Feeds

Telcos can be forced to turn copyright cop, block websites – EU law man

Pirates can be choked... 'in principle', advocate general advises

Beginner's guide to SSL certificates

ISPs across Europe can be instructed to block websites that provide access to pirated material, an EU advocate general said in a non-binding court opinion published yesterday.

Pedro Cruz Villalón said that telcos can be ordered to, in effect, operate as buffers between their subscribers and site operators who infringe copyright laws in Europe by policing access to that content over their networks.

The Court of Justice opinion [PDF] in Luxembourg came after Austria's Supreme Court sought guidance from the EU to determine what role ISPs should play in helping to enforce copyright regulations, following a legal dispute between telco UPC Austria and two film companies in the country.

It asked the advocate general to consider whether an ISP that provides internet access to its customers who then fire up websites that carry illegal material should be seen as an intermediary whose services are used by a third party - such as the operator of a site with pirated content on it.

The advocate general agreed that a telco could be viewed as an intermediary in such a case and said that its services are, in turn, used by copyright infringers.

Courts could therefore slap injunctions on ISPs after weighing "the fundamental rights of the parties", the CoJ opinion said.

“A specific blocking measure concerning a specific website is not disproportionate, in principle," the advocate general added.

Such a block would have to apply only to illegal content found online.

Judges in the Court of Justice are not required to be bound by the advocate general's views. They will deliberate the case before passing judgment over the course of the next few months.

It's rare for the EU's highest court to dismiss such opinions, however.

Here in the UK, orders instructing ISPs to block access to websites carrying access to pirated material have been on the increase, despite the fact that workarounds to such bans are a few clicks away online. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.