CINXE.COM
Anticircumvention (DMCA) :: Topics :: Lumen
<!DOCTYPE html> <html> <head> <meta charset="utf-8" /> <meta name="ROBOTS" content="NOODP" /> <title>Anticircumvention (DMCA) :: Topics :: Lumen</title> <link rel="stylesheet" href="/assets/application-edf3ba94297288ba21dcd7d7f08d7b53fed070a91204df553802ab78eb5b7a75.css" media="all" /> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="gWVd2qYkFgoyUcNkYxsZS4QzVmdCVQn5p1Em0cPI4iA6xrRwnA2E9YzV2PT4rSimINFgIczHxM0__ChfnWPVhQ" /> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <link rel="shortcut icon" href="/favicon.ico"> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.6.2/html5shiv.js"></script> <![endif]--> </head> <body class="topics topics-show"> <div id="flash"> </div> <header class="app"> <div class="nav-wrapper"> <div> <a id="root" href="/"> <img src="/assets/logo_2x-4827576148b1dd2ca23c3cd316e93121ad0364ce6722fe7e70cd2927b200249a.png" width="265" height="64" /> </a> </div> <div class="flex-end"> <nav class="main-nav"> <div class="nav-item search"><a href="/">Search</a></div> <div class="nav-item topics dropdown"> <a href="#" class="dropdown-toggle" data-toggle="dropdown">Topics</a> <div id="dropdown-topics" class="dropdown-menu" role="menu"> <ol> <li class="dropdown-submenu"> <a href="/topics/5">Copyright</a> <ol class="dropdown-menu"> <li class="title">Subtopics</li> <li class=""> <a href="/topics/12">Anticircumvention (DMCA)</a> </li> <li class=""> <a href="/topics/22">Copyright and Fair Use</a> </li> <li class=""> <a href="/topics/16">Derivative Works</a> </li> <li class=""> <a href="/topics/29">DMCA Notices</a> </li> <li class=""> <a href="/topics/14">DMCA Safe Harbor</a> </li> <li class=""> <a href="/topics/25">DMCA Subpoenas</a> </li> <li class=""> <a href="/topics/11">Piracy or Copyright Infringement</a> </li> <li class=""> <a href="/topics/15">Reverse Engineering</a> </li> </ol> </li> <li class=""> <a href="/topics/40">Counterfeit</a> </li> <li class=""> <a href="/topics/28">Court Orders</a> </li> <li class=""> <a href="/topics/8">Defamation</a> </li> <li class="dropdown-submenu"> <a href="/topics/34">EU - Right to Be Forgotten</a> <ol class="dropdown-menu"> <li class="title">Subtopics</li> <li class=""> <a href="/topics/36"> El Derecho Al Olvido</a> </li> <li class=""> <a href="/topics/37">O Pravu Osobe Da Bude Zaboravljena?</a> </li> <li class=""> <a href="/topics/35">"Recht auf Vergessen" </a> </li> <li class=""> <a href="/topics/38">Recht Om Vergeten Te Worden</a> </li> <li class=""> <a href="/topics/39">锌褉邪胁芯褌芯 写邪 斜褗写械褕 蟹邪斜褉邪胁械薪</a> </li> </ol> </li> <li class=""> <a href="/topics/3">Fan Fiction</a> </li> <li class=""> <a href="/topics/33">Government Requests</a> </li> <li class=""> <a href="/topics/26">International</a> </li> <li class=""> <a href="/topics/13">John Doe Anonymity</a> </li> <li class=""> <a href="/topics/32">Law Enforcement Requests</a> </li> <li class=""> <a href="/topics/18">Linking</a> </li> <li class=""> <a href="/topics/1">Lumen</a> </li> <li class=""> <a href="/topics/30">No Action</a> </li> <li class="dropdown-submenu"> <a href="/topics/20">Patent</a> <ol class="dropdown-menu"> <li class="title">Subtopics</li> <li class=""> <a href="/topics/24">E-Commerce Patents</a> </li> </ol> </li> <li class=""> <a href="/topics/21">Responses</a> </li> <li class=""> <a href="/topics/31">Right of Publicity</a> </li> <li class="dropdown-submenu"> <a href="/topics/6">Trademark</a> <ol class="dropdown-menu"> <li class="title">Subtopics</li> <li class="dropdown-submenu"> <a href="/topics/2">Domain Names and Trademarks</a> <ol class="dropdown-menu"> <li class="title">Subtopics</li> <li class=""> <a href="/topics/10">ACPA</a> </li> <li class=""> <a href="/topics/19">Documenting Your Domain Defense</a> </li> <li class=""> <a href="/topics/9">UDRP</a> </li> </ol> </li> <li class=""> <a href="/topics/17">Protest, Parody and Criticism Sites</a> </li> </ol> </li> <li class=""> <a href="/topics/23">Trade Secret</a> </li> <li class=""> <a href="/topics/27">Uncategorized</a> </li> </ol> </div> </div> <div class="nav-item"> <a href="/media_mentions/search">Research and Media Mentions</a> </div> <div class="nav-item"> <a href="/pages/about">About</a> </div> </nav> </div> </div> <div class="container header-bar"> <h2>Topics</h2> </div> </header> <section class="main app"> <div class="main-inner"> <section class="topic-description"> <h1>Anticircumvention (DMCA)</h1> <article> <p><p>In order to control the distribution and use of their works, copyright owners are increasingly embedding access (keep you from accessing the work) and copy (control what you do with the work) protection schemes in their digital works. Under Section 1201 of the Digital Millennium Copyright Act (DMCA), the circumvention of these access mechanisms is illegal, with only a few narrow statutory exemptions. The DMCA also prohibits the distribution of programs that can be used to circumvent both copy control and access control technologies.</p> <p>The anti-circumvention provisions affect the way software engineers, computer scientists, and computer security specialists do their work. But the law also affects how librarians and educational institutions acquire new works, how Internet users can protect their privacy, and even how journalists can report on stories involving technical protection measures. By using a technical device to protect music, images or words the copyright holder can turn traditionally permissible access to or use of digital content into a civil violation. This new law has complex provisions and a few narrow exemptions, which are reviewed in greater detail in the DMCA anti-circumvention provisions FAQ, linked below.</p> <p>Some activities affected by this law might include:</p> <ul> <li><p>manipulating the computer code of a digital toy to make it perform new functions;</p></li> <li><p>disabling an access control device on the storage media of an entertainment product; </p></li> <li><p>creating a patch for a software program or electronics product;</p></li> <li><p>performing cryptanalysis on security systems that control access to digital data;</p></li> </ul> <p>If you've received a letter accusing you of violating the DMCA, this section will help you understand the claims against you. If you are engaged in an activity which involves disabling an anti-copying measure, reverse engineering an encrypted computer system, conducting research on cryptography or security systems, or altering how a computer program or product works, this section is intended to provide you information about how the DMCA affects your activities. Distributing a program that performs these functions by selling, making available for download, or even linking to it, may also be a violation of the circumvention device provisions of the DMCA.</p> </p> </article> </section> <section class="topic-notices"> <h4>Recent Notices</h4> <ol> <li class="notice"> <a href="/notices/46679646">DMCA (Copyright) Complaint to Google</a> </li> <li class="notice"> <a href="/notices/46679248">DMCA (Copyright) Complaint to Google</a> </li> <li class="notice"> <a href="/notices/46679583">DMCA (Copyright) Complaint to Google</a> </li> <li class="notice"> <a href="/notices/46678619">DMCA (Copyright) Complaint to Google</a> </li> <li class="notice"> <a href="/notices/46678645">DMCA (Copyright) Complaint to Google</a> </li> <li class="notice"> <a href="/notices/46677263">DMCA (Copyright) Complaint to Google</a> </li> <li class="notice"> <a href="/notices/46677261">DMCA (Copyright) Complaint to Google</a> </li> <li class="notice"> <a href="/notices/46677810">DMCA (Copyright) Complaint to Google</a> </li> <li class="notice"> <a href="/notices/46678032">DMCA (Copyright) Complaint to Google</a> </li> <li class="notice"> <a href="/notices/46678057">DMCA (Copyright) Complaint to Google</a> </li> </ol> </section> <section class="topic-faqs" id="topic-faqs"> <h3 class="title">Frequently Asked Questions</h3> <div class="wrapper"> <article> <div class="question">Is circumvention permitted in order to protect children from content on the Internet?</div> <div class="answer"><p>The DMCA includes an exemption for both the circumvention and the circumvention device ban for programs whose sole purpose is to assist individuals to prevent minors from accessing objectionable material on the Internet. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#h">[1201(h)] </a> This exemption is unfortunately too narrow because the technological mechanisms protecting these materials may also be used to protect other types of materials on the Internet. Developing and distributing a program that is designed for the protection of minors is vulnerable to legal liability for other uses that can be made of such a product.</p> </div> </article> <article> <div class="question">What are the DMCA's anti-circumvention provisions?</div> <div class="answer"><p>The Digital Millennium Copyright Act (DMCA) is the latest amendment to copyright law, which introduced a new category of copyright violations that prohibit the "circumvention" of technical locks and controls on the use of digital content and products. These anti-circumvention provisions put the force of law behind any technological systems used by copyright owners to control access to and copying of their digital works.</p> <p>The DMCA contains four main provisions: <ol><li>a prohibition on circumventing access controls <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#a">[1201(a)(1)(A)]</a>; <li>an access control circumvention device ban (sometimes called the "trafficking" ban) <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#a2">[1201(a)(2)]</a>; <li>a copyright protection circumvention device ban <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#b">[1201(b)]</a>; and, <li>a prohibition on the removal of copyright management information (CMI) [1202(b)].</ol></p> <p>The first provision prohibits the act of circumventing technological protection systems, the second and third ban technological devices that facilitate the circumvention of access control or copy controls, and the fourth prohibits individuals from removing information about access and use devices and rules. The first three provisions are also distinguishable in that the first two provisions focus on technological protection systems that provide access control to the copyright owner, while the third provision prohibits circumvention of technological protections against unauthorized duplication and other potentially copyright infringing activities.</p> </div> </article> <article> <div class="question">Why was the DMCA passed?</div> <div class="answer"><p>The stated purpose of the DMCA is to ensure the protection of copyrighted works in the digital world by fortifying the technological blocks on access and copying of those works within a legal framework. This amendment to title 17 (the Copyright Act) was signed into law on October 28, 1998 as the United States implementation of the World Intellectual Property Organization (WIPO) Copyright Treaty adopted by countries around the world two years earlier. The DMCA implemented these recommendations in a much stricter fashion than required, giving copyright owners broader protection than was intended in the international treaty.</p> </div> </article> <article> <div class="question">So what is all the controversy about the DMCA?</div> <div class="answer"><p>The shift towards the distribution of copyrighted materials in digital form has been accompanied by new methods of protection. Through the use of "digital locks," technological systems behind which these copyrighted materials are protected, producers and manufacturers are able to automate fine grained control over who can access, use, and/or copy their works and under what conditions. Producers insist these "digital locks" are necessary to protect their materials from being pirated or misappropriated. But, these new technological systems, and the DMCA provisions making it a crime to bypass them, undermine individuals ability to make "fair use" of digital information, and essentially replace the negotiation of the terms of use for those products with unilateral terms dictated by copyright owners. These self-help technical protection mechanisms are generally not evident to the purchaser or user until after the sale. In some cases, producers who use these technical locks to enforce limits on access and use of their works fail to disclose the terms of use to the purchasers or licensees of their products.</p> <p>The defenses and exemptions to the circumvention prohibition and circumvention device bans included in the law are fatefully narrow. As a result, the legitimate activities of scientists, software engineers, journalists, and others have been chilled. The DMCA has been used by copyright holders and the government to prevent the creation of third-party software products, silence computer scientists, and prosecute journalists who provide hypertext links to software code.</p> </div> </article> <article> <div class="question">What are technological protection measures?</div> <div class="answer"><p>Technological protection systems are already in place in DVDs, eBooks, video game consoles, robotic toys, Internet streaming, and password-protected sections of web sites. The fact that a digital protection may be really weak and easy to circumvent has not prevented courts from applying this law to punish those who bypass them.</p> <p><p>The DMCA defines an <b>access control</b> mechanism as a measure which "in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work. See Section 1201(a)(3)(B) of the Copyright Act. An access control is a technology, like a password or encryption that controls who or what is able to interact with the copyrighted work. It is a violation of the DMCA to circumvent access controls, but it is also a violation to provide tools to others that circumvent access controls (including selling, distributing free of charge, and possibly even linking to a site with such technology).</p> </div> </article> <article> <div class="question">Is there really a difference between access controls and copy controls?</div> <div class="answer"><p>While there is a difference in the types of activities controlled by these technological protection measures, some copyright owners try to merge access and use controls in the implementation of these systems. For example, in trying to implement a "pay-per-use" business model, some copyright owners use a single persistent control system that charges separately for the different uses of a work even after someone pays for access.</p> </div> </article> <article> <div class="question">What does circumvention mean?</div> <div class="answer"><p>Circumvention, according to <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#a_A">Section 1201(a)(3)(A)</a>, means "to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner." While the full scope of activities and practices that would fall under this definition has not yet been examined by the courts, any act of undoing a "lock" or "block" in a digital system may well be considered circumvention.</p> </div> </article> <article> <div class="question">What is a circumvention tool?</div> <div class="answer"><p>The prohibited tools under the DMCA are the programs which are primarily designed or produced for the purpose of circumvention of an access <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#a_A">[1201(2)(a)]</a> or copy control <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#b">[1201(b)(1)(A)]</a> mechanism. These programs can come in various forms including products, services, devices, or components. The DMCA includes in its definition of circumvention tools that these devices have limited commercially significant purposes other than circumvention or are marketed to be used for circumvention <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#a_B">[1201(2)(B-C)]</a>, <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#b_B">1201(b)(1)(B-C)]</a>.</p> <p>Congress intended the circumvention device bans to be analogous to laws that specifically prohibit the manufacture or distribution of descrambler boxes that allow access to cable television and satellite services without payment. However, the broad definition of circumvention tools in the DMCA creates numerous situations in which non-infringing uses of copyrighted works are prohibited as well merely because the technology necessary to engage in those legitimate uses is illegal under the circumvention device ban.</p> </div> </article> <article> <div class="question">What does it mean to distribute circumvention tools?</div> <div class="answer"><p><a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#a2">Section 1201(a)(2)</a> defines distribution as the "manufacture, import, offer to the public, provide, or otherwise traffic" of circumvention tools. This definition can be interpreted extremely broadly as evident in the court's analysis in the DVD encryption <i>Universal v. Corley</i> case. In its decision, the court considered not only making the source code of a program for free a type of distribution, but also found that merely linking to a web site containing illegal tools can constitute "trafficking."</p> </div> </article> <article> <div class="question">What kind of authorization is required of the copyright owner in order to legally circumvent a system?</div> <div class="answer"><p>It depends. In general, the anti-circumvention provisions of the DMCA reserve broad authority for copyright holders to determine who can circumvent their systems. </p> <p>For example, while the DMCA contains an encryption research exemption, to come under the exception, a researcher must request the permission from the copyright holder to engage in circumvention in order to be exempted [1201(g)(2)(C)]. In addition, under the DMCA only individuals who are studying, trained, or employed in encryption research are likely to be considered legitimate researchers under the law [1201(g)(3)(B)]. Finally, an encryption researcher is required to immediately notify the creator of the protection system when she breaks it. [1201(g)(3)(C)] The security testing exemption is even more restrictive in its rules about obtaining authorization from the copyright owner, requiring individuals engaged in security testing to not only request, but must actually obtain the authorization. [1201(j)(1)] On the other hand, the exemption relating to law enforcement, intelligence, and other government purposes have no such requirements to notify copyright owners of their activities. [1201(e)]</p> <p>One important limitation to the control given to copyright owners is that manufacturers and developers of consumers electronics, telecommunications, or computing products are not required to design their products to respond to the digital protection systems implemented by copyright owners in their works. [1201(c)(3)] In this limitation, the DMCA anticipated the excessive control that copyright owners might exercise over the products used to play their works in addition to the works themselves.</p> </div> </article> <article> <div class="question">Can a system be legally circumvented?</div> <div class="answer"><p>It depends. In general, the anti-circumvention provisions of the DMCA reserve broad authority to copyright holders to determine who can circumvent their systems.</p> <p>For example, while the DMCA contains an encryption research exemption, to come under the exception, a researcher must lawfully obtain the work and request the permission from the copyright holder to engage in circumvention in order to be exempted <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g_2_C">[1201(g)(2)(C)]</a>. In addition, under the DMCA only individuals who are studying, trained, or employed in encryption research are likely to be considered legitimate researchers under the law <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g_3_B">[1201(g)(3)(B)]</a>. Finally, an encryption researcher is required to immediately notify the creator of the protection system when she breaks it. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g_3_B">[1201(g)(3)(C)]</a> The security testing exemption is even more restrictive in its rules about obtaining authorization from the copyright owner. It requires individuals engaged in security testing to not only request, but must actually obtain the authorization. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#i_2_j">[1201(j)(1)] </a> On the other hand, the exemption relating to law enforcement, intelligence, and other government purposes have no such requirements to notify copyright owners of their activities. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#e">[1201(e)]</a></p> <p>One important limitation to the control given to copyright owners is that manufacturers and developers of consumers electronics, telecommunications, or computing products are not required to design their products to respond to the digital protection systems implemented by copyright owners in their works. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#c_3">[1201(c)(3)]</a> In this limitation, the DMCA anticipated the excessive control that copyright owners might exercise over the products used to play their works in addition to the works themselves.</p> </div> </article> <article> <div class="question">Are there exceptions in the DMCA to allow circumvention of technological protection systems?</div> <div class="answer"><p>There are seven exemptions built into section 1201 of the DMCA, some of which permit the circumvention of access and copy controls for limited purposes, some of which allow for the limited distribution of circumvention tools in particular circumstances. These seven exemptions are for:</p> <blockquote><ul><li>Libraries, archives, and educational institutions for acquisition purposes; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#d">[1201(d)]</a> <li> Law enforcement and intelligence gathering activities; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#e">[1201(e)]</a> <li> Reverse engineering in order to develop interoperable programs; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#f">[1201(f)]</a> <li> Encryption Research; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g">[1201(g)]</a> <li> Protecting minors from material on the Internet; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#h">[1201(h)]</a> <li> Protecting the privacy of personally identifying information; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#i">[1201(i)] <li> Security Testing; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#i_1">[1201(j)]</a></ul></blockquote> <p>In addition to these seven exemptions, the Library of Congress is required every three years to exempt the circumvention of measures that prevent the "fair use" of copyrighted works. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#a_B">[1201(a)(1)(B-E)]</a> The DMCA also contains provisions that ensure that the traditional rights of copyright law still apply to the DMCA. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#c">Section 1201(c)(1)</a> provides that the rights, remedies, limitations, or defenses to claims of copyright infringement still apply. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#c_4">Section 1201(c)(4)</a> states that these provisions should not affect the rights to free speech or freedom of the press for activities using electronics, telecommunications, or computing products.</p> </div> </article> <article> <div class="question">How are libraries and archives affected by the anti-circumvention provisions?</div> <div class="answer"><p>The DMCA provides an exemption for nonprofit libraries, archives, and educational institutions to circumvent a system protecting a copyrighted work in order to make a determination of whether or not to acquire the work. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#d">[1201(d)]</a> This exemption limits qualifying institutions from conducting circumvention only to those circumstances where access to such a work is not made available in another medium. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#d_A_2">[1201(d)(2)]</a> In addition, the exemption limits circumvention only to the time it takes the institution to make the decision whether or not to acquire the work. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#d_A">[1201(d)(1)(A)]</a></p> <p>Libraries, educational institutions, and similar organizations are concerned that these technical protection systems and the laws supporting them give too much control to the copyright owner, and threaten the general public's ability to access these works. The ban on the distribution of circumvention devices also means that libraries seeking to use this exemption can’t do so independently but must employ cryptographers to do so - a luxury most libraries can't afford.</p> </div> </article> <article> <div class="question">Are law enforcement activities hindered by the anti-circumvention provisions?</div> <div class="answer"><p>The DMCA permits law enforcement or intelligence agencies to circumvent technological protection systems in order to identify and address the vulnerabilities of government computer systems or networks.</p> </div> </article> <article> <div class="question">Can a technological protection measure be reverse engineered?</div> <div class="answer"><p><a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#f">Section 1201(f)</a> allows software developers to circumvent technological protection measures of a computer program that was lawfully obtained in order to identify the elements necessary to achieve the interoperability of an independently created computer program with other programs. A software developer may reverse engineer the program only if: <ul><li>the elements necessary to achieve interoperability are not readily available and <li>reverse engineering is otherwise permitted under the copyright law.</ul></p> <p>Software engineers are permitted to develop and employ circumvention devices for the purpose of achieving interoperability. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#f_2">[1201(f)(2)]</a> Reverse engineers are exempt from the circumvention device ban only for the purpose of achieving interoperability, and not for gaining access to protected works for infringing purposes. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#f_2">[1201(f)(2)]</a></p> </div> </article> <article> <div class="question">How do the DMCA's anti-circumvention provisions affect encryption researchers?</div> <div class="answer"><p>The encryption research exemption is intended to protect circumvention that advances the state of knowledge in the field of encryption technology or assists in the development of encryption products. Circumvention in encryption research may be allowed, when done in good faith, if the following conditions are met: <ul><li>the researcher lawfully obtained the copyrighted work (ie. this exemption applies only to copy controls, not access controls); <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g_2_A">[1201(g)(2)(A)]</a> <li> circumvention is necessary for the encryption research; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g_2_B">[1201(g)(2)(B)]</a> <li> the researcher tried to obtain authorization from the copyright owner before the circumvention; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g_2_C">[1201(g)(2)(C)]</a> and <li> circumvention is otherwise permissible under the applicable laws. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g_2_C">[1201(g)(2)(D)]</a></ul> <p>In addition to the above factors, the DMCA directs courts to consider three other factors in determining whether or not to apply the exemption in a particular case: <ul><li>whether the discovered information was disseminated, and if so, whether it was disseminated in a manner "reasonably calculated to advance" research or encryption technology development, or in a "manner that facilitates infringement"; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g_3_A">[1201(g)(3)(A)]</a> <li> whether the researcher is engaged in a legitimate course of study, is employed, or is appropriately trained or experienced in the field of encryption technology; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g_3_B">[1201(g)(3)(B)]</a> and <li> whether the researcher notifies the copyright owner in a timely fashion of the findings and documentation of the research. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#g_3_B">[1201(g)(3)(C)]</a></ul> <p>Encryption researchers may develop, employ, and provide to collaborating researchers circumvention devices for the sole purpose of performing acts of good faith encryption research.</p> <p>Leading cryptographers have criticized the exemption for covering too broad a range of activities and vaguely defining the permitted activities of researchers. Most significantly, cryptographers fear that the publication of their research findings may be considered the distribution of circumvention devices. Their vulnerability to being sued for the publication of their research is increased due to the requirement that they report their findings to the copyright owners, most likely before their findings can get published.</p> </div> </article> <article> <div class="question">Can you circumvent technological protection measures in order to protect your privacy?</div> <div class="answer"><p>The exemption for the protection of personally identifying information permits the circumvention of a technological measure that collects personal information, such as the "cookie" feature on a browser. However, the exemption is limited to circumstances in which: <ul><li>there was not adequate notice to the user that the technological measure is used to collect or disseminate personally identifying information; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#i_1_B">[1201(i)(1)(B)]</a> <li> the circumvention has no other effect other than the ability to identify the collection or dissemination of information; <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#i_1_c">[1201(i)(1)(C)]</a> and <li> the act of circumvention is carried out solely for the purpose of identifying such information. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#i_1_c">[1201(i)(1)(D)]</a></ul> <p>The exemption allowing circumvention of personal information gathering technologies, though, is of limited use to the average consumer as a means to protect their privacy since the ban against circumvention devices does not exempt the distribution of privacy protection tools. Individuals must therefore have the expertise to analyze and manipulate computer source code in order to protect their privacy on the Internet if digital protection systems are used in information gathering technologies.</p> </div> </article> <article> <div class="question">How do the anti-circumvention provisions affect security testing?</div> <div class="answer"><p>The DMCA permits circumvention that is conducted in the course of testing security systems if it is otherwise legal under the law. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#i_2_j">[1201(j)]</a> Security testing is defined in the DMCA as "obtaining access, with proper authorization, to a computer, computer system, or computer network for the sole purpose of testing, investigating or correcting a potential or actual security flaw, or vulnerability or processing problem." <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#i_2_j">[1201(j)(1)]</a> In determining whether this exception is applicable, the DMCA requires the court to consider whether the information derived from the security testing was used solely to improve the security measures or whether it was used to facilitate infringement. The DMCA also permits the development, production or distribution of technological means for the sole purpose of circumvention devices for the sole purpose of performing permitted acts of security testing.</p> </div> </article> <article> <div class="question">Do the anti-circumvention provisions affect analog devices?</div> <div class="answer"><p>The DMCA requires analog video cassette recorders to conform to the two forms of copy control technology that are in wide use in the market today - the automatic gain control technology and the colorstripe copy control technology. In addition, the DMCA prohibits the redesigning of video recorders or the use of "black box" devices or "software hacks" to circumvent these copy controls.</p> </div> </article> <article> <div class="question">How is the development of interoperable products affected by the DMCA?</div> <div class="answer"><p>The anti-circumvention provisions may hinder innovation in information technology by limiting the ability of potential competitors to reverse engineer the technological protection system behind which the original manufacturer hides their product. Reverse engineering is a traditional method used by industry to understand how systems work and create interoperable products. While the DMCA has an exception that permits reverse engineering to create interoperable products, as discussed below, it may only permit reverse engineering for interoperability between programs, but not for the purpose of making a program available in other platforms. A strict interpretation of the DMCA may prohibit reverse engineering, regardless of whether or not copyright infringement occurs in the process.</p> </div> </article> <article> <div class="question">How is the general public affected by the DMCA?</div> <div class="answer"><p><p>Conspicuously missing from the exemptions provided for circumvention activities is the average consumer's right to use and explore the products and services they purchase. The only provisions aimed at consumers directly, exempt the circumvention of: a) technologies that collect personal information (the privacy exemption); and, b) technologies used to protect minors from access to certain web sites. These exemptions, like the others, are extremely narrow. For example, the privacy exemption only allows circumvention to defeat the data collection activity of the technical protection measure. If by defeating the data collection element you defeat other aspects of the technical protection measure you</p> </div> </article> <article> <div class="question">What is the Copyright Office Rulemaking exemption in the DMCA?</div> <div class="answer"><p>The act of circumvention provision calls for a review of the prohibition on circumventing access controls every three years. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html">[1201(a)(1)(B)]</a> The rulemaking proceedings conducted by the Copyright Office are supposed to document whether noninfringing uses of particular kinds of copyrighted works are hampered by the prohibition. After the Copyright Office makes its recommendations, the Library of Congress can create "classes of works" that users may access through circumvention without obtaining authorization from the copyright owner. <a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#a_B">[1201(a)(1)(B)]</a></p> <p><p>This amendment is intended to transform the prohibition of circumvention into a form of regulation that monitors developments in the marketplace for circumstances in which certain copyrighted materials become less available to the general public. This regulation system may be ineffective if the Copyright Office's findings also affect the circumvention device ban because of the necessity of using some sort of tool in order to engage in the exempted acts.<p></p> <p><p>The Copyright Office issued the following classes of works as exemptions to the circumvention activity ban at the conclusion of its first rulemaking proceedings: <ol><li>Compilations consisting of lists to websites blocked by filtering software applications; and <li>Literary works, including computer programs and databases, protected by access control mechanisms that fail to permit access because of malfunction, damage, or obsoleteness. <a href="https://www.eff.org/files/filenode/ruling2012.pdf ">Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 37 C.F.R. </a></p> </div> </article> <article> <div class="question">What is a class of works in the DMCA's Copyright Office Rulemaking?</div> <div class="answer"><p>The Copyright Office interpreted a class of works as a subset of the broad categories of works or authorship in copyright law. The categories of authorship referred to include: literary works; musical works; dramatic works; pantomimes and choreographic works; pictorial, graphic, and sculptural works; motion pictures and other audiovisual works; sound recordings; and architectural works. The useful implementation of the Copyright Office's findings based on such categorization does not necessarily correspond to the the digital protection mechanisms developed by the entertainment, electronics, and computer industries. The encryption systems developed may be implemented in the protection of various kinds of works in different types of media.</p> </div> </article> <article> <div class="question">What is the basis for exempting particular "classes of works" from the DMCA?</div> <div class="answer"><p><p>The determination of exempted works must be based on a finding of the "adverse effects" digital protection systems have on users. The criteria that the Copyright Office is directed to consider in evaluating these effects are: <li>the availability for use of copyrighted works; <li>the availability for use of works for nonprofit archival, preservation, and educational purposes; <li>the impact that the prohibition on the circumvention of technological measures applied to copyrighted works has on criticism, comment, news reporting, teaching, scholarship, or research; <li>the effect of circumvention of technological measures on the market for or value of copyrighted works; and <li>such other factors as the Librarian considers appropriate. <a href = "http://www.copyright.gov/title17/92chap12.html#1201"> [1201(a)(1)(C)]</a></p> </div> </article> <article> <div class="question">What is the DMCA's software filtering exemption?</div> <div class="answer"><p>Lists of web sites filtered by software programs, generally designed to restrict Internet users from visiting certain web sites and protect children from inappropriate material, were exempted. The Copyright Office found that the criticism and commentary on the efficacy of such software is impossible without the ability to circumvent those programs. Many of these "blocked sites" are identified in encrypted lists within the software. In order for a party to learn if their site is one of the "blocked sites" it is necessary for these lists to be accessed and searched. The Copyright Office noted that there was no other legitimate way to obtain access to this information other than in digital form.</p> </div> </article> <article> <div class="question">What is the DMCA's malfunction exemption?</div> <div class="answer"><p>Due to the incidences of software and electronics products manufacturers that go bankrupt or do not respond to customer service complaints, it is not a violation of the DMCA to circumvent malfunctioning, damaged or obsolete software programs that use access control mechanisms. The Copyright Office noted that such circumvention is reserved for only those circumstances where an individual sought, but failed to receive assistance from the copyright owner.</p> </div> </article> <article> <div class="question">What is the effect of the anti-circumvention provisions on the traditional defenses to copyright law?</div> <div class="answer"><p><a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#">Section 1201(c)(1)</a> explicitly provides that: "Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use." Substantial question remains over whether or not courts will interpret the traditional defenses to copyright infringement as defenses to the anti-circumvention provisions as well. Recent court decisions have not found the fair use defense to apply to violations of the anti-circumvention provisions of the DMCA. By making the circumvention prohibitions distinct from copyright infringement, defendants can be held liable for circumventing an access control measure even if the uses made of the work are held not to infringe on the rights of the copyright owner. Disengaging the anti-circumvention provisions from the traditional fair use analysis effectively limits use of copyrighted materials to solely what is explicitly permitted by the copyright owner. The concept of fair use remains, but for all practical purposes only those uses sanctioned by the copyright owner are permissible. The anti-circumvention provisions of the DMCA essentially replaces the broad contextual defense of fair use, discussed below, with a narrow set of carve outs to an otherwise absolute right of the copyright owners to control access and use of their works.</p> <p><a href="http://eon.law.harvard.edu/openlaw/DVD/1201.html#">Section 1201(c)(1)</a></p> </div> </article> <article> <div class="question">How does the DMCA affect the public domain?</div> <div class="answer"><p>As more information migrates toward digital storage and distribution, the ability to quote, criticize, and make other "fair uses" of a large amount of our cultural artifacts may be practicably lost.</p> <p>Collections of works that contain only a limited amount of copyrightable subject matter, made up mostly of facts, or that contain other significant public domain materials, are vulnerable to being locked up by copyright owners behind technological protection systems. The protection of these "thin copyrights" behind access control mechanisms gives copyright owners control over works that are not intended to be protected by copyright law.</p> </div> </article> <article> <div class="question">How does the DMCA affect the first sale doctrine?</div> <div class="answer"><p>First Sale is an important protection for the public in copyright law. The first sale doctrine permits individuals who buy products containing copyrighted information to choose whether to sell, share, rent or simply give them away. As more information migrates toward digital storage and distribution, copyright owners prefer licensing, rather than selling, copyrighted material. These licensed products often contain technical protection measures that control access and copying. The concern is that the trends toward digital distribution, licensing, and technical locks, coupled with the prohibitions of the DMCA will undermine the protections for the public found in the first sale doctrine.</p> </div> </article> <article> <div class="question">How is the First Amendment affected by the DMCA?</div> <div class="answer"><p>The tension between the DMCA and the First Amendment is at the heart of several ongoing lawsuits. [Felten v. RIAA; Universal v. Corley] The mere posting of a link to a computer program that can be used to circumvent technical protection measures was held to be a violation of the DMCA. [Universal v. Corley (2nd Circuit Court)] The Recording Industry Association of America used the threat of a DMCA action to silence a professor whose research paper discussed circumvention of a technical protection measure. The professor subsequently mounted a legal challenge to the DMCA on First Amendment grounds and presented his paper. While courts in both of these cases have found in favor of the copyright industries, these cases are being appealed and the state of the law is yet to be determined.</p> </div> </article> <article> <div class="question">What are the penalties for violating the DMCA's anti-circumvention provisions?</div> <div class="answer"><p>The DMCA allows for both civil remedies and criminal penalties for violations under the anti-circumvention provisions. If the violations are determined to be willful and for commercial purposes or private financial gain, the court can order significant fines and/or imprisonment.</p> </div> </article> <article> <div class="question">What are the civil penalties for a DMCA 1201 violation?</div> <div class="answer"><p>Civil cases are brought in federal district court where the court has broad authority to grant injunctive and monetary relief. Injunctions can be granted forbidding the distribution of the tools or products involved in the violation. The court may also order the destruction of the tools or products involved in the violation. The court can also award actual damages, profits gained through infringement, and attorney's fees. If an individual held in violation of the DMCA commits another such violation within the three-year period following the judgment, the court may increase the damages up to triple the amount that would otherwise be awarded.</p> <p>In circumstances involving innocent violators, it is up to the courts to decide whether to reduce damages. But, in the case of nonprofit library, archives or educational institutions, the court must remit damages if it finds that the institution did not know of the violation.</p> </div> </article> <article> <div class="question">What are the criminal penalties for a DMCA 1201 violation?</div> <div class="answer"><p>If the circumvention violations are determined to be willful and for commercial or private financial gain, first time offenders may be fined up to $500,000, imprisoned for five years, or both. For repeat offenders, the maximum penalty increases to a fine of $1,000,000, imprisonment for up to ten years, or both. Criminal penalties are not applicable to nonprofit libraries, archives, and educational institutions.</p> </div> </article> <article> <div class="question">Does publishing serial numbers, license numbers, CD-keys, etc., constitute an infringement of the anticircumvention provisions?</div> <div class="answer"><p>[not yet answered]</p> </div> </article> </div> </section> </div> </section> <footer class="main"> <div class="nav-wrapper"> <div class="nav-item"> <span><img height="16" style="vertical-align: middle;" src="/assets/Cc.logo.circle-e5300412c8b02cb8ba4db0b20bafbc078b7661cb21b155c36253170b61b7f736.svg" /> 2017 Lumen</span> </div> <div class="flex-end"> <nav> <span class="nav-item"><a href="/pages/legal">Legal</a></span> <span class="nav-item"><a href="/pages/license">Licenses</a></span> <span class="nav-item"><a href="/pages/privacy">Privacy</a></span> <span class="nav-item"><a href="/pages/researchers">Researchers</a></span> <span class="nav-item"><a href="/pages/blog-archive">Blog Archive</a></span> <span class="nav-item"><a href="/pages/lumen-research-sprint">Spring '22 Research Sprint</a></span> <span class="nav-item"><a href="/users/sign_in">Sign In</a></span> </nav> </div> </div> </footer> <script src="/assets/application-8680dd11e43ce5255b4a75a3635a812dd463a91fb238b70e600fa9b3f5fbe5ea.js"></script> <!-- Piwik --> <script type="text/javascript"> var _paq = _paq || []; /* tracker methods like "setCustomDimension" should be called before "trackPageView" */ _paq.push(["setDomains", ["flutie.law.harvard.edu","*.www.chillingeffects.org","*.chillingeffects.org","*.lumendatabase.org","*.www.lumendatabase.org"]]); _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="//stats.berkman.harvard.edu/"; _paq.push(['setTrackerUrl', u+'piwik.php']); _paq.push(['setSiteId', '3']); })(); </script> <script src="/assets/piwik-3baf1baf98198bf4189c7074b479642a1f7078e67dabdc9b045b463a4e655f59.js" defer="defer" async="async"></script> <!-- End Piwik Code --> </body> </html>