This page contains comments submitted as a part of a rulemaking on exemptions
from prohibition on circumvention of technological measures that control access
to copyrighted works (read more details). The
following comments were submitted in the first round of comments between Nov.
19 and Dec. 18, 2002.
Note: In order to view the PDF files below, your computer must
be equipped with the free Adobe Acrobat
Reader 6 program or other software capable of reading PDF version 1.4 files.
|
1 |
|
Mark Wilkins |
Class |
|
Audiovisual
works presented in digital format, when used by a
participant in the original creation of such work in the
assembly of a brief collection of excerpts for purposes
of soliciting business or employment, commonly known as
a "portfolio" or "demo reel." |
|
|
|
Summary |
|
The
DMCA's prohibition on circumventing access to the raw digital
image content stored in protected digital distribution media
such as DVDs unduly inhibits workers engaged in the production
of audiovisual works such as motion pictures from being
able to engage in the practice, generally understood to
be "fair use" under the copyright act, of compiling
portfolios or demo reels, which are presentations of one's
prior work used to secure employment.
Since alternative nonprotected media such as VHS are
either of insufficient quality for the application or
are not available, this use of this class of work should
qualify for an exemption from the DMCA's requirements
prohibiting the circumvention of access technologies.
|
Comment |
|
comment
text (3 pages) |
|
|
|
2
|
|
Eric Eldred
Eldritch Press |
Class |
|
Literary works,
including computer programs and databases, protected by access
control mechanisms in which the mechanism controls access
both to copyrighted works and to works not under copyright. |
|
|
|
Summary |
|
Access to material in the
public domain needs to be assured, even if the publisher
restricts access by technological mechanisms used also for
copyrighted works.
|
Comment |
|
comment
text (1 page) |
|
|
|
3
|
|
Owen P.
Martin |
Class |
|
"open source"
and "free" software and other works licensed under
licenses such as the GNU GPL (General Public License). |
|
|
|
Summary |
|
Researchers need to be able
to publish details of security holes in and fixes to open-source
software in order to provide for a timely resolution of security
and other problems. |
Comment |
|
comment
text (1 page) |
|
|
|
4
|
|
Barry
Klawans |
Class |
|
digital representations
of musical works |
|
|
|
Summary |
|
The inability to create noninfringing
copies of musical works can lead to the loss of works that
are not commercially successful. Permanent barriers to creating
noninfringing copies goes far beyond the constitutional copyright
protection that protects works "by securing for limited
times". |
Comment |
|
comment
text (2 pages) |
|
|
|
5 |
|
Alik Widge
|
Class |
|
Any digital-format
work, including but not limited to Compact Discs (CDs) and
Digital Versatile Discs (DVDs) which contain material not
available in a comparable analog format at a price no more
than ten percent (10%) higher than the cost of the digital
work. |
|
|
|
Summary |
|
In
its prior rulemaking, the Register of Copyrights indicated
that concerns of inability to make use of these works were
invalid, because the works were also available in analog
format. A large number of digital media works are released
with extra material not available in analog format. Therefore,
following the Register's own logic, it is reasonable to
create an exemption to allow users to access these works
if the use is legitimate and lawful. |
Comment |
|
comment
text (2 pages) |
|
|
|
6
|
|
Ighmael
Schwartz |
Class |
|
Music of all
types used for personal medium transfer or backup archival
methods |
|
|
|
Summary |
|
Music
that is used by natural-born persons in the United States
and other nations which we have treaties with should be
exempted for all personal uses involving medium transfer
or backup archival methods, as our Constitution and our
Nation do not permit Congress or any Administration from
removing those liberties granted naturally to us. This
specifically includes transferring any music bought, licensed,
or rented being transferred from any specific format to
any other, so long as such transfer is limited to non-commercial
uses and is not intended to be resold except as constitutionally
guaranteed irony, parody, or collage (30 seconds or less)
uses.
|
Comment |
|
comment
text (1 page) |
|
|
|
7
|
|
Todd Colvin |
Class |
|
All classes
of copyrighted works should be exempted under certain conditions. |
|
|
|
Summary |
|
The
DMCA does not take into account the need for legitimate,
non-copyright holders to circumvent "a technological
measure that effectively controls access to a work protected
under this title" by stating that "[t]he trafficking
in, inter alia, any device or service that allowed others
to circumvent such a technological protection measure may,
however, be actionable under section 1201(b)." The
problem is: 1) Criminals are implementing copyrighted technology
that controls access to works which may be considered protected
under the DMCA (i.e., the tool used is copyrighted and the
work protected is copyrighted), 2) Government agencies often
lack the ability to create tools capable of circumventing
copyrighted works protected by copyrighted technological
measures; therefore relying on the private sector to make
tools available. The DMCA does not make exceptions when
1) the copyrighted tool used to protect access was used
for criminal activity, 2) the protected work involves criminal
activity, or 3) the trafficking of circumventing tools when
designed for use in situations where there are exemptions
such as the need to access protected works in the course
of an investigation. |
|
|
Comment |
|
comment
text (2 pages) |
|
|
|
8
|
|
Anthony
Burokas |
Class |
|
All Classes:
literary works; musical works; dramatic works; pantomimes
and choreographic works; pictorial, graphic and sculptural
works; motion pictures and other audiovisual works; sound
recordings; and architectural works. |
|
|
|
Summary |
|
We
need to ensure an individual's access to works they create
or purchase.
First: Current encription and digital watermarking prohibit
an individual from making as many digital copies of their
own created muscal works as they want. I record my music
on Minidisk. I digitally copy it to a CD Recorder. I then
try to make dupes of that master CD in the CD recorder
but this is impossible. I am disallowed access to my own
music through the implimentation of SCMS "bits"
that mark one an original, another a copy and prohibit
any copies of copies. If I lose my original, I cannot
access my music for any digital duplication because of
the hardware restrictions that already exist in the market.
Secondly, when I purchase musical works or motiopn pictures
(for example), I fully expect to be able to access that
music on any and all means available to me. However, current
CD "protection" schemes actually inhibit the
playback of said CDs on my Macintosh. The simply do not
work, and caused the computer to be unable to eject the
CD. Another example: I purchase a DVD for home enjoyment,
but do not have a DVD for the children to watch in the
car. I would like to make a VHS copy of the DVD but copy
protection means I, and my children, cannot access the
movie in the car. I am forced to purchase the motion picture
twice. Another consideration: For convenience I prefer
a single CD of 150 MP3 songs (that I legally own) to having
to bring along 10-15 different CD's with 10-15 songs each
and change them every hour in the car. I don't want to
deal with CD cases, swapping disks and all that while
on the road. It is safer and more convenient for me to
access my music on one MP3 CD I create of my own music.
I paid for the right to access my media, I should be allowed
to access it where, and how, I see fit. |
Comment |
|
comment
text (1 page) |
|
|
|
9
|
|
Ben Weiss |
Class |
|
Literary and
Educational text contained in ebooks |
|
|
|
Summary |
|
Because some people have different
physical requirements for reading, it is necessary for such
disabled persons to gain access to the contents of ebooks
we have purchased so we can actually read them. I am legally
blind and have special requirements for reading not met by
comercial ebook software. |
Comment |
|
comment
text (2 pages) |
|
|
|
10 |
|
Michael
A. Lowry |
Class |
|
Motion pictures
on DVD |
|
|
|
Summary |
|
1.
Motion pictures stored on DVDs are usually encrypted.
2. Encryption of motion picture on a DVD prevents fair
uses of the motion picture.
3. Fair uses of a copyrighted work are legal, so circumvention
of encrpytion for these purposes should be exempt.
|
Comment |
|
comment
text (1 page) |
|
|
|
11
|
|
John Vesper |
Class |
|
1) Music (CD)
2) Video (DVD) 3) Electronic Printed Media ("E-Books") |
|
|
|
Summary |
|
Current technologies to prevent misuse also can prevent
"Fair Use" applications, Eg: many CD's with
copy protection cannot be played on the cd player in my
computer, which is where I, and many other professional
programmers, do the majority of our listening. The use
of "Cracking" programs to enable fair use should
not be subject to criminal penalties. While "Trading"
(Stealing) or sale of physical reproductions of such works
should clearly be illegal, the current regulations, which
consist of a blanket ban against the breaking of digital
copy protection methods inhibit fair use of products legally
purchased in the following ways.
1) Copy protection methods currently in force can prevent
the legal playing of protected works in most computer's
sound systems, and occasionally in Auto CD players, and
even more rarely in some makes and models of dedicated
Home CD players.
2) Current regulations make illegal any methods of compressing
such copy protected files for otherwise legal listening
on commercially available "MP3 Players" (much
like a "walkman", or Automobile sound system
MP3 decks.) Such compression allows the user to carry
with them a much larger number of songs than would be
practicable in the native cd format.
3) Current rules are the logical equivalent of executing
all of the residents of a town to make sure you get the
one serial killer among them. This alone classifies the
current regulations as "Not in the public interest"
4) Copying digital media for legal, "Fair Use",
purposes is not an exercise in "Interstate Commerce"
and is therefore not subject to Federal Regulation.
I would add, as an aside, that I am both a musician and
a professional software publisher. As such I most certainly
do not approve of the pirating of Copyrighted materials.
None the less, preserving the legal concept of "Fair
Use" is beneficial not only to the end users of such
products, but to the producers of those products as well.
|
Comment |
|
comment
text (1 page) |
|
|
|
12
|
|
William
Noble |
Class |
|
written, human readable documents
explaining the means of operation of and potential defects
in a technical protection measure. |
|
|
|
Summary |
|
any
written expression, even that which documents ways of
violating laws, is protected speech under the first amendment.
The DCMA can be interpreted as making the publishing of
information related to security flaws that if exploited
would lead to circumventing some protection mechanism
illegal. This is not consistant with the first amendment,
nor is it consistant with common sense - we need the flaws
to be identified so they can be fixed, particularly when
they relate to the protection of computer systems from
malicious exploitation. Therefore, it is important to
exempt and exclude these text documents. An executable
computer program whose purpose is the circumvention of
a protection measure would not be included in the class,
but a description of how such a program could be written
would be included.
|
Comment |
|
comment
text (1 page) |
|
|
|
13 |
|
Matthew
T. Russotto |
Class |
|
Electronic books
(literary works, possibly also containing pictorial works
in the form of illustrations, in electronic form) |
|
|
|
Summary |
|
The access control measures used for secure electronic
books by nature prevent a user from upgrading his hardware
without losing access to the books. They also preclude
use of the secured electronic books by certain types of
researchers, and by locking out accessibility software
also prevent the blind and visually impaired from making
use of the secured electronic books.
|
Comment |
|
comment
text (3 pages) |
|
|
|
14 |
|
Michael
A. Rolenz |
Class |
|
1.
Descriptive Name Class : Works in the Public Domain that
have been distributed using access controls.
2. Descriptive Name Class : Information collected by "Spyware"
software that is encrypted or "Spyware" software
whose operation uses encryption to hide its operation
|
|
|
|
Summary |
|
1.Works
in the Public Domain may not be copyrighted. Circumvention
of access controls for Public Domain works can not be
a violation of 17 U.S.C. 1201(a)(1)(C) since that section
refers only to copyrighted works.
2.Commercially distributed software that is distributed
with the intention of gathering information on users surreptitiously
without their knowledge or consent is called "Spyware"
by computer security specialists. While obstensively the
Spyware program is distributed to perform one function,
it is actually a Trojan Horse collecting information about
the user of the software without their knowledge and relaying
it back to the distributer of the software. It uses the
same technology and means of distribution as computer
viruses. The only difference is that Spyware is less malicious
than many computer viruses which may collect passwords
and credit card numbers to commit fraud. Computer viruses
may use encryption to change their appearance and hide
their true operations. Spyware also uses encryption to
hide the information collected, transmitted, or to prevent
reverse engineering of the code to determine just what
it truly is doing. Since Spyware is a computer program
it is also a copyrighted work that may also claim to be
using encryption to control access to its workings or
as a part of a copy protection "technology."
The prohibition on circumvention affects the ability of
computer security specialists to determine what is or
is not Spyware and what information has been compromised.
|
Comment |
|
comment
text (8 pages) |
|
|
|
15 |
|
Ken Arromdee |
Class |
|
1. Audiovisual
works on DVD protected by the Content Scrambling System (CSS).
2. Software and games that are played on video game machines. |
|
|
|
Summary |
|
1. Users are heavily restricted
from playing foreign DVDs, playing DVDs on Linux, or using
features such as skipping commercials that are locked out
by licensed DVD players, without circumvention.
2. Users are restricted from running unauthorized software
and playing import games without being able to circumvent.
|
Comment |
|
comment
text (7 pages) |
|
|
|
16 |
|
Darrin
Cardani
Buena Software, Inc. |
Class |
|
Tools which
existed before and happen to be able to circumvent newer products
access controls. |
|
|
|
Summary |
|
Several companies are
using well-known encoding schemes, rather than strong encryption,
as access control. Tools that can circumvent these access
controls already exist. Those tools should be exempt from
the anti-circumvention clauses, as should any updates to
those tools.
|
Comment |
|
comment
text (8 pages) |
|
|
|
17 |
|
Greg Trouw |
Class |
|
Anime and other
such foreign works |
|
|
|
Summary |
|
- There are many foreign forms of entertainment such as
Anime (from Japan) which has gained popularity among audiences
in the United States
- Many of these works are slow to be introduced into
the United States, and when they are have been subjected
to various forms of censorship, editing, changing the
content of what is contained in them. This has followed
at times controversy which is brought forth by the Christian
right or "moral majority"
- Though it would be legal to BUY a DVD from Japan, due
to region coding, this could not be played on a region
1 DVD bought in the United States. (Japan is in region
3.)
- The US Supreme Court has been absolutely explicit concerning
the seperation of church and state, and in their defence
of such clauses of the First Amendment to the United States
Constitution such as the non-establishment clause and
freedom of speech and the press.
- People should be free to exercise their First Amendment
rights to view forms of entertainment they might enjoy.
The enforcement of copyright law should not have the effect
of supporting censorship and the imposition of the will
of a certain segment of highly political individuals (the
"Christian Right" for instance) upon the rest
of the populace.
- Given that the editing has taken place, people who
want access to the original shows, minus all the editing
(including that which could tend to "Christianize"
a show from a foreign culture such as Japan), people should
be able to see the original work if desired.
|
Comment |
|
comment
text (7 pages) |
|
|
|
18 |
|
Marcia Wilbur
The Center for Electronic Law |
Class |
|
Non Threatening
Circumvention of Software |
|
|
|
Summary |
|
Where the encryption needs
to be circumvented due to unavailability of password(s)
caused by absence, death, or termination.
|
Comment |
|
comment
text (2 pages) |
|
|
|
19 |
|
Daniel
McEnnis |
Class |
|
source code
- human readable description and/or defintion of the behavior
of a computer program that can be transformed into a format
executable by computer hardware but effectively unreadable
by humans. |
|
|
|
Summary |
|
Technological
measure- Source code rendered into binary form effectively
encrypts the source code.
Non infringing use prevented - evaluation of the security
of software packages. In particular, security audits assessing
the likelihood that unauthorized users can utilize installed
software to illegally hijack the resources of the computer
system in which this software is installed.
How this circumvents the encryption - the testing process
unencrypts portions of the binary translation by describing
any potentially dangerous and/or subversive behaviors
the software possesses that may pose a threat to system
integrity.
Why this is otherwise protected - "Clean room"
implementations of software (precise descriptions of software
behavior which exactly duplicate the behavior of another
system created without access to the original software's
unencrypted content) are protected under fair use (IBM
lawsuit to prevent i386 clones). In addition, the quoting
of portions of content for reporting purposes is explicitly
permitted under fair use doctrine.
Harm 1- Encourages non-US security researchers to explicitly
prevent US citizens from accessing their work. (See RedHat
advisory board for RHLinux for details of one such example
(1)) This is done to protect researchers in countries
that do not accept the validity of the DMCA within their
borders from potential lawsuits in the US. This places
US system administrators at a disadvantage against potential
attackers since they are denied access to descriptions
of how attackers can hijack their systems resources (preventing
the deployment of countermeasures) while criminal attackers
have full access.
Harm 2- Discourages prompt reporting of system flaws
to system administrators. Since those reporting flaws
can experience (and have been threatened with) legal retaliation
by software manufacturers, there is a significant disincentive
to provide the information necessary to enact effective
countermeasures. These information disclosures are typically
unpaid. When a significant potential financial burden
is attached, the rewards of providing the needed information
are dwarfed by potential liabilities.
Harm 3- Encourages complacency by software providers.
Prior the DMCA's circumvention provision, companies with
defective software were compelled by bad publicity to
release well-tested patches quickly. Evidence provided
below indicates that at least some companies are abusing
the DMCA’s anti-circumvention clause to prevent
their customers from discovering their vulnerability to
criminals by threatening legal action against those individuals
who publish this information(2).
Harm 4- Recent reports from the Bush administration have
reaffirmed the role rank and file system administrators
have in securing the nations internet infrastructure against
assault by terrorist organizations and rouge states. The
DMCA's circumvention clause in relation to source code
provides a significant hindrance to protection of the
internet from hostile attack. System administrators are
not only highly decentralized, but are scattered throughout
a wide range of private and public enterprises. Effectively
disseminating the information necessary to predict and
prevent large scale assaults on the infrastructure are
only possible if the information needed to prevent these
assaults is protected against legal retaliation. Evidence
that this threat is real is provided by the recent large-scale
assaults against the DNS root servers in the past month
(3).
Specific examples cited in this work-
(1)Descriptions of vulnerabilities discovered in software
packages utilized in the Red Hat Linux operating system
are published by foreign researchers in a fashion that
bars US citizens from accessing this information. The
researchers explicitly state that their decision to ban
access by US citizens was motivated by fears of legal
retaliation in the US under the DMCA’s anti-circumvention
clause.
(2)On July 19, 2002 HP sends legal notice to Adriel T.
Desautels of Secure Network Operations, Inc. that they
intend to prosecute under the DMCA’s circumvention
clause unless they make every possible effort to retract
publication of the security flaws in HP’s True64
Unix operating System – full text of this letter
provided below.
(3)Sophisticated attack against dns root servers - Recently,
a massive denial of service attack was launched against
the 'root dns' servers - those computers that provide
the means to translate word based internet addresses into
raw IP addresses. The attack was both of exceptionally
sophisticated and conducted in a manner suggesting of
a test. The system was attacked for a brief time, then
the attack was stopped by the attacker before the underlying
structure of the internet could be significantly degraded.
Both the unusually high degree of sophistication in the
attack and the exploratory nature of the attack lend credibility
to the threat of a future sophisitcated large scale assault
against critical internet resources on which the economy
is now dependant. |
Comment |
|
comment
text (4 pages) |
|
|
|
20 |
|
Robin
D. Gross
IP Justice |
Class |
|
Class
1: Literary works restricted by access controls that tether
the work to a specific device or platform, thereby preventing
a lawful possessor from using the work on an unsupported
system in a non-infringing way.
Example: E-books
CLASS 2: Sound recordings restricted by access controls
that tether the recording to a specific device or platform,
thereby preventing a lawful possessor from using the work
on an unsupported system in a non-infringing way.
Example: Access-Restricted CDs
CLASS 3: Motion pictures and other audiovisual works
restricted by access controls that tether the work to
a specific device or platform, thereby preventing a lawful
possessor from using the work on an unsupported system
in a non-infringing way.
Example: DVDs
CLASS 4: Literary works restricted by access controls
that limit lawful access to and post-sale uses of the
work, where circumvention allows a lawful possessor to
use the work in a non-infringing way.
Example: E-books
CLASS 5: Sound recordings restricted by access controls
that limit lawful access to and post-sale uses of the
work, where circumvention of the technology allows a lawful
possessor to use the work in a non-infringing way.
Example: Copy-restricted CDs
CLASS 6: Motion pictures and other audiovisual works
restricted by access controls that limit access to and
post-sale uses of the work, where circumvention of the
technology allows a lawful possessor to use the work in
a non-infringing way.
Example: DVDs |
|
|
|
Summary |
|
Class
1: Literary works restricted by access controls that tether
the work to a specific device or platform, thereby preventing
a lawful possessor from using the work on an unsupported
system in a non-infringing way.
Example: E-books
Summary:
When a publisher distributes an E-book tethered to a specific
device or platform, the DMCA prevents purchasers from
reading content they lawfully acquire on the devices of
their choosing. An exemption for this class of works would
allow purchasers of E-books to lawfully circumvent access
controls for the lawful purpose of reading a literary
work on multiple devices or platforms.
Facts:
Literary works distributed in electronic format, often
called E-books, are increasingly restricted by technological
access controls that prevent owners from reading the book
on the system they choose. For example, some Adobe E-books
employ access control measures that prevent users from
reading an E-book on any machine other than the one it
was first downloaded onto. This is a problem for E-book
purchasers who upgrade their computers or switch operating
systems and are unable to read the E-books they had lawfully
purchased on their new machine. It is also a problem for
E-book purchasers who choose to read their E-books on
a different computer or device, such as a laptop or PDA,
from the one onto which it was originally downloaded.
Argument:
There is a legitimate need for purchasers to be able to
move their E-books from a desktop to a laptop, from an
IBM to a Macintosh, or from a Tablet to a PDA. Consumers
have long exercised the option to read books on planes
and on trains and in their backyard and in bed. Copyright
law has never been construed to allow authors to prevent
a reader's freedom to read a lawfully purchased literary
work where and how they choose. No less opportunity should
be available because the reader purchases an electronic
book. E-books that employ technological restrictions that
deny someone in lawful possession from accessing it where
and how and on which device they choose allow content
creators much greater ability to control reader's choices
than they have ever had under copyright law.
Furthermore, tethering literary works to a specific device
limits an E-book owner's ability to exercise the full
bundle of property rights long associated with ownership
of a book. For example, the First Sale doctrine allows
a reader to resell a book after she has finished it. Access
controls that restrict the platforms on which an E-book
can be read interfere with that right. If an E-book is
tethered to a platform that becomes obsolete, the owner
can no longer exercise her option to resell or otherwise
dispose of the Ebook according to her choosing. Since
the First Sale Privilege is a limitation on a copyright
holder's ability to control distribution of that work,
circumvention should be permitted on technological control
measures that restrict redistribution of an E-book by
tethering it to a particular device or system.
Circumvention of access control measures that tether
E-books to specific devices or platforms is necessary
to allow purchasers to read and resell literary works
with the same ease and versatility that they have historically
exercised. By preventing circumvention of this class of
access controls, the DMCA both denies purchasers of literary
works the rights they retained under copyright's historic
balance and endows creators with new rights to restrict
how literary works are used in a manner never before contemplated
or permitted. We urge the Librarian to recommend an exemption
to the DMCA's general ban on circumvention of access control
measures to permit owners to lawfully circumvent access
control measures that tether literary works to specific
platforms or devices.
-------------------
CLASS 2: Sound recordings restricted by access controls
that tether the recording to a specific device or platform,
thereby preventing a lawful possessor from using the work
on an unsupported system in a non-infringing way.
Example: Access-Restricted CDs
Summary:
The DMCA prevents CD purchasers from listening to recordings
they lawfully acquire on the devices of their choosing,
when copyright holders distribute CDs that are tied to
a specific device or platform. An exemption for this class
of works would allow purchasers of CDs to lawfully circumvent
access controls for the lawful purpose of listening to
their recordings on multiple devices or platforms.
Facts:
Compact Discs (CDs), music downloaded from the Internet,
and other types of sound recordings are increasingly restricted
by technological access controls that prevent owners from
listening to their own recordings on the system they choose.
For example, some distributors tether sound recordings
to CD players, preventing lawful possessors from listening
to the music on a computer (See: "IBM Updates Copy-Protection
Software" by Tom Spring, CNN, April 10, 2002, at
http://www.cnn.com/2002/TECH/ptech/ 04/10/copyright.software.idg/index.html,
describing how the latest CD release by pop star Celine
Dion employed access controls that prevented playback
on a personal computer, and "Sony: Downbeat For a
New Online Music Battle" by Laura Rohde, CNN, Sept.
27, 2001 at http://www.cnn.com/2001/TECH/industry/09/27/sony.music.battle.idg/index.html,
describing how Sony Music employed access controls to
certain Michael Jackson CDs that prevented playback on
computers and CD-ROMs). Other distributors tether sound
recordings downloaded from the Internet onto the device
they are originally downloaded (See: "Music So Nice,
You Pay Twice" by Brad King, Wired News, Feb. 4,
2002 at http://www.wired.com/news/mp3/0,1285,49188,00.html
describing how Universal Music Group employed access control
measures on the downloadable recording of "Fast &
Furious -- More Music").
Argument:
There are many reasons why consumers want to be able to
move their sound recordings from their computer to CD
player, from their CD player to their Diamond Rio, or
just from their living room to their car. Some users want
to download music onto a portable MP3 player to listen
to it while jogging. Others want the ability to wirelessly
"beam" music from one device to another for
easier or continued use. There is also a cultural heritage
of making mix-tapes for one's girlfriend, or to listen
to on road trips. Today, digital technology enables people
to access their music collection in unprecedented new
ways. Transportability is one of the chief consumer benefits
of digital technology, giving consumers the ability to
"space-shift" or "place-shift" their
music from one physical location to another. This versatility
and portability has historically been part of the rights
of ownership of a sound recording and copyright law has
always been construed to empower users to 'rip, mix, burn,
and create'. Content owners have never been allowed to
control where and how and in what order a user listens
to her lawfully owned music. The DMCA changed that by
preventing circumvention of access control measures that
tether works to specific devices. To return copyright
law's traditional balance between creator and users, listeners
should be permitted to circumvent access controls that
restrict lawful listening to sound recordings on the users'
chosen platforms.
As further evidence of the desirability and support for
such an exemption, many of these portability fact-patterns
prevented by the DMCA had previously been found by courts
to be protected uses. Adopting this class exemption would
be in line with the many court decisions that have upheld
space or time-shifting. Most recently, in RIAA v. Diamond
Multimedia Systems, Inc., 180 F.3d 1072 (9th Cir.1999),
a court held that "space-shifting" of sound
recordings between different devices is considered a lawful
personal use. Most famously, in Sony Corp. of America
v. Universal City Studios, 464 U.S. 417 (1984), the US
Supreme Court held that "time- shifting" an
entire copyrighted television show using the VCR constituted
fair use under the Copyright Act, and thus was a protected
act.
Circumvention of access control measures that tether
CDs to specific devices or platforms is necessary to allow
purchasers to listen to their music with the same ease
and versatility that they have historically exercised.
By preventing circumvention of this class of access controls,
the DMCA both denies purchasers of music the rights they
retained under copyright's historic balance and endows
creators with rights to restrict how sound recordings
are used in a manner never before contemplated or permitted.
We urge the Librarian to recommend an exemption to the
DMCA's general ban on circumvention of access control
measures to permit owners to lawfully circumvent access
control measures that tether sound recordings to specific
platforms or devices.
--------------------
CLASS 3: Motion pictures and other audiovisual works
restricted by access controls that tether the work to
a specific device or platform, thereby preventing a lawful
possessor from using the work on an unsupported system
in a non-infringing way.
Example: DVDs
Summary:
The DMCA prevents DVD purchasers from watching motion
pictures they lawfully acquire on the device of their
choosing, when the movie studios distribute the DVD tethered
to a specific device or platform. An exemption for this
class of works would allow purchasers of DVDs to lawfully
circumvent access controls for the lawful purpose of watching
their motion pictures on multiple devices or platforms.
Facts:
Motion pictures in Digital Versatile Disc (DVD) format
are increasingly restricted by technological access controls
that prevent owners from watching the movie on the platform
they choose. For example, under the Hollywood movie studios'
region coding system, consumers cannot play DVDs purchased
in one region, such as Japan, India, or Europe on machines
they purchased in another region, such as the United States.
Also, DVDs can be tethered to a single platform, preventing
users from playing the same DVD on a computer and a stand-
alone DVD player, or on a Macintosh and an IBM. The DMCA
prevents users from circumventing the technology tethering
a DVD or DVD player to the region where it was purchased
or tethering a DVD to a designated platform or device.
Argument:
There are many reasons why consumers may want to play
DVDs purchased in one region on a device manufactured
in another region. They could be planning time abroad,
have been given a gift from an overseas relative, or have
purchased a souvenir movie of a vacation spot. And there
are equally as many reasons why consumers might want to
watch a movie on multiple platforms. They could have different
DVD player in different rooms of their house, wish to
upgrade their technology, or want to play a favorite movie
for their children on a computer on a long plane ride.
Without a new specific exemption from the Librarian, the
public will be prevented from accessing their DVDs on
their own equipment in perfectly lawful and previously
protected ways.
The DMCA permitting movie studios to have total control
over a DVD's use contrasts vividly with copyright's history
of balancing the interests of publishers, creators, and
users. First, copyright owners' use of tethering to enforce
region coding conflicts with 17 U.S.C. Section 602(a),
which states that consumers do not infringe a copyright
owner's exclusive rights if they import single copies
of copyrighted works for personal, noncommercial uses.
Second, the alienability of copyrighted works is restricted
because owners are limited in acquiring and disposing
of works that are not playable on local devices or on
current device models. Third, innovation is limited because
movie studios have a de facto legal monopoly over who
can build DVD players. This unprecedented new power permits
Hollywood to enforce anti-competitive practices, such
as requiring a substantial cash bond upfront to build
a software DVD player, and anti-competitive license terms,
which by their very conditions, do not permit open source
software development of DVD playing software. Together
with the monopoly on who can build DVD players, functionality
and design restriction choices of major studios prevent
many lawful uses of a motion picture.
The practice of tethering DVDs allows copyright owners
to legally enforce region coding and consequently, price
discrimination. It also allows copyright owners to increase
revenues by forcing consumers to purchase multiple copies
of movies to play on their various platforms, devices
and operating systems. This interferes with numerous non-infringing
uses of motion pictures and other audiovisual works distributed
in digital format. It is particularly troublesome as the
copyright owners uses the DVD format as its sole means
for delivering motion pictures to users. DVDs can only
be accessed on devices or systems authorized and licensed
by the copyright owners through its licensing entity DVD-CCA.
This means that the copyright owners can control both
who makes the devices and what kinds of devices and features
are available for viewers to watch their lawfully purchased
movies. By preventing users from circumventing access
control measures on either DVDs or DVD players, the DMCA
allows copyright owners an unprecedented amount of control
over which devices enter the market, how much DVDs and
players cost, what functions and features are forbidden
to include on a DVD player, and where and how users watch
their motion pictures.
This is most famously demonstrated by the continued lack
of any device to watch movies on the Linux operating system.
Besides stand-alone DVD players, computer software can
also be written which allows for viewing a DVD on a personal
computer. Despite Hollywood's years of promises and press
releases, there is still no licensed DVD player for the
Linux operating system available for consumer purchase
(See: "Corporate Paws Grab for Desktop" by Brad
King, Wired News, Sept. 9, 2002 at http://www.wired.com/news/business/0,1367,54941,00.html).
Because of the DMCA's restriction on circumventing access
controls, users cannot circumvent the technology tethering
movies to a Microsoft operating system in order to play
those movies on a Linux operating system. And they cannot
purchase content designed for a Linux machine, as the
copyright owners do not market movies for that platform.
Thus users of the Linux operating system are de facto
prevented from viewing their legally obtained movies on
their computers.
Circumvention of access control measures that tether
DVDs to specific devices or platforms is necessary to
allow purchasers to watch motion pictures with the same
ease and versatility that they have historically exercised.
By preventing circumvention of this class of access controls,
the DMCA both denies purchasers of movies the rights they
retained under copyright's historic balance and endows
creators with new rights to restrict how movies are used
in a manner never before contemplated or permitted. We
urge the Librarian to recommend an exemption to the DMCA's
general ban on circumvention of access control measures
to permit owners to lawfully circumvent access control
measures that tether motion pictures to specific platforms
or devices.
--------------------
II. Dual Purpose Technology
CLASS 4: Literary works restricted by access controls
that limit lawful access to and post-sale uses of the
work, where circumvention allows a lawful possessor to
use the work in a non-infringing way.
Example: E-books
Summary:
When a publisher distributes an E-book in a format where
one technology limits access to and limits post-sale uses
of the book, the DMCA's restriction on circumventing an
access control technology prevents the user from circumventing
the post-sale control technology. An exemption for this
class of works would allow purchasers of E-books to lawfully
circumvent access controls for the lawful purpose of exercising
the full bundle of their post-sale rights.
Facts:
Literary works distributed in electronic format, often
called E-books, are increasingly restricted by technological
controls that both prevent owners from accessing their
book and limit owner's post-sale non-infringing use of
their book. For example, Adobe's E-book access-restriction
technology allows publishers to disable many post-sale
lawful uses of the book, such as printing a single page,
reading the text aloud, or 'space-shifting' an E-book
to a hand-held device for more convenient reading. Since
it is often the same technology that restricts access
to an E-book that also restricts its post-sale use, the
DMCA's ban on bypassing access controls allows E-book
publishers to also control the consumer's use of the E-book
by technology that cannot be lawfully circumvented (See:
"Digital Copyright Overkill" by the Economist,
Dec. 5, 2002 at http://www.economist.com/business/displayStory.cfm?story_id=1482259
and "Security Technologies Could Backfire Against
Consumers" by Robert Lemos, CNET News, Nov. 7, 2002
at http://news.com.com/2009-1001-964628.html describing
how dual-purpose technologies inhibit post-sale uses of
literary works).
Argument:
Ebook readers have a legitimate need to be able to circumvent
and disable certain post-sale access controls in order
to exercise the traditional rights of book ownership.
These post-sale access controls, colloquially termed Digital
Rights Management Systems (DRMS), allow E-book publishers
to prevent a wealth of fair uses, including the right
to print, parody, space shift, sell, and trade the book.
Together with the rights protected under the DMCA, DRMs
give E-book publishers unprecedented control over an individual's
reading experience. The traditional copyright balance
has tipped dramatically against the consumer and must
be corrected if readers are to retain their lawful rights
to use books in the digital realm.
The exemption is also necessary to satisfy Congress'
intent in passing the law. In enacting the DMCA, Congress
specifically intended to permit the circumvention of access
controls where it was necessary for users to exercise
fair uses. E-book publishers and technology companies
are 'circumventing' Congress' clear intent by applying
dual use technologies to E-books. By doing so, they prevent
readers from bypassing any of the post-sale use restrictions
lawfully, because to do so would also mean bypassing the
access controls which is forbidden by the DMCA.
Circumvention of dual use technologies that limit both
access and post-sale use is necessary to allow purchasers
to read, print, use and resell literary works with the
same ease and versatility that they have historically
exercised. By preventing circumvention of this class of
access controls, the DMCA both denies purchasers of literary
works the rights they retained under copyright's historic
balance and endows creators with rights to restrict how
literary works are used in a manner never before contemplated
or permitted. We urge the Librarian to recommend an exemption
to the DMCA's general ban on circumvention of access control
measures to permit owners to lawfully circumvent technological
measures that limit both access and post-sale use of the
work, where the post sale use is protected under copyright
law.
-----------------
CLASS 5: Sound recordings restricted by access controls
that limit lawful access to and post-sale uses of the
work, where circumvention of the technology allows a lawful
possessor to use the work in a non-infringing way.
Example: Copy-restricted CDs
Summary:
When a recording company distributes a sound recording
in a format where one technology limits access to and
limits post-sale uses of the recording, the DMCA's restriction
on circumventing an access control technology prevents
the user from circumventing the post-sale control technology.
An exemption for this class of works would allow purchasers
of CDs to lawfully circumvent access controls for the
lawful purpose of exercising the full bundle of their
post-sale rights.
Facts:
Compact Discs (CDs), music downloaded from the Internet,
and other types of sound recordings are increasingly restricted
by technological controls that both prevent owners from
listening to their music and limit owners' post-sale use
of their music. Growing numbers of copy-restricted CDs
are distributed to the public treated with a technology
that disable consumers ability to copy or otherwise use
CDs in various lawful ways. If music CDs are only available
in a restricted format, then individuals will not be able
to engage in many lawful uses, including fair use of the
work, whether for review and criticism or for personal,
noncommercial copying. For example, users' ability to
copy their music so that they can listen to it on other
devices is being increasingly restricted by the release
of CDs protected by access control technologies (See:
'No more music CDs without copy protection', claims BMG
Unit', John Lettice. The Register, November 6, 2002 at
http://www.theregister.co.uk/contents/54/27960.html, and
'All CDs will be protected and you are a filthy pirate´,
John Lettice. The Register, November 8, 2002 at http://theregister.co.uk/content/54/28009.hyml,
describing the types of post-sale access controls that
are being placed on CDs).
Argument:
The DMCA distinguishes between circumventing access controls
and circumventing copy controls and allows circumvention
of copy controls in order to engage in fair use. In passing
the DMCA, Congress clearly intended the public to continue
to enjoy the right to circumvent copy controls on sound
recordings for lawful purposes. While in theory, consumers
continue to enjoy the right to circumvent copy controls
to make fair use or to engage in other lawful uses of
sound recordings, the law still forbids bypassing access
technology, and since its not possible to bypass copy
controls without also bypassing access controls with dual
use technologies, consumers are prevented from exercising
the right to bypass the copy controls on sound recordings
in order to make lawful use of their music.
Copyright holders only have the right to control public
performances of works under copyright law. But the private
performance of a work -- the private experiencing of a
work -- is intended to remain under the control of the
individual. In total disregard to thiis clear limitation
of rights, copyright owners are usurping the individual's
private performance right through the use of technological
access controls that "double" as use controls.
Circumvention of dual use technologies that limit both
access and post-sale use is necessary to allow purchasers
to enjoy their sound recordings with the same ease and
versatility that they have historically exercised. By
preventing circumvention of this class of access controls,
the DMCA both denies purchasers of music the rights they
retained under copyright's historic balance and endows
creators with rights to restrict how sound recordings
are used in a manner never before contemplated or permitted.
We urge the Librarian to recommend an exemption to the
DMCA's general ban on circumvention of access control
measures to permit owners to lawfully circumvent technological
measures that limit both access and post-sale use of the
sound recordings, where the post sale use is protected
under copyright law.
----------------
CLASS 6: Motion pictures and other audiovisual works
restricted by access controls that limit access to and
post-sale uses of the work, where circumvention of the
technology allows a lawful possessor to use the work in
a non-infringing way.
Example: DVDs
Summary:
When a movie studio distributes a movie in a format where
one technology limits access to and limits post-sale uses
of the audiovisual work, the DMCA's restriction on circumventing
an access control technology prevents the user from circumventing
the post-sale control technology. An exemption for this
class of works would allow purchasers of movies to lawfully
circumvent access controls for the lawful purpose of exercising
the full bundle of their post-sale rights.
Facts:
Motion pictures distributed in Digital Versatile Disc
(DVD) format are increasingly restricted by technological
access controls that both prevent owners from accessing
their movies and limit owners' post-sale uses of their
movies. For example, many DVDs are distributed with an
access control technology called the Content Scrambling
System (CSS) that also controls post-sale use of the movie
(See: "'Tarzan' DVD forces viewers through a jungle
of previews" Greg Sandoval, CNET News March 2, 2000
at
http://news.search.com/click?sl,news.43.282.1278.0.1.%22
fast+forward%22+dvds.0,http%3A%2F%2Fnews%2Ecom%2Ecom%2F2100%2D1017%2D237585%2Ehtml
describing how Disney's "Tarzan" DVD prevents
the consumers from fast-forwarding through the DVD's initial
advertisements).
Argument:
The DMCA distinguishes between circumventing access controls
and circumventing copy controls and permits circumvention
of copy controls in order to engage in fair use. In passing
the DMCA, Congress clearly intended the public to continue
to enjoy the right to circumvent copy controls on motion
pictures for lawful purposes. However, by exploiting the
DMCA's ban on bypassing technological access controls,
copyright owners are gaining greater control over the
post-sale experience and use of a motion picture. This
is beyond what copyright law grants or that the First
Amendment permits. By using the same technology to regulate
access to, and to regulate use of a DVD, the movie studios
have created the de facto right to control private performances
where a de jure right never existed.
Furthermore, by refusing to license the creation of DVD
players that permit copying or allow other lawful post-sale
uses, copyright owners are using the DMCA to eliminate
consumers' control over their own experience of audio-visual
works. Without the ability to circumvent use controls,
individuals are forced to experience motion pictures in
a manner controlled by the movie industry. For example,
parents who want to fast-forward through age-inappropriate
movie-previews are prevented from that legitimate activity
by CSS access controls and consumers are forced to watch
advertisements, since bypassing the technology that prevents
fast-forwarding during those ads would be a DMCA violation.
Circumvention of dual use technologies that limit both
access and post-sale use is necessary to allow purchasers
to view movies with the same ease and versatility that
they have historically exercised. By preventing circumvention
of this class of access controls, the DMCA both denies
purchasers of movies the rights they retained under copyright's
historic balance and endows creators with rights to restrict
how motion pictures and other audiovisual works are used
in a manner never before contemplated or permitted. We
urge the Librarian to recommend an exemption to the DMCA's
general ban on circumvention of access control measures
to permit owners to lawfully circumvent technological
measures that limit both access and post-sale use of their
movies, where the post sale use is protected under copyright
law. |
Comment |
|
comment
text (8 pages) |
|
|
|
21 |
|
Ernest
Miller
LawMeme |
Class |
|
Ancillary audiovisual
works distributed on Digital Versatile Discs (DVDs) using
the Content Scrambling System (CSS) of access control. |
|
|
|
Summary |
|
The
Content Scrambling System (CSS) is an access control device
for ancillary audiovisual works distributed on Digital
Versatile Discs (DVDs), a fact affirmed by the 2nd Circuit
Court of Appeals. CSS prevents quotation of ancillary
audiovisual works distributed on DVDs for purposes of
commentary and criticism, which is a noninfringing use
under current law. Consideration of the factors enumerated
in § 1201(a)(1)(C) supports the conclusion that an
exemption is warranted. An exemption will have no effect
on the availability for use of copyrighted works: the
vast number of ancillary audiovisual works are not available
in unprotected formats; CSS access control on DVDs does
not support a model beneficial to the public; and, availability
of ancillary works on DVDs is driven by consumer demand
and filmmaker enthusiasm. The effect on the availability
for use of copyrighted works for nonprofit archival, preservation,
and educational purposes is negative. The impact that
the prohibition on the circumvention of technological
measures applied to copyrighted works has on criticism
and comment is highly negative: fair use criticism and
comment are a core concern of the First Amendment and
must be granted special solicitude; the DMCA is a criminal
statute and effects on free speech concerns must be scrutinized
with particular care; ancillary materials are particularly
important elements to quote for purposes of comment and
criticism; the mere possibility of copying without violating
§ 1201(a)(1) is not sufficient to protect strong
First Amendment rights; and, there is significant harm
to an amateur reviews website and its contributors. The
effect of circumvention of technological measures on the
market for or value of copyrighted works is slightly positive,
with no negative effects. In the alternative, the Librarian
of Congress may determine that CSS is not an access control
device because it does not control access to a work. This
interpretation is supported by Congressional intent and
statutory analysis, at best CSS is copy protection.
|
Comment |
|
comment
text (35 pages) |
|
|
|
22 |
|
Peter
Suber
Earlham College |
Class |
|
Class
of works to be exempt: copyrighted content that the copyright
holder consents to publish or distribute without payment.
A slightly broader way to describe this class: copyrighted
content for which the copyright holder consents to provide
*open access*, when "open access" is defined as
access permitting the unrestricted reading, downloading,
copying, sharing, storing, printing, searching, linking,
and crawling of some body of work.
The most important works in this class are scientific
and scholarly journal articles, at least when the copyright
is retained by the author or transferred to an open-access
journal. (When the author's copyright is transferred to
a traditional journal, the new copyright holder will virtually
never consent to open access, so we're not talking about
that case.)
Scientific and scholarly journal articles are in this
class because scholarly authors are not paid for journal
articles and do not expect payment. They are paid by their
employers and share their research articles freely for
the sake of advancing knowledge. They write for impact
and not for money. When they retain copyright, or transfer
it to an open-access journal, then the copyright holder
will typically consent to open access. Access-blocking
DRM would frustrate this intention.
For the purpose of this rule-making, it shouldn't matter
whether copyright-holder consent to open access is rare
or frequent (hence, whether this class is small or large).
In fact, the class is small but growing larger every day.
The exemption is needed on the merits and in order to
give this class a better chance of growing larger. |
|
|
|
Summary |
|
The
argument: When copyright holders consent to relinquish
revenue, or consent to open access, then the copyright
statute should not stand in their way. Copyright holders
have a right to waive their rights, just as much as they
have a right to enforce them. When authors sacrifice revenue
in order to reach a larger audience, or in order to share
and advance knowledge, then readers ought to get the benefit
of the author's sacrifice. At the very least, access-blocking
DRM will thwart, not serve, this class of copyright holders.
For this class of works, an exceptionless anti-circumvention
clause threatens readers with criminal penalties for gaining
the kind of access that the copyright holder desires to
make available. When authors consent to open access, then
all use is non-infringing use. Preventing readers from
taking advantage of this gift from authors not only frustrates
copyright holders who wish to make this gift, but negates
their sacrifice in relinquishing revenue, obstructs the
free exchange of scientific ideas, and impedes research.
For these reasons, most works in this class will be published
in open-access archives or open-access journals, without
DRM, and consequently circumvention will never be an issue.
But the exemption is needed for the occasional works of
this class for which user access is hindered by DRM barriers.
Here are some examples:
1. A scholar makes a point of publishing her research
in an open-access journal. But several years later, the
journal is sold to a publisher who changes the business
model of the journal, and makes back issues accessible
only to paying customers. The copyright holder's consent
to provide open access has not changed.
2. A scholar's work is published online by an open-access
journal. But that journal is indexed by a search engine
that also indexes many priced and access-restricted journals.
Rather than discriminate and give free access to the free
articles and priced access to the priced articles, it
charges for full-text access to any article that comes
up in response to a search.
3. A government agency decides to outsource its publishing,
bypassing the GPO and its open-access policies. The private-sector
publisher makes the (public-domain) papers and other documents
of the agency available only to paying customers.
The general principle behind this request for an exemption
was also asserted in a public statement by France's Académie
des Sciences on December 6, 2001. The French Académie
called on the European Commission not to apply ordinary
copyright rules to scientific publications for which the
authors seek no payment.
http://www-mathdoc.ujf-grenoble.fr/DA/
For more on open access, see the Budapest Open Access
Initiative. (For example, the BOAI makes clear that many
authors consenting to open access wish to retain copyright
rather than put their works into the public domain.)
http://www.soros.org/openaccess/ |
Comment |
|
comment
text (2 pages) |
|
|
|
23 |
|
Don R.
Hanson II |
Class |
|
Data file formats,
including but not limited to word processing-, image- and
music file types. |
|
|
|
Summary |
|
I believe there now exists
a very real danger of losing data due to obsolete software
or even file format versions.
|
Comment |
|
comment
text (8 pages) |
|
|
|
24 |
|
Christopher
Lewis |
Class |
|
Data archival
mechanisms |
|
|
|
Summary |
|
Click-wrap
restrictions on use of data archival mechanisms, if enforceable
through the DMCA, can cripple the ability of businesses
and individuals to move their own data to new computer
systems. Access to one's own data is surely "fair
use" of a copyrighted data archival mechanism, even
if under circumstances which were not anticipated by the
vendor at the time of sale. Copyrighted software code
governing data archival and retrieval can be barred prevented,
using technological means and click-wrap "contract"
terms, from access to custodians' data for this legitimate
purpose to the detriment and penury of data custodians
seeking migration to new computing environments. |
Comment |
|
comment
text (2 pages) |
|
|
|
25 |
|
Brewster
Kahle
Internet Archive, Creative Commons, and Berkman
Center for Internet & Society |
Class |
|
Literary and
audiovisual works embodied in software whose access control
systems prohibit access to replicas of the works |
|
|
|
Summary |
|
We
have been given collections of copyrighted work in formats
or on media that are degrading and becoming obsolete with
time. To preserve these works, it is imperative that they
be migrated to modern storage systems and that the reproductions
be accessed to verify the accuracy and completeness of
the transfer. This must be done before the formats or
media become obsolete or damaged. This use is a non-infringing
use protected by Sections 107, 108 and 117 of the Copyright
Act. The proposed exemption is important to preserving
the availability of the works and enabling archiving,
future scholarship, and commentary. Furthermore, the proposed
exemption is narrowly drawn and does not damage the market
for the works. Without the ability to circumvent access
controls in order to access archived reproductions, we
have no way of ensuring this essential non-infringing
use, and these works will vanish from the historical record
of the 21st century. |
Comment |
|
comment
text (14 pages) |
|
|
|
26 |
|
Paul Schroeder
American Foundation for the Blind |
Class |
|
Literary |
|
|
|
Summary |
|
The American Foundation
for the Blind proposes an exemption for the class of works
defined as "literary." We propose this exemption
because currently deployed anti-copy technology does not
support fair use of this class of works intended by Congress.
|
Comment |
|
comment
text (7 pages) |
|
|
|
27 |
|
Edward
W. Felten |
Class |
|
(1)
Musical recordings and audiovisual works, protected by access
control mechanisms whose circumvention is reasonably necessary
to carry out a legitimate research project, where the granted
exemption applies only to acts of circumvention whose primary
purpose is to further a legitimate research project
(2) Musical recordings and audiovisual works, protected
by access control mechanisms whose circumvention is reasonably
necessary to carry out a legitimate research project
|
|
|
|
Summary |
|
The
requested exemption would enable legitimate research relating
to access control technologies. At present, much research
of this type is impossible due to the prohibition on acts
of circumvention in 1201(a)(1). The requested exemption
would allow this research to proceed.
The current state of the art in access control technology
is due in large part to past research on those technologies.
Yet today’s state of the art does not provide the
desired level of protection for copyrighted content, so
future research is needed. Without an exemption for legitimate
research, much of the needed research will not occur.
The requested exemption is not limited to encryption research
but would cover all of the legitimate access control research
that is being prevented by 1201(a)(1).
My account of the harms caused by 1201(a)(1) – harms
that would continue to accrue absent an exemption –
is based in part on my direct personal experience in performing
access control research prior to the effective date of
1201(a)(1), and on my personal plans to resume such research
should an exemption be granted. My account is also based
on my general knowledge about my colleagues in the computer
security research community, and my colleagues in other
scholarly fields.
I realize that the Librarian might conclude that it is
impossible, within the confines of the NOI to grant an
exemption for legitimate research. The Librarian might,
for example, reach such a conclusion based on a determination
that the NOI does not allow the Librarian to create an
exemption that is narrowly tailored to enable legitimate
research. If the Librarian does conclude that the NOI
does not allow an exemption to protect legitimate research,
I ask the Librarian to state that conclusion clearly,
so that it is clear that any legitimate-research exception
to 1201(a)(1) would require Congressional action. |
Comment |
|
comment
text (9 pages) |
|
|
|
28 |
|
John C.
Vaughn
Association of American Universities, American Council on
Education, and National Association of State Universities
and Land-Grant Colleges |
Class |
|
1.
“Per se Educational Fair Use Works” –
This class of exempt works shall consist of the following
subcategories of literary works, musical works, pictorial,
graphic, and sculptural works, audiovisual works, and sound
recordings: (a) scientific and social science databases,
(b) textbooks, (c) scholarly journals, (d) academic monographs
and treatises, (e) law reports, and (f) educational audiovisual
works.
2. “Fair Use Works” – This class is
meant to be a more flexible version of proposed exemption
no. 1 above. The exemption would apply to “any lawfully
acquired copy or phonorecord including a copyrighted work
falling within any category in section 102 that, due to
its nature and the users who typically use it, is likely
to be lawfully used in particular environments under the
fair use doctrine. The exemption shall apply only to such
users in connection with such fair use” (e.g., the
exemption would protect a university professor who circumvents
a lock on a lawfully acquired e-book to use a short excerpt
in a classroom setting, but would no longer protect the
professor from suit under section 1201 if the professor
then posts the (unlocked) e-book on the public Internet).
3. “Per se Educational Thin Copyright Works”
– Thin Copyright Works are works that contain limited
copyrightable subject matter, and which derive significant
value from material in the public domain, such as facts,
processes, ideas, or other elements that are beyond the
scope of copyright protection. To satisfy concerns of
vagueness, the Copyright Office should recommend a specific
list of types of works that are subject to the exemption,
i.e., a “per se” list. The list proposed herein
is focused on those works most often lawfully used in
research and education. Thus, this class of exempt works
consists of “particular subcategories within section
102 and 103, namely databases, histories, statistical
reports, abstracts, encyclopedias, dictionaries, and newspapers.”
4. “Thin Copyright works” – This category
consists of “works that contain limited copyrightable
subject matter, and which derive significant value from
material in the public domain, such as facts, processes,
ideas, or other elements that are beyond the scope of
copyright protection.”
5. “Any work to which the user had lawful initial
access (i) during the period of lawful access, or (ii)
after any period of lawful access if the user has physical
possession of a copy of the work.” |
|
|
|
Summary |
|
1.
The works fall within a category set forth in section
102, and thus fall within the 2002 NOI’s stated
preference that section 102 constitute a “starting
point” for the exempt class. “Per se”
Educational Fair Use Works, due to their nature and the
users who typically use them, are highly likely to be
used in educational environments for fair use purposes
such as teaching and scholarly research. Thus, application
of TPMs that prevent access to such works will adversely
affect the ability of users to engage in such fair use.
If the Copyright Office is concerned about potential abuses
of the exemption, a “user and environment”
restriction could be placed on this “per se”
list, as described in proposed exemption no. 2.
2. Contrary to the Librarian’s determination as
reflected in the 2000 Final Rule, the relevant section
1201 “classes of works” may be defined with
reference to the users of such works as well as the type
of use to which such works are put. The statute, in defining
the scope of the exemption, expressly references the “persons
who are users” of the copyrighted work at issue,
17 U.S.C. § 1201(a)(1)(B). Similarly, the statutory
provision that provides for this rulemaking refers to
the “users” who are adversely affected in
their ability to make “noninfringing uses,”
17 U.S.C. § 1201(a)(1)(C), and the provision that
provides for publication of exempt classes of works refers
to the “users” to whom the prohibition shall
not apply. 17 U.S.C. § 1201(a)(1)(D).
This proposed category of “Fair Use Works”
does nothing more than permit users to engage in their
legal right of fair use, unimpeded by access control technologies.
As Congress expressed throughout the legislative history,
the triennial rulemaking was specifically meant to permit
such activity.
3. Works in the above category most likely derive significant
value from material in the public domain, such as pure
facts, or other elements beyond the scope of copyright
protection, such as ideas. Thus, the application of an
effective TPM to such works would preclude users from
obtaining access to elements of a work that are not protected
by copyright law. While the Librarian noted in the 2000
Final Rule that such works also include copyrightable
elements, the use of such elements remain subject to copyright
law remedies (e.g., infringement suits) notwithstanding
the proposed exemption. Copyright owners should not be
able to preclude the public from accessing non-protectible
features of a “Thin Copyright” work. The scope
of 1201 was not meant to extend beyond copyrightable features
of a work, and it is well established that the raw facts
and ideas in a work may be copied at will. See, e.g.,
Feist Pubs., Inc. v. Rural Telephone Service Co., 499
U.S. 340, 348, 350 (1991).
4. Because the “per se” list in exemption
no. 3 could leave out significant categories of Thin Copyright
works, this more flexible exemption also should be adopted.
Although not necessary, a limitation as to the types of
users (professors, staff, and students) and context of
use (education and research) could be applied to this
category.
5. Congress intended to distinguish between access control
and use control TPMs. The content community has made clear
that it intends to use technologies that it classifies
as “access control” to implement use control,
effectively eliminating the distinction Congress intended
to preserve. Recent multi-industry consortia concerned
with protection of content on CDs (“Secure Digital
Music Initiative” (SDMI)), DVDs (“DVDCCA Call
for Proposals” on a watermarking technology), and
digital broadcast television (“Broadcast Protection
Discussion Grouop” (BPDG)) confirm the major content
owners’ goals of end-to-end technological control
over all uses of their content. The proposed exemption
no. 5 prevents this result and preserves the rights of
users to engage in lawful uses of lawfully acquired content.
The scope of the exemption is appropriate, because the
exemption does not apply after the initial, lawful access
unless the user possesses a physical copy (in which case
the user should be entitled to continue accessing the
work, while his use thereof will be subject to copyright
law and, in appropriate cases, license). |
Comment |
|
comment
text (9 pages) |
|
|
|
29 |
|
Shawn
Hernan
CERT Coordination Center |
Class |
|
1.
Those literary works, musical works and audiovisual works,
for which a person has lawfully obtained a right of use,
protected by access control mechanisms which include features,
flaws or vulnerabilities that (a) expose (i) the works to
be protected or (ii) other assets of the users of such measures--including
computers, computers systems or computer networks or the
data or other protected works used with them--to infringement,
compromise, loss, destruction, fraud and other adverse actions
or (b) permit the privacy of such users to be compromised.
2. Those literary works representing computer software
programs and databases, for which a person has lawfully
obtained a right of use, that operate to control access
to works protected under the Copyright Act but contain
features, flaws or vulnerabilities that (a) expose (i)
the works to be protected or (ii) other assets of the
users of such measures--including computers, computers
systems or computer networks or the data or other protected
works used with them--to infringement, compromise, loss,
destruction, fraud and other adverse actions or (b) permit
the privacy of such users to be compromised.
3. Compilations consisting of lists of websites blocked
by filtering software applications.
4. Literary works, including computer programs and databases,
protected by access control mechanisms that fail to permit
access because of malfunction, damage or obsoleteness. |
|
|
|
Summary |
|
1.
Access control mechanisms that fail to provide adequate
security to the works they are intended to protect are
also likely to expose the authorized user of a computer,
computer system, or network to damage or loss, including
the loss of privacy. The presence of these flawed mechanisms
exposes other protected works on related computers, computer
systems, and networks, to unauthorized access. The requested
exemption permits those with a lawful right of access
to conduct additional research, scholarship and criticism
regarding the adequacy of the control mechanisms, as well
as protected works, within the scope of fair use. Prohibiting
circumvention relating to the proposed exempt class of
works is estimated to cost the American economy significant
amounts per year (although precise cost estimates are,
for a variety of reasons including underreporting of losses
and the existence of indirect losses, !
virtually impossible to ascertain) due to (a) unauthorized
access through defective control mechanisms, (b) costs
incurred by consumers and businesses to repair features,
flaws or vulnerabilities in such control mechanisms and
(c) lost revenues from users who avoid expenditures on
protected works and related computer-based expenses out
of concern for security and privacy risks associated with
the related access controls. The proposed exemption will
have no adverse impact upon the owners of the classes
of works for which the exemption is requested.
2. Computer software programs and databases that operate
to control access to works protected under the Copyright
Act can contain features, flaws or vulnerabilities that
expose the computers, systems, networks and other assets
of authorized users to damage or loss, including the loss
of privacy. In furtherance of the exemptions relating
to circumvention available under Section 1201(e), 1201(g)
and 1201(j), the proposed exemption permits authorized
users to vigorously research, test and verify the functionality
of the class of works to which the proposed exemption
relates, and to publish related results and criticisms
regarding such works, within the scope of fair use. The
costs of prohibiting circumvention of the proposed exempt
class of works are enormous. The failure to be able to
test, and subsequently remediate, security flaws in software
and databases is estimated to cost the American economy
significant dollar amounts per year due to (a) unauthorized
access through de!
fective control mechanisms, (b) costs incurred by consumers
and businesses to repair features, flaws or vulnerabilities
in such control mechanisms and (c) lost revenues from
users who avoid expenditures on protected works and related
computer-based expenses out of concern for security and
privacy risks associated with the related access controls.
These costs are matched by the continued risks of substantial
harms not yet realized from future adverse events related
to the inability to circumvent and test access controls
protecting the class of work.
3. The proposed exemption is fully supported by the rationale
adopted by the Register in the initial exemption rulemaking
under Section 1201(1)(a)(3). There have been no changes
in the marketplace or in the related technologies or business
practices that mitigate against the necessity for continuing
the exemption.
4. The proposed exemption is fully supported by the rationale
adopted by the Register in the initial exemption rulemaking
under Section 1201(1)(a)(3). There have been no changes
in the marketplace or in the related technologies or business
practices that mitigate against the necessity for continuing
the exemption. |
Comment |
|
comment
text (10 pages) |
|
|
|
30 |
|
John T.
Mitchell |
Class |
|
Identification
of Class 1:
Sound recordings and audiovisual works (including motion
pictures) embodied in copies and phonorecords, protected
by access control mechanisms employed by or at the request
of the copyright holder that fail to permit the private
(i.e., non-public) performance of the works without the
consent of the copyright holder after all lawful conditions
surrounding the reproduction in the copy or phonorecord
have been met.
Identification of Class 2:
Sound recordings and audiovisual works (including motion
pictures) embodied in copies and phonorecords, protected
by access control mechanisms which require the use of
a computer operating system, media player, codec or digital
rights management system specified by the copyright holder
in order to gain lawful access.
Identification of Class 3:
Sound recordings and audiovisual works (including motion
pictures) embodied in copies and phonorecords, protected
by access control mechanisms employed by or at the request
of the copyright holder which tether the lawfully made
copies and phonorecords to a particular digital playback
device.
Identification of Class 4:
Sound recordings, audiovisual works and literary works
(including computer programs) protected by access control
mechanisms employed by or at the request of the copyright
holder which require, as a condition of gaining access,
that the prospective user agree to contractual terms which
restrict or limit any of the limitations on the exclusive
rights of that copyright holder under the Copyright Act.
Identification of Class 5:
Sound recordings, literary works (including computer programs
and databases), and audiovisual works (including motion
pictures), protected by access control mechanisms by or
at the request of the copyright holder which require,
as a condition precedent to granting access, that the
user directly or indirectly disclose personally identifiable
information to the copyright holder other than such information
as is reasonably necessary to complete a bona fide business
transaction.
Identification of Class 6:
Literary works, including computer programs and databases,
protected by access control mechanisms that fail to permit
access because of malfunction, damage or obsoleteness.
Identification of Class 7:
Works embodied in copies or phonorecords that have been
lawfully acquired by users or their institutions who subsequently
seek to make noninfringing uses thereof. |
|
|
|
Summary |
|
Summary
of Argument for Class 1 Exemption:
This proposed class is narrowly crafted to permit lawful
use of access control technology (hereafter “ACT”)
to protect exclusive rights or the copyright holder while
providing a public safety valve in the event a copyright
holder uses ACT to prevent the access needed to perform
a work privately, thereby extending copyright-holder control
beyond the limits of the copyright grant and infringing
upon lawful (and noninfringing) uses encouraged by the
Copyright Act.
The exclusive right to perform a work privately has never
been granted any copyright owner. It is always a non-infringing
use. The performance right is specifically limited in
subsections 106(4) and 106(6) to the exclusive right to
perform a work “publicly.” As a result, it
can never constitute copyright infringement to perform
a work privately. Nevertheless, many copyright owners
are making the right to perform their works privately
exclusive to themselves by using ACTs to condition the
grant of a license to reproduce a work into copies or
phonorecords on the licensee’s conveyance to the
copyright holder of control over private performances.
This conveyance may be carried out in part by a required
End-User License Agreement (“EULA”) (see proposed
Class 4) and carried out by the use of ACTs.
When copyright holders employ ACTs to control lawful
uses of works – uses that fall outside of the scope
of the exclusive rights of the copyright holders –
they are misusing ACTs to expand the scope of their copyrights
and infringe upon rights reserved to the public. Since
such use of ACTs does nothing to protect copyrights from
infringement, but has the sole purpose and effect of capturing
for the copyright holder a right Congress reserved to
the public, it would serve the public interest without
impairing the rights of the copyright holder to permit
the lawful circumvention of such ACTs for the purpose
of privately performing these works.
Summary of Argument for Class 2 Exemption:
Since the beginning of copyright law, authors have relied
upon the creativity, ingenuity, business skill, invention,
and competition of others to disseminate their works to
the public. Until just recently, authors generally had
no means to distribute their works to the masses themselves.
Indeed, copyright law must have been invented precisely
because reliance upon private contractual terms in which
the author attempted to maintain privity of contract with
each person receiving a work was a very poor method of
promoting science and the useful arts, or even serving
the author’s economic interests. Copyright law lifted
the “business” burden from authors, and provided
for a careful balance of public rights that served authors
as a means of serving the public.
Thus, even as major companies amassed large copyright
holdings, it has long been the case that they relied upon
delivery systems owned or controlled by others. Book publishers
profited most by not trying to also be printers, paper
mills or bookstores, music publishers profited most by
not having to become (or control) vinyl record or record
player manufacturers, radio and television broadcasters
relied upon radio and television manufacturers, and so
on. Today, that trend continues, even as the digital dissemination
of copyrighted works relies upon ever more complex systems,
including electronic devices (computers, routers, servers,
drives, sound cards, speakers) and computer software (media
players, codecs and security software).
This system of keeping the exclusive rights of copyright
holders within strict limits has served us well. There
is absolutely no “copyright interest” to be
advanced by permitting copyright holders to leverage their
lawful copyright monopolies into dictating which computer
operating systems, media players, codecs or digital rights
management systems must be used by those exercising licensed
exclusive rights of reproduction or public performance
or, worse, by those exercising rights that have never
belonged to the copyright holder, such as the right to
perform a work privately.
Recognizing this, our judiciary has produced a long line
of cases condemning the use of one copyright to bolster
the value of other material, copyrighted or not. Provision
of an exemption is a necessary corollary to respect for
the limits upon the copyright established by Congress.
Allowing competition in the development of competing technologies
used in the dissemination of copyrighted works serves,
rather than hinders, the public interest in copyright
law. Allowing such competition in no way impairs the exclusive
rights of copyright holders. Suppression of such competition,
in contrast, can serve no public interest. Accordingly,
where copyright holders seek to use technological devices
to enlarge their limited rights into control over broader
non-exclusive areas of public and private discourse, over
technology, over various distribution systems, over media
channels, and over the Internet itself, the public must
have at its disposal the freedom to use its own technological
devices to break free.
Summary of Argument for Class 3 Exemption:
Copyright holders are increasingly employing technological
devices to deny access to works which, once lawfully made,
are attempted to be played on devices other than the one
to which the copyright holder has “tethered”
the copy or phonorecord. As in the case of proposed Classes
1 and 2, such tethering does nothing to advance any legitimate
interest of the copyright holder. More importantly, tethering
serves to deny downstream users the ability to access
the works, completely voids application of the first sale
doctrine and the operation of Section 109 of the Copyright
Act, destroys all lawful trade and commerce competing
sales, rentals, lending and gifts that might compete with
“original” access in a monetized transaction
benefiting the copyright holder, and denies access to
copyrighted works to those millions of Americans who,
due to lack will or means to pay full price for a “new”
reproduction, rely upon the used market, public libraries,
private lending and gift economies to satisfy their thirst
for learning, art and entertainment.
Summary of Argument for Class 4 Exemption:
With increasing frequency, copyright holders are using
ACTs to require assent to EULAs as a condition precedent
to gaining access to copyrighted works. Some EULAs can
have public and private benefits if they spell out rights
of the copyright holder that are being licensed (or not)
to the end user. Others, however, require users to agree
to give the copyright holder additional rights denied
to them in the Copyright Act.
In some cases, the copyright holder may use the ACT to
require the user to give the copyright holder control
over noninfringing uses that fall entirely beyond the
scope of the copyright. Such would be the case of EULAs
giving the copyright holder control over non-exclusive
rights such as nonpublic performances of a work, for example.
In other cases, the ACT will be used to require assent
to waiving limitations placed upon the copyrights, such
as the limitations in sections 107-122 to which all section
106 rights are subject. An ACT used to require assent
to terms preventing the lawful redistribution (meaning
redistribution of physical objects) of lawfully made copies
and phonorecords would be but one example.
When the purpose and effect of an ACT is to enlarge the
scope of the copyright beyond the limits imposed by Congress,
the EULAs themselves should be void as against public
policy. Naturally, any use of ACTs to require assent to
such EULAs should be considered copyright misuse. It would
serve the public interest without harming any rights of
the copyright holder to permit circumvention of ACTs used
by copyright holders to leverage the licensing of lawful
rights into assent to copyright-enlarging EULAs.
Summary of Argument for Class 5 Exemption:
The courts have already recognized the application of
the First Amendment to the protection of anonymous speech.
Congress has further extended such protection to the private
sector by prohibiting private disclosure of personally
identifiable information concerning users of audiovisual
works, literary works and other materials used by library
patrons. This proposed class furthers the dual objectives
of the Copyright Clause of the Constitution and the First
Amendment to the Constitution by allowing users of copyrighted
works to circumvent efforts by copyright holders to require
that they disclose personally identifiable information
as a condition precedent to obtaining access.
Just to be clear what this class does not do, this exemption
would not invalidate a requirement that persons seeking
access disclose personally identifiable information where
necessary to complete a bona fide business transaction,
such as in the provision of credit card information or
account-holder information for payment. Rather, this exemption
would only mean that everyday actions such as preventing
a DRM from reporting to the copyright holder the identity
of the user of a lawful reproduction as part of separate
data-mining activities of the copyright holder would not
be actionable as a violation of Section 1201(a).
Summary of Argument for Class 6 Exemption:
This exemption is identical to an exemption currently
in effect, 37 C.F.R. § 201.40(b)(2). Because there
are already market examples of such malfunction, damage
or obsolescence that prevent noninfringing use for which
the product was intended, this exemption should be extended
for another term.
Summary of Argument for Class 7 Exemption:
This proposed class follows the proposal of the National
Telecommunications and Information Administration (“NTIA”)
in its September 29, 2000 letter to the Register of Copyrights.
As the Assistant Secretary for Communications and Information
explained at the time on page 4 of the letter, “this
construction is appropriate because the definition of
classes of works [in Section 1201(a)(1)(B)] is not bounded
by limitations imposed by Section 102(a) of the Copyright
Act, but incorporates an examination of ‘noninfringing
uses’ of the copyrighted materials.”
The greatest appeal of this Class 7 is its simplicity
(making it easy for the average citizen to understand),
its comprehensiveness (covering all noninfringing uses),
its furtherance of the pubic interest (by encouraging
unfettered use of lawfully acquired content), and its
incentive for copyright holders to facilitate lawful uses
rather than to impede them (by discouraging copyright
holders or their licensees from using access control technologies
to infringe upon the public’s rights).
A major substantive difference in Class 7 as previously
proposed by the NTIA from the other classes proposed herein
is that this exemption would apply without regard to whether
the ACT was imposed by or at the request of the copyright
holder. The other proposed classes would not create an
exemption for competitive business models offered independent
of the copyright holder and which do not unlawfully extend
the scope of the copyright holder’s copyright monopoly
through use of ACTs. |
Comment |
|
comment
text (35 pages) |
|
|
|
31 |
|
Seth Finkelstein |
Class |
|
Compilations
consisting of lists of websites blocked by censorware ("filtering
software") applications. |
|
|
|
Summary |
|
Discovering
what is truly banned by censorware has been a matter of
public debate. Such evidence has played an important role
in
litigation such as the _Mainstream Loudoun v. Loudoun
County Library_ library censorware case, or the Children's
Internet Protection Act (CIPA) case. Studies of censorware
blacklists are vastly hindered by not being able to access
those blacklists. In particular, studying structural,
architectural issues, such as "loophole" sites,
requires
access to the decrypted blacklist. |
Comment |
|
comment
text (10 pages) |
|
|
|
32 |
|
Samuel
Greenfeld |
Class |
|
1.
Compilations consisting of lists of websites blocked by
filtering software applications.
2. Literary works, including computer programs and databases,
protected by access control mechanisms that fail to permit
access because of malfunction, damage or obsoleteness.
3. Literary works, including computer programs and databases,
protected by access control mechanisms that are at high
risk of failure in the near-term future because of malfunction,
damage or obsoleteness. In order to invoke this case,
the potential malfunction, damage, and/or failure must
not be due intentional damage meant to invoke this clause.
4. Literary works, including computer programs and databases,
that can only be accessed indirectly via an access control.
5. Literary works, including computer programs and databases,
protected by access control mechanisms that fail to permit
access because of the copyright owner and/or their designated
agent fail to provide the necessary support means.
6. Literary works (including computer software and databases),
musical works, and motion picture works which are region
encoded, and for which the nearly identical product except
for being keyed for a region containing the United States
does not exist for mass-market consumption within the
United States. |
|
|
|
Summary |
|
1.
Previously, the Librarian of Congress decided to exempt
this class of works from the access provisions of the
Digital Millennium Copyright Act (DMCA). Research done
under this exemption has resulted in a number of findings,
many of which are of interest to the general public. It
is therefore requested that this class be considered for
renewal.
2. The Librarian of Congress previously decided to exempt
"literary works, including computer programs and
databases, protected by access control mechanisms that
fail to permit access because of malfunction, damage or
obsoleteness" from the access provisions of the Digital
Millennium Copyright Act's access previsions for the current
exemption period. And just like the previous period, literary
works are still subject to malfunction, damage, or obsoleteness.
It is therefore requested that this class be considered
for renewal.
3. The Librarian of Congress previously decided to exempt
"literary works, including computer programs and
databases, protected by access control mechanisms that
fail to permit access because of malfunction, damage or
obsoleteness" from the access provisions of the Digital
Millennium Copyright Act's access previsions for the current
exemption period. But during my personal reading of the
Library's explanations, I did not notice any discussion
on how to handle works that are likely to fail in the
near-term future.
It is therefore requested that the Librarian of Congress
either renew the previous exemption case with an additional
clause permitting, or to add an additional allowed case
to allow recovery of works likely to fail in the near
term future, when such failure is not intentionally aggravated
to invoke this clause.
4. Sometimes, access control mechanisms only allow a
user indirect access to a work. A literary work may be
sealed away in a vault, stored on a medium sealed inside
another, accessed only indirectly via an interpreter,
etc.
Such situations often leave the work's owner/licensor
no clue as to the health of the literary work itself.
It is therefore critical that a user be able to access
a work itself as well as its storage medium in order to
determine its status. This case is meant to compliment
case #3.
5. This case was contained within case #2 as a permissible
reason to bypass an access control for the current period.
But the fact that this was allowed was only made clear
by the Library's comments. When a copyright holder, company,
or other party in charge of maintaining an access control
fails to support users of said access control means, the
access control technically has not malfunctioned, been
damaged, or become obsolete; rather, the access control
provider is just being stubborn.
It is therefore requested that the Librarian of Congress
renew case #2 as before, but also clarify it by adding
this case. Since the final report in response to the previous
comment period covered this contingency, adding this case
(assuming case #2 is renewed) should be a trivial matter.
6. Previously, the Librarian of Congress decided that
this class of works did not qualify for an exemption.
However, the Librarian did admit that this situation will
have to be revisited should the situation change.
Since the time of the previous rulemaking, a number
of factors have occurred that changed the situation. Major
retailers have announced they are discontinuing and/or
decreasing sales of non-region encoded products offerings
in favor of region encoded ones. General sales estimates
have shown sales of some of these to exceed those of the
non-region encoded forms, with the likelihood of the variety
of certain non-region encoded items to be shortly cut
back and/or discontinued.
Region coded works, while providing the copyright holder
with some benefits, also provide the consumer with significant
drawbacks. Only "mass marketable" items tend
to be sold in any given market, restricting those whose
tastes do not match the average person’s. Prior
to the DMCA, those with different tastes from the mainstream
were able to import works from other countries. Region
coding, combined with other existing legislation, prohibits
this in many cases.
An argument was made during the previous comment round
that people wishing to use foreign works that contained
region-code access controls could simply purchase products
capable of playing them. But given these products are
typically sold in foreign markets, they may not meet U.S.
standards for import and/or sale. Products that can handle
works from multiple regions often limit the number of
times they can switch between regions, severely hampering
owners of multi-region collections of works. Furthermore,
the cost to purchase all the necessary support equipment
can be orders of magnitude higher than the cost of importing
the work itself, when there is no difference in storage
formats other than that due to the region access code. |
Comment |
|
comment
text (8 pages) |
|
|
|
33 |
|
Arnold
P. Lutzker
American Association of Law Libraries, American Library
Association, Association of Research Libraries, Medical
Library Association, and Special Libraries Association |
Class |
|
I.
"Literary works, including computer programs and databases,
protected by access control mechanisms that fail to permit
access because of malfunction, damage, or obsoleteness."
"Compilations consisting of lists of websites blocked
by filtering software applications."
II. "Literary works, including eBooks, which are
protected by technological measures that fail to permit
access, via a 'screen reader' or similar text-to-speech
or text-to-braille device, by an otherwise authorized
person with a visual or print disability." |
|
|
|
Summary |
|
I.
Absent evidence that the problems which originally warranted
the exemptions have been corrected by the marketplace,
the exemption issued in 2000 for "literary works,
including computer programs and databases, protected by
access control mechanisms that fail to permit access because
of malfunction, damage, or obsoleteness" and the
exemption for "compilations consisting of lists of
websites blocked by filtering software applications"
should be extended into the three-year period from October
28, 2003 to October 28, 2006.
II. Technological measures designed to control access
to and use of eBooks and other literary works in electronic
media are currently being implemented in a manner which
fails to permit access by individuals with visual or print
disabilities who utilize "screen readers" or
similar text-to-speech or text-to-braille devices as aids
to perception. Fewer than 10% of books published in the
United States are ever made available to such individuals
in accessible formats (such as braille or "talking
books") that are not subject to access controls.
Moreover, the availability of works in such formats is
typically delayed until months after a work is first released
to the general public. For these reasons, and because
circumvention to facilitate access by individuals with
visual or print disabilities is not likely to result in
cognizable harm to the market for or value of copyrighted
works, and exemption should be granted for "Literary
works, including eBooks, which are protected by technological
measures that fail to permit access, via a 'screen reader'
or similar text-to-speech or text-to-braille device, by
an otherwise authorized person with a visual or print
disability." |
Comment |
|
comment
text (13 pages) |
|
|
|
34 |
|
Jason
M. Mahler
Computer & Communications Industry Association
|
Class |
|
Sound recordings and audiovisual works (including motion
pictures) embodied in copies and phonorecords, protected
by access control mechanisms which require the use of a
computer operating system, media player, codec or digital
rights management system specified by the copyright holder
in order to gain lawful access.
|
|
|
|
Summary |
|
The
development of the technology and software industry has
evolved such that the dissemination of copyrighted works
often relies upon delivery systems or software programs
owned or controlled by others. Historically, book publishers
relied upon printers and paper mills, player piano roll
manufacturers relied upon player piano manufacturers,
vinyl record manufacturers relied upon record player manufacturers,
radio and television broadcasters relied upon radio and
television manufacturers, and so on. This paradigm persists
today as the digital dissemination of copyrighted works
relies upon increasingly complex systems, including electronic
hardware (computers, routers, servers, drives, video and
sound cards, monitors, speakers) and computer software
(operating systems, browsers, media players, codecs and
security software).
However, the goals of copyright are not advanced when
copyright holders are permitted to leverage their lawful
copyright monopolies into control over which computer
operating systems, browsers, media players, codecs or
digital rights management systems must be used by those
exercising licensed exclusive rights of reproduction or
public performance or, worse, by those exercising rights
that have never belonged to the copyright holder, such
as the right to perform a work privately.
American jurisprudence is replete with cases condemning
the use of copyright to leverage market power in related
or adjacent markets for other products or services, copyrighted
or not. Although the question whether prosecutors or private
parties may obtain relief from such abusive practices
is not before us, provision of an exemption is a necessary
corollary to respect for the limits upon the copyright
established by Congress and reaffirmed in the courts.
Allowing competition in the development of competing technologies
used in the dissemination or use of copyrighted works
serves, rather than hinders, the public interest in copyright
law. Allowing such competition in no way impairs the exclusive
rights of copyright holders and inherently benefits consumers
and innovation. |
Comment |
|
comment
text (6 pages) |
|
|
|
35 |
|
Fred von
Lohmann
Electronic Frontier Foundation and Public Knowledge |
Class |
|
Class
#1 (Copy-Protected CDs): Sound recordings released on compact
disc (“CDs”) that are protected by technological
protection measures that malfunction so as to prevent access
on certain playback devices.
Class #2 (DVD Region Coding): Audiovisual works stored on
Digital Versatile Disks (“DVDs”) that are not
available in Region 1 DVD format and access to which is
prevented by technological measures.
Class #3 (Unskippable DVD Advertising): Audiovisual works
released on DVD that contain access control measures that
interfere with the ability to control private performance,
including the ability to skip promotional materials.
Class #4 (Public Domain Film on DVD): Audiovisual works
that are in the public domain in the United States and that
are released solely on DVDs, access to which is prevented
by technological protection measures. |
|
|
|
Summary |
|
“Copy-protected”
CDs are intended to prevent the unauthorized reproduction
of sound recordings. Unfortunately, the technological
protection measures involved can malfunction so as to
make the copy-protected CDs unplayable in certain playback
equipment. A consumer should be entitled to take steps
to restore the playability of such a CD. To the extent
this activity may constitute a violation of Section 1201(a)(1),
consumers should be exempted from liability.
DVDs are region coded, so they can only be played on
a DVD player coded to the same region as the DVD. A substantial
and growing number of Americans wish to view foreign DVDs
that are not available in Region 1 versions. An exemption
is required to allow these consumers to modify their DVD
players to view their legitimately obtained foreign DVDs.
Movie studios are able to make certain DVD content “unskippable”
during playback. Some studios have abused this feature
by preventing the skipping of advertising shown prior
to the start of the feature presentation. DVD owners should
be entitled to eliminate these mandatory ads, or, in the
alternative, defeat the “UOP blocking” feature,
and should enjoy an exemption from DMCA liability when
they do so.
Public domain works are increasingly being released or
re-released only on CSS-protected DVDs, which preclude
consumer access to, and use of, these works for a range
of non-infringing purposes. To the extent that the Librarian
considers that public domain works which are stored on
CSS-protected DVDs fall within the prohibition in Section
1201(a), an exemption to circumvent CSS is required for
consumers to access and use these public domain works.
|
Comment |
|
comment
text (34 pages) |
|
|
|
36 |
|
David
B. Carroll |
Class |
|
Audiovisual
works as follows: foreign-language audiovisual works not
available for sale in the United States but available for
purchase outside the US on DVDs that are regionally encoded
to prevent playback on DVD players purchased in the United
States.
The exemption requested is to permit circumvention of
the region coding mechanism. |
|
|
|
Summary |
|
Audiovisual
works on DVD video discs currently are released with a
"regional locking" mechanism that prevents discs
manufactured in one part of the world from being played
on DVD players or DVD-ROM drives sold in other parts of
the world. This region coding functions as an access control
as per subsection 1201(a)(1)(A). We argue that this access
control causes substantial adverse impact on devotees
and students of foreign cultures or languages since a
significant quantity of foreign audiovisual material is
available for purchase only on DVDs coded for use outside
the United States. Specific markets are discussed and
examples offered. Such individuals are forced to spend
hundreds of dollars on specialized yet essentially redundant
equipment in order to view the material they have purchased.
The remedy proposed is to allow such individuals to circumvent
the region locking mechanism on their DVD playback device
for the purpose of noninfringing viewing of materials
in the exempted class.
The Library's reasons for rejecting such an exemption
in 2000 are reexamined in light of marketplaces changes. |
Comment |
|
comment
text (10 pages) |
|
|
|
37 |
|
Linda
Appleget |
Class |
|
1. Class of
work: Compatibility software or hardware
2. Class of work: Education
3. Class of work: Message Boards and other means of electronic
public discussion |
|
|
|
Summary |
|
See attached
|
Comment |
|
comment
text (4 pages) |
|
|
|
38 |
|
John C.
Gale |
Class |
|
(1)
Audio - including CDs, DVDs, tapes, records, streaming technologies
(such as, but not restricted to "realmedia" or
quicktime), all file formats (such as but not restricted
to mp3s, ogg vorbis, mpeg, divx), and any other storage
device (such as but not restricted to PVRs, PDAs, computer
hard drives, mp3players, solid state storage) and any other
recorded media (analog or digital)
(2) Video - including DVDs, laser disc, CDs, VCR tapes,
streaming technologies (such as, but not restricted to
"realmedia" or quicktime), all file formats
(such as but not restricted to mpeg, divx), and any other
storage device (such as but not restricted to PVRs, PDAs,
computer hard drives, mp3players, solid state storage)
and any other recorded media (analog or digital) |
|
|
|
Summary |
|
(1)
This section of the DMCA [17 U.S.C. 1201(a)(1)(A) (1998)]
is written such that it restricts the rights of a person
who legitimately obtained the audio recording and therefore
all classes of media for an audio format should be exempt
if the abuses of this restriction cannot be curtailed.
TITLE 17: CHAPTER 1: Sec. 117(a)(1) of the US Code.
This section properly covers the essential processes of
utilizing programs on computers (complex electronic devices
that arguably anything with microprocessors [most playback
devices and appliances] would have such status).
Why is the DMCA circumventing the law on copyright? Playing
audio involves this exact process of decoding (and copying
the data to a buffer) prior to directing the audio to
its output (usually speakers). The copyright law allows
for this essential need. While it would be better to have
this section of the DMCA repealed, the only other logical
choice is make audio information exempt.
TITLE 17: CHAPTER 1: Sec. 107(4) of the US Code.
The fair use clause allows for reproduction of a work
under certain conditions. Subsection 4 is arguably the
most important as it requires the consideration of the
effect of this copy on the value of the work.
If the work was properly purchased, what possible negative
effect is placed on the work by allowing the purchaser
to play this same recording on the player of his/her choosing
for the sole purpose of his/her private use? The answer
is it has no negative effect... even if the listener has
to copy it from the original recording to the audio playing
device (like an ipod).
I am not arguing that music should be free, that there
shouldn't be copyrights or anything of the like. I am
arguing that the rights of the purchaser are being removed
by my government! If I chose not to buy records from some
draconian and bullying entertainment conglomerate, a small
company could grow and fill the niche of leaving me with
the rights due a legitimate customer. However, this is
no longer possible since I am subject to the DMCA even
if company concerned with my rights and preserving my
freedoms is selling me a recording.
Imagine for a moment that you lose all rights related
to recordings. You have to play it on a specific player.
The player licensed to decode it might be sold only by
the recording vendor or perhaps it is only sold through
one computer software company. It would be illegal to
play the recording on a player or the PC I own, I'd have
to get a different one. THAT is ridiculous. If you think
this isn't going to happen, you are mistaken. This law
is written such that the player can be dictated to the
consumer as it is the only method allowed to decode the
work. Legally the consumer won't be able to use a different
player and manufacturers of alternative players will likely
get sued for circumvention of the "protections"
put in place.
The only way to preserve fair use is to support the exemption
of all media from the DMCA bill which tries to supersede
other, better written, laws like those of copyright law.
(2) same as reason number 1. |
Comment |
|
comment
text (2 pages) |
|
|
|
39 |
|
Shannon
Sudderth |
Class |
|
(1)
Audio - includes CDs, DVDs, tapes, records, streaming technologies,
all file formats, any other recorded media and any other
storage devices
(2) Video - including DVDs, laser discs, VCR tapes, streaming
technologies, any other recorded media and any other storage
devices |
|
|
|
Summary |
|
(1
& 2) "Subsection 1201(a)(1) applies when a person
who is not authorized by the copyright owner to gain access
to a work does so by circumventing a technological measure
put in place by the copyright owner to control access
to the work. See the Report of the House Committee on
Commerce on the Digital Millennium Copyright Act of 1998,
H.R. Rep. No. 105-551, pt. 2, at 36 (1998)"
As worded above, this provision is far too vague and
all-encompassing in scope to allow for fair use by individuals
who have PURCHASED the media listed above. For example,
if I buy a compact disc, it should be within my rights
to make a copy for my cassette player, my .mp3 player,
or any other format for which I own the hardware. Trying
to prevent such use infringes on my property and privacy
rights. The section must be reworked to cover only cases
where actual piracy, the resale of such copies, is attempted.
|
Comment |
|
comment
text (1 page) |
|
|
|
40 |
|
Jeff
Grove
U.S. Public Policy Committee of the Association for Computing
Machinery |
Class |
|
Literary works,
including computer programs and databases, protected by access
control mechanisms that fail to permit access to recognize
shortcomings in security systems, to defend patents and copyrights,
to discover and fix dangerous bugs in code, or to conduct
forms of desired educational activities. |
|
|
|
Summary |
|
USACM
has found section 1201(a)(1) to have substantial negative
impacts on the conduct of basic research in the U.S.,
particularly in cryptography and other computer security
areas. The section interferes with many legal, non-infringing
uses of digital computing and prevents scientists and
technologists from circumventing access technologies in
order to recognize shortcomings in security systems, to
defend patents and copyrights, to discover and fix dangerous
bugs in code, or to conduct forms of desired educational
activities. Examples are cited. |
Comment |
|
comment
text (2 pages) |
|
|
|
41 |
|
Jonathan
Potter
Digital Media Association |
Class |
|
1. Copy-protected
Red Book Audio format Compact Discs |
|
|
|
Summary |
|
Technological
controls applied to Red Book Audio format Compact Discs
preclude licensed (including under a statutory license)
and exempt transmitting organizations from exercising
their otherwise lawful right to make multiple ephemeral
recordings pursuant to section 112(e) of the Copyright
Act, 17 U.S.C. § 112(e). Making such ephemeral recordings
to computer servers is necessary for most Internet webcasting.
As Congress recognized in enacting the section 112(a)
exemption to liability for circumvention for the purpose
of making of a single ephemeral recording, the circumvention
capability requested by DiMA implicates section 1201(a)(1).
An exemption therefore is justified for the narrow purposes
of making permitted multiple ephemeral recordings, so
as to facilitate Internet webcasting.
Factual and legal support for this exemption is set forth
in the attached document. |
Comment |
|
comment
text (7 pages) |
|
|
|
42 |
|
Christopher
Longmire |
Class |
|
Musical,
literary and cinematogographical works in digital formats. |
|
|
|
Summary |
|
According
to the way that I have had the DMCA explained to me,
the DMCA would make it illegal to make copies of Digitalized
materials even for private use.
I would like to give an example of copying for personal
use and a few common ways that this private is implemented
that I feel should be protected:
The copying: Making copies of digitalized works for
archival and backup purposes.
Often the medium upon which digitalized products are
shipped is of low quality, regular use of the medium
often leads to deterioration of the medium making
it either unusable or making the use of the product
less enjoyable than was planned. By archiving the
product, the information therein can be used/enjoyed
without the risk of further damage to the original
medium. It is common knowledge the well-cared for
LP's last much longer than music CD's.
Personal use over home-networks: According to the
DMCA it would be illegal to make copies of the protected
works no matter what the intended use. If I want to
enjoy a music file, that is protected, through my
PC, by following the DMCA I would habe to block my
CD-ROM to use the file. If I could archive the files,
I would still have access to all of the functions
that the PC allows, and be able to enjoy the music/film
etc.
I am a US citizen an registered voter currently living
in Germany, this does not relieve me from my responsibility
to voice my concerns when I feel thta the rights of
US citizens are being infringed upon.
Thank you for this forum in which I can raise my voice
and be heard (read). |
Comment |
|
comment
text (1 page) |
|
|
|
|
43 |
|
Allen
Cook |
Class |
|
Everything,
non-commercial use, educational use, fair-use, personal use |
|
|
|
Summary |
|
The
DMCA gives too much power to copyright holders, allowing
them to accuse you and have your internet access cut off,
without a trial or proof. You can also be held liable
for even discussing defeating copy protection, or for
defeating copy protection that would otherwise be legal.
In other industries this isn't tolerated, you cannot be
arrested for owning a set of lockpicks, for breaking into
your own car, or telling someone how a lock works in an
academic text. |
Comment |
|
comment
text (1 page) |
|
|
|
44 |
|
Ethan
Hartman |
Class |
|
All digitally
recorded content. |
|
|
|
Summary |
|
The anti-circumvention measures
of the DMCA are unnecessary to protect rights holders, and
have potential for economic damage as well as a real danger
of harming innocent consumers. |
Comment |
|
comment
text (1 page) |
|
|
|
45 |
|
Patrick
A. Turlo |
Class |
|
Works that are
broadcast on college radio stations |
|
|
|
Summary |
|
BLIND
ALBERT, RAFFI DER SIMONIAH, DANIEL BRADSTREET... Heard
of them? Probably not. They are all (very) local Maine
artists that I have played on my radio shows on our 110-watt
college music station. The artists get little-to-no exposure
beyond our college station's broadcasts. They can potentially
benefit immensely from a wider (internet) audience. Please
consider an exemption for college radio stations. The
artists benefit. The "harm" is the denial of
an expanded exposure for these struggling artists and
the loss (by the potential listeners) who will never get
to hear these artists. |
Comment |
|
comment
text (2 pages) |
|
|
|
46 |
|
Brock
Manville |
Class |
|
musical works
broadcast by small/amateur internet broadcasters, such as
internet broadcasts of college radio stations |
|
|
|
Summary |
|
1.
As a self published, distributed, and promoted musician,
I can personally attest that such outlets are vital in reaching
an audience. The consolidation and dwindling competion of
the broadcasting and publishing industries has made it very
difficult for small artists to gain exposure. Already, a
number of small/amateur broadcast outlets have been forced
to close as a result of the royalty rates set recently.
Some of our friends in the music industry have thereby lost
their only broadcast connection to their audience, and thus
have lost the only significant marketing tool available
to them. Small broadcast outlets must be permitted to thrive
economically for the independent music community to thrive
as well.
Sincerely
Brock Manville |
Comment |
|
comment
text (2 pages) |
|
|
|
47 |
|
James
McNamee |
Class |
|
motion pictures
and other audiovisual works |
|
|
|
Summary |
|
One class of
work, motion pictures and other audiovisual works, is being
proposed for exemption.
Digital media commonly used to distribute motion pictures
and other audiovisual works have a finite lifespan. There
is yet no experience that the lifespan of digital media
equals or exceeds the lifespan of familiar analog media
used for analog motion pictures and other audiovisual
works.
"Refreshing" digitally recorded motion pictures
and other audiovisual works on to new digital media is
therefore necessary for the comsumer. Without such "refresh"
capability any right to use digital musical recordings
amounts to a limited time or finite use agreement.
"Refreshing" digital media that contains motion
pictures and other audiovisual works should be made permissible
for anyone who purchases a legal copy of a digital motion
picture and other audiovisual work. Until manfacturers
of digital motion pictures and other audiovisual works
provide a reasonable and inexpensive way to "refresh"
digital media, the transfer of motion pictures and other
audiovisual works from one digital medium to another (of
the same of differnt kind) must be allowed without penalty.
|
|
|
Comment |
|
comment
text (2 pages) |
|
|
|
48 |
|
James
McNamee |
Class |
|
sound recordings |
|
|
|
Summary |
|
One
class of work, sound recordings, is being proposed for
exemption.
Digital media commonly used to distribute sound recordings
have a finite lifespan. There is yet no experience that
the lifespan of digital media equals or exceeds the lifespan
of familiar analog media used for analog sound recordings.
"Refreshing" digitally recorded sound recordings
on to new digital media is therefore necessary for the
comsumer. Without such "refresh" capability
any right to use digital musical recordings amounts to
a limited time or finite use agreement.
"Refreshing" digital media that contains sound
recordings should be made permissible for anyone who purchases
a legal copy of a digital motion picture and other audiovisual
work. Until manfacturers of digital sound recordings provide
a reasonable and inexpensive way to "refresh"
digital media, the transfer of sound recordings from one
digital medium to another (of the same of differnt kind)
must be allowed without penalty. |
Comment |
|
comment
text (1 page) |
|
|
|
49 |
|
James
McNamee |
Class |
|
musical works |
|
|
|
Summary |
|
One
class of work, musical works, is being proposed for exemption.
Digital media commonly used to distribute musical works
have a finite lifespan. There is yet no experience that
the lifespan of digital media equals or exceeds the lifespan
of familiar analog media used for analog musical works.
"Refreshing" digitally recorded musical works
on to new digital media is therefore necessary for the
comsumer. Without such "refresh" capability
any right to use digital musical recordings amounts to
a limited time or finite use agreement.
"Refreshing" digital media that contains musical
works should be made permissible for anyone who purchases
a legal copy of a digital motion picture and other audiovisual
work. Until manfacturers of digital musical works provide
a reasonable and inexpensive way to "refresh"
digital media, the transfer of musical works from one
digital medium to another (of the same of differnt kind)
must be allowed without penalty. |
Comment |
|
comment
text (2 pages) |
|
|
|
50 |
|
John Ringland |
Class |
|
All photograhic,
video, and audio digital content that is, or purports to be,
record of fact. (E.g. news footage.)
|
|
|
|
Summary |
|
Video/Audio
Enhancement
The ability to apply enhancement techniques to photos/video/audio
for forensic or analytical purposes
is an essential public right, requires direct access to
the cleanest form of the data, and is compromised by any
restriction of its application to degraded forms of data
such as analog conversions. |
Comment |
|
comment
text (2 pages) |
|
|
Comment files are also available for download from our FTP
site. (Users can select multiple files or drag-and-drop into document
folders.)
|