Feeds

Prince sues 22 music file-sharers for ONE MEEELLION dollars each

Bootleg concert recordings in dispute

The essential guide to IT transformation

Prince Rogers Nelson – the artist currently known as Prince – has filed lawsuits against 22 people for $1m in damages apiece, alleging that each posted links to bootleg recordings of his concerts on file-sharing networks.

According to court documents [PDF] obtained by The Register, the Purple One has named Dan Chodera, Karina Jindrova, and 20 other pseudonymous defendants whom he claims are each responsible for "up to thousands of separate acts of infringement and bootlegging."

"The Defendants rely on either Google's Blogger platform or Facebook, or both, to accomplish their unlawful activity," the suit alleges. "Defendants, rather than publishing lawful content to their blogs, typically publish posts that list all the songs performed at a certain Prince live show and then provide a link to a file sharing service where unauthorized copies of the performance can be downloaded."

According to Prince's attorneys, such behavior constitutes copyright infringement, "unauthorized fixation" – a legal term that means someone is offering a recording of a performance that was made without permission – and "contributory copyright infringement and bootlegging."

This is hardly the first time the pint-sized Purple Rain star has lobbed sue balls at alleged enthusiastic internet freetards. The artist formerly known as a weird symbol has been filing similar lawsuits as far back as 2007, and he's also known for aggressively policing YouTube for videos that include his songs.

In 2010, Prince – who once exhorted 1980s club-goers to "party like it's 1999" – declared the internet "completely over," saying: "I don't see why I should give my new music to iTunes or anyone else. They wont pay me an advance for it and then they get angry when they can't get it."

In this case, however, it seems it's Prince himself who is a bit steamed, as his suit alleges that the defendants caused him "substantial, immediate and irreparable injury ... for which there is no adequate remedy at law."

The accused parties – both named and unnamed – "constitute an interconnected network of bootleg distribution," the court filing claims, further asserting that each defendant "was the agent, servant, employee, joint venturer and/or co-conspirator" of the others.

The suit seeks as much in damages as can be proven, which it claims should be "no less than $1 million" from each defendant. In addition, Prince has asked for further statutory damages to punish the defendants, and he would like to have his legal costs paid. ®

The essential guide to IT transformation

More from The Register

next story
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.