SlideShare a Scribd company logo
1 of 9
Download to read offline
DATA MODELS
AND THE DMCA
Michael J. Madison
University of Pittsburgh School of Law
Symposium: The Digital Millennium Copyright Act at 20
Texas A&M University School of Law
March 24, 2018
What’s a data model?
What do data models
have to do with the
DMCA?
(given the absence of © or sui generis rights in
databases)
What’s a data model
(a/k/a data structure)?
No: “data,” not “algorithms,” not “Big Data”
Yes: A data model determines the structure of
data to be collected, stored, analyzed, shared,
and processed, on their own and in relationships
with data collected, etc. in other contexts.
I.e.: an abstract, formal model that organizes
elements of data and standardizes how they
relate to each other and to real world entities
they represent, and (also) a set of concepts used
define the formal model.
Example (old):
P.O. Boxes
“Data resides in computer memory. It is easiest to visualize
computer memory as being like a wall of post office boxes. Each
box has a unique numerical ‘address,’ but the content of each
box can be changed at will. The computer's central processing
unit (‘CPU’) can look at a location in memory specified by the
address and retrieve the piece of data residing there.
Alternatively, the CPU can store a piece of data at a given
address. One part of a program organizes the data in such a way
that the other part, which embodies the algorithm, can work with
it. The more sophisticated the data organization, the more
opportunity there is to employ sophisticated algorithms that run
faster and do more. This organization is referred to as a data
structure.”
Marci A. Hamilton & Ted Sabety, Computer Science Concepts in Copyright Cases: The Path to a
Coherent Law, 10 Harv. J.L. & Tech. 239, 254 (1997)
Example (new):
Big Mechanism (DARPA)
B.M. “aims to develop technology to read research abstracts and
papers to extract pieces of causal mechanisms, assemble these
pieces into more complete causal models, and reason over these
models to produce explanations. The domain of the program is
cancer biology with an emphasis on signaling pathways.
Although the domain of the Big Mechanism program is cancer
biology, the overarching goal of the program is to develop
technologies for a new kind of science in which research is
integrated more or less immediately—automatically or semi-
automatically—into causal, explanatory models of
unprecedented completeness and consistency. Cancer pathways
are just one example of causal, explanatory models.”
(https://www.darpa.mil/program/big-mechanism)
Big Mechanism (DARPA)
illustrated:
“Just when we need to understand highly connected
systems as systems, our research methods force us to
focus on little parts.”
Paul Cohen, DARPA Program Manager (now Dean, Pitt
School of Computing and Information)
Google Books + JSTOR +
PubMed Central + GenBank
What do data models have to
do with the DMCA?
Solving interoperability concerns when data
models are accessed, copied, modified, &/or
distributed -- rather than dealing with scraping,
piracy, & harvesting:
1. Protectable works (Section 102(a)/(b))?
2. Deals (e.g., ToU/ToS)?
3. Open access (e.g., NIH Public Access Policy)?
4. Fair use (Section 107/Google Books)?
5. Anti-hacking (CFAA/HiQ v LinkedIn)?
6. Interoperability under DMCA Section 1201(f)?
DMCA: Interoperability
as a limited exception
§1201 (f) Reverse engineering.--(1) Notwithstanding the provisions of subsection (a)(1)(A), a person
who has lawfully obtained the right to use a copy of a computer program may circumvent a
technological measure that effectively controls access to a particular portion of that program for
the sole purpose of identifying and analyzing those elements of the program that are necessary to
achieve interoperability of an independently created computer program with other programs, and
that have not previously been readily available to the person engaging in the circumvention, to the
extent any such acts of identification and analysis do not constitute infringement under this title.
(2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ
technological means to circumvent a technological measure, or to circumvent protection afforded
by a technological measure, in order to enable the identification and analysis under paragraph (1),
or for the purpose of enabling interoperability of an independently created computer program with
other programs, if such means are necessary to achieve such interoperability, to the extent that
doing so does not constitute infringement under this title.
(3) The information acquired through the acts permitted under paragraph (1), and the means
permitted under paragraph (2), may be made available to others if the person referred to in
paragraph (1) or (2), as the case may be, provides such information or means solely for the
purpose of enabling interoperability of an independently created computer program with other
programs, and to the extent that doing so does not constitute infringement under this title or
violate applicable law other than this section.
(4) For purposes of this subsection, the term “interoperability” means the ability of computer
programs to exchange information, and of such programs mutually to use the information which
has been exchanged.
Interoperability
as a social good
Technical (software/hardware) interoperabilty
Sega v. Accolade (9th Cir. 1992); Lexmark Int’l v. Static Control
Components (6th Cir. 2004); Chamblerain Group v. Skylink Techs. (Fed. Cir.
2004); Oracle v. Google (Fed. Cir. 2014) (?)
(DMCA Section 1201(f) speaks to this; we try to limit © application to
system functions)
HCI (human) interoperability
Lotus v. Borland (1st Cir. 1995); Oracle v. Google (Fed. Cir. 2014) (?)
(DMCA is silent; © lacks an accepted vocabulary and set of policy
instincts when function overlaps with human-generated meaning)
Semantic interoperability
Big Mechanism: data models aligned per function and also per computer-
generated meaning)

More Related Content

What's hot

Data fusion for city live event detection
Data fusion for city live event detectionData fusion for city live event detection
Data fusion for city live event detectionAlket Cecaj
 
Big DataParadigm, Challenges, Analysis, and Application
Big DataParadigm, Challenges, Analysis, and ApplicationBig DataParadigm, Challenges, Analysis, and Application
Big DataParadigm, Challenges, Analysis, and ApplicationUyoyo Edosio
 
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...Robert Grossman
 
The impact of Big Data on next generation of smart cities
The impact of Big Data on next generation of smart citiesThe impact of Big Data on next generation of smart cities
The impact of Big Data on next generation of smart citiesPayamBarnaghi
 
Research Topics on Data Mining
Research Topics on Data MiningResearch Topics on Data Mining
Research Topics on Data MiningPhdtopiccom
 
Next generation big data analytics state of the art
Next generation big data analytics state of the artNext generation big data analytics state of the art
Next generation big data analytics state of the artNazrul Islam
 
Eastwood users lost
Eastwood users lostEastwood users lost
Eastwood users lostmegmeg42
 
New Trends and Directions in Data Science - MIT Information Quality Conferenc...
New Trends and Directions in Data Science - MIT Information Quality Conferenc...New Trends and Directions in Data Science - MIT Information Quality Conferenc...
New Trends and Directions in Data Science - MIT Information Quality Conferenc...Mario Faria
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
From Data Platforms to Dataspaces: Enabling Data Ecosystems for Intelligent S...
From Data Platforms to Dataspaces: Enabling Data Ecosystems for Intelligent S...From Data Platforms to Dataspaces: Enabling Data Ecosystems for Intelligent S...
From Data Platforms to Dataspaces: Enabling Data Ecosystems for Intelligent S...Edward Curry
 
Komatsoulis internet2 executive track
Komatsoulis internet2 executive trackKomatsoulis internet2 executive track
Komatsoulis internet2 executive trackGeorge Komatsoulis
 
Data Mining in Operating System
Data Mining in Operating SystemData Mining in Operating System
Data Mining in Operating SystemITz_1
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in GovernmentNeo4j
 
Big data and data mining
Big data and data miningBig data and data mining
Big data and data miningPolash Halder
 
Managing environmental- molecular- and associated meta-data: The Micro B3 Inf...
Managing environmental- molecular- and associated meta-data: The Micro B3 Inf...Managing environmental- molecular- and associated meta-data: The Micro B3 Inf...
Managing environmental- molecular- and associated meta-data: The Micro B3 Inf...Renzo Kottmann
 

What's hot (19)

Data fusion for city live event detection
Data fusion for city live event detectionData fusion for city live event detection
Data fusion for city live event detection
 
Big DataParadigm, Challenges, Analysis, and Application
Big DataParadigm, Challenges, Analysis, and ApplicationBig DataParadigm, Challenges, Analysis, and Application
Big DataParadigm, Challenges, Analysis, and Application
 
Big data
Big dataBig data
Big data
 
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
 
The impact of Big Data on next generation of smart cities
The impact of Big Data on next generation of smart citiesThe impact of Big Data on next generation of smart cities
The impact of Big Data on next generation of smart cities
 
Research Topics on Data Mining
Research Topics on Data MiningResearch Topics on Data Mining
Research Topics on Data Mining
 
5
55
5
 
Next generation big data analytics state of the art
Next generation big data analytics state of the artNext generation big data analytics state of the art
Next generation big data analytics state of the art
 
Eastwood users lost
Eastwood users lostEastwood users lost
Eastwood users lost
 
New Trends and Directions in Data Science - MIT Information Quality Conferenc...
New Trends and Directions in Data Science - MIT Information Quality Conferenc...New Trends and Directions in Data Science - MIT Information Quality Conferenc...
New Trends and Directions in Data Science - MIT Information Quality Conferenc...
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
From Data Platforms to Dataspaces: Enabling Data Ecosystems for Intelligent S...
From Data Platforms to Dataspaces: Enabling Data Ecosystems for Intelligent S...From Data Platforms to Dataspaces: Enabling Data Ecosystems for Intelligent S...
From Data Platforms to Dataspaces: Enabling Data Ecosystems for Intelligent S...
 
Komatsoulis internet2 executive track
Komatsoulis internet2 executive trackKomatsoulis internet2 executive track
Komatsoulis internet2 executive track
 
Threats_Report_2013
Threats_Report_2013Threats_Report_2013
Threats_Report_2013
 
Dacena
DacenaDacena
Dacena
 
Data Mining in Operating System
Data Mining in Operating SystemData Mining in Operating System
Data Mining in Operating System
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
 
Big data and data mining
Big data and data miningBig data and data mining
Big data and data mining
 
Managing environmental- molecular- and associated meta-data: The Micro B3 Inf...
Managing environmental- molecular- and associated meta-data: The Micro B3 Inf...Managing environmental- molecular- and associated meta-data: The Micro B3 Inf...
Managing environmental- molecular- and associated meta-data: The Micro B3 Inf...
 

Similar to Data Models and the DMCA

Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...ijcsit
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...AIRCC Publishing Corporation
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docxmehek4
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docxmattinsonjanel
 
Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChris Furton
 
Sharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesSharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesKaitlin Thaney
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityTech and Law Center
 
SoK_Cryptographic_Confidentiality_of_Data_on_Mobil.pdf
SoK_Cryptographic_Confidentiality_of_Data_on_Mobil.pdfSoK_Cryptographic_Confidentiality_of_Data_on_Mobil.pdf
SoK_Cryptographic_Confidentiality_of_Data_on_Mobil.pdfJohn Shaprio
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxzmark3
 
Achieving Semantic Integration of Medical Knowledge for Clinical Decision Sup...
Achieving Semantic Integration of Medical Knowledge for Clinical Decision Sup...Achieving Semantic Integration of Medical Knowledge for Clinical Decision Sup...
Achieving Semantic Integration of Medical Knowledge for Clinical Decision Sup...AmrAlaaEldin12
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
An Optimized Stacking Ensemble Model For Phishing Websites Detection
An Optimized Stacking Ensemble Model For Phishing Websites DetectionAn Optimized Stacking Ensemble Model For Phishing Websites Detection
An Optimized Stacking Ensemble Model For Phishing Websites DetectionJoshua Gorinson
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...CSEIJJournal
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...CSEIJJournal
 
Big data is a broad term for data sets so large or complex that tr.docx
Big data is a broad term for data sets so large or complex that tr.docxBig data is a broad term for data sets so large or complex that tr.docx
Big data is a broad term for data sets so large or complex that tr.docxhartrobert670
 
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data  An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data IJECEIAES
 

Similar to Data Models and the DMCA (20)

Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
 
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge   Kamal Dahbur [email pro.docxThe Anti-Forensics Challenge   Kamal Dahbur [email pro.docx
The Anti-Forensics Challenge Kamal Dahbur [email pro.docx
 
Reseach paper-mla-sample
Reseach paper-mla-sampleReseach paper-mla-sample
Reseach paper-mla-sample
 
Unit 1.4 Research
Unit 1.4 ResearchUnit 1.4 Research
Unit 1.4 Research
 
Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacy
 
Sharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesSharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social Issues
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 
SoK_Cryptographic_Confidentiality_of_Data_on_Mobil.pdf
SoK_Cryptographic_Confidentiality_of_Data_on_Mobil.pdfSoK_Cryptographic_Confidentiality_of_Data_on_Mobil.pdf
SoK_Cryptographic_Confidentiality_of_Data_on_Mobil.pdf
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
 
Achieving Semantic Integration of Medical Knowledge for Clinical Decision Sup...
Achieving Semantic Integration of Medical Knowledge for Clinical Decision Sup...Achieving Semantic Integration of Medical Knowledge for Clinical Decision Sup...
Achieving Semantic Integration of Medical Knowledge for Clinical Decision Sup...
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
Ethical hacking1
Ethical hacking1Ethical hacking1
Ethical hacking1
 
An Optimized Stacking Ensemble Model For Phishing Websites Detection
An Optimized Stacking Ensemble Model For Phishing Websites DetectionAn Optimized Stacking Ensemble Model For Phishing Websites Detection
An Optimized Stacking Ensemble Model For Phishing Websites Detection
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 
Big data is a broad term for data sets so large or complex that tr.docx
Big data is a broad term for data sets so large or complex that tr.docxBig data is a broad term for data sets so large or complex that tr.docx
Big data is a broad term for data sets so large or complex that tr.docx
 
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data  An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
 

More from professormadison

AI and the Future of Communities - 2024 Human Futures Conference
AI and the Future of Communities - 2024 Human Futures ConferenceAI and the Future of Communities - 2024 Human Futures Conference
AI and the Future of Communities - 2024 Human Futures Conferenceprofessormadison
 
US Academic Finance 101, for Legal Education and Universities
US Academic Finance 101, for Legal Education and UniversitiesUS Academic Finance 101, for Legal Education and Universities
US Academic Finance 101, for Legal Education and Universitiesprofessormadison
 
2023 - CMU - Smart Cities lunch and learn.pdf
2023 - CMU - Smart Cities lunch and learn.pdf2023 - CMU - Smart Cities lunch and learn.pdf
2023 - CMU - Smart Cities lunch and learn.pdfprofessormadison
 
2022 - Other Internet.pptx
2022 - Other Internet.pptx2022 - Other Internet.pptx
2022 - Other Internet.pptxprofessormadison
 
2022 - European Humanities University presentation
2022 - European Humanities University presentation2022 - European Humanities University presentation
2022 - European Humanities University presentationprofessormadison
 
Intellectual Property Overview.pdf
Intellectual Property Overview.pdfIntellectual Property Overview.pdf
Intellectual Property Overview.pdfprofessormadison
 
Knowledge Commons - Project Status - Spring 2022.pdf
Knowledge Commons - Project Status - Spring 2022.pdfKnowledge Commons - Project Status - Spring 2022.pdf
Knowledge Commons - Project Status - Spring 2022.pdfprofessormadison
 
Smart Cities and Pittsburgh - Spring 2022.pdf
Smart Cities and Pittsburgh - Spring 2022.pdfSmart Cities and Pittsburgh - Spring 2022.pdf
Smart Cities and Pittsburgh - Spring 2022.pdfprofessormadison
 
Governing knowledge commons a short history and update
Governing knowledge commons   a short history and updateGoverning knowledge commons   a short history and update
Governing knowledge commons a short history and updateprofessormadison
 
Origins of knowledge commons - open science in historical perspective
Origins of knowledge commons - open science in historical perspectiveOrigins of knowledge commons - open science in historical perspective
Origins of knowledge commons - open science in historical perspectiveprofessormadison
 
Madison - TAU IP and Institutions - May 2018
Madison - TAU IP and Institutions - May 2018Madison - TAU IP and Institutions - May 2018
Madison - TAU IP and Institutions - May 2018professormadison
 
Innovation at Pitt Law Spring 2018
Innovation at Pitt Law Spring 2018Innovation at Pitt Law Spring 2018
Innovation at Pitt Law Spring 2018professormadison
 
AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commonsprofessormadison
 
Biobanks as Knowledge Institutions
Biobanks as Knowledge InstitutionsBiobanks as Knowledge Institutions
Biobanks as Knowledge Institutionsprofessormadison
 
Governing Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - MadisonGoverning Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - Madisonprofessormadison
 

More from professormadison (17)

AI and the Future of Communities - 2024 Human Futures Conference
AI and the Future of Communities - 2024 Human Futures ConferenceAI and the Future of Communities - 2024 Human Futures Conference
AI and the Future of Communities - 2024 Human Futures Conference
 
US Academic Finance 101, for Legal Education and Universities
US Academic Finance 101, for Legal Education and UniversitiesUS Academic Finance 101, for Legal Education and Universities
US Academic Finance 101, for Legal Education and Universities
 
2023 - CMU - Smart Cities lunch and learn.pdf
2023 - CMU - Smart Cities lunch and learn.pdf2023 - CMU - Smart Cities lunch and learn.pdf
2023 - CMU - Smart Cities lunch and learn.pdf
 
2022 - Other Internet.pptx
2022 - Other Internet.pptx2022 - Other Internet.pptx
2022 - Other Internet.pptx
 
2022 - European Humanities University presentation
2022 - European Humanities University presentation2022 - European Humanities University presentation
2022 - European Humanities University presentation
 
Intellectual Property Overview.pdf
Intellectual Property Overview.pdfIntellectual Property Overview.pdf
Intellectual Property Overview.pdf
 
Knowledge Commons - Project Status - Spring 2022.pdf
Knowledge Commons - Project Status - Spring 2022.pdfKnowledge Commons - Project Status - Spring 2022.pdf
Knowledge Commons - Project Status - Spring 2022.pdf
 
Smart Cities and Pittsburgh - Spring 2022.pdf
Smart Cities and Pittsburgh - Spring 2022.pdfSmart Cities and Pittsburgh - Spring 2022.pdf
Smart Cities and Pittsburgh - Spring 2022.pdf
 
Future.Law.Fall.2021.pdf
Future.Law.Fall.2021.pdfFuture.Law.Fall.2021.pdf
Future.Law.Fall.2021.pdf
 
Policy and Piracy
Policy and PiracyPolicy and Piracy
Policy and Piracy
 
Governing knowledge commons a short history and update
Governing knowledge commons   a short history and updateGoverning knowledge commons   a short history and update
Governing knowledge commons a short history and update
 
Origins of knowledge commons - open science in historical perspective
Origins of knowledge commons - open science in historical perspectiveOrigins of knowledge commons - open science in historical perspective
Origins of knowledge commons - open science in historical perspective
 
Madison - TAU IP and Institutions - May 2018
Madison - TAU IP and Institutions - May 2018Madison - TAU IP and Institutions - May 2018
Madison - TAU IP and Institutions - May 2018
 
Innovation at Pitt Law Spring 2018
Innovation at Pitt Law Spring 2018Innovation at Pitt Law Spring 2018
Innovation at Pitt Law Spring 2018
 
AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commons
 
Biobanks as Knowledge Institutions
Biobanks as Knowledge InstitutionsBiobanks as Knowledge Institutions
Biobanks as Knowledge Institutions
 
Governing Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - MadisonGoverning Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - Madison
 

Recently uploaded

Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 

Recently uploaded (20)

Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in Midlothian
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 

Data Models and the DMCA

  • 1. DATA MODELS AND THE DMCA Michael J. Madison University of Pittsburgh School of Law Symposium: The Digital Millennium Copyright Act at 20 Texas A&M University School of Law March 24, 2018
  • 2. What’s a data model? What do data models have to do with the DMCA? (given the absence of © or sui generis rights in databases)
  • 3. What’s a data model (a/k/a data structure)? No: “data,” not “algorithms,” not “Big Data” Yes: A data model determines the structure of data to be collected, stored, analyzed, shared, and processed, on their own and in relationships with data collected, etc. in other contexts. I.e.: an abstract, formal model that organizes elements of data and standardizes how they relate to each other and to real world entities they represent, and (also) a set of concepts used define the formal model.
  • 4. Example (old): P.O. Boxes “Data resides in computer memory. It is easiest to visualize computer memory as being like a wall of post office boxes. Each box has a unique numerical ‘address,’ but the content of each box can be changed at will. The computer's central processing unit (‘CPU’) can look at a location in memory specified by the address and retrieve the piece of data residing there. Alternatively, the CPU can store a piece of data at a given address. One part of a program organizes the data in such a way that the other part, which embodies the algorithm, can work with it. The more sophisticated the data organization, the more opportunity there is to employ sophisticated algorithms that run faster and do more. This organization is referred to as a data structure.” Marci A. Hamilton & Ted Sabety, Computer Science Concepts in Copyright Cases: The Path to a Coherent Law, 10 Harv. J.L. & Tech. 239, 254 (1997)
  • 5. Example (new): Big Mechanism (DARPA) B.M. “aims to develop technology to read research abstracts and papers to extract pieces of causal mechanisms, assemble these pieces into more complete causal models, and reason over these models to produce explanations. The domain of the program is cancer biology with an emphasis on signaling pathways. Although the domain of the Big Mechanism program is cancer biology, the overarching goal of the program is to develop technologies for a new kind of science in which research is integrated more or less immediately—automatically or semi- automatically—into causal, explanatory models of unprecedented completeness and consistency. Cancer pathways are just one example of causal, explanatory models.” (https://www.darpa.mil/program/big-mechanism)
  • 6. Big Mechanism (DARPA) illustrated: “Just when we need to understand highly connected systems as systems, our research methods force us to focus on little parts.” Paul Cohen, DARPA Program Manager (now Dean, Pitt School of Computing and Information) Google Books + JSTOR + PubMed Central + GenBank
  • 7. What do data models have to do with the DMCA? Solving interoperability concerns when data models are accessed, copied, modified, &/or distributed -- rather than dealing with scraping, piracy, & harvesting: 1. Protectable works (Section 102(a)/(b))? 2. Deals (e.g., ToU/ToS)? 3. Open access (e.g., NIH Public Access Policy)? 4. Fair use (Section 107/Google Books)? 5. Anti-hacking (CFAA/HiQ v LinkedIn)? 6. Interoperability under DMCA Section 1201(f)?
  • 8. DMCA: Interoperability as a limited exception §1201 (f) Reverse engineering.--(1) Notwithstanding the provisions of subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not constitute infringement under this title. (2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ technological means to circumvent a technological measure, or to circumvent protection afforded by a technological measure, in order to enable the identification and analysis under paragraph (1), or for the purpose of enabling interoperability of an independently created computer program with other programs, if such means are necessary to achieve such interoperability, to the extent that doing so does not constitute infringement under this title. (3) The information acquired through the acts permitted under paragraph (1), and the means permitted under paragraph (2), may be made available to others if the person referred to in paragraph (1) or (2), as the case may be, provides such information or means solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement under this title or violate applicable law other than this section. (4) For purposes of this subsection, the term “interoperability” means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged.
  • 9. Interoperability as a social good Technical (software/hardware) interoperabilty Sega v. Accolade (9th Cir. 1992); Lexmark Int’l v. Static Control Components (6th Cir. 2004); Chamblerain Group v. Skylink Techs. (Fed. Cir. 2004); Oracle v. Google (Fed. Cir. 2014) (?) (DMCA Section 1201(f) speaks to this; we try to limit © application to system functions) HCI (human) interoperability Lotus v. Borland (1st Cir. 1995); Oracle v. Google (Fed. Cir. 2014) (?) (DMCA is silent; © lacks an accepted vocabulary and set of policy instincts when function overlaps with human-generated meaning) Semantic interoperability Big Mechanism: data models aligned per function and also per computer- generated meaning)