Home Technology Regulation US judge rules embedding tweet can violate copyright

US judge rules embedding tweet can violate copyright

US judge rules embedding tweet can violate copyright Featured

A judge in a New York district court has ruled that embedding a tweet on a web page could be a violation of copyright, overlooking years of precedent that say otherwise.

The judgement applies to all in-line linking, not just the embedding of tweets, according to the Electronic Frontier Foundation, a non-profit that promotes civil liberties online.

The ruling was made last week in a case that was filed in 2016 by a photographer named Justin Goldman. A photo he had taken of NFL quarterback Tom Brady and posted on Snapchat, was tweeted out by someone else and subsequently embedded in stories by a number of news websites.

Goldman sued Breitbart News Network, Gannett Company, Yahoo!, the Boston Globe and Vox Media, the companies behind some of the websites that used the picture, on the grounds that they had used his photo without permission.

The EFF pointed out that courts have in the past held that liability for copyright remains with the entity that hosts the infringing content, not merely the individual who links to it. This "server" test came about as due to a 2007 case orginally known as Perfect 10 v Amazon.

But the judge in the Goldman case, Katherine Forrest, saying in part in her judgement: "[W]hen defendants caused the embedded tweets to appear on their websites, their actions violated plaintiff’s exclusive display right; the fact that the image was hosted on a server owned and operated by an unrelated third party (Twitter) does not shield them from this result."

"If this ruling is appealed (there would likely need to be further proceedings in the district court first), the Second Circuit will be asked to consider whether to follow Perfect 10 or Judge Forrest’s new rule," the EFF commented.

"We hope that today’s ruling does not stand. If it did, it would threaten the ubiquitous practice of in-line linking that benefits millions of Internet users every day."

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications