THE LAW applies to technology in the following areas
Standard English Language
Standard Technical Language
Was coined by those who wish to claim as "rights" some things which are not actually their rights, or are at best contested. In other words, the "R" in the term "DRM" begs an important legal question. I wish people would instead use the term "TPM" (Technological Protection Measures) because at least it is neutral on whether or not those who deploy them have a "right" to do what they're doing in locking up information. And TPM happens to be the term used in the WIPO treaties, too.
The word "Right"
The word "Right" has a specific meaning.
"Constitutionally protected Rights"
"Constitutionally protected Rights"
THE UNITED STATES CONSTITUTION
Article 1. Section. 8. Clause 8:
To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries;
A. Michael Froomkin Professor of Law:
The rights that copyright holders get are *statutory* rights, not constitutional ones; the Constitution merely empowers Congress to define what rights are appropriate, and it's done so in a way that creates a set of rights smaller than the set of powers that current technologies seek to claim for the sellers.
One of the problems with D-"R"-M is that the "rights" it seeks to
"protect" usually go well beyond what Congress has legislated -- to a point where they are not rights at all, but just grabby.
Two examples will make this clear.
(1) The Supreme Court has said that we have a right to "time shift" a broadcast -- record it now, play it later.
Some DRM systems try to make this impossible. Calling that "rights" protection is misleading, since what's being stopped isn't part of the right.
(2) The copyright statute gives us all a right of fair use. D-"R"-M that makes any copying impossible isn't illegal -- but it's "protecting" the content in a way that materially exceeds the scope of the right granted by copyright law.
If the average person "knows" something different -- for example
"knows" that Copyright comes straight from the Constitution without the mediating institution of Congress whether acting alone or implementing treaties -- then, once again, the average person "knows" something that ain't so.
DRM is _not_ a legal term;
it's a technical term.
In IT security, when we talk about "rights" we do not mean whatever the local legal meaning for "rights" might be. One would hope that the legal terminology war that has hijacked so much of the X.509/PKI technical work would stop there, where it has already shown to cause more harm than help.
The technical term Digital Rights Management is about "digital rights" -- as in access rights to digital information. Whether those digital access rights correspond or not to legal rights is an open, local and variably-understood question. It may well be that DRM imposes access restrictions that are not legal in some jurisdictions, while they are legal in others. OTOH, technically, "protection" is not the same as "rights". Therefore, DRM and TPM, technically, should not be the same. ~Ed Gerck
CSS - or Content Scrambling System.
CSS is the DRM (Digital Rights Management) that's designed to protect a DVD from its owner. DVD owners forced to do this to comply with DMCA act are often times looked upon with suspicion, as the owner might try to copy the product they own onto a portable device or their home computer. The answer to the demand to copy DVDs came from a product called DeCSS, which stripped away the copy protection, and with it, the dignity of DRM advocates. ~ ke
It isn't the work, ultimately, that we want out of copyright; it's the shared (published) information, the knowledge and understanding and facts and ideas which promote the progress of science and the useful arts. The information within the work, when we make a distinction from original expression, is free to be used. That this is the case is not a mere legal artifice; it is in the intrinsic nature of publishing any information at all. It's nothing new; it's not a result of the digital revolution; it's a result of the nature of information, regardless of the medium or the form in which it is represented -- and this has
Distinguishing copyright and private interest uses of TPMs lets you start sorting things out and begin articulating a sensible policy that lives in the real world. You want to control a transaction, use access control. That's more of a private interest concept than copyright policy is designed to accomplish.
You want to set special terms for exactly what sort of transaction is taking place when someone obtains a work from you, then we need to confront those policy implications forthrightly. But what's going on there isn't really copyright: even though TPMs may be strengthened by enforcement under the misnamed Digital Millennium Copyright Act, the terms that are imposed in these transactions are not really in principle valid under copyright -- and on the other hand they're often not really good models of valid, consensual contractual arrangements.
Now, to look at it from that perspective, contractual arrangements that go beyond transfers of specific exclusive rights that authors hold, are about private interest and they also happen to be consensual; whereas authors may exercise their exclusive rights under copyright even without a consensual contract. There's a deep mismatch there. The rights that we choose to give to authors under a copyright policy appropriate for the digital age have to be considered in this light.
The confusion evaporates after you recognize these distinctions between copyright and attempts to impose prior restraints on how others can use the information contained within expressive works.
I might add, that clarifying the above is completely inconsistent with a basic purpose behind the various attempts to promulgate the notion of "DRM": the idea being to mix copyright policy with private interest perspectives until something very, very different from valid copyright can be established, and a new precedent can be set, that will hopefully trump traditional jurisprudence. If this cannot be accomplished through laws enacted by representatives directly accountable to their constituencies, then the intention is to do so through international treaties enacted by unelected representatives.
TERMS OF SERVICE AGREEMENTS
8/17/17 Federal court finds online agreements are
The district court erred in concluding that the notice of the Terms of Service was not reasonably conspicuous Judge Chin wrote. While it may be the case that many users will not bother reading the additional terms, that is the choice the user makes.
Whether you like or dislike shrink/click wraps, the portion of the ruling noted above is most disturbing.
Back in the 90's many of us opposed the business software companies at many NCCUSL meetings opposing UCC2B / UCITA especially in our demands that ALL click/shrink wraps *MUST* have all terms visible prior to sale. That was a point that we actually won...
It makes zero sense that anyone should be held accountable to a contract (negotiated or not) that's written "and anything else that we wrote someplace else that you can't see at the time you're agreeing to this".
~ Glenn Tenney CISSP CISM
K12 Classroom copyright do's and don'ts.
A K-12 primer for teachers for the classroom.
Music, Video Copyright Law: How can K-12 legally use music for the video project, class project, multimedia presentation, school yearbook on the CD, class website or cable television program, produced at the school?
Standards for Electronic and Information Technology (NPRM) Implementation Section 508 Government Usability Requirements of the Rehabilitation Act.
Use the Law To Protect Yourself
- The Net Democracy Guide
- Center for Democracy and Technology
John B. Morris, Jr. Staff Counsel
Director, Internet Standards, Technology & Policy Project
Center for Democracy and Technology
1634 I Street NW, Suite 1100
Washington, DC 20006
(202) 637-0968 fax
jmorris [ at -- } cdt.org
- Understand intellectual property laws and the First Amendment protections give to your online activities.
- Use the Law To Protect Your Privacy Rights
- http://thomas.loc.gov/ To follow the status of any bill you are interested in, go to the following site and search by bill number:
- Cyberspace Law Bibliography from UCLA.
- FREEDOM OF INFORMATION ACT 4/14/2001
then in 2009 each Department of Justice component is responsible for processing FOIA requests for the records that it maintains. Consult the DOJ FOIA Reference Guide and the List of Individual DOJ Components and FOIA Contacts if you plan to make a FOIA request to the Department of Justice. Other Federal Agencies' FOIA Web Sites
Now in 2017 this agency has it's own site.
- GUIDE Freedon Of Information Act & the Privacy Act of 1974 to request government records.
- (U.S. Patent and Trademark office; click on the copyright button) http://www.uspto.gov
Anonymous had a copy of Stuxnet. That would be
the most infamous, most complex bit of malware ever written, the world’s first weaponized computer virus,
which was revealed last year to have crippled much of Iran’s nuclear program. First the slightly technical
explanation of Anonymous’ greatest stunt yet, then the way Stephen
Colbert described it. On February 24, Colbert did a lengthy segment on the hack, which by then had
become international news. Here’s how he played it: “Barr threatened Anonymous by telling the Financial
Times he had collected information on their core leaders, including many of their real names. Now, to put
that in hacker terms: Anonymous is a hornet’s nest. And Barr said, ‘I’m going to stick my penis in that
thing.’ ” Colbert relayed that Anonymous took down Barr’s website, stole his e-mails, deleted many
of HBGary research data, trashed Barr’s Twitter account, and remotely wiped his iPad. “And he had just
reached the Ham ’Em High level on Angry Birds,” Colbert said, to much studio laughter. “Anonymous then
published all of Barr’s e-mails—including one from his wife saying, ‘I will file for divorce’—and Barr’s
World of Warcraft name, sevrynsten. That’s right. They ruined both his lives.” Four days after the Colbert
jokes, Barr resigned his post at HBGary Federal.
On February 4, days after authorities had raided some 40 suspected members of Anonymous in connection with Operation Payback, Aaron Barr, the CEO of California-based cyber-security firm and government contractor HBGary Federal, stepped up and asked to be a target. Barr gave an interview to the Financial Times in which he claimed to have identified Anonymous’ leadership using social engineering hacks—essentially trolling Facebook and other networks. Barr told the Financial Times he planned to unveil his research at an upcoming security conference.
Brown says Barr had everything wrong. He was about to release names of innocent people whom the feds would then raid. Nonetheless, Anonymous issued a press release, partially written by Brown, conceding defeat.
Then, the very next day, they attacked. Using something called an SQL injection, they broke into the database underlying hbgaryfederal.com. There, Anonymous hackers found what Brown later described in an article for the Guardian as a “farrago of embarrassments”: a carelessly constructed database, systems running software with known security flaws, passwords poorly encoded, and, worst of all, the same password used on multiple systems. Within hours, Anonymous had destroyed HBGary Federal and its parent company, HBGary. Of course, Brown had called Barr an hour after the hack. He played a recording of that conversation for me. He keeps recordings like these as trophies. As the conversation grows less productive, somewhere around the 10-minute mark, Brown deadpans: “Well, you’ll have a lot to talk about at the security conference.” (HBGary later decided to withdraw from the conference.)
The HBGary hack would amount to nothing but lulz—laughs at someone else’s expense, the only acceptable motivation for any Anon who isn’t one of those moralfags—except that’s how Anonymous got its copy of Stuxnet. Someone at the antivirus firm McAfee had e-mailed it to Barr. But, far more important, buried in the 70,000 HBGary e-mails (which Anonymous made available to everyone on the file-sharing service BitTorrent) was clear evidence of a far-ranging conspiracy among several powerful corporate entities to commit what could be crimes. HBGary Federal, along with two other security firms with federal contracts, Berico Technologies and Palantir Technologies, were crafting a lucrative sales pitch to conduct a “disinformation campaign” against critics of the U.S. Chamber of Commerce. Hunton & Williams, the well-connected Washington, D.C., law and lobbying firm that was soliciting the work, also counts as a client Bank of America. The hacked e-mails show that the three security firms were working on a similar proposal to target supporters of WikiLeaks on behalf of Bank of America, which has reason to believe it might be the group’s next target.
As February drew to a close and D Magazine went to press, about a dozen House Democrats called for an investigation into Hunton & Williams and the three security firms, saying that the hacked e-mails appear “to reveal a conspiracy to use subversive techniques to target Chamber critics,” including “possible illegal actions against citizens engaged in free speech.”
And so it comes to pass that the kid who first used his computer to feel a girl up, then later found he could use it to mess with furries, now finds himself using it to fight for free speech, of all things.
“Our people break laws, yes,” Brown says. “When we do so, we do it as an act of civil disobedience. We do it ethically.”