Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Law
Locks & Levies, Jeremy F. De Beer
Locks & Levies, Jeremy F. De Beer
Jeremy de Beer
This paper explores two ways that law can influence the creation and distribution of digital content. Specifically, it looks at the relationship between (1) prohibitions against circumventing technological protection measures (TPMs) and (2) levies on products or services used to reproduce or transmit digital materials. The relationship between digital locks and levies is analyzed through a comparative study of developments in Canada and the United States. Canada has created a broad levy (compared to the United States) to address the issue of private copying. Canada has not, so far, enacted specific anti-circumvention legislation like the Digital Millennium Copyright Act (DMCA). …
A Technological Theory Of The Arms Race, Lee Kovarsky
A Technological Theory Of The Arms Race, Lee Kovarsky
Indiana Law Journal
Although the "technological arms race" has recently emerged as a vogue-ish piece of legal terminology, scholarship has quite conspicuously failed to explore the phenomenon systematically. What are "technological" arms races? Why do they happen? Does the recent spike in scholarly attention actually reflect their novelty? Are they always inefficient? How do they differ from military ones? What role can legal institutions play in slowing them down?
In this Article I seek to answer these questions. I argue that copyright enforcement and self-help represent substitutable tactics for regulating access to expressive assets, and that the efficacy of each tactic depends on …
Reverse Engineering Of Computer Programs Under The Dmca: Recognizing A "Fair Access" Defense, Donna L. Lee
Reverse Engineering Of Computer Programs Under The Dmca: Recognizing A "Fair Access" Defense, Donna L. Lee
Marquette Intellectual Property Law Review
Courts have consistently held that reverse engineering constitutes fair use under the Copyright Act. When Congress enacted the DMCA, it intended to codify the settled law. Nonetheless, the exemption Congress carved out for reverse engineering in the DMCA is too narrowly crafted to accommodate the many different purposes of reverse engineering. This Comment suggests that courts should develop a fair access defense for reverse engineering undertaken for purposes that do not satisfy the requirements of the DMCA exemption but do enable other, fair use-defensible uses of computer programs. The Comment outlines three factors to consider in applying a fair access …
Super-Grokster: Untangling Secondary Liability, Comic Book Heroes And The Dmca, And A Filtering Solution For Infringing Digital Creations, Britton Payne
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster
The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster
ExpressO
As patent protection has emerged to protect software, courts and commentators have mistakenly focused on copyright law and overlooked the centrality of patent preemption to limit contract law where a mass market license which prohibits reverse engineering (RE) for purposes of developing interoperable products leads to patent-like protection. Review of copyright fair use cases on RE and Congress’s policy favoring RE for interoperability purposes in the Digital Millennium Copyright Act reinforce the case for patent preemption. Also, the fundamental freedom to RE embodied in state trade secret law, coupled with federal patent and copyright law and policies, cumulatively should override …
The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre Mulligan, Aaron K. Perzanowski
The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre Mulligan, Aaron K. Perzanowski
Faculty Publications
Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers' computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect appears obviously and fundamentally misguided.
The Article first addresses the market-based rationales that likely influenced Sony BMG's deployment of these DRM systems and reveals that even the most charitable interpretation of Sony BMG's internal strategizing demonstrates a failure to adequately value security …
Digital Rights Management And The Process Of Fair Use, Timothy K. Armstrong
Digital Rights Management And The Process Of Fair Use, Timothy K. Armstrong
Faculty Articles and Other Publications
Producers of digital media works increasingly employ technological protection measures, commonly referred to as "digital rights management" (or "DRM") technologies, that prevent the works from being accessed or used except upon conditions the producers themselves specify. These technologies have come under criticism for interfering with the rights users enjoy under copyright law, including the right to engage in fair uses of the DRM-protected works. Most DRM mechanisms are not engineered to include exceptions for fair use, and user circumvention of the DRM may violate the Digital Millennium Copyright Act even if the use for which the circumvention occurs is itself …
Freedom Of Information Laws In The Digital Age: The Death Knell Of Information Privacy, Ira Bloom
Freedom Of Information Laws In The Digital Age: The Death Knell Of Information Privacy, Ira Bloom
Richmond Journal of Law & Technology
With technology, everything just comes faster, smarter, and meaner. But the basics remain the same.
How To Give An Old Song A New License: A Recently Adopted Alternative To Rodgers And Hammerstein Organization V. Umg Recordings, Jacqueline M. Allshouse-Hutchens
How To Give An Old Song A New License: A Recently Adopted Alternative To Rodgers And Hammerstein Organization V. Umg Recordings, Jacqueline M. Allshouse-Hutchens
Kentucky Law Journal
No abstract provided.
Pervasively Distributed Copyright Enforcement, Julie E. Cohen
Pervasively Distributed Copyright Enforcement, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood …
A Technological Theory Of The Arms Race, Lee B. Kovarsky
A Technological Theory Of The Arms Race, Lee B. Kovarsky
Lee Kovarsky
Although the 'technological arms race' has recently emerged as a vogue-ish piece of legal terminology, scholarship has quite conspicuously failed to explore the phenomenon systematically. What are 'technological' arms races? Why do they happen? Does the recent spike in scholarly attention actually reflect their novelty? Are they always inefficient? How do they differ from military ones? What role can legal institutions play in slowing them down? In this Article I seek to answer these questions. I argue that copyright enforcement and self-help represent substitutable tactics for regulating access to expressive assets, and that the efficacy of each tactic depends on …