Boston College Tells Students That Using A Wireless Router Is A Sign Of Copyright Infringement

from the wtf? dept

Copyright lawyer Ray Dowd points out that Boston College is telling students that simply using a wireless router is a sign of copyright infringement. Take a look at the image below:

The page lists out a variety of other things that are a lot more likely (but not definitely) to involve infringing — such as using file sharing networks to share copyrighted songs, or emailing songs around. But using a wireless router? As Dowd discusses, the three federal court rulings involving copyright that mention wireless routers, all use it as a defense against infringement, because it highlights how someone else may have used the connection.

So why is Boston College telling students that simply using a wireless router is a sign of infringement?

Filed Under: , , ,
Companies: boston college

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Boston College Tells Students That Using A Wireless Router Is A Sign Of Copyright Infringement”

Subscribe: RSS Leave a comment
185 Comments
Marcus Carab (profile) says:

An interesting claim when you explore that section more (emphasis mine):

“For any computer on the BC network, a specific IP address is assigned. The music and film industries monitor activity on file-sharing networks, and they contact Boston College with the IP addresses that are found to be illegally sharing files. BC, by law, is bound to release the identities of the individuals tied to those IP addresses.

Based on accusations from the industry? Not so sure about that…

Greg G (profile) says:

Re: Re: Re: Re:

Actually, if BC had a pair, it would say:

“BC, by law (See the Personal Data Privacy Act of 1974 (5 U.S.C. 552a)) will disregard any and all requests for the identity of any individual(s) associated with the IP address(es) presented unless accompanied by a court order or subpeona.”

Or, “RIAA, MPAA, et al., piss off unless you have more proof that just an IP address.”

btr1701 (profile) says:

Re: Re: IP Addresses

> “BC, by threat of lawsuits, is bound to release
> the identities of the individuals

What’s amazing is how, as a federal law enforcement officer, I can’t get information from a university on a student in a terrorism investigation without a court order based on probable cause, but the recording industry can get whatever they want just by demanding it.

Anonymous Coward says:

Re: Re:

HAVING A PERSONAL COMPUTER IS A SIGN OF COPYRIGHT INFRINGEMENT.

I recognize and compliment the sarcasm, but there’s a grain of truth in that.

The number of hijacked/0wned/zombie’d systems worldwide continues to increase, as it has for a decade. This isn’t surprising: the dominant operating system (Windows) CANNOT be secured, not even by Microsoft — which presents fresh evidence of its own failures on a daily basis. And other operating system instances, notably MacOS, have also been successfully attacked in large numbers.

Estimates of the number of such systems on the Internet vary, but any estimate under 100 million is absurd. Reasonable estimates at this time are in the 200-300 million range. But whatever that number is: it will be higher by the time you finish reading this.

Those systems are used for a lot of dubious things, and of course some of those things involve copyright infringement. So given current estimates of the total number of Internet users, and guestimating 1 system per user (some have many; many share some; let’s go with “1”), something like 1 in 5 or 6 end-user systems no longer belong to the people who think they own them…and could easily be involved in ANYTHING.

And as the Julie Amero case demonstrated, everything I just said is far, FAR beyond the feeble intellectual grasp of law enforcement, prosecutors and judges…so do I even need to try to explain how vastly inferior people like the MAFIAA couldn’t understand it even if their lives depended on it?

Anonymous Coward says:

Re: Re: Re:

Windows is easy to secure, what you can’t do is secure Windows from the stupidity of the end user.

That’s like trying to create a car that makes jerks drive correctly. You can control how the car works, but you can’t control what the operator does with the car.

Last I checked, Win7 is about as secure as a standard Linux distro install, which is a heck of a lot better than OSX.

Linux can be made more secure than Windows, but only through customizing it, which a typical end user would never do.

Anonymous Coward says:

Re: Re: Re: Re:

Don’t know where you got that idea but Win7 is more difficult to secure than Linux or OSX for that matter the reason why is that Win7 doesn’t allow you to modify anything in the administrator region, you need a lot and I mean a lot of knowledge to customize that part of the system using Win7.

You are correct in the assumption that any OS can be made secure or at least reasonably secure, but that takes real knowledge to accomplish and even with knowledge it is not going to be a hundred percent.

Christopher (profile) says:

Re: Re: Re:

Excuse me, but Windows is quite easy to secure if you do a few things:

1. Run an antivirus and firewall software.
2. Only download things from trusted sources.
3. Use Firefox or something similar that has a NoScript/AdBlock Plus funtionality through extensions or built-in to avoid being pwn’d by Javascript malware.

Just by doing those three things, I have been able to avoid ALL viruses on my machine, save those goddamned codec pack viruses that for a while, I was stupid enough to download.

MrWilson says:

Re: Re: Re: I feel sorry for anyone taking IT type classes at BC

At my college it’s a matter of department shuffling in a variation on the Dilbert Principle.

The least liked employee of one department is given preference when a position opens in another department, seemingly regardless of how unrelated the departments are or how unqualified the applicant is.

HR doesn’t vet applicants – just checks for degrees and “diversity.”

Managers aren’t necessarily qualified to do the jobs they hire for, much less competent enough to know who would do a good job.

Anonymous Coward says:

Re: Re:

It is poorly worded, but the message is clear that if a student has a wireless router in their room and somebody else uses it to infringe, it would look like the student with the router was the infringer. It’s not as simple and silly as Mike is trying to FUD it out to be. It’s good advice from the school. An unsecured wireless router could get a student in trouble. Leave it to Mike to twist it into FUD.

Chronno S. Trigger (profile) says:

Re: Re: Re:

It doesn’t say “unsecured wireless router” and it doesn’t say they will find who really did it. They say a wireless router can lead to your personal information being given away. That’s just like saying “I didn’t point the gun at him, I just held it and asked him to give me his wallet.”

Anonymous Coward says:

Re: Re: Re: Re:

If the router is actually secured, then there isn’t really a problem. They will try to “find who really did it.” They are, naturally, going to start by going to where the evidence points them. They will start with the student who has the router. Where else would they start? There is no mention of “personal information being given away.” I think you misunderstand what’s being said. The concern is that if someone else uses a student’s router to infringe, then that student will look guilty. That’s a bad thing, and it’s good advice to students to warn them of this. Students should have this fact in mind when making the decision to have a wireless router.

Gordon (profile) says:

Re: Re: Re:2 Re:

-Common examples of Copyright Infringement

-Using a wireless router in your room; others may use…….

This does NOT appear to say that if your wireless connection is unsecured you could look guilty. The way it is formatted looks exactly like it’s saying that using a wireless router in your room is a common example of CI.

If they wanted to have the appearance of saying that it’s not a good idea to have an unsecured router for these reasons they shouldn’t have put it into the bullet points and worded it the way it is.

My 2 cents.

Anonymous Coward says:

Re: Re: Re:3 Re:

Except you left out the full sentence:

“Using a wireless router in your room; others may share illegal material through your router, giving the appearance that you are the guilty party.”

The offending use of a wireless router was spelled out. And they are 100% correct.

Above AC is correct; This is just Masnick whining and spreading FUD. Which seems to be all he’s good for.

Gordon (profile) says:

Re: Re: Re:4 Re:

Leaving out the full sentence or not is irrelevant. The point I was making is NOT whether or not it would make you look guilty. It would most certainly make you look guilty initially.
The point I was making is that the way this is worded and formatted it looks like BC is actually saying using a wireless router is a common example of infringement.

Use your reading comp skills, look at the reply I posted to myself, get the WHOLE picture of what I was saying, then quietly go away.

Thank you.

Derek Kerton (profile) says:

Re: Re: Re:6 Re:

Seems to me using an unsecured wireless router is YOUR ONLY way of not looking guilty (whether you are or not), should the RIAA accuse an IP address of infringing.

I say “accuse an IP address of infringing” specifically, because that is all they know, they cannot accuse a person.

And, logically, the more open your wireless router, the less certainty anyone could have about who is responsible for infringement tied to an IP address.

What BC really meant was:
“Please secure your wireless router so that when the RIAA comes knocking, we can help them as expediently as possible to identify the BC student on whom they want to apply the onerous laws which they wrote. An unsecured router makes the job of finding shakedown victims harder for the recording industry, and BC doesn’t want to waste their time.”

Markus Hopkins (profile) says:

Re: Re:

You are mistaken. The college says that although you may not be the one sharing, it will appear that you are, and the college will turn over your information as the infringer based on the IP of your router. Hence, from the school’s position of caving to copyright owners, you might as well be the guilty party, since the IP is the evidence of infringement, and the IP is attached to you.

Anonymous Coward says:

Re: Re: Re:

That’s right. If your IP address is used to infringe, they will come after you. How else would they do it? Should they go after someone whose IP address wasn’t used? Makes no sense. You start the investigation where the evidence points you to start–you start with the IP address subscriber.

Markus Hopkins (profile) says:

Re: Re: Re:3 Re:

My first point was a response to the idea that the article was poorly worded. You in effect agreed with me about what the college was saying, while making it sound like I was saying that the IP should not be used as “evidence” or a jumping off point or what have you. Other’s in the comments are discussing those issues, but I was only pointing out that this is what the school was saying, in response to the comment that the school was warning about the activities of others, as opposed to warning how it would look if their router was involved.

Anonymous Coward says:

Re: Re: Re:2 Re:

If a student’s router is being used to infringe, the investigation will begin with that student. Where else would it begin? It’s not that they are necessarily guilty, it’s just that they are the one the evidence points to. The school is just following the rules, and the advice in question is sound. Having a wireless router can bring a lot of trouble to a student. It would be wrong to NOT warn them about this.

vivaelamor (profile) says:

Re: Re: Re:3 Re:

“If a student’s router is being used to infringe, the investigation will begin with that student.”

That isn’t the issue. The issue is whether the college is handing over the details of a student based on their IP address. Handing over details isn’t an investigation, it’s forgoing the need to investigate at the expense of the student’s privacy.

“Having a wireless router can bring a lot of trouble to a student. It would be wrong to NOT warn them about this.”

That may be the case, but the way the advice is written gives the impression that merely operating a wireless router is an example of infringement.

Matt (profile) says:

Re: Re: Re:4 Re:

But that WAS the issue Mike raised. AC is right on this one – Mike said it was strange that the school was telling students that having a WiFi router is a sign of infringement. AC agreed with Markus that the wording was poor, but the underlying message is sound – because we (BU, a government institution) have misinterpreted the law to require us to violate our students’ right to conduct internet activity anonymously, we will blame you (student with a router) if someone hides behind your IP to do something nefarious. That is a good and useful headsup from the school. AC is correct that that is a good and useful headsup from the school.

Christopher (profile) says:

Re: Re: Re:6 Re:

No, it isn’t. Why? Because the fact is that an IP address is NOT PERSONALLY IDENTIFIABLE INFORMATION! It could be that someone up the street 4 doors is using my wireless router, secured or not, without my knowledge.

Therefore, a IP address alone does not rise to the level of ‘evidence’ for anything…. not a search warrant or anything.

Greevar (profile) says:

Re: Re: Re:3 Re:

“If a student’s router is being used to infringe, the
investigation will begin with that student.”

No shit, Sherlock? I’m glad you cleared up that painfully obvious point.

“The school is just following the rules, and the advice in question is sound.”

They aren’t and it isn’t. They are caving into the demands of a powerful minority, not the law, and giving out misleading advice. They are not required to give out this information without anything less than a subpena from a judge. And to that, IP is poor evidence. Even for probable cause it doesn’t hold up. IPs can be faked, hijacked, or mis-recorded. They are too volatile to be considered reliable to prove anything other than that a particular IP was recorded as the recipient of alleged infringing data.

Greevar (profile) says:

Re: Re: Re:5 Re:

They shouldn’t, they better have more concrete evidence if they want to claim probable cause. If I saw someone running people down with your car, do I come knocking on your door and arrest you? No, I find out who was driving that car instead of assuming that the name attached to that car is responsible. That’s what an IP is, a vehicle to get information from the internet.

Derek Kerton (profile) says:

Re: Re: Re: Re:

Dumbest comment yet.

So, you are saying that the owner/operator of every network element that touches the packets of infringing content is an accessory, and possibly liable? That includes the school, their ISP, the Internet backbone provider, etc.

On a similar note, Ford is now an accessory and liable for 23% of US hit and run accidents.

Anonymous Coward says:

So why is Boston College telling students that simply using a wireless router is a sign of infringement?

What silly FUD.

Look at the whole sentence: “Using a wireless router in your room; others may share illegal material through your router, giving the appearance that you are the guilty party.”

It explains that if the student has a wireless router in their room and other people use that router to share illegal material, it could make the student that has the router look guilty. That’s sound advice. If someone else used that router to infringe, it would look like the student with the router is the infringer. As the case law that Dowd quoted points out, simply saying, “I have an unsecured router and another person did it” is not a perfect defense.

Must be a slow news day.

Chris Rhodes (profile) says:

Re: Re: Re: Re:

I’m interested in hearing more on this subject.

It’s up to the industry lawyers to prove that you were downloading infringing content. How can they do that if they can’t tie the IP to you for certain?

When you say “it’s not a successful defense”, it sounds more like “it doesn’t prove you didn’t do it”, which is true, but proving innocence isn’t the way our system (nominally) should work.

Anonymous Coward says:

Re: Re: Re:2 Re:

The defendant only puts forth a defense after the plaintiff has finished proving their case. If the plaintiff can show by a preponderance of the evidence that the defendant did it, the burden shifts to the defendant to then prove that they didn’t. The defendant is presumed to be innocent. The burden only shifts if the plaintiff can prove out a case.

Anonymous Coward says:

Re: Re: Re:4 Re:

They gather all the evidence they can and present their case. I’m not sure I really understand your question. Just because the defendant uses a wireless router doesn’t mean the plaintiff can’t prove their case. If that were so, everybody would just use a wireless router with impunity.

vivaelamor (profile) says:

Re: Re: Re:5 Re:

“They gather all the evidence they can and present their case. I’m not sure I really understand your question.”

The question is how can there be a preponderance of evidence identifying the IP address holder as the infringer, if there is evidence that anyone within wireless range could have committed the infringement?

Christopher (profile) says:

Re: Re: Re:7 Re:

No, it sounds like you need to read the postings. If a router is UNSECURED, that means that basically anyone under the sun could use the router to download CP, copyrighted works, etc.

Hell, even if a router is SECURED, that can happen if someone spies on you putting in the password and gets that password.

Like the guy is pointing out: AN IP ADDRESS IS NOT EVIDENCE IN AND OF ITSELF! In fact, if that is the only evidence that someone has that someone else is infringing? The judge should throw out the case and refuse to grant a search warrant or anything else, because those things are easily faked/manipulated/etc.

Chris Rhodes (profile) says:

Re: Re: Re:5 Re:

They gather all the evidence they can and present their case.

I guess my question is: What other evidence are they likely to have?

That is, if the IP itself doesn’t prove it (and it doesn’t), they would presumably have to come forward with some other evidence. As you say, the IP seems like the appropriate place to start an investigation, but saying that having an open router “is not a successful defense” against an infringement charge because there might be other evidence against you too strikes me as a “well, duh” argument.

I would think that having an open router would be a successful defense specifically against their IP address evidence. Any other evidence (e.g. a blog post about how you just grabbed the songs in question off the Pirate Bay) would obviously not be covered by an open router defense, but then, I don’t think anyone has said it would.

r (profile) says:

Re: Re: Re:5 Re:

If all the evidence gathered is the IP of a wireless router and stops and have none of the MACs associated with the NAT distributions nor their connection times then they, in fact, have very, very little evidence. They would have a public WAP identity and that is all (and thanks to the college a name for the NAT’d IP). Secured or not they need what is behind the router. Surely, concrete evidence can not stop at the NAT distribution point for the identification of a single infringer. Concrete nothingness that is.

A router routes things behind it, yes? The crooks drove over that bridge there -> ! Who owns this bridge!? Patently ridiculous – much like the current business model.
r

Marcus Carab (profile) says:

Re: Re: Re:5 Re:

It works the same as criminal court.

Except, if I understand correctly, that the standard is “preponderance of evidence” or “balance of probabilities”, rather than “beyond a reasonable doubt” – which makes a pretty big difference.

I suppose the standard of proof is somewhat separate from the presumption of innocence, but the two seem rather intertwined to me.

Anonymous Coward says:

Re: Re: Re:2 Re:

None of those three cases cited say that having a wireless router means you’re off the hook. From one of the cases: “While defendant claims that he uses an unsecured wireless router at his residence, which could have been used by an outside party to commit the alleged infringing activity, this does not constitute a complete defense.” You can’t just say, “I have a wireless router” and then walk out of the courtroom. You need to show more than that.

Greevar (profile) says:

Re: Re: Re:4 Re:

Furthermore, shouldn’t they have to prove that the defendant committed the infringement? If they can’t because the router was open (and even if it wasn’t), then there is no proof that they did. They will have to find other evidence that is more concretely linked to the accused in order to prove guilt. With the prevalence of identity theft and hacking, it can stand to reason that a defendant that professes innocence could reasonably claim that their system was compromised and the actions that appear to be theirs, is actually a remote misuse of their system and identity. That, and an IP is hardly concrete proof to identify the transgressor.

When it comes to these sorts of cases, I think the burden of proof should be elevated to “beyond a reasonable doubt” since there is so much evidence that can be tainted by malefeasance of a third party. Most people are not well versed in technology and the security thereof. They are often the victims of criminals looking to abuse their ignorance and they often succeed.

Anonymous Coward says:

Re: Re: Re:4 Re:

Showing that infringement occurred is only the beginning. That’s enough to file a lawsuit. The whole point of bringing a lawsuit against someone is so that you then can get court orders to gather more evidence. Without the lawsuit do you think alleged infringers would just had over their computer for inspection? Do you think they’d volunteer to be deposed? Of course not. It works the other way too as the alleged infringer can gather evidence against his accuser to try and discredit his claims.

Anonymous Coward says:

Re: Re: Re:5 Re:

Do you think the police would have any credibility if they took evidence from a traffic camera that constantly spoofed the photos with random cars and plates?

Because when you use IP addresses that is what you get, a traffic camera machine that produces a lot of fake photos mixed with real ones.

In what world people allow such a thing to be serious?

Only in the f. up American judicial system that is where.

Chris Rhodes (profile) says:

Re: Re: Re:6 Re:

Do you think the police would have any credibility if they took evidence from a traffic camera that constantly spoofed the photos with random cars and plates?

A small tidbit: Perhaps you didn’t mean to suggest so, but IP-spoofing does not work for two-way traffic such as file sharing. That would be like mailing a payment to a bootlegger for a copy of a DVD, but putting a fake return address on the envelope to evade detection by the authorities.

Sure, the authorities won’t have your real address, but the bootlegger is going to have a hard time getting your DVD to you.

Anonymous Coward says:

Re: Re: Re:7 Re:

Does it matter?

As far as I know every P2P network out there is sending a small amount of spoofed IP’s to everyone to counter IP harvesting from companies.

This forces them to look hard at the data collected you can’t just collect IP’s because those connections may be spoofs and not real ones you need to download something and get a record of the data transfer to be proof that some IP is really sending data to you.

But apparently that is not being done since you can see a large number of people who don’t know what P2P means or don’t even have those programs installed being accused, and the reason why is IP spoofing working as envisioned.

You can look it up every bittorrent tracker spoof IP’s, this is known as crowd anonymity.

If they just collect only IP’s and don’t do additional work they will drag a lot of people who never used P2P in their lifes, hence the comparison to a traffic camera spoofing car images, will you trust that camera to tell you that that car was really there without questioning?

Matt (profile) says:

Re: Re: Re:4 Re:

Prosecution does. But we aren’t talking about prosecutions, we’re talking about plaintiffs. In a civil action, the evidentiary burden is merely to prove your side of the case by a preponderance of the evidence. That means “more or better evidence than the other guy”. It is entirely subjective – the only objective requirement is that you propound _some_ evidence of every element of the claim, and your own (self-serving, manufactured for trial) testimony is some evidence.

In other words, in a civil case all a plaintiff need do is testify that they believe (perhaps based on information given to them by the university about the user of a particular IP) that the student infringed their copyright to their detriment. Then the student has to put on some evidence that he didn’t (could be just as crappy as the plaintiff’s). Then the decider of fact (say, a jury) gets to choose whose evidence was better.

Anonymous Coward says:

Re: Re: Re:2 Re:

It worries me that you’re a federal agent, because you constantly show ignorance of the law. I’m referring to a defense. Defenses only become necessary after the plaintiff has successfully presented their case. Of course the plaintiff has the burden INITIALLY, but then it shifts to the defendant.

btr1701 (profile) says:

Re: Re: Re:3 Re:

> It worries me that you’re a federal agent

I’m losing sleep over how worried you are.

> Defenses only become necessary after the
> plaintiff has successfully presented their
> case.

And in cases like this, the recording has repeatedly claimed that identificationb by mere IP adress alone is enough. In sucha trial, would certainly behoove the plaintiff to “have more” than an IP address if it leads to a wireless router being used in a college dorm. Otherwise, the defense need merely point out the existence of the router (hell, they could just point out the fact that the kid leaves his door open and lets people physically use his computer to do their coursework) and that would be all she wrote for the plaintiff. They will not have proven their case against the defendant anywhere close to the proponderance of the evidence standard.

PRMan (profile) says:

Re: Re: Re:

“Sounds like they are giving advice to students on how to beat the rap.”

I don’t think everyone has been paying attention. Once the MAFIAA comes after you for file sharing, there really isn’t much of an upside.

If you think getting dragged through the courts for years on end only to end up getting your legal fees back is “winning” then more power to you. But the advice is sound.

Anonymous Coward says:

It’s seems to me to be a poorly worded warning that people can access p2p networks, etc through an unsecured wireless router, and that content providers would assume that the router’s owner is the culprit.

I don’t really see a story here, just a security warning that could have been phrased much better.

Anonymous Coward says:

“Top Five Myths” adapted from http://www.messiah.edu/etc/downloading.html)”

Presumably with permission of course.

The thing is christianity while not itself founded on copyright infringement, surely did spread as it did from its original handful of followers by means of widespread infringement which continues unabated up to this day with not one penny going in royalties from printing/sales of bibles to the original writers or their heirs/estates.
And bibles sell quite well, despite many being given away for nothing but in either case, there is no incentive to the writers to create new works.

As someone who dislikes religion, I almost wish the copyright laws had been stronger back then and enforced of course, they would have certainly choked off, christianity and later islam before they got any real foothold.

Anonymous Coward says:

Re: Re: Re:2 Re:

It is actually you who missed the point as there were two points.

1) sales without copyright / copyright enforcement (competing with free)
2) enforcement of IP can kill off entire future markets, some that people might like and some that people might not like. But like or not like, without widespread copying and disseminating far outside official channels and often for free

I don’t like religion and would have been glad if the two worst examples in terms of global reach had never gotten off the ground.
Others, perhaps even you, may be glad that they got off the ground and became religions of global influence thanks to the failure to have and enforce IP (in the way IP “rights holders” want to do now,) back in the day.

So while I did express my dislike and disdain for religions and the two later mashups of Judaism, it was in the context of how strict copyright enforcement prevents the opening up of new markets, so any offense taken is simply added value.
And that is apparently what one needs to succeed in the digital age.

Anonymous Coward says:

Re: Re: Re:4 Re:

Oh?
Are you someone who thinks that the publishers are the only rights holders now.

Are we forgetting about the original artists here?

Of course the people who copied their work and later the publishers who did ditto but on a larger scale, neither of whom paid any money to the artists or their estates at any point, would not have used copyright to prevent their own money making scams.

That’s where modern style IP rights could have shut them down.

Anonymous Coward says:

Re: Re: Re:6 Re:

You assume so, based on no evidence whatsoever.

For all you know, these guys could have been writing historical fiction about what happened when a real messiah came along but not the one everyone was expecting.

Perhaps over the years, the disclaimer that this was intended to be fiction was dropped in the same way that fbi warnings about copyright infringement are routinely dropped from pirated copies of movies.

Perhaps many parts of the gospels or the letters that made it into the new testament were dropped for giving the wrong message as entire other gospels were dropped.

We only know that the people who did want to spread the message, that which became the Catholic church would certainly want you to think that the original authors had the same view.
But they were the copiers, so they certainly had a vested interest in doing so and shading the messages the way they wanted to.
Similar happened when printing technology became available and suddenly a lot of the arguments that had been had out in the Catholic church in the opening centuries of the first millenium CE were being propounded again by people who were now shading or interpreting the messages in other ways.

And why wouldn’t you think that people wouldn’t have done it for compensation, there are plenty of examples in every religion where raking in money was and is still the primary motivation of many in the field.

But even if we assume that gospels were not fiction and that the gospel writers did genuinely claim to believe in everything they wrote that does not preclude a desire for compensation.

The catholic church didn’t become rich because it eschewed wealth and dialling 1-800-god for donations so that individuals can live properly wealthy lifestyles is not unfamiliar to us.
So why assume that the original authors would not have wanted a taste too.

Matt (profile) says:

Re: Re: Re: Re:

Zondervan continues to restrict distribution of certain versions of the Bible (NIV, for instance,) by strict application of copyright law. I do not pretend to know whether they have prayed over that particular tactic, but they have certainly taken the position from time to time that controlling distribution and derivative works has allowed them to keep the translation from being corrupted.

Incidentally, I do not mean to suggest that Zondervan has misused copyright, or that if there must be copyright laws that this is a bad application of them.

Anonymous Coward says:

Re: Re: Re:

While you are probably right Greevar,
there are a lot of assumptions there.

We don’t actually know what the original writers intended.
We don’t even know if what has come down through the ages in terms of gospels for example are complete and unedited.

We also don’t know if Paul’s letters weren’t written tongue in cheek in parts, perhaps the intended recipients knew him to actually be big on women’s rights but for a laugh he presented himself as a misogynist of the very old school knowing full well the people he was actually writing too would know that. Perhaps, and it is unlikely, he would be distraught to know they were being shown to people who don’t have the vital background information to know when he was joking and when he was being serious.

But as many older tv shows are being kept off DVD because rights for dvd didn’t exist when the actors original contracts were drawn up and now people aren’t available to reach agreements and/or their estates aren’t willing to reach agreements based on current copyright law, its not impossible to think similar could not have occurred back then as long as we assume its with the same politicians, laws and lawyers as exist now.

Quite apart from Judas’ family getting the publication blocked on grounds of lies, defamation and libel, even if it was being put forward as a work of fiction.

Steven (profile) says:

The page got cut off a bit..

It goes on:

Making a mix tape for a boy/girlfriend.
Turning up the radio so others in the dorm can hear a song you like.
Singing in the dorm showers in a manner that others can hear you.
Allowing your roommate to share in watching a movie you rented.
Using quotes from movies with friends in an attempt to appear funny or knowledgeable.

Anonymous Coward says:

Update to my previous post:

Although it is sound security advice not to leave your router unsecured, I think the reason Mike jumped on this story is because the school is listing it as an “example” of infringement. It’s merely a scenario in which infringement “might” occur, so whoever made the list is either slightly incompetent or a little confused. Still think it’s a non-story though, Mike. Sorry.

Jesse (profile) says:

UBC actually bans routers! READ THIS!

At the University of British Columbia, they [technically] banned routers altogether:

From the Resnet Service Agreement
Each ResNet connection is intended to provide services through one computer to the resident of the room it is in. There may be only one computer connected to each ResNet port.
http://www.it.ubc.ca/service_catalogue/internet_telephone/resnet/resnet_policies/resnet_service_agreement.html

I’m not interpreting this wrong. I called in for a random issue and I was told by multiple people that routers are banned. I asked them to cite where in the policies it says so, and they pointed me to above. No one follows that rule, and they don’t enforce it, but there it is.

kryptonianjorel (profile) says:

Re: UBC actually bans routers! READ THIS!

The router is a computer, and it is the only thing ‘connected’ to the ‘resnet port’ (never heard of THAT connector).

Or you could tell them to kiss your ass. I told my university, “I pay $20,000 a year to go here, and you are not going to tell me what I can and cannot do with the internet connection I PAY FOR”

Matt (profile) says:

Re: Re: UBC actually bans routers! READ THIS!

If I were the IT department at your university, I would turn off your ResNet port until you agreed to comply with the appropriate school policies. I assume something similar would be done if you, for instance, demanded the right to use the chemistry lab YOU PAID FOR to cook up meth. Of course the university may make and enforce policies to better accomplish their mission, including restricting how you use the resources they permit you to access. Your tuition does not buy you the right to violate the policies.

As for your tuition, it very likely covers less than half the cost of your education. You did not pay for the internet connection, you paid an access fee to get access to resources that the school’s alumni- or state-funded endowment paid for.

In a few years, you will grow out of that sense of entitlement, or you will join the **AA as a senior executive.

kryptonianjorel (profile) says:

Re: Re: Re: UBC actually bans routers! READ THIS!

Haha, that post makes me laugh.

The only ‘sense of entitlement’ I have is the entitlement to the things I paid for. I am not being given anything, I am receiving the services that I pay for.

So yeah, if you call that a sense of entitlement, then guilty as charged; I have a sense of entitlement about everything I pay for

Jesse (profile) says:

Re: Re: Re: UBC actually bans routers! READ THIS!

Matt your logic is deeply flawed. I live in a residence. I pay for this internet connection. In fact, both my fiancee and I are registered to live here, together, in the same unit. According to this policy, only one of us, while both students, may use the internet at a time. We are [technically] expected to take turns using the internet!

Again, this policy isn’t enforced. But it goes to show what sort of poorly thought out junk we blindly agree to on a daily basis.

wsuschmitt (profile) says:

Boston College May Be Infringing

Boston College’s own website describes both an unsecured and a secured WiFi network that is on campus. What legal ramifications does this mean? From http://www.bc.edu/offices/help/getstarted/network/wireless/about.html :

“BostonCollege is an open, unsecure wireless network that is an alternative for older laptops that do not meet the requirements for bcsecure (BC username and password required). This network does not encrypt data. Therefore, information sent across the wireless network using BostonCollege is ?in the clear.? Others might snoop or intercept data transmitted using the unsecured wireless service.”

Anonymous Coward says:

Re: Boston College May Be Infringing

While the “BostonCollege” network is unsecured in the sense that it doesn’t have a password, it redirects you to a form you have to agree to which states that any actions performed over the BC network are the sole responsibility of the user, and not the school. So no, there’s no legal ramifications for that.

lux (profile) says:

If you're going to play that game...

…then in the spirit of taking everything overly literally and not reading between the lines, I guess it’s not copyright infringement if I send a copyrighted song to some of my friends, right?

Emailing copies of a copyrighted song to all of your friends.

Again, this is badly worded, but the point still stands. You can be wrongly accused of file-sharing if you use an unsecure router, which is clearly what is meant by the college’s statement…which any moron in a hurry could realize, but…but…straw man!

Dan says:

Heard similar things before :)

Sometime back I have heard that Wayne State also has a similar policy. Serving notices to students who had wireless enabled in their room.

Even funnier note from Boston College site – http://www.bc.edu/offices/help/security/copyright/myths.html

5. What’s the big deal? It doesn’t hurt anybody.

According to the RIAA, online piracy has cut into national music sales by nearly a third since 1999, sending recording and film revenues into a downward spiral, which hurts everyone in the industry, and can hamper the development of new music, films, artists and talent. And once caught downloading illegal files, the individual downloader faces damages resulting from the legal and disciplinary process.

Anonymous Coward says:

Re: Heard similar things before :)

5. What’s the big deal? It doesn’t hurt anybody.

We know it doesn’t but nonetheless it is against the law and is being enforced by Homeland Security.

So if we don’t do everything we can to prevent you doing it, we’ll get dragged into court and that is not only horribly expensive but we don’t have the time for it.
And if you do it despite us doing everything we can to stop you from doing it, then it’ll be your ass in the sling.
So just don’t do it, ‘kay.

zaven (profile) says:

I had a wireless router in my room because the campus provided wifi was laughably insecure. You know what else could cause infringement? Someone getting the account info of my campus account (because it was an unsecure network and they don’t use HTTPS) and emailing infringing files to people. I can’t have my own wireless, and I can’t use yours? I’m confused now.

Anonymous Coward says:

Ha, there’s worse TOS on internet. Check this one http://www.pvt.com/internet-service/acceptable-use-policy.html
One of my favorites is, your not allowed to look at porn (ii), and they will spy on you occasionally to make sure your not (Inappropriate Content and Transmissions).
This company provides the only fiber optic in the area (very limited). Competition is great.

Anonymous Coward says:

I once saw a bank robbery happen but I got the license plate of the getaway car. I gave it to the police but they said there was nothing they could do.

They explained that the license plate could be attached to a car owned by a person that lived in the house with a family. It could have been his wife or son or brother’s car.

They also said that there was no way I could not be sure the plate wasn’t taken from some other car and put on the getaway car.

Furthermore, some people just leave their cars unlocked. So, someone could have taken the car, drove it to the bank, robbed it, and brought it back.

License plates can also be easily faked.

So there was absolutely nothing they could do. No warrant; no further investigation was possible at all. They said goodbye and asked me to call them if I actually had some evidence next time.

DaveK says:

This entire article is a bare-faced lie.

>”Boston College is telling students that simply using a wireless router is a sign of copyright infringement. Take a look at the image below:”

I did; it says no such thing.

Firstly, it is not a list of “signs of” copyright infringement but a list of “examples of”, so you haven’t even described it accurately. Let me explain in terms that even a child could understand: “sign of” is to “example of” as “symptom” is to “disease”. If you really can’t tell the difference between those two concepts, you aren’t competent to be writing professionally.

Secondly, it doesn’t even say that using a wireless router is an example of copyright infringement. It says, very clearly, that if you use a wireless router somebody else might infringe copyright using the same router and you might get the blame. YOU CAN’T JUST IGNORE THE SECOND-HALF OF THE SENTENCE AFTER THE SEMI-COLON AND PRETEND YOU DIDN’T SEE IT.

Well, you can, but how the hell you can seriously expect your pretence to pull the wool over anyone else’s eyes is beyond me.

Well, actually even that’s not beyond me; you just want to write a sensationalist headline, you know full well that it will generate tons of angry comments from people who have trusted your misbegotten malinterpretation of events and not even clicked on the big version of the picture.

You aren’t actually stupid or illiterate or blind, you are just faking it to try and justify your deliberate out-of-context mangling and misinterpretation of perfectly plain English.

Hell, you’d be the first to complain if someone wrote a big article that just took the last half of your headline and ignored the rest to say “Techdirt claims ‘Using A Wireless Router Is A Sign Of Copyright Infringement'”, but that is exactly what you have just done.

vivaelamor (profile) says:

Re: This entire article is a bare-faced lie.

‘Firstly, it is not a list of “signs of” copyright infringement but a list of “examples of”‘

You’re complaining that he used a more appropriate word? I agree. The headline should have read: ‘Boston College Tells Students That Using A Wireless Router Is An Example Of Copyright Infringement’. That headline would much better illustrate the stupidity of Boston College.

“Secondly, it doesn’t even say that using a wireless router is an example of copyright infringement.”

Didn’t you tell us in the previous paragraph that it was a list of examples of copyright infringement? The context implies that using a router is an example. The use of a semi colon highlights the fact that the two halves of the sentence are independent clauses. If they didn’t mean to imply that using a wireless router was infringement then they should have used a comma or linked the clauses. You can’t just ignore the grammar and pretend that the sentence is unambiguous.

“You aren’t actually stupid or illiterate or blind, you are just faking it to try and justify your deliberate out-of-context mangling and misinterpretation of perfectly plain English.”

Uh, you seem to be lacking a motive for your devilish plot to pull the wool over our eyes. Aside from which, what does that make me for agreeing with him? Do I get to play the part of co-conspirator or are you going to suggest that I’m stupid, illiterate or blind? By the way, you do realise that blind people who use computers tend to use these wonderful things called screen readers and are as capable of understanding the issue at hand as a sighted person, don’t you? But hey, what’s belittling people with disabilities compared to a conspiracy against a college.

Anonymous Coward says:

Re: This entire article is a bare-faced lie.

So you are trying to say that an “example” is not a “sign” of copyright infringement? I don’t know if you comprehend sentences or not.

According to you, if a person emailed copyrighted music to all their friends then that also wouldn’t be a “sign” of copyright infringement.

Putting the wireless router as an example of copyright infringement is more than enough proof for what the author is trying to say. It is irrelevant that BC has added “others may share illegal materials through your router” because that is just an example of what could happen IF you use a wireless router. The thing that they are trying to say is that USING a wireless router itself counts as a sign of copyright infringement because others may use it for illegal purposes. But it still doesn’t change the fact that they are saying that if you use a wireless router, it is a sign of copyright infringement.

Hope you got my point. Also as a previous poster said, BC removed the wireless part so I guess they thought better about it too 🙂

Bryan R (profile) says:

Under the University of Massachusetts at Amherst, if someone else uses your router as a means of copyright infringement, you are also held responsible for that infringement. In fact, they trace the infringement only to the mac address that is registered on their network.

Not 100% sure on why this is, but my best guess is that the state urges UMass as an ISP to prosecute copyright cases. In many cases, infringement notices are handed out to students, who cannot access the internet on campus unless they deal with these infringement notices.

Leave a Reply to John Doe Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...