View Single Post
Old 01-18-2011, 10:25 AM  
DamianJ
Too lazy to set a custom title
 
DamianJ's Avatar
 
Industry Role:
Join Date: Jul 2006
Location: A magical land
Posts: 15,808
Quote:
Originally Posted by TheDoc View Post
You make it sound like I said data usage was the only proof used... it's just more proof. Data usage shows a pattern of active use, not what it was being used on.
Well what you said was this:

subpoena ISP's for login, usage info, etc... that often and easily provides more than enough proof

And it was just that I was questioning as I don't recall seeing any case where the proof of infringement was reliant on evidence from the ISP. As you claim it often and easily provides more than enough proof I wanted to read up on those cases. Not suggesting for a split second it didn't happen, just curious about what this 'proof' would actually look like. Usage patterns on an IP address aren't proof of an individual infringing copyright, obviously. It's a record of someone using that IP address (or spoofing it).

It's the proof aspect you mentioned I am interested in.
DamianJ is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote