Prenda Law is a law firm that provides legal services to content producers and creative professionals. Our focus is purusing individuals and businesses who infringe on the copyrights associated with our clients creative works. Our practice includes addressing the unique legal issues posed by Internet-based piracy, where the vast majority of infringement occurs under the cover of Internet Protocol (“IP”) addresses.  In addition, our firm pursues hackers that break into our client's pay websites to steal digital content. Prenda Law actually pioneered this litigation.

Pirate Code

Pirate Code

Modern-day intellectual property pirates practice many of the customs of their sea-faring forebearers. By way of example, both groups abide by a set of rules (i.e. a “Pirate Code”) to provide a structure intended to enhance the effectiveness of piracy operations. A description of “Pirate Codes” associated with the likes of such buccaneers as Captain Henry Morgan can be found on Wikipedia: Here

The Pirate Codes of modern-day intellectual property pirates are more focused on assuring that everyone is participating in the distribution of pirated content. For example, the principles embedded in the BitTorrent protocol assure that every downloader is also an uploader. The rules of some BitTorrent websites take this principle to more extreme heights. For example, certain private BitTorrent websites require users to maintain a minimum upload/download ratio. Failure to abide by these principles can result in a lifetime ban-which is not the worst fate considering the consequences of crossing Blackbeard.

Google fights piracy

Google fights piracy

According to an article published on Digital Trends, Google is taking steps to implement several anti-piracy measures, which will ideally make it more difficult for searchers to located pirated material. First, Google is increasing its responsiveness to takedown requests of so-called “reliable copyright holders.” Second, its autocomplete function will filter out greater amounts of infringing results. Third, Google’s AdSense program will attempt to reduce its presence on websites associated with piracy. Finally, Google indicated that it would tweak its search algorithm to promote search results linking to legitimate requests.

Pixar’s president discusses copyright laws

Copyright Laws

According to a recently published article in the Salt Lake Tribune, Ed Catmull, president of Pixar Studios, linked international copyright protection to Pixar’s ability to continue investing in the cutting-edge technology that’s brought us such movies as Wall-E, Monster’s, Inc., and Up – all of which are presumably registered trademarks of Pixar Animation Studios. At his Utah Valley University speech, Catmull singled out Russia and China as nations where copyright protection is particularly lacking, estimating that up to 90 percent of the value of Pixar’s recently-released movies were lost due to poor copyright protection. According to Catmull, if the global community values continuing innovation in the computer animation field, it must allow studios to recoup the value of their investment in such innovation.



Digital Piracy 101

Digital piracy occurs through several channels. Each of these channels offers trade-offs between likelihood of detection, convenience and content availability.

Direct File Sharing This most basic form of piracy involves friends simply transferring files directly to one another via an instant messaging program (e.g. AIM), e-mail or other similar means. Direct file sharing is difficult to detect, but content availability is limited to the files held within the peer group.

File Locker Sites This form of piracy occurs when an individual uploads content to one of the many file locker sites (e.g. Rapidshare) and shares the link, typically via a content-specific forum, with the general Internet population. Third parties then follow that link to a site where they download content. File locker piracy is relatively easy to detect, but is not an extremely convenient means of sharing files. Nor is content availability as high as in other channels (though this is changing fast).

Peer-to-peer piracy This form of piracy occurs when individuals use a peer-to-peer protocol (e.g. BitTorrent) to transfer files. The typical steps in this process involve using a search function to locate the desired content, and then running a software program that implements a given protocol to download the desired content. P2P piracy suffers from easy detection, but is extremely convenient and the content availability is breathtaking. Virtually any form of content published in the past 20 years is available via P2P networks.test test test