Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips.

Slides:



Advertisements
Similar presentations
The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Advertisements

Intellectual Property Image: William J. Wynn.
THE RPAC ANNUAL CONFERENCE. OVERVIEW OF THE DMCA: ITS PROMISE AND PITFALLS Jeanne Hamburg.
DMCA: An Introduction Digital Millennium Copyright Act.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Copyright Infringement Present by: Shao-Chuan Fang Jaime McDermott Emily Nagin Michael Piston Fan Yang Carnegie Mellon Group Presentation Date:
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Copyright Infringement
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
CS155a: E-Commerce Lecture 7: Sept. 27, 2001 Copyright Law, DMCA, and Online Content Distribution Acknowledgement: V. Ramachandran.
1 Issues in Digital Audio. 2 Intellectual Property  Non-tangible property that is the result of creativity:  Patents – products, processes etc.  Copyright.
The Digital Millennium Copyright Act (DMCA) Claire Stewart MM450 February 14, 2006.
Week 3: File sharing.
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
Class 19 Copyright, Spring, 2008 Consumer Control Randal C. Picker Leffmann Professor of Commercial Law The Law School The University of Chicago
Andrew, Lachlan and Han ONLINE PIRACY.  Copyright infringement, or ‘piracy’, is the unauthorized use of works under copyright, infringing the copyright.
Legal Protection of Copy- protection Mechanisms & Rights Management Information Martina Gillen Law Department, Reading University
Office of the General Counsel1 COPYRIGHT and the TEACH Act The Technology, Education, and Copyright Harmonization Act Copyright © 2007 Villanova University.
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
NEW SOLUTIONS FOR A DIGITAL WORLD Angela Teal LIBM 6320 FALL 2011.

CS110: Computers and the Internet Intellectual Property.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
Computer Ethics Christina McCorkle.
Copyright and the DMCA MM450 Issues in New Media Theory February 17, 2009 Steven L. Baron.
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
[Copyright M. S. Overing 2003]1 Copyright Overview Michael S. Overing, Esq. 201 S. Lake Ave., Ste. 606 Pasadena, CA
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Intellectual Property in Peer-to-Peer Networks Artsiom Yautsiukhin Natallia Kokash Intellectual Property Law, 18 October 2005.
COPYRIGHT LAW 2003 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Copyright and the DMCA IM 350 Issues in New Media Theory From notes by Steve Baron.
Class 21 Copyright, Winter, 2010 Online Distribution Randal C. Picker Leffmann Professor of Commercial Law The Law School The University of Chicago
Who owns the Bits? Digital copyright issues are continually evolving. IP address do not map to a single person – hard to trace user Music and movie industry.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
LEGALESE BLONDE RIAA vs. NAPSTER Daniella Nero University of Hawaii at Manoa AMST 334 Sp-13.
Becky Albitz Electronic Resources/Copyright Librarian
Introduction To Copyright Law in the Age of the Internet Jesse Clark.
CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
The DMCA, DeCSS, Copyrights and the First Amendment.
Becky Albitz Electronic Resources Librarian
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
It’s All (just) Bits 1) Numbers are bits 2) Text is bits 3) Formatted text is bits 4) Pictures are bits 5) Sound is bits 6) Programs (instructions on how.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
& Teach Act. Click here take interactive quiz: On November 2nd, 2002,
Chapter 9: Internet Law, Social Media, and Privacy
Who owns the Bits? Digital copyright issues are continually evolving.
DMCA § 2012 and Education Paul D. Callister, JD, MSLIS
A Gift of Fire Third edition Sara Baase
Property in Cyberspace
For Bethel University Faculty & Students
Computer 101 Extra Credit By: Marjorie Jackson.
Laws Against Computer Hacking
Who owns the Bits? Digital copyright issues are continually evolving.
Presentation transcript:

Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips

Digital Millennium Copyright Act

Chapter 12 – COPYRIGHT PROTECTION AND MANAGEMENT SYSTEMS Circumvention of copyright protection systems

Violations Regarding Circumvention of Technological Measures 1(A) No person shall circumvent a technological measure that effectively controls access to a work protected under this title. (B) The prohibition contained in subparagraph (A) shall not apply to persons who are users of a copyrighted work which is in a particular class of works. (C) The Library of Congress, upon the recommendation of the Register of Copyrights, who shall consult with the Assistant Secretary for Communications and Information of the Department of Commerce, shall make the determination in a rulemaking proceeding on the record for purposes of subparagraph (B).

Violations Regarding Circumvention of Technological Measures (cont’) (D) The Librarian shall publish any class of copyrighted works for which the Librarian has determined that non- infringing uses by persons who are users of a copyrighted work are, or are likely to be, adversely affected

Violations Regarding Circumvention of Technological Measures (cont’) 2 - No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that- –(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title; –(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or –(C) is marketed by that person or another acting in concert with that person with that person’s knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title.

Violations Regarding Circumvention of Technological Measures (cont’) (3) As used in this section – –(A) to ‘circumvent a technological measure’ means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and –(B) a technological measure ‘effectively controls access to a work’ if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work

Sec Integrity of Copyright Management Information

Integrity of Copyright Management Information (Cont’) (a) False Copyright Management Information – –No person shall knowingly and with the intent to induce, enable facilitate, or conceal infringement (b) Removal or Alteration of Copyright Management Information – –No person shall, without the authority of the copyright owner or the law (c) Definition –As used in this section, the term ‘copyright management information ‘means any of the following information conveyed in connection with copies or phonorecords for a work or performances or displays of a work, including in digital form, except that such term does not include any personally identifying information about a user or a work or of a copy, phonorecord, performance, or display of a work.

TITLE II- ONLINE COPYRIGHT INFRINGMENT LIABILITY LIMITATION

Limitations on Liability Relating to Material Online Def: A service provider shall not be liable for monetary relief, or except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright.

Types of Limitations on Liability Relating to Material Online 1. Transitory Digital Network Communications 2. System Caching 3. Information Residing on Systems or Networks at Direction of Users 4. Information Location Tools 5. Limitation on Liability of nonprofit educational institutions

Transitory Digital Network Communications 1. The transmission of the material was initiated by or at the direction of a person other than the provider 2. The material is transmitted through the system or network without modification of its content

System Caching 1. The material is made available online by a person other than the service provider 2. The material is transmitted from the other than the service provider through the 3. System or network to a person other than the service provider

Information Residing on Systems or Networks at Direction of Users 1. The service provider does not have actual knowledge that the material or an activity using the material on the system or network is infringing. 2. The service provider does not receive financial benefits directly attributable to the infringing activity.

Information Location Tools 1. The service provider does not have actual knowledge that the material or activity is infringing. 2. In the absence of this knowledge, is not aware of the facts or circumstances from which infringing activity is apparent.

Limitation of Liability of nonprofit educational institutions 1.The institution provides to all users its system or network informational materials that accurately describe, and promote compliance with, the laws of the United States relating to copyright. 2. The institution has not received more than two notifications of claimed infringement by a faculty member or student.

Digital Music and Peer-to- Peer File Sharing

Architecture Typical Central System Server based model Peer-to-Peer computing Any computer can act as distribution point Requests are passed along until file is found Image from team/intro/search/peer_to_peer1.gif

Copyright Concerning MP3s P2P technology is legal, but the files shared may not be Difficulty in tracing file movement and no central server to shut down. MP3 is an audio compression file format for music – up to 20 times smaller Created by ripping Allows more efficient use – storage, ing,etc

Napster vs. the “real P2Ps” Napster- relied on central server for storage of the directory of music files Grokster, Morpheus, Limewire,KaZaA utilize true P2P architecture Supernode status depends on bandwidth KaZaA had 275 million users(9/03) + 3 million new users weekly, sued for copyright infringement, overturned

Music Industry Mission RIAA(Recording Industry Association of America) lawsuits against 261 individuals began focus away from P2P companies after a federal judge refused to shut down Grokster and Morpeus Widespread criticism and skepticism Only 36% of US population believed it is stealing

Update What is the status of P2P software today? Napster-paid service, about 512,000 subscribers KaZaA-agreed to global settlement: $115 million to the RIAA and others, install filters Limewire is being sued and has issued a countersuit against record companies citing anti-competitive behavior(imesh)

And DVD Hacking

Technical Background Do we all know what a DVD is? Protected by CSS –Linux –Vulnerable to illicit copying

The Lawsuit The players –Jon Johansen, code cracker –Hacker site 2600.com, open source vender –Movie industry, sues and demands removal The case for DeCSS –Freedom of Speech? –Another way to illegally copy DVDs?

The Lawsuit Appeal As a communication, the DeCSS code has a claim to being “speech” and as “speech,” it has a claim to being protected by the First Amendment. But just as the realities of what any computer code can accomplish must inform the scope of its constitutional protection, so the capacity of a decryption program like DeCSS to accomplish unauthorized—indeed, unlawful— access to materials in which the Plaintiffs have intellectual property rights must inform and limit the scope of its First Amendment protection (Universal City Studios v. Corley, 2001).

Today Links – – – dex.htmlhttp:// dex.html DeCSS software (banned) –Why, Monopoly on media players? –Several versions out there

Players for Linux

Players for Linux (cont...)

QUESTIONS??