Go Back   DreamTeamDownloads1, FTP Help, Movies, Bollywood, Applications, etc. & Mature Sex Forum, Rapidshare, Filefactory, Freakshare, Rapidgator, Turbobit, & More MULTI Filehosts > World News/Sport/Weather > Piracy/LEGAL/Hackers/SPIES/AI /CRYPTO/Scams & Internet News

Piracy/LEGAL/Hackers/SPIES/AI /CRYPTO/Scams & Internet News Anything Related to Piracy, Warez, Legal Matters, Hackers, Internet News & Scams and How it Affects Sites/Members Can Be Read Here. Please do NOT post links to other Sites, but you May Name Them if They are Scam Sites

IMPORTANT ANNOUNCEMENT
Hallo to All Members. As you can see we regularly Upgrade our Servers, (Sorry for any Downtime during this). We also have added more Forums to help you with many things and for you to enjoy. We now need you to help us to keep this site up and running. This site works at a loss every month and we appeal to you to donate what you can. If you would like to help us, then please just send a message to any Member of Staff for info on how to do this,,,, & Thank You for Being Members of this site.
Post New ThreadReply
 
LinkBack Thread Tools Display Modes
Old 22-04-12, 01:27   #1
 
Ladybbird's Avatar
 
Join Date: Feb 2011
Posts: 47,549
Thanks: 27,621
Thanked 14,458 Times in 10,262 Posts
Ladybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond reputeLadybbird has a reputation beyond repute

Awards Showcase
Best Admin Best Admin Gold Medal Gold Medal 
Total Awards: 8

Green Arrow MUST READ-RapidShare Publishes Anti-Piracy Manifesto

RapidShare Publishes Anti-Piracy Manifesto for Cyberlockers

Posted: 20 Apr 2012 07:24 AM PDT AP.


In the aftermath of the Megaupload shutdown, people have been keeping a close eye on other file-hosting services, RapidShare included.

As a company, RapidShare sees itself operating in the “cloud hosting” business, offering a service comparable to the likes of Dropbox. And since people are moving data from local drives to the cloud at an increasing rate, these companies will undoubtedly host some copyrighted material too.

During the past several years RapidShare has made tremendous efforts to cooperate with copyright holders and limit copyright infringements. The Swiss-based company is trying to position itself as a front-runner when it comes to responsible dealings with copyright infringers.

Emphasizing this role, the cyberlocker has just published an anti-piracy manifesto for cyberlockers, or a “responsible practices for cloud storage services” as they call it.

“RapidShare has always embraced our obligation to protect the intellectual property and copyright interests of creators. Today’s announcement takes that obligation to a new level,” said RapidShare’s general counsel Daniel Raimer commenting on the release.

The four page document is a summary of what RapidShare believes cyberlockers should do to assist copyright holders in preventing copyright infringements. While some of the suggestions are already baked into the US DMCA, several of the suggestions go above and beyond existing law, with inevitable consequences for the privacy of users.

It includes basic recommendations such as making files private by default, but it also goes further by granting copyright holders the power to get account holders disconnected when they are merely suspected of copyright infringement.

“Services should terminate account holders or subscribers not merely upon proof that they are infringers but when sufficient copyright holders have called their conduct into question,” RapidShare writes. Or in other words, account holders are guilty until proven innocent.

In addition, RapidShare also makes it mandatory for account holders to use valid email addresses, so these can be shared with copyright holders when there’s a legal dispute.

“Services should require valid e-mail addresses of subscribers and account holders in order for them to register new accounts. In the event a copyright holder seeks account holder information through valid legal procedures, the service should have access to valid e-mail address information to furnish in response, which may facilitate an inquiry to the e-mail service provider. “

The above is bad news for privacy loving anons, but there are more concerns on this front. RapidShare also suggests that all cyberlockers update their privacy policy to make it possible for them to inspect the personal files of those who are accused of copyright infringement.

“Privacy policies should establish that service providers retain the right to inspect files of repeat accused infringers or accused violators of the service’s terms of service who, after reasonable notice to them by the service provider, have made no good-faith counter notifications or efforts to justify their conduct as non-infringing or as not violating the service provider’s terms of service.”

Also, RapidShare recommends that cyberlockers operate from countries that respect copyright law.

“Service providers should either reside in a country that belongs to the Hague Convention for the Service of Process Abroad or should voluntarily comply with requests to waive service of process with respect to subpoenas for user information. They should also reside in a jurisdiction that shows respect for copyright law.”

In his announcement of the manifesto Raimer once again emphasized that his company is doing all it can to eradicate piracy.

“We want all stakeholders in the debate over online copyright infringement [...] to understand that RapidShare recognizes that piracy is a serious problem, that we’re reinforcing our efforts to eradicate it, and that we’re calling on other data logistics companies to do the same,” he said.

The company itself goes even beyond its own recommendations, by monitoring third-party sites and forums that post links to infringing material on RapidShare. In addition, the cyberlocker also decreased the download speeds of free users to drive pirates away.

Thus far the entertainment industry is quite content with RapidShare’s efforts, but whether the average RapidShare user is happy with these changes is doubtful.


The Manifesto




Quote:
Responsible Practices for Cloud Storage Services
Introduction


Cloud storage services have become an important feature of modern computing platforms, with increasing worldwide reliance upon mobile devices and location-independent enterprise computing. Cloud-based storage is becoming a necessary component of any mobile business or lifestyle.

For example, there are significant security risks associated with local storage on computers, devices, or storage media that can be lost or stolen: a laptop or thumb drive left behind on a plane can expose its owner both to loss of all data or to persistent, undetectable attacks on the security of the data. Workers who travel often prefer to rely on computers and devices available locally at their destinations without carrying their equipment and data with them. Employers may make select documents available to their employees via third-party services so that, insensitive locations, the employees need not expose their network traffic to others.Publishers may to make their works widely available using cloud-based storage as an efficient and cost-effective alternative to direct hosting.

Collaborators may share projects and large files with each other in a location where no single person controls the platform. There are countless other existing uses for cloud-based storage, and new uses are constantly evolving.

While cloud storage has been available for years, with a variety of well established and newer companies providing it, certain high-profile cases have put cloud storage in a spotlight. Some accuse customers of cloud storage services of misusing those services to carry out copyright infringing activities. Some cloud storage providers also stand accused of encouraging and exploiting those customers’ abuses.

RapidShare has faced its own controversies, but for years now it has been working diligently on multiple fronts to distinguish itself as an important and responsible company in this growing industry.

Because any customer can misuse these services to engage in wrongful conduct,including copyright infringement, RapidShare, like other operators of such services, has a strong reputational interest in actively promoting legitimate uses, and discouraging illegitimate uses, balancing the needs for safe, reliable, and private storage and communications with respect for intellectual property and the public interest in reasonable enforcement.

For that purpose, RapidShare publishes this first industry manifesto of Responsible Practices for Cloud Storage Providers. It welcomes debate and further discussion that balances the legitimate expectations of all stakeholders,including copyright holders, service providers, customers, and the public.

1. It goes without saying that cloud storage services should take all steps necessary to qualify for the safe harbor for hosting services under the U.S. Digital Millennium Copyright Act.

That safe harbor under American law sets standards for any company around the globe that wishes to access the American marketplace and provides protection for any such company against monetary awards and broad injunctions.

Among those standards are:

a. Expeditious removal or disabling of access to allegedly infringing material or activity upon a properly formed notice.

b. Designation of an agent to receive notifications of claimed infringement,with an appropriate filing in the U.S. Copyright Office and notice clearly available on the service itself.

c. Publication and implementation of a policy calling for termination, inappropriate circumstances, of account holders or subscribers who are repeat infringers.

d. Expeditious removal or disabling of access to infringing material or activity when the provider gains knowledge of an infringement or facts or circumstances make the infringement apparent.e. Accommodation of, and non-interference with, any industry-standard content protection technologies.f. The strict avoidance of any direct financial benefit from infringing activity or infringing material.g. The exercise of any right and ability to control infringement by users to bring about the cessation of such infringement.

2. Responsible cloud storage service providers will take a number of steps to go above and beyond safe harbor practices for the protection of copyright holders.

They include:

a. No second-guessing or evaluating of claims made in properly formed takedown notices.
The DMCA safe harbor allows the users themselves to defend their own conduct; the cloud storage service provider need not take on itself a role of judge.The service provider must step out of any dispute between a copyright claimant and an accused user, without taking anyone’s side.

b. Protection against restoration of suppressed materials.
Cloudstorage service providers should make efforts to detect repeated efforts by users tostore materials that the service provider previously deleted or disabled based ontakedown notices, unless the users provided properly formed counter-notifications.

This means that service providers must determine, to the extent technically feasible, unique signatures of disabled files and scan new files for identical signatures.

c. Attention to compromised or improperly disseminated user credentials.
Cloud storage service providers should actively review major public providers of access credentials of encrypted files and disable file access to those files where it appears that those credentials might be compromised or improperly published.

d. Rare compensation to customers based on download volume.
Services should not provide compensation to users based on download volume unless the services have a good-faith belief that those users are properly using the storage platform to monetize dissemination of their own, or authorized, material.
For example,some recording artists have adopted cloud storage services as a vehicle for monetizingtheir own works. This type of new business model deserves support while it does not justify giving malefactors a reward for their misbehavior. These monetization relationships should be custom designed and there should be individualized oversight ofthe enrollment process.

e. Termination upon substantial body of accusations without proof of infringement.
Services should terminate account holders or subscribers not merely upon proof that they are infringers but when sufficient copyright holders have called their conduct into question. In such cases, services deserve an explanation from the users as to why the suspicions are unfounded.

f. Valid, current e-mail addresses of subscribers and account holders.
Services should require valid e-mail addresses of subscribers and account holders in order for them to register new accounts. In the event a copyright holder seeks account holder information through valid legal procedures, the service should have access to valid e-mail address information to furnish in response, which may facilitate an inquiry to the e-mail service provider. The service should periodically test the validity of subscriber e-mail addresses and require updating of obsolete email addresses in its system.

g. Trained customer service personnel
Services should train their customer service personnel to avoid interactions with customers that appear to pertain to copyrighted material of others.

h. Default settings for stored files: only for private access of the customer.
To the extent customers seek to expose files to others or to the public, they should have to override the default setting or provide access credentials to a trusted colleague.

i. Deletion.
Customers should have the ability to delete their own files and access to their own files for their protection and for the avoidance of sharing.

3. Responsible cloud storage service providers should be readily accessible and complainant-friendly for both notifications and legal process.

This includes the following:

a.Robust staffing of a well trained anti-abuse team to respond to notifications of claimed infringement.
Service providers must deploy personnel sufficient to handle the volume of notifications that arrive, without persistent backlogs.Spikes in volume of notifications must lead to additional emergency staffing and overtime, subject only to employment law limitations on hours and working conditions.

b. Services should be amenability to service of process.
Service providers should either reside in a country that belongs to the Hague Convention for the Service of Process Abroad or should voluntarily comply with requests to waive service of process with respect to subpoenas for user information. They should also reside in a jurisdiction that shows respect for copyright law.

c. Collaboration to facilitate notification process.
Where a copyright holder has developed a history of frequent or large-scale notices, the service provider should offer it an opportunity to collaborate with the service provider to build a notification tool to automate creation of DMCA-conforming notifications of claimed infringement in a way that will ease burdens on copyright holders and facilitate speedier handling of those notifications by the service provider.

d. Visible management.
Service providers should make public the identities of the persons in its top executive ranks. Knowledgeable representatives of the company should be available for press, customer service, and sales inquiries.

e. Visible policies.
Service providers should make clear their privacy policies and details about information that is available to them about their account holders or subscribers and other users.

f. Inspection as last resort.
While cloud storage service customers normally have a right to expect privacy of their stored materials that they have not shared publicly, privacy policies should establish that service providers retain the right to inspect files of repeat accused infringers or accused violators of the service’s terms of service who, after reasonable notice to them by the service provider, have made no good-faith counter notifications or efforts to justify their conduct as non-infringing or as not violating the service provider’s terms of service.

A service provider shall serve notice on the customer two weeks before any such inspection, at that customer’s last known e-mail address, giving the customer sufficient time to oppose inspection or voluntarily to remove its materials from the service
__________________
PUTIN TRUMP & Netanyahu Will Meet in HELL


..................SHARKS are Closing in on TRUMP..........................







TRUMP WARNS; 'There'll Be a Bloodbath If I Don't Get Elected'..MAGA - MyAssGotArrested...IT's COMING


PLEASE HELP THIS SITE..Click DONATE
& Thanks to ALL Members of ... 1..

THIS SITE IS MORE THAN JUST WAREZ...& TO STOP SPAM-IF YOU WANT TO POST, YOUR FIRST POST MUST BE IN WELCOMES
Ladybbird is online now  
Digg this Post!Add Post to del.icio.usBookmark Post in TechnoratiTweet this Post!
Reply With Quote
Post New ThreadReply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.5.2
Designed by: vBSkinworks