According to The Hollywood Reporter, Hologram USA and its CEO, Alki David, say the hologram infringed on its patented system to project 3D images on stage
210 million songs were illegally downloaded last year, compared to more than a billion four years ago.
Earlier this month, strict new laws aimed at tackling piracy were introduced which give rights holders the power to monitor suspected infringers and potentially order the government to shut down sites.
claims and has said on its website that income from online use of music, including legal streaming services, has risen.
“As high-speed internet capacity has become normal and often included in mobile subscriptions, illegal download and use of music has decreased,”
“The new legislation is in my opinion not sufficiently technology neutral, as it is clearly designed to serve as a tool to prevent P2P file sharing and not, for example, illegal streaming services, which may become a problem in the years to come.”
Norway continue to tighten the copyright laws in the advantage of the IP owners. Though the approach is based on strong preventive measures rather then transparent, easy to use, relatively inexpensive access to content it seems to work
companies will be able to order the scanning of suspected copyright infringements and also target Internet Service Providers (ISPs)
“If you are an entity and feel you have IP rights and are the subject of piracy, what the law allows you to do is to start collecting suspected Internet addresses. At the point when you have enough evidence you can then approach the court to get the ISP to reveal their identity
Once the entity has that address it’s up to them whether they want to bring a copyright case to the court or write to the person behind the website
It appears to be designed to serve as a tool for rights holders to intervene against illegal file sharing by the use of peer-to-peer technology and web sites
“It is still an open question whether the rights holders will be able to use the legislation as a tool against copyright infringements that employ different technology, such as cloud-based storage and sharing of infringing material.