Application Security

2/5/2010
01:57 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Book Settlement Falls Short For Justice Dept.

The DoJ still has concerns that the settlement gives Google too much power.

Google's latest effort to settle the copyright lawsuit brought against it by The Authors Guild and several publishers in 2005 suffered a setback on Thursday when the U.S. Department of Justice said that copyright and antitrust issues arising from the revised settlement proposal haven't been adequately addressed.

The lawsuit charged that Google's effort to scan and digitize books violates copyright law. Google and the plaintiffs have been trying to reach an agreement that allows Google to make scanned books available in a limited form online and to sell electronic access to digital books with the consent and participation of copyright owners.

The DoJ filed a statement of interest with U.S. District Court for the Southern District of New York stating that despite good faith negotiations on the part of the parties involved, "the amended settlement agreement suffers from the same core problem as the original agreement: It is an attempt to use the class action mechanism to implement forward-looking business arrangements that go far beyond the dispute before the court in this litigation."

A hearing on the proposed amended settlement is scheduled for February 18 and the judge is likely to take the DoJ's concerns seriously. The original settlement, presented in October 2008, was shot down after widespread criticism.

Google in a statement said that the DoJ's filing "recognizes the progress made with the revised settlement, and it once again reinforces the value the agreement can provide in unlocking access to millions of books in the U.S."

The company said that it is looking forward to Judge Chin's review of the DoJ filing and that the settlement, if approved will expand online access to published works and provide authors and publishers with new ways to distribute their works.

The Open Book Alliance, a group opposed to the settlement that counts Amazon, Microsoft, and Yahoo as members, praised the DoJ's action. The group said it was heartened by the government's recognition of the anti-competitive consequences of the proposed settlement on digital book sales and the Internet search market.

On Friday, The Authors Guild, one of the plaintiffs in the case, issued a statement justifying its decision to settle rather than litigating the copyright claims against Google to a judgment. The group said that Google could have prevailed with its argument that its book scanning effort is protected as fair use under copyright law, a decision it believes would harm authors and publishers.

The group also said that it might have won. But it noted that "copyright victories tend to be Pyrrhic in the digital age." It cited the music industry's string of legal victories against file sharing services and said that such wins only made illegal copying worse. It took Apple, making digital music affordable and easily available through iTunes and the iPod, to turn things around, the group said, but by then, the damage to the music industry had already been done.

Authors and publishers could suffer the same fate as the music industry, the group argues.

"Protecting authors' interests has always been our top priority: In this case a timely harnessing of Google was the best way to do it," the group said.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.