Proof of piracy not needed says MPAA

Powered by SC Magazine
 

An attorney for the Motion Picture Association of America (MPAA) has suggested that the organisation should not have to provide proof of piracy in future trials..

In a filing in the case of Capitol Records verses Jammie Thomas MPAA attorney Marie L. van Uitert wrote that as evidence was often difficult to collect the plaintiff should not have to provide it. Thomas is accused of making 24 songs available to downloaders and is being sued for up to US$150,000 per song.

"Mandating such proof could thus have the pernicious effect of depriving copyright owners of a practical remedy against massive copyright infringement in many instances," she said.

"It is often very difficult, and in some cases, impossible, to provide such direct proof when confronting modern forms of copyright infringement, whether over P2P networks or otherwise; understandably, copyright infringers typically do not keep records of infringement."

Thomas has already been fined US$220,000 for copy infringement after the judge in the original case instructed the jury to accept the argument that storing songs in a shared folder was evidence enough of piracy. He has since said he may have made a mistake and has asked for more information.

"The specious 'making available' argument threatens to brand people as thieves when the evidence isn't really there," said EFF Senior Intellectual Property Attorney Michael Kwun.

"We're pleased the judge is taking a second look at this critical question."

Thomas’ legal team is claiming that as there is no evidence that anyone actually downloaded the music there is no case to answer. The judge is now deciding whether or not to allow her leave to appeal.

The Thomas case was the first pirtacy action for music file sharing to come to trial and the win was seen as a major vicotry for media companies and one that would make future prosecutions a lot easier.

Copyright ©v3.co.uk


 
 
 
Top Stories
There's no coke and hookers in the cloud
[Blog post] Where did the love go?
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1043

Vote