Music publishers allege MP3.com copyright infringement

Lawsuit parallels RIAA's anti-'virtual CD player' suit


Two music publishers have launched a joint lawsuit against MP3.com alleging that the digital music e-tailer's MyMP3.com service infringes their copyrights. The case, brought by music rights agancy Harry Fox on behalf of publishers MPL Communications and Peer International (operating as Peermusic), is the second copyright violation suit fired off at MP3.com since it launched MyMP3.com back in January. The latest case, like the Recording Industry Association of America's suite before it, centres on MP3.com's admission that it has copied over 80,000 CDs onto its servers to form the basis for the MyMP3.com 'virtual CD player' service. MPL and Peermusic claim that MP3.com did not seek permission to do so from either company, but has nevertheless included works by artists for whom they hold the copyright. The suit further alleges that MP3.com is using that database to "make unauthorised digital phonorecord deliveries... Despite written notice that its actions constitute copyright infringement, defendant has continued to make unauthorised copies of copyrighted musical works at the astonishing rate of 1500 additional CDs per day". So, in essence, there are two charges here, that MP3.com copied material without permission to do so and, second, that it then distributed those unauthorised copies illegally. MPL and Peermusic wants the court to force MP3.com to admit that it wilfully infringed the two companies' copyrights, to remove the copies from its servers and to cough up damages plus any money the company made out of offering their music through MyMP3.com. The suit describes statutory damages of up to $150,000 for each plaintiff. MP3.com has yet to respond directly to the suit, but it's unlikely to offer a different defence than that which it offered to the RIAA: that MyMP3.com doesn't infringe copyrights since it's simply providing a convenient way for users to listen to music they already own. And that's the crux of the matter: if party A makes a copy of CD B for party C, when C has a legal copy of B, does that still count as copyright infringement? Certainly, there's nothing to stop C copying the disc themseleves, posting the on a secure Web site so they can listen to it from any location - duplication of a copyrighted work for personal use is permitted under US copyright law. But that doesn't necessarily grant a third party, A, the right to maintain the online copies. ® Related Stories MP3.com countersues music industry trade body US music industry sues MP3.com over 'virtual CD player' See Also You can read the full text of the suit against MP3.com here


Other stories you might like

  • Pentester pops open Tesla Model 3 using low-cost Bluetooth module
    Anything that uses proximity-based BLE is vulnerable, claim researchers

    Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be hoodwinked by a relay attack, leading to the theft of the flash motor.

    Discovered and demonstrated by researchers at NCC Group, the technique involves relaying the Bluetooth Low Energy (BLE) signals from a smartphone that has been paired with a Tesla back to the vehicle. Far from simply unlocking the door, this hack lets a miscreant start the car and drive away, too.

    Essentially, what happens is this: the paired smartphone should be physically close by the Tesla to unlock it. NCC's technique involves one gadget near the paired phone, and another gadget near the car. The phone-side gadget relays signals from the phone to the car-side gadget, which forwards them to the vehicle to unlock and start it. This shouldn't normally happen because the phone and car are so far apart. The car has a defense mechanism – based on measuring transmission latency to detect that a paired device is too far away – that ideally prevents relayed signals from working, though this can be defeated by simply cutting the latency of the relay process.

    Continue reading
  • Google assuring open-source code to secure software supply chains
    Java and Python packages are the first on the list

    Google has a plan — and a new product plus a partnership with developer-focused security shop Snyk — that attempts to make it easier for enterprises to secure their open source software dependencies.

    The new service, announced today at the Google Cloud Security Summit, is called Assured Open Source Software. We're told it will initially focus on some Java and Python packages that Google's own developers prioritize in their workflows. 

    These two programming languages have "particularly high-risk profiles," Google Cloud Cloud VP and GM Sunil Potti said in response to The Register's questions. "Remember Log4j?" Yes, quite vividly.

    Continue reading
  • Rocket Lab is taking NASA's CAPSTONE to the Moon
    Mission to lunar orbit is further than any Photon satellite bus has gone before

    Rocket Lab has taken delivery of NASA's CAPSTONE spacecraft at its New Zealand launch pad ahead of a mission to the Moon.

    It's been quite a journey for CAPSTONE [Cislunar Autonomous Positioning System Technology Operations and Navigation Experiment], which was originally supposed to launch from Rocket Lab's US launchpad at Wallops Island in Virginia.

    The pad, Launch Complex 2, has been completed for a while now. However, delays in certifying Rocket Lab's Autonomous Flight Termination System (AFTS) pushed the move to Launch Complex 1 in Mahia, New Zealand.

    Continue reading

Biting the hand that feeds IT © 1998–2022