SlideShare a Scribd company logo
Making The DMCA Work For YouThe Ten Things You Can Do (And the Two Things You Can’t) By Debbie Rose Intellectual Property Fellow Association For Competitive Technology (c) Innovators Network 2009.
DMCA Background DMCA= Digital Millennium Copyright Act which was signed into law in 1998. U.S. signed two international treaties requiring countries to make laws against unauthorized access to copyrighted works in digital format. DMCA gives copyright owners legal remedies against someone who “circumvents” or breaks digital locks used to prevent unauthorized access to or use of their works. DMCA was, and still is, controversial. (c) Innovators Network 2009.
Why Should You Care? Innovators want to create new and cool products and services. Innovation often builds on existing technology to provide access to entertainment products. Innovators of new technology need to be aware of the DMCA prohibitions and the exemptions which allow many uses of copyrighted material. Success = not sued. (c) Innovators Network 2009.
One of TWO Things You Can’t Do May not circumvent a digital lock on copyrighted material. Circumvent= descramble, decrypt, avoid, bypass, remove, deactivate or “hack” It is the electronic equivalent of breaking a digital lock. Prohibition on circumvention has been narrowly construed by the courts: 1) requires a relationship between circumvention and infringement; 2) requires protected material to be copyrighted (c) Innovators Network 2009.
Second of TWO Things You Can’t Do 2.	May not make devices intended for “hacking” or circumvention. Can’t manufacture, import, sell or offer to the public any technology, product, service, device that is primarily designed and marketed as a way to get unauthorized access to copyright works. Cable TV analogy: No black boxes.  (c) Innovators Network 2009.
The Ten Things You CAN Do AUTHORIZED ACCESS- You can circumvent to make use- such as making a copy for purposes fair use- if you have permission to access the work. INEFFECTIVE TECHNOLOGICAL MEASURE- Legal remedies available to copyright owners only if they use locks that work. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… REVERSE ENGINEERING or INTEROPERABILITY- You can circumvent if identifying and analyzing program code in order to achieve interoperability with other independently created programs. ENCRYPTION RESEARCH-  You can circumvent in order to find and analyze flaws and vulnerabilities in encryption technologies. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… SECURITY TESTING- You can circumvent to get access to a computer, system or network if engaged in good faith testing of security flaws. MAKE TOOLS THAT DO NOT MEET THE TEST- You can make tools or devices that might be capable of circumvention so long as that is not the primary purpose.  Intent is the key. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… MAKE TOOLS FOR REVERSE ENGINEERING- You can make circumvention tools necessary to analyze program code in order to achieve interoperability with independently created programs.  Example: Disassemblers and debuggers. MAKE TOOLS FOR ENCRYTION RESEARCH- You can make circumvention tools necessary to analyze flaws in encryption technologies. (c) Innovators Network 2009.
Ten Things You CAN Do, cont… MAKE TOOLS FOR SECURITY TESTING- You can develop tools to allow you to access a computer, system or network for testing a security flaw. CAN REQUEST NEW EXEMPTIONS- DMCA includes a “safety net” which allows the public to request new exemptions every three years.  Must show DMCA is or is likely to adversely affect ability to make fair use. Six more exemptions in effect through 2009. (c) Innovators Network 2009.
Here’s a Hypothetical Product: Service to restore access to legitimately acquired music, movies, games, software, or books from an out of business online entertainment service.  Problem: Discover that product has the ability to access content not legally acquired. Question: Does this product violate the DMCA?   Answer: Maybe not.   (c) Innovators Network 2009.
Check List Primary Purpose- Was device primarily designed to enable unauthorized access to copyrighted works? Commercially Significant Purpose- Does device have limited commercially significant value other than “hacking”? Marketing the Product- Does marketing of device focus on “hacking” functions? Corrective Actions- Did I stop distributing device when I learned it was primarily being used to circumvent? (c) Innovators Network 2009.
Example: Blizzard v. Samba Blizzard- Violated the DMCA because it violated software licenses against reverse engineering and the purpose of the product was to avoid restricted access, not to enable interoperability of independent program. Samba- Did not violate DMCA because it didn’t violate license restrictions, used a network sniffing tool, distributed an independently created program, and the product did not constitute copyright infringement. (c) Innovators Network 2009.
Conclusion Ten years of exponential growth in technology since the DMCA was enacted. As always, talk to a lawyer. Hopefully, this will encourage you to jump onto the technology super highway , knowing that there are lots of ways to develop great new products and services that will bring you success and enhance the lives of people everywhere! (c) Innovators Network 2009.

More Related Content

What's hot

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiplarkinsa
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
Loraine Kaye Franco
 
Digital Millennium Copyright
Digital Millennium CopyrightDigital Millennium Copyright
Digital Millennium Copyright
Renee Hobbs
 
Digital millennium copyright act
Digital millennium copyright actDigital millennium copyright act
Digital millennium copyright act
mw15beye
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
WCU_Becca
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
Upekha Vandebona
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual property
Tawfig Tawill
 
Intellectual property in cyberspace
Intellectual property in cyberspaceIntellectual property in cyberspace
Intellectual property in cyberspace
HrishikeshBhorde
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
rkpv2002
 
Copyright Issues in Digitisation
Copyright Issues in DigitisationCopyright Issues in Digitisation
Copyright Issues in Digitisation
Alastair Dunning
 
Legal issues
Legal issuesLegal issues
Legal issues
DecardoDay
 
Copyright In The Arts Presentation
Copyright In The Arts PresentationCopyright In The Arts Presentation
Copyright In The Arts Presentation
Robert Cogan
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
Jonathan Ezor
 
Software copyright
Software copyrightSoftware copyright
Software copyright
Roshan Chaudhary
 
Playing The Patent Game
Playing The Patent GamePlaying The Patent Game
Playing The Patent Game
Andrew Wong
 
Copyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional ElementsCopyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional Elements
Jan Lindberg
 
Software Patents: Solutions for Developers
Software Patents: Solutions for DevelopersSoftware Patents: Solutions for Developers
Software Patents: Solutions for Developers
freedeb
 
IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...
Tom Webster
 

What's hot (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Digital Millennium Copyright
Digital Millennium CopyrightDigital Millennium Copyright
Digital Millennium Copyright
 
Digital millennium copyright act
Digital millennium copyright actDigital millennium copyright act
Digital millennium copyright act
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Lecture 03 intellectual property
Lecture 03   intellectual propertyLecture 03   intellectual property
Lecture 03 intellectual property
 
Intellectual property in cyberspace
Intellectual property in cyberspaceIntellectual property in cyberspace
Intellectual property in cyberspace
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
 
Copyright Issues in Digitisation
Copyright Issues in DigitisationCopyright Issues in Digitisation
Copyright Issues in Digitisation
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Copyright In The Arts Presentation
Copyright In The Arts PresentationCopyright In The Arts Presentation
Copyright In The Arts Presentation
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Playing The Patent Game
Playing The Patent GamePlaying The Patent Game
Playing The Patent Game
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Copyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional ElementsCopyright Protection of a Software as a Work with Functional Elements
Copyright Protection of a Software as a Work with Functional Elements
 
Software Patents: Solutions for Developers
Software Patents: Solutions for DevelopersSoftware Patents: Solutions for Developers
Software Patents: Solutions for Developers
 
IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...
 

Viewers also liked

Microsoft Power Point Presentatie1
Microsoft Power Point   Presentatie1Microsoft Power Point   Presentatie1
Microsoft Power Point Presentatie1joostdevos
 
Senior Olympic Speech
Senior Olympic SpeechSenior Olympic Speech
Senior Olympic Speechdiscdogbob
 
Is your job a pain in your neck?
Is your job a pain in your neck?Is your job a pain in your neck?
Is your job a pain in your neck?
discdogbob
 
Enterprise Of The Future
Enterprise Of The FutureEnterprise Of The Future
Enterprise Of The Future
Wout Hofman
 
Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007
guest9a4944a2
 
Business Case RF techonology
Business Case RF techonologyBusiness Case RF techonology
Business Case RF techonology
Wout Hofman
 
Graphic Design_RT
Graphic Design_RTGraphic Design_RT
Graphic Design_RT
Roberta Tomaselli
 
Nup04102010
Nup04102010Nup04102010
Nup04102010
Wout Hofman
 

Viewers also liked (9)

Microsoft Power Point Presentatie1
Microsoft Power Point   Presentatie1Microsoft Power Point   Presentatie1
Microsoft Power Point Presentatie1
 
Senior Olympic Speech
Senior Olympic SpeechSenior Olympic Speech
Senior Olympic Speech
 
Is your job a pain in your neck?
Is your job a pain in your neck?Is your job a pain in your neck?
Is your job a pain in your neck?
 
Enterprise Of The Future
Enterprise Of The FutureEnterprise Of The Future
Enterprise Of The Future
 
Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007Approach Presentation Hyperlinks 05292007
Approach Presentation Hyperlinks 05292007
 
Business Case RF techonology
Business Case RF techonologyBusiness Case RF techonology
Business Case RF techonology
 
Graphic Design_RT
Graphic Design_RTGraphic Design_RT
Graphic Design_RT
 
Nup04102010
Nup04102010Nup04102010
Nup04102010
 
Portfolio_Illustrations
Portfolio_IllustrationsPortfolio_Illustrations
Portfolio_Illustrations
 

Similar to What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't

Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)
ElaineLee
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
KISHOYIANKISH
 
IP Compliance.ppt
IP Compliance.pptIP Compliance.ppt
IP Compliance.ppt
JyotiSahu198888
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010dixieyeager
 
Ip in it
Ip in itIp in it
Ip in it
IP Dome
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014dixieyeager
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)
guest757c2c1
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
jameshagwen
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...Evangeline
 
Digital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignDigital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignMassimo Menichinelli
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
Neil Witt
 
Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companies
Johan Örneblad
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdf
NeelHope
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
Rajalingam Balakrishnan
 
093049ov16.pptx
093049ov16.pptx093049ov16.pptx
093049ov16.pptx
NguyenNM
 
Copyright 1 draft
Copyright 1 draftCopyright 1 draft
Copyright 1 draft
sgetchel
 
Copyright draft
Copyright draftCopyright draft
Copyright draft
sgetchel
 

Similar to What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't (20)

Drm
DrmDrm
Drm
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)
 
Digital rights management
Digital rights managementDigital rights management
Digital rights management
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
IP Compliance.ppt
IP Compliance.pptIP Compliance.ppt
IP Compliance.ppt
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Ip in it
Ip in itIp in it
Ip in it
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)Leage For Programming Freedom. Against Software Patents. (1991)
Leage For Programming Freedom. Against Software Patents. (1991)
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
A Reverse Notice & Takedown Regime to Enable Public Interest Uses of Technica...
 
Digital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignDigital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open Design
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Controlling the value in software companies
Controlling the value in software companiesControlling the value in software companies
Controlling the value in software companies
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdf
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
093049ov16.pptx
093049ov16.pptx093049ov16.pptx
093049ov16.pptx
 
Copyright 1 draft
Copyright 1 draftCopyright 1 draft
Copyright 1 draft
 
Copyright draft
Copyright draftCopyright draft
Copyright draft
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

What You Can Do Under the DMCA--And the Two (Yes, Just TWO) That You Can't

  • 1. Making The DMCA Work For YouThe Ten Things You Can Do (And the Two Things You Can’t) By Debbie Rose Intellectual Property Fellow Association For Competitive Technology (c) Innovators Network 2009.
  • 2. DMCA Background DMCA= Digital Millennium Copyright Act which was signed into law in 1998. U.S. signed two international treaties requiring countries to make laws against unauthorized access to copyrighted works in digital format. DMCA gives copyright owners legal remedies against someone who “circumvents” or breaks digital locks used to prevent unauthorized access to or use of their works. DMCA was, and still is, controversial. (c) Innovators Network 2009.
  • 3. Why Should You Care? Innovators want to create new and cool products and services. Innovation often builds on existing technology to provide access to entertainment products. Innovators of new technology need to be aware of the DMCA prohibitions and the exemptions which allow many uses of copyrighted material. Success = not sued. (c) Innovators Network 2009.
  • 4. One of TWO Things You Can’t Do May not circumvent a digital lock on copyrighted material. Circumvent= descramble, decrypt, avoid, bypass, remove, deactivate or “hack” It is the electronic equivalent of breaking a digital lock. Prohibition on circumvention has been narrowly construed by the courts: 1) requires a relationship between circumvention and infringement; 2) requires protected material to be copyrighted (c) Innovators Network 2009.
  • 5. Second of TWO Things You Can’t Do 2. May not make devices intended for “hacking” or circumvention. Can’t manufacture, import, sell or offer to the public any technology, product, service, device that is primarily designed and marketed as a way to get unauthorized access to copyright works. Cable TV analogy: No black boxes. (c) Innovators Network 2009.
  • 6. The Ten Things You CAN Do AUTHORIZED ACCESS- You can circumvent to make use- such as making a copy for purposes fair use- if you have permission to access the work. INEFFECTIVE TECHNOLOGICAL MEASURE- Legal remedies available to copyright owners only if they use locks that work. (c) Innovators Network 2009.
  • 7. Ten Things You CAN Do, cont… REVERSE ENGINEERING or INTEROPERABILITY- You can circumvent if identifying and analyzing program code in order to achieve interoperability with other independently created programs. ENCRYPTION RESEARCH- You can circumvent in order to find and analyze flaws and vulnerabilities in encryption technologies. (c) Innovators Network 2009.
  • 8. Ten Things You CAN Do, cont… SECURITY TESTING- You can circumvent to get access to a computer, system or network if engaged in good faith testing of security flaws. MAKE TOOLS THAT DO NOT MEET THE TEST- You can make tools or devices that might be capable of circumvention so long as that is not the primary purpose. Intent is the key. (c) Innovators Network 2009.
  • 9. Ten Things You CAN Do, cont… MAKE TOOLS FOR REVERSE ENGINEERING- You can make circumvention tools necessary to analyze program code in order to achieve interoperability with independently created programs. Example: Disassemblers and debuggers. MAKE TOOLS FOR ENCRYTION RESEARCH- You can make circumvention tools necessary to analyze flaws in encryption technologies. (c) Innovators Network 2009.
  • 10. Ten Things You CAN Do, cont… MAKE TOOLS FOR SECURITY TESTING- You can develop tools to allow you to access a computer, system or network for testing a security flaw. CAN REQUEST NEW EXEMPTIONS- DMCA includes a “safety net” which allows the public to request new exemptions every three years. Must show DMCA is or is likely to adversely affect ability to make fair use. Six more exemptions in effect through 2009. (c) Innovators Network 2009.
  • 11. Here’s a Hypothetical Product: Service to restore access to legitimately acquired music, movies, games, software, or books from an out of business online entertainment service. Problem: Discover that product has the ability to access content not legally acquired. Question: Does this product violate the DMCA? Answer: Maybe not. (c) Innovators Network 2009.
  • 12. Check List Primary Purpose- Was device primarily designed to enable unauthorized access to copyrighted works? Commercially Significant Purpose- Does device have limited commercially significant value other than “hacking”? Marketing the Product- Does marketing of device focus on “hacking” functions? Corrective Actions- Did I stop distributing device when I learned it was primarily being used to circumvent? (c) Innovators Network 2009.
  • 13. Example: Blizzard v. Samba Blizzard- Violated the DMCA because it violated software licenses against reverse engineering and the purpose of the product was to avoid restricted access, not to enable interoperability of independent program. Samba- Did not violate DMCA because it didn’t violate license restrictions, used a network sniffing tool, distributed an independently created program, and the product did not constitute copyright infringement. (c) Innovators Network 2009.
  • 14. Conclusion Ten years of exponential growth in technology since the DMCA was enacted. As always, talk to a lawyer. Hopefully, this will encourage you to jump onto the technology super highway , knowing that there are lots of ways to develop great new products and services that will bring you success and enhance the lives of people everywhere! (c) Innovators Network 2009.