Day 17: iiNet clutching at legal "splinters", studios claim

 

Film industry says case law in their favour.

Barristers representing the film industry claimed today in the Federal Court that case law referenced in iiNet's defence could potentially work against the ISP.

As the copyright case between the two parties entered its second day of closing statements, the film industry spent a considerable portion of the morning session presenting to Justice Cowdroy its reading of various judgements, including Adelaide Corporation v. Australasian Performing Rights Association, which iiNet had previously referenced in its defence.

The film industry's lead barrister Tony Bannon claimed that the Adelaide judgement supported the film industry's argument rather than iiNet's.

"Like much of the approach of iiNet in this case, they're grabbing onto splinters of statements in cases but also splinters of evidence in statutes," Bannon told the court.

"iiNet's argument is 'Please find our reasonable agreement which we reasonably entered into with our customers would be unreasonable for us to enforce'."

Bannon said that was "an absurd contention. But it's what they're driven to."

Bannon also revisited the allegation that iiNet was profiting from keeping illegal downloaders on its network.

He said that the structure of iiNet's internet plans, where there was a named account holder "without limitation of who may use the account", fed into the ISP's commercial interests.

"[iiNet chief Michael] Malone accepted it was in iiNet's commercial interest to be able to offer plans which did not require usage of the service to be limited to the named customer [account holder]," Bannon said.

"iiNet wants the benefit of selling plans which don't restrict usage to a particular customer. They derive the benefit of unnamed persons being able to access that customer [internet] account."

This was because the ISP had a commercial interest in maximising demand for bandwidth quota, it was alleged.

"[Malone's] evidence was there was a commercial objective to attract as many customers as possible but also to push them up to higher plans. Higher plans mean more money," Bannon alleged.

"The very persons with demand for bandwidth [quota] had an interest in downloading, and downloads count to your bandwidth quota unless you're doing it in the freezone.

"The very persons they [iiNet] have an interest in making money out of would be the very persons not interested in using freezone."

The case continues. You can follow the case in-full here. For a background on the case, click here.


Day 17: iiNet clutching at legal "splinters", studios claim
 
 
 
Top Stories
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
Amazon forced to reboot EC2 to patch Xen bug
Rolling restarts over next week.
 
Vodafone reveals plans to store users' online activity
Says retrieval under Govt proposal will impose massive cost.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Constantly rushing to the printer to stop other people seeing your printouts?
Sep 24, 2014
Lexmark's latest family of small-business printers include a feature that lets you stop anyone ...
This 4G smartphone costs $219
Sep 3, 2014
It's possible to spend a lot less on a smartphone if you're prepared to go with a brand you ...
Looking for storage? Seagate has five new small business NAS devices
Aug 22, 2014
Seagate has announced a new portfolio of Networked Attached Storage (NAS) solutions specifically ...
Run a small business in western Sydney?
Aug 15, 2014
This event might be of interest if you're looking to meet other people with a similar interest ...
Buying a tablet? Microsoft's Surface Pro 3 goes on sale this month
Aug 8, 2014
Microsoft has announced its Surface Pro 3 will go on sale in Australia on 28 August from ...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1350

Vote