Google To Break Pirates Over Music Searches

UK government-hosted talks spanning two Parliaments have culminated in Google and Bing at last agreeing to tweak their search results in response to copyright-holders' concerns, thereby heading off threatened legislation on their conduct.

The code means Google, Bing and other search engines will demote illegal sites from the top search results, meaning that fans searching for music are more likely to find a fair site.

Music groups have complained that despite a wealth of legal and free licensed music outlets, the search engines continue to promote unlicensed infringing sites, thus distorting the market. The Conservatives had already vowed, "to ensure that search engines do not link to the worst-offending sites" in page 42 of their 2015 Manifesto.

Recording industry trade group, the BPI today hailed a new voluntary code of practice for search engines with both of the giants have signed up to, the first tangible result from six years of government-backed discussions, as a landmark. The BPI has sent over 450 million infringement notices to Google and Bing since 2011.

BPI chief exec Geoff Taylor called it a "world first", but warned it "would not be a silver-bullet fix". The agreement does not yet include one of musicians' biggest beefs, which is Google's autocomplete providing pirate-friendly terms.

"The code will accelerate the demotion of illegal sites following notices from rights holders, and establishes ongoing technical consultation, increased co-operation and information sharing to develop and improve on the process. It will also enable new practices to be adopted where needed," said a BPI statement.

Recently, the government again threatened legislation if search engines do not come up with a working code.

Music groups cite research that search engines provide prominent promotion of unlicensed music, discouraging the legal market. The BPI says 74 per cent of pirate downloads begin with a search engine "as either a discovery or navigational tool in their initial viewing sessions on domains with infringing content".

Even Google has acknowledged its role, citing referrals from Google to infringing sites in double figures. Here's an example. Five of the first seven results offer unlicensed downloads, while the other two is Amazon.

Register

 

« Facebook & Google Are Killing Newspapers
Iran Cyber Attacks on Saudi Arabia »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

Kobil Systems

Kobil Systems

Kobil is a pioneer in the fields of smart card, one-time password, authentication and cryptography.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.