• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Online Piracy. Justice found between protection of infringers' privacy and enforcement of producers' copyrights

Extracts from this document...

Introduction

´╗┐Running head: Justice found between protection of infringers? privacy and enforcement of producers? copyrights Justice found between protection of infringers? privacy and enforcement of producers? copyrights UID: 3035066936 The University of Hong Kong Author Note This paper is prepared for Cyberspace Crime, CCST 9029, taught by Professor Dr. K. P. Chow and tutored by Raymond Chan. Abstract This study evaluates a 2006 Court of First Instance case, Cinepoly Records Co Ltd & Others v Hong Kong Broadband Network Ltd & Ltd. It examined how the copyright of music producers could be infringed via P2P software and how might infringers be caught using IP trace back. The case revealed how the hurdles set up by the Personal Data (Privacy) Ordinance could be overcome to protect owners? copyright under the Copyright Ordinance. Moreover, it led to the discussion of whether it is ethical to upload or download free files online. Background 7 music companies (Plaintiffs, ?Ps?) conducted an online investigation and discovered 22 internet users infringed their copyright by uploading their music files via WinMX. Ps decided to sue civil wrongs against the uploaders but Ps only got their IP addresses. Therefore, they sought Norwich Pharmacal relief against 4 Internet service providers, (ISP) ...read more.

Middle

So ISPs will keep track of the connection records with the personal data of user like his name and home address as well as the time. It is possible for ISP to track an IP address at a specific time and find out who he is (What is an IP Address, n.d.). Legal Aspect Norwich Pharmacal relief To reveal the uploaders? true identities, Ps asked Ds to perform IP trace back. Ps did so by seeking Norwich Pharmacal relief against Ds. Norwich Pharmacal relief is applicable when innocent parties (Ds) are involved in the tortious or wrongful activities of others (the 22 uploaders), thus facilitating the continuation of such activities, justice may require the innocent persons to disclose full information of the wrongdoers in order to assist the victims (Ps). The court granted the relief because the judge found that the subscribers of Ds violated 3 sections under the Copyright Ordinance.[1] Since they infringed Ps? copyright and Ds were innocently involved in the wrongful activities of the subscribers as their ISPs, Ps had the right to get information of the uploaders from Ds. It is just and convenient to do so as there is no other practical sources of the data other than Ds. ...read more.

Conclusion

However, the ugly truth is that uploaders aid and abet downloaders to infringe others? copyright while downloaders deprive copyright owners of substantially their deserved gains. (Figure 1) (Figure 2) People should never attempt uploading files onto P2P as it is illegal and unethical. Uploaders won?t get money when sharing files online. While it is not beneficial to them, it is detrimental to many people like music companies, artists and composers. Since downloading pirated files is only a civil wrong in Hong Kong so more people would download than upload illegal files. However, if they put themselves into the victims? shoes, they should realize it is unethical. They should limit or even avoid downloading copyrighted files. Instead, they can listen to music through the radio and borrow movies and books from shops, library and friends. Conclusion This case signifies 3 points. Uploaders and downloaders on P2P program are not really anonymous. They can be tracked down and be sued. Courts would intervene to do justice by striking a balance between victims? loss from copyright infringement and protection of personal data. Last but not least, people should not attempt upload or downloading copyrighted files since it is unethical, even though they may not be caught easily. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Intellectual Property Law section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Intellectual Property Law essays

  1. Discuss using case law what changes the Land Registration Act 2002 has made to ...

    However, Celsteel Ltd v Alton House Holdings Ltd19 had previously established that it was possible for some equitable interests to become overriding interests. Another interesting case was Webb v Pollmount 20 where the court held that an option to purchase the reversion contained in a seven-year lease was protected under s.

  2. Creative Commons - Rebalancing the Copyright Bargain in the Digital Age

    being effectively excluded from the public domain for 70 years past the creator's death.24 Critics argue that such extended terms are designed not to protect the creator, but to protect commercial monopolies, because invariably commercial enterprises become the owners of many works, who vigorously enforce exclusivity.25 The availability of affordable

  1. Should Internet Service Providers be liable for the copyright infringements of their account holders ...

    holders to pursue legal action against third party ISPs.8 ISPs have played an important role in the development of the internet. Even as the internet evolves, ISPs largely remain the gateway through which end users access the vast flow of digital content travelling through cyberspace.9 They provide the 'connectivity and

  2. Contrary to popular belief, the law is reasonably well equipped to deal with computer ...

    computer and cyber crimes, unlike some other countries,40 but relies on applying different criminal laws depending on the type of computer crime committed. The recent Police and Justice Act41 (hereinafter PJA) was enacted to keep in line with European cyber legislation42 and to update and remedy some of the failings of the Computer Misuse Act43 (hereinafter CMA)

  1. Intellectual Property Right

    However, the IPR is a private one that its financial benefits go to individuals and firms while the costs fall on different groups within the general public. Trade off has to be made that in many occasions IPR laws cannot fulfill the social rights and benefits of the people in

  2. property law

    hard conscience of the parties" This case arose in the cause of a dispute between the Court of King's Bench and the Court of Chancery regarding the power to grant common injunctions restraining action at common law. As a result of the case, King James I sought the advice of the Attorney-General, Sir Francis Bacon.

  1. Consider the idea of inventions the commercial exploitation of which would be contrary to ...

    Thus, albeit ethnically questionable, the EPO?s Technical Board of Appeal denied the opposition motion and upheld the patent grant because of the EPO?s function to protect the protect the deep rooted norms[14] of the European society but also to service both, public policy and science, respectively.

  2. Critically analyse what makes for sufficient disclosure in the description of a patentable invention, ...

    erred in equating the relevant technical contribution to the method rather than to the product, because the Biogen insufficiency does not apply to simple product

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work