Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Locks & Levies, Jeremy F. De Beer Sep 2006

Locks & Levies, Jeremy F. De Beer

Jeremy de Beer

This paper explores two ways that law can influence the creation and distribution of digital content. Specifically, it looks at the relationship between (1) prohibitions against circumventing technological protection measures (TPMs) and (2) levies on products or services used to reproduce or transmit digital materials. The relationship between digital locks and levies is analyzed through a comparative study of developments in Canada and the United States. Canada has created a broad levy (compared to the United States) to address the issue of private copying. Canada has not, so far, enacted specific anti-circumvention legislation like the Digital Millennium Copyright Act (DMCA). …


A Technological Theory Of The Arms Race, Lee Kovarsky Jul 2006

A Technological Theory Of The Arms Race, Lee Kovarsky

Indiana Law Journal

Although the "technological arms race" has recently emerged as a vogue-ish piece of legal terminology, scholarship has quite conspicuously failed to explore the phenomenon systematically. What are "technological" arms races? Why do they happen? Does the recent spike in scholarly attention actually reflect their novelty? Are they always inefficient? How do they differ from military ones? What role can legal institutions play in slowing them down?

In this Article I seek to answer these questions. I argue that copyright enforcement and self-help represent substitutable tactics for regulating access to expressive assets, and that the efficacy of each tactic depends on …


Reverse Engineering Of Computer Programs Under The Dmca: Recognizing A "Fair Access" Defense, Donna L. Lee Jul 2006

Reverse Engineering Of Computer Programs Under The Dmca: Recognizing A "Fair Access" Defense, Donna L. Lee

Marquette Intellectual Property Law Review

Courts have consistently held that reverse engineering constitutes fair use under the Copyright Act. When Congress enacted the DMCA, it intended to codify the settled law. Nonetheless, the exemption Congress carved out for reverse engineering in the DMCA is too narrowly crafted to accommodate the many different purposes of reverse engineering. This Comment suggests that courts should develop a fair access defense for reverse engineering undertaken for purposes that do not satisfy the requirements of the DMCA exemption but do enable other, fair use-defensible uses of computer programs. The Comment outlines three factors to consider in applying a fair access …


Super-Grokster: Untangling Secondary Liability, Comic Book Heroes And The Dmca, And A Filtering Solution For Infringing Digital Creations, Britton Payne Mar 2006

Super-Grokster: Untangling Secondary Liability, Comic Book Heroes And The Dmca, And A Filtering Solution For Infringing Digital Creations, Britton Payne

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster Feb 2006

The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster

ExpressO

As patent protection has emerged to protect software, courts and commentators have mistakenly focused on copyright law and overlooked the centrality of patent preemption to limit contract law where a mass market license which prohibits reverse engineering (RE) for purposes of developing interoperable products leads to patent-like protection. Review of copyright fair use cases on RE and Congress’s policy favoring RE for interoperability purposes in the Digital Millennium Copyright Act reinforce the case for patent preemption. Also, the fundamental freedom to RE embodied in state trade secret law, coupled with federal patent and copyright law and policies, cumulatively should override …


The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre Mulligan, Aaron K. Perzanowski Jan 2006

The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre Mulligan, Aaron K. Perzanowski

Faculty Publications

Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers' computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect appears obviously and fundamentally misguided.

The Article first addresses the market-based rationales that likely influenced Sony BMG's deployment of these DRM systems and reveals that even the most charitable interpretation of Sony BMG's internal strategizing demonstrates a failure to adequately value security …


Digital Rights Management And The Process Of Fair Use, Timothy K. Armstrong Jan 2006

Digital Rights Management And The Process Of Fair Use, Timothy K. Armstrong

Faculty Articles and Other Publications

Producers of digital media works increasingly employ technological protection measures, commonly referred to as "digital rights management" (or "DRM") technologies, that prevent the works from being accessed or used except upon conditions the producers themselves specify. These technologies have come under criticism for interfering with the rights users enjoy under copyright law, including the right to engage in fair uses of the DRM-protected works. Most DRM mechanisms are not engineered to include exceptions for fair use, and user circumvention of the DRM may violate the Digital Millennium Copyright Act even if the use for which the circumvention occurs is itself …


Freedom Of Information Laws In The Digital Age: The Death Knell Of Information Privacy, Ira Bloom Jan 2006

Freedom Of Information Laws In The Digital Age: The Death Knell Of Information Privacy, Ira Bloom

Richmond Journal of Law & Technology

With technology, everything just comes faster, smarter, and meaner. But the basics remain the same.


How To Give An Old Song A New License: A Recently Adopted Alternative To Rodgers And Hammerstein Organization V. Umg Recordings, Jacqueline M. Allshouse-Hutchens Jan 2006

How To Give An Old Song A New License: A Recently Adopted Alternative To Rodgers And Hammerstein Organization V. Umg Recordings, Jacqueline M. Allshouse-Hutchens

Kentucky Law Journal

No abstract provided.


Pervasively Distributed Copyright Enforcement, Julie E. Cohen Jan 2006

Pervasively Distributed Copyright Enforcement, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood …


A Technological Theory Of The Arms Race, Lee B. Kovarsky Dec 2005

A Technological Theory Of The Arms Race, Lee B. Kovarsky

Lee Kovarsky

Although the 'technological arms race' has recently emerged as a vogue-ish piece of legal terminology, scholarship has quite conspicuously failed to explore the phenomenon systematically. What are 'technological' arms races? Why do they happen? Does the recent spike in scholarly attention actually reflect their novelty? Are they always inefficient? How do they differ from military ones? What role can legal institutions play in slowing them down? In this Article I seek to answer these questions. I argue that copyright enforcement and self-help represent substitutable tactics for regulating access to expressive assets, and that the efficacy of each tactic depends on …