SlideShare a Scribd company logo
1 of 1
Will Unlocking My Phone Breech the new DMCA
law?
As with everything in the technology world the answer is yes and no. Let me explain: up to 25th of
January of this year it was perfectly legal to unlock or jail break your phone, but smartphones
manufactured after that date are subject to the Digital Millennium Copyright Act (“DMCA”).Every 3
years, the Digital Millennium Copyright Act is reviewed and updated by the Library of Congress. As
you would expect the Act is crammed with legal jargon which can and will be open to interpretation,
However in layman’s terms the Act has a number of significant implications, you need.-

        permission is granted from the carrier
        it was purchased as a second-hand device
        you're not a US citizen (does US law apply to you?)
        Phone purchased PRIOR to January 26th can be unlocked. These are referred to as "legacy
        devices".

So if you unlock or jailbreak your phone is you going to serve time?Again the answer is probablyno.
However if your carrier discovers that you have unlocked or jailbrokenyour phone they'll be able to
send even more stern e-mails with the weight of federal regulations behind them. They may be
reciprocal agreements between carriers to block that phone on the new network. You know how
carriers can “co-operate”.

The good news in this whole thing is that "legacy" phones, which the Library of Congress describes
as "used (or not used, this bit is still uncertain) phones previously bought or otherwise obtained by a
customer," can be unlocked without any implications.

Just how all this plays out is yet to be seen. What awareness there will be amongst the general
public is unknown but it can be assumed that the awareness is fairly low. This means that the burden
of responsibility for compliance falls on the unlock company. Many of these companies have
arranged online petitions on government websites to have this legalisation looked at again.

So what do you think? Is this important protection for corporations to protect the investment in
their mobile phone operating systems or a restriction of consumer rights to do with their product
what they wish?

Read more here: http://www.unlock.my/unlock-codes/unlocking-codes-legal-or-illegal-2/




                                                                           Unlocking Guides    1

More Related Content

What's hot

Level 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public InterestLevel 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public Interest
XO Communications
 
The Evolution to Mobile Banking pdf
The Evolution to Mobile Banking pdfThe Evolution to Mobile Banking pdf
The Evolution to Mobile Banking pdf
sun secrets
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
safa
 
Mob banking product
Mob banking productMob banking product
Mob banking product
2great
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
safa
 

What's hot (17)

Level 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public InterestLevel 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public Interest
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
 
MobiU2011 Lecture: STRAT131 Mobile Legal Implications - Sedgwick LLP
MobiU2011 Lecture: STRAT131 Mobile Legal Implications - Sedgwick LLPMobiU2011 Lecture: STRAT131 Mobile Legal Implications - Sedgwick LLP
MobiU2011 Lecture: STRAT131 Mobile Legal Implications - Sedgwick LLP
 
One page business summary - cryptsonic technologies incorporated
One page business summary - cryptsonic technologies incorporatedOne page business summary - cryptsonic technologies incorporated
One page business summary - cryptsonic technologies incorporated
 
Definition of key words
Definition of key wordsDefinition of key words
Definition of key words
 
A Strategy for Mobile Money in Zimbabwe
A Strategy for Mobile Money in ZimbabweA Strategy for Mobile Money in Zimbabwe
A Strategy for Mobile Money in Zimbabwe
 
New Laws 2013
New Laws 2013 New Laws 2013
New Laws 2013
 
The Evolution to Mobile Banking pdf
The Evolution to Mobile Banking pdfThe Evolution to Mobile Banking pdf
The Evolution to Mobile Banking pdf
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
Mob banking product
Mob banking productMob banking product
Mob banking product
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
Legal Issues in Applied Technology
Legal Issues in Applied TechnologyLegal Issues in Applied Technology
Legal Issues in Applied Technology
 
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 

Similar to Will unlocking my phone breech the dmca law published

Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
nettletondevon
 
286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx
rhetttrevannion
 
Criminal Lawyer Mobile
Criminal Lawyer MobileCriminal Lawyer Mobile
Criminal Lawyer Mobile
crate2gold
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
Raunaq Jaiswal
 
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxSmartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
whitneyleman54422
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 

Similar to Will unlocking my phone breech the dmca law published (20)

Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Consumer protection is your smartphone too smart
Consumer protection is your smartphone too smartConsumer protection is your smartphone too smart
Consumer protection is your smartphone too smart
 
Use Access Control Systems?
Use Access Control Systems?Use Access Control Systems?
Use Access Control Systems?
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx
 
Criminal Lawyer Mobile
Criminal Lawyer MobileCriminal Lawyer Mobile
Criminal Lawyer Mobile
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Control
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Jailbreaking OK'd by Librarian
Jailbreaking OK'd by LibrarianJailbreaking OK'd by Librarian
Jailbreaking OK'd by Librarian
 
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxSmartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
 
databreach whitepaper
databreach whitepaperdatabreach whitepaper
databreach whitepaper
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as published
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
 
Mobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsMobile Security Sticks and Carrots
Mobile Security Sticks and Carrots
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Will unlocking my phone breech the dmca law published

  • 1. Will Unlocking My Phone Breech the new DMCA law? As with everything in the technology world the answer is yes and no. Let me explain: up to 25th of January of this year it was perfectly legal to unlock or jail break your phone, but smartphones manufactured after that date are subject to the Digital Millennium Copyright Act (“DMCA”).Every 3 years, the Digital Millennium Copyright Act is reviewed and updated by the Library of Congress. As you would expect the Act is crammed with legal jargon which can and will be open to interpretation, However in layman’s terms the Act has a number of significant implications, you need.- permission is granted from the carrier it was purchased as a second-hand device you're not a US citizen (does US law apply to you?) Phone purchased PRIOR to January 26th can be unlocked. These are referred to as "legacy devices". So if you unlock or jailbreak your phone is you going to serve time?Again the answer is probablyno. However if your carrier discovers that you have unlocked or jailbrokenyour phone they'll be able to send even more stern e-mails with the weight of federal regulations behind them. They may be reciprocal agreements between carriers to block that phone on the new network. You know how carriers can “co-operate”. The good news in this whole thing is that "legacy" phones, which the Library of Congress describes as "used (or not used, this bit is still uncertain) phones previously bought or otherwise obtained by a customer," can be unlocked without any implications. Just how all this plays out is yet to be seen. What awareness there will be amongst the general public is unknown but it can be assumed that the awareness is fairly low. This means that the burden of responsibility for compliance falls on the unlock company. Many of these companies have arranged online petitions on government websites to have this legalisation looked at again. So what do you think? Is this important protection for corporations to protect the investment in their mobile phone operating systems or a restriction of consumer rights to do with their product what they wish? Read more here: http://www.unlock.my/unlock-codes/unlocking-codes-legal-or-illegal-2/ Unlocking Guides 1