Will VPNs Remain a Legal Way to Evade the “Six Strikes” System?

Posted by Cyberbear on January 2, 2014 in Computer Crimes, Copyright Law, Intellectual Property, Internet |

Posted by: Florencia Todaro

 

InternetSince everybody noticed that NSA is intercepting online activity and Google and Facebook are tracking your online movements. People get worried for their privacy.
One solution to avoid scams appears to be Virtual Private Networks.
The VPN establishes a virtual point-to-point connection through the use of dedicated connections and/or encryption.
VPN can be used for legal and illegal activities, it is not illegal per se. The main reason to use it is to hide your personal information and the privacy on your browse. But if nobody can find your IP, you can use P2P and download piracy content. Companies are unable to inform one of the DMCA violation if they are unable to find you. One of the VPN servers promotes the download as its principal advantage, although this could be secondary liability under U.S. Copyright Law, which recites “when a party materially contributes to, facilitates, induces, or is otherwise responsible for directly infringing acts carried out by another party”. They really induce the activity of P2P downloading; and if you aren´t downloading anything illegal, what need is there to be hidden?
The ease with which one can operate with a hidden IP address using a VPN implementation may not jive with teh objectives NSA officials. With their primary function being to protection and security of the nation, they may not wish for VPN to remain legal for much longer.
Until now, VPN connections are lawful, but if their popularity and illegal uses increase the Government may enact some restrictions. Since they adopted the “six strikes” system to prevent copyright piracy and spent a lot of money on it; now with VPNs users can easily evade such copyright controls. The system has become obsolete.  The ´six-strikes´ program works by sending warnings to notify the infringement and request them to stop with the illegal activity. But it works as a consumer-focused process and functions by finding the ISP to notify.

Copyright © 2010-2017 Cyberbear Tracks All rights reserved.
This site is using the Desk Mess Mirrored theme, v2.5, from BuyNowShop.com.