Feeds

Judge orders O2 to name suspected smut burglars

Ben Dover wins battle to halt backdoor leakage

The essential guide to IT transformation

A top judge in Blighty has ordered telco Telefonica to hand over the names of O2 broadband customers suspected of sharing porn online.

In the High Court Mr Justice Arnold handed victory to copyright-chasing law firm Golden Eye International and the British smut-flick house Ben Dover Productions.

Telefonica (the parent company of O2) now has to cough up the names and addresses of the broadband punters that Golden Eye suspects spread Ben Dover's copyrighted grumble vids over peer-to-peer file-sharing networks.

Golden Eye collected the IP addresses of the alleged infringers, and now will be able to cross-reference them with O2's customer database. The ISP is required to keep logs of the IP addresses assigned to all punters for a year.

Golden Eye described itself as "the holder of numerous film copyrights" and argued that the "unlawful distribution of copyright material is detrimental to the film and creative industries". Golden Eye is the exclusive licensee of the films of Ben Dover Productions, described as "spunktastic hardcore" movies.

Ruling in their favour yesterday, Mr Justice Arnold judged that risque filmmakers had a right to protect their intellectual property:

The mere fact that the copyright works are pornographic films is no reason to refuse the grant of relief, since there is no suggestion that they are obscene or otherwise unlawful. Golden Eye and Ben Dover Productions have a good arguable case that many of the relevant Intended Defendants have infringed their copyrights.

The judge said that disclosure was necessary for the claimants to protect their interests, and that their right to protect their erotica outweighed the O2 customers' right to privacy.

The demands of 12 other British filmmakers and porn houses associated with the case, including SweetMeats, Easy on the Eye and One-Eyed Jack Film productions, were rejected as it was ruled that Golden Eye didn't have the rights to sue for profit on their behalf.

In the judgment Golden Eye came in for some stick for its ACS:Law-style tactics of sending out aggressive legal letters to people suspected of copyright infringement. Typical Golden Eye letters requested £700 from the recipient and threatened a court case if the affair was not settled.

A Telefonica-O2 spokesperson said: “Clearly we respect the court order and will therefore be cooperating fully.” ®

The essential guide to IT transformation

More from The Register

next story
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Redmond resists order to hand over overseas email
Court wanted peek as related to US investigation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.