Application Security
2/5/2010
01:57 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Book Settlement Falls Short For Justice Dept.

The DoJ still has concerns that the settlement gives Google too much power.

Google's latest effort to settle the copyright lawsuit brought against it by The Authors Guild and several publishers in 2005 suffered a setback on Thursday when the U.S. Department of Justice said that copyright and antitrust issues arising from the revised settlement proposal haven't been adequately addressed.

The lawsuit charged that Google's effort to scan and digitize books violates copyright law. Google and the plaintiffs have been trying to reach an agreement that allows Google to make scanned books available in a limited form online and to sell electronic access to digital books with the consent and participation of copyright owners.

The DoJ filed a statement of interest with U.S. District Court for the Southern District of New York stating that despite good faith negotiations on the part of the parties involved, "the amended settlement agreement suffers from the same core problem as the original agreement: It is an attempt to use the class action mechanism to implement forward-looking business arrangements that go far beyond the dispute before the court in this litigation."

A hearing on the proposed amended settlement is scheduled for February 18 and the judge is likely to take the DoJ's concerns seriously. The original settlement, presented in October 2008, was shot down after widespread criticism.

Google in a statement said that the DoJ's filing "recognizes the progress made with the revised settlement, and it once again reinforces the value the agreement can provide in unlocking access to millions of books in the U.S."

The company said that it is looking forward to Judge Chin's review of the DoJ filing and that the settlement, if approved will expand online access to published works and provide authors and publishers with new ways to distribute their works.

The Open Book Alliance, a group opposed to the settlement that counts Amazon, Microsoft, and Yahoo as members, praised the DoJ's action. The group said it was heartened by the government's recognition of the anti-competitive consequences of the proposed settlement on digital book sales and the Internet search market.

On Friday, The Authors Guild, one of the plaintiffs in the case, issued a statement justifying its decision to settle rather than litigating the copyright claims against Google to a judgment. The group said that Google could have prevailed with its argument that its book scanning effort is protected as fair use under copyright law, a decision it believes would harm authors and publishers.

The group also said that it might have won. But it noted that "copyright victories tend to be Pyrrhic in the digital age." It cited the music industry's string of legal victories against file sharing services and said that such wins only made illegal copying worse. It took Apple, making digital music affordable and easily available through iTunes and the iPod, to turn things around, the group said, but by then, the damage to the music industry had already been done.

Authors and publishers could suffer the same fate as the music industry, the group argues.

"Protecting authors' interests has always been our top priority: In this case a timely harnessing of Google was the best way to do it," the group said.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4594
Published: 2014-10-25
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment.

CVE-2014-0476
Published: 2014-10-25
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

CVE-2014-1927
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928....

CVE-2014-1928
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulner...

CVE-2014-1929
Published: 2014-10-25
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.