Feeds

How iiNet beat Big Content

Lawyers explain the crucial bits of the case

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

The High Court's decision to dismiss Big Content's appeal of the Federal Court's decision absolving iiNet of copyright infringement relies, in part, on inadequacies in Australia's Copyright Act that may need to be dealt with by Australia's Parliament.

That's the opinion of Kay Lam-McLeod, the Principal of IT specialist law firm IDEALAW.

In an email to The Register's Richard Chirgwin, Lam-McLeod noted that section 79 of the judgement stated that “ … the concept and the principles of the statutory tort of authorisation of copyright infringement are not readily suited to enforcing the rights of copyright owners in respect of widespread infringements occasioned by peer-to-peer file sharing, as occurs with the BitTorrent system.”

The same section also notes that “The difficulties of enforcement which such infringements pose for copyright owners have been addressed elsewhere, in constitutional settings different from our own, by specially targeted legislative schemes, some of which incorporate co-operative industry protocols, some of which require judicial involvement in the termination of internet accounts, and some of which provide for the sharing of enforcement costs between ISPs and copyright owners.”

Lam-McLeod therefore concludes that “It goes back now to legislation – that’s a matter for parliament.”

The judgement says something similar at section 120, where as part of a discussion about “Technological change and copyright law” the judges state “The history of the [Copyright] Act since 1968 shows that the Parliament is more responsive to pressures for change to accommodate new circumstances than in the past. Those pressures are best resolved by legislative processes rather than by any extreme exercise in statutory interpretation by judicial decisions.”

Brendan Scott, a lawyer with micro boutique firm Open Source Law, says the case turned on the court's decision to focus on the meaning of the word “authorisation”. Scott says the Full bench of the Federal Court spent a lot of time analysing the meaning of one section of the Copyright Act, but that the High Court spent more time on that one word, with its definition underpinning the decision not to make iiNet liable for its customers' actions.

Scott points to sections 142 and 143 of the judgement, which read: 142. The "key facts" as to the "indifference" of iiNet upon which the appellants relied in this Court were four in number. They were: (i) the provision by iiNet of the internet connections, a necessary but insufficient step for the acts of primary infringement; (ii) the technical ability of iiNet to control the use of its service and its contractual ability to issue warnings and suspend or terminate accounts; (iii) the evidence provided by the AFACT Notices given before and after suit; and (iv) the absence of action by iiNet in response to the AFACT Notices. 143.These matters, taken together, do not establish a case of authorisation of those primary infringements which are the Scheduled Infringements in respect of the authorisation of which the appellants seek relief in this Court. The progression urged by the appellants from the evidence, to "indifference", to "countenancing", and so to "authorisation", is too long a march.  The phrase “too long a march,” Scott feels, is important because in his opinion “The action was trying to extend the law, and trying to take it quite a way further than it has gone in the past.”

Another reason for iiNet's win, says Fiona Philiips, Executive Director of the Australian Copyright Council, is that the evidence provided by the Australian Federation Against Copyright Theft was contentious.

“The difficulty with the case was the nature of the notices,” she said. “You could not differentiate the notices from AFACT and the data from bots.” The judgement notes this issue, saying

Phillips said that the judgement means “we now have a clear statement from five High Court judges on authorisation liability and that is important to give certainty to business models.”

Phillips added that the decision shows that the best way to address the issue of illegal downloads is “for industry players to develop codes of conduct and come to some agreement. Hopefully this decision will provide an impetus for that, as it is the best practical outcome.”

The judgement mentions industry codes at least twice. At section 75 it argues that iiNet did no wrong in refusing to act on AFACT's evidence because it would have needed to understand the methodology used to gather evidence before taking any action, or face legal action by customers whose accounts were wrongly terminated. “These considerations highlight the danger to an ISP, which is neither a copyright owner nor a licensee, which terminates (or threatens to terminate) a customer's internet service in the absence of any industry protocol binding on all ISPs, or any, even interim, curial assessment of relevant matters.” At section 139 the judges write that while iiNet could have terminated customers from its services, “ … in the absence of an effective protocol binding ISPs (and there is no such protocol) the iiNet subscribers whose agreements were cancelled by iiNet would be free to take their business to another ISP.”

Phillips nonetheless said that a teenaged torrenter would feel “pretty happy” today. “The concerning thing about the judgement is the message it sends,” she said. “You would hope that ISPs still had appropriate polices policies regarding infringements.”

iiNet CEO Michael Malone said he wants to talk to Big Content.

"Increasing the availability of licensed digital content is the best, most practical approach to meet consumer demand and protect copyright," Malone said in a statement.

"We have consistently said we are eager to work with the studios to make their very desirable material legitimately available to a waiting customer base - and that offer remains the same today."

3 Big data security analytics techniques

More from The Register

next story
EU: Let's cost financial traders $400m a day, because EVIL BANKERS. Right?
Wait 'til this one hits your pension fund where it hurts
Systems meltdown plunges US immigration courts into pen-and-paper stone age
Massive outage could last four weeks, sources claim
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
UK.gov chucks £28m at F1 tech for buses and diggers plan
Well, not really F1 but who's heard of LMP and VLN*?
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.