March 13, 2002Computer Systems Lab Colloquium1 IMPLICATIONS OF ANTI- CIRCUMVENTION RULES FOR INNOVATION Pamela Samuelson, UC Berkeley, at Computer Systems.

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
Intellectual Property Image: William J. Wynn.
February 9, 2005Internet Caucus1 MGM v. GROKSTER AND ITS AFTERMATH Pamela Samuelson, UC Berkeley, Internet Caucus, February 9, 2005.
2/21/00Financial Cryptography '001 TOWARDS MORE SENSIBLE ANTI-CIRCUMVENTION REGULATIONS Pamela Samuelson, UC Berkeley, Financial Cryptography ’00 February.
“Contentious Issues in World Regulation of the Internet” 35th World Computer & Internet Law Meeting May Fairmont Hotel San Francisco, CA “Balancing.
THE RPAC ANNUAL CONFERENCE. OVERVIEW OF THE DMCA: ITS PROMISE AND PITFALLS Jeanne Hamburg.
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
ENGR 101/HUM 200: Technology and Society November 29, 2005.
Digital Millennium Copyright Act (DMCA)
Changing the Network Infrastructure– Threats and Possibilities Alex Alben Nobember 6, 2003.
Intellectual Property Boston College Law School February 4, 2009 Copyright – Indirect, Digital Issues.
Intellectual Property Boston College Law School February 1, 2008 Copyright – Digital Issues.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Intellectual Property Boston College Law School February 1, 2007 Copyright – Digital Issues.
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
May 10, 2002World Wide Web conference1 TOWARD A NEW POLITICS OF INTELLECTUAL PROPERTY Pamela Samuelson, UC Berkeley, World Wide Web 2002 Conference, May.
Rights Management Overview Peter B. Hirtle Intellectual Property Officer Cornell University Library
January 9, 2003DRM Workshop1 DRM {and, or, vs.} THE LAW Pamela Samuelson Berkeley Workshop on Proactive DRM Agenda, January 9, 2003.
The Digital Millennium Copyright Act (DMCA) Claire Stewart MM450 February 14, 2006.
Copyright Law Boston College Law School February 25, 2003 Rights - Reproduction, Adaptation.
May 8, 2002EECS Lecture Colloquium1 IMPLICATIONS OF DMCA ANTI-CIRCUMVENTION RULES FOR RESEARCH Pamela Samuelson, SIMS & Law, EECS Lecture Colloquium Series,
September 25, 2012 Herb Regehr and Kwan Loh Bull, Housser & Tupper LLP Changes to Copyright Law – a Practical Discussion.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Legal Protection of Copy- protection Mechanisms & Rights Management Information Martina Gillen Law Department, Reading University
WIPO Copyright Sector 1.  Fundamental or constitutional rights or public interest: freedom of speech, access to information, right for education, enjoyment.
COPYRIGHT LAW 2002 Professor Fischer CLASS 27: TECHNOLOGICAL PROTECTION MEASURES, REMEDIES.
Copyright in the Digital Age October 14, 2004 FEDLINK Membership Meeting Carrie Russell, Copyright Specialist ALA Office for Information Technology Policy.
Copyright in the EU: The Infosoc Directive: TPMs, ACPs and RMI Turin, October 2011 Dr E Derclaye University of Nottingham.
1 CPTWG MEETING #96 April 18, 2006 Legislative/Regulatory Update Jim Burger CPTWG MEETING #96 April 18, 2006 Legislative/Regulatory.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
NEW SOLUTIONS FOR A DIGITAL WORLD Angela Teal LIBM 6320 FALL 2011.
Online infringement of copyright - the Digital Economy Act June 2010 Robin Fry.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
[Copyright M. S. Overing 2003]1 Copyright Overview Michael S. Overing, Esq. 201 S. Lake Ave., Ste. 606 Pasadena, CA
Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips.
COPYRIGHT LAW 2003 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Fair Use By Design or By Law? Stefan Bechtold Stanford Law School / University of Tübingen, Germany April 16, 2002.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES/DIGITAL MUSIC.
Open Source Defense Fund Presented by Kent Radek & David Tascione Heimdall Linux, Inc.
1 INTELLECTUAL PROPERTY & THE DIGITAL ECONOMY Pamela Samuelson, School of Info. Mgmt. & of Law, March 17, 1999.
Copyright V Class Notes: February 10, 2003 Law 507 | Intellectual Property | Spring 2003 Professor Wagner.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
The DMCA, DeCSS, Copyrights and the First Amendment.
COPYRIGHT LAW 2004 Columbus School of Law The Catholic University of America Prof. Fischer CLASS of April
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 11/29/2006 Social Implications Discussion 4 – Digital Rights Management.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Installing interoperability in information systems How patent and copyrights affect the development of interoperable information systems.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Legal and Ethical Issues in Computer Security Csilla Farkas
Technological Protection Measures and Access to Knowledge El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October 14, 2005 Gwen Hinze International.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Intellectual Property & the Constitution Class 25 Notes Law 507 | Intellectual Property | Spring 2004 Professor Wagner.
CPS Digital Copyright. CPS Copyright US Constitution (Article I, Section 8, Clause 8): “To promote the Progress of Science and useful.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
Compsci 82, Fall Digital Millennium Copyright Act,DMCA l Copyright law of United States  Passed in 1998, general industry support  Controversial.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
Who owns the Bits? Digital copyright issues are continually evolving.
ACCESS TO PROTECTED WORKS: LIMITS OF PERMITTED USE
Laws Against Computer Hacking
Who owns the Bits? Digital copyright issues are continually evolving.
Presentation transcript:

March 13, 2002Computer Systems Lab Colloquium1 IMPLICATIONS OF ANTI- CIRCUMVENTION RULES FOR INNOVATION Pamela Samuelson, UC Berkeley, at Computer Systems Lab. Colloquium, March 13, 2002

Computer Systems Lab Colloquium2 OVERVIEW The what & why of the DMCA anti- circumvention rules Examples of anti-competitive/anti-innovation claims of DMCA violations Some/all of these claims seem plausible given early DMCA decisions Less restrictive alternatives are possible The logic of the DMCA rules makes more restrictive alternatives (e.g., SSSCA) likely Reasons to be hopeful

March 13, 2002Computer Systems Lab Colloquium3 17 U.S.C (a)(1)(A): Illegal to circumvent a technical measure copyright owners use to control access to their works (a)(2): Illegal to make/distribute tool to circumvent access controls (b)(1): Illegal to make/distribute tool to bypass other technical measures used by copyright owners to protect works No counterpart to (a)(1)(A) for bypassing copy controls (compromise to enable fair uses?)

March 13, 2002Computer Systems Lab Colloquium4 1201(a)(1)(A) EXCEPTIONS Achieving program-to-program interoperability (OK to make tools too) Encryption research & computer security testing (many limitations; but also OK to make (a)(2) tools, but silent on (b)(1)) Law enforcement/national security (right to make tool not explicit) Library/nonprofit “shopping” privilege; privacy protection; protecting kids

March 13, 2002Computer Systems Lab Colloquium5 MYSTERIOUS 1201(c) 1) No effect on rights & limits under this title, including fair use 2) No effect on contributory infringement (preserve Sony Betamax defense?) 3) No mandate to build technologies to interpret technical measures 4) No effect on free speech/press

March 13, 2002Computer Systems Lab Colloquium6 LOC RULEMAKING LOC authorized to conduct periodic rulemakings to determine if TPMs interfering with fair and other noninfringing uses (in response to library/educator concerns) If so, LOC can exempt from (a)(1)(A) affected classes of users/works—but not (a)(2) or (b)(1) Two new LOC exemptions: –if access control not working & have right to lawful access –to determine what filtering software blocks

March 13, 2002Computer Systems Lab Colloquium7 OTHER DMCA RULES 1202 protects the integrity of “copyright management information” (e.g., watermarks) from alteration/removal 1203 gives broad remedies to successful plaintiffs (injunctions, statutory damages, etc.—even if no actual infringements!) 1204 makes willful violation of 1201 or 1202 for profit/financial gain a crime

March 13, 2002Computer Systems Lab Colloquium8 ORIGINS OF DMCA Legacy of the Clinton Administration’s NII policy (White Paper on IP & NII in 1995) Theory: copyright owners need more legal protection before they’ll make content available in digital networked environments WIPO Copyright Treaty in 1996: –Need for “adequate protection” and “effective remedies” vs. circumvention of TPMs –Protect CMI vs. removal/alteration for infringement

March 13, 2002Computer Systems Lab Colloquium9 DMCA & WIPO TREATY Proposed WIPO treaty would have required nations to outlaw circumvention technologies Highly controversial at WIPO conference Compromise was intended to allow nations to deal with as they thought best DMCA passed in 1998 to implement the WIPO treaty—but far broader than required US officials/MPAA/RIAA to other countries: adopt DMCA rules as best implementation

March 13, 2002Computer Systems Lab Colloquium10 SONY DMCA CLAIMS vs. Connectix & Bleem: emulation programs bypassed PlayStation game TPMs vs. Gamemaster: game enhancer software violated DMCA because bypassed country code (gave Sony control over complementary products & stopped competition w/ Sony’s game enhancer) vs. Aibohack: not a lawsuit but a threat letter to owner of site where owners of Aibo robot dogs posted programs to make dogs do different tricks

March 13, 2002Computer Systems Lab Colloquium11 OTHER ANTI-INNOVATION CLAIMS Similar threat to Aibohack made against follow-on innovators as to digital Lego system RealNetworks v. Streambox: enjoining “VCR” that bypassed RN authentication procedure & allowed personal use copies of streamed content Microsoft claimed Slashdot violated DMCA because users posted instructions on how to bypass click-through license forbidding copying or disclosure of interface specification Blizzard v. bnetd: open source emulation program enabled users to form private game network; said to bypass TPM

March 13, 2002Computer Systems Lab Colloquium12 WHY PLAUSIBLE Country codes/watermarks/streaming being treated as access controls Reverse engineering them violates 1201(a)(1)(A) Making or adapting a tool to reverse engineer them violates (a)(2), as does making/distributing software capable of bypassing the TPM No underlying act of infringement needs to occur Fact that no infringement is even possible may be irrelevant! Sony & Lego relented—but 1201 theory plausible

March 13, 2002Computer Systems Lab Colloquium13 EARLY CASELAW Gamemaster case: –country code held to be access control –software that enabled playing of Sony games coded for Japan violated DMCA –game enhancer program that competed with Sony software held illegal, even though no copyright infringement occurred or was enabled –messy facts on TM claims obscured issues

March 13, 2002Computer Systems Lab Colloquium14 REALNETWORKS CASE 1201(c)(1) means nothing re fair use 1201(c)(2) means nothing re contrib. 1201(c)(3) means nothing re no mandate Bypassing authentication procedure violates (a)(1)(A), even if no infringement thereafter (no right to interoperate with data?) Other firms (Voquette) living in fear

March 13, 2002Computer Systems Lab Colloquium15 UNIVERSAL v. REIMERDES Preliminary injunction vs. Reimerdes & Corley/2600 in Jan to stop posting of DeCSS on web as violation of 1201(a)(2) CSS held to be an access control (why not a copy- control?) for DVD movies DeCSS bypassed CSS All statutory & constitutional defenses rejected Reimerdes settled; Corley (sadly) did not

March 13, 2002Computer Systems Lab Colloquium16 BAD DICTA JAN ISP safe harbor rules for copyright infringement don’t apply to 1201 claims; ISP can be strictly liable for user posting of circumvention software Corley (a mere journalist) lacked standing to raise interoperability, encryption research, computer security testing, or fair use defenses (even if they might be valid as to Jon Johansen) because Corley wasn’t trying to make an interoperable program, do encryption research, or make a fair use No right to interoperate with data (DVD movie)

March 13, 2002Computer Systems Lab Colloquium17 RULING IN AUG Same analysis of 1201(a)(2) Shamos testified as to potential harm of DeCSS: used DeCSS to copy movie & distribute via Internet (DivX compression) Didn’t believe Johansen re DeCSS as necessary step to developing Linux player Likened DeCSS to deadly plague Functionality of DeCSS limits 1 st A scope

March 13, 2002Computer Systems Lab Colloquium18 UCS v. CORLEY (2d Cir. 2001) Praised & followed Kaplan’s analysis Some good news? –Software is 1 st A protected speech (programmers express themselves in code) –No distinction between source & object (object code is like Sanskrit) –More general affirmation of 1 st A protection for scientific & technical info (e.g., instructions) –“Intermediate scrutiny” applies

March 13, 2002Computer Systems Lab Colloquium19 MORE ON UCS v. CORLEY Little discussion of statutory issues (but rejects as “perversion” of 1 st sale defense idea that users have rights to use access-control content in unlicensed technology) 1201(c)(1) does not preserve fair use, but Corley lacks standing to raise (even if JJ was a fair user) Threats & dangers of Internet for content lessen scope of 1 st A protection for software (in conflict with ACLU v. Reno?)

March 13, 2002Computer Systems Lab Colloquium20 INTERMEDIATE SCRUTINY Laws directly regulating content of speech are generally subject to “strict scrutiny” –gov’t must show “compelling” interest –least restrictive means of accomplishing “Rational basis” for non-speech rules: reasonable means to attain govt objective (even if weak) “Intermediate” for content-neutral laws affecting speech: –gov’t interest must be “substantial” –law must be narrowly tailored to achieve the objective

March 13, 2002Computer Systems Lab Colloquium21 2d CIR. RULING Substantial gov’t interest in protecting copyrighted works vs. “piracy” DMCA narrowly tailored because of specific exceptions, LOC rulemaking Corley failed to prove sufficiency of less restrictive alternatives than DMCA May be inconsistent with DVD-CCA v. Bunner, but 2d Cir. declines to follow Even linking violates DMCA—no 1 st A defense

March 13, 2002Computer Systems Lab Colloquium22 LESS RESTRICTIVE WAYS Special purpose anti-circumvention rules (e.g., AHRA, decrypt cable TV signals) Outlaw circumvention to facilitate infringement Outlaw aiding and abetting copyright infringement through circumvention or circumvention tools Outlaw public distribution of technologies designed to circumvent with the intent of facilitating copyright infringement (RE article) Congress never considered less restrictive alternatives because of intense politics

March 13, 2002Computer Systems Lab Colloquium23 MORE RESTRICTIVE WAYS Security Systems Standards & Certification Act (SSSCA) proposed by Sen. Hollings –Digital content won’t really be secure until DRMs are embedded in all interactive digital technology (designed not to play unDRM content such as MP3 files of music) –Computer/software industry has resisted “voluntary” standards on DRMs; SSSCA may be a credible threat to change this industry’s tune –Mandating DRMs by either private or public legislation is the only way to ensure they won’t be competed away

March 13, 2002Computer Systems Lab Colloquium24 PRECEDENTS Public legislation: –Audio Home Recording Act: serial copy management system (SCMS) chips required in consumer grade DAT machines –17 U.S.C. sec. 1201(k): future VCRs must build in Macrovision anti-copying technology Private legislation: –Content industry consortium (DVD-CCA) licenses for DVD players require installation of CSS –SDMI aimed to achieve similar result

March 13, 2002Computer Systems Lab Colloquium25 QUESTIONING SSSCA Overbroad & ambiguous (e.g., digital watches) SSSCA would impede many beneficial uses of IT & add expense to IT systems SSSCA will retard innovation & investment in IT SSSCA may make systems more vulnerable to hacking (can one virus take down all systems?) Maybe the government and the content industry shouldn’t tell the IT industry how to build its products Will rearchitecture of the Internet be next?

March 13, 2002Computer Systems Lab Colloquium26 REASON FOR HOPE? Sup. Ct. decided to hear Eldred’s appeal in constitutional challenge to CTEA House leadership is not keen on SSSCA Rep. Rick Boucher believes in fair use and balanced copyright law Courts less subject to “capture” than legislature “Bad” decisions may be rejected or narrowed People (like you?) believe in balanced copyright rules (but collective action problem to mobilize)

March 13, 2002Computer Systems Lab Colloquium27 CONCLUSION Congress passed the DMCA thinking it was necessary to stop “piracy” Content industry got a broader law than necessary to achieve this goal—and yet they still want more Possible courts will decline to enjoin innovative uses even if seemingly illegal under the DMCA Technology community can help to make Congress aware of broader interests at stake (e.g., innovation, competition, user rights) Get involved; make a difference!