Anti-circumvention

Last updated

Anti-circumvention refers to laws which prohibit the circumvention of technological barriers for using a digital good in certain ways which the rightsholders do not wish to allow. The requirement for anti-circumvention laws was globalized in 1996 with the creation of the World Intellectual Property Organization's Copyright Treaty.

Contents

Background

Article 11 of WIPO Copyright Treaty "Obligations concerning Technological Measures" requires contracting parties to

"...provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law."

Article 12 of WIPO Copyright Treaty "Obligations concerning Rights Management Information" requires contracting parties to

"...provide adequate and effective legal remedies against any person knowingly performing any of the following acts knowing, or with respect to civil remedies having reasonable grounds to know, that it will induce, enable, facilitate or conceal an infringement of any right covered by this Treaty or the Berne Convention:

(i) to remove or alter any electronic rights management information without permission;

(ii) to distribute, import for distribution, broadcast or communicate to the public, without authority, works or copies of works knowing that electronic rights management information has been removed or altered without authority."

Law by region

European Union

The following anti-circumventing rules were implemented in European Directive 2001/29/EC of the European Parliament and of the council of May 22, 2001 on the harmonisation of certain aspects of copyright and related rights in the information society.

This directive states in article 6, 'Obligations as to technological measures':

  1. Member States shall provide adequate legal protection against the circumvention of any effective technological measures, which the person concerned carries out in the knowledge, or with reasonable grounds to know, that he or she is pursuing that objective.
  2. Member States shall provide adequate legal protection against the manufacture, import, distribution, sale, rental, advertisement for sale or rental, or possession for commercial purposes of devices, products or components or the provision of services which:
    • (a) are promoted, advertised or marketed for the purpose of circumvention of, or
    • (b) have only a limited commercially significant purpose or use other than to circumvent, or
    • (c) are primarily designed, produced, adapted or performed for the purpose of enabling or facilitating the circumvention of, any effective technological measures.
  3. For the purposes of this Directive, the expression 'technological measures' means any technology, device or component that, in the normal course of its operation, is designed to prevent or restrict acts, in respect of works or other subject matter, which are not authorised by the rights holder of any copyright or any right related to copyright as provided for by law or the sui generis right provided for in Chapter III of Directive 96/9/EC. Technological measures shall be deemed 'effective' where the use of a protected work or other subject matter is controlled by the rights holders through application of an access control or protection process, such as encryption, scrambling or other transformation of the work or other subject-matter or a copy control mechanism, which achieves the protection objective.
  4. Notwithstanding the legal protection provided for in paragraph 1, in the absence of voluntary measures taken by rights holders, including agreements between rights holders and other parties concerned, Member States shall take appropriate measures to ensure that rights holders make available to the beneficiary of an exception or limitation provided for in national law in accordance with Article 5(2)(a), (2)(c), (2)(d), (2)(e), (3)(a), (3)(b) or (3)(e) the means of benefiting from that exception or limitation, to the extent necessary to benefit from that exception or limitation and where that beneficiary has legal access to the protected work or subject-matter concerned. (...)

United States

In the United States, the Digital Millennium Copyright Act ("DMCA") has implemented the treaty provisions regarding the circumvention of some technological barriers to copying intellectual property.

Circumvention of Access Controls

Section 103 (17 U.S.C Sec. 1201(a)(1)) of the DMCA states:

No person shall circumvent a technological measure that effectively controls access to a work protected under this title.

The Act defines what it means in Section 1201(a)(3):

(3) As used in this subsection—

(A) to "circumvent a technological measure" means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and

(B) a technological measure "effectively controls access to a work" if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.

Thus, if there is some "technological measure that effectively controls access to a work", it is illegal to circumvent that measure. However, Section 1201 creates several exceptions to this rule, and the Library of Congress is empowered to create additional exceptions.

Distribution of Circumvention Tools

The Act also prohibits the distribution of tools that enable a user to circumvent access controls or controls that protect a right of the copyright holder.

Access Controls

17 U.S.C. Sec. 1201 (a)(2) provides:

(2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that— (A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title; (B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or

(C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title.

Rights Controls

Distribution of tools intended to circumvent controls that protect a right of the copyright holder is also prohibited. 17 U.S.C. Sec. 1201 (b) states:

(1) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that— (A) is primarily designed or produced for the purpose of circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof;

(B) has only limited commercially significant purpose or use other than to circumvent protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof; or

(C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof.

A rights control is defined in 17 U.S.C. Sec. 1201 (b)(2) (B):

a technological measure "effectively protects a right of a copyright owner under this title" if the measure, in the ordinary course of its operation, prevents, restricts, or otherwise limits the exercise of a right of a copyright owner under this title.

Unlike access controls, the DMCA does not ban the circumvention of rights controls. It was thought that traditional copyright law was sufficient to protect the interests of copyright holders in cases of individual acts of circumvention. [1]

Other Rights

The Act states that its provisions are not intended to modify a number of already existing rights. Section 1201(c) provides:

(c) Other Rights, Etc., Not Affected.—

(1) Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title. (2) Nothing in this section shall enlarge or diminish vicarious or contributory liability for copyright infringement in connection with any technology, product, service, device, component, or part thereof. (3) Nothing in this section shall require that the design of, or design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological measure, so long as such part or component, or the product in which such part or component is integrated, does not otherwise fall within the prohibitions of subsection (a)(2) or (b)(1).

(4) Nothing in this section shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products.

Fair Use and Circumvention

Critics of the DMCA have often noted the absence of an explicit exception for circumvention to enable fair use. [2] [3] [4]

Section 103(c)(1) of the DMCA (17 U.S.C. Sec. 1201 (c)(1)) does state that [n]othing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title. However, a violation of the anti-circumvention provisions of the DMCA is not itself copyright infringement and therefore it is unclear whether fair use can be raised as a defense in circumvention cases.

Courts have come out both ways on the issue. Some have held that the anti-circumvention provisions can only be violated when the circumvention has a connection to copyright infringement. For example, in Storage Tech. Corp. v. Custom Hardware Eng'g & Consulting, Inc., 421 F.3d 1307, 1318-19 (Fed. Cir. 2005) the Federal Circuit held that a copyright holder must show a connection to copyright infringement in order to succeed in a claim under the DMCA.

Similarly, in Chamberlain Group, Inc. v. Skylink Technologies, Inc. 381 F.3d 1178 (Fed. Cir. 2004) the court held that distribution of a circumvention device (in that case a garage door opener) did not violate the anti-circumvention provisions because its use did not lead to any copyright violation.

However, in a number of cases involving DVD decryption courts have held that there is no fair use defense in circumvention cases. In Universal City Studios v. Reimerdes, 111 F. Supp. 2d 294, 322 (S.D.N.Y. 2000), the court stated that "[i]f Congress had meant the fair use defense to apply to such actions, it would have said so." [5]

Reverse Engineering and Circumvention

Sec. 103(f) of the DMCA (17 U.S.C. § 1201 (f)) says that you are allowed to reverse-engineer a protected program in order to figure out how to get it to interoperate (i.e., exchange and make use of information) with other programs.. The section states:

(f) Reverse Engineering.— (1) Notwithstanding the provisions of subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not constitute infringement under this title. (2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ technological means to circumvent a technological measure, or to circumvent protection afforded by a technological measure, in order to enable the identification and analysis under paragraph (1), or for the purpose of enabling interoperability of an independently created computer program with other programs, if such means are necessary to achieve such interoperability, to the extent that doing so does not constitute infringement under this title. (3) The information acquired through the acts permitted under paragraph (1), and the means permitted under paragraph (2), may be made available to others if the person referred to in paragraph (1) or (2), as the case may be, provides such information or means solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement under this title or violate applicable law other than this section. (4) For purposes of this subsection, the term "interoperability" means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged.

Notable cases

Criticism

The Electronic Frontier Foundation (EFF) criticized DMCA anti-circumvention clauses, saying it "chills free expression and scientific research", jeopardizes fair use, impedes competition and innovation, and interferes with computer intrusion laws. [6]

Australia

Australia prohibits circumvention of "access control technical protection measures" in Section 116 of the Copyright Act. The law currently imposes penalties for circumvention of such measures [7] as well as the manufacturing [8] and distribution [9] of tools to enable it.

DRM may be legally circumvented under a few distinct circumstances which are named as exceptions in the law:

  1. permission of the rightsholder
  2. enabling interoperability with copyrighted software
  3. encryption research
  4. security testing
  5. disabling access to private information (circumvention only)
  6. national security or law enforcement
  7. library acquisition decisions (circumvention only)
  8. acts prescribed by regulation (circumvention only)

A person circumventing the access control bears the burden of proof that one of these exceptions apply.

Penalties for violation of the anti-circumvention laws include an injunction, monetary damages, and destruction of enabling devices. [10]

Notable cases

  • Stevens v. Sony, holding that a device allowing PlayStations to play games with a different region code did not violate the anti-circumvention laws, because the mechanism in the PlayStation did not directly prevent the infringement of copyright.

Related Research Articles

The World Intellectual Property Organization Copyright Treaty is an international treaty on copyright law adopted by the member states of the World Intellectual Property Organization (WIPO) in 1996. It provides additional protections for copyright to respond to advances in information technology since the formation of previous copyright treaties before it. The WCT and WIPO Performances and Phonograms Treaty, are together termed WIPO "internet treaties".

Modchip Device used to disable artificial restrictions in video game consoles

A modchip is a small electronic device used to alter or disable artificial restrictions of computers or entertainment devices. Modchips are mainly used in video game consoles, but also in some DVD or Blu-ray players. They introduce various modifications to its host system's function, including the circumvention of region coding, digital rights management, and copy protection checks for the purpose of using media intended for other markets, copied media, or unlicensed third-party (homebrew) software.

The Digital Media Consumers' Rights Act (DMCRA) was a proposed law in the United States that directly challenges portions of the Digital Millennium Copyright Act, and would intensify Federal Trade Commission efforts to mandate proper labeling for copy-protected CDs to ensure consumer protection from deceptive labeling practices. It would also allow manufacturers to innovate in hardware designs and allow consumers to treat CDs as they have historically been able to treat them.

Limitations on exclusive rights: Computer programs is the title of the current form of section 117 of the U.S. Copyright Act. In United States copyright law, it provides users with certain adaptation rights for computer software that they own.

Ripping is extracting all or parts of digital contents from a container. Originally it meant to rip music out of Amiga games. Later the term was used to extract WAV or MP3 format files from digital audio CDs, but got applied as well to extract the contents of any media, most notably DVD and Blu-ray discs.

<i>Chamberlain Group, Inc. v. Skylink Technologies, Inc.</i> American legal case concerning the DMCA

The Chamberlain Group, Inc. v. Skylink Technologies, Inc., 381 F.3d 1178 is a legal case heard by the United States Court of Appeals for the Federal Circuit concerning the anti-trafficking provision of the Digital Millennium Copyright Act (DMCA), 17 U.S.C. § 1201(a)(2), in the context of two competing universal garage door opener companies. It discusses the statutory structure and legislative history of the DMCA to help clarify the intent of the anti-circumvention provisions and decide who holds the burden of proof. It expresses that the statute creates a cause of action for liability and does not create a property right, and holds that as Chamberlain had alleged that Skylink was in violation of the anti-trafficking provision, it had the burden to prove and failed to show that access was unauthorized and its rights were infringed under the Copyright Act. As Chamberlain incorrectly argued that Skylink had the burden of proof and failed to prove their claim, the court upheld summary judgment in favor of Skylink.

An Act to amend the Copyright Act was a proposed law to amend the Copyright Act initiated by the Government of Canada in the First Session of the Thirty-Eighth Parliament. Introduced by the Minister of Canadian Heritage and Minister responsible for Status of Women Liza Frulla and then Minister of Industry David Emerson as An Act to Amend the Copyright Act, it received its First Reading in the House of Commons of Canada on June 20, 2005. On November 29, 2005, the opposition to the government tabled a non-confidence motion which passed, dissolving Parliament and effectively killing the bill. The subsequent government tabled a similar bill called C-61.

Paracopyright is legal protection above and beyond traditional copyright. The most often cited example is "legal protection for technical measures" from the 1996 WIPO Internet treaties. Paracopyright provisions in these treaties are not about the term or scope of copyright, but instead are about providing legal protections for the technologies that may be used by copyright holders.

Lexmark International, Inc. v. Static Control Components, Inc., is an American legal case involving the computer printer company Lexmark, which had designed an authentication system using a microcontroller so that only authorized toner cartridges could be used. The resulting litigation has resulted in significant decisions affecting United States intellectual property and trademark law.

Copyright and Related Rights Regulations 2003 United Kingdom legislation

The Copyright and Related Rights Regulations 2003 transpose the Information Society Directive "(Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society)",, into United Kingdom law. As such, its main effects are to modify the Copyright, Designs and Patents Act 1988 c. 48 with minor consequential modifications to other Acts and secondary legislation.

FAIR USE Act

The "Freedom and Innovation Revitalizing United States Entrepreneurship Act of 2007" was a proposed United States copyright law that would have amended Title 17 of the U.S. Code, including portions of the Digital Millennium Copyright Act (DMCA) to "promote innovation, to encourage the introduction of new technology, to enhance library preservation efforts, and to protect the fair use rights of consumers, and for other purposes." The bill would prevent courts from holding companies financially liable for copyright infringement stemming from the use of their hardware or software, and proposes six permanent circumvention exemptions to the DMCA.

Information Society Directive

The Information Society Directive is a directive of the European Union that was enacted to implement the WIPO Copyright Treaty and to harmonise aspects of copyright law across Europe, such as copyright exceptions. The directive was first enacted in 2001 under the internal market provisions of the Treaty of Rome.

Online Copyright Infringement Liability Limitation Act

The Online Copyright Infringement Liability Limitation Act (OCILLA) is United States federal law that creates a conditional 'safe harbor' for online service providers (OSP) by shielding them for their own acts of direct copyright infringement as well as shielding them from potential secondary liability for the infringing acts of others. OCILLA was passed as a part of the 1998 Digital Millennium Copyright Act (DMCA) and is sometimes referred to as the "Safe Harbor" provision or as "DMCA 512" because it added Section 512 to Title 17 of the United States Code. By exempting Internet intermediaries from copyright infringement liability provided they follow certain rules, OCILLA attempts to strike a balance between the competing interests of copyright owners and digital users.

The WIPO Copyright and Performances and Phonograms Treaties Implementation Act, is a part of the Digital Millennium Copyright Act (DMCA), a 1998 U.S. law. It has two major portions, Section 102, which implements the requirements of the WIPO Copyright Treaty, and Section 103, which arguably provides additional protection against the circumvention of copy prevention systems and prohibits the removal of copyright management information.

Digital rights management (DRM) tools or technological protection measures (TPM) are a set of access control technologies for restricting the use of proprietary hardware and copyrighted works. DRM technologies try to control the use, modification, and distribution of copyrighted works, as well as systems within devices that enforce these policies.

Digital Millennium Copyright Act Copyright law in the United States of America

The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. Passed on October 12, 1998, by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while limiting the liability of the providers of online services for copyright infringement by their users.

<i>Facebook, Inc. v. Power Ventures, Inc.</i> Lawsuit brought by Facebook in the United States District Court for the Northern District of California

Facebook, Inc. v. Power Ventures, Inc. is a lawsuit brought by Facebook in the United States District Court for the Northern District of California alleging that Power Ventures Inc., a third-party platform, collected user information from Facebook and displayed it on their own website. Facebook claimed violations of the CAN-SPAM Act, the Computer Fraud and Abuse Act ("CFAA"), and the California Comprehensive Computer Data Access and Fraud Act. According to Facebook, Power Ventures Inc. made copies of Facebook's website during the process of extracting user information. Facebook argued that this process causes both direct and indirect copyright infringement. In addition, Facebook alleged this process constitutes a violation of the Digital Millennium Copyright Act ("DMCA"). Finally, Facebook also asserted claims of both state and federal trademark infringement, as well as a claim under California's Unfair Competition Law ("UCL").

Rooting (Android) Modification of Android devices to gain root access

Rooting is the process of allowing users of smartphones, tablets and other devices running the Android mobile operating system to attain privileged control over various Android subsystems. As Android uses the Linux kernel, rooting an Android device gives similar access to administrative (superuser) permissions as on Linux or any other Unix-like operating system such as FreeBSD or macOS.

<i>321 Studios v. Metro Goldwyn Mayer Studios, Inc.</i> legal case

321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F. Supp. 2d 1085, is a district court case brought by 321 Studios seeking declaratory judgment from the court that their DVD ripping software, i.e. DVD Copy Plus and DVD X Copy do not violate the provisions of the Digital Millennium Copyright Act ("DMCA"), or, in the alternative, that the DMCA is unconstitutional because Congress exceeded its enumerated powers, these provisions are unconstitutionally vague and/or violate the First Amendment.

Remedies for copyright infringement in the United States can be either civil or criminal in nature. Criminal remedies for copyright infringement prevent the unauthorized use of copyrighted works by defining certain violations of copyright to be criminal wrongs which are liable to be prosecuted and punished by the state. Unlike civil remedies, which are obtained through private civil actions initiated by the owner of the copyright, criminal remedies are secured by the state which prosecutes the infringing individual or organisation.

References

  1. For example, the Senate Report on the DMCA states that "[i]t is anticipated that most acts of circumventing a technological copyright protection measure will occur in the course of conduct which itself implicates the copyright owners[©] rights under title 17. This subsection is not intended in any way to enlarge or diminish those rights. Thus, for example, where a copy control technology is employed to prevent unauthorized reproduction of a work, the circumvention of that technology would not itself be actionable under 1201, but any reproduction of the work that is thereby facilitated would remain subject to the protections embodied in title 17.
  2. "Whitepapers". Electronic Frontier Foundation.
  3. "Towards More Sensible Anti-Circumvention Regulations" (PDF).
  4. A Riff on Fair Use in the Digital Millennium Copyright Act by David Nimmer (2000)
  5. Similar cases include 321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F.Supp.2d 1085, 1101-02 (N.D. Cal. 2004) and RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311, at *8 (W.D. Wash. Jan. 18, 2000).
  6. "DMCA". Electronic Frontier Foundation website. Accessed 30 March 2012.
  7. "COPYRIGHT ACT 1968 - SECT 116AN Circumventing an access control technological protection measure".
  8. "COPYRIGHT ACT 1968 - SECT 116AO Manufacturing etc. a circumvention device for a technological protection measure".
  9. "COPYRIGHT ACT 1968 - SECT 116AP Providing etc. a circumvention service for a technological protection measure".
  10. "COPYRIGHT ACT 1968 - SECT 116AQ Remedies in actions under this Subdivision".