Feeds

Hamburg court: Google must police YouTube content

GEMA notches up another copyright victory

5 things you didn’t know about cloud backup

German composers and music publishers' society GEMA has notched a copyright victory in its long-running dispute with Google. A Hamburg court ruled that The Chocolate Factory is responsible for what it publishes, and may need to install filters on uploaded video material.

What's it all about?

GEMA summarised its case (in English) here last year. GEMA accused Google of dragging its feet and failing to come to a mutually agreeable licensing deal.

GEMA pointed out that its compulsory licence means it can’t close anybody down, or prevent them from using music. The society explained:

German law stipulates GEMA is obligated to grant every licensee, in other words also YouTube, the rights it administers.... GEMA cannot prevent the use of its rights if YouTube – like a large number of other users – would have adhered to the legally prescribed rules (depositing the disputed portion of the compensation into escrow).

But the nature of the compulsory licence doesn’t mean Google can take the mickey, either. GEMA says Google stalled negotiations on paying the creators, saving it costs, while reaping the advertising revenues from the content.

YouTube, however, decided to use the rights administered by GEMA without paying any royalties to GEMA – which, in GEMA's viewpoint, represents a violation of copyright law, and has even more substance in the case of Google, as large amounts of advertising revenue are generated with YouTube.

The European Court of Justice has ruled that ISPs can’t keep filters turned on 24x7 – this would violate users’ reasonable expectations of privacy. But it didn’t, as was widely misreported, mean filters were “illegal in Europe”. A service still has obligations over what it transmits.

Last March GEMA obliged RapidShare to be more pro-active in policing uploads for infringing material. This week it claimed it’s up to the challenge – and encouraged other cyberlockers to join it. ®

The essential guide to IT transformation

More from The Register

next story
How to promote CSIRO's ICT in Schools in your community
Vulture South is closing in on its target to find volunteers to help teach tech in schools
A-level results: Before you smile at that jump-for-joy snap...
Uni-ditching teens are COMING FOR YOUR JOBS
Symantec security chap signs for CSIRO's ICT In Schools
Vulture South is closing in on our goal of 20 new recruits to help teachers and kids
Everyone's an IoT expert but now there's a certificate to prove it
Cisco creates Certification of Things for industrial sensor-footlers
Facebook wants Linux networking as good as FreeBSD
Help The Social NetworkTM make the kernel better
LinkedIn settles missed overtime pay case: Will pay $6m to staffers
US Dept of Labor: It violated Fair Labor Standards Act
NICTA man explains why he volunteers for CSIRO's ICT in Schools
'I feel fantastic after the sessions - It's the best part of my job' says volunteer
The Register is HIRING technology hacks for the WORLD
Live on Earth? Want to be a Vulture? Enquire within
Pleased to meet you. I'm Joe Bloggs, MVP, vExpert, Cisco Champ
What a mouthful. Do customers care? Six title-holders quizzed
MoJ IT workers 'n' pals extend strike action over privatisation
Fears of cuts when shared services gig moves to Steria
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.