BBC says ISPs should cut off pirate connections

BBC Worldwide thinks those who repeatedly infringe copyright should not have an internet connection at all

BBC logo

The BBC has said people who repeatedly infringe copyright should not have access to an internet connection and that ISPs should be responsible for making sure they cannot break the law.

The statement was made in a submission to the Australian government's online copyright infringement paper, saying: "ISPs need a policy to deal with repeat offenders," the BBC Worldwide submission reads.

"Possible sanctions could include subjecting repeat offenders to a slowing down of their bandwidth, but stopping short of cutting off the internet service, except in the most serious and egregious circumstances, as is the case in the United States. A competent court or authority should be involved in such cases."

The BBC used the example of Dr Who being distributed illegally in Australia before it was even aired on TV, saying although the leak was down to the broadcaster not putting secure enough controls in place, those who leaked the programme should be punished.

It said, despite the BBC dedicating considerable resources to taking down and blocking access to the materials, 13,000 download attempts were made from Australian IP addresses.

The BBC would like to go down the educational route, warning those who infringe copyright and educating them about the law. If they do not stop illegally downloading content, they should be subject to more serious action - such as their connection being terminated.

Additionally, the BBC said anyone who is proven to be using VPN-style services and consuming a lot of bandwidth in the process should be investigated for piracy.

It said: "It is reasonable for ISPs to be placed under an obligation to identify user behavior that is suspicious' and indicative of a user engaging in conduct that infringes copyright. Such behavior may include the illegitimate use by Internet users of IP obfuscation tools in combination with high download volumes."

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Most Popular

Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020
Weekly threat roundup: Chrome, Citrix and WordPress

Weekly threat roundup: Chrome, Citrix and WordPress

23 Oct 2020
What is Neuralink?

What is Neuralink?

24 Oct 2020