Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre Mulligan, Aaron K. Perzanowski Jan 2006

The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre Mulligan, Aaron K. Perzanowski

Faculty Publications

Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers' computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect appears obviously and fundamentally misguided.

The Article first addresses the market-based rationales that likely influenced Sony BMG's deployment of these DRM systems and reveals that even the most charitable interpretation of Sony BMG's internal strategizing demonstrates a failure to adequately value security …


Digital Rights Management And The Process Of Fair Use, Timothy K. Armstrong Jan 2006

Digital Rights Management And The Process Of Fair Use, Timothy K. Armstrong

Faculty Articles and Other Publications

Producers of digital media works increasingly employ technological protection measures, commonly referred to as "digital rights management" (or "DRM") technologies, that prevent the works from being accessed or used except upon conditions the producers themselves specify. These technologies have come under criticism for interfering with the rights users enjoy under copyright law, including the right to engage in fair uses of the DRM-protected works. Most DRM mechanisms are not engineered to include exceptions for fair use, and user circumvention of the DRM may violate the Digital Millennium Copyright Act even if the use for which the circumvention occurs is itself …


Pervasively Distributed Copyright Enforcement, Julie E. Cohen Jan 2006

Pervasively Distributed Copyright Enforcement, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood …