Google To Break Pirates Over Music Searches

UK government-hosted talks spanning two Parliaments have culminated in Google and Bing at last agreeing to tweak their search results in response to copyright-holders' concerns, thereby heading off threatened legislation on their conduct.

The code means Google, Bing and other search engines will demote illegal sites from the top search results, meaning that fans searching for music are more likely to find a fair site.

Music groups have complained that despite a wealth of legal and free licensed music outlets, the search engines continue to promote unlicensed infringing sites, thus distorting the market. The Conservatives had already vowed, "to ensure that search engines do not link to the worst-offending sites" in page 42 of their 2015 Manifesto.

Recording industry trade group, the BPI today hailed a new voluntary code of practice for search engines with both of the giants have signed up to, the first tangible result from six years of government-backed discussions, as a landmark. The BPI has sent over 450 million infringement notices to Google and Bing since 2011.

BPI chief exec Geoff Taylor called it a "world first", but warned it "would not be a silver-bullet fix". The agreement does not yet include one of musicians' biggest beefs, which is Google's autocomplete providing pirate-friendly terms.

"The code will accelerate the demotion of illegal sites following notices from rights holders, and establishes ongoing technical consultation, increased co-operation and information sharing to develop and improve on the process. It will also enable new practices to be adopted where needed," said a BPI statement.

Recently, the government again threatened legislation if search engines do not come up with a working code.

Music groups cite research that search engines provide prominent promotion of unlicensed music, discouraging the legal market. The BPI says 74 per cent of pirate downloads begin with a search engine "as either a discovery or navigational tool in their initial viewing sessions on domains with infringing content".

Even Google has acknowledged its role, citing referrals from Google to infringing sites in double figures. Here's an example. Five of the first seven results offer unlicensed downloads, while the other two is Amazon.

Register

 

« Facebook & Google Are Killing Newspapers
Iran Cyber Attacks on Saudi Arabia »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMi Level 3 certified Global Consulting and IT Security Services company.

Tonex

Tonex

Tonex providing industry-leading technology training, courses, seminars, workshops, and consulting services to companies and government organizations around the world.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.

Zyxel Networks

Zyxel Networks

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge.

Sphinx

Sphinx

Sphinx provide advanced security consulting services and cyber solutions to federal and private industry.

Hexagate

Hexagate

Hexagate is at the forefront of blockchain threat prevention and automated risk management, proactively detecting and mitigating threats to smart contracts and onchain assets.