THE LAW applies to technology in the following areas
COPYRIGHT AND FAIR USE
Copyright vs. Copyleft and the Creative Commons
DRM
Standard English Language
vs
TPM
Standard Technical Language
DRM
Was coined by those who wish to claim as "rights" some things which are not actually their rights, or are at best contested. In other words, the "R" in the term "DRM" begs an important legal question. I wish people would instead use the term "TPM" ( Technological Protection Measures ) because at least it is neutral on whether or not those who deploy them have a "right" to do what they're doing in locking up information. And TPM happens to be the term used in the WIPO treaties, too.
The word "Right"
The word "Right" has a specific meaning.
"Constitutionally protected Rights"
"Constitutionally protected Rights"
THE UNITED STATES CONSTITUTION
Article 1. Section. 8. Clause 8:
To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries;
A. Michael Froomkin Professor of Law:
The rights that copyright holders get are *statutory* rights,
not constitutional ones;
the Constitution merely empowers Congress to define what rights
are appropriate, and it's done so in a way that creates a set of
rights smaller than the set of powers that current technologies
seek to claim for the sellers.
One of the problems with D-"R"-M is that the "rights" it seeks to
"protect" usually go well beyond what Congress has legislated --
to a point where they are not rights at all, but just grabby.
Two examples will make this clear.
(1) The Supreme Court has said that we have a right to "time
shift" a broadcast -- record it now, play it later.
Some DRM systems try to make this impossible. Calling that
"rights" protection is misleading, since what's being stopped
isn't part of the right.
(2) The copyright statute gives us all a right of fair use.
D-"R"-M that makes any copying impossible isn't illegal -- but
it's "protecting" the content in a way that materially exceeds the
scope of the right granted by copyright law.
If the average person "knows" something different -- for example
"knows" that Copyright comes straight from the Constitution
without the mediating institution of Congress whether acting alone
or implementing treaties -- then, once again, the average person
"knows" something that ain't so.
DRM is _not_ a legal term;
it's a technical term.
In IT security, when we talk about "rights" we do not mean
whatever the local legal meaning for "rights" might be.
One would hope that the legal terminology war that has hijacked so
much of the X.509/PKI technical work would stop there, where it
has already shown to cause more harm than help.
The technical term Digital Rights Management is about "digital
rights" -- as in access rights to digital information.
Whether those digital access rights correspond or not to legal
rights is an open, local and variably-understood question. It may
well be that DRM imposes access restrictions that are not legal in
some jurisdictions, while they are legal in others. OTOH,
technically, "protection" is not the same as "rights". Therefore,
DRM and TPM, technically, should not be the same. ~Ed Gerck
CSS - or Content Scrambling System.
CSS is the DRM (Digital Rights Management) that's designed to
protect a DVD from its owner. DVD owners forced to do this to
comply with DMCA act are often times looked upon with suspicion,
as the owner might try to copy the product they own onto a
portable device or their home computer. The answer to the demand
to copy DVDs came from a product called
DeCSS
, which stripped away the copy protection, and with it, the
dignity of DRM advocates. ~ ke
Seth Johnson:
It isn't the work, ultimately, that we want out of copyright;
it's the shared (published) information, the knowledge and
understanding and facts and ideas which promote the progress
of science and the useful arts
. The information within the work, when we make a distinction from
original expression, is free to be used. That this is the case is
not a mere legal artifice; it is in the intrinsic nature of
publishing any information at all. It's nothing new; it's not a
result of the digital revolution; it's a result of the nature of
information, regardless of the medium or the form in which it is
represented -- and this has
Distinguishing copyright and private interest uses of TPMs lets
you start sorting things out and begin articulating a sensible
policy that lives in the real world. You want to control a
transaction, use access control. That's more of a private interest
concept than copyright policy is designed to accomplish.
You want to set special terms for exactly what sort of transaction
is taking place when someone obtains a work from you, then we need
to confront those policy implications forthrightly. But what's
going on there isn't really copyright: even though TPMs may be
strengthened by enforcement under the misnamed Digital Millennium
Copyright Act, the terms that are imposed in these transactions
are not really in principle valid under copyright -- and on the
other hand they're often not really good models of valid,
consensual contractual arrangements.
Now, to look at it from that perspective, contractual arrangements
that go beyond transfers of specific exclusive rights that authors
hold, are about private interest and they also happen to be
consensual; whereas authors may exercise their exclusive rights
under copyright even without a consensual contract. There's a deep
mismatch there. The rights that we choose to give to authors under
a copyright policy appropriate for the digital age have to be
considered in this light.
The confusion evaporates after you recognize these distinctions
between copyright and attempts to impose prior restraints on how
others can use the information contained within expressive works.
I might add, that clarifying the above is completely inconsistent
with a basic purpose behind the various attempts to promulgate the
notion of "DRM": the idea being to mix copyright policy with
private interest perspectives until something very, very different
from valid copyright can be established, and a new precedent can
be set, that will hopefully trump traditional jurisprudence. If
this cannot be accomplished through laws enacted by
representatives directly accountable to their constituencies, then
the intention is to do so through international treaties enacted
by unelected representatives.
TERMS OF SERVICE AGREEMENTS
8/17/17 Federal court finds online agreements are binding
The district court erred in concluding that the notice of the
Terms of Service was not reasonably conspicuous Judge Chin wrote.
While it may be the case that many users will not bother reading
the additional terms, that is the choice the user makes.
Whether you like or dislike shrink/click wraps, the portion of the
ruling noted above is most disturbing.
Back in the 90's many of us opposed the business software
companies at many NCCUSL meetings opposing UCC2B / UCITA
especially in our demands that ALL click/shrink wraps *MUST* have
all terms visible prior to sale. That was a point that we actually
won...
It makes zero sense that anyone should be held accountable to a
contract (negotiated or not) that's written "and anything else
that we wrote someplace else that you can't see at the time you're
agreeing to this".
~ Glenn Tenney CISSP CISM
K-12 School
K12 Classroom copyright do's and don'ts.
A K-12 primer for teachers for the classroom.
Music, Video Copyright Law: How can K-12 legally use music for the
video project, class project, multimedia presentation, school
yearbook on the CD, class website or cable television program,
produced at the school?
School's Rights vs. Students Rights Online.
Filtering in the Schools and Libraries restrict access to information
Standards for Electronic and Information Technology (NPRM) Implementation Section 508 Government Usability Requirements of the Rehabilitation Act.
Use the Law To Protect Yourself
- The Net Democracy Guide
-
Center for Democracy and Technology
John B. Morris, Jr. Staff Counsel
Director, Internet Standards, Technology & Policy Project
Center for Democracy and Technology
1634 I Street NW, Suite 1100
Washington, DC 20006
(202) 637-9800
(202) 637-0968 fax
jmorris [ at -- } cdt.org - Understand intellectual property laws and the First Amendment protections give to your online activities.
- Use the Law To Protect Your Privacy Rights
- http://thomas.loc.gov/ To follow the status of any bill you are interested in, go to the following site and search by bill number:
- Cyberspace Law Bibliography from UCLA.
-
FREEDOM OF INFORMATION ACT
4/14/2001
then in 2009 each Department of Justice component is responsible for processing FOIA requests for the records that it maintains. Consult the DOJ FOIA Reference Guide and the List of Individual DOJ Components and FOIA Contacts if you plan to make a FOIA request to the Department of Justice. Other Federal Agencies' FOIA Web Sites
Now in 2017 this agency has it's own site. - GUIDE Freedon Of Information Act & the Privacy Act of 1974 to request government records.
- (U.S. Patent and Trademark office; click on the copyright button) http://www.uspto.gov
Anonymous had a copy of Stuxnet
.
That would be the most infamous, most complex bit of malware ever
written, the world's first weaponized computer virus, which was
revealed last year to have crippled much of Iran's nuclear
program. First the slightly technical explanation of Anonymous'
greatest stunt yet, then the way
Stephen Colbert
described it. On February 24, Colbert did a lengthy segment on the
hack, which by then had become international news. Here's how he
played it: “Barr threatened Anonymous by telling the Financial
Times he had collected information on their core leaders,
including many of their real names. Now, to put that in hacker
terms: Anonymous is a hornet's nest. And Barr said, 'I'm going to
stick my penis in that thing.' ” Colbert relayed that Anonymous
took down Barr's website, stole his e-mails, deleted many
gigabytes of HBGary research data, trashed Barr's Twitter account,
and remotely wiped his iPad. “And he had just reached the Ham 'Em
High level on Angry Birds,” Colbert said, to much studio laughter.
“Anonymous then published all of Barr's e-mails—including one from
his wife saying, 'I will file for divorce'—and Barr's World of
Warcraft name, sevrynsten. That's right. They ruined both his
lives.” Four days after the Colbert jokes, Barr resigned his post
at HBGary Federal.
On February 4, days after authorities had raided some 40 suspected
members of Anonymous in connection with Operation Payback, Aaron
Barr, the CEO of California-based cyber-security firm and
government contractor HBGary Federal, stepped up and asked to be a
target. Barr gave an interview to the Financial Times in which he
claimed to have identified Anonymous' leadership using social
engineering hacks—essentially trolling Facebook and other
networks. Barr told the Financial Times he planned to unveil his
research at an upcoming security conference.
Brown says Barr had everything wrong. He was about to release
names of innocent people whom the feds would then raid.
Nonetheless, Anonymous issued a press release, partially written
by Brown, conceding defeat.
Then, the very next day, they attacked. Using something called an
SQL injection, they broke into the database underlying
hbgaryfederal.com. There, Anonymous hackers found what Brown later
described in an article for the Guardian as a “farrago of
embarrassments”: a carelessly constructed database, systems
running software with known security flaws, passwords poorly
encoded, and, worst of all, the same password used on multiple
systems. Within hours, Anonymous had destroyed HBGary Federal and
its parent company, HBGary. Of course, Brown had called Barr an
hour after the hack. He played a recording of that conversation
for me. He keeps recordings like these as trophies. As the
conversation grows less productive, somewhere around the 10-minute
mark, Brown deadpans: “Well, you'll have a lot to talk about at
the security conference.” (HBGary later decided to withdraw from
the conference.)
The HBGary hack would amount to nothing but lulz—laughs at someone
else's expense, the only acceptable motivation for any Anon who
isn't one of those moralfags—except that's how Anonymous got its
copy of Stuxnet. Someone at the antivirus firm McAfee had e-mailed
it to Barr. But, far more important, buried in the 70,000 HBGary
e-mails (which Anonymous made available to everyone on the
file-sharing service BitTorrent) was clear evidence of a
far-ranging conspiracy among several powerful corporate entities
to commit what could be crimes. HBGary Federal, along with two
other security firms with federal contracts, Berico Technologies
and Palantir Technologies, were crafting a lucrative sales pitch
to conduct a “disinformation campaign” against critics of the U.S.
Chamber of Commerce. Hunton & Williams, the well-connected
Washington, D.C., law and lobbying firm that was soliciting the
work, also counts as a client Bank of America. The hacked e-mails
show that the three security firms were working on a similar
proposal to target supporters of WikiLeaks on behalf of Bank of
America, which has reason to believe it might be the group's next
target.
As February drew to a close and D Magazine went to press, about a
dozen House Democrats called for an investigation into Hunton
& Williams and the three security firms, saying that the
hacked e-mails appear “to reveal a conspiracy to use subversive
techniques to target Chamber critics,” including “possible illegal
actions against citizens engaged in free speech.”
And so it comes to pass that the kid who first used his computer
to feel a girl up, then later found he could use it to mess with
furries, now finds himself using it to fight for free speech, of
all things.
“Our people break laws, yes,” Brown says. “When we do so, we do it
as an act of civil disobedience. We do it ethically.”