Controlling Access to Copyrighted Works Digital Millennium Copyright Act.

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
1 The U.S. Copyright Office’s Anticircumvention Rulemaking David O. Carson General Counsel United States Copyright Office ALAI Congress June 14, 2001.
THE RPAC ANNUAL CONFERENCE. OVERVIEW OF THE DMCA: ITS PROMISE AND PITFALLS Jeanne Hamburg.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
Digital Millennium Copyright Act (DMCA)
1 The Digital Millennium Copyright Act David S. Touretzky Computer Science Department Carnegie Mellon University November, 2001.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 12: October 21, 2003 Copyright Law, continued: the DMCA.
Copyright and Fair Use Dan Lee Interim Team Leader for Undergraduate Services and Copyright Librarian March 21, 2007.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
CS155a: E-Commerce Lecture 7: Sept. 27, 2001 Copyright Law, DMCA, and Online Content Distribution Acknowledgement: V. Ramachandran.
The Digital Millennium Copyright Act (DMCA) Claire Stewart MM450 February 14, 2006.
The DMCA after 1000 days; an ISP’s perspective David Bowie Operations Security.
johnson-eilola cccc Copyright Matters Online Johndan Johnson-Eilola Clarkson University Background image.
CptS 401 Adam Carter. Quiz Question 1 According to the book, it is important to legally protect intellectual property for the following reason(s): A.
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Legal Protection of Copy- protection Mechanisms & Rights Management Information Martina Gillen Law Department, Reading University
COPYRIGHT LAW 2002 Professor Fischer CLASS 27: TECHNOLOGICAL PROTECTION MEASURES, REMEDIES.
COPYRIGHT & THE WEB LIS Information Technologies – Dr. Gilok Choi Pratt Institute, School of Information & Library Science Spring, 2009 By Diane.
Examples of problems with teacher/school site violations: A company’s logo and link on footer of homepage when company is not their business partner—only.
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
Copyright Your rights, the law, and the rights of others.
Copyright in the EU: The Infosoc Directive: TPMs, ACPs and RMI Turin, October 2011 Dr E Derclaye University of Nottingham.
NEW SOLUTIONS FOR A DIGITAL WORLD Angela Teal LIBM 6320 FALL 2011.
CS110: Computers and the Internet Intellectual Property.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
CREATING DIGITAL LIBRARIES: A COLLISION COURSE WITH COPYRIGHT LAW Lolly Gasaway November 2011.
Digital Millennium Copyright Act of 1998 Jason Fu Andy Lee.
[Copyright M. S. Overing 2003]1 Copyright Overview Michael S. Overing, Esq. 201 S. Lake Ave., Ste. 606 Pasadena, CA
Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Teaching Strategies that Work: Copyright, Fair Use and Digital Learning Renee Hobbs Workshop for the Association of College and Research Libraries April.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
Encryption and the Law Jonathan Crowell. The US Constitution We the people of the United States, in order to form a more perfect union, establish justice,
COPYRIGHT LAW 2003 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
1 Application of the DMCA Steve Baron February 12, 2008.
Becky Albitz Electronic Resources/Copyright Librarian
Introduction To Copyright Law in the Age of the Internet Jesse Clark.
CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.
AN ETHICS ANALYSIS OF THE DIGITAL MILLENNIUM COPYRIGHT ACT Thomas S. E. Hilton & Ingrid C. Ulstad University of Wisconsin—Eau.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
Copyright V Class Notes: February 10, 2003 Law 507 | Intellectual Property | Spring 2003 Professor Wagner.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
Technology Fair OWHL Services and Copyright Michael Blake and Elisabeth Tully June 13, 2006.
The DMCA, DeCSS, Copyrights and the First Amendment.
Copyright: What Every Teacher and Student Should Know Katie Amend Casey Moffett.
Becky Albitz Electronic Resources Librarian
Tony Malatanos. Focal Points  What is reverse engineering?  Reasons Legit Malicious  Legality  Morality  Clean Room Design  Example: ReactOS.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Legal and Ethical Issues in Computer Security Csilla Farkas
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
COPYRIGHT CHALLENGES IN THE DIGITAL AGE: EFFECTS OF THE DIGITAL MILLENNIUM COPYRIGHT ACT.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
It’s All (just) Bits 1) Numbers are bits 2) Text is bits 3) Formatted text is bits 4) Pictures are bits 5) Sound is bits 6) Programs (instructions on how.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Tom Adam Copyright Advisor to the Provost all images:
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
Library Archiving and Internet Service Provider Status Shirley A. Mason Library Media Specialist 12 July 2008.
DMCA § 2012 and Education Paul D. Callister, JD, MSLIS
Legal aspects of copying audiovisual work onto portable media devices
Knowingly access without authorization
What is Digital Right Management’s Role in Modern Education System’s Play? —A Comparative Research of DRM System’s Influence in.
Computer ethics in computer science curriculum
Laws Against Computer Hacking
Presentation transcript:

Controlling Access to Copyrighted Works Digital Millennium Copyright Act

Background  Enacted October 28 th, 1998  5 Titles 1)Implementation of two WIPO treaties 2)Limits ISP infringement liability 3)Exemption for computer maintenance 4)Six “miscellaneous” changes to title 17 5)Protection for vessel hull designs

Two Sections of Interest  Added by the First Title of the DMCA : 17 U.S.C. §1201(a)(1)(A) 17 U.S.C. §1201(a)(2)

Text of §1201(a)(1)(A): controls access  No person shall circumvent a technological measure that effectively controls access to a work protected under this title. The prohibition contained in the preceding sentence shall take effect at the end of the 2- year period beginning on the date of the enactment of this chapter [enacted Oct. 28, 1998].

Text of §1201(a)(2): No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that--

Text of §1201(a)(2): (A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title;

Text of §1201(a)(2): (B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or

Text of §1201(a)(2): (C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title.

What Does This Mean?  It is only illegal to break a protection if copyrighted material is protected.  It is illegal to make available (even by knowingly linking to a website that makes available) technologies that are primarily designed, or marketed as, means for breaking protection schemes.

What Does This Mean?  It is illegal to break protection on even uncopyrightable material if doing so also breaks protection on a single shred of copyrighted material.  It is illegal to give someone a tool to break protection on wholly uncopyrighted material if that tool can also be used to break protections on copyrighted material.

Note the Exceptions: 1.The Librarian of Congress can periodically add exceptions deemed necessary. 2.If libraries or archives must break protection to evaluate desire to purchase, 3.If necessary to lawfully reverse engineer program to achieve interoperability, 4.For encryption research, with the advance notification of the research community,

Note the Exceptions: 5.For evaluation by the courts of a scheme for protecting minors from access to inappropriate material, 6.If the protection scheme collects or disseminates personal information, 7. Or if the owner of a system authorizes for security testing purpose.

Examples of Circumvention Technologies  DeCSS (Content Scramble System)  eBook Decryption Programs  Game Console Mod Chips  Black Magic Marker

Legal/Practical Concerns While there are many concerns about how the DMCA protects access control technologies, we will try to get to three:  Fair Use Problems  Anti-Trust/Anti-Competitive Problems  First Amendment Issues

Fair Use  “Fair Use Doctrine” is the major exception to the exclusive rights of copyright holders.  Functions to keep protections within the limits of Congress’ Constitutional mandate.  One question is: Should “fair use” include ideas of “best use” or “ease of use”?

Anti-Trust/Anti-Competition  While the DMCA specifically provides exemptions for reverse engineering, it is only for authorized reverse engineering.  What happens if content providers fail to authorize other platforms for use?

First Amendment  Knowing linking?  Access control of what is not copyrighted?  Could perfected access control lead to the demise of non-digital publication and seriously reduce the “right to hear” of the poor? The unsophisticated? Luddites?