phrased in a different way could get an actual response.

The MPAA has so far also declined to comment on the issue. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.