Digital Piracy: Adapt or Deter?

(Image Source: https://flic.kr/p/4LPBEm)

(The author would like to thank Swaraj Paul Barooah for his valuable insights.)

Let me begin by putting forward a basic question – when was the last time you actually paid to download a song? And trust me, you deserve a pat if your answer is anywhere within the last two years. In this blog post, I have looked into the contentious issue of digital piracy and the implications it holds today. My major theme is an analysis of whether this online piracy can be curbed effectively and if yes, then how. The post is divided into six sections – (i) The basics, (ii) Deterrence as a solution (iii) Curbing piracy around the world, (iv) Digital piracy in India, (v) The creative industry’s viewpoint and (vi) Conclusion.

read more

The Right to Be Forgotten – An Explanation

(Image Source: https://flic.kr/p/9RovZB)

This is the first in a two-part post on the Right to be Forgotten. This post is part of our 101 series of posts, which seek to explain the issue at hand, and the next post shall address the issue and the debate surrounding it in more detail.

In 2010, a Spanish citizen filed a complaint against a Spanish newspaper, Google Spain and Google Inc. with the national Data Protection Agency. The complaint objected to an auctioned notice of his repossessed home that kept coming up on Google’s search results.  The proceedings against the petitioner had been fully resolved and he claimed the reference to the proceedings on Google to be entirely redundant and a violation of his privacy rights. The Spanish court referred the case to the Court of Justice of the European Union. 

read more

Editors' Picks

The following are some of the interesting articles that our editors have found this week on the Internet.

1. The Solace of Oblivion, Jeffrey Toobin, The New Yorker.

2. The Soul of the Censor, Robert Darnton, the New York Review of Books.

3. The Hidden World of Facebook ‘Like Farms’, MIT Technology Review.

4. Pirate Favorites Bittorrent offers a new way to Pay for Music, MIT Technology Review.

5. Text-Inspectors, Andrew O’Hagan, London Review of Books.

6. The Illiteracy of Innovation, Shiv Viswanathan, The Hindu.

read more

Law Commission Media Law Consultation – Panel I, Self Regulation v. Statutory Regulation

(Image Source: https://flic.kr/p/hzrA2W) The following is a post by Shashank Singh, a third year student at NUJS, covering the first panel of the Law Commission’s ongoing Media Law Consultation, Self-Regulation v. Structural Regulation.  Shashank currently serves as Associate Editor for the  NUJS Law Review, and his areas of interest include Constitutional Law, Media Law and IPR. 

The Law Commission of India is currently hosting a two day consultation process on issues concerning media law. This comes in the backdrop of the TRAI’s Recommendations on Ownership of Media released on August 12, 2014. The first panel looked at the much debated topic of Self Regulation v. Structural Regulation. The consultation was attended by journalists, academics and students. Ironically, the notable absence in the entire consultation process were the ‘owners’ who would be most effected from the outcome of any future binding regulation.

read more

The Mirage of Internet Security: A Response to the Bash Bug

(Image Source: https://flic.kr/p/mjhubJ)

Recently in our class on the Law of Evidence, the discussion turned to the security of email accounts, specifically Gmail. Our teacher asked a general question, about how easy it would be for a person to hack a Gmail account, on a scale of 0 (extremely difficult) to 5(extremely easy). There was a smattering of response, ranging between 0 to 1.5.

But I would argue that the answer, always, is 5. Even if you disagree with that, at the very least, I would argue that is the presumption we should always work with. The Internet is awash with bugs and errors, and any security that is set up on it can be broken – the only question is how determined the hacker in question is to get your information, and how determined you are to protect it. And that is even before you get started on the devices connecting the average user to the Internet.

read more