Feeds

Hamburg court: Google must police YouTube content

GEMA notches up another copyright victory

Providing a secure and efficient Helpdesk

German composers and music publishers' society GEMA has notched a copyright victory in its long-running dispute with Google. A Hamburg court ruled that The Chocolate Factory is responsible for what it publishes, and may need to install filters on uploaded video material.

What's it all about?

GEMA summarised its case (in English) here last year. GEMA accused Google of dragging its feet and failing to come to a mutually agreeable licensing deal.

GEMA pointed out that its compulsory licence means it can’t close anybody down, or prevent them from using music. The society explained:

German law stipulates GEMA is obligated to grant every licensee, in other words also YouTube, the rights it administers.... GEMA cannot prevent the use of its rights if YouTube – like a large number of other users – would have adhered to the legally prescribed rules (depositing the disputed portion of the compensation into escrow).

But the nature of the compulsory licence doesn’t mean Google can take the mickey, either. GEMA says Google stalled negotiations on paying the creators, saving it costs, while reaping the advertising revenues from the content.

YouTube, however, decided to use the rights administered by GEMA without paying any royalties to GEMA – which, in GEMA's viewpoint, represents a violation of copyright law, and has even more substance in the case of Google, as large amounts of advertising revenue are generated with YouTube.

The European Court of Justice has ruled that ISPs can’t keep filters turned on 24x7 – this would violate users’ reasonable expectations of privacy. But it didn’t, as was widely misreported, mean filters were “illegal in Europe”. A service still has obligations over what it transmits.

Last March GEMA obliged RapidShare to be more pro-active in policing uploads for infringing material. This week it claimed it’s up to the challenge – and encouraged other cyberlockers to join it. ®

Protecting against web application threats using SSL

More from The Register

next story
Microsoft changes cert test providers, hints at fun new exams
If you really love taking tests with Prometric, do 'em before Christmas
Blighty's mighty tech skills shortage drives best job growth in years
Doesn't anyone know anything about SQL? Or Java? Or Linux? Or programming? Or...
Amazon hiring in Australia for 'new and confidential Amazon Fresh initiative'
Is Jeff Bezos moving his grocery business beyond the US West Coast?
Symantec security chap signs for CSIRO's ICT In Schools
Vulture South is closing in on our goal of 20 new recruits to help teachers and kids
A-level results: Before you smile at that jump-for-joy snap...
Uni-ditching teens are COMING FOR YOUR JOBS
How to promote CSIRO's ICT in Schools in your community
Vulture South is closing in on its target to find volunteers to help teach tech in schools
Everyone's an IoT expert but now there's a certificate to prove it
Cisco creates Certification of Things for industrial sensor-footlers
Facebook wants Linux networking as good as FreeBSD
Help The Social NetworkTM make the kernel better
LinkedIn settles missed overtime pay case: Will pay $6m to staffers
US Dept of Labor: It violated Fair Labor Standards Act
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.