Quote:
Originally Posted by DamianJ
Well what you said was this:
subpoena ISP's for login, usage info, etc... that often and easily provides more than enough proof
And it was just that I was questioning as I don't recall seeing any case where the proof of infringement was reliant on evidence from the ISP. As you claim it often and easily provides more than enough proof I wanted to read up on those cases. Not suggesting for a split second it didn't happen, just curious about what this 'proof' would actually look like. Usage patterns on an IP address aren't proof of an individual infringing copyright, obviously. It's a record of someone using that IP address (or spoofing it).
It's the proof aspect you mentioned I am interested in.
|
I did say, login and etc... which is more than just usage data. I would also recommend not reading articles on the subject, as they don't cover anything but opinions.
Their is no other way to argue these cases without "proving" the person was infringing. You can't "claim" an IP did anything, you have to PROVE it. You can't even claim a person had an IP, you have to prove that first, then prove the other crap.
This is just logical... it's IMPOSSIBLE to do it any other way.