Australian Law Reform Commission to be next battleground for Optus TV Now
- 07 September, 2012 12:21
The Australian Digital Alliance plans to take copyright issues surrounding the Optus TV Now recording service to the Australian Law Reform Commission, according to the Alliance’s executive director, Ellen Broad
The High Court this morning denied Optus a chance to appeal a Federal Court judgment against the TV Now service, which lets users record free-to-air programs and play them on PCs and mobile devices. Optus had sought leave to appeal in the High Court.
The case could have implications for cloud storage, which is how TV Now stored the free-to-air TV shows. Optus had argued that if the Copyright Act allows people to record shows on videotape or DVRs, it should also be legal to store them on the cloud.
“We are very disappointed with the decision not to consider the time-shifting provisions of the Copyright Act and the impact this has on cloud services,” Broad told Computerworld Australia. “It’s clear now more than ever that our current copyright framework is impeding cloud computing services at a time when Australia is looking to embrace the cloud to deliver new services and enable innovation in the digital economy.”
The Digital Alliance “will be bringing this up very strongly in the Australian Law Reform Commission (ALRC) inquiry into copyright because they specifically ask whether — and they cite the Optus TV Now case — Australian copyright law is impeding the development of cloud computing.”
The commission has set a deadline for comments by this November. The commission won’t reach a decision until November 2013.
Optus also is looking ahead to the ALRC inquiry, said Optus regulatory affairs vice president, David Epstein.
“This is a very important public policy issue that still needs to be resolved to give clarity to both consumers and the industry," Epstein said in a statement.
“People are increasingly wanting to watch TV when they want, where they want and on what they want. But the law as it stands imposes an arbitrary distinction between technologies.
“Online storage is here and with us now so we think it’s time to confront the realities of that,” he said. “We can’t shut ourselves off from the world.”
Follow Adam Bender on Twitter: @WatchAdam
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Centre
Integrated Computing Platforms, such as EMC VSPEX RAs, provide a solution by eliminating the time (and cost) of designing, testing, and engineering integrated environments with components built independently of one another. These validated architectures are ready for production environments upon delivery, and offer a single point of support should IT require it. Learn more on how a leading IT vendor has aligned product innovation with an IT market need to improve efficiency, performance, and value for SMBs.
Deploying Flash in the Enterprise
Flash is quickly emerging as the preferred way to overcome the nagging performance limitations of hard disk drives. However, because flash comes at a significant price premium, outright replacement of HDDs with flash only makes sense in situations in which capacity requirements are relatively small and performance requirements are high. Learn how deployment approaches-including hybrid storage arrays, server flash, and all-flash arrays-that combine the performance of flash with the capacity of HDDs can be cost effective for a broad range of performance requirements.
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.