SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Making The DMCA Work For YouThe Ten Things You Can Do (And the Two Things You Can’t) By Debbie Rose Intellectual Property Fellow Association For Competitive Technology (c) Innovators Network 2009.
DMCA Background DMCA= Digital Millennium Copyright Act which was signed into law in 1998. U.S. signed two international treaties requiring countries to make laws against unauthorized access to copyrighted works in digital format. DMCA gives copyright owners legal remedies against someone who “circumvents” or breaks digital locks used to prevent unauthorized access to or use of their works. DMCA was, and still is, controversial. (c) Innovators Network 2009.
Why Should You Care? Innovators want to create new and cool products and services. Innovation often builds on existing technology to provide access to entertainment products. Innovators of new technology need to be aware of the DMCA prohibitions and the exemptions which allow many uses of copyrighted material. Success = not sued. (c) Innovators Network 2009.
One of TWO Things You Can’t Do May not circumvent a digital lock on copyrighted material. Circumvent= descramble, decrypt, avoid, bypass, remove, deactivate or “hack” It is the electronic equivalent of breaking a digital lock. Prohibition on circumvention has been narrowly construed by the courts: 1) requires a relationship between circumvention and infringement; 2) requires protected material to be copyrighted (c) Innovators Network 2009.
Second of TWO Things You Can’t Do 2.	May not make devices intended for “hacking” or circumvention. Can’t manufacture, import, sell or offer to the public any technology, product, service, device that is primarily designed and marketed as a way to get unauthorized access to copyright works. Cable TV analogy: No black boxes.  (c) Innovators Network 2009.
The Ten Things You CAN Do AUTHORIZED ACCESS- You can circumvent to make use- such as making a copy for purposes fair use- if you have permission to access the work. INEFFECTIVE TECHNOLOGICAL MEASURE- Legal remedies available to copyright owners only if they use locks that work. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… REVERSE ENGINEERING or INTEROPERABILITY- You can circumvent if identifying and analyzing program code in order to achieve interoperability with other independently created programs. ENCRYPTION RESEARCH-  You can circumvent in order to find and analyze flaws and vulnerabilities in encryption technologies. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… SECURITY TESTING- You can circumvent to get access to a computer, system or network if engaged in good faith testing of security flaws. MAKE TOOLS THAT DO NOT MEET THE TEST- You can make tools or devices that might be capable of circumvention so long as that is not the primary purpose.  Intent is the key. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… MAKE TOOLS FOR REVERSE ENGINEERING- You can make circumvention tools necessary to analyze program code in order to achieve interoperability with independently created programs.  Example: Disassemblers and debuggers. MAKE TOOLS FOR ENCRYTION RESEARCH- You can make circumvention tools necessary to analyze flaws in encryption technologies. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… MAKE TOOLS FOR SECURITY TESTING- You can develop tools to allow you to access a computer, system or network for testing a security flaw. CAN REQUEST NEW EXEMPTIONS- DMCA includes a “safety net” which allows the public to request new exemptions every three years.  Must show DMCA is or is likely to adversely affect ability to make fair use. Six more exemptions in effect through 2009. (c) Innovators Network 2009.
Here’s a Hypothetical Product: Service to restore access to legitimately acquired music, movies, games, software, or books from an out of business online entertainment service.  Problem: Discover that product has the ability to access content not legally acquired. Question: Does this product violate the DMCA?   Answer: Maybe not.   (c) Innovators Network 2009.
Check List Primary Purpose- Was device primarily designed to enable unauthorized access to copyrighted works? Commercially Significant Purpose- Does device have limited commercially significant value other than “hacking”? Marketing the Product- Does marketing of device focus on “hacking” functions? Corrective Actions- Did I stop distributing device when I learned it was primarily being used to circumvent? (c) Innovators Network 2009.
Example: Blizzard v. Samba Blizzard- Violated the DMCA because it violated software licenses against reverse engineering and the purpose of the product was to avoid restricted access, not to enable interoperability of independent program. Samba- Did not violate DMCA because it didn’t violate license restrictions, used a network sniffing tool, distributed an independently created program, and the product did not constitute copyright infringement. (c) Innovators Network 2009.
Conclusion Ten years of exponential growth in technology since the DMCA was enacted. As always, talk to a lawyer. Hopefully, this will encourage you to jump onto the technology super highway , knowing that there are lots of ways to develop great new products and services that will bring you success and enhance the lives of people everywhere! (c) Innovators Network 2009.

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiplarkinsa
 
Digital Millennium Copyright
Digital Millennium CopyrightDigital Millennium Copyright
Digital Millennium CopyrightRenee Hobbs
 
Digital millennium copyright act
Digital millennium copyright actDigital millennium copyright act
Digital millennium copyright actmw15beye
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright InfringementWCU_Becca
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual propertyTawfig Tawill
 
Intellectual property in cyberspace
Intellectual property in cyberspaceIntellectual property in cyberspace
Intellectual property in cyberspaceHrishikeshBhorde
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspacerkpv2002
 
Copyright Issues in Digitisation
Copyright Issues in DigitisationCopyright Issues in Digitisation
Copyright Issues in DigitisationAlastair Dunning
 
Copyright In The Arts Presentation
Copyright In The Arts PresentationCopyright In The Arts Presentation
Copyright In The Arts PresentationRobert Cogan
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright PresentationJonathan Ezor
 
Playing The Patent Game
Playing The Patent GamePlaying The Patent Game
Playing The Patent GameAndrew Wong
 
Copyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional ElementsCopyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional ElementsJan Lindberg
 
Software Patents: Solutions for Developers
Software Patents: Solutions for DevelopersSoftware Patents: Solutions for Developers
Software Patents: Solutions for Developersfreedeb
 
IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...Tom Webster
 

Was ist angesagt? (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Digital Millennium Copyright
Digital Millennium CopyrightDigital Millennium Copyright
Digital Millennium Copyright
 
Digital millennium copyright act
Digital millennium copyright actDigital millennium copyright act
Digital millennium copyright act
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual property
 
Intellectual property in cyberspace
Intellectual property in cyberspaceIntellectual property in cyberspace
Intellectual property in cyberspace
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
 
Copyright Issues in Digitisation
Copyright Issues in DigitisationCopyright Issues in Digitisation
Copyright Issues in Digitisation
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Copyright In The Arts Presentation
Copyright In The Arts PresentationCopyright In The Arts Presentation
Copyright In The Arts Presentation
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Playing The Patent Game
Playing The Patent GamePlaying The Patent Game
Playing The Patent Game
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Copyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional ElementsCopyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional Elements
 
Software Patents: Solutions for Developers
Software Patents: Solutions for DevelopersSoftware Patents: Solutions for Developers
Software Patents: Solutions for Developers
 
IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...
 

Andere mochten auch

Microsoft Power Point Presentatie1
Microsoft Power Point   Presentatie1Microsoft Power Point   Presentatie1
Microsoft Power Point Presentatie1joostdevos
 
Senior Olympic Speech
Senior Olympic SpeechSenior Olympic Speech
Senior Olympic Speechdiscdogbob
 
Is your job a pain in your neck?
Is your job a pain in your neck?Is your job a pain in your neck?
Is your job a pain in your neck?discdogbob
 
Enterprise Of The Future
Enterprise Of The FutureEnterprise Of The Future
Enterprise Of The FutureWout Hofman
 
Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007guest9a4944a2
 
Business Case RF techonology
Business Case RF techonologyBusiness Case RF techonology
Business Case RF techonologyWout Hofman
 

Andere mochten auch (9)

Microsoft Power Point Presentatie1
Microsoft Power Point   Presentatie1Microsoft Power Point   Presentatie1
Microsoft Power Point Presentatie1
 
Senior Olympic Speech
Senior Olympic SpeechSenior Olympic Speech
Senior Olympic Speech
 
Is your job a pain in your neck?
Is your job a pain in your neck?Is your job a pain in your neck?
Is your job a pain in your neck?
 
Enterprise Of The Future
Enterprise Of The FutureEnterprise Of The Future
Enterprise Of The Future
 
Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007
 
Business Case RF techonology
Business Case RF techonologyBusiness Case RF techonology
Business Case RF techonology
 
Graphic Design_RT
Graphic Design_RTGraphic Design_RT
Graphic Design_RT
 
Nup04102010
Nup04102010Nup04102010
Nup04102010
 
Portfolio_Illustrations
Portfolio_IllustrationsPortfolio_Illustrations
Portfolio_Illustrations
 

Ähnlich wie What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't

Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)ElaineLee
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.pptKISHOYIANKISH
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010dixieyeager
 
Ip in it
Ip in itIp in it
Ip in itIP Dome
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014dixieyeager
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)guest757c2c1
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxjameshagwen
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...Evangeline
 
Digital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignDigital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignMassimo Menichinelli
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPRNeil Witt
 
Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companiesJohan Örneblad
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfNeelHope
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
093049ov16.pptx
093049ov16.pptx093049ov16.pptx
093049ov16.pptxNguyenNM
 
Copyright draft
Copyright draftCopyright draft
Copyright draftsgetchel
 
Copyright 1 draft
Copyright 1 draftCopyright 1 draft
Copyright 1 draftsgetchel
 

Ähnlich wie What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't (20)

Drm
DrmDrm
Drm
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)
 
Digital rights management
Digital rights managementDigital rights management
Digital rights management
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
IP Compliance.ppt
IP Compliance.pptIP Compliance.ppt
IP Compliance.ppt
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Ip in it
Ip in itIp in it
Ip in it
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
 
Digital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignDigital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open Design
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companies
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdf
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
093049ov16.pptx
093049ov16.pptx093049ov16.pptx
093049ov16.pptx
 
Copyright draft
Copyright draftCopyright draft
Copyright draft
 
Copyright 1 draft
Copyright 1 draftCopyright 1 draft
Copyright 1 draft
 

Kürzlich hochgeladen

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't

  • 1. Making The DMCA Work For YouThe Ten Things You Can Do (And the Two Things You Can’t) By Debbie Rose Intellectual Property Fellow Association For Competitive Technology (c) Innovators Network 2009.
  • 2. DMCA Background DMCA= Digital Millennium Copyright Act which was signed into law in 1998. U.S. signed two international treaties requiring countries to make laws against unauthorized access to copyrighted works in digital format. DMCA gives copyright owners legal remedies against someone who “circumvents” or breaks digital locks used to prevent unauthorized access to or use of their works. DMCA was, and still is, controversial. (c) Innovators Network 2009.
  • 3. Why Should You Care? Innovators want to create new and cool products and services. Innovation often builds on existing technology to provide access to entertainment products. Innovators of new technology need to be aware of the DMCA prohibitions and the exemptions which allow many uses of copyrighted material. Success = not sued. (c) Innovators Network 2009.
  • 4. One of TWO Things You Can’t Do May not circumvent a digital lock on copyrighted material. Circumvent= descramble, decrypt, avoid, bypass, remove, deactivate or “hack” It is the electronic equivalent of breaking a digital lock. Prohibition on circumvention has been narrowly construed by the courts: 1) requires a relationship between circumvention and infringement; 2) requires protected material to be copyrighted (c) Innovators Network 2009.
  • 5. Second of TWO Things You Can’t Do 2. May not make devices intended for “hacking” or circumvention. Can’t manufacture, import, sell or offer to the public any technology, product, service, device that is primarily designed and marketed as a way to get unauthorized access to copyright works. Cable TV analogy: No black boxes. (c) Innovators Network 2009.
  • 6. The Ten Things You CAN Do AUTHORIZED ACCESS- You can circumvent to make use- such as making a copy for purposes fair use- if you have permission to access the work. INEFFECTIVE TECHNOLOGICAL MEASURE- Legal remedies available to copyright owners only if they use locks that work. (c) Innovators Network 2009.
  • 7. Ten Things You CAN Do, cont… REVERSE ENGINEERING or INTEROPERABILITY- You can circumvent if identifying and analyzing program code in order to achieve interoperability with other independently created programs. ENCRYPTION RESEARCH- You can circumvent in order to find and analyze flaws and vulnerabilities in encryption technologies. (c) Innovators Network 2009.
  • 8. Ten Things You CAN Do, cont… SECURITY TESTING- You can circumvent to get access to a computer, system or network if engaged in good faith testing of security flaws. MAKE TOOLS THAT DO NOT MEET THE TEST- You can make tools or devices that might be capable of circumvention so long as that is not the primary purpose. Intent is the key. (c) Innovators Network 2009.
  • 9. Ten Things You CAN Do, cont… MAKE TOOLS FOR REVERSE ENGINEERING- You can make circumvention tools necessary to analyze program code in order to achieve interoperability with independently created programs. Example: Disassemblers and debuggers. MAKE TOOLS FOR ENCRYTION RESEARCH- You can make circumvention tools necessary to analyze flaws in encryption technologies. (c) Innovators Network 2009.
  • 10. Ten Things You CAN Do, cont… MAKE TOOLS FOR SECURITY TESTING- You can develop tools to allow you to access a computer, system or network for testing a security flaw. CAN REQUEST NEW EXEMPTIONS- DMCA includes a “safety net” which allows the public to request new exemptions every three years. Must show DMCA is or is likely to adversely affect ability to make fair use. Six more exemptions in effect through 2009. (c) Innovators Network 2009.
  • 11. Here’s a Hypothetical Product: Service to restore access to legitimately acquired music, movies, games, software, or books from an out of business online entertainment service. Problem: Discover that product has the ability to access content not legally acquired. Question: Does this product violate the DMCA? Answer: Maybe not. (c) Innovators Network 2009.
  • 12. Check List Primary Purpose- Was device primarily designed to enable unauthorized access to copyrighted works? Commercially Significant Purpose- Does device have limited commercially significant value other than “hacking”? Marketing the Product- Does marketing of device focus on “hacking” functions? Corrective Actions- Did I stop distributing device when I learned it was primarily being used to circumvent? (c) Innovators Network 2009.
  • 13. Example: Blizzard v. Samba Blizzard- Violated the DMCA because it violated software licenses against reverse engineering and the purpose of the product was to avoid restricted access, not to enable interoperability of independent program. Samba- Did not violate DMCA because it didn’t violate license restrictions, used a network sniffing tool, distributed an independently created program, and the product did not constitute copyright infringement. (c) Innovators Network 2009.
  • 14. Conclusion Ten years of exponential growth in technology since the DMCA was enacted. As always, talk to a lawyer. Hopefully, this will encourage you to jump onto the technology super highway , knowing that there are lots of ways to develop great new products and services that will bring you success and enhance the lives of people everywhere! (c) Innovators Network 2009.