Feeds

Hurricane Sandy blows US pirate-pestering plan into 2013

Dear Cutlass Bob, please stop stealing all our stuff

  • alert
  • submit to reddit

The Power of One Infographic

The voluntary US copyright scheme designed to head off anti-piracy legislation has been delayed again - this time, because of Hurricane Sandy. The Center for Copyright Information (CCI) says alerts won't now be sent out to serial infringers until early 2013.

"Due to unexpected factors largely stemming from Hurricane Sandy which have seriously affected our final testing schedules, CCI anticipates that the participating ISPs will begin sending alerts under the Copyright Alert System in the early part of 2013, rather than by the end of the year," the body said in a statement.

CCI is a body set up with the five biggest US ISPs and the creative industries to tackle online piracy. Under the scheme, copyright industries must make the complaints but they don't get to find out who the infringer is - a compromise intended to preserve users' privacy. They still need a court order to obtain an infringer's identity. ISPs aren't allowed to cut subscribers off from "essential services" such as email - but can slow down the connections of persistent infringers.

It's not what either side ideally wants, but it might be the best they get. ISPs fend off new legislation and get to preserve their safe harbour liabilities - while copyright industries hope to get serial pirates to change their behaviour.

A similar agreement was reached between British ISPs and copyright industries in the UK in 2008 - which envisaged educational letters going out to serial infringers. But trust broke down, and legislation was introduced in 2010.

"I'm still wrestling philosophically with how to engage with and sell to people you've disconnected in the first place. You need to provide them with the music they want, on a platform they want, at a price they want," former Undertone Feargal Sharkey said at the time.

Warning! Black Helicopters

Ofcom confirmed last week that it doesn't expect letters to go out to UK internet subscribers until 2014.

An FAQ on the US scheme can be found here. But if you're a blogger, feel free to ignore this: just close your eyes and imagine black helicopters swooping from the skies. ®

Mobile application security vulnerability report

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.