Feeds

UK 'copyright czar' Edmund Quilty quits as Blighty's Director of Copyright Enforcement

IPO Tour of Destruction 2008-2014

High performance access to file storage

Exclusive Britain's unofficial "copyright czar", Edmund Quilty, is moving on. Probably the most influential civil servant you've never heard of, Quilty has served as the Director of Copyright Enforcement and Policy at the UK patent office for six years, far longer than the typical stint for a career bureaucrat of two years.

"We can confirm that Ed Quilty, the current Director, will be moving on to another post in the civil service and that the post for Copyright and Enforcement Director has been advertised," a spokesman for the Department of Business and Skills, BiS (which in theory looks after the IPO), told us.

Separate sources confirmed that Quilty had told confidantes he was resigning in September, but was requested by his BiS Minister Lord Younger to stay on until draft copyright exceptions had been published.

Analysis

Vigorous activism by Quilty's team, including such proposals (PDF) as taking the UK out of the international copyright system entirely, prompted an All Party Parliamentary enquiry (PDF) into the conduct of the former patent office, now the Intellectual Property Office.

While ministers responsible for IP policy came and went - Quilty served under and advised five different ministers in two governments - Quilty's team set about implementing a radical copyright agenda covered extensively on this website (see links to the left).

Quilty had never worked with IP before, but took to the task of copyright reform with enthusiasm.

One of the first "big ideas" he supported was an idea to make copyright opt-in, creating a compulsory registration database of creative works - poems, photographs, news stories - so creators would have to register if they wanted to gain protection. Of course, under the Berne and WIPO Treaties copyright protection is automatic, and this breach of the treaties would prompt massive economic retaliation. Its backers later described the scheme as "voluntary".

Nevertheless the UK set about maximising every opportunity to dilute or abolish copyright protection - and has lobbied assiduously for similar changes at a European level, say sources. ("Influencing the global rights-granting agenda", is how the IPO's head John Alty describes this lobbying work) .

The justification advanced for such radical changes turned out to be flimsy, with the IPO conceding its own economic analysis was inaccurate: its original £7.9bn estimate of the overall benefit to the UK economy from the Hargreaves Review of IP was later cut. The IPO's economics attracted a highly critical investigation from Parliament's All Party IP Group chaired by John Whittingdale, and last year more criticism from a DCMS select committee enquiry into the creative industries, which advised the government to abandon the Hargreaves Review into IP. Much of the content of Hargreaves came from Quilty's team.

The IPO failed to pass orphan works legislation in the 2010 Digital Economy Act but succeeded in adding it to the bumper business bill passed last year - the so-called "Instagram Act" - although it now looks as if the UK will have two orphan works laws sitting side-by-side.

Yet perhaps the IPO's contribution to the ERR Act might be Quilty's lasting achievement. Sweeping changes to UK copyright law that affect significant economic sectors can now be passed by secondary legislation, by Statutory Instrument, without the full scrutiny of Parliament needed to amend primary legislation.

"In the copyright area, you're often talking about a cake which has to be divided up between people," Quilty told Parliament last year. "And the questions are just how big is the cake, who gets the biggest slice of it: do creators get a bigger slice, do consumers get a bigger slice?"

This is a profoundly conservative view of the world; like "zero growth". The thought of actually growing the pie so that members of future generations get paid for creating and selling their stuff didn't seem to be part of his thinking.

Perhaps in a new-look IPO, it might be. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.