In a surprisingly sane ruling Washington District Judge Robert Lasnik found that an IP address is not sufficient evidence of the identity of a copyright infringer. The case involved the B-movie Elf-Man, whose production company have gained notoriety through trollish attacks on people alleged to have downloaded the movie over bittorrent.
Ruling on a motion to dismiss filed on behalf of one of the defendants, Judge Lasnik notes that part (b) is not a valid claim.
“[The movie studio] has actually alleged no more than that the named defendants purchased Internet access and failed to ensure that others did not use that access to download copyrighted material,” Lasnik states.
In other words, the complaint itself states that the account holder may not be the person who downloaded the movie, which isn’t enough to pursue the case.
“Simply identifying the account holder associated with an IP address tells us very little about who actually downloaded ‘Elf-Man’ using that IP address,” Judge Lasnik writes.
“While it is possible that the subscriber is the one who participated in the BitTorrent swarm, it is also possible that a family member, guest, or freeloader engaged in the infringing conduct,” he adds.
As a result, the defendant’s motion to dismiss was granted because the movie studio failed to state a claim for direct copyright infringement, contributory infringement and indirect infringement. The copyright holder is allowed to file an updated complaint, but doubts that the movie studio will be able to make a valid claim.
Judge: IP-Address Does Not Prove Copyright Infringement
Denuvo bills itself as the best-of-breed in games DRM, the most uncrackable, tamper-proof wrapper for games companies; but its reputation tells a different story: the company's products are infamous for falling quickly to DRM crackers and for interfering with game-play until you crack the DRM off the products you buy.
Locking bootloaders with trusted computing is an important step towards protecting users from some of the most devastating malware attacks: by allowing the user to verify their computing environment, trusted computing can prevent compromises to operating systems and other low-level parts of their computer's operating environment.
The Yokohama Board of Education has posted scans of six fantastic catalogs from Hirayama Fireworks and Yokoi Fireworks, dating from the early 1900s. The illustrated catalogs are superb, with minimal words: just beautiful colored drawings depicting the burst-pattern from each rocket.
A picture can be worth a heck of a lot more than just a thousand words. If you’ve squinted for ages trying to get just the right photo, you might have the right passion for a career behind the camera. You might even have the right equipment, but do you have the know-how? The Beginner-To-Expert […]
In case you hadn’t noticed from the sleigh bell-heavy music and the hues on your Starbucks cup, the holiday season hasn’t shown any more patience this year. But that doesn’t need to be a bad thing, especially if you’re hoping to get a jump on your shopping. Retailers aren’t waiting til Black Friday to dish […]
What do you get for the techie who has everything? How about giving them a Raspberry Pi and letting them make pretty much anything. Or better yet, do it for yourself with the Ultimate Raspberry Pi eBook Bundle. This trove of ideas and education unlocks the unlimited potential of this mini-computer, whose affordability and versatility […]