The DMCA, DeCSS, Copyrights and the First Amendment.

Slides:



Advertisements
Similar presentations
1 Copyright Act of 1790 Passed to promote scientific and artistic progress Extended a right to copy to authors for 14 years Authors had to register products.
Advertisements

Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
A Gift of Fire Third edition Sara Baase
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
Why the DMCA has the right to outlaw numbers
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Digital Millennium Copyright Act (DMCA)
1 The Digital Millennium Copyright Act David S. Touretzky Computer Science Department Carnegie Mellon University November, 2001.
Intellectual Property
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 12: October 21, 2003 Copyright Law, continued: the DMCA.
A Gift of Fire, 2edChapter 6: Intellectual Property1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Property in Cyberspace 1.What is “Intellectual Property”?Intellectual Property Intellectual Property Is: Intangible creative work—not necessarily the physical.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
Digital Millennium Copyright Act (DMCA) Cases Claire Stewart MM450 February 16, 2006.
CS155a: E-Commerce Lecture 7: Sept. 27, 2001 Copyright Law, DMCA, and Online Content Distribution Acknowledgement: V. Ramachandran.
The Digital Millennium Copyright Act (DMCA) Claire Stewart MM450 February 14, 2006.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Digital Rights Management Bill Cody – MSIT-526 – 12/20/05.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Legal Protection of Copy- protection Mechanisms & Rights Management Information Martina Gillen Law Department, Reading University
COPYRIGHT LAW 2002 Professor Fischer CLASS 27: TECHNOLOGICAL PROTECTION MEASURES, REMEDIES.
Examples of problems with teacher/school site violations: A company’s logo and link on footer of homepage when company is not their business partner—only.
A Gift of Fire, 2edChapter 6: Intellectual Property1 DR:SAMIR DALALAH ASSISTANT PROFF. INTELLECTUAL PROPRTY AND C O MPUTER LAW PowerPoint ® Slides to Accompany.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
CSE/ISE 312 Intellectual Property (part 2). Outline Responses to copyright infringement – Defensive and aggressive responses – DMCA – Evolving business.
Technology and Consumer Rights in Copyright By Dr. Michael Seadle Michigan State University Libraries.
The OzDMCA: What it means for FOSS linux.conf.au 2007 Kimberlee Weatherall University of Queensland.
[Copyright M. S. Overing 2003]1 Copyright Overview Michael S. Overing, Esq. 201 S. Lake Ave., Ste. 606 Pasadena, CA
Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips.
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
Teaching Strategies that Work: Copyright, Fair Use and Digital Learning Renee Hobbs Workshop for the Association of College and Research Libraries April.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES/DIGITAL MUSIC.
CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.
Copyright Law in Education Amber Glivens. Introduction  Let’s Be Honest: All teachers love to beg, borrow, or steal great ideas and lessons!  Educators.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
Copyright V Class Notes: February 10, 2003 Law 507 | Intellectual Property | Spring 2003 Professor Wagner.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
Becky Albitz Electronic Resources Librarian
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
Tony Malatanos. Focal Points  What is reverse engineering?  Reasons Legit Malicious  Legality  Morality  Clean Room Design  Example: ReactOS.
CSE 303 Concepts and Tools for Software Development Richard C. Davis UW CSE – 11/29/2006 Social Implications Discussion 4 – Digital Rights Management.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Technological Protection Measures and Access to Knowledge El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October 14, 2005 Gwen Hinze International.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
Compsci 82, Fall Digital Millennium Copyright Act,DMCA l Copyright law of United States  Passed in 1998, general industry support  Controversial.
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
It’s All (just) Bits 1) Numbers are bits 2) Text is bits 3) Formatted text is bits 4) Pictures are bits 5) Sound is bits 6) Programs (instructions on how.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
INTELLECTUAL PROPERTY PRESENTED BY: BENJAMIN BAKER & BLAZE STERLING.
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
DMCA § 2012 and Education Paul D. Callister, JD, MSLIS
A Gift of Fire Third edition Sara Baase
Intellectual Property Rights
A Gift of Fire Third edition Sara Baase
Law 507 | Intellectual Property | Spring 2003
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
Property in Cyberspace
Computer 101 Extra Credit By: Marjorie Jackson.
Presentation transcript:

The DMCA, DeCSS, Copyrights and the First Amendment

Universal Studios v. Reimerdes  MPAA encrypts DVDs using the CSS algorithm  2600, an online magazine, posts both source code of DeCSS and links to mirror pages.  MPAA sues 2600 for copyright infringement

CSS Algorithm

Potential Attacks on CSS  CSS uses a small 40 bit key  Attack space on a movie file is 2 16  Attack space on Disk Key is 2 25  Attack using known player key is DeCSS

Streamcipher  2 Linear Feedback Shift Register  LFSR1 is 17 bits  LFSR2 is 25 bits

Potential Attacks on CSS  CSS uses a small 40 bit key  Attack space on a movie file is 2 16  Attack space on Disk Key is 2 25  Attack using known player key is DeCSS

Universal Studios v. Reimerdes  Encryption protects property, and under DMCA section 1201, anti-circumvention measures are illegal.  Posting to the internet is illegal distribution  Prohibiting owners from profiting from their work is infringement

Digital Millennium Copyright Act  Prohibits the circumvention of encryption schemes designed to protect copyrighted works  Creates prohibitions on devices designed to circumvent copy-protection mechanisms

Universal Studios v. Reimerdes  Encryption protects property, and under DMCA section 1201, anti-circumvention measures are illegal.  Posting to the internet is illegal distribution  Prohibiting owners from profiting from their work is infringement

Fair Use  Copyrighted material may be used without permission or compensation under some circumstances  Parody, educational and archival uses  The DVD encryption scheme prevents such uses  The DMCA makes exemption for the exercise of fair use

Source Code as Speech  Junger v Daley – Source code is a method of exchanging ideas and is thus protected  Bernstein v. US Dept of State – instructions, technical information and manuals are functional but are still protected as speech

Source Code Takes Action  2 kinds of speech - pure, and expressive  Algorithm is an idea, an English description is still pure speech.  An executable is a series of commands which cause a computer to perform an action.  Source code falls between the two, but is closer to an executable than to English.

Conclusion  The court finds in favor of the MPAA  The DMCA was correctly applied  Serious questions remain about the constitutionality of the DMCA