IDG News Service - The U.S. Federal Communications Commission should avoid adopting strict net neutrality rules that would limit broadband providers' flexibly to "address" illegal online file sharing, the Recording Industry Association of America said in comments filed with the FCC on Thursday.
Internet service providers should have authority to block subscribers from sharing music and other files without permission of the copyright owner, the RIAA said. "ISPs are in a unique position to limit online theft," the RIAA said in its comments. "They control the facilities over which infringement takes place and are singularly positioned to address it at the source. Without ISP participation, it is extremely difficult to develop an effective prevention approach."
The FCC should not only avoid rules prohibiting ISPs from blocking illegal file trading, but it should actively encourage ISPs to do so, the RIAA said.
The deadline for a first round of comments in the FCC's net neutrality/open Internet proceeding was late Thursday. The FCC's Web site received 150 electronically filed comments in the net neutrality/open Internet proceeding on Thursday alone, while the commission has received tens of thousands of comments since it voted to launch the rulemaking proceeding in October.
Groups on both sides of the issue said more than 10,000 individuals supporting their side have filed comments in the proceeding.
Several large ISPs have rejected an RIAA suggestion that they kick subscribers out after three copyright violations. The FCC launched its net neutrality proceeding prompted in part by Comcast's decision to throttle subscribers' use of the BitTorrent peer-to-peer file-sharing service, although Comcast said its reason was related to network congestion, not illegal file trading.
The FCC, however, suggested that broadband providers be allowed to engage in "reasonable network management," including preventing the "lawful transfer of content," in a notice of proposed rulemaking released in October.
Illegal filing sharing and congestion are closely related, said the RIAA, which was among the dozens of groups that filed comments in the net neutrality/open Internet proceeding before a midnight Thursday deadline for the first round of comments. P-to-P networks make up about 20 percent of Internet traffic, the group said.
"Piracy, particularly piracy conducted by high-volume users, notoriously hogs bandwidth," the RIAA said. "Piracy wastes scarce network resources and crowds out legitimate uses of the network. It costs more to bring broadband to additional areas because of this inflated bandwidth usage."
Other groups called on the FCC to stay out of the copyright enforcement business. If ISPs are required to check for copyright infringement, they could interfere with legal online activities, said six digital rights and business groups, including Public Knowledge, the Consumer Electronics Association and the Electronic Frontier Foundation.
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Why Projects Fail
- CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings
- This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools
- The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution
- In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence... All Government IT White Papers
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- How to Protect Enterprise Data Yet Enable Secure Access for End Users Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT...
- All Government IT Webcasts