Digital Millennium Copyright Act Of 1998
   HOME

TheInfoList



OR:

The Digital Millennium Copyright Act (DMCA) is a 1998 United States
copyright A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, education ...
law Law is a set of rules that are created and are enforceable by social or governmental institutions to regulate behavior,Robertson, ''Crimes against humanity'', 90. with its precise definition a matter of longstanding debate. It has been vario ...
that implements two 1996 treaties of the
World Intellectual Property Organization The World Intellectual Property Organization (WIPO; french: link=no, Organisation mondiale de la propriété intellectuelle (OMPI)) is one of the list of specialized agencies of the United Nations, 15 specialized agencies of the United Nation ...
(WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to
copyright A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, education ...
ed works (commonly known as
digital rights management Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) such as access control technologies can restrict the use of proprietary hardware and copyrighted works. ...
or DRM). It also criminalizes the act of circumventing an
access control In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. Passed on October 12, 1998, by a unanimous vote in the
United States Senate The United States Senate is the upper chamber of the United States Congress, with the House of Representatives being the lower chamber. Together they compose the national bicameral legislature of the United States. The composition and pow ...
and signed into law by President
Bill Clinton William Jefferson Clinton ( né Blythe III; born August 19, 1946) is an American politician who served as the 42nd president of the United States from 1993 to 2001. He previously served as governor of Arkansas from 1979 to 1981 and agai ...
on October 28, 1998, the DMCA amended
Title 17 of the United States Code In the United States Code, Title 17 outlines its copyright law. It was codified into positive law on July 30, 1947. The latest version is from December 2016. * —Subject Matter and Scope of Copyright * —Copyright Ownership and Transfer * — ...
to extend the reach of copyright, while limiting the liability of the providers of online services for copyright infringement by their users. The DMCA's principal innovation in the field of copyright is the exemption from direct and
indirect liability Indirect liability refers to legal liability imposed on an entity which is facilitating an infringement of another's rights, particularly of intellectual property rights, but not accruing benefit (or loss) from the infringement. Indirect liability ...
of
Internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
s and other intermediaries. This exemption was adopted by the
European Union The European Union (EU) is a supranational political and economic union of member states that are located primarily in Europe. The union has a total area of and an estimated total population of about 447million. The EU has often been des ...
in the
Electronic Commerce Directive 2000 The e-Commerce Directive, adopted in 2000, sets up an Internal Market framework for online services. Its aim is to remove obstacles to cross-border online services in the EU internal market and provide legal certainty for businesses and consumer ...
. The
Information Society Directive The Information Society Directive (familiarly when first proposed, the Copyright Directive) is a directive of the European Union that was enacted to implement the WIPO Copyright Treaty and to harmonise aspects of copyright law across Europe, ...
2001 implemented the 1996
WIPO Copyright Treaty The World Intellectual Property Organization Copyright Treaty (WIPO Copyright Treaty or WCT) is an international treaty on copyright law adopted by the member states of the World Intellectual Property Organization (WIPO) in 1996. It provides addi ...
in the EU.


Background and legislative history

The Digital Millennium Copyright Act (DMCA) had its basis as part of the United States' commitment to comply with two treaties passed by the
World Intellectual Property Organization The World Intellectual Property Organization (WIPO; french: link=no, Organisation mondiale de la propriété intellectuelle (OMPI)) is one of the list of specialized agencies of the United Nations, 15 specialized agencies of the United Nation ...
(WIPO) in December 1996 that dealt with the nature of copyright with modern information systems such as the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. The
WIPO Copyright Treaty The World Intellectual Property Organization Copyright Treaty (WIPO Copyright Treaty or WCT) is an international treaty on copyright law adopted by the member states of the World Intellectual Property Organization (WIPO) in 1996. It provides addi ...
identified numerous electronic works as eligible for copyright protection, and stated that circumvention of technological measures used to secure electronic works was to be prohibited. The
WIPO Performances and Phonograms Treaty The WIPO Performances and Phonograms Treaty (or WPPT) is an international treaty signed by the member states of the World Intellectual Property Organization and was adopted in Geneva on 20 December 1996. It came into effect on 20 May 2002. As of ...
worked to normalize the copyright protections for performed works as uniformly for member states as possible. The process of ratifying the treaties for the United States was the first major piece of copyright-related legislation since the
Copyright Act of 1976 The Copyright Act of 1976 is a United States copyright law and remains the primary basis of copyright law in the United States, as amended by several later enacted copyright provisions. The Act spells out the basic rights of copyright holders, cod ...
, and led to numerous interested groups to express concerns for how the treaties should be implemented, including content producers and distributors, technology manufacturers, online service providers, researchers and academics, and consumer groups. Some groups urged for stronger copyright enforcement while others sought more relaxing of rules. As the bill was being formed in the Commerce Committee in the House of Representatives, the committee recognized that the final bill would be far more encompassing than just copyright reform but would be establishing key principles in the digital commerce marketplace. In evaluating the enforcement of the WIPO Copyright Treaty with its anti-circumvention provisions with U.S. copyright law, lawmakers recognized that traditionally copyright law did not generally account for the medium of the work, as it was generally impossible to make an exact copy of an analog work previously, and current law was only concerned with unlawful acts of copyright violations. Since digital technology could allow for infinite numbers of exact copies of works to be made, the lawmakers agreed they had to extend copyright to include limits on devices and services which could be used for anti-circumvention in addition to acts of anti-circumvention. In establishing this, the lawmakers also recognized this would have a negative impact on
fair use Fair use is a doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to balance the interests ...
without exceptions, with electronic works potentially falling into the public domain but still locked beyond anti-circumvention measures, but they also needed to balance the rights of copyright holders. The DMCA as passed contained some basic fair use allowance such as for limited
reverse engineering Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompli ...
and for security research. Lawmakers opted to create a
rulemaking In administrative law, rulemaking is the process that executive and independent agencies use to create, or ''promulgate'', regulations. In general, legislatures first set broad policy mandates by passing statutes, then agencies create more deta ...
mechanism through the
United States Copyright Office The United States Copyright Office (USCO), a part of the Library of Congress, is a United States government body that maintains records of copyright registration, including a copyright catalog. It is used by copyright title searchers who are ...
to review the state of copyrights and fair use to make limited classes of allowance for fair use which would be considered lawful means of using anti-circumvention technology.


Provisions


Title I: WIPO Copyright and Performances and Phonograms Treaties Implementation Act

DMCA Title I, the
WIPO Copyright and Performances and Phonograms Treaties Implementation Act The WIPO Copyright and Performances and Phonograms Treaties Implementation Act, is a part of the Digital Millennium Copyright Act (DMCA), a 1998 U.S. law. It has two major portions, Section 102, which implements the requirements of the WIPO Copyri ...
, amends U.S. copyright law to comply with the
WIPO Copyright Treaty The World Intellectual Property Organization Copyright Treaty (WIPO Copyright Treaty or WCT) is an international treaty on copyright law adopted by the member states of the World Intellectual Property Organization (WIPO) in 1996. It provides addi ...
and the
WIPO Performances and Phonograms Treaty The WIPO Performances and Phonograms Treaty (or WPPT) is an international treaty signed by the member states of the World Intellectual Property Organization and was adopted in Geneva on 20 December 1996. It came into effect on 20 May 2002. As of ...
, adopted at the WIPO Diplomatic Conference in December 1996. The treaties have two major portions. One portion includes works covered by several treaties in U.S. copy prevention laws and gave the title its name. For further analysis of this portion of the Act and of cases under it, see
WIPO Copyright and Performances and Phonograms Treaties Implementation Act The WIPO Copyright and Performances and Phonograms Treaties Implementation Act, is a part of the Digital Millennium Copyright Act (DMCA), a 1998 U.S. law. It has two major portions, Section 102, which implements the requirements of the WIPO Copyri ...
. The second portion (17 U.S.C. 1201) is often known as the DMCA
anti-circumvention Anti-circumvention refers to laws which prohibit the circumvention of technological barriers for using a digital good in certain ways which the rightsholders do not wish to allow. The requirement for anti-circumvention laws was globalized in 1996 ...
provisions. These provisions changed the remedies for the circumvention of copy-prevention systems (also called "technical protection measures"). The section contains a number of specific limitations and exemptions, for such things as government research and
reverse engineering Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompli ...
in specified situations. Although section 1201(c) of the title stated that the section does not change the underlying substantive copyright infringement rights, remedies, or defenses, it did not make those defenses available in circumvention actions. The section does not include a
fair use Fair use is a doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to balance the interests ...
exemption from criminality nor a
scienter In law, (Law Latin for "knowingly", ) is a legal term for intent or knowledge of wrongdoing. An offending party then has knowledge of the "wrongness" of an act or event prior to committing it. For example, if a man sells a car with brakes that ...
requirement, so criminal liability could attach to even unintended circumvention for legitimate purposes.


Title II: Online Copyright Infringement Liability Limitation Act

DMCA Title II, the
Online Copyright Infringement Liability Limitation Act The Online Copyright Infringement Liability Limitation Act (OCILLA) is United States federal law that creates a conditional 'safe harbor' for online service providers (OSP) (a group which includes internet service providers (ISP) and other Inter ...
("OCILLA"), creates a safe harbor for
online service provider An online service provider (OSP) can, for example, be an Internet service provider, an email provider, a news provider (press), an entertainment provider (music, movies), a search engine, an e-commerce site, an online banking site, a health site, ...
s (OSPs, including
ISPs An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
) against copyright infringement liability, provided they meet specific requirements. OSPs must adhere to and qualify for certain prescribed safe harbor guidelines and promptly block access to alleged infringing material (or remove such material from their systems) when they receive notification of an infringement claim from a copyright holder or the copyright holder's agent (a "notice and takedown" process). OCILLA also includes a counternotification provision that offers OSPs a safe harbor from liability to their users when users claim that the material in question is not, in fact, infringing. OCILLA also facilitates issuing of
subpoena A subpoena (; also subpœna, supenna or subpena) or witness summons is a writ issued by a government agency, most often a court, to compel testimony by a witness or production of evidence under a penalty for failure. There are two common types of ...
s against OSPs to provide their users' identity.


Title III: Computer Maintenance Competition Assurance Act

DMCA Title III modifie
section 117
of the copyright title so that those repairing computers could make certain temporary, limited copies while working on a computer. It reversed the precedent set in ''
MAI Systems Corp. v. Peak Computer, Inc. ''MAI Systems Corp. v. Peak Computer, Inc.'', 991 F.2d 511 (9th Cir. 1993), was a case heard by the United States Court of Appeals for the Ninth Circuit which addressed the issue of whether the loading of software programs into random-access memo ...
'', 991 F.2d 511 (9th Cor. 1993).


Title IV: Miscellaneous Provisions

DMCA Title IV contains an assortment of provisions: * Clarified and added to the duties of the
Copyright Office The United States Copyright Office (USCO), a part of the Library of Congress, is a United States government body that maintains records of copyright registration, including a copyright catalog. It is used by copyright title searchers who are ...
. * Added ephemeral copy for broadcasters provisions, including certain
statutory license A compulsory license provides that the owner of a patent or copyright licenses the use of their rights against payment either set by law or determined through some form of adjudication or arbitration. In essence, under a compulsory license, an ...
s. * Added provisions to facilitate
distance education Distance education, also known as distance learning, is the education of students who may not always be physically present at a school, or where the learner and the teacher are separated in both time and distance. Traditionally, this usually in ...
. * Added provisions to assist libraries with keeping phonorecords of sound recordings. * Added provisions relating to collective bargaining and the transfer of movie rights.


Title V: Vessel Hull Design Protection Act

DMCA Title V added section
1301
throug

to add a ''
sui generis ''Sui generis'' ( , ) is a Latin phrase that means "of its/their own kind", "in a class by itself", therefore "unique". A number of disciplines use the term to refer to unique entities. These include: * Biology, for species that do not fit in ...
'' protection for boat hull designs. Boat hull designs were not considered covered under copyright law because boats are useful articles whose form cannot be separated from their function as determined by the Supreme Court case '' Bonito Boats, Inc. v. Thunder Craft Boats, Inc.''.


Anti-circumvention exemptions

In addition to the safe harbors and exemptions the statute explicitly provides
17 U.S.C. 1201(a)(1)
requires that the
Librarian of Congress The Librarian of Congress is the head of the Library of Congress, appointed by the president of the United States with the advice and consent of the United States Senate, for a term of ten years. In addition to overseeing the library, the Libra ...
issue exemptions from the prohibition against circumvention of access-control technology. Exemptions are granted when it is shown that access-control technology has had a substantial adverse effect on the ability of people to make non-infringing uses of copyrighted works. The exemption rules are revised every three years. Exemption proposals are submitted by the public to the Registrar of Copyrights, and after a process of hearings and public comments, the final rule is recommended by the Registrar and issued by the Librarian. Exemptions expire after three years and must be resubmitted for the next rulemaking cycle.


Previous exemptions

The Copyright Office approved two exemptions in 2000, four in 2003, six each in 2006 and 2010, five in 2012, and nine in 2015. ; 2000 rulemaking In 2000, the first rulemaking, the Office exempted: * "Compilations consisting of lists of websites blocked by filtering software applications" (renewed in 2003 but not renewed in 2006); and * "Literary works, including computer programs and databases, protected by access control mechanisms that fail to permit access because of malfunction, damage, or obsoleteness." (revised and limited in 2003 and again in 2006). ;2003 rulemaking In 2003, the Office made the following rules: * The 2000 filtering exemption was revised and renewed. * The 2000 "literary works including computer programs" exemption was limited to "Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete" and this exemption was renewed in both 2006 and 2010. * A new exemption was implemented for
electronic books An ebook (short for electronic book), also known as an e-book or eBook, is a book publication made available in digital form, consisting of text, images, or both, readable on the flat-panel display of computers or other electronic devices. Alth ...
for which technological protection measures prevented the use of read-aloud software or screen readers. This exemption was renewed in 2006, 2010, 2012, and 2015. * A new exemption was made for "Computer programs and video games distributed in formats that have become obsolete and which require the original media or hardware as a condition of access." This exemption was renewed in 2006 but not in 2010. ;2006 rulemaking In 2006, the Office made the following rules: * The 2003 exemption on obsolete computer programs and video games was renewed. * The 2003 exemption on computer programs protected by dongles was renewed. * The 2003 exemption on electronic books was renewed. * A new exemption was made for sound recordings allowed after security flaws were found in a copy protection system on some
Sony , commonly stylized as SONY, is a Japanese multinational conglomerate corporation headquartered in Minato, Tokyo, Japan. As a major technology company, it operates as one of the world's largest manufacturers of consumer and professional ...
CDs; this was not renewed in 2010. * A new exemption was implemented covering the audiovisual works included in the educational library of a college or university's film or media studies department; this was not renewed in 2010. * A new exemption was implemented allowing circumvention to allow wireless telephone handsets to connect to wireless networks. This exemption was revised in 2010 to specify used handsets and require authorization from the wireless network operator. Another exemption for wireless handsets was introduced in 2010 specific to interoperability software on the phone itself. ; 2010 rulemaking Rulemaking was scheduled to occur in 2009, but the final rule was not issued until the following year. The 2010 exemptions, issued in July 2010, are: * Motion pictures on
DVD The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any kind ...
s that are lawfully made and acquired and that are protected by the
Content Scrambling System The Content Scramble System (CSS) is a digital rights management (DRM) and encryption system employed on many commercially produced DVD-Video discs. CSS utilizes a proprietary 40-bit stream cipher algorithm. The system was introduced around ...
when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances: ** Educational uses by college and university professors and by college and university film and media studies students; ** Documentary filmmaking; ** Obsolete software and video game formats. ** Noncommercial videos. (A new exemption in 2010, similar to a previous educational exemption.) * Computer programs that enable
wireless telephone Wireless telephone may refer to: * Cordless telephone, a telephone in which the handset is portable and communicates with the body of the phone by radio, instead of being attached by a cord * Mobile phone, a portable telephone that can make and rec ...
handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset. (A new exemption in 2010.) * Computer programs, in the form of
firmware In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network. (Revised from a similar exemption approved in 2006.) * Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if: ** The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and ** The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law. (A new exemption in 2010.) * Computer programs protected by
dongle A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality. In computing, the term was initially synonym ...
s that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace. (A renewed exemption from 2006, based on a similar exemption approved in 2003.) * Literary works distributed in
e-book An ebook (short for electronic book), also known as an e-book or eBook, is a book publication made available in digital form, consisting of text, images, or both, readable on the flat-panel display of computers or other electronic devices. Alt ...
format when all existing e-book editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book's read-aloud function or of
screen reader A screen reader is a form of assistive technology (AT) that renders text and image content as speech or braille output. Screen readers are essential to people who are blindness, blind, and are useful to people who are visual impairment, visually ...
s that render the text into a specialized format. (A renewed exemption from 2006, based on a similar exemption approved in 2003.) ; 2012 rulemaking The 2012 exemptions, issued in November 2012, are for: * Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies * Computer programs that enable smartphones and portable all-purpose mobile computing devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device * Computer programs that enable certain types of wireless devices to connect to a wireless telecommunications network, when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network * Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in limited instances * Motion pictures and other audiovisual works on DVDs that are protected by the Content Scrambling System, or that are distributed by an online service and protected by technological measures that control access to such works, where circumvention is related to developing captioning and descriptive audio technologies ; 2015 rulemaking The 2015 exemptions, issued in October 2015, are for: * Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in limited instances, * Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies, * Computer programs that enable the following types of wireless devices to connect to a wireless telecommunications network, when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network, * Computer programs that enable smartphones, tablets, and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device, * Computer programs that are contained in and control the functioning of a motorized land vehicle such as a personal automobile, commercial motor vehicle, or mechanized agricultural vehicle, except for computer programs primarily designed for the control of telematics or entertainment systems for such vehicle, when circumvention is a necessary step undertaken by the authorized owner of the vehicle to allow the diagnosis, repair or lawful modification of a vehicle function, * Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates solely for the purpose of good-faith security research and does not violate any applicable law, * Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay, * Computer programs that operate 3D printers that employ microchip-reliant technological measures to limit the use of feedstock, when circumvention is accomplished solely for the purpose of using alternative feedstock and not for the purpose of accessing design software, design files or proprietary data, and * Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, where such circumvention is undertaken by a patient for the sole purpose of lawfully accessing the data generated by his or her own device or monitoring system. ; 2018 rulemaking The 2018 exemptions, issued in October 2018, are for: * Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment, for supervised educational purposes, or to accommodate for
accessibility Accessibility is the design of products, devices, services, vehicles, or environments so as to be usable by people with disabilities. The concept of accessible design and practice of accessible development ensures both "direct access" (i. ...
for disabled students in educational institutions; * Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies; * Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, for the sole purpose of lawfully accessing the data on one's own device; * Computer programs that enable wireless devices to connect to a wireless telecommunications network when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network; * Computer programs that enable smartphones, tablets and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device; * Computer programs that enable smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smart television; * Computer programs that enable voice assistant devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the device; * Computer programs that are contained in and control the functioning of a motorized land vehicle such as a personal automobile, commercial motor vehicle, or mechanized agricultural vehicle, except for computer programs primarily designed for the control of telematics or entertainment systems for such vehicle, when circumvention is a necessary step undertaken by the authorized owner of the vehicle to allow the diagnosis, repair or lawful modification of a vehicle function; * Computer programs that are contained in and control the functioning of a lawfully acquired smartphone or home appliance or home system when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device or system; * Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates solely for the purpose of good-faith security research and does not violate any applicable law, * Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay; * Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, that do not require access to an external computer server for gameplay, and that are no longer reasonably available in the commercial marketplace, solely for the purpose of preservation of the game in a playable form by an eligible library, archives, or museum; * Computer programs used to operate video game consoles solely to the extent necessary for an eligible library, archives, or museum to engage in the preservation activities for the video game exceptions above; * Computer programs, except video games, that have been lawfully acquired and that are no longer reasonably available in the commercial marketplace, solely for the purpose of lawful preservation of a computer program, or of digital materials dependent upon a computer program as a condition of access, by an eligible library, archives, or museum; and * Computer programs that operate 3D printers that employ microchip-reliant technological measures to limit the use of feedstock, when circumvention is accomplished solely for the purpose of using alternative feedstock and not for the purpose of accessing design software, design files, or proprietary data. ; 2021 rulemaking The 2021 exemptions, issued in October 2021, are for: * Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment, for supervised educational purposes, to accommodate for
accessibility Accessibility is the design of products, devices, services, vehicles, or environments so as to be usable by people with disabilities. The concept of accessible design and practice of accessible development ensures both "direct access" (i. ...
for disabled students in educational institutions, for preservation of the motion picture by a library, archive, or museum, or for research purposes at educational institutions; * Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies, or for research purposes at educational institutions; * Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, for the sole purpose of lawfully accessing the data on one's own device; * Computer programs that enable wireless devices to connect to a wireless telecommunications network when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network; * Computer programs that enable smartphones, tablets, and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device; * Computer programs that enable smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smart television; * Computer programs that enable voice assistant devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the device; * Computer programs that enable routers and dedicated network devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the router or dedicated network device, and is not accomplished for the purpose of gaining unauthorized access to other copyrighted works; * Computer programs that are contained in and control the functioning of a lawfully acquired motorized land vehicle or marine vessel such as a personal automobile or boat, commercial vehicle or vessel, or mechanized agricultural vehicle or vessel, except for programs accessed through a separate subscription service, when circumvention is a necessary step to allow the diagnosis, repair, or lawful modification of a vehicle or vessel function, where such circumvention is not accomplished for the purpose of gaining unauthorized access to other copyrighted works; * Computer programs that are contained in and control the functioning of a lawfully acquired device that is primarily designed for use by consumers, when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device, and is not accomplished for the purpose of gaining access to other copyrighted works; * Computer programs that are contained in and control the functioning of a lawfully acquired medical device or system, and related data files, when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device or system. * Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates, or is undertaken on a computer, computer system, or computer network on which the computer program operates with the authorization of the owner or operator of such computer, computer system, or computer network, solely for the purpose of good-faith security research. * Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay; * Computer programs, except video games, that have been lawfully acquired and that are no longer reasonably available in the commercial marketplace, solely for the purpose of lawful preservation of a computer program, or of digital materials dependent upon a computer program as a condition of access, by an eligible library, archives, or museum, where such activities are carried out without any purpose of direct or indirect commercial advantage. * Computer programs that operate 3D printers that employ technological measures to limit the use of material, when circumvention is accomplished solely for the purpose of using alternative material and not for the purpose of accessing design software, design files, or proprietary data; * Computer programs, solely for the purpose of investigating a potential infringement of free and open source computer programs; * Video games in the form of computer programs, embodied in lawfully acquired physical or downloaded formats, and operated on a general-purpose computer, where circumvention is undertaken solely for the purpose of allowing an individual with a physical disability to use software or hardware input methods other than a standard keyboard or mouse.


2015 Study

After much criticism (see
below Below may refer to: *Earth *Ground (disambiguation) *Soil *Floor *Bottom (disambiguation) Bottom may refer to: Anatomy and sex * Bottom (BDSM), the partner in a BDSM who takes the passive, receiving, or obedient role, to that of the top or ...
), on December 29, 2015, the Copyright Office initiated a study to assess the operation of section 1201 and the triennial rulemaking process. This is different from usual public comments on exemption proposals. It includes the role of the anti-trafficking provisions and permanent exemptions, and the requirements of the rulemaking itself. The Office has issued a Notice of Inquiry requesting public comment. Several comments were posted by individuals and organizations. An individual recalls that the
Copyright Clause The Copyright Clause (also known as the Intellectual Property Clause, Copyright and Patent Clause, or the Progress Clause) describes an enumerated power listed in the United States Constitution ( Article I, Section 8, Clause 8). The clause, wh ...
has limitations.
Association of American Publishers The Association of American Publishers (AAP) is the national trade association of the American book publishing industry. AAP lobbies for book, journal, and education publishers in the United States. AAP members include most of the major commercia ...
''et al.'' hold there is no need to amend the statute or to significantly alter the rulemaking. They are happy with the protection they are being granted, including anti-trafficking provisions, and talk of placing the cart before the horse, when they argue about requiring a proof of the mindset that consumers would have when utilizing circumvention tools before actual acts of circumvention occur. In their opinion, the meaning of Section 1201 is to ''extend'', not merely duplicate, copyright holder's rights.
Society of American Archivists The Society of American Archivists is the oldest and largest archivist association in North America, serving the educational and informational needs of more than 5,000 individual archivist and institutional members. Established in 1936, the organi ...
say they are not aware that the anti-trafficking provisions of section 1201(a)(2) and 1201(b) have had any impact in deterring copyright infringement. They do know, however, that the provisions have created an absurd, Catch-22 situation for any archives that sought to adhere to the letter of the law. iFixit also talks of Catch-22 on stressing that since it is up to proponents to show that an exemption is relevant, they need to show that there's overwhelming market demand ''if only it were legal''.
Rapid7 The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7. It ...
notice that DMCA adversely affects good faith security research by forbidding researchers from circumventing technological protection measures (TPMs) to analyze software for vulnerabilities. Cyberlaw Clinic at
Harvard Law School Harvard Law School (Harvard Law or HLS) is the law school of Harvard University, a private research university in Cambridge, Massachusetts. Founded in 1817, it is the oldest continuously operating law school in the United States. Each class ...
points out that the rulemaking is a complicated, ''ad hoc'', and unduly burdensome process. Professors
Andrea M. Matwyshyn Andrea M. Matwyshyn is a United States law professor and engineering professor at The Pennsylvania State University. She is known as a scholar of technology policy, particularly as an expert at the intersection of law and computer security and fo ...
,
Steven M. Bellovin Steven M. Bellovin is a researcher on computer networking and computer security, security. He has been a professor in the Computer Science department at Columbia University since 2005. Previously, Bellovin was a Fellow at AT&T Labs Research in Flo ...
,
Matt Blaze Matt may refer to: *Matt (name), people with the given name ''Matt'' or Matthew, meaning "gift from God", or the surname Matt *In British English, of a surface: having a non-glossy finish, see gloss (material appearance) *Matt, Switzerland, a mu ...
,
J. Alex Halderman J. Alex Halderman (born January 1981) is professor of Computer Science and Engineering at the University of Michigan, where he is also director of the Center for Computer Security & Society. Halderman's research focuses on computer security a ...
, and
Nadia Heninger Nadia Heninger (born 1982) is an American cryptographer, computer security expert, and computational number theorist at the University of California, San Diego. Contributions Heninger is known for her work on freezing powered-down security devic ...
, jointly advocated making the security research exemption granted in the 2015 Triennial Section 1201 Rulemaking permanent. The Learning Disabilities Association of America (LDA) commented that circumventing DRM restrictions to meet accessibility needs deserves a permanent exception.
Entertainment Software Association The Entertainment Software Association (ESA) is the trade association of the video game industry in the United States. It was formed in April 1994 as the Interactive Digital Software Association (IDSA) and renamed on July 21, 2003. It is based in ...
gives a vivid and detailed description of a flourishing market which is only possible because of DMCA. They are deeply concerned about people with disabilities, but that concern is already being taken care of by the copyright holders, so that no permanent exception is needed. Comments have also been submitted by, among others,
R Street Institute The R Street Institute is an American non-partisan, center-right think tank headquartered in Washington, D.C. The Institute's stated mission is to "engage in policy research and outreach to promote free markets and limited, effective government." ...
American Association of Law Libraries The American Association of Law Libraries "is a nonprofit educational organization with over 5,000 members nationwide. AALL's mission is to promote and enhance the value of law libraries to the legal and public communities, to foster the professi ...
,
Business Software Alliance The Software Alliance, also known as BSA, is a trade group established by Microsoft in 1988 to represent commercial software makers. It is a member of the International Intellectual Property Alliance. Its principal activity is trying to stop copyr ...
,
Alliance of Automobile Manufacturers The Auto Alliance (AAM) is a defunct trade group of automobile manufacturers that operated in the United States. It was the leading advocacy group for the auto industry, representing 77% of all car and light truck sales in the United States. The ...
,
Association of American Universities The Association of American Universities (AAU) is an organization of American research universities devoted to maintaining a strong system of academic research and education. Founded in 1900, it consists of 63 universities in the United States ( ...
''et al.'',
Copyright Alliance The Copyright Alliance is a nonprofit, nonpartisan 501(c)(4) organization representing artistic creators across a broad range of copyright disciplines. The Copyright Alliance's institutional members include more than sixty trade organizations, a ...
,
Association for Computing Machinery The Association for Computing Machinery (ACM) is a US-based international learned society for computing. It was founded in 1947 and is the world's largest scientific and educational computing society. The ACM is a non-profit professional member ...
U.S. Public Policy Council, the
Software and Information Industry Association The Software and Information Industry Association (SIIA) is a trade association dedicated to the entertainment, consumer and business software industries. Established in 1984 as the Software Publishers Association (SPA), the SIIA took its new na ...
, DVD Copy Control Association ("DVD CCA") ''et al.'',
Microsoft Corporation Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
,
Association for Competitive Technology Introduction ACT , The App Association is a trade association with membership including small to mid-sized technology companies and application software developers around the world. The App Association represents entrepreneurs, innovators, and in ...
,
Public Knowledge Public Knowledge is a non-profit Washington, D.C.-based public interest group. Founded in 2001 by David Bollier and Gigi Sohn, Public Knowledge is primarily involved in the fields of intellectual property law, competition and choice in the digita ...
,
American Automobile Association American Automobile Association (AAA – commonly pronounced as "Triple A") is a federation of motor clubs throughout North America. AAA is a privately held not-for-profit national member association and service organization with over 60 m ...
. In June 2017, the Copyright Office published a report where it "shares the concern" that Section 1201 can affect activities unrelated to copyright infringement, but also expressed concerns over weakening "the right of copyright owners to exercise meaningful control over the terms of access to their works online", which they believe is "essential to the development of the digital marketplace for creative content". However, with respect to the question of whether the security research exemption granted in the 2015 Triennial cycle should be made permanent in some form, the Office recommended “that Congress consider expanding the reach of this exemption, easing the strict authorization requirement for researchers and restrictions on the use of information generated from the research, and abandoning or clarifying the multifactor test,” stating that “it continues to believe that the exemption adopted in 2015 can be a useful starting point, and notes that most of the security researchers who petitioned for that exemption .. agree.”


Case law


Anti-circumvention

The anti-circumvention provisions in Section 1201 of the DMCA have seen some challenges in the courts but which have generally been upheld. While initially the challenges were focused on clear applications to software-based access control products, some cases considered how the DMCA also extended to hardware-based access controls.


Software-based case law

''
Universal City Studios, Inc. v. Reimerdes ''Universal City Studios, Inc. v. Corley'' (originally known as ''Universal City Studios, Inc. v. Reimerdes'')'','' 273 F.3d 429 (2nd Cir., 2001), was a court ruling at the United States Court of Appeals for the Second Circuit.''Universal City S ...
/Universal City Studios, Inc. v. Corley'' - Eight movie studios had sued
Eric Corley Eric Gordon Corley (born December 16, 1959), also frequently referred to by his pen name of Emmanuel Goldstein, is a figure in the hacker community. He directs the non-profit organization 2600 Enterprises, Inc., publishes a magazine called '' 2600 ...
, Shawn Reimerdes, and Roman Kazan, editors of '' 2600: The Hacker Quarterly'', for posting the code of
DeCSS DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, open source operating systems (such as Berkeley Software Distribution, BSD and Linux) could n ...
, an algorithm to bypass the
Content Scramble System The Content Scramble System (CSS) is a digital rights management (DRM) and encryption system employed on many commercially produced DVD-Video discs. CSS utilizes a proprietary 40-bit stream cipher algorithm. The system was introduced around 1996 ...
(CSS) used to encrypt
DVD The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any kind ...
content. The studios argued this was an anti-circumvention device under the DMCA. While Reimerdes and Kazan entered into consent decrees and were dropped from the suit, Corley continued the case, arguing that DeCSS as computer code was protected as free speech, and that this was one of the allowed provisions of fair use under the DMCA for users to make copies of media they legally owned. Both the District Court and the
Second Circuit The United States Court of Appeals for the Second Circuit (in case citations, 2d Cir.) is one of the thirteen United States Courts of Appeals. Its territory comprises the states of Connecticut, New York and Vermont. The court has appellate jur ...
rejected Corley's arguments. While they agreed that while a computer program may be protected speech, distribution of anti-circumvention devices was not considered a fair use option covered by Section 1201, and thus DeCSS violated the DMCA and was not protected by First Amendment rights. ''
United States v. Elcom Ltd. ''United States v. ElcomSoft and Dmitry Sklyarov'' was a 2001–2002 criminal case in which Dmitry Sklyarov and his employer ElcomSoft were charged with alleged violation of the DMCA. The case raised some concerns of civil rights and legal proces ...
'' - Moscow-based Elcom had developed software that was able to remove protections that one could place on an
Adobe Acrobat Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage Portable Document Format (PDF) files. The family comprises Acrobat Reader (formerly Reader), Acrobat (forme ...
PDF file, such as those used in
ebook An ebook (short for electronic book), also known as an e-book or eBook, is a book publication made available in digital form, consisting of text, images, or both, readable on the flat-panel display of computers or other electronic devices. Alt ...
distribution. Adobe requested the U.S. Department of Justice take action against the company for violating the DMCA. Elcom argued in court that as written, the DMCA was unconstitutionally too vague and would allow for circumvention of use controls for purposes of fair use, and that it violated the First Amendment by placed too much burden on those seeking to use protected works for fair use. The initial ruling at the U.S. District Court for the Northern District of California rejected both arguments, following on the basis of ''Corley''. The ruling established that the DMCA was not unconstitutional, and that while it place a burden on accessing works for fair use, the DMCA did not outright restrict fair use; in the case of the ebook example, the ruling observed that the user may have to type a quote from the ebook rather than copy and paste from the unprotected version. '' 321 Studios v. Metro Goldwyn Mayer Studios, Inc.'' - 321 Studios made copies that allowed users to copy DVDs, including those with CSS copy protection, to another DVD or to a CD-ROM. The company sought
declaratory judgment A declaratory judgment, also called a declaration, is the legal determination of a court that resolves legal uncertainty for the litigants. It is a form of legally binding preventive by which a party involved in an actual or possible legal mat ...
from MGM Studios that their software did not violate the DMCA, or sought to have the DMCA ruled unconstitutional. The case, heard in the United States District Court for the Northern District of California, ruled against 321 Studios on both arguments, based on the past rulings from ''Corley'' and ''Elcom'' that 321 Studios' software was not protected speech and violated the DMCA with no respect to fair use, and that the questions on the constitutionality of the DMCA were answered from the prior cases. The case law from ''Corley'', ''Elcom'' and ''321 Studios'' effectively established that the DMCA could not be challenged as an unconstitutional law.


Durable goods case law

''
Chamberlain Group, Inc. v. Skylink Technologies, Inc. ''The Chamberlain Group, Inc. v. Skylink Technologies, Inc.'', 381 F.3d 1178 (Fed. Cir. 2004)''The Chamberlain Group, Inc. v. Skylink Technologies, Inc.'' (Fed. Cir. 2004). is a legal case heard by the United States Court of Appeals for the Feder ...
'' - Chamberlain manufactured garage door openers, while Skylink created universal garage door openers remotes that worked with a variety of manufacturers. Chamberlain had developed a security protocol for its remotes to match the remote to the door opening motor via a software-based
rolling code A rolling code (or sometimes called a hopping code) is used in keyless entry systems to prevent replay attacks, where an eavesdropper records the transmission and replays it at a later time to cause the receiver to 'unlock'. Such systems are typi ...
as to prevent unauthorized opening. Skylink had been able to use a resynchronization feature of the Chamberlain security software as to create a universal remote to work with the Chamberlain openers. Chamberlain sued Skylink as it argued the rolling code was effective an access control device and thus Skylink violated the DMCA. Both the
United States District Court for the Northern District of Illinois The United States District Court for the Northern District of Illinois (in case citations, N.D. Ill.) is the federal trial-level court with jurisdiction over the northern counties of Illinois. Appeals from the Northern District of Illinois ar ...
and the
United States Court of Appeals for the Federal Circuit The United States Court of Appeals for the Federal Circuit (in case citations, Fed. Cir. or C.A.F.C.) is a United States court of appeals that has special appellate jurisdiction over certain types of specialized cases in the Federal judiciary of ...
ruled in favor of Skylink that there was no DMCA violation. The courts ruled the DMCA did not create a new property right, and thus consumers that owned Chamberlain's product had a right to circumvent any restrictions, since this was typical practice on the market and customers, in purchasing a Chamberlain garage door opener, did not sign off to any
end user license agreement An end-user license agreement or EULA () is a legal contract between a software supplier and a customer or end-user, generally made available to the customer via a retailer acting as an intermediary. A EULA specifies in detail the rights and restr ...
to waive away those rights. '' Lexmark International, Inc. v. Static Control Components, Inc.'' - Lexmark had developed a lock-out mechanism for its ink-jet printers that would require only its own ink cartridges to be used as replacements. The mechanism used an access program from the printer side that would then query a chip on the ink cartridge, and only accept that cartridge if it matched the expected response. Static Control Components had been able to reverse engineer the proper response by reading the program from the printer and were able to make their own third-party ink cartridges that worked with Lexmark printers. Lexmark sued under the DMCA and while they had won at the District Court, the case was reversed by the
United States Court of Appeals for the Sixth Circuit The United States Court of Appeals for the Sixth Circuit (in case citations, 6th Cir.) is a federal court with appellate jurisdiction over the district courts in the following districts: * Eastern District of Kentucky * Western District of ...
. The Sixth Circuit affirmed that while Lexmark's programs to manage the lockout were copyrightable and thus would be eligible for protections under the DMCA, they had failed to include an anti-circumvention device that "effectively controls access" to the printer lockout program.


Linking to infringing content

The law is currently unsettled with regard to websites that contain links to infringing material; however, there have been a few lower-court decisions which have ruled against linking in some narrowly prescribed circumstances. One is when the owner of a website has already been issued an injunction against posting infringing material on their website and then links to the same material in an attempt to circumvent the injunction. Another area involves linking to software or devices which are designed to circumvent (
digital rights management Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) such as access control technologies can restrict the use of proprietary hardware and copyrighted works. ...
) devices, or links from websites whose sole purpose is to circumvent copyright protection by linking to copyrighted material.


''Edelman v. N2H2''

In July 2002,
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
filed a lawsuit on the behalf of Benjamin Edelman, a computer researcher at Berkman Center for Internet and Society, seeking a
declaratory judgment A declaratory judgment, also called a declaration, is the legal determination of a court that resolves legal uncertainty for the litigants. It is a form of legally binding preventive by which a party involved in an actual or possible legal mat ...
to affirm his first amendment rights when reverse engineering the censorware product of defendant N2H2 in case he intended to publish the finding. N2H2 filed a motion to dismiss, which the court granted on the basis that Edelman had not finished reverse engneeering, and the court did not make advisory opinions.


''RealNetworks, Inc. v. DVD Copy Control Association, Inc.''

In August 2009, the
DVD Copy Control Association The DVD Copy Control Association (DVD CCA) is an organization primarily responsible for the copy protection of DVDs. The Content Scramble System (CSS) was devised for this purpose to make copyright infringement difficult, but also presents obstacles ...
won a lawsuit against
RealNetworks RealNetworks, Inc. is a provider of artificial intelligence and computer vision based products. RealNetworks was a pioneer in Internet streaming software and services. They are based in Seattle, Washington, United States. The company also p ...
for violating copyright law in selling its RealDVD software, allowing users to copy DVDs and store them on a harddrive. The DVD Copy Control Association claimed that Real violated the DMCA by circumventing anti-piracy measures ARccOS Protection and RipGuard, as well as breaking Real's licensing agreement with the Content Scrambling System.


''Viacom Inc. v. YouTube, Google Inc.''

On March 13, 2007,
Viacom Viacom, an abbreviation of Video and Audio Communications, may refer to: * Viacom (1952–2006), a former American media conglomerate * Viacom (2005–2019), a former company spun off from the original Viacom * Viacom18, a joint venture between Par ...
filed a lawsuit against
YouTube YouTube is a global online video platform, online video sharing and social media, social media platform headquartered in San Bruno, California. It was launched on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim. It is owned by ...
and its corporate parent
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
for copyright infringement seeking more than $1 billion in damages. The complaint was filed in the U.S. District Court for the Southern District of New York. Viacom claims the popular video-sharing site was engaging in "massive intentional copyright infringement" for making available a contended 160,000 unauthorized clips of Viacom's entertainment programming. Google relied on the 1998 Digital Millennium Copyright Act's "safe harbor" provision to shield them from liability. On June 23, 2010, U.S. District Judge Louis Stanton granted summary judgment in favor of YouTube. The court held that YouTube is protected by the safe harbor of the DMCA. Viacom appealed to the U.S. Court of Appeals for the Second Circuit. On April 5, 2012, the federal Second Circuit Court of Appeals vacated Judge Louis Stanton's ruling, and instead ruled that Viacom had presented enough evidence against YouTube to warrant a trial, and the case should not have been thrown out in summary judgment. The court did uphold the ruling that YouTube could not be held liable based on "general knowledge" that users on its site were infringing copyright. The case was sent back to the District Court in New York, and on April 18, 2013, Judge Stanton issued another order granting summary judgment in favor of YouTube. Before it was send back to the Court of Appeals, a settlement was reached; no money changed hands.


''IO Group, Inc. v. Veoh Networks, Inc.''

On June 23, 2006, IO Group, Inc. filed a complaint against Veoh Networks, Inc. in the U.S. District Court for California's Northern District. IO Group alleged that Veoh was responsible for copyright infringement by allowing videos owned by IO Group to be accessed through Veoh's online service without permission over 40,000 times between the dates June 1 and June 22. Veoh is a Flash video site relying on user contributed content. IO Group argued that since Veoh
transcode Transcoding is the direct digital-to-digital conversion of one encoding to another, such as for video data files, audio files (e.g., MP3, WAV), or character encoding (e.g., UTF-8, ISO/IEC 8859). This is usually done in cases where a target devic ...
d user uploaded videos to Flash format it became a direct infringer and the materials were under their direct control, thereby disqualifying them for DMCA safe harbor protection. The ruling judge disagreed with the argument, stating that
Veoh has simply established a system whereby software automatically processes user-submitted content and recasts it in a format that is readily accessible to its users. Veoh preselects the software parameters for the process from a range of default values set by the thirdparty software... But Veoh does not itself actively participate or supervise the uploading of files. Nor does it preview or select the files before the upload is completed. Instead, video files are uploaded through an automated process which is initiated entirely at the volition of Veoh's users.
The Court has granted the Veoh's motion for
summary judgment In law, a summary judgment (also judgment as a matter of law or summary disposition) is a judgment entered by a court A court is any person or institution, often as a government institution, with the authority to adjudicate legal disputes ...
, on the basis of the DMCA, holding that the defendant's video-sharing web site complied and was entitled to the protection of the statute's "safe harbor" provision. Even though Veoh won the court case, it blamed the litigation as one of the causes of its preparing to file Chapter 7 bankruptcy and its subsequent sale to Qlipso.


''Vernor v. Autodesk, Inc.''

After numerous
DMCA takedown notice The Online Copyright Infringement Liability Limitation Act (OCILLA) is United States federal law that creates a conditional 'safe harbor' for online service providers (OSP) (a group which includes internet service providers (ISP) and other Inter ...
s in response to his eBay listings, Timothy S. Vernor sued Autodesk in August 2007, alleging that Autodesk abused the DMCA and disrupted his right to sell used software he bought at a garage sale. In May 2008, a federal district judge in Washington State Autodesk's authorised that the software's license agreement preempted the seller from his rights under the
first-sale doctrine The first-sale doctrine (also sometimes referred to as the "right of first sale" or the "first sale rule") is an American legal concept that limits the rights of an intellectual property owner to control resale of products embodying its intellec ...
. In September 2010, the U.S. Court of Appeals for the Ninth Circuit reversed, holding that "a software user is a licensee rather than an owner of a copy where the copyright owner (1) specifies that the user is granted a license; (2) significantly authorised the user's ability to transfer the software; and (3) imposes notable use authorisations."


''Lenz v. Universal Music Corp.''

In 2007, Stephanie Lenz, a writer and editor from
Gallitzin, Pennsylvania Gallitzin is a borough in Cambria County, Pennsylvania, in the United States. It is bordered by Gallitzin Township and Tunnelhill, all of which sit astride the Eastern continental divide. Tunnel Hill and Gallitzin both are pierced by railroad t ...
made a home video of her 13-month-old son dancing to the
Prince A prince is a male ruler (ranked below a king, grand prince, and grand duke) or a male member of a monarch's or former monarch's family. ''Prince'' is also a title of nobility (often highest), often hereditary, in some European states. Th ...
song "
Let's Go Crazy "Let's Go Crazy" is a 1984 song by Prince and The Revolution, from the album '' Purple Rain''. It was the opening track on both the album and the film '' Purple Rain''. "Let's Go Crazy" was one of Prince's most popular songs, and was a staple f ...
" and posted a 29-second video on the video-sharing site
YouTube YouTube is a global online video platform, online video sharing and social media, social media platform headquartered in San Bruno, California. It was launched on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim. It is owned by ...
. Four months after the video was originally uploaded,
Universal Music Group Universal Music Group N.V. (often abbreviated as UMG and referred to as just Universal Music) is a Dutch– American multinational music corporation under Dutch law. UMG's corporate headquarters are located in Hilversum, Netherlands and its ...
, which owned the copyrights to the song, ordered YouTube to remove the video enforcing the Digital Millennium Copyright Act. Lenz notified YouTube immediately that her video was within the scope of fair use, and demanded that it be restored. YouTube complied after six weeks—not two weeks, as required by the Digital Millennium Copyright Act—to see whether Universal planned to sue Lenz for infringement. Lenz then sued Universal Music in California for her legal costs, claiming the music company had acted in bad faith by ordering removal of a video that represented fair use of the song. In August 2008, U.S. District Judge
Jeremy Fogel Jeremy Don Fogel (born September 17, 1949)San Jose, California San Jose, officially San José (; ; ), is a major city in the U.S. state of California that is the cultural, financial, and political center of Silicon Valley and largest city in Northern California by both population and area. With a 2020 popul ...
ruled that copyright holders cannot order a deletion of an online file without determining whether that posting reflected "fair use" of the copyrighted material. On February 25, 2010, Judge Fogel issued a ruling rejecting several of Universal's affirmative defenses, including the defense that Lenz suffered no damages. In 2015, the court ultimately upheld the finding that Universal was liable under 17 USC 512(f) (the DMCA's bad faith notice and takedown provision) for failing to consider fair use before sending its initial takedown notice.


''Flava Works Inc. v. Gunter''

In the case of Flava Works Inc. v. Gunter the court denied the defendant safe harbor protection under DMCA . The district court found that the defendant had knowledge of its users' infringing activity and also failed to prevent future infringing activity. As such the plaintiff's motion for preliminary injunction was granted. On appeal, however, the Seventh Circuit vacated the injunction, citing the standard set in
eBay Inc. v. MercExchange, L.L.C. ''eBay Inc. v. MercExchange, L.L.C.'', 547 U.S. 388 (2006), is a case in which the Supreme Court of the United States unanimously determined that an injunction should not be automatically issued based on a finding of patent infringement, but al ...
, which states that courts should not rely on categorical rules as a standard for injunction.


''Ouellette v. Viacom International Inc.''

In this case of Ouellette v. Viacom International Inc., the court denied plaintiff's attempt to find liability for YouTube and Myspace's takedowns of the plaintiff's homemade videos. Despite potential fair use claims, the court found it impossible to use the DMCA takedown provisions as a foundation for liability. The court found that the safe harbor provision serves "to limit the liability of internet service providers, not to create liability that could not otherwise be imposed under existing law independent of the DMCA."


''Sony v. George Hotz''

In January 2011,
Sony Computer Entertainment Sony Interactive Entertainment (SIE), formerly known as Sony Computer Entertainment (SCE), is a multinational video game and digital entertainment company wholly owned by multinational conglomerate Sony. The SIE Group is made up of two legal co ...
sued
George Hotz George Francis Hotz (born October 2, 1989), alias geohot, is an American security hacker, entrepreneur, and software engineer. He is known for developing iOS jailbreaks, reverse engineering the PlayStation 3, and for the subsequent lawsuit br ...
over violating the Section 1201 of the Digital Millennium Copyright Act as well as the Federal Fraud and Abuse Act due to facilitating consumers to jailbreak their
PlayStation 3 The PlayStation 3 (PS3) is a home video game console developed by Sony Interactive Entertainment, Sony Computer Entertainment. The successor to the PlayStation 2, it is part of the PlayStation brand of consoles. It was first released on Novemb ...
consoles. Hotz argued that because he had purchased the product, he had the right to do with it as he pleased. After three months, Sony and Hotz decided to settle out of court. This also included an injunction against George Hotz, barring him from hacking any more Sony products.


''Automattic, Inc. and Oliver Hotham v. Nick Steiner''

In 2013, Oliver Hotham wrote an article on
WordPress WordPress (WP or WordPress.org) is a free and open-source content management system (CMS) written in hypertext preprocessor language and paired with a MySQL or MariaDB database with supported HTTPS. Features include a plugin architecture ...
(owned by Automattic, Inc.) critical of Straight Pride UK that included material from a press release sent to him by Straight Pride UK's press officer, Nick Steiner. Steiner sent WordPress a DMCA takedown notice claiming that Hotham's article infringed their copyright. WordPress and Hotham sued in a federal District Court in California, under §512(f) of the DMCA, claiming that the takedown notice was fraudulent, and that the takedown cost the plaintiffs time, lost work and attorneys' fees. In 2015, the court issued a
default judgment Default judgment is a binding judgment in favor of either party based on some failure to take action by the other party. Most often, it is a judgment in favor of a plaintiff when the defendant has not responded to a summons or has failed to appear ...
in favor of WordPress and Hotham in the amount of $25,084.


Criticisms


Abuse of takedown notice

Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
asserted misuse of the DMCA in a filing concerning New Zealand's copyright act, quoting results from a 2005 study by California academics
Laura Quilter Laura Quilter (born 1968) is a writer, lawyer, librarian, professor, and science fiction fan known for both her work on intellectual property and new media, and her long-standing archive of information on feminist science fiction. She received ...
and Jennifer Urban based on data from the
Chilling Effects Lumen, formerly Chilling Effects, is an American collaborative archive created by Wendy Seltzer and founded along with several law school clinics and the Electronic Frontier Foundation to protect lawful online activity from legal threats. L ...
clearinghouse. Takedown notices targeting a competing business made up over half (57%) of the notices Google has received, the company said, and more than one-third (37%) "were not valid copyright claims." Currently, there are three main abuses of the DMCA. First, fair use has been a legal gray area, and subject to opposing interpretations. This has caused inequity in the treatment of individual cases. Second, the DMCA has often been invoked overbearingly, favoring larger copyright holders over smaller ones. This has caused accidental takedowns of legitimate content, such as a record company accidentally removing a music video from their own artist. Third, the lack of consequences for perjury in claims encourages censorship. This has caused temporary takedowns of legitimate content that can be financially damaging to the legitimate copyright holder, who has no recourse for reimbursement. This has been used by businesses to censor competition. The use of DMCA-enabled takedown notices has been raised for a number of services that allow users to provide content. Early concerns were focused on
peer-to-peer file sharing Peer-to-peer file sharing is the distribution and sharing of digital media using peer-to-peer (P2P) networking technology. P2P file sharing allows users to access media files such as books, music, movies, and games using a P2P software program tha ...
services such as BitTorrent. Such services grew after
Napster Napster was a peer-to-peer file sharing application. It originally launched on June 1, 1999, with an emphasis on digital audio file distribution. Audio songs shared on the service were typically encoded in the MP3 format. It was founded by Shawn ...
was sued by several music industry groups in '' A&M Records, Inc. v. Napster, Inc.'' (2001) which ruled that Napster was liable for enabling copyright infringement under the DMCA since they maintained central servers that tracked file sharing; by switching to the peer-to-peer model, these new services avoided this possible legality. However, some still saw legal challenges, such as '' MGM Studios, Inc. v. Grokster, Ltd.'' (2005) based on the fact they were operated commercially and promoted the ability to share copyrighted works. Non-commercial and open-source peer-to-peer services were able to survive from these case laws, leading entertainment groups to deploy software on the services to track downloads, and subsequently attempted to serve takedown notices and sue users on the services for copyright violations under the DMCA since around 2003. However, many of these methods were imprecise, leading to a number of false accusations at users.


Abuse of the anti-circumvention provision

In 2015
Volkswagen Volkswagen (),English: , . abbreviated as VW (), is a German Automotive industry, motor vehicle manufacturer headquartered in Wolfsburg, Lower Saxony, Germany. Founded in 1937 by the German Labour Front under the Nazi Party and revived into a ...
abused the DMCA to hide their vehicles' emissions cheat. It has been suggested that had the DMCA not prevented access to the software "..a researcher with legal access to Volkswagen's software could have discovered the code that changed how the cars behave in testing.."


Effect on analog video equipment

Analog Copy Protection (ACP), the encryption technology created by
Rovi Corporation TiVo Corporation, formerly known as the Rovi Corporation and Macrovision Solutions Corporation, was an American technology company. Headquartered in San Jose, California, the company is primarily involved in licensing its intellectual property ...
(formerly Macrovision, now TiVo), is designed to thwart users' attempts to reproduce content via analog cables. When a DVD is played through an analog video cable and recorded using a
VCR A videocassette recorder (VCR) or video recorder is an electromechanical device that records analog audio and analog video from broadcast television or other source on a removable, magnetic tape videocassette, and can play back the recording. ...
, Rovi's ACP technology will distort the copy partially or completely. The technology works by adding additional lines to the video signal. In the
NTSC The first American standard for analog television broadcast was developed by National Television System Committee (NTSC)National Television System Committee (1951–1953), Report and Reports of Panel No. 11, 11-A, 12–19, with Some supplement ...
video standard, blank lines (
vertical blanking interval In a raster scan display, the vertical blanking interval (VBI), also known as the vertical interval or VBLANK, is the time between the end of the final visible line of a frame or field and the beginning of the first visible line of the next fram ...
s) that the user cannot see are used for functions like closed captioning. Rovi Corporation uses these blank lines to implement its ACP technology. The implementation of ACP has been ill-regarded by some video enthusiasts. Many claim that the technology has led to signal issues with VCRs and analog video equipment. Some VCRs misread the encryption used to prevent copying, distorting the video image regardless of whether the recording is original or a copy. The DMCA has been criticized for forcing all producers of analog video equipment to support the proprietary copy protection technology of Rovi Corporation, a commercial firm. The producers of video equipment are forced by law to support and implement the corporation's proprietary technology. This benefits Rovi Corporation financially, whereas those forced to implement it receive neither profit nor compensation. Additionally, some criticize the implementation of ACP as a violation of their
fair use Fair use is a doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to balance the interests ...
rights. A recently developed TV-streaming product called the
Slingbox The Slingbox was a TV streaming media device made by Sling Media that encoded local video for transmission over the Internet to a remote device (sometimes called placeshifting). It allowed users to remotely view and control their cable, satel ...
uses analog signals to convey video from television to a mobile device. However, the encryption used by ACP blocks analog transmission, rendering the Slingbox unusable. Additionally ACP blocks the use of recording for educational purposes. On one or more accounts, students have not been able to cite and record cable sources properly due to ACP restrictions.


Effect on research

The DMCA has affected the worldwide
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
research community, since an argument can be made that any cryptanalytic research violates, or might violate, the DMCA. The arrest of Russian programmer Dmitry Sklyarov in 2001, for alleged infringement of the DMCA, was a highly publicized example of the law's use to prevent or penalize development of anti-DRM measures. While working for ElcomSoft in Russia, he developed ''The Advanced eBook Processor'', a software application allowing users to strip usage restriction information from restricted
e-book An ebook (short for electronic book), also known as an e-book or eBook, is a book publication made available in digital form, consisting of text, images, or both, readable on the flat-panel display of computers or other electronic devices. Alt ...
s, an activity legal in both Russia and the United States. Paradoxically, under the DMCA, it is not legal in the United States to provide such a tool. Sklyarov was arrested in the United States after presenting a speech at
DEF CON DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyer ...
and subsequently spent nearly a month in jail. The DMCA has also been cited as chilling to legitimate users, such as students of
cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic sec ...
(including, in a well-known instance, Professor
Edward Felten Edward William Felten (born March 25, 1963) is the Robert E. Kahn Professor of Computer Science and Public Affairs at Princeton University, where he was also the Director of the Center for Information Technology Policy from 2007 to 2015 and fr ...
and students at
Princeton Princeton University is a private research university in Princeton, New Jersey. Founded in 1746 in Elizabeth as the College of New Jersey, Princeton is the fourth-oldest institution of higher education in the United States and one of the ni ...
), and security consultants such as Niels Ferguson, who has declined to publish information about vulnerabilities he discovered in an
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 seri ...
secure-computing scheme because of his concern about being arrested under the DMCA when he travels to the U.S.


Effect on innovation and competition

In at least one court case, the DMCA has been used by
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
software projects to defend against conversion of software (i.e., license violations) that involved removal of copyright notices. Jonathan Bailey of ''Plagiarism Today'' argued that the DMCA has left
Kindle Direct Publishing Kindle Direct Publishing is Amazon.com's e-book publishing platform launched in November 2007, concurrently with the first Amazon Kindle device. Originally called Digital Text Platform, the platform allows authors and publishers to publish their b ...
(an
Amazon Amazon most often refers to: * Amazons, a tribe of female warriors in Greek mythology * Amazon rainforest, a rainforest covering most of the Amazon basin * Amazon River, in South America * Amazon (company), an American multinational technology c ...
subsidiary) with no incentive to find new innovations for vetting submitted books for
plagiarism Plagiarism is the fraudulent representation of another person's language, thoughts, ideas, or expressions as one's own original work.From the 1995 '' Random House Compact Unabridged Dictionary'': use or close imitation of the language and thought ...
or copyright theft before allowing them to be published. According to Bailey, "Amazon doesn’t do much to vet the books it publishes. Plagiarism isn’t even mentioned in its KDP help files. What this means is that it’s trivial to publish almost anything you want regardless of the quality of the work or, in these cases, how original it is. In fact, many complain that Amazon fails to vet works for even simple issues such as formatting and layout. Though Amazon will, sometimes, remove works that violates their terms of service after they get complaints, they’re happy to sell the books and reap the profits until they get such a notice. And, from Amazon’s perspective, this is completely legal. They are protected by the Digital Millennium Copyright Act (DMCA) as well as other laws, in particular Section 230 of the Communications Decency Act, that basically mean they are under no obligation to vet or check the works they publish. They are legally free to produce and sell books, physical and digital, regardless of whether they are plagiarized, copyright infringing or otherwise illegal."


Legislative reform

There have been several Congressional efforts to modify the Act. The Unlocking Technology Act of 2013 was introduced to attempt to exempt non-infringing uses from the anti-circumvention clause. However, the bill was not passed by Congress. In 2014, the
Unlocking Consumer Choice and Wireless Competition Act The Unlocking Consumer Choice and Wireless Competition Act (; ) is a United States public law that repeals a rulemaking determination by the United States Copyright Office that left it illegal for people to unlock their cellphones. The bill pa ...
was passed, granting a specific exemption for unlocking cell phones, without affecting the other provisions of the DMCA. Bills in 2015 included the Unlocking Technology Act of 2015, and the Breaking Down Barriers to Innovation Act of 2015. Republicans are considering legislation as well, as it becomes clear that Section 1201 is impeding the country's security. Facing escalating numbers of cyberthreats, cybersecurity researchers petitioned to conduct research to keep pace with evolving cybersecurity risks and vulnerabilities, stating: "Without such an exemption, security risks will lie unaddressed and the public will be substantially less safe." The bills are intended to address the fact that section 1201 prevents circumvention even when doing so is not copyright infringement. In addition, the section requires exemption proponents to bear the burden of proof every time their exemption comes up for triennial review, instead of there being a presumption of renewal for an exemption whose importance was previously proven.
Rick Boucher Frederick Carlyle Boucher (; born August 1, 1946) is an American politician who was the U.S. representative for from 1983 to 2011. He is a member of the Democratic Party. He was defeated in his bid for a 15th term by Republican Morgan Griffit ...
, a congressman from Virginia, led previous efforts by introducing the
Digital Media Consumers' Rights Act The Digital Media Consumers' Rights Act (DMCRA) was a proposed law in the United States that directly challenges portions of the Digital Millennium Copyright Act, and would intensify Federal Trade Commission efforts to mandate proper labeling for ...
(DMCRA). A prominent bill related to the DMCA is the
Consumer Broadband and Digital Television Promotion Act The Consumer Broadband and Digital Television Promotion Act or CBDTPA, () was a United States bill proposed in 2002 that would have prohibited any kind of technology that could be used to read digital content without digital rights management (DRM) ...
(CBDTPA), known in early drafts as the Security Systems and Standards Certification Act (SSSCA). This bill, if it had passed, would have dealt with the devices used to access digital content and would have been even more restrictive than the DMCA. Senator
Thom Tillis Thomas Roland Tillis (born August 30, 1960) is an American politician serving as the junior United States senator from North Carolina since 2015. A Republican, he was elected to the North Carolina House of Representatives in 2006, and began servi ...
introduced a draft revision of the DMCA in December 2020. A fundamental change in his language would be to support " notice and stay down" for service providers, requiring them to take measures to prevent material that has already been determined to be violating copyright to be re-uploaded by users. While the draft was praised by the entertainment industry, free speech advocacy groups feared the language would require services to employ automatic filtering and would further limit freedom of expression.


Opposition

On the fifth anniversary of the DMCA, and several times afterwards, the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
documented harmful consequences of the anti-circumvention provisions. They document that the DMCA: # Stifles free expression, such as in its use against Russian programmer Dmitry Sklyarov, Princeton Professor
Edward Felten Edward William Felten (born March 25, 1963) is the Robert E. Kahn Professor of Computer Science and Public Affairs at Princeton University, where he was also the Director of the Center for Information Technology Policy from 2007 to 2015 and fr ...
, and journalists; # Jeopardizes
fair use Fair use is a doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to balance the interests ...
; # Impedes competition, such as blocking aftermarket competition in toner cartridges, garage door openers, and enforcing
walled gardens A walled garden is a garden enclosed by high walls, especially when this is done for horticultural rather than security purposes, although originally all gardens may have been enclosed for protection from animal or human intruders. In temperate c ...
around the
iPod The iPod is a discontinued series of portable media players and multi-purpose mobile devices designed and marketed by Apple Inc. The first version was released on October 23, 2001, about months after the Macintosh version of iTunes ...
; and # Interferes with computer intrusion laws. In July 2016, the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
sued the US government in ''
Green v. Department of Justice ''Green v. Department of Justice'' is a pending lawsuit at the United States District Court for the District of Columbia filed to test the constitutionality of the anti-circumvention provisions enacted in the 1998 Digital Millennium Copyright Act ...
'' alleging that Section 1201 violates the
First Amendment First or 1st is the ordinal form of the number one (#1). First or 1st may also refer to: *World record, specifically the first instance of a particular achievement Arts and media Music * 1$T, American rapper, singer-songwriter, DJ, and rec ...
.EFF sues US government to void 'onerous' copyright rules
/ref>


See also

;Proposed international law *
Anti-Counterfeiting Trade Agreement The Anti-Counterfeiting Trade Agreement (ACTA) is a plurilateral agreement, multilateral treaty for the purpose of establishing international standards for intellectual property rights enforcement that did not enter into force. The agreement aims t ...
;DMCA anti-circumvention cases * '' 321 Studios v. Metro Goldwyn Mayer Studios, Inc.'' * '' Chamberlain v. Skylink'' * ''
Facebook, Inc. v. Power Ventures, Inc. ''Facebook, Inc. v. Power Ventures, Inc.'' is a lawsuit brought by Facebook in the United States District Court for the Northern District of California alleging that Power Ventures Inc., a third-party platform, collected user information from F ...
'' * ''
Lexmark Int'l v. Static Control Components ''Lexmark International, Inc. v. Static Control Components, Inc.'', is an American legal case involving the computer printer company Lexmark, which had designed an authentication system using a microcontroller so that only authorized toner cartr ...
'' * '' Murphy v. Millennium Radio Group LLC'' * Dmitry Sklyarov in ''
United States v. ElcomSoft and Sklyarov ''United States v. ElcomSoft and Dmitry Sklyarov'' was a 2001–2002 criminal case in which Dmitry Sklyarov and his employer ElcomSoft were charged with alleged violation of the DMCA. The case raised some concerns of civil rights and legal proces ...
'' * ''
Universal v. Reimerdes ''Universal City Studios, Inc. v. Corley'' (originally known as ''Universal City Studios, Inc. v. Reimerdes'')'','' 273 F.3d 429 (2nd Cir., 2001), was a court ruling at the United States Court of Appeals for the Second Circuit.''Universal City S ...
'' ;DMCA notice-and-takedown issues *
Online Copyright Infringement Liability Limitation Act The Online Copyright Infringement Liability Limitation Act (OCILLA) is United States federal law that creates a conditional 'safe harbor' for online service providers (OSP) (a group which includes internet service providers (ISP) and other Inter ...
(OCILLA) (more information about the DMCA 512 takedown provisions) * Lumen (clearinghouse for DMCA takedowns) * ''
Lenz v. Universal Music Corp. ''Lenz v. Universal Music Corp.'', 801 F.3d 1126 (9th Cir. 2015), is a decision by the United States Court of Appeals for the Ninth Circuit, holding that copyright owners must consider fair use defenses and good faith activities by alleged copyrig ...
'' ;Economic concepts *
Protectionism Protectionism, sometimes referred to as trade protectionism, is the economic policy of restricting imports from other countries through methods such as tariffs on imported goods, import quotas, and a variety of other government regulations. ...
;Related US laws *
Copyright Term Extension Act The Sonny Bono Copyright Term Extension Act – also known as the Copyright Term Extension Act, Sonny Bono Act, or (derisively) the Mickey Mouse Protection Act – extended copyright terms in the United States in 1998. It is one of several a ...
(1998) *
Digital Performance Right in Sound Recordings Act The Digital Performance Right in Sound Recordings Act of 1995 (DPRA) is a United States Copyright law that grants owners of a copyright in sound recordings an exclusive right “to perform the copyrighted work publicly by means of a digital au ...
(1995) *
Inducement rule The inducement rule is a test a United States court can use to determine whether liability for copyright infringement committed by third parties could be assigned to the distributor of the device used to commit infringement. Summary of the rule O ...
*
NET Act The United States No Electronic Theft Act (NET Act), a federal law passed in 1997, provides for criminal prosecution of individuals who engage in copyright infringement under certain circumstances, even when there is no monetary profit or commer ...
, the "No Electronic Theft" ;Proposed US legislation *
BALANCE Act The Benefit Authors without Limiting Advancement or Net Consumer Expectations (BALANCE) Act of 2003 was a bill that would've amended Title 17 of the United States Code, "to safeguard the rights and expectations of consumers who lawfully obtain di ...
, Benefit Authors without Limiting Advancement or Net Consumer Expectations Act of 2003 * Inducing Infringement of Copyrights Act (INDUCE) (introduced 2004) * Pirate Act (introduced 2004) *
Digital Media Consumers' Rights Act The Digital Media Consumers' Rights Act (DMCRA) was a proposed law in the United States that directly challenges portions of the Digital Millennium Copyright Act, and would intensify Federal Trade Commission efforts to mandate proper labeling for ...
(introduced 2003 & 2005) *
Digital Transition Content Security Act The United States The Digital Transition Content Security Act (DTCSA, ) was a bill introduced by House Judiciary Committee Chairman James Sensenbrenner Jr., a Wisconsin Republican, on December 16, 2005. The bill was backed by Democratic Rep. John ...
(introduced 2005) *
FAIR USE Act The "Freedom and Innovation Revitalizing United States Entrepreneurship Act of 2007" (FAIR USE Act) was a proposed United States copyright law that would have amended Title 17 of the U.S. Code, including portions of the Digital Millennium Copyrig ...
(introduced in 2007) ;Shelved US Legislation * PROTECT IP Act (introduced in 2011, stopped by protests) *
Stop Online Piracy Act The Stop Online Piracy Act (SOPA) was a controversial proposed United States congressional bill to expand the ability of U.S. law enforcement to combat online copyright infringement and online trafficking in counterfeit goods. Introduced on Oc ...
(SOPA) (introduced in 2011, stopped by protests) ;Related international law *
DADVSI Loi DADVSI (generally pronounced as ''dadsi'') is the abbreviation of the French ''Loi relative au droit d’auteur et aux droits voisins dans la société de l’information'' (in English: "law on authors' rights and related rights in the infor ...
(
France France (), officially the French Republic ( ), is a country primarily located in Western Europe. It also comprises of Overseas France, overseas regions and territories in the Americas and the Atlantic Ocean, Atlantic, Pacific Ocean, Pac ...
– ''Loi sur le Droit d'Auteur et les Droits Voisins dans la Société de l'Information'') *
Digital Economy Act 2010 The Digital Economy Act 2010 (c. 24) is an Act of the Parliament of the United Kingdom. The act addresses media policy issues related to digital media, including copyright infringement, Internet domain names, Channel 4 media content, local ra ...
(
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Europe, off the north-western coast of the continental mainland. It comprises England, Scotland, Wales and North ...
) *
Copyright law of the European Union The copyright law of the European Union is the copyright law applicable within the European Union. Copyright law is largely harmonized in the Union, although country to country differences exist. The body of law was implemented in the EU through ...
*
Protection of Broadcasts and Broadcasting Organizations Treaty The World Intellectual Property Organization's Protection of Broadcasts and Broadcasting Organizations Treaty or the Broadcast Treaty is a proposed treaty designed to afford broadcasters some control and copyright-like control over the content of ...
(''proposed'')


References


Further reading

*


External links

* , DMCA
U.S. Copyright Office summary of the DMCA
(
PDF Portable Document Format (PDF), standardized as ISO 32000, is a file format developed by Adobe in 1992 to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. ...
format)
Wikimediafoundation.org

Title 17 of the U.S. Code
Cornell Law School


A citizen's guide to the DMCA

Info on Dealing with Digital Copyrights Infringement including filing DMCA Notices


* Seth Finkelstein,

'.
The Electronic Frontier Foundation (EFF) page on the DMCA

Unintended Consequences: Ten Years under the DMCA - EFF
{{authority control, suppress=WORLDCATID 1998 in the United States United States federal communications legislation United States federal computing legislation United States federal copyright legislation United States federal criminal legislation Acts of the 105th United States Congress History of the Internet Internet law in the United States Hardware restrictions Controversies in the United States RSS October 1998 events in the United States