QuickStudy: The Digital Millennium Copyright Act (DMCA)
Computerworld - The recording and movie industry saw the threat of technology like Napster when Shawn Fanning, the creator of the peer-to-peer file swapping service, was just a tot. Indeed, the road to the controversial Digital Millennium Copyright Act (DMCA) probably began in 1975, when Sony Corp. introduced the Betamax VCR.
That was the start of a long series of court battles and legislative fights over electronic duplication of copyrighted material. But it wasn't until PCs were in wide use that Congress acted in a broad way to extend copyright protections to the digital domain. President Clinton signed the DMCA in October 1998.
For example, if someone develops the means to crack a copyright-protected CD and makes the technology for doing so available to others, the DMCA allows civil and legal sanctions. That makes sense.
But it caused a problem for Edward Felten, a leading security researcher at Princeton University, and his team when they circumvented the proposed Secure Digital Music Initiative (SDMI) watermarking technology standard for music. SDMI's creators had invited researchers to crack the technology, but when Felten sought to publish the results, he was threatened with a lawsuit from SDMI's recording industry backers.
Felten fought back. The Electronic Freedom Foundation filed a lawsuit challenging the prohibitions. But it never evolved into a test case because the research was conducted before the DMCA's prohibition on acts of circumvention took effect in 2000. The suit was dismissed.
Felten says researchers are worried that their work will lead to lawsuits. "There is a very strong sentiment in the research community that doing research in [content protection] is dangerous," he says.
The DMCA has survived one important test. The Motion Picture Association of America (MPAA) sued Eric Corely, the publisher of 2600: The Hacker Quarterly when the magazine sought to post De-Content Scrambling System code that circumvented DVD anticopying technology, arguing that First Amendment protection applied.
New York District Judge Lewis Kaplan found for the MPAA but saw legitimate arguments on both sides. "In our society, however, clashes of competing interests like this are resolved by Congress," wrote Kaplan.
For now, at least, the courts have resolved this clash in the DMCA's and plaintiffs' favor.
For the motion picture industry and content providers in general, Kaplan's decision was critical.
- 5 Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce Learn how Citrix solutions helped 5 companies realize the full value of desktop virtualization through a project-by-project approach based on key business priorities.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- IDC MarketScape: Worldwide Client Virtualization Software 2013 Vendor Assessment IDC has placed Citrix in the 2013 IDC MarketScape Leaders Category once again noting that, "Citrix's position reflects the company's market leadership and...
- Infographic: Top Use Cases for Desktop Virtualization A wide range of business issues is driving IT toward desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their entire...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Gov't Legislation/Regulation White Papers | Webcasts