Background
Article 11 of WIPO Copyright Treaty "Obligations concerning Technological Measures" requires contracting parties to"...provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law."Article 12 of WIPO Copyright Treaty "Obligations concerning Rights Management Information" requires contracting parties to
"...provide adequate and effective legal remedies against any person knowingly performing any of the following acts knowing, or with respect to civil remedies having reasonable grounds to know, that it will induce, enable, facilitate or conceal an infringement of any right covered by this Treaty or theBerne Convention The Berne Convention for the Protection of Literary and Artistic Works, usually known as the Berne Convention, was an international assembly held in 1886 in the Swiss city of Bern by ten European countries with the goal to agree on a set of leg ...: (i) to remove or alter any electronic rights management information without permission; (ii) to distribute, import for distribution, broadcast or communicate to the public, without authority, works or copies of works knowing that electronic rights management information has been removed or altered without authority."
Law by region
European Union
The following anti-circumventing rules were implemented in European Directive 2001/29/EC of the European Parliament and of the council of on the harmonisation of certain aspects of copyright and related rights in the information society. This directive states in article 6, 'Obligations as to technological measures': # Member States shall provide adequate legal protection against the circumvention of any effective technological measures, which the person concerned carries out in the knowledge, or with reasonable grounds to know, that he or she is pursuing that objective. # Member States shall provide adequate legal protection against the manufacture, import, distribution, sale, rental, advertisement for sale or rental, or possession for commercial purposes of devices, products or components or the provision of services which: #*(a) are promoted, advertised or marketed for the purpose of circumvention of, or #*(b) have only a limited commercially significant purpose or use other than to circumvent, or #*(c) are primarily designed, produced, adapted or performed for the purpose of enabling or facilitating the circumvention of, any effective technological measures. # For the purposes of this Directive, the expression 'technological measures' means any technology, device or component that, in the normal course of its operation, is designed to prevent or restrict acts, in respect of works or other subject matter, which are not authorised by the rights holder of any copyright or any right related to copyright as provided for by law or the ''United States
In the United States, the ''Circumvention of Access Controls
Section 103No person shall circumvent a technological measure that effectively controls access to a work protected undeThe Act defines what it means in Section 1201(a)(3):
this title
(3) As used in this subsection— (A) to "circumvent a technological measure" means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and (B) a technological measure "effectively controls access to a work" if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.Thus, if there is some "technological measure that effectively controls access to a work", it is illegal to circumvent that measure. However
Distribution of Circumvention Tools
The Act also prohibits the distribution of tools that enable a user to circumvent access controls or controls that protect a right of the copyright holder.Access Controls
17 U.S.C. Sec. 1201 (a)(2)(2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that— (A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title; (B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or (C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title.
Rights Controls
Distribution of tools intended to circumvent controls that protect a right of the copyright holder is also prohibited(1) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that— (A) is primarily designed or produced for the purpose of circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof; (B) has only limited commercially significant purpose or use other than to circumvent protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof; or (C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof.A rights control is defined i
a technological measure "effectively protects a right of a copyright owner under this title" if the measure, in the ordinary course of its operation, prevents, restricts, or otherwise limits the exercise of a right of a copyright owner under this title.Unlike access controls, the DMCA does not ban the circumvention of rights controls. It was thought that traditional copyright law was sufficient to protect the interests of copyright holders in cases of individual acts of circumvention.
Other Rights
The Act states that its provisions are not intended to modify a number of already existing rights(c) Other Rights, Etc., Not Affected.— (1) Nothing in this section shall affect rights, remedies, limitations, or defenses tocopyright infringement Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ..., including fair use, under this title. (2) Nothing in this section shall enlarge or diminish vicarious or contributory liability for copyright infringement in connection with any technology, product, service, device, component, or part thereof. (3) Nothing in this section shall require that the design of, or design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological measure, so long as such part or component, or the product in which such part or component is integrated, does not otherwise fall within the prohibitions of subsection (a)(2) or (b)(1). (4) Nothing in this section shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products.
Fair Use and Circumvention
Critics of the DMCA have often noted the absence of an explicit exception for circumvention to enableReverse Engineering and Circumvention
Sec. 103(f) of the(f) Reverse Engineering.— (1) Notwithstanding the provisions of subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not constitute infringement under this title. (2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ technological means to circumvent a technological measure, or to circumvent protection afforded by a technological measure, in order to enable the identification and analysis under paragraph (1), or for the purpose of enabling interoperability of an independently created computer program with other programs, if such means are necessary to achieve such interoperability, to the extent that doing so does not constitute infringement under this title. (3) The information acquired through the acts permitted under paragraph (1), and the means permitted under paragraph (2), may be made available to others if the person referred to in paragraph (1) or (2), as the case may be, provides such information or means solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement under this title or violate applicable law other than this section. (4) For purposes of this subsection, the term "interoperability" means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged.
Notable cases
* ''Criticism
TheAustralia
Australia prohibits circumvention of "access control technical protection measures" in Section 116 of the Copyright Act. The law currently imposes penalties for circumvention of such measures as well as the manufacturing and distribution of tools to enable it. DRM may be legally circumvented under a few distinct circumstances which are named as exceptions in the law: #permission of the rightsholder #enabling interoperability with copyrighted software #encryption research #security testing #disabling access to private information (circumvention only) #national security or law enforcement #library acquisition decisions (circumvention only) #acts prescribed by regulation (circumvention only) A person circumventing the access control bears the burden of proof that one of these exceptions apply. Penalties for violation of the anti-circumvention laws include anNotable cases
* Stevens v. Sony, holding that a device allowingReferences
External links