Feeds

How iiNet beat Big Content

Lawyers explain the crucial bits of the case

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

More tasty bits from the judgement

Other interesting bits from the judgement include an observation, at section 116, that by suggesting iiNet had a duty of care to act on its evidence, AFACT was asking for an awful lot.

“... the width of the terms in which the proposed duty is cast would present iiNet and other ISPs with an uncertain legal standard for the conduct of their operations,” the judgement says. “Further, as counsel for Alliance submitted, this would achieve for copyright owners, but at the expense of the ISP, the suspension or disconnection by their ISP of subscribers from the internet, a remedy which would not be available to the copyright owners were they themselves to sue the subscriber

The court also found, at section 64, that “iiNet had no direct technical power at its disposal to prevent a customer from using the BitTorrent system to download the appellants' films.” One reason the court felt iiNet could not prevent torrenting was that while each iiNet customer has one dynamically-assigned IP address, it is impossible to identify which of possible multiple users was conducting illegal downloads. ®

Intelligent flash storage arrays

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.