Feeds

Kiwi three strikes piracy case collapses

Accused had never seen, and had no idea how to use, file-sharing software

SANS - Survey on application security programs

One of the first three cases brought under New Zealand's controversial three strikes copyright infringement has collapsed after the accused demonstrated no knowledge of file-sharing software.

Civil liberties group Tech Liberty NZ reports the case collapsed because the accused had no idea how file-sharing software worked.

But the accused, a student, was the named account-holder for the internet service at a shared house in which she lived, making it likely that one of her flatmates was responsible for the digital naughtiness.

The student's defence also relied on the notices sent missing details required under New Zealand law. Tech Liberty NZ also says the damages sought exceeded those available under New Zealand's Copyright Act.

That Act has been been widely criticised for its 'three strikes' provision permitting internet account-holders' internet connections to be severed after three accusations of piracy.

The Recording Industry Association of New Zealand (RIANZ) has not said why it withdrew the case – the latest piece of news on the Association's site details nominees for New Zealand's imminent music awards (Kimbra looks like cleaning up, FWIW).

Tech Liberty NZ says the collapse of the case shows pirates how to circumvent the law – use someone else's internet connection – and has again called for the Copyright Act to be amended.

The collapse of the case caps a great week for technology-related-law in New Zealand, after the ongoing revelations of the government's pursuit of Kim Dotcom being horribly botched. ®

3 Big data security analytics techniques

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.