Feeds

Judge orders O2 to name suspected smut burglars

Ben Dover wins battle to halt backdoor leakage

The Power of One Brief: Top reasons to choose HP BladeSystem

A top judge in Blighty has ordered telco Telefonica to hand over the names of O2 broadband customers suspected of sharing porn online.

In the High Court Mr Justice Arnold handed victory to copyright-chasing law firm Golden Eye International and the British smut-flick house Ben Dover Productions.

Telefonica (the parent company of O2) now has to cough up the names and addresses of the broadband punters that Golden Eye suspects spread Ben Dover's copyrighted grumble vids over peer-to-peer file-sharing networks.

Golden Eye collected the IP addresses of the alleged infringers, and now will be able to cross-reference them with O2's customer database. The ISP is required to keep logs of the IP addresses assigned to all punters for a year.

Golden Eye described itself as "the holder of numerous film copyrights" and argued that the "unlawful distribution of copyright material is detrimental to the film and creative industries". Golden Eye is the exclusive licensee of the films of Ben Dover Productions, described as "spunktastic hardcore" movies.

Ruling in their favour yesterday, Mr Justice Arnold judged that risque filmmakers had a right to protect their intellectual property:

The mere fact that the copyright works are pornographic films is no reason to refuse the grant of relief, since there is no suggestion that they are obscene or otherwise unlawful. Golden Eye and Ben Dover Productions have a good arguable case that many of the relevant Intended Defendants have infringed their copyrights.

The judge said that disclosure was necessary for the claimants to protect their interests, and that their right to protect their erotica outweighed the O2 customers' right to privacy.

The demands of 12 other British filmmakers and porn houses associated with the case, including SweetMeats, Easy on the Eye and One-Eyed Jack Film productions, were rejected as it was ruled that Golden Eye didn't have the rights to sue for profit on their behalf.

In the judgment Golden Eye came in for some stick for its ACS:Law-style tactics of sending out aggressive legal letters to people suspected of copyright infringement. Typical Golden Eye letters requested £700 from the recipient and threatened a court case if the affair was not settled.

A Telefonica-O2 spokesperson said: “Clearly we respect the court order and will therefore be cooperating fully.” ®

Designing a Defense for Mobile Applications

More from The Register

next story
Just TWO climate committee MPs contradict IPCC: The two with SCIENCE degrees
'Greenhouse effect is real, but as for the rest of it ...'
Adam Afriyie MP: Smart meters are NOT so smart
Mega-costly gas 'n' 'leccy totting-up tech not worth it - Tory MP
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.