Management of Rights in the Digital Environment

advertisement
Digital Copyright and
Management of Rights in the
Digital Environment
Giancarlo F. Frosio
The Internet, Digitization and the Digital Dilemma
“. . . information wants to be free, because it has become so
cheap to distribute, copy, and recombine - too cheap to
meter. It wants to be expensive because it can be
immeasurably valuable to the recipient. That tension will not
go away . . . .”
Stuart Brand (founder of Electronic Frontier Foundation), THE MEDIA LAB: INVENTING
FUTURE AT MIT 86 (Penguin Books 1986)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
THE
2
The Internet, Digitization and the Digital Dilemma
“The digital dilemma”
NATIONAL RESEARCH BOARD, THE DIGITAL DILEMMA: INTELLECTUAL PROPERTY
INFORMATION AGE (National Academy Press, 2000)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
IN
THE
3
The Internet, Digitization and the Digital Dilemma
The Digital
Threat
22/03/2016
The Digital
Opportunity
Giancarlo F. Frosio, (CC) by-nc-sa
4
The Internet, Digitization and the Digital Dilemma
“earlier generations of technology . . . have presented
challenges to existing copyright law, but none have posed
the same threat as the digital age . . . .”
John V. Pavlic, New Media Technology, 1996. John V. Pavlic is executive director of the
Columbia University Center for New Media.
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
5
The Internet, Digitization and the Digital Dilemma
“notions of security and control that may have been
exercisable in the non-networked, analog world cannot be
effectively transferred to a realm where even a single digital
copy can propagate millions of perfect clones, world-wide,
almost instantaneously, and where control over the quantity
and destiny of the bits that comprise digital media will be
imperfect at best.”
Philip S. Corwin, legal counsel for Sharman Networks, owner of KaZaa peer-to-peer
software, in a letter to Senator Joseph R. Biden, Jr., February 26, 2002
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
6
The Internet, Digitization and the Digital Dilemma
“I believe we are moving into a new kind of cultural if not
economic reality. We are moving away from a world
organized around centralized control, strict intellectual
property rights and hierarchies of credentialed experts, to a
radically different order. The new order is predicated upon
open access, decentralized participation, and cheap and
easy sharing.”
David Bollier, The Commons as New Sector of Value Creation: It’s Time to Recognize
and Protect the Distinctive Wealth Generated by Online Commons, Remarks at the
Economies of the Commons: Strategies for Sustainable Access and Creative Reuse of
Images and Sounds Online Conference (Amsterdam, April 12, 2008)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
7
Copying in the Digital Enviroment
“[I]n the digital world copying is such an essential action, so bound
up with the way computers work, that control of copying provides,
in the view of some, unexpectedly broad powers, considerably
beyond those intended by the copyright law.”
NATIONAL RESEARCH BOARD, THE DIGITAL DILEMMA: INTELLECTUAL PROPERTY
INFORMATION AGE 140 (National Academy Press, 2000)
IN
THE
“For while it may be obvious that in the world before the Internet,
copies were the obvious trigger for copyright law, upon reflection, it
should be obvious that in the world with the Internet, copies should
not be the trigger for copyright law. More precisely, they should not
always be the trigger for copyright law.”
LAWRENCE LESSIG, FREE CULTURE 140 (2004)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
8
Adapting the Law to Digitization
 Reproduction
 Agreed statement concerning Article 1 (4), WCT: “The reproduction
right, as set out in Article 9 of the Berne Convention, and the exceptions
permitted thereunder, fully apply in the digital environment, in particular
to use of the works in digital form. Storage of a protected work in digital
form in an electronic medium constitutes a reproduction within the
meaning of Article 9 of the Berne Convention.”
 Including temporary (or permanent) reproduction
 By any means and in any form
 Communication to the public
 by wire or wireless means,
 including the making available to the public of their works
 in such a way that members of the public may access them from a
place and at a time individually chosen by them
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
9
Adapting the Law to Digitization
 Distribution
 authors retain the right to control and license their works, when those
works are re-compiled or re-distributed electronically in the digital
environment
 The New York Times, Co. v. Tasini , 533 U.S. 483 (2001) (Freelance writers)
 National Geographic v. Greenberg, 122 S. Ct. 347 (2001) (Freelance
photographers)
 Exhaustion
 Agreed statement concerning Article 6 (2), WCT: “Nothing in this Treaty shall
affect the freedom of Contracting Parties to determine the conditions, if any,
under which the exhaustion of the right in paragraph (1) applies after the first
sale or other transfer of ownership of the original or a copy of the work with the
authorization of the author.”
 Agreed statement concerning Articles 6 and 7, WCT: “As used in these Articles,
the expressions “copies” and “original and copies,” being subject to the right of
distribution and the right of rental under the said Articles, refer exclusively to
fixed copies that can be put into circulation as tangible objects.”
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
10
Exceptions, Temporary Copies
 Exemption of copies from copyright infringement under
certain conditions; act of reproduction must be:
 temporary and transient or incidental
 integral and essential part of a technological process
 sole purpose is to enable:
 lawful use of a work or other subject matter or a transmission, in a network
between 3rd parties by an intermediary
 no independent economic significance
 Webcasting is excluded
 also known as "streaming", is the process of digitally transmitting musical
recordings, and radio and television broadcasts over the Internet. The process is
designed not to create permanent copies on end-listeners' computer hard drives.
 MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511
(9th Cir. 1993)
 17 U.S.C. § 117 amended to overrule this holding
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
11
Digital Right Managment (DRMs)
“The answer to the machine is in the machine”
Clark Charles, The Answer to the Machine is in the Machine, in THE FUTURE OF
THE COPYRIGHT IN A DIGITAL ENVIRONMENT 139-146 (P. Bernt Hugenhotltz
ed., Kluwer Law International 1996)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
12
Digital Rights Management (DRM) and Technological
Protection Measures (TPMs)
 Digital Right Management (DRMs)
 any of several technologies used to enforce pre-defined
limitations on the use and transfer of copyrighted digital
content.
 viewing,
 copying,
 printing,
 altering and
 everything else that can be done with digital content.
 Technological Protection Measures (TPMs)
 Use
 Access
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
13
Anti-Circumvention Provisions
 WIPO Treaties 1996
 Art. 11 WCT & 18 WPPT
 Digital Millenium Copyright Act 1998
 Title I, DMCA
§ 1201-1205 Copyright Act
 Directive 01/29/EC (Information Society Directive)
 Art. 6 and 7
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
14
WIPO Copyright Treaty 1996
Contracting Parties shall provide adequate legal protection and
effective legal remedies against the circumvention of effective
technological measures that are used by authors in connection
with the exercise of their rights under this Treaty or the Berne
Convention and that restrict acts, in respect of their works,
which are not authorized by the authors concerned or
permitted by law.
(Obligations Concerning Technological Measures, Art. 11 WCT)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
15
WIPO Copyright Treaty 1996
(1) Contracting Parties shall provide adequate and effective legal remedies against
any person knowingly performing any of the following acts knowing, or with respect
to civil remedies having reasonable grounds to know, that it will induce, enable,
facilitate or conceal an infringement of any right covered by this Treaty or the Berne
Convention:
(i) to remove or alter any electronic rights management information without
authority;
(ii) to distribute, import for distribution, broadcast or communicate to the
public, without authority, works or copies of works knowing that electronic rights
management information has been removed or altered without authority.
(2) As used in this Article, “rights management information” means information which
identifies the work, the author of the work, the owner of any right in the work, or
information about the terms and conditions of use of the work, and any numbers or
codes that represent such information, when any of these items of information is
attached to a copy of a work or appears in connection with the communication of a
work to the public.
(Obligations Concerning Right Management Information, Art. 12 WCT)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
16
WIPO Performance and Phonograms Treaty 1996
Contracting Parties shall provide adequate legal protection and
effective legal remedies against the circumvention of effective
technological measures that are used by performers or
producers of phonograms in connection with the exercise of
their rights under this Treaty and that restrict acts, in respect of
their performances or phonograms, which are not authorized by
the performers or the producers of phonograms concerned or
permitted by law.
(Obligations Concerning Technological Measures, Art. 18 WPPT)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
17
Digital Millenium Copyright Act
(a)(1) No person shall circumvent a technological
measure that effectively controls access to a work
protected under this title.
(§ 1201 (a) (1) (A))
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
18
Digital Millenium Copyright Act
(a)(2) No person shall manufacture, import, offer to the public,
provide, or otherwise traffic in any technology, product, service,
device, component, or part thereof, that
(A) is primarily designed or produced for the purpose of
circumventing a technological measure that effectively controls
access to a work protected under this title;
(B) has only limited commercially significant purpose or use
other than to circumvent a technological measure that effectively
controls access to a work protected under this title; or
(C) is marketed by that person or another acting in concert with
that person with that person’s knowledge for use in
circumventing a technological measure that effectively controls
access to a work protected under this title.
(§ 1201 (a) (2) (A) (B) (C))
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
19
Digital Millenium Copyright Act
(a)(3) As used in this subsection
(A) to “circumvent a technological measure” means to
descramble a scrambled work, to decrypt an encrypted work, or
otherwise to avoid, bypass, remove, deactivate, or impair a
technological measure, without the authority of the copyright
owner; and
(B) a technological measure “effectively controls access to a
work” if the measure, in the ordinary course of its operation,
requires the application of information, or a process or a
treatment, with the authority of the copyright owner, to gain
access to the work.
(§ 1201 (a) (3) (A) (B))
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
20
Digital Millenium Copyright Act
(b)(1) No person shall manufacture, import, offer to the public, provide, or
otherwise traffic in any technology, product, service, device, component, or
part thereof, that
(A) is primarily designed or produced for the purpose of circumventing
protection afforded by a technological measure that effectively protects
a right of a copyright owner under this title in a work or a portion
thereof;
(B) has only limited commercially significant purpose or use other than to
circumvent protection afforded by a technological measure that
effectively protects a right of a copyright owner under this title in a
work or a portion thereof; or
(C) is marketed by that person or another acting in concert with that
person with that person’s knowledge for use in circumventing protection
afforded by a technological measure that effectively protects a right of
a copyright owner under this title in a work or a portion thereof.
(§ 1201 (b) (1) (A) (B) (C))
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
21
Digital Millenium Copyright Act
(b)(2) As used in this subsection
(A) to “circumvent protection afforded by a technological
measure” means avoiding, bypassing, removing, deactivating, or
otherwise impairing a technological measure; and
(B) a technological measure “effectively protects a right of a
copyright owner under this title” if the measure, in the ordinary
course of its operation, prevents, restricts, or otherwise limits
the exercise of a right of a copyright owner under this title.
(§ 1201 (b) (2) (A) (B))
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
22
DMCA, Copyright Management Information
(a) False Copyright Management Information.— No person shall knowingly and with
the intent to induce, enable, facilitate, or conceal infringement
(1) provide copyright management information that is false, or
(2) distribute or import for distribution copyright management information that is
false.
(b) Removal or Alteration of Copyright Management Information.— No person
shall, without the authority of the copyright owner or the law
(1) intentionally remove or alter any copyright management information,
(2) distribute or import for distribution copyright management information
knowing that the copyright management information has been removed or altered
without authority of the copyright owner or the law, or
(3) distribute, import for distribution, or publicly perform works, copies of works,
or phonorecords, knowing that copyright management information has been
removed or altered without authority of the copyright owner or the law,
knowing, or, with respect to civil remedies under section 1203, having reasonable
grounds to know, that it will induce, enable, facilitate, or conceal an infringement of any
right under this title.
(§ 1201 (b) (2) (A) (B))
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
23
DMCA, Exemptions
(1) Statatutory exemptions




Exemption for Nonprofit Libraries, Archives, and Educational Institutions
Law Enforcement, Intelligence, and Other Government Activities
Reverse Engineering
Encryption Research
(2) Administratively-created exemptions (last issued by the
Librarian of the Congress in July 2010)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
24
Information Society Directive (Dir. 01/29)
Obligation of appropriate protection against circumvention
of TPMs
(Art. 6, Par. 1)
Obligation of appropriate protection against acts preparing
the circumvention: manufacture, sale, etc.
(Art. 6, Par. 2)
Definition of TPMs and effective TPMs
(Art 6, Par. 3)
Mechanism to ensure the respect of copyright exceptions
(Art. 6, Par. 4)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
25
InfoSoc, Anti-circumvention of TPMs
(Art. 6, §1 & 2) Member States must provide
for the legal protection of TPMs:
 prevent the circumvention of effective TPMs which
the person concerned carries out knowingly or with
reasonable grounds to know that she/he is
circumventing the TPMs & activities primarily
designed or produced to circumvent TPMs (ACDs)
 prevents manufacture, sale, etc. of devices whose
main purpose is to circumvent TPMs
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
26
InfoSoc, Effective TPMs
 “TPM means any technology, device or component that, in
the normal course of its operation, is designed to prevent or
restrict acts, in respect of works or other subject-matter,
which are not authorised by the right holder of any copyright
or any right related to copyright as provided for by law or the
sui generis right provided for in Chapter III of Directive
96/9/EC.”
 “Technological measures shall be deemed "effective" where
the use of a protected work or other subject-matter is
controlled by the right holders through application of an
access control or protection process, such as encryption,
scrambling or other transformation of the work or other
subject-matter or a copy control mechanism, which achieves
the protection objective.”
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
27
InfoSoc, Manufacture of Circumvention Tools
 Article 6.2 requires Member States to provide legal
protection against the
"manufacture, import, distribution, sale, rental, advertisement
for sale for rental, or possession for commercial purposes of
devices, products or components of the provision of services"
for the purposes of circumventing technological
measures, including
 encryption,
 scrambling or
 other copy control mechanisms.
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
28
InfoSoc, Right Management Information
 Art. 7.1: Legal protection against the removal or
alteration of any electronic RMI and the
diffusion of protected material from which the
RMI has been removed or altered by any person
doing so knowingly
 Art. 7.2: definition of RMI: any information
provided by right holders which identifies:
 the subject-matter protected
 the author or any other right holder
 information about the terms and conditions of use of
the protected subject-matter and
 any numbers or codes representing that information.
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
29
Sanctions
 Member States must take effective, proportionate
and dissuasive sanctions and remedies to enforce
rights in the directive
 Member States must ensure that right holder has
right to bring action for damages or injunction (in
compliance with Artt. 44 & 45 TRIPs) and seize the
infringing goods, etc. (in compliance with Art. 46
TRIPS).
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
30
Tensions between TPMs and Others Rights
Privileged
Uses
TPMs
Freedom of
Expression
Competition
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
31
Tension between TPMs and Privileged Uses
 Three levels of protection:
 Copyright
 TPMs
 Legal protection of TPM
 Tension: copyright’s balance (level 1) can be
jeopardized by the legal protection (level 3) of TPMs
(level 2)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
32
Tension between TPMs and Privileged Uses
Consumers feared a technical monopoly over all use of
copyright works, lawful as well as unlawful.
 If a TPM is introduced which blocks all copying
 and it is unlawful to circumvent that TPM,
 right owners could technically prevent copying permitted
by exceptions or where the term of copyright has expired
 in addition, it would actually be unlawful to circumvent the
technological copy protection measures.
Users will not benefit from exceptions
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
33
Tension between TPMs and Privileged Uses
 (Art. 6.4) “Member States should promote voluntary measures
taken by right holders, including the conclusion and
implementation of agreements between right holders and other
parties concerned, to accommodate achieving the objectives of
certain specific exceptions or limitations provided for in national
law.”
 In the absence of such voluntary measures or agreements,
Member States are obliged to take appropriate measures to
ensure that right holders provide beneficiaries of such exceptions
or limitations with appropriate means of benefiting from them.
 This provisions shall not apply to works or other subject-matter
made available to the public on agreed contractual terms in such a
way that members of the public may access them from a place and
at a time individually chosen by them.
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
34
Tension between TPMs and Privileged Uses
What if the rightsholders do not provide the
users with appropriate means of benefiting
from the exceptions and limitations?
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
35
Tension between TPMs and Freedom of Expression
 United States of America v. Elcom Ltd. a/k/a ElcomSoft Co. Ltd,
and Dmitry Sklyarov
 Universal City Studios, Inc. v. Reimerdes, 111 F.Supp. 2d 294
(S.D.N.Y. 2000)
 "Content Control System" ("CSS") circumvented by the program DeCSS
 Universal City Studios, Inc. v. Corley, 2001 U.S. App. LEXIS
25330 (2nd Cir. 2001)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
36
Tension between TPMs and Competition
 The Chamberlain Group, Inc. v. Skylink Technologies,
Inc., 381 F.3d 1178 (Fed. Cir. 2004)
 Garage door opener case
 Lexmark Int'l v. Static Control Components, 387 F.3d 522 (6th
Cir. 2004)
 Lexmark locked its printers using a microcontroller so that only authorized
toner cartridges could be used
 RealNetworks, Inc. v. DVD Copy Control Association, Inc., 641
F. Supp. 2d 913 (2009)
22/03/2016
Giancarlo F. Frosio, (CC) by-nc-sa
37
Download