Feeds

Net access restrictions lifted for ‘Megaupload four’

Dotcom also allowed to go swimming, record an album

The Power of One eBook: Top reasons to choose HP BladeSystem

As the “Megupload conspiracy” case grinds on, a New Zealand District Court judge has reinstated Internet access to the four key co-accused, Matthias Ortmann, Finn Batato, Bram van der Kolk and Kim Dotcom.

In a curious addendum to the applications, heard yesterday before judge David Harvey, Dotcom has also had two other variations to his bail conditions: he is allowed to go swimming “at a specified time each day for a specified period of up to 1½ hours”, and with the bail assessor’s permission, can visit Round Head Studios in Auckland, where he is apparently recording an album.

Reporting Dotcom’s counsel’s request for access to the studio, the judge said the album is being recorded “with the assistance and participation of international recording artists”.

Curiously, the USA – represented by NZ Crown lawyer Anne Toohey – opposed the studio visits but not the Internet access. In trying to keep Dotcom away from Round Head Studios, Toohey had said there was no evidence that the recording venture was actually taking place or had any chance of success, to which the judge responded that “notoriety alone could well be a marketing angle” for the recording.

However, Dotcom will need to provide the bail assessor with evidence of his studio visits – for example, by way of sending a photograph of himself at Round Head’s reception desk to the bail assessor.

Citing the defendants’ “exemplary” behavior while on bail, the judge also decided to vary their bail conditions to allow meetings between the four, and Dotcom is to be allowed back into the Coatesville mansion he occupied up until the January arrests.

Blogger Lawgeek NZ has posted the judge's decision here.

In America, the first EFF-supported action to recover users' files from the seized Megaupload servers has begun. Kyle Goodwin, operator of high school sports reporting site OhioSportsNet, is asking a US court to return video files lost when Megaupload was shut down by the FBI. ®

Top three mobile application threats

More from The Register

next story
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.