Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.

Slides:



Advertisements
Similar presentations
Interight WIPO Informative Session on Limitations and Exceptions Geneva November 3 rd 2008 Automated Rights Management & Copyright Limitations and Exceptions.
Advertisements

Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
THE RPAC ANNUAL CONFERENCE. OVERVIEW OF THE DMCA: ITS PROMISE AND PITFALLS Jeanne Hamburg.
T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
Why the DMCA has the right to outlaw numbers
Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities.
Digital Rights Management and International DRM Enforcement September 20, 2004.
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
1 The Digital Millennium Copyright Act David S. Touretzky Computer Science Department Carnegie Mellon University November, 2001.
Chapter 17 Controls and Security Measures
Copyright Infringement
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 12: October 21, 2003 Copyright Law, continued: the DMCA.
Intellectual Property Boston College Law School February 1, 2008 Copyright – Digital Issues.
Copyright and P2P Edward W. Felten Dept. of Computer Science Princeton University.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Intellectual Property Boston College Law School February 1, 2007 Copyright – Digital Issues.
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
Digital Millennium Copyright Act (DMCA) Cases Claire Stewart MM450 February 16, 2006.
CS155a: E-Commerce Lecture 7: Sept. 27, 2001 Copyright Law, DMCA, and Online Content Distribution Acknowledgement: V. Ramachandran.
The Digital Millennium Copyright Act (DMCA) Claire Stewart MM450 February 14, 2006.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven.
Digital Rights Management Cases Claire Stewart MM450 April 27, 2006.
UFCEXR-20-1Multimedia Sound Production Multimedia Sound Production and Copyright.
C opyright Protection and Digital Rights Management 1.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Legal Protection of Copy- protection Mechanisms & Rights Management Information Martina Gillen Law Department, Reading University
New copyright challenges for the users digital works Dragutin Nemec Library of the Faculty of law in Zagreb LIBRARIES IN THE DIGITAL AGE (LIDA) 2007.
COPYRIGHT & THE WEB LIS Information Technologies – Dr. Gilok Choi Pratt Institute, School of Information & Library Science Spring, 2009 By Diane.
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
CS110: Computers and the Internet Intellectual Property.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Development, Marketing, Licensing, and Distribution.
The OzDMCA: What it means for FOSS linux.conf.au 2007 Kimberlee Weatherall University of Queensland.
Digital Copyright and Management of Rights in the Digital Environment Giancarlo F. Frosio.
Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Teaching Strategies that Work: Copyright, Fair Use and Digital Learning Renee Hobbs Workshop for the Association of College and Research Libraries April.
COPYRIGHT LAW 2003 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Who owns the Bits? Digital copyright issues are continually evolving. IP address do not map to a single person – hard to trace user Music and movie industry.
CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
Copyright V Class Notes: February 10, 2003 Law 507 | Intellectual Property | Spring 2003 Professor Wagner.
Ethics. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop and how to use them.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
The DMCA, DeCSS, Copyrights and the First Amendment.
Becky Albitz Electronic Resources Librarian
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Technological Protection Measures and Access to Knowledge El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October 14, 2005 Gwen Hinze International.
COPYRIGHT CHALLENGES IN THE DIGITAL AGE: EFFECTS OF THE DIGITAL MILLENNIUM COPYRIGHT ACT.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
Compsci 82, Fall Digital Millennium Copyright Act,DMCA l Copyright law of United States  Passed in 1998, general industry support  Controversial.
It’s All (just) Bits 1) Numbers are bits 2) Text is bits 3) Formatted text is bits 4) Pictures are bits 5) Sound is bits 6) Programs (instructions on how.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Petroula Vantsiouri Doctoral Candidate in Law Cantab - LL.M. Harvard.
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
DMCA § 2012 and Education Paul D. Callister, JD, MSLIS
Legal aspects of copying audiovisual work onto portable media devices
Applying Digital Watermarking Technology to Control CD copying
Property in Cyberspace
Laws Against Computer Hacking
Who owns the Bits? Digital copyright issues are continually evolving.
Presentation transcript:

Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University

Digital Rights Management DRM technology tries to enforce limits on when and how digital content may be used. Limits may be based on copyright law, but need not be. Not just another security mechanism. DRM is different, treating the device’s owner as adversary. Different DRM strategies raise different policy issues.

Rationales for DRM Enforce compliance with copyright laws. –problem: copyright law can’t be automated (no “judge on a chip”), so can only hope to enforce a very rough approximation to it Enable new business models for publishers. –pay-per-use –sophisticated pricing / price discrimination

DRM, Fair Use and Privacy Copyright offers exception for fair use. –depends on nature of use, and circumstances Difficult for DRM to handle: loopholes end up too broad, or too narrow, or (usually) both. Even approximating the right result requires gathering information about the user, the circumstances, etc. –might need to collate and audit as a sanity check

Strategy 1: Tag and Track Approach: –put unique serial number on each copy –record each buyer’s identity –find unauthorized duplicates –check serial number on duplicate, blame original buyer Can limit copying and dissemination, but not use Enforcement raises serious privacy issues –Must authenticate each buyer’s identity –Must keep track of who has each copy –Must monitor dissemination of copies This strategy is falling out of favor.

Strategy 2: Containment Approach: –distribute content in a virtual lockbox –only authorized player devices can unlock it –authorized player devices enforce limits on use Typical implementation: –distribute content in encrypted form –authorized player knows decryption key Can enforce any limits on usage

Will Containment Work? Threat model: user will “rip” a copy of the content and put on peer-to-peer system “Break once, infringe anywhere” Moderately skilled user, with moderate effort, can defeat DRM. DRM will not prevent infringement.

DMCA Overview Digital Millennium Copyright Act of 1998 Many provisions Focus here on Section 1201 Rationale for 1201: DRM technology can be circumvented; so make circumvention, and circumvention tools, illegal

Ban on Acts 17 U.S.C. 1201(a)(1)(A): “No person shall circumvent a technological measure that effectively controls access to a [copyrighted work].” Circumvent: “to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner”

Ban on Acts 17 U.S.C. 1201(a)(1)(A): “No person shall circumvent a technological measure that effectively controls access to a [copyrighted work].” “[A] technological measure `effectively controls access to a work' if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.”

Ban on Tools 17 U.S.C. 1201(a)(2): “No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that– is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title; has only limited commercially significant purpose or use other than to circumvent …; or is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing...

Ban on Tools Similar ban on tools that effectively control copying, or other exclusive rights of the copyright holder.

Scope of DMCA vs. Copyright DMCA applies to access controls and to copy controls. Copyright law controls copying but not access. DMCA applies to acts of circumvention, even when no infringement occurs.

Prominent DMCA Suits Corley (DeCSS software for decrypting DVDs) Sklyarov / Elcomsoft (criminal case; Adobe e-book reader) Felten (digital watermarking research) Chamberlain v. Skylink (garage door openers), Lexmark v. Static Control (printer cartridges)

Questions / Discussion