2/21/00Financial Cryptography '001 TOWARDS MORE SENSIBLE ANTI-CIRCUMVENTION REGULATIONS Pamela Samuelson, UC Berkeley, Financial Cryptography ’00 February.

Slides:



Advertisements
Similar presentations
TUTORIAL ON COPYRIGHT LAW
Advertisements

Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
Intellectual Property Image: William J. Wynn.
“Contentious Issues in World Regulation of the Internet” 35th World Computer & Internet Law Meeting May Fairmont Hotel San Francisco, CA “Balancing.
THE RPAC ANNUAL CONFERENCE. OVERVIEW OF THE DMCA: ITS PROMISE AND PITFALLS Jeanne Hamburg.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Introduction to Copyright Principles © 2005 Patricia L. Bellia. May be reproduced, distributed or adapted for educational purposes only.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Office of the U.S. Trade Representative Kira M. Alvarez CHIEF NEGOTIATOR AND DEPUTY ASSISTANT U.S.T.R. For intellectual property enforcement.
Digital Rights Management and International DRM Enforcement September 20, 2004.
Changing the Network Infrastructure– Threats and Possibilities Alex Alben Nobember 6, 2003.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
March 13, 2002Computer Systems Lab Colloquium1 IMPLICATIONS OF ANTI- CIRCUMVENTION RULES FOR INNOVATION Pamela Samuelson, UC Berkeley, at Computer Systems.
Intellectual Property Boston College Law School February 4, 2009 Copyright – Indirect, Digital Issues.
Intellectual Property Boston College Law School February 1, 2008 Copyright – Digital Issues.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Intellectual Property Boston College Law School February 1, 2007 Copyright – Digital Issues.
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
Rights Management Overview Peter B. Hirtle Intellectual Property Officer Cornell University Library
The Digital Millennium Copyright Act (DMCA) Claire Stewart MM450 February 14, 2006.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 19.
1 TUTORIAL ON INTELLECTUAL PROPERTY LAW Pamela Samuelson & David Post Computers Freedom & Privacy April 4, 2000.
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Legal Protection of Copy- protection Mechanisms & Rights Management Information Martina Gillen Law Department, Reading University
COPYRIGHT LAW 2002 Professor Fischer CLASS 27: TECHNOLOGICAL PROTECTION MEASURES, REMEDIES.
Copyright in the Digital Age October 14, 2004 FEDLINK Membership Meeting Carrie Russell, Copyright Specialist ALA Office for Information Technology Policy.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
NEW SOLUTIONS FOR A DIGITAL WORLD Angela Teal LIBM 6320 FALL 2011.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
1 opyright Law in Hong Kong Tina Tao Yang 杨涛 The University of Hong Kong Libraries ©
CS110: Computers and the Internet Intellectual Property.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
Intellectual Property Issues Professor Matt Thatcher, MIS 748.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Intellectual Property Rights and the Web: Common Myths Presentation by Jean Mistele.
Copyright and Intellectual Property Issues in the Digital Environment Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland.
Intellectual Property Software Piracy. Copying of software in large quantities for resale Illegal copying by businesses and individuals for their own.
[Copyright M. S. Overing 2003]1 Copyright Overview Michael S. Overing, Esq. 201 S. Lake Ave., Ste. 606 Pasadena, CA
Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
COPYRIGHT LAW 2003 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Yours, Mine and Ours: Copyright in Cyberspace 2005 National LTAP Conference July 26, 2005 Nita Lovejoy Iowa State University.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES/DIGITAL MUSIC.
CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.
1 INTELLECTUAL PROPERTY & THE DIGITAL ECONOMY Pamela Samuelson, School of Info. Mgmt. & of Law, March 17, 1999.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
Copyright V Class Notes: February 10, 2003 Law 507 | Intellectual Property | Spring 2003 Professor Wagner.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
The DMCA, DeCSS, Copyrights and the First Amendment.
Trans-Pacific Partnership Agreement (TPP)
Tony Malatanos. Focal Points  What is reverse engineering?  Reasons Legit Malicious  Legality  Morality  Clean Room Design  Example: ReactOS.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
It’s All (just) Bits 1) Numbers are bits 2) Text is bits 3) Formatted text is bits 4) Pictures are bits 5) Sound is bits 6) Programs (instructions on how.
Guardians of the IP Law Galaxy: What Employment Lawyers Need to Know Howard L. Steele, Jr., Steele Law Group Penthouse, One Allen Center, Houston, Texas.
Legal challenges related to software vulnerability disclosure
What is Digital Right Management’s Role in Modern Education System’s Play? —A Comparative Research of DRM System’s Influence in.
The Legalities of Technicalities task 4
Laws Against Computer Hacking
Presentation transcript:

2/21/00Financial Cryptography '001 TOWARDS MORE SENSIBLE ANTI-CIRCUMVENTION REGULATIONS Pamela Samuelson, UC Berkeley, Financial Cryptography ’00 February 21, 2000

2/21/00Financial Cryptography '002 OVERVIEW OF TALK Origins of new legal regulations concerning circumvention of technical protection systems Overview of act-of-circumvention and anti- device rules Why these rules are troublesome Possible paths to rectifying the problems

2/21/00Financial Cryptography '003 CIRCUMVENTION IN CONTEXT Before a group of cryptographers, it is wise to recognize that this community regards circumventing TPS and making tools to circumvent TPS as natural and good (can’t improve security without trying to break it) But now that other industries are using encryption, they have different perspectives Hollywood, in particular, likens circumvention to “breaking & entering,” and software to do this as “burglars’ tools”

2/21/00Financial Cryptography '004 WHY ANTI- CIRCUMVENTION REGS? U.S. “White Paper” on Intellectual Property & the NII (1995) (its author = former copyright lobbyist) Proposed to outlaw tools (sw or hw) whose “primary purpose or effect” was to bypass TPS used by copyright owners to protect their works Nearly identical provision proposed for international treaty Copyright industries were strong supporters of Clinton; stronger copyright laws as quid pro quo

2/21/00Financial Cryptography '005 MORE ON WHY White Paper anticipated global market for digital copyrighted works TPS to overcome vulnerability to “piracy” Need for legal reinforcement for TPS to outlaw circumvention/piracy-enabling tools “Not unprecedented” (DAT law, satellite broadcasting “black-box” decoders)

2/21/00Financial Cryptography '006 DEVELOPMENTS IN ‘95-’96 WP legislation was highly controversial Anti-circumvention only 1 of several problems (most attention to ISP liability) Equipment mfrs: unfair to hold responsible for what users do; can’t respond to all TPS; need for exceptions So broad, NSA could have been shut down (because they make tools to circumvent TPS & virtually all content “sniffed” is copyrighted)

2/21/00Financial Cryptography '007 WIPO DEVELOPMENTS Diplomatic conference at the World Intellectual Property Organization in Geneva in Dec Draft treaty contained variant on US a/c proposal A/c provision was highly controversial: worries about effect on public domain, fair use, technological development Compromise in final treaties: “adequate” protection and “effective” remedies vs. circumvention of TPS

2/21/00Financial Cryptography '008 POST-WIPO EVENTS Post-WIPO clash of titans over ISP liability: Hollywood v. telcos/ISPs Compromise on ISP issue (“safe harbors”) broke logjam in March 1998 Political capital largely spent on ISP issue Some compromise as to anti-circumvention regs in DMCA, but not as to tools provision US pushing other countries to adopt its rules

2/21/00Financial Cryptography '009 ACT-OF-CIRCUMVENTION Treaty so vague that legislation not needed in US, but even if so, only as to circumvention Campbell-Boucher bill: proposed to outlaw circumvention of TPS to enable copyright infringement MPAA: wanted all circumvention outlawed Compromise in DMCA: illegal to circumvent access control, 17 U.S.C. s. 1201(a)(1) 2 year moratorium; LOC study; 7 exceptions

2/21/00Financial Cryptography '0010 EXCEPTIONS TO 1201(a)(1) Legitimate law enforcement & national security purposes Reverse engineering for interoperability Encryption research and computer security testing Privacy protection & parental control Nonprofit “shopping privilege”

2/21/00Financial Cryptography '0011 ANTI-DEVICE PROVISIONS Illegal to “manufacture, import, offer to public, provide or otherwise traffic” in Any “technology, product, service, device, [or] component” If primarily designed or produced to circumvent TPS, if only limited commercial purpose other than to circumvent TPS, or if marketed for circumvention uses

2/21/00Financial Cryptography '0012 MORE ON DEVICE RULES 1201(a)(2)--devices to circumvent effective access controls 1201(b)(1)--devices to circumvent effective controls protecting right of cop. owners Actual & statutory damages + injunctions Felony provisions if willful & for profit MPAA v. Reimerdes 1 st civil case

2/21/00Financial Cryptography '0013 MPAA v. REIMERDES Injunction vs. posting of DeCSS on websites or otherwise making it available CSS is effective access control for DVDs DeCSS circumvents it & has no other commercially significant purpose Lack of evidence for Linux compatibility argument Besides, 1201(f) only protects interoperation with programs, not “data” on DVD

2/21/00Financial Cryptography '0014 DVD-CCA v. McLAUGHLIN Trade secret misappropriation case Not just vs. posting, but also vs. linking CSS = proprietary information; DVD-CCA took reasonable steps to maintain secret Inference: someone must have violated clickwrap license forbidding reverse engineering Even though DeCSS on web for 4 months, not to enjoin would encourage posting TS on Web Judge upset by “boasting” about disrespect for law

2/21/00Financial Cryptography '0015 IMPLICATIONS OF DVD-CCA Anti-reverse engineering clauses are common in software licenses; enforcement worrisome Willingness to enforce and treat information obtained through reverse engineering as trade secret also worrisome Willingness to enjoin information that has been public for several months may be error “Fruit of poisonous tree” rationale (judge knows Johansen didn’t reverse engineer, nor did many posters, yet held as trade secret misappropriators)

2/21/00Financial Cryptography '0016 CURIOUS THINGS ABOUT 1201 Only 3 exceptions to 1201(a)(1) explicitly allow building tools Only interoperability exception limits both anti-device rules Did Congress mean to allow circumvention to make fair use, yet make it illegal to make tools needed to accomplish? (Ha! Ha!) LOC to study only act, not device rules

2/21/00Financial Cryptography '0017 PROBLEMS WITH A/C REGS Legitimate purpose circumventions –existing exceptions overly narrow –need for general purpose exception –clarify that fair use circumvention is OK “Dual use” technologies –tools to enable legitimate uses –how device rules could be narrowed Copyright-centric regulations

2/21/00Financial Cryptography '0018 EXCEPTIONS TOO NARROW Interoperability: not just programs; other reverse engineering may be legitimate Encryption and computer security research: –no authorization and expert requirements –OK to make tools –less onerous rules on disseminating results Privacy exception: Windows 2000 hypothetical (see BTLJ paper)

2/21/00Financial Cryptography '0019 A GENERAL PURPOSE EXCEPTION? Need for “or other legitimate purpose” exception to access control rule Examples of other legitimate acts: –if reasonable grounds to believe infringing copy or computer virus inside TPS –illegitimate invocation of “technical self-help” Courts able to tell difference between legitimate & illegitimate acts

2/21/00Financial Cryptography '0020 DUAL USE TECHNOLOGIES Circumvention tools are not burglars’ tools Ways to narrow rules: –substantial noninfringing use standard – intent/knowledge/injury/infringement requirement –commercially significant cf. apparent legitimate purpose (freeware should not be vulnerable) –technology-specific (e.g., circumvention of SCMS) Think through relation between range of legitimate circumventions and availability of tools (if X is lawful, tool to do X should be OK)

2/21/00Financial Cryptography '0021 COPYRIGHT-CENTRICITY Encryption protects more than commercial copyrighted products (e.g., private personal communications, trade secret/confidential business information, e-cash) Circumvention of encrypted information is a more general problem (sometimes legitimate, sometimes not) So is the availability of circumvention technology Would suggest the need for a general law

2/21/00Financial Cryptography '0022 UNINTENDED CONSEQUENCES? Copyright law protects “original works of authorship” from moment of 1 st fixation Private is copyrighted, so are business documents If encrypt to control access, circumvention would be illegal under 1201(a)(1), even if legitimate reason (e.g., employer has reason to believe contents are pornographic) Less clear 1201(a)(1) applies to e-cash (although circumvention a problem here too)

2/21/00Financial Cryptography '0023 UNINTENDED CONSEQUENCES? X makes software that circumvents Y’s encryption system Z is a copyright owner who decides to use Y’s encryption system to protect digital pictures Does X’s tool then become illegal? Can Y sue X? Can Z sue X? What harm has X’s software done to Y or Z? 1201 (a)(2) and (b)(1) does not require any underlying infringement; mere potential is enough

2/21/00Financial Cryptography '0024 WAYS TO CHANGE RULES Common law interpretation (some judges will stretch existing exceptions) Legislative amendments to 1201 –broaden encryption/computer security exceptions –general purpose exception –narrow tools provision Broadened LOC studies/rulemaking

2/21/00Financial Cryptography '0025 LIBRARY OF CONGRESS STUDY Main focus: consider impact of act-of- circumvention rules on fair use and other noninfringing uses LOC can issue rules exempting works or user groups from act-of-circumvention rules Need for study of impact of anti-device rules because overbroad and contradictory to other aspects of 1201 Potential for deleterious consequences (e.g., “strike suits” & “chilling effects”)

2/21/00Financial Cryptography '0026 CONCLUSION Copyright industries intend to exercise substantial control over encryption policy They may have a myopic perspective (but they think cryptographers are myopic) Good news is that encryption research/computer security testing is exempt in US (but not in EU) Bad news is that the US is promoting overbroad anti-device rules outside US 1201 unlikely to be repealed, but could be better & you can help make it so