What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't

  1. 1. Making The DMCA Work For YouThe Ten Things You Can Do (And the Two Things You Can’t)<br />By Debbie Rose<br />Intellectual Property Fellow<br />Association For Competitive Technology<br />(c) Innovators Network 2009.<br />
  2. 2. DMCA Background<br />DMCA= Digital Millennium Copyright Act which was signed into law in 1998.<br />U.S. signed two international treaties requiring countries to make laws against unauthorized access to copyrighted works in digital format.<br />DMCA gives copyright owners legal remedies against someone who “circumvents” or breaks digital locks used to prevent unauthorized access to or use of their works.<br />DMCA was, and still is, controversial.<br />(c) Innovators Network 2009.<br />
  3. 3. Why Should You Care?<br />Innovators want to create new and cool products and services.<br />Innovation often builds on existing technology to provide access to entertainment products.<br />Innovators of new technology need to be aware of the DMCA prohibitions and the exemptions which allow many uses of copyrighted material.<br />Success = not sued.<br />(c) Innovators Network 2009.<br />
  4. 4. One of TWO Things You Can’t Do<br />May not circumvent a digital lock on copyrighted material.<br />Circumvent= descramble, decrypt, avoid, bypass, remove, deactivate or “hack”<br />It is the electronic equivalent of breaking a digital lock.<br />Prohibition on circumvention has been narrowly construed by the courts: 1) requires a relationship between circumvention and infringement; 2) requires protected material to be copyrighted<br />(c) Innovators Network 2009.<br />
  5. 5. Second of TWO Things You Can’t Do<br />2. May not make devices intended for “hacking” or circumvention.<br />Can’t manufacture, import, sell or offer to the public any technology, product, service, device that is primarily designed and marketed as a way to get unauthorized access to copyright works.<br />Cable TV analogy: No black boxes. <br />(c) Innovators Network 2009.<br />
  6. 6. The Ten Things You CAN Do<br />AUTHORIZED ACCESS- You can circumvent to make use- such as making a copy for purposes fair use- if you have permission to access the work.<br />INEFFECTIVE TECHNOLOGICAL MEASURE- Legal remedies available to copyright owners only if they use locks that work.<br />(c) Innovators Network 2009.<br />
  7. 7. Ten Things You CAN Do, cont…<br />REVERSE ENGINEERING or INTEROPERABILITY- You can circumvent if identifying and analyzing program code in order to achieve interoperability with other independently created programs.<br />ENCRYPTION RESEARCH- You can circumvent in order to find and analyze flaws and vulnerabilities in encryption technologies.<br />(c) Innovators Network 2009.<br />
  8. 8. Ten Things You CAN Do, cont…<br />SECURITY TESTING- You can circumvent to get access to a computer, system or network if engaged in good faith testing of security flaws.<br />MAKE TOOLS THAT DO NOT MEET THE TEST- You can make tools or devices that might be capable of circumvention so long as that is not the primary purpose. Intent is the key.<br />(c) Innovators Network 2009.<br />
  9. 9. Ten Things You CAN Do, cont…<br />MAKE TOOLS FOR REVERSE ENGINEERING- You can make circumvention tools necessary to analyze program code in order to achieve interoperability with independently created programs. Example: Disassemblers and debuggers.<br />MAKE TOOLS FOR ENCRYTION RESEARCH- You can make circumvention tools necessary to analyze flaws in encryption technologies.<br />(c) Innovators Network 2009.<br />
  10. 10. Ten Things You CAN Do, cont…<br />MAKE TOOLS FOR SECURITY TESTING- You can develop tools to allow you to access a computer, system or network for testing a security flaw.<br />CAN REQUEST NEW EXEMPTIONS- DMCA includes a “safety net” which allows the public to request new exemptions every three years. Must show DMCA is or is likely to adversely affect ability to make fair use. Six more exemptions in effect through 2009.<br />(c) Innovators Network 2009.<br />
  11. 11. Here’s a Hypothetical<br />Product: Service to restore access to legitimately acquired music, movies, games, software, or books from an out of business online entertainment service. <br />Problem: Discover that product has the ability to access content not legally acquired.<br />Question: Does this product violate the DMCA? <br />Answer: Maybe not. <br />(c) Innovators Network 2009.<br />
  12. 12. Check List<br />Primary Purpose- Was device primarily designed to enable unauthorized access to copyrighted works?<br />Commercially Significant Purpose- Does device have limited commercially significant value other than “hacking”?<br />Marketing the Product- Does marketing of device focus on “hacking” functions?<br />Corrective Actions- Did I stop distributing device when I learned it was primarily being used to circumvent?<br />(c) Innovators Network 2009.<br />
  13. 13. Example: Blizzard v. Samba<br />Blizzard- Violated the DMCA because it violated software licenses against reverse engineering and the purpose of the product was to avoid restricted access, not to enable interoperability of independent program.<br />Samba- Did not violate DMCA because it didn’t violate license restrictions, used a network sniffing tool, distributed an independently created program, and the product did not constitute copyright infringement.<br />(c) Innovators Network 2009.<br />
  14. 14. Conclusion<br />Ten years of exponential growth in technology since the DMCA was enacted.<br />As always, talk to a lawyer.<br />Hopefully, this will encourage you to jump onto the technology super highway , knowing that there are lots of ways to develop great new products and services that will bring you success and enhance the lives of people everywhere!<br />(c) Innovators Network 2009.<br />