Oregon: Ground Zero in fight between RIAA, alleged music pirates?
Legal tactics used to identify pirates are under fire
Computerworld - Oregon is fast becoming Ground Zero in the contentious battle between the Recording Industry Association of America (RIAA) and the tens of thousands of consumers it accuses of illegal music sharing.
The state Attorney General's office this week filed an appeal in U.S. District Court in Oregon calling for an immediate investigation of the evidence presented by the RIAA when it subpoenaed the identities of 17 students at the University of Oregon who allegedly infringed music copyrights. It is the second time in a month that Oregon Attorney General Hardy Myers has resisted attempts by the RIAA to force the university to turn over the names of individuals it says shared music illegally.
Officials at the RIAA could not immediately be reached for comment.
"It is a really huge step when the head law enforcement officer of a state wants to investigate the RIAA's evidence-gathering techniques," said Ray Beckerman, a New York-based lawyer who has been defending individuals in RIAA lawsuits.
Myers' move raises fundamental -- and overdue -- questions about the tactics used by the RIAA in its campaign against alleged music pirates, Beckerman said. "The RIAA has been bringing fake copyright infringement lawsuits, the sole purpose of which is to get the names and addresses of John Does," he said. They then drop the case and try to pressure these individuals into settling based on dubious evidence at best, he said.
In a 15-page brief filed Wednesday, Oregon's assistant attorney general, Katherine Von Ter Stegge, said that while it is appropriate for victims of copyright infringement to pursue statutory remedies, that pursuit had to "tempered by basic notions of privacy and due process.
"The record in this case suggests that the larger issue may not be whether students are sharing copyrighted music," the state's brief noted. Rather it is about whether the litigation strategies adopted by the RIAA are appropriate or capable of supporting their claims.
For example, the individual in whose name the subpoena was issued had no first-hand information about the alleged misconduct of the students or the subsequent investigations by the RIAA, the appeal filed by Myers' office noted.
The data mining techniques that the RIAA used also only show that certain copyrighted music files existed along with software that could be used to share these files. But it does not show how the music files were originally obtained or whether the files were actually illegally shared thereafter. As a result, all that was shown was a potential for misuse not actual misuse, the AG noted in court papers.
The brief also questioned whether the RIAA's investigators themselves might have illegally accessed and uploaded private confidential information not related to copyright infringement, that might have been stored on the computers of people being investigated. "Without reciprocal discovery, there is no process to assess precisely how invasive the plaintiffs' investigation was with regard to the John Does named in this suit," the brief said.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Legal White Papers | Webcasts