CloudNews: Megaupload: Cloud Or Crime?

CloudNews: Megaupload: Cloud Or Crime?

CloudNews: Megaupload: Cloud Or Crime?Megaupload

Hollywood and its partners have taken a step further towards the criminalization of Kim Dotcom’s Megaupload, the cloud service which allowed its members to upload files, and then offer those files to whomever they pleased. While Dotcom calls his service a “totally legal cloud storage site”, the American RIAA calls Megaupload a site allowing users to engage in “rapid, unrestricted downloading of popular, infringing content.”

The latest in the Dotcom saga is threefold:

  •  The American RIAA is suing Megaupload for “actively and intentionally encourag[ing] their users” to upload copyrighted content “for the purpose of distributing those copies to millions of other users.” They are seeking “maximum allowable damages.” What’s new here is that the recording industry wasn’t part of the first shenanigans that targeted Dotcom, as it was the cinema industry that spearheaded the first waves.

The never-ending saga of Megaupload still bears the same question: was Megaupload a simple cloud service or was it more than that? Can Drive, Dropbox, iCloud, SkyDrive be taken down if someone uploads copyrighted material and shares it with the world? Does that mean that smaller cloud solution providers, like ownCloud and SpiderOak, are at greater risk than the larger corporations?

Ira Rothken, Kim Dotcom’s lawyer, told ArsTechnica in the beginning of April:

We believe that the claims against Megaupload are really an assault by Hollywood on cloud storage in general as Megaupload used copyright neutral technology and whatever allegations they can make against Megaupload they can make against YouTube, Dropbox, and others. And we believe that at the end of the day that the court will find their claims to be without merit and that the court will find that Megaupload and the others will prevail.”

Aereo, a video streaming website that relies on cloud storage to provide services to its customers, has recently argued that any action against them could result in putting cloud services, as a whole, at risk.

This is a complicated case, however it boils down to this:

The justices had questions about how they could rule against Aereo and not affect cloud services. If Aereo violates copyright law by providing a public performance without paying royalties, then “1,000 people who have the same content” in the same cloud locker may also be considered a public performance, said Justice Stephen Breyer. – Grant Gross (IDG News Service)

Once again, what’s the difference between Aereo and YouTube? These questions remain unanswered.

What’s your opinion? Tell us in the comments.

By Cedric Lizotte

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…