Palo Alto, CA - Hearing Agenda
Thursday, March 23, 2006
Transcript (PDF format 296 Kb)
9:30 – 11:30
Computer programs that operate wireless telecommunications handsets. (Mobile firmware) |
Jennifer Stisa Granick, The Wireless Alliance
Written Testimony and Exhibits
Steven Metalitz, Joint Reply Commenters |
11:40 – 1:10
Computer programs and video games distributed
in formats that have become obsolete and that require the original media
or hardware as a condition of access.
Computer programs and video games
distributed in formats that require obsolete operating systems or obsolete
hardware as a condition of access. |
Brewster Kahle, The Internet Archive
Steven Metalitz, Joint Reply Commenters |
Washington, DC - Hearing Agenda
LM-649, Mumford Room
Wednesday, March 29, 2006
Transcript (PDF format 240 Kb)
1:30 – 3:00
Compilations consisting of lists of Internet locations blocked by commercially marketed filtering software applications that are intended to prevent access to domains, websites or portions of websites, but not including lists of Internet locations blocked by software applications that operate exclusively to protect against damage to a computer or a computer network or lists of Internet locations blocked by software applications that operate exclusively to prevent receipt of email. |
Jonathan Band, Library Alliance
Steven Metalitz, Joint Reply Commenters |
3:15 – 4:45
Literary works distributed in ebook format when all existing ebook editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling of the ebook's read-aloud function and that prevent the enabling of screen readers to render the text into a specialized format. |
Mark Richert, American Foundation for the Blind
Jonathan Band, Library Alliance
Steven Metalitz, Joint Reply Commenters
|
Friday, March 31, 2006
Transcript (PDF format 553 Kb)
9:30 – 11:30
SR/AV distributed in compact disc format and protected by technological protection measures that impede access to lawfully purchased works by creating or exploiting security vulnerabilities that compromise the security of personal computers. |
Deidre Mulligan, Samuelson Law, Technology & Public Policy Clinic
Edward Felten, Princeton University
Exhibit
Matthew Schruers, Computer and Communication Industry Association and Open Source and Industry Alliance
Jay Sulzberger, New Yorkers for Fair Use
Steven Metalitz,Joint Reply Commenters
Megan Carney
|
2:30 – 4:00
Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete. |
Joseph Montoro
Written Testimony and Exhibits
Steven Metalitz, Joint Reply Commenters |
Monday, April 3, 2006
Transcript (PDF format 478 Kb)
9:30 – 12:30
Audiovisual works included in the educational
library of a college or university’s film or media studies department
and that are protected by technological measures that prevent their educational
use.
Derivative and collective works which contain audiovisual works that
are in the public domain and that are protected by technological measures
that prevent their educational use. |
Jonathan Band, Library Alliance
Peter Decherney, et al, The University of Pennsylvania
Exhibit
Bill Herman
Sandra Aistars, Time Warner Inc.
Fritz Attaway, Motion Picture Association of America
Steven Metalitz, Joint Reply Commenters
Bruce Turnbull, DVD Copy Control Association
|
|