Feeds

O2, Be Broadband axe Pirate Bay access

Blockade to appear overnight

Secure remote control for conventional and virtual desktops

Telefonica, which owns the O2 brand and fixed-line provider Be Broadband, is implementing a High Court order to block conventional web access to file-sharing search engine The Pirate Bay.

O2 confirmed to The Register that it will join BSkyB, Virgin Media and Everything Everywhere by cutting off www.thepiratebay.se from its network.

“The main UK internet providers were ordered by the High Court to block access to specific IP address and URLs used by The Pirate Bay website. We have no option but to comply with this order and will be doing so overnight,” an O2 spokeswoman said today.

Meanwhile, Be Broadband put out a statement on its blog late on Wednesday that immediately angered some of its customers. It said:

Overnight we'll be implementing a network-wide block of known Pirate Bay websites to comply with the court ruling in late April.

Legally we need to comply with court orders but wherever possible we leave it up to you.

Be Broadband also provided a screenshot of what its subscribers can expect to see when they attempt to access The Pirate Bay, whose administrators and users were ruled in February to be liable for infringement of music companies' copyright.

Some Be Broadband customers hit back by claiming they would take their "business elsewhere".

Two telcos are yet to comply with the order: TalkTalk has until 13 June to do so, while national telecoms giant BT has been granted more time.

A spokesman for music lobbying group the BPI, which represented the nine record labels in the UK listed as claimants on the High Court judgment, told El Reg that BT was expected to come to an agreement with BPI "in due course".

We asked TalkTalk to comment on this story, but it hadn't got back to us at time of writing. ®

Bootnote

Guys, we will close comments for this article if you keep trying to post workarounds.

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
Trans-Pacific: Google spaffs cash on FAST undersea packet-flinging
One of 6 backers for new 60 Tbps cable to hook US to Japan
Tech city types developing 'Google Glass for the blind' app
An app and service where other people 'see' for you
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
UK mobile coverage is BETTER than EVER, networks tell Ofcom
Regulator swallows this line and parrots it back out at us. What are they playing at?
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.