Feeds

Pirate Bay AND its users violate labels' copyright - judge

High Court ruling paves way for web block

The Power of One Infographic

A High Court judge has ruled that notorious file-sharing website The Pirate Bay and its users violated the copyrights of nine record labels based in the UK.

None of the founders of the website were represented at the trial in London.

"The matters I have considered in relation to authorisation lead to the conclusion that the operators of TPB induce, incite or persuade its users to commit infringements of copyright, and that they and the users act pursuant to a common design to infringe," ruled Mr Justice Arnold.

"It is also relevant in this regard that the operators profit from their activities. Thus they are jointly liable for the infringements committed by users."

The High Court of Justice ruling is expected to lead to the record labels - including the UK wings of Sony, EMI and Warner - to seek a court order that would require telcos to block access to the site in the Blighty.

Virgin Media - listed as a defendant in the case alongside TalkTalk, BSkyB, BT, Everything Everywhere and Telefonica - gave The Register this statement immediately following the ruling:

As a responsible ISP, we will comply with any court order addressed to us but strongly believe such deterrents need to be accompanied by compelling legal alternatives, such as our agreement with Spotify, which give consumers access to content at the right price.

BSkyB said that "as and when clear and legally robust evidence of copyright theft is presented, we will take appropriate action in respect to site blocking, which will include complying with court orders".

Judge Arnold likened the case to that of an earlier landmark ruling against Newzbin2 in October, which meant that websites and IP addresses would become unreachable for the first time in the UK for copyright reasons.

The High Court's Pirate Bay judgment is here. ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.