WIPO Copyright And Performances And Phonograms Treaties Implementation Act
   HOME

TheInfoList



OR:

The
WIPO The World Intellectual Property Organization (WIPO; french: link=no, Organisation mondiale de la propriété intellectuelle (OMPI)) is one of the 15 specialized agencies of the United Nations (UN). Pursuant to the 1967 Convention Establishin ...
Copyright A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, education ...
and
Performance A performance is an act of staging or presenting a play, concert, or other form of entertainment. It is also defined as the action or process of carrying out or accomplishing an action, task, or function. Management science In the work place ...
s and
Phonogram Phonogram may refer to: * A sound recording – see Geneva Phonograms Convention * ''Phonogram'' (comics), a comic book by Kieron Gillen and Jamie McKelvie * Phonogram (linguistics), a grapheme which represents a phoneme or a combination of phone ...
s
Treaties A treaty is a formal, legally binding written agreement between actors in international law. It is usually made by and between sovereign states, but can include international organizations, individuals, business entities, and other legal perso ...
Implementation Act, is a part of the
Digital Millennium Copyright Act The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or s ...
(DMCA), a 1998
U.S. The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territori ...
law. It has two major portions, Section 102, which implements the requirements of the WIPO Copyright Treaty, and Section 103, which arguably provides additional protection against the circumvention of copy prevention systems (with some exceptions) and prohibits the removal of copyright management information.


Section 102

Section 102 gives the act its name, which is based on the requirements of the WIPO Copyright Treaty concluded at Geneva, Switzerland, on 20 December 1996. It modifies US copyright law to include works produced in the countries which sign the following treaties: * the
Universal Copyright Convention The Universal Copyright Convention (UCC), adopted in Geneva, Switzerland, in 1952, is one of the two principal international conventions protecting copyright; the other is the Berne Convention. The UCC was developed by the United Nations Educati ...
* the
Geneva Phonograms Convention The Convention for the Protection of Producers of Phonograms Against Unauthorized Duplication of Their Phonograms, also known as the Geneva Phonograms Convention, is a 1971 international agreement relating to copyright protection for sound record ...
(Convention for the Protection of Producers of Phonograms Against Unauthorized Duplication of Their Phonograms, Geneva, Switzerland, 29 October 1971) * the
Berne Convention for the Protection of Literary and Artistic Works The Berne Convention for the Protection of Literary and Artistic Works, usually known as the Berne Convention, was an international assembly held in 1886 in the Swiss city of Bern by ten European countries with the goal to agree on a set of l ...
* the WTO Agreement (as defined in the
Uruguay Round Agreements Act The Uruguay Round Agreements Act (URAA; ) is an Act of Congress in the United States that implemented in U.S. law the Marrakesh Agreement of 1994. The Marrakesh Agreement was part of the Uruguay Round of negotiations which transformed the General ...
) * the
WIPO Copyright Treaty The World Intellectual Property Organization Copyright Treaty (WIPO Copyright Treaty or WCT) is an international treaty on copyright law adopted by the member states of the World Intellectual Property Organization (WIPO) in 1996. It provides addi ...
signed at Geneva, Switzerland on 20 December 1996 * the
WIPO Performances and Phonograms Treaty The WIPO Performances and Phonograms Treaty (or WPPT) is an international treaty signed by the member states of the World Intellectual Property Organization and was adopted in Geneva on 20 December 1996. It came into effect on 20 May 2002. As of ...
concluded at Geneva, Switzerland on 20 December 1996 * any other copyright treaty to which the United States is a party


Section 103

Section 103 provoked most of the controversy which resulted from the act. It is often called DMCA
anti-circumvention Anti-circumvention refers to laws which prohibit the circumvention of technological barriers for using a digital good in certain ways which the rightsholders do not wish to allow. The requirement for anti-circumvention laws was globalized in 1996 ...
provisions. It restricts the ability to make, sell, or distribute devices which circumvent
Digital Rights Management Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) such as access control technologies can restrict the use of proprietary hardware and copyrighted works. ...
systems, adding Chapter 12 (section
1201
throug
1205
to US copyright law.
Section 1201
makes it illegal to: *(1) "circumvent a technological measure that effectively controls access to a work" except as allowed after rulemaking procedures administered by the Register of Copyrights every three years. (The exemptions made through the three-yearly review do not apply to the supply of circumvention devices, only to the act of circumvention itself.) *(2) "manufacture, import, offer to the public, provide, or otherwise traffic in" a device, service or component which is primarily intended to circumvent "a technological measure that effectively controls access to a work," and which either has limited commercially significant other uses or is marketed for the anti-circumvention purpose. *(3) "manufacture, import, offer to the public, provide, or otherwise traffic in" a device, service or component which is primarily intended to circumvent "protection afforded by a technological measure that effectively protects a right of a copyright owner," and which either has limited commercially significant other uses or is marketed for the anti-circumvention purpose. *sell any VHS VCR, 8 mm analogue video tape recorder, Beta video recorder or other analogue video cassette recorder which is not affected by automatic gain control copy protection (the basis of
Macrovision TiVo Corporation, formerly known as the Rovi Corporation and Macrovision Solutions Corporation, was an American technology company. Headquartered in San Jose, California, the company is primarily involved in licensing its intellectual property ...
), with some exceptions. The act creates a distinction between access-control measures and copy-control measures. An access-control measure limits access to the contents of the protected work, for example by
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
. A copy-control measure only limits the ability of a user to copy the work. Though the act makes it illegal to distribute technology to circumvent either type of
copy protection Copy protection, also known as content protection, copy prevention and copy restriction, describes measures to enforce copyright by preventing the reproduction of software, films, music, and other media. Copy protection is most commonly found on ...
, only the action of circumventing access-control measures is illegal. The action of circumventing a copy-control measure is not prohibited, though any copies made are still subject to other copyright law. The section goes on to limit its apparent reach. The statute says that: * it will not affect rights, remedies, limitations, or defenses to copyright infringement, including fair use; * it is not necessary to design components specifically to use copy protection systems; * "nothing in this section shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products"; * circumvention for law enforcement, intelligence collection, and other government activities is allowed; * reverse engineering to achieve interoperability of computer programs is allowed; * encryption research is allowed; * systems to prevent minors from accessing some internet content are allowed to circumvent; * circumvention to protect personal information by disabling part of a system is allowed; and * security testing is allowed. In addition, the statute has a "primary intent" requirement, which creates evidentiary problems for those seeking to prove a violation. In order for a violation to be proved, it must be shown that the alleged violator must have primarily intended to circumvent copyright protection. However, if the primary intent is to achieve interoperability of software or devices, the circumvention is permitted and no violation has occurred.
Section 1202
prohibits the removal of copyright management information. On balance, it is difficult to say whether the Act expands copyright enforcement powers or limits them. Because it does not affect the underlying substantive copyright protections, the Act can be viewed as merely changing the penalties and procedures available for enforcement. Because it grants safe harbors in various situations for research, reverse engineering, circumvention, security, and protection of minors, the Act in many ways limits the scope of copyright enforcement.


Section 103 cases

Judicial enforcement of the statute and the treaty has not been nearly as far-reaching as was originally hoped by its advocates. Here are a handful of notable instances where advocates of proprietary encryption techniques sought to use the law to their advantage:
DVD The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any kind ...
s are often encrypted with the
Content Scrambling System The Content Scramble System (CSS) is a digital rights management (DRM) and encryption system employed on many commercially produced DVD-Video discs. CSS utilizes a proprietary 40-bit stream cipher algorithm. The system was introduced around ...
(CSS). To play a CSS DVD, it must be decrypted.
Jon Johansen Jon Lech Johansen (born November 18, 1983 in Harstad, Norway), also known as DVD Jon, is a Norwegian programmer who has worked on reverse engineering data formats. He wrote the DeCSS software, which decodes the Content Scramble System used for ...
and two anonymous colleagues wrote
DeCSS DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, open source operating systems (such as Berkeley Software Distribution, BSD and Linux) could n ...
, a program that did this decryption, so they could watch DVDs in
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
. US servers distributing this software were asked to stop on the theory they were violating this law. Mr. Johansen was tried in his native Norway under that country's analogous statute. The Norwegian courts ultimately acquitted Mr. Johansen because he was acting consistent with interoperability and he could not be held responsible for others' motives. The software is now widely available.
2600 Magazine ''2600: The Hacker Quarterly'' is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems, Intern ...
was sued under this law for distributing a list of links to websites where DeCSS could be downloaded. The court found that the "primary purpose" of the defendants' actions was to promote redistribution of DVDs, in part because the defendants admitted as much. See
Universal v. Reimerdes ''Universal City Studios, Inc. v. Corley'' (originally known as ''Universal City Studios, Inc. v. Reimerdes'')'','' 273 F.3d 429 (2nd Cir., 2001), was a court ruling at the United States Court of Appeals for the Second Circuit.''Universal City S ...
, 111 F. Supp. 2d 346 (S.D.N.Y. 2000). The finding was upheld by the Second Circuit Court of Appeals on the specific facts of the case, but the appellate court left open the possibility that different facts could change the result. See Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001), at footnotes 5 and 16. A similar program, also by Johansen, decrypted
iTunes Music Store The iTunes Store is a digital media store operated by Apple Inc. It opened on April 28, 2003, as a result of Steve Jobs' push to open a digital marketplace for music. As of April 2020, iTunes offered 60 million songs, 2.2 million apps, 25,000 ...
files so they could be played on
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
.
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple fruit tree, trees are agriculture, cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, wh ...
had the software taken down from several servers for violating this law. However, Apple Computer has since reversed its stand and begun advocating encryption-free distribution of content. Dmitry Sklyarov, a
Russia Russia (, , ), or the Russian Federation, is a List of transcontinental countries, transcontinental country spanning Eastern Europe and North Asia, Northern Asia. It is the List of countries and dependencies by area, largest country in the ...
n
programmer A computer programmer, sometimes referred to as a software developer, a software engineer, a programmer or a coder, is a person who creates computer programs — often for larger computer software. A programmer is someone who writes/creates ...
was jailed under this law when he visited the
U.S. The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territori ...
, because he had written a program in Russia which allowed users to access documents for which they had forgotten the password. (He was eventually acquitted by a jury of all counts, reportedly because the jury thought the law was unfair—a phenomenon known as
jury nullification Jury nullification (US/UK), jury equity (UK), or a perverse verdict (UK) occurs when the jury in a criminal trial gives a not guilty verdict despite a defendant having clearly broken the law. The jury's reasons may include the belief that the ...
.)
aibohack.com
a website which distributed tools to make
Sony , commonly stylized as SONY, is a Japanese multinational conglomerate corporation headquartered in Minato, Tokyo, Japan. As a major technology company, it operates as one of the world's largest manufacturers of consumer and professional ...
's
AIBO AIBO (''stylized aibo, Artificial Intelligence Robot'', homonymous with , "pal" or "partner" in Japanese) is a series of robotic dogs designed and manufactured by Sony. Sony announced a prototype Aibo in mid-1998, and the first consumer model wa ...
robotic pet do new tricks, like dance jazz. Sony alleged that the tools violated this law, and asked for them to be taken down. (After negative press they changed their mind.) A company selling
mod chip A modchip (short for modification chip) is a small electronic device used to alter or disable artificial restrictions of computers or entertainment devices. Modchips are mainly used in video game consoles, but also in some DVD or Blu-ray players ...
s for Sony
PlayStation is a video gaming brand that consists of five home video game consoles, two handhelds, a media center, and a smartphone, as well as an online service and multiple magazines. The brand is produced by Sony Interactive Entertainment, a divisi ...
s, which allowed the systems to play video games from other countries, was raided by the US government and their products were seized under this law. Smart cards, while they have many other purposes, are also used by
DirecTV DirecTV (trademarked as DIRECTV) is an American multichannel video programming distributor based in El Segundo, California. Originally launched on June 17, 1994, its primary service is a digital satellite service serving the United States. It ...
to decrypt their television satellite signals for paying users. Distributors of
smart card A smart card, chip card, or integrated circuit card (ICC or IC card) is a physical electronic authentication device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) c ...
readers, which could create smart cards (including ones that could decrypt DirecTV signals) were raided by
DirecTV DirecTV (trademarked as DIRECTV) is an American multichannel video programming distributor based in El Segundo, California. Originally launched on June 17, 1994, its primary service is a digital satellite service serving the United States. It ...
and their products and customer lists were seized. DirecTV then sent a letter to over 100,000 purchasers of the readers and filed lawsuits against over 5,000. They offered to not file or drop the suit for $3500, less than litigating the case would cost. (The suits are ongoing.)
Lexmark Lexmark International, Inc. is a privately held American company that manufactures laser printers and imaging products. The company is headquartered in Lexington, Kentucky. Since 2016 it has been jointly owned by a consortium of three multination ...
sued Static Control Components which made replacement recycled
toner cartridge A toner cartridge, also called laser toner, is the consumable component of a laser printer. Toner cartridges contain toner powder, a fine, dry mixture of plastic particles, carbon, and black or other coloring agents that make the actual image o ...
s for their
printer Printer may refer to: Technology * Printer (publishing), a person or a company * Printer (computing), a hardware device * Optical printer for motion picture films People * Nariman Printer (fl. c. 1940), Indian journalist and activist * James ...
s under this law. Lexmark initially won a preliminary injunction, but that injunction was vacated by the Court of Appeals for the Sixth Circuit. The
Chamberlain Group Chamberlain Group (CGI), the corporate parent company to LiftMaster, Chamberlain, Merlin, and Grifco, designs and engineers residential garage door openers, commercial door operators, and gate entry systems. CGI is also the parent company to Contr ...
sued Skylink Technologies for creating
garage door A garage door is a large door on a garage that opens either manually or by an electric motor (a garage door opener). Garage doors are frequently large enough to accommodate automobiles and other vehicles. Small garage doors may be made in a sin ...
openers that opened their own garage doors under this law. (The lawsuit is ongoing, though the Court of Appeals for the Federal Circuit has issued a ruling casting serious doubt on Chamberlain's likelihood of success.) Prof.
Edward Felten Edward William Felten (born March 25, 1963) is the Robert E. Kahn Professor of Computer Science and Public Affairs at Princeton University, where he was also the Director of the Center for Information Technology Policy from 2007 to 2015 and fr ...
and several colleagues, were threatened with a lawsuit under this law if they presented a paper at a technical conference describing how they participated in the Secure Digital Music Initiative (SDMI) decryption challenge. (After Felten sued for
declaratory judgment A declaratory judgment, also called a declaration, is the legal determination of a court that resolves legal uncertainty for the litigants. It is a form of legally binding preventive by which a party involved in an actual or possible legal mat ...
, the threat was dropped.) Secure Network Operations (SNOsoft), a group of security researchers, published a security flaw in HP's
Tru64 Tru64 UNIX is a discontinued 64-bit UNIX operating system for the Alpha instruction set architecture (ISA), currently owned by Hewlett-Packard (HP). Previously, Tru64 UNIX was a product of Compaq, and before that, Digital Equipment Corporation (DE ...
operating system after HP refused to fix it. HP threatened to sue them under this law. (After negative press they dropped the threat.)
Blackboard Inc. Blackboard Inc. was an American educational technology company with corporate headquarters in Reston, VA. It was known for Blackboard Learn, a learning management system. It merged with Anthology in late 2021, with the future name of the combin ...
filed a civil complaint against university students Billy Hoffman and
Virgil Griffith Virgil Griffith (born 1983), also known as Romanpoet, is an American programmer. He worked extensively on the Ethereum cryptocurrency platform, designed the Tor2web proxy along with Aaron Swartz, and created the Wikipedia indexing tool WikiSca ...
who were researching security holes in the Blackboard Transaction System. A judge issued an injunction on the two students to prevent them from publishing their research. Blackboard Inc. had previously sent a complaint to the students saying they were violating this law. Since that time, however, Blackboard has pledged to cooperate with open-source developers. On February 1, 2007, Blackboard announced vi
press release"The Blackboard Patent Pledge"
In this pledge to the open source and do-it-yourself course management community, the company vows to forever refrain from asserting its patent rights against open-source developers, except when it is itself sued for patent infringement.
Princeton Princeton University is a private research university in Princeton, New Jersey. Founded in 1746 in Elizabeth as the College of New Jersey, Princeton is the fourth-oldest institution of higher education in the United States and one of the ni ...
student J. Alex Halderman

was threatened by SunnComm under this law for explaining how
Mediamax CD-3 MediaMax CD-3 is a software package created by SunnComm which was sold as a form of copy protection for compact discs. It was used by the record label RCA Records/ BMG, and targets both Microsoft Windows and Mac OS X. Elected officials and com ...
CD copy protection worked. Halderman explained that the copy protection could be defeated by holding down the shift key when inserting the CD into Windows (this prevented autorun, which installed the Mediamax protection software). After press attention SunnComm withdrew their threat.
Blizzard Entertainment Blizzard Entertainment, Inc. is an American video game developer and publisher based in Irvine, California. A subsidiary of Activision Blizzard, the company was founded on February 8, 1991, under the name Silicon & Synapse, Inc. by three graduat ...
threatened the developers of bnetd, a freely available clone of battle.net, a proprietary server system used by all Blizzard games on the Internet. Blizzard claims that these servers allow circumvention of its CD key copy protection scheme. (The
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
is currently negotiating a settlement.) The
Advanced Access Content System The Advanced Access Content System (AACS) is a standard for content distribution and digital rights management, intended to restrict access to and copying of the post- DVD generation of optical discs. The specification was publicly released in ...
Licensing Administrator, LLC sent violation notices to a number of sites who had published the encryption key to HD-DVDs. The key and the software with which to decrypt the disks had been published by an anonymous programmer. When
Digg Digg, stylized in lowercase as digg, is an American news aggregator with a curated front page, aiming to select stories specifically for the Internet audience such as science, trending political issues, and viral Internet issues. It was launch ...
took down references to the key, its users revolted and began distributing it in many creative ways. Eventually, Digg was unable to stop its users and gave up. AACS executives have vowed to fight on

See the
AACS encryption key controversy A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing cease and desist letters to we ...
. Open-source software to decrypt content scrambled with the
Content Scrambling System The Content Scramble System (CSS) is a digital rights management (DRM) and encryption system employed on many commercially produced DVD-Video discs. CSS utilizes a proprietary 40-bit stream cipher algorithm. The system was introduced around ...
presents an intractable problem with the application of this law. Because the decryption is necessary to achieve interoperability of open source operating systems with proprietary operating systems, the circumvention is protected by the Act. However, the nature of open source software makes the decryption techniques available to those who wish to violate copyright laws. Consequently, the exception for interoperability effectively swallows the rule against circumvention.


Criticisms

Large industry associations like the
MPAA The Motion Picture Association (MPA) is an American trade association representing the five major film studios of the United States, as well as the video streaming service Netflix. Founded in 1922 as the Motion Picture Producers and Distribu ...
and
RIAA The Recording Industry Association of America (RIAA) is a trade organization that represents the music recording industry in the United States. Its members consist of record labels and distributors that the RIAA says "create, manufacture, and/o ...
say the law is necessary to prevent copyright infringement in the digital era, while a growing coalition of open source software developers and
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
activist Activism (or Advocacy) consists of efforts to promote, impede, direct or intervene in social, political, economic or environmental reform with the desire to make changes in society toward a perceived greater good. Forms of activism range fro ...
s argue that the law stifles innovation while doing little to stop copyright infringement. Because the content must ultimately be decrypted in order for users to understand it, near-perfect copying of the decrypted content always remains possible for pirates. Meanwhile, developers of open source and other next-generation software must write complex and sophisticated software routines to ensure interoperability of their software with legacy Windows technology. Thus, the opponents are angry at having to bear the costs of technology that results in no benefit. Some proponents of the law claim it was necessary to implement several WIPO treaties. Opponents respond that the law was not necessary, even if it was it went far beyond what the treaties require, and the treaties were written and passed by the same industry lobbyists people who wanted to pass this law. They also note that the severe ambiguities in the law, its difficulty in enforcement, and its numerous exceptions make it ineffective in achieving its stated goal of protecting copyright holders. Others claim that the law is necessary to prevent online copyright infringement, using perfect digital copies. Opponents note that copyright infringement was already illegal and the DMCA does not outlaw infringement but only legal uses like display and performance. Opponents of the law charge that it violates the
First Amendment First or 1st is the ordinal form of the number one (#1). First or 1st may also refer to: *World record, specifically the first instance of a particular achievement Arts and media Music * 1$T, American rapper, singer-songwriter, DJ, and rec ...
on its face, because it restricts the distribution of computer software, like DeCSS. The
Second Circuit The United States Court of Appeals for the Second Circuit (in case citations, 2d Cir.) is one of the thirteen United States Courts of Appeals. Its territory comprises the states of Connecticut, New York and Vermont. The court has appellate jur ...
rejected this argument in '' MPAA v. 2600'', suggesting that software was not really speech. Under the specific facts of the case, however, the Constitutional decision was not controlling. The defendants' ultimate purpose was to make possible the copying of copyrighted content, not publishing their own speech. Most other circuits that have considered the issue concluded software is speech, but have not considered this law. Opponents also say it creates serious chilling effects stifling legitimate First Amendment speech. For example,
John Wiley & Sons John Wiley & Sons, Inc., commonly known as Wiley (), is an American multinational publishing company founded in 1807 that focuses on academic publishing and instructional materials. The company produces books, journals, and encyclopedias, in p ...
changed their mind and decided not to publish a book by Andrew Huang about security flaws in the
Xbox Xbox is a video gaming brand created and owned by Microsoft. The brand consists of five video game consoles, as well as applications (games), streaming services, an online service by the name of Xbox network, and the development arm by the na ...
because of this law. After Huang tried to self-publish, his online store provider dropped support because of similar concerns. (The book is now being published by
No Starch Press No Starch Press is an American publishing company, specializing in technical literature often geared towards the geek, hacker, and DIY subcultures. Popular titles include '' Hacking: The Art of Exploitation'', Andrew Huang's ''Hacking the Xbox' ...
.) Opponents also argue that the law might be read to give full control to copyright holders over what uses are and are not permitted, essentially eliminating
fair use Fair use is a doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to balance the interests ...
. For example, ebook readers protected by this law can prevent the user from copying short excerpts from the book, printing a couple pages, and having the computer read the book aloud—all of which are legal under copyright law, but this law could be expanded to prohibit building a tool to do what is otherwise legal. However, other legal scholars note that the law's emphasis on violations of preexisting rights of copyright holders ensures that the DMCA does not expand those rights. If the purpose of the activity is not to violate a preexisting right, the activity is not illegal. Fair use, the scholars say, would still be protected.


Copyright Office rulemaking procedures

As required by the DMCA, in 1999 the U.S. Copyright Office launched a public appeal for comments on the DMCA in order "to determine whether there are particular classes of works as to which users are, or are likely to be, adversely affected in their ability to make noninfringing uses due to the prohibition on circumvention of access controls". The entire set of written submissions, testimonial transcripts, and final recommendations and rulings for all three rulemakings (2000, 2003, and 2006) are availabl
here


References


External links

* , Text of the law *
Copyright Office The United States Copyright Office (USCO), a part of the Library of Congress, is a United States government body that maintains records of copyright registration, including a copyright catalog. It is used by copyright title searchers who are ...

Rulemaking procedures
*
EFF EFF or eff may refer to: Politics * Economic Freedom Fighters, a South African communist political party * Economic Freedom Fund, an American political organization * Election Fighting Fund, a British suffragist organization supporting the ear ...

Unintended Consequences: Five Years under the DMCA
* Bill D. Herman and Oscar H. Gandy, Jr.
Catch 1201: A Legislative History and Content Analysis of the DMCA Exemption Proceedings
{{DEFAULTSORT:Wipo Copyright And Performances And Phonograms Treaties Implementation Act United States federal copyright legislation Acts of the 105th United States Congress