Digital Copyright ECON 425/563 // CPSC 455/555 February 8, 2008.

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing.
Intellectual Property Image: William J. Wynn.
Jody Blanke, Professor Computer Information Systems and Law Mercer University, Atlanta 1.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Robin Hood and the 40 Million Thieves David Evans
ITIS 1210 Introduction to Web-Based Information Systems Chapter 37 How iPods, iTunes, and Podcasting Work.
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
Copyright Infringement Present by: Shao-Chuan Fang Jaime McDermott Emily Nagin Michael Piston Fan Yang Carnegie Mellon Group Presentation Date:
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 12: October 21, 2003 Copyright Law, continued: the DMCA.
Intellectual Property Boston College Law School February 1, 2008 Copyright – Digital Issues.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Intellectual Property Boston College Law School February 1, 2007 Copyright – Digital Issues.
CS155b: E-Commerce Lecture 7: Feb. 4, 2003 Copyright Law, DMCA, and Online Content Distribution Acknowledgement: V. Ramachandran.
CS155a: E-Commerce Lecture 8: October 2, 2001 Business Models for Online Content Distribution.
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
Digital Millennium Copyright Act (DMCA) Cases Claire Stewart MM450 February 16, 2006.
CS155a: E-Commerce Lecture 7: Sept. 27, 2001 Copyright Law, DMCA, and Online Content Distribution Acknowledgement: V. Ramachandran.
1 Issues in Digital Audio. 2 Intellectual Property  Non-tangible property that is the result of creativity:  Patents – products, processes etc.  Copyright.
Port 21 (Distribution and Promotion Remix) Brian Geoghagan Winter 2005 COM546 Professor Gill.
CS155b: E-Commerce Lecture 6: Jan. 30, 2003 Introduction to Online Content Distribution.
CS 155b: E-Commerce Lecture 9: February 6, 2001 TPSs, Business Models, and the Napster Challenge.
CPSC156: The Internet Co-Evolution of Technology and Society Lecture 7: February 6, 2007 More about browsers (ack.: L. Cranor); Introduction to Digital.
Copyright Law Boston College Law School February 25, 2003 Rights - Reproduction, Adaptation.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 13: October 23, 2003 The roles of technical-protection systems and business models.
Intellectual Property Boston College Law School January 26, 2007 Copyright – Rights – Fair Use.
CptS 401 Adam Carter. Quiz Question 1 According to the book, it is important to legally protect intellectual property for the following reason(s): A.
PERSONAL TECHNOLOGIES MS. BROCK – SCT 11. THE DOWNLOAD GENERATION DIGITAL MUSIC TECHNOLOGY – CHANGE IN HOW MUSIC IS RECORDED, DELIVERED AND PLAYED EXPLOSIVE.
CS155b: E-Commerce Lecture 7: Jan. 30, 2001 A Computer Scientist’s View of Copyright Law.
CPSC 156: The Internet: Co- Evolution of Technology and Society Lecture 9: February 13, 2007 Online Music Distribution and the DMCA.
Gerri Spinella Ed.D. Elizabeth McDonald Ed.D.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
1 Intellectual Property “Gift of Fire”. 2 Intellectual Property - Have you ever give a CD to a friend that contained a copy of a computer game or a programs?
CS110: Computers and the Internet Intellectual Property.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
COPYRIGHT AND FAIR USE POLICIES By Amanda Newell.
Future Ready Schools BMA-IBT DEMONSTRATE ETHICAL AND LEGAL ACTIONS WITH REGARDS TO PLAGIARISM, FAIR USE, AND COPYRIGHT LAWS.
COPYRIGHT LAW IN MEDIA NOTES. WHAT IS COPYRIGHT? The exclusive right to reproduce, publish, and sell the matter and form of a literary, musical, or artistic.
Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 11: October 16, 2003 Introduction to Digital Copyright and Online Content Distribution.
CS155b: E-Commerce Lecture 10: Feb. 13, 2001 Business Models and Online Music Distribution, cont.
Who owns the Bits? Digital copyright issues are continually evolving. IP address do not map to a single person – hard to trace user Music and movie industry.
Copyright on the Internet – Illustrated Essentials Why Copyright Matters Unit A.
Becky Albitz Electronic Resources/Copyright Librarian
CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
Technology Fair OWHL Services and Copyright Michael Blake and Elisabeth Tully June 13, 2006.
Copyright: What Every Teacher and Student Should Know Katie Amend Casey Moffett.
Principles of AAVTC Ethics & Copyright Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used with permission.
Becky Albitz Electronic Resources Librarian
Copyright Laws Dodge City Public Schools November 2013 Compiled By: 6-12 Academic Coaches and DCHS Librarian Approved By: 6-12 Administrators.
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 11/29/2006 Social Implications Discussion 4 – Digital Rights Management.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Jody Blanke, Professor Computer Information Systems and Law Mercer University, Atlanta 1.
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
INTELLECTUAL PROPERTY PRESENTED BY: BENJAMIN BAKER & BLAZE STERLING.
What Teachers Need to Know.  “Foster the creation and dissemination of literary and artistic works”  “Promote the Progress of Science and the useful.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
Introduction to the TEACH Act
Who owns the Bits? Digital copyright issues are continually evolving.
A Gift of Fire Third edition Sara Baase
CS 115: COMPUTING FOR The Socio-Techno Web
Copyright Law and Fair Use
Who owns the Bits? Digital copyright issues are continually evolving.
Presentation transcript:

Digital Copyright ECON 425/563 // CPSC 455/555 February 8, 2008

Basis of US Copyright Law U.S. Constitution: [Article I, Section 8] “The Congress shall have Power… [Clause 8] To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries…” Note: The founding fathers did not feel the need to empower Congress to create physical property rights.

Examples of Exclusive Rights to reproduce the copyrighted work to prepare derivative works to distribute copies through sales, rental, lease, or lending to perform the copyrighted work publicly (applies, e.g., to plays) to display the copyrighted work publicly (applies, e.g., to sculpture) digital audio transmission [These are paraphrases.]

Exception: “4-factors” test for “Fair Use” The purpose and character of the use, including whether such use is of a commercial nature or is for non-profit educational purposes The nature of the copyright work The amount and substantiality of the portion used in relation to the copyright work as a whole The effect of the use upon the potential market for or value of the copyrighted work

Exception: First-Sale Rule When a copyright owner sells a copy of a work, he relinquishes control over that copy but not over the work. The work cannot be reproduced by the purchaser, but the copy can be loaned, resold, or given to someone else. “Promotes progress” by enabling, e.g. –libraries –used book stores

Digital Millennium Copyright Act (1998) Illegal, except under narrowly defined special circumstances, to circumvent effective technological protection measures Illegal to distribute circumvention tools Gives content owners a property right in technological protection system (TPS) as well as the content that the TPS protects. In SAT terms, circumvention is to infringement as breaking and entering is to burglary.

Examples of Allowed Circumventions Nonprofits may circumvent to “shop.” Law enforcement and intelligence agencies. Reverse engineering to achieve interoperability. “Encryption research.” The “researcher” has to “make a good faith effort to obtain authorization.” Protection of “personally identifying information.”

Techies’ Objection to DMCA What is an “effective technological protection measure?” – If a skilled hacker can break it, is it “effective”? – If an average computer-literate person can break it, but few do, is it “effective?” Weakens incentives for content owners to pay for good IP-management technology. Shifts costs from content owners to society at large, by shifting responsibility from TPSs to courts and police. Exceptions for R&D are vague.

DMCA vs. Copyright Violations What does the DMCA actually do to existing copyright law? What happens to fair use? Are there differences between violations of copyright law and violations of the DMCA?

General Structure of Copyright Law Copyright owners’ rights stated explicitly. General public has no explicitly stated rights, just exceptions to owners’ rights. Fair use is a defense against a charge of infringement. This structure works fairly well for traditional media, particularly books.

Structure is Challenged by Digital Works Digital documents are fundamentally different: –Copies are perfect. –Copies can be made at zero cost. –Copying is not necessarily a good proxy for infringement. Digital Rights Mngt. (DRM) is imperfect: –Perfect DRM could moot fair use: no infringement, no charge, no defense. –But DRM cannot be perfect in today’s computers. General purpose PCs are programmable, and hence DRM is circumventable (at least by experts).

Dual Views of the Problem Rights Holders and Distributors: DRM doesn’t suffice. Digital copying, modification, and distribution are uncontrollable. We need more legal and social sanctions. Fair-Use Advocates and (Some) Consumers: DRM works too well. Some rights holders now have more control than they do in the analog world. Normal use can often be monitored and controlled in the digital world.

Three Major “Enforcers” Support a Content-Distribution Business Copyright law Digital Rights Management *Business Model

Known Risks Unknown Risks DRM Copyright Law Residual Risks A.Rubin & M. Reiter – used with permission

Best DRM is a Great Business Model “The first line of defense against pirates is a sensible business model that combines pricing, ease of use, and legal prohibition in a way that minimizes the incentives for consumers to deal with pirates.” Lacy et al., IEEE Symposium on Industrial Electronics, 1997.

Holy Grail: A Great Business Model for Internet Music Distribution Hal Varian (quoted in C. Mann’s 2000 “Heavenly Jukebox” article): “Maybe Coke will find a way integrate itself directly into the shows. Or they’ll release the music free on the Internet, except that it will be wrapped in a commercial.” What’s the difference if the Spice Girls are marketed by Coca- Cola or by Virgin Records, soon to be a subdivision of AOL-Time Warner? 2000 Sales by RIAA members: $15B 2000 Coca-Cola Net Operating Income: $20.5B

Napster Client-Server Interaction Client 1 MP3-file 1 MP3-file 2 MP3-file n Searches a db of currently online users for one that has previously stored the requested MP3. Adds client 1 and its list to db. Removes client 1 and its list from db hello ack Client 1 ’s IP address Names of MP3s on Client 1 ’s Machine Request IP address of online user (client 2 ) who has requested file [repeat] goodbye ack

Notes on Client-Server Interaction Proprietary protocol and db search. No MP3 files stored on server. Don’t need usernames. Could have made the service anonymous. No need to save IP addresses between sessions. Many are assigned dynamically. Discussion point: Are anonymity and memorylessness threats or opportunities for business?

Napster Client-Client (P2P) Interaction Client 1 Client 2 Client 1 ’s IP address Request Requested MP3 Note: This part uses “standard Internet protocols,” e.g., FTP

Napster History 1987: MP3 format developed by Karlheinz Brandenburg of Fraunhofer Gesellschaft. “CD ripping” now feasible. 1999: Shawn Fanning develops Napster, believing he has “bypassed” copyright law. Napster has >25M users in its first year. Dec., 1999: RIAA sues Napster for “contributory and vicarious” copyright infringement. April, 2000: Metallica sues Napster, Yale, Indiana Univ., and USC. (Yale bans the use of Napster within a week.)

Napster History, continued July, 2000: US District Judge Patel grants RIAA’s request for an injunction. The injunction is temporarily stayed soon thereafter. October, 2000: Napster announces a partnership with Bertlesmann AG (one of the “major labels” in the industry whose trade association is suing it!). January, 2001: Napster and Bertlesmann say that they will roll out a “subscription service” by “early summer” and will use “DRM technology.”

Napster History, continued February, 2001: Ninth Circuit upholds lower court’s findings that Napster is guilty of contributory and vicarious infringement. Summer, 2001: Napster and Bertlesmann fail to roll out subscription service. September, 2001: Napster reaches a settlement with music publishers (but not with RIAA record labels). However, CNET.com reports the number of users has “dropped from tens of millions…to almost zero.” Napster, R.I.P.

RealNetworks Business Model The basic RealPlayer software is free. Users may pay a small fee for an advanced version with more features. This is one of the RealNetworks revenue streams. Services and advertising constitute a separate revenue stream. A third revenue stream is derived from charging broadcasters of streaming data for the RealServer software. In summary, the (slightly oversimplified) business model is: Give away the player, sell the server!

“Daft Club” Model Purchase Daft Punk CD and you also get a “personalized code” that gives you access to the Daft Club server. From it you get: – Ability to download a new Daft Punk “bonus track” each month. The bonus tracks are not released on CDs. – Access to the rest of the Daft-Club user community. Bonus tracks will be wrapped with DRM metadata that says they can’t be copied. Almost surely circumventable, but would many people bother circumventing?

“Napster++ as Superdistribution” Model (Napster--??) Napster users pay monthly subscription fee. They can download DRM-wrapped songs from Bertlesmann server. (And other labels if others also settle.) When they redistribute via P2P file sharing, they get rebates on their next month’s subscription fees. DRM system keeps track. They retain the chat-room, “Napster community” network effects. Again, probably circumventable. But is there a price point at which circumvention would not be worth it?

“Street Performer” Model Novelist gives chapter 1 to publisher and promises rest of book after she is paid $X. Publisher posts chapter 1, collects payments, issues signed receipts to customers (“donors”?). If publisher collects $X+Y, he gets rest of book from novelist, posts it, gives $X to novelist, and keeps $Y. If he collects less than $X+Y, he sends refunds to customers. Also, if novelist doesn’t deliver rest of book, she gets bad publicity and customers get refunds.

“Street Performer” Model (Cont.) Many variations: New author gives first book away. Non-anonymous big donors Some publishers “edit” and choose, and some don’t. Famous authors don’t have to deliver chapter 1 in advance.

Notable Business-Model Components + Buy one song at a time (cheap!). ? “Lock” content to user. -“Lock” content to device(s). - “Play k times.”

Fast-forward to 2003 None of those intriguing business models has succeeded in practice. Apple successfully launches iTunes. Is it Mann’s Holy Grail?

Discussion Point After many years of online music distribution, many failed business models, and the success of iTunes, we have Jobs’s suggestion to do away with DRM. Key component of the argument: People who are currently paying for music are not doing it because DRM has forced them to.

Digital Video Disks (DVDs) Developed by movie studios and consumer electronics companies in Compatible with CDs. Same size and thickness as CDs. Up to 25 times the storage capacity as CDs. TPS for DVDs includes – CSS encryption (“content scrambling system”) – R/W’able copy-control marks (e.g., “copy freely,” “one copy,” “no copies”) – Macrovision analog copy protection – Other ingredients

Studios’ Overall IP-Management Strategy Use TPS to “keep honest people honest.” Assume (temporarily) that lack of bandwidth will prevent large-scale Internet distribution of movies. Use courts aggressively to punish (alleged) violators of existing copyright laws and lobby heavily for new laws that favor rights holders.

DeCSS Violates DMCA DeCSS is software that reads CSS- scrambled video from a DVD and writes unscrambled MPEG-2 video. In effect, DeCSS circumvents the TPS for DVDs. – Question: Is CSS an effective copy- protection mechanism?

DeCSS Violates DMCA (continued) Magazine that published the DeCSS algorithm got sued. – Question: Is this different from “a reputable journal” publishing research? Question: Is DeCSS different from a regular DVD player? Questions: Does DeCSS fit under any of the DMCA exceptions? Where is the copyright violation?

Adobe eBook Processor Violates DMCA Adobe established one format for electronic books: the eBook. To use eBooks, purchase and download them, and view them using a special reader (Adobe eBook software). The eBook format contains provisions for publisher controls on: – Text-to-speech processing – Copying to another device or making a backup – Translating between formats

Adobe eBook Processor Violates DMCA (continued) ElcomSoft, a Russian company, created AEBPR, the eBook Processor. – AEBPR translates eBooks to Adobe PDF. – Software available for purchase on ElcomSoft’s website and through a U.S. firm, RegNow (used for handling payments). Dimitri Sklyarov, one of the designers, presented his methods at DEF CON, a conference in the U.S.

Adobe eBook Processor Violates DMCA (continued) Sklyarov was arrested for violating the DMCA by circumventing Adobe’s protection built into the eBook format. Question: Does it matter that Sklyarov was working for a company? Question: Does it matter that the company is Russian, and that its software is legal in Russia?

Adobe eBook Processor Violates DMCA (continued) Question: Does the software simply allow “fair use” that was prevented by Adobe’s format? (Does that even matter?) – People can make backups of eBooks they bought and don’t want to lose. – People can transfer copies to their laptop or handheld. – People with visual impairments can have the computer read the eBook. Other Questions: Is AEBPR a product of research? Is the eBook an effective TPS?