Feeds

Kiwi three strikes piracy case collapses

Accused had never seen, and had no idea how to use, file-sharing software

Top three mobile application threats

One of the first three cases brought under New Zealand's controversial three strikes copyright infringement has collapsed after the accused demonstrated no knowledge of file-sharing software.

Civil liberties group Tech Liberty NZ reports the case collapsed because the accused had no idea how file-sharing software worked.

But the accused, a student, was the named account-holder for the internet service at a shared house in which she lived, making it likely that one of her flatmates was responsible for the digital naughtiness.

The student's defence also relied on the notices sent missing details required under New Zealand law. Tech Liberty NZ also says the damages sought exceeded those available under New Zealand's Copyright Act.

That Act has been been widely criticised for its 'three strikes' provision permitting internet account-holders' internet connections to be severed after three accusations of piracy.

The Recording Industry Association of New Zealand (RIANZ) has not said why it withdrew the case – the latest piece of news on the Association's site details nominees for New Zealand's imminent music awards (Kimbra looks like cleaning up, FWIW).

Tech Liberty NZ says the collapse of the case shows pirates how to circumvent the law – use someone else's internet connection – and has again called for the Copyright Act to be amended.

The collapse of the case caps a great week for technology-related-law in New Zealand, after the ongoing revelations of the government's pursuit of Kim Dotcom being horribly botched. ®

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.