• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Online Piracy. Justice found between protection of infringers' privacy and enforcement of producers' copyrights

Extracts from this document...


´╗┐Running head: Justice found between protection of infringers? privacy and enforcement of producers? copyrights Justice found between protection of infringers? privacy and enforcement of producers? copyrights UID: 3035066936 The University of Hong Kong Author Note This paper is prepared for Cyberspace Crime, CCST 9029, taught by Professor Dr. K. P. Chow and tutored by Raymond Chan. Abstract This study evaluates a 2006 Court of First Instance case, Cinepoly Records Co Ltd & Others v Hong Kong Broadband Network Ltd & Ltd. It examined how the copyright of music producers could be infringed via P2P software and how might infringers be caught using IP trace back. The case revealed how the hurdles set up by the Personal Data (Privacy) Ordinance could be overcome to protect owners? copyright under the Copyright Ordinance. Moreover, it led to the discussion of whether it is ethical to upload or download free files online. Background 7 music companies (Plaintiffs, ?Ps?) conducted an online investigation and discovered 22 internet users infringed their copyright by uploading their music files via WinMX. Ps decided to sue civil wrongs against the uploaders but Ps only got their IP addresses. Therefore, they sought Norwich Pharmacal relief against 4 Internet service providers, (ISP) ...read more.


So ISPs will keep track of the connection records with the personal data of user like his name and home address as well as the time. It is possible for ISP to track an IP address at a specific time and find out who he is (What is an IP Address, n.d.). Legal Aspect Norwich Pharmacal relief To reveal the uploaders? true identities, Ps asked Ds to perform IP trace back. Ps did so by seeking Norwich Pharmacal relief against Ds. Norwich Pharmacal relief is applicable when innocent parties (Ds) are involved in the tortious or wrongful activities of others (the 22 uploaders), thus facilitating the continuation of such activities, justice may require the innocent persons to disclose full information of the wrongdoers in order to assist the victims (Ps). The court granted the relief because the judge found that the subscribers of Ds violated 3 sections under the Copyright Ordinance.[1] Since they infringed Ps? copyright and Ds were innocently involved in the wrongful activities of the subscribers as their ISPs, Ps had the right to get information of the uploaders from Ds. It is just and convenient to do so as there is no other practical sources of the data other than Ds. ...read more.


However, the ugly truth is that uploaders aid and abet downloaders to infringe others? copyright while downloaders deprive copyright owners of substantially their deserved gains. (Figure 1) (Figure 2) People should never attempt uploading files onto P2P as it is illegal and unethical. Uploaders won?t get money when sharing files online. While it is not beneficial to them, it is detrimental to many people like music companies, artists and composers. Since downloading pirated files is only a civil wrong in Hong Kong so more people would download than upload illegal files. However, if they put themselves into the victims? shoes, they should realize it is unethical. They should limit or even avoid downloading copyrighted files. Instead, they can listen to music through the radio and borrow movies and books from shops, library and friends. Conclusion This case signifies 3 points. Uploaders and downloaders on P2P program are not really anonymous. They can be tracked down and be sued. Courts would intervene to do justice by striking a balance between victims? loss from copyright infringement and protection of personal data. Last but not least, people should not attempt upload or downloading copyrighted files since it is unethical, even though they may not be caught easily. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Intellectual Property Law section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Intellectual Property Law essays

  1. Copyright Property Law Case. The particular case study that applies to this material is ...

    If Dr. Hefner changed his username and password, his colleagues would no longer be able to access the information. This would be the safest solution and be completely following the laws of copyright by not sharing subscribed information unlawfully. Dr. Hefner would not be in jeopardy of breaking the copyright laws or going against the fair use doctrine.

  2. Intellectual Property Right

    the society especially in the developing countries where the extra costs they impose may be at the expense of the necessities of life for poor people.

  1. Creative Commons - Rebalancing the Copyright Bargain in the Digital Age

    being effectively excluded from the public domain for 70 years past the creator's death.24 Critics argue that such extended terms are designed not to protect the creator, but to protect commercial monopolies, because invariably commercial enterprises become the owners of many works, who vigorously enforce exclusivity.25 The availability of affordable

  2. property law

    of equity, to support and protect the law from shifts and crafty contrivances against the justice of the law. Equity therefore does not destroy the law, nor create it, but assist it." Later Development In the latter part of the seventeenth century, and through the eighteenth century, there were considerable

  1. Should Internet Service Providers be liable for the copyright infringements of their account holders ...

    holders to pursue legal action against third party ISPs.8 ISPs have played an important role in the development of the internet. Even as the internet evolves, ISPs largely remain the gateway through which end users access the vast flow of digital content travelling through cyberspace.9 They provide the 'connectivity and

  2. Contrary to popular belief, the law is reasonably well equipped to deal with computer ...

    as crimes committed against the actual machine itself such as theft;26 criminal damage to the hardware, software or data27 contained in the programs by hacking, installing viruses or modification; or the network may be damaged by DoS and DDos attacks; using computers or networks without authorisation to access information or data.

  1. Discuss using case law what changes the Land Registration Act 2002 has made to ...

    In addition, HM Land Registry guarantees title meaning that any person who suffers a loss due to a mistake on the register which requires rectification will be entitled to payment of an indemnity from the Registry4. First Registration of Title: Today, any dealing in a legal estate which has an unregistered title will make it subject to compulsory registration.

  2. Consider the idea of inventions the commercial exploitation of which would be contrary to ...

    and sch A2 para 3, [5] Examination Guidelines for Patent Applications relating to Biotechnological Inventions in the Intellectual Property Office (IPO, July 2012 ) <http://www.ipo.gov.uk/biotech.pdf> accessed on 13 September 2013 para 103 [6] EPC 200 Rule 28; PA 1977 sch A2 para 3(a)-(b)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work