British music industry bids to block three more file-sharing sites
The British Phonographic Industry (BPI) is seeking court orders to block three torrent sites
IDG News Service - The British Phonographic Industry (BPI) is seeking to block file-sharing sites Fenopy, H33t and Kickass Torrents, the BPI said on Tuesday.
"We are seeking court orders requiring ISPs to block access to three infringing websites," said BPI Director of Communications, Adam Liversage, in an email. The BPI wants the U.K. ISPs BT, Sky, Virgin Media, O2, Everything Everywhere and TalkTalk to block access to these sites, Liversage said.
"The matter is currently being considered by the court and it isn't appropriate to comment further at this point," he added.
BPI's bid to get court orders to block the torrent sites follows a ruling by the British High Court ordering U.K. ISPs to block access to The Pirate Bay in April last year. The ISPs were asked to block access voluntarily, but refused without court orders.
The Pirate Bay ruling, as well as a 2011 ruling forcing BT to block Newzbin2, paved the way for more sites to be blocked, said U.K. consumer rights organization Open Rights Group (ORG) in a blog post on Monday.
"Website blocking is an extreme response. There are growing fears this precedent will make it too easy and quick to block sites. Time needs to be taken to consider the legitimate use of the sites," the ORG said. Furthermore, user rights are not well-represented in these cases, according to ORG.
Therefore, the ORG is planning to start influencing the legal process by hiring a legal officer to ensure user rights are adequately represented in the future, said Jim Killock, executive director of the group. The group started fundraising for a legal officer last year but needs more funds to attract one, Killock said.
The hearings against the three sites were scheduled to take place on Tuesday, but were moved to next week, according to Killock.
Loek is Amsterdam Correspondent and covers online privacy, intellectual property, open-source and online payment issues for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to firstname.lastname@example.org
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- Live Webcast
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts