Google To Break Pirates Over Music Searches

UK government-hosted talks spanning two Parliaments have culminated in Google and Bing at last agreeing to tweak their search results in response to copyright-holders' concerns, thereby heading off threatened legislation on their conduct.

The code means Google, Bing and other search engines will demote illegal sites from the top search results, meaning that fans searching for music are more likely to find a fair site.

Music groups have complained that despite a wealth of legal and free licensed music outlets, the search engines continue to promote unlicensed infringing sites, thus distorting the market. The Conservatives had already vowed, "to ensure that search engines do not link to the worst-offending sites" in page 42 of their 2015 Manifesto.

Recording industry trade group, the BPI today hailed a new voluntary code of practice for search engines with both of the giants have signed up to, the first tangible result from six years of government-backed discussions, as a landmark. The BPI has sent over 450 million infringement notices to Google and Bing since 2011.

BPI chief exec Geoff Taylor called it a "world first", but warned it "would not be a silver-bullet fix". The agreement does not yet include one of musicians' biggest beefs, which is Google's autocomplete providing pirate-friendly terms.

"The code will accelerate the demotion of illegal sites following notices from rights holders, and establishes ongoing technical consultation, increased co-operation and information sharing to develop and improve on the process. It will also enable new practices to be adopted where needed," said a BPI statement.

Recently, the government again threatened legislation if search engines do not come up with a working code.

Music groups cite research that search engines provide prominent promotion of unlicensed music, discouraging the legal market. The BPI says 74 per cent of pirate downloads begin with a search engine "as either a discovery or navigational tool in their initial viewing sessions on domains with infringing content".

Even Google has acknowledged its role, citing referrals from Google to infringing sites in double figures. Here's an example. Five of the first seven results offer unlicensed downloads, while the other two is Amazon.

Register

 

« Facebook & Google Are Killing Newspapers
Iran Cyber Attacks on Saudi Arabia »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Alan Turing Institute

Alan Turing Institute

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Joint Accreditation System of Australia and New Zealand (JASANZ)

Joint Accreditation System of Australia and New Zealand (JASANZ)

JASANZ is the joint national accreditation body for Australia and New Zealand. The directory of members provides details of organisations offering certification services for ISO 27001.

Computer Network Defence (CND)

Computer Network Defence (CND)

Computer Network Defence (CND) are a Broad-Spectrum Cyber Security Consultancy and Recruitment Agency.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

MetaWeb Ventures

MetaWeb Ventures

MetaWeb Ventures is a global venture capital firm focused on pre-seed and seed investments in crypto start-ups.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

Francisco Partners

Francisco Partners

Francisco Partners provide capital, expertise, and support for growth-aspiring technology companies.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.

BestDefense

BestDefense

BestDefense offers proactive cybersecurity solutions that adapt in real-time to outpace evolving threats and ensure resilient protection for your critical assets.