In a surprisingly sane ruling Washington District Judge Robert Lasnik found that an IP address is not sufficient evidence of the identity of a copyright infringer. The case involved the B-movie Elf-Man, whose production company have gained notoriety through trollish attacks on people alleged to have downloaded the movie over bittorrent.
Ruling on a motion to dismiss filed on behalf of one of the defendants, Judge Lasnik notes that part (b) is not a valid claim.
“[The movie studio] has actually alleged no more than that the named defendants purchased Internet access and failed to ensure that others did not use that access to download copyrighted material,” Lasnik states.
In other words, the complaint itself states that the account holder may not be the person who downloaded the movie, which isn’t enough to pursue the case.
“Simply identifying the account holder associated with an IP address tells us very little about who actually downloaded ‘Elf-Man’ using that IP address,” Judge Lasnik writes.
“While it is possible that the subscriber is the one who participated in the BitTorrent swarm, it is also possible that a family member, guest, or freeloader engaged in the infringing conduct,” he adds.
As a result, the defendant’s motion to dismiss was granted because the movie studio failed to state a claim for direct copyright infringement, contributory infringement and indirect infringement. The copyright holder is allowed to file an updated complaint, but doubts that the movie studio will be able to make a valid claim.
Judge: IP-Address Does Not Prove Copyright Infringement
Charles Duan from Public Knowledge sends us “a video we put together for Fair Use Week about copyright and fair use, to the tune of ‘Let It Go’ from Frozen, and full of clips of other fair use videos.”
An excellent excerpt from Aaron Perzanowski and Jason Schultz’s The End of Ownership: Personal Property in the Digital Economy on Motherboard explains how Section 1201 of the 1998 Digital Millennium Copyright Act — which bans tampering with or bypassing DRM, even for legal reasons — has allowed corporations to design their products so that using […]
Securelist’s report on the security vulnerabilities in Android-based “connected cars” describes how custom Android apps could be used to find out where the car is, follow it around, unlock its doors, start its engine, and drive it away.
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]