Feeds

Hamburg court: Google must police YouTube content

GEMA notches up another copyright victory

3 Big data security analytics techniques

German composers and music publishers' society GEMA has notched a copyright victory in its long-running dispute with Google. A Hamburg court ruled that The Chocolate Factory is responsible for what it publishes, and may need to install filters on uploaded video material.

What's it all about?

GEMA summarised its case (in English) here last year. GEMA accused Google of dragging its feet and failing to come to a mutually agreeable licensing deal.

GEMA pointed out that its compulsory licence means it can’t close anybody down, or prevent them from using music. The society explained:

German law stipulates GEMA is obligated to grant every licensee, in other words also YouTube, the rights it administers.... GEMA cannot prevent the use of its rights if YouTube – like a large number of other users – would have adhered to the legally prescribed rules (depositing the disputed portion of the compensation into escrow).

But the nature of the compulsory licence doesn’t mean Google can take the mickey, either. GEMA says Google stalled negotiations on paying the creators, saving it costs, while reaping the advertising revenues from the content.

YouTube, however, decided to use the rights administered by GEMA without paying any royalties to GEMA – which, in GEMA's viewpoint, represents a violation of copyright law, and has even more substance in the case of Google, as large amounts of advertising revenue are generated with YouTube.

The European Court of Justice has ruled that ISPs can’t keep filters turned on 24x7 – this would violate users’ reasonable expectations of privacy. But it didn’t, as was widely misreported, mean filters were “illegal in Europe”. A service still has obligations over what it transmits.

Last March GEMA obliged RapidShare to be more pro-active in policing uploads for infringing material. This week it claimed it’s up to the challenge – and encouraged other cyberlockers to join it. ®

High performance access to file storage

More from The Register

next story
From corporate bod to startup star: The 10-month gig that changed everything
What I learned as a techie in my time away from globo firms
Facebook snubbed Google's Silicon Valley wage-strangle pact, Sheryl Sandberg claims
Report details letter COO wrote to court addressing 'no-compete deal' lawsuit
Another day, another nasty Android vuln
Memory corruption mess can brick your mobe
Barclays warns freelance techies of DOUBLE DIGIT rate cut
'IT was a car crash before, so this isn't going to get any better' - sources
VMware announces compulsory bi-ennial VCP recertification
Downside: more time and money; Upside: VMware hints at two-yearly release cycle
Sysadmins and devs: Do these job descriptions make any sense?
Industry lobby group defines skills used in 25 common IT jobs
Who earns '$7k a month' but can't even legally drink? A tech intern!
Glassdoor reveals astonishing salaries of Silicon Valley undergrads
Your CIO is now a venture capitalist and you work at their startup
This just happened without you changing job, by the way
Turnover at the top in Oz telco-land as AAPT, Huawei, Optus, lose top brass
Move along, nothing to see here but orderly transitions
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.