Quote:
Originally Posted by TheDoc
You make it sound like I said data usage was the only proof used... it's just more proof. Data usage shows a pattern of active use, not what it was being used on.
|
Well what you said was this:
subpoena ISP's for login, usage info, etc... that often and easily provides more than enough proof
And it was just that I was questioning as I don't recall seeing any case where the proof of infringement was reliant on evidence from the ISP. As you claim it often and easily provides more than enough proof I wanted to read up on those cases. Not suggesting for a split second it didn't happen, just curious about what this 'proof' would actually look like. Usage patterns on an IP address aren't proof of an individual infringing copyright, obviously. It's a record of someone using that IP address (or spoofing it).
It's the proof aspect you mentioned I am interested in.