SlideShare une entreprise Scribd logo
1  sur  14
Making The DMCA Work For YouThe Ten Things You Can Do (And the Two Things You Can’t) By Debbie Rose Intellectual Property Fellow Association For Competitive Technology (c) Innovators Network 2009.
DMCA Background DMCA= Digital Millennium Copyright Act which was signed into law in 1998. U.S. signed two international treaties requiring countries to make laws against unauthorized access to copyrighted works in digital format. DMCA gives copyright owners legal remedies against someone who “circumvents” or breaks digital locks used to prevent unauthorized access to or use of their works. DMCA was, and still is, controversial. (c) Innovators Network 2009.
Why Should You Care? Innovators want to create new and cool products and services. Innovation often builds on existing technology to provide access to entertainment products. Innovators of new technology need to be aware of the DMCA prohibitions and the exemptions which allow many uses of copyrighted material. Success = not sued. (c) Innovators Network 2009.
One of TWO Things You Can’t Do May not circumvent a digital lock on copyrighted material. Circumvent= descramble, decrypt, avoid, bypass, remove, deactivate or “hack” It is the electronic equivalent of breaking a digital lock. Prohibition on circumvention has been narrowly construed by the courts: 1) requires a relationship between circumvention and infringement; 2) requires protected material to be copyrighted (c) Innovators Network 2009.
Second of TWO Things You Can’t Do 2.	May not make devices intended for “hacking” or circumvention. Can’t manufacture, import, sell or offer to the public any technology, product, service, device that is primarily designed and marketed as a way to get unauthorized access to copyright works. Cable TV analogy: No black boxes.  (c) Innovators Network 2009.
The Ten Things You CAN Do AUTHORIZED ACCESS- You can circumvent to make use- such as making a copy for purposes fair use- if you have permission to access the work. INEFFECTIVE TECHNOLOGICAL MEASURE- Legal remedies available to copyright owners only if they use locks that work. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… REVERSE ENGINEERING or INTEROPERABILITY- You can circumvent if identifying and analyzing program code in order to achieve interoperability with other independently created programs. ENCRYPTION RESEARCH-  You can circumvent in order to find and analyze flaws and vulnerabilities in encryption technologies. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… SECURITY TESTING- You can circumvent to get access to a computer, system or network if engaged in good faith testing of security flaws. MAKE TOOLS THAT DO NOT MEET THE TEST- You can make tools or devices that might be capable of circumvention so long as that is not the primary purpose.  Intent is the key. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… MAKE TOOLS FOR REVERSE ENGINEERING- You can make circumvention tools necessary to analyze program code in order to achieve interoperability with independently created programs.  Example: Disassemblers and debuggers. MAKE TOOLS FOR ENCRYTION RESEARCH- You can make circumvention tools necessary to analyze flaws in encryption technologies. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… MAKE TOOLS FOR SECURITY TESTING- You can develop tools to allow you to access a computer, system or network for testing a security flaw. CAN REQUEST NEW EXEMPTIONS- DMCA includes a “safety net” which allows the public to request new exemptions every three years.  Must show DMCA is or is likely to adversely affect ability to make fair use. Six more exemptions in effect through 2009. (c) Innovators Network 2009.
Here’s a Hypothetical Product: Service to restore access to legitimately acquired music, movies, games, software, or books from an out of business online entertainment service.  Problem: Discover that product has the ability to access content not legally acquired. Question: Does this product violate the DMCA?   Answer: Maybe not.   (c) Innovators Network 2009.
Check List Primary Purpose- Was device primarily designed to enable unauthorized access to copyrighted works? Commercially Significant Purpose- Does device have limited commercially significant value other than “hacking”? Marketing the Product- Does marketing of device focus on “hacking” functions? Corrective Actions- Did I stop distributing device when I learned it was primarily being used to circumvent? (c) Innovators Network 2009.
Example: Blizzard v. Samba Blizzard- Violated the DMCA because it violated software licenses against reverse engineering and the purpose of the product was to avoid restricted access, not to enable interoperability of independent program. Samba- Did not violate DMCA because it didn’t violate license restrictions, used a network sniffing tool, distributed an independently created program, and the product did not constitute copyright infringement. (c) Innovators Network 2009.
Conclusion Ten years of exponential growth in technology since the DMCA was enacted. As always, talk to a lawyer. Hopefully, this will encourage you to jump onto the technology super highway , knowing that there are lots of ways to develop great new products and services that will bring you success and enhance the lives of people everywhere! (c) Innovators Network 2009.

Contenu connexe

Tendances

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
larkinsa
 

Tendances (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Digital Millennium Copyright
Digital Millennium CopyrightDigital Millennium Copyright
Digital Millennium Copyright
 
Digital millennium copyright act
Digital millennium copyright actDigital millennium copyright act
Digital millennium copyright act
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual property
 
Intellectual property in cyberspace
Intellectual property in cyberspaceIntellectual property in cyberspace
Intellectual property in cyberspace
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
 
Copyright Issues in Digitisation
Copyright Issues in DigitisationCopyright Issues in Digitisation
Copyright Issues in Digitisation
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Copyright In The Arts Presentation
Copyright In The Arts PresentationCopyright In The Arts Presentation
Copyright In The Arts Presentation
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Playing The Patent Game
Playing The Patent GamePlaying The Patent Game
Playing The Patent Game
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Copyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional ElementsCopyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional Elements
 
Software Patents: Solutions for Developers
Software Patents: Solutions for DevelopersSoftware Patents: Solutions for Developers
Software Patents: Solutions for Developers
 
IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...
 

En vedette (9)

Microsoft Power Point Presentatie1
Microsoft Power Point   Presentatie1Microsoft Power Point   Presentatie1
Microsoft Power Point Presentatie1
 
Senior Olympic Speech
Senior Olympic SpeechSenior Olympic Speech
Senior Olympic Speech
 
Is your job a pain in your neck?
Is your job a pain in your neck?Is your job a pain in your neck?
Is your job a pain in your neck?
 
Enterprise Of The Future
Enterprise Of The FutureEnterprise Of The Future
Enterprise Of The Future
 
Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007
 
Business Case RF techonology
Business Case RF techonologyBusiness Case RF techonology
Business Case RF techonology
 
Graphic Design_RT
Graphic Design_RTGraphic Design_RT
Graphic Design_RT
 
Nup04102010
Nup04102010Nup04102010
Nup04102010
 
Portfolio_Illustrations
Portfolio_IllustrationsPortfolio_Illustrations
Portfolio_Illustrations
 

Similaire à What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't

Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
dixieyeager
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
dixieyeager
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
jameshagwen
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
Evangeline
 
Digital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignDigital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open Design
Massimo Menichinelli
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
Service2Media
 

Similaire à What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't (20)

Drm
DrmDrm
Drm
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)
 
Digital rights management
Digital rights managementDigital rights management
Digital rights management
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
IP Compliance.ppt
IP Compliance.pptIP Compliance.ppt
IP Compliance.ppt
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Ip in it
Ip in itIp in it
Ip in it
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
 
Digital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignDigital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open Design
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companies
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdf
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
093049ov16.pptx
093049ov16.pptx093049ov16.pptx
093049ov16.pptx
 
Copyright draft
Copyright draftCopyright draft
Copyright draft
 
Copyright 1 draft
Copyright 1 draftCopyright 1 draft
Copyright 1 draft
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't

  • 1. Making The DMCA Work For YouThe Ten Things You Can Do (And the Two Things You Can’t) By Debbie Rose Intellectual Property Fellow Association For Competitive Technology (c) Innovators Network 2009.
  • 2. DMCA Background DMCA= Digital Millennium Copyright Act which was signed into law in 1998. U.S. signed two international treaties requiring countries to make laws against unauthorized access to copyrighted works in digital format. DMCA gives copyright owners legal remedies against someone who “circumvents” or breaks digital locks used to prevent unauthorized access to or use of their works. DMCA was, and still is, controversial. (c) Innovators Network 2009.
  • 3. Why Should You Care? Innovators want to create new and cool products and services. Innovation often builds on existing technology to provide access to entertainment products. Innovators of new technology need to be aware of the DMCA prohibitions and the exemptions which allow many uses of copyrighted material. Success = not sued. (c) Innovators Network 2009.
  • 4. One of TWO Things You Can’t Do May not circumvent a digital lock on copyrighted material. Circumvent= descramble, decrypt, avoid, bypass, remove, deactivate or “hack” It is the electronic equivalent of breaking a digital lock. Prohibition on circumvention has been narrowly construed by the courts: 1) requires a relationship between circumvention and infringement; 2) requires protected material to be copyrighted (c) Innovators Network 2009.
  • 5. Second of TWO Things You Can’t Do 2. May not make devices intended for “hacking” or circumvention. Can’t manufacture, import, sell or offer to the public any technology, product, service, device that is primarily designed and marketed as a way to get unauthorized access to copyright works. Cable TV analogy: No black boxes. (c) Innovators Network 2009.
  • 6. The Ten Things You CAN Do AUTHORIZED ACCESS- You can circumvent to make use- such as making a copy for purposes fair use- if you have permission to access the work. INEFFECTIVE TECHNOLOGICAL MEASURE- Legal remedies available to copyright owners only if they use locks that work. (c) Innovators Network 2009.
  • 7. Ten Things You CAN Do, cont… REVERSE ENGINEERING or INTEROPERABILITY- You can circumvent if identifying and analyzing program code in order to achieve interoperability with other independently created programs. ENCRYPTION RESEARCH- You can circumvent in order to find and analyze flaws and vulnerabilities in encryption technologies. (c) Innovators Network 2009.
  • 8. Ten Things You CAN Do, cont… SECURITY TESTING- You can circumvent to get access to a computer, system or network if engaged in good faith testing of security flaws. MAKE TOOLS THAT DO NOT MEET THE TEST- You can make tools or devices that might be capable of circumvention so long as that is not the primary purpose. Intent is the key. (c) Innovators Network 2009.
  • 9. Ten Things You CAN Do, cont… MAKE TOOLS FOR REVERSE ENGINEERING- You can make circumvention tools necessary to analyze program code in order to achieve interoperability with independently created programs. Example: Disassemblers and debuggers. MAKE TOOLS FOR ENCRYTION RESEARCH- You can make circumvention tools necessary to analyze flaws in encryption technologies. (c) Innovators Network 2009.
  • 10. Ten Things You CAN Do, cont… MAKE TOOLS FOR SECURITY TESTING- You can develop tools to allow you to access a computer, system or network for testing a security flaw. CAN REQUEST NEW EXEMPTIONS- DMCA includes a “safety net” which allows the public to request new exemptions every three years. Must show DMCA is or is likely to adversely affect ability to make fair use. Six more exemptions in effect through 2009. (c) Innovators Network 2009.
  • 11. Here’s a Hypothetical Product: Service to restore access to legitimately acquired music, movies, games, software, or books from an out of business online entertainment service. Problem: Discover that product has the ability to access content not legally acquired. Question: Does this product violate the DMCA? Answer: Maybe not. (c) Innovators Network 2009.
  • 12. Check List Primary Purpose- Was device primarily designed to enable unauthorized access to copyrighted works? Commercially Significant Purpose- Does device have limited commercially significant value other than “hacking”? Marketing the Product- Does marketing of device focus on “hacking” functions? Corrective Actions- Did I stop distributing device when I learned it was primarily being used to circumvent? (c) Innovators Network 2009.
  • 13. Example: Blizzard v. Samba Blizzard- Violated the DMCA because it violated software licenses against reverse engineering and the purpose of the product was to avoid restricted access, not to enable interoperability of independent program. Samba- Did not violate DMCA because it didn’t violate license restrictions, used a network sniffing tool, distributed an independently created program, and the product did not constitute copyright infringement. (c) Innovators Network 2009.
  • 14. Conclusion Ten years of exponential growth in technology since the DMCA was enacted. As always, talk to a lawyer. Hopefully, this will encourage you to jump onto the technology super highway , knowing that there are lots of ways to develop great new products and services that will bring you success and enhance the lives of people everywhere! (c) Innovators Network 2009.