{"id":57015,"date":"2009-12-01T08:22:00","date_gmt":"2009-12-01T13:22:00","guid":{"rendered":"http:\/\/techdirt.com\/articles\/20091130\/0616407124.shtml"},"modified":"2009-12-01T08:22:00","modified_gmt":"2009-12-01T13:22:00","slug":"should-there-be-punishment-for-bogus-pre-settlement-letters","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/57015","title":{"rendered":"Should There Be Punishment For Bogus &#8216;Pre-Settlement&#8217; Letters?"},"content":{"rendered":"<p>We&#8217;ve recently seen efforts to <a href=\"http:\/\/www.techdirt.com\/articles\/20091125\/1047377088.shtml\">ramp up<\/a> the system of &#8220;pre-settlement&#8221; letters as a way to &#8220;profit&#8221; off of file sharing.  The scheme works by having a company that either holds the copyrights to certain works or has merely licensed them for this purpose <a href=\"http:\/\/www.techdirt.com\/articles\/20090831\/0250256053.shtml\">put those files online<\/a> and then see who is downloading them.  That&#8217;s the simplest version (though, of questionable legality since if the copyright holder itself is putting the content online, you can raise questions about whether or not the sharing is really unauthorized).  Some others in the space don&#8217;t actually put their content online themselves, but try to find IP addresses of those who are sharing the content, and then sending those users &#8220;pre-settlement&#8221; letters, in the hopes that many people just pay up, rather than fighting the letters (or, more likely, ignoring them).<\/p>\n<p>Of course, one of the big problems with such a system is that those sending such letters have very little incentive (if any) to actually verify that unauthorized file sharing has happened.  They want to cast as wide a net as possible and send out as many letters as possible to as many people as possible.  It&#8217;s a pure numbers game.  And, for that reason, plenty of <a href=\"http:\/\/www.techdirt.com\/articles\/20081030\/0222502686.shtml\">false positives<\/a> are identified.  Now, plenty of people reasonably point out that IP addresses are not indicative of individuals, and there are problems with relying solely on IP addresses &#8212; but those problems become even bigger when you&#8217;re dealing with folks who don&#8217;t understand how BitTorrent actually works.  That activity leads to claims of <a href=\"http:\/\/www.techdirt.com\/articles\/20080605\/1227001318.shtml\">copyright infringement by networked laser printers<\/a>.<\/p>\n<p>Over at Freedom to Tinker, computer science professor Mike Freedman discusses how the popular CoralCDN <a href=\"http:\/\/www.freedom-to-tinker.com\/blog\/mfreed\/inaccurate-copyright-enforcement-questionable-best-practices-and-bittorrent-specificatio\" >has been getting hundreds of pre-settlement letters<\/a> because one of these companies doesn&#8217;t seem to do even the slightest verification of whether or not an IP address is actually involved in sharing content, and misinterprets the data it has received (despite the self-supported claim that &#8220;The information in this notification is accurate&#8221;).  Of course, since the &#8220;punishment&#8221; for such things is slight to non-existent, the company in question (in this case, &#8220;Video Protection Alliance&#8221;) has no incentive to improve its process.  But it presents a real cost to Freedman, who helps run CoralCDN:<\/p>\n<blockquote><p><i><br \/>\nOur personal experience with DMCA takedown notices is that network operators are suitably afraid of litigation. Many will pull network access from machines as soon as a complaint is received, without any further verification or demonstrative network logs. In fact, many operators also sought &#8220;proof&#8221; that we weren&#8217;t running BitTorrent or engaging in file sharing before they were willing to restore access. We&#8217;ll leave the discussion about how we might prove such a negative to another day, but one can point to the chilling effect that such notices have had, when users are immediately considered guilty and must prove their innocence.<br \/>\n<\/i><\/p><\/blockquote>\n<p>At some point, shouldn&#8217;t we start to consider serious sanctions against those issuing not just bogus DMCA takedown notices, but then <i>also<\/i> using such notices to demand &#8220;pre-settlement&#8221; payments from individuals who may not realize their legal rights and may just pay up?<\/p>\n<p><a href=\"http:\/\/techdirt.com\/articles\/20091130\/0616407124.shtml\">Permalink<\/a> | <a href=\"http:\/\/techdirt.com\/articles\/20091130\/0616407124.shtml#comments\">Comments<\/a> | <a href=\"http:\/\/techdirt.com\/article.php?sid=20091130\/0616407124&#038;op=sharethis\">Email This Story<\/a><br \/>\n <br clear=\"both\" style=\"clear: both;\"\/><br \/>\n<br clear=\"both\" style=\"clear: both;\"\/><br \/>\n<a href=\"http:\/\/ads.pheedo.com\/click.phdo?s=4e43999d608628613a98e0ebbfe7d426&#038;p=1\"><img decoding=\"async\" alt=\"\" style=\"border: 0;\" border=\"0\" src=\"http:\/\/ads.pheedo.com\/img.phdo?s=4e43999d608628613a98e0ebbfe7d426&#038;p=1\"\/><\/a><br \/>\n<img loading=\"lazy\" decoding=\"async\" alt=\"\" height=\"0\" width=\"0\" border=\"0\" style=\"display:none\" src=\"http:\/\/a.rfihub.com\/eus.gif?eui=2225\"\/><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.techdirt.com\/~ff\/techdirt\/feed?a=D1q8JlDe4-w:ZQ5QrCW49XM:D7DqB2pKExk\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/techdirt\/feed?i=D1q8JlDe4-w:ZQ5QrCW49XM:D7DqB2pKExk\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.techdirt.com\/~ff\/techdirt\/feed?a=D1q8JlDe4-w:ZQ5QrCW49XM:c-S6u7MTCTE\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/techdirt\/feed?d=c-S6u7MTCTE\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/techdirt\/feed\/~4\/D1q8JlDe4-w\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve recently seen efforts to ramp up the system of &#8220;pre-settlement&#8221; letters as a way to &#8220;profit&#8221; off of file sharing. The scheme works by having a company that either holds the copyrights to certain works or has merely licensed them for this purpose put those files online and then see who is downloading them. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-57015","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/57015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=57015"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/57015\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=57015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=57015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=57015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}