BBC says ISPs should cut off pirate connections
BBC Worldwide thinks those who repeatedly infringe copyright should not have an internet connection at all
The BBC has said people who repeatedly infringe copyright should not have access to an internet connection and that ISPs should be responsible for making sure they cannot break the law.
The statement was made in a submission to the Australian government's online copyright infringement paper, saying: "ISPs need a policy to deal with repeat offenders," the BBC Worldwide submission reads.
"Possible sanctions could include subjecting repeat offenders to a slowing down of their bandwidth, but stopping short of cutting off the internet service, except in the most serious and egregious circumstances, as is the case in the United States. A competent court or authority should be involved in such cases."
The BBC used the example of Dr Who being distributed illegally in Australia before it was even aired on TV, saying although the leak was down to the broadcaster not putting secure enough controls in place, those who leaked the programme should be punished.
It said, despite the BBC dedicating considerable resources to taking down and blocking access to the materials, 13,000 download attempts were made from Australian IP addresses.
The BBC would like to go down the educational route, warning those who infringe copyright and educating them about the law. If they do not stop illegally downloading content, they should be subject to more serious action - such as their connection being terminated.
Additionally, the BBC said anyone who is proven to be using VPN-style services and consuming a lot of bandwidth in the process should be investigated for piracy.
It said: "It is reasonable for ISPs to be placed under an obligation to identify user behavior that is suspicious' and indicative of a user engaging in conduct that infringes copyright. Such behavior may include the illegitimate use by Internet users of IP obfuscation tools in combination with high download volumes."
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now