Quote:
Originally Posted by HarryT
I really see no issue with holding the legal owner of a computer responsible for its use.
|
Except that that isn't the law.
From the last of the ACS:Law cases:
Quote:
The Particulars of Claim also mentioned unsecured internet connections and tied in with that alleged infringement by the individual defendant either by infringing themselves or "by allowing others to do so". The judgment notes that I am aware of no published decision in this country which deals with the issue of unsecured internet connections in the context of copyright infringement and refers in passing to a decision of German Bundesgerichtshof (BGH) on the point. The point about "allowing" is that the word used in s16(2) of the 1988 Act is "authorising" not "allowing". They are by no means the same and the difference may be very important if the allegation is about unauthorised use of an internet router by third parties.
This question of unsecured internet connections and infringing by "allowing others" is a critical one since Media CAT's monitoring exercise cannot and does not purport to identify the individual who actually did anything. All the IP address identifies is an internet connection, which is likely today to be a wireless home broadband router. All Media CAT's monitoring can identify is the person who has the contract with their ISP to have internet access. Assuming a case in Media CAT's favour that the IP address is indeed linked to wholesale infringements of the copyright in question (like the Polydor case (above)), Media CAT do not know who did it and know that they do not know who did it. The Particulars of Claim are pleaded in a way to address a problem which is very old and very well known in intellectual property cases (see e.g. The Saccharin Corp v Haines (1898) 15 RPC 344). There the patentee had patents on all known methods of making saccharin and so, even though the patentee did not know how it was made, the defendant's saccharin must be infringing one way or another. Such saccharin type points arise frequently when a claimant contends that despite a lack of information about some aspect of the matter, one way or another the defendant is liable for infringement.
Media CAT's case on this is in two parts. Of course Media CAT cannot know who actually used the P2P software, so in paragraph 3 of the Particulars of Claim they plead that the software was used either by the named defendant who was identified by the ISP, or by someone they authorised to use the internet connection or someone who gained access to the internet connection "due to the router having no or no adequate security". Then in paragraph 5 the plea is that "in the premises" the defendant has by himself, or by allowing others to do so, infringed. So taken together these two paragraphs show that the Particulars of Claim is pleaded on the basis that one way or another the defendant must be liable for the infringement which is taking place.
But the argument is based on equating "allowing" and "authorising" and on other points. What if the defendant authorises another to use their internet connection in general and, unknown to them, the authorised user uses P2P software and infringes copyright? Does the act of authorising use of an internet connection turn the person doing the authorising into a person authorising the infringement within s16(2)? I am not aware of a case with decides that question either. Then there is the question of whether leaving an internet connection "unsecured" opens up the door to liability for infringement by others piggy backing on the connection unbeknownst to the owner. Finally what does "unsecured" mean? Wireless routers have different levels of security available and if the level of security is relevant to liability - where is the line to be drawn? No case has decided these issues but they are key to the claimant's ability to solve the Saccharin problem and say – one way or another there is infringement here.
Notable again is the contrast between the letter of claim and the Particulars of Claim. The letter simply asserts that the defendant has infringed "either directly yourself or by you authorising (inadvertently or otherwise) third parties to do the same". The letter makes no mention of unsecured internet connections. It does not face up to the Saccharin point. Again the Particulars of Claim is rather more frank than the letter. The Particulars of Claim faces up to the difficulty and tries to put a case which deals with it, but it all based on untested legal and factual propositions and issues of technology.
|
Quote:
First, the nature of the case itself raises many questions. I have mentioned some of them above. The issues are as follows:-
i) Does the process of identifying an IP address in this way establish that any infringement of copyright has taken place by anyone related to that IP address at all. The technical issues raised by Mr Davey (and Mr Stone) relate to this point.
ii) Even if it is proof of infringement by somebody, merely identifying that an IP address has been involved with infringement then encounters the Saccharin problem. It is not at all clear to me that the person identified must be infringing one way or another. The fact that someone may have infringed does not mean the particular named defendant has done so. Perhaps the holder of the account with the ISP has a duty to assist along the lines of a respondent to another Norwich Pharmacal order but that is very different from saying they are infringing.
iii) The damages claimed deserve scrutiny. If all that is proven is a single download then all that has been lost is one lost sale of one copy of a work. The sort of sum that might represent would surely be a small fraction of the £495 claimed and the majority of that sum must therefore be taken up with legal costs. If so, a serious question of proportionality arises but again this has not been tested. Clearly if the defendant has infringed on a scale as in the Polydor case then would be a very different matter but there is no evidence of such infringement here.
|