WIPO Copyright and Performances and Phonograms Treaties Implementation Act

Last updated

The WIPO Copyright and Performances and Phonograms Treaties Implementation Act, is a part of the Digital Millennium Copyright Act (DMCA), a 1998 U.S. law. It has two major portions, Section 102, which implements the requirements of the WIPO Copyright Treaty, and Section 103, which arguably provides additional protection against the circumvention of copy prevention systems (with some exceptions) and prohibits the removal of copyright management information.

Contents

Section 102

Section 102 gives the act its name, which is based on the requirements of the WIPO Copyright Treaty concluded at Geneva, Switzerland, on 20 December 1996. It modifies US copyright law to include works produced in the countries which sign the following treaties:

Section 103

Section 103 provoked most of the controversy which resulted from the act. It is often called DMCA anti-circumvention provisions. It restricts the ability to make, sell, or distribute devices which circumvent Digital Rights Management systems, adding Chapter 12 (sections 1201 through 1205) to US copyright law.

Section 1201 makes it illegal to:

The act creates a distinction between access-control measures and copy-control measures. An access-control measure limits access to the contents of the protected work, for example by encryption. A copy-control measure only limits the ability of a user to copy the work. Though the act makes it illegal to distribute technology to circumvent either type of copy protection, only the action of circumventing access-control measures is illegal. The action of circumventing a copy-control measure is not prohibited, though any copies made are still subject to other copyright law.

The section goes on to limit its apparent reach. The statute says that:

In addition, the statute has a "primary intent" requirement,[ verification needed ] which creates evidentiary problems for those seeking to prove a violation.[ citation needed ] In order for a violation to be proved, it must be shown that the alleged violator must have primarily intended to circumvent copyright protection. However, if the primary intent is to achieve interoperability of software or devices, the circumvention is permitted and no violation has occurred.

Section 1202 prohibits the removal of copyright management information.

On balance, it is difficult to say whether the Act expands copyright enforcement powers or limits them. Because it does not affect the underlying substantive copyright protections, the Act can be viewed as merely changing the penalties and procedures available for enforcement. Because it grants safe harbors in various situations for research, reverse engineering, circumvention, security, and protection of minors, the Act in many ways limits the scope of copyright enforcement.

Section 103 cases

Judicial enforcement of the statute and the treaty has not been nearly as far-reaching as was originally hoped by its advocates. Here are a handful of notable instances where advocates of proprietary encryption techniques sought to use the law to their advantage:

DVDs are often encrypted with the Content Scrambling System (CSS). To play a CSS DVD, it must be decrypted. Jon Johansen and two anonymous colleagues wrote DeCSS, a program that did this decryption, so they could watch DVDs in Linux. US servers distributing this software were asked to stop on the theory they were violating this law. Mr. Johansen was tried in his native Norway under that country's analogous statute. The Norwegian courts ultimately acquitted Mr. Johansen because he was acting consistent with interoperability and he could not be held responsible for others' motives. The software is now widely available.

2600 Magazine was sued under this law for distributing a list of links to websites where DeCSS could be downloaded. The court found that the "primary purpose" of the defendants' actions was to promote redistribution of DVDs, in part because the defendants admitted as much. See Universal v. Reimerdes, 111 F. Supp. 2d 346 (S.D.N.Y. 2000). The finding was upheld by the Second Circuit Court of Appeals on the specific facts of the case, but the appellate court left open the possibility that different facts could change the result. See Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001), at footnotes 5 and 16.

A similar program, also by Johansen, decrypted iTunes Music Store files so they could be played on Linux. Apple had the software taken down from several servers for violating this law. However, Apple Computer has since reversed its stand and begun advocating encryption-free distribution of content. [1]

Dmitry Sklyarov, a Russian programmer was jailed under this law when he visited the U.S., because he had written a program in Russia which allowed users to access documents for which they had forgotten the password. (He was eventually acquitted by a jury of all counts, reportedly because the jury thought the law was unfair—a phenomenon known as jury nullification.)

aibohack.com, a website which distributed tools to make Sony's AIBO robotic pet do new tricks, like dance jazz. Sony alleged that the tools violated this law, and asked for them to be taken down. (After negative press they changed their mind.)

A company selling mod chips for Sony PlayStations, which allowed the systems to play video games from other countries, was raided by the US government and their products were seized under this law.

Smart cards, while they have many other purposes, are also used by DirecTV to decrypt their television satellite signals for paying users. Distributors of smart card readers, which could create smart cards (including ones that could decrypt DirecTV signals) were raided by DirecTV and their products and customer lists were seized. DirecTV then sent a letter to over 100,000 purchasers of the readers and filed lawsuits against over 5,000. They offered to not file or drop the suit for $3500, less than litigating the case would cost. (The suits are ongoing.)

Lexmark sued Static Control Components which made replacement recycled toner cartridges for their printers under this law. Lexmark initially won a preliminary injunction, but that injunction was vacated by the Court of Appeals for the Sixth Circuit.

The Chamberlain Group sued Skylink Technologies for creating garage door openers that opened their own garage doors under this law. (The lawsuit is ongoing, though the Court of Appeals for the Federal Circuit has issued a ruling casting serious doubt on Chamberlain's likelihood of success.)

Prof. Edward Felten and several colleagues, were threatened with a lawsuit under this law if they presented a paper at a technical conference describing how they participated in the Secure Digital Music Initiative (SDMI) decryption challenge. (After Felten sued for declaratory judgment, the threat was dropped.)

Secure Network Operations (SNOsoft), a group of security researchers, published a security flaw in HP's Tru64 operating system after HP refused to fix it. HP threatened to sue them under this law. (After negative press they dropped the threat.)

Blackboard Inc. filed a civil complaint against university students Billy Hoffman and Virgil Griffith who were researching security holes in the Blackboard Transaction System. A judge issued an injunction on the two students to prevent them from publishing their research. Blackboard Inc. had previously sent a complaint to the students saying they were violating this law. Since that time, however, Blackboard has pledged to cooperate with open-source developers. On February 1, 2007, Blackboard announced via press release "The Blackboard Patent Pledge". In this pledge to the open source and do-it-yourself course management community, the company vows to forever refrain from asserting its patent rights against open-source developers, except when it is itself sued for patent infringement.

Princeton student J. Alex Halderman was threatened by SunnComm under this law for explaining how Mediamax CD-3 CD copy protection worked. Halderman explained that the copy protection could be defeated by holding down the shift key when inserting the CD into Windows (this prevented autorun, which installed the Mediamax protection software). After press attention SunnComm withdrew their threat.

Blizzard Entertainment threatened the developers of bnetd, a freely available clone of battle.net, a proprietary server system used by all Blizzard games on the Internet. Blizzard claims that these servers allow circumvention of its CD key copy protection scheme. (The Electronic Frontier Foundation is currently negotiating a settlement.)

The Advanced Access Content System Licensing Administrator, LLC sent violation notices to a number of sites who had published the encryption key to HD-DVDs. The key and the software with which to decrypt the disks had been published by an anonymous programmer. [2] When Digg took down references to the key, its users revolted and began distributing it in many creative ways. Eventually, Digg was unable to stop its users and gave up. AACS executives have vowed to fight on. . See the AACS encryption key controversy.

Open-source software to decrypt content scrambled with the Content Scrambling System presents an intractable problem with the application of this law. Because the decryption is necessary to achieve interoperability of open source operating systems with proprietary operating systems, the circumvention is protected by the Act. However, the nature of open source software makes the decryption techniques available to those who wish to violate copyright laws. Consequently, the exception for interoperability effectively swallows the rule against circumvention.

Criticisms

Large industry associations like the MPAA and RIAA say the law is necessary to prevent copyright infringement in the digital era, while a growing coalition of open source software developers and Internet activists argue that the law stifles innovation while doing little to stop copyright infringement. Because the content must ultimately be decrypted in order for users to understand it, near-perfect copying of the decrypted content always remains possible for pirates. Meanwhile, developers of open source and other next-generation software must write complex and sophisticated software routines to ensure interoperability of their software with legacy Windows technology. Thus, the opponents are angry at having to bear the costs of technology that results in no benefit.

Some proponents of the law claim it was necessary to implement several WIPO treaties. Opponents respond that the law was not necessary, even if it was it went far beyond what the treaties require, and the treaties were written and passed by the same industry lobbyists people who wanted to pass this law. They also note that the severe ambiguities in the law, its difficulty in enforcement, and its numerous exceptions make it ineffective in achieving its stated goal of protecting copyright holders.

Others claim that the law is necessary to prevent online copyright infringement, using perfect digital copies. Opponents note that copyright infringement was already illegal and the DMCA does not outlaw infringement but only legal uses like display and performance.

Opponents of the law charge that it violates the First Amendment on its face, because it restricts the distribution of computer software, like DeCSS. The Second Circuit rejected this argument in MPAA v. 2600 , suggesting that software was not really speech. Under the specific facts of the case, however, the Constitutional decision was not controlling. The defendants' ultimate purpose was to make possible the copying of copyrighted content, not publishing their own speech. Most other circuits that have considered the issue concluded software is speech, but have not considered this law.

Opponents also say it creates serious chilling effects stifling legitimate First Amendment speech. For example, John Wiley & Sons changed their mind and decided not to publish a book by Andrew Huang about security flaws in the Xbox because of this law. After Huang tried to self-publish, his online store provider dropped support because of similar concerns. (The book is now being published by No Starch Press.)

Opponents also argue that the law might be read to give full control to copyright holders over what uses are and are not permitted, essentially eliminating fair use. For example, ebook readers protected by this law can prevent the user from copying short excerpts from the book, printing a couple pages, and having the computer read the book aloud—all of which are legal under copyright law, but this law could be expanded to prohibit building a tool to do what is otherwise legal. However, other legal scholars note that the law's emphasis on violations of preexisting rights of copyright holders ensures that the DMCA does not expand those rights. If the purpose of the activity is not to violate a preexisting right, the activity is not illegal. Fair use, the scholars say, would still be protected.

As required by the DMCA, in 1999 the U.S. Copyright Office launched a public appeal for comments on the DMCA in order "to determine whether there are particular classes of works as to which users are, or are likely to be, adversely affected in their ability to make noninfringing uses due to the prohibition on circumvention of access controls". The entire set of written submissions, testimonial transcripts, and final recommendations and rulings for all three rulemakings (2000, 2003, and 2006) are available here.


Related Research Articles

<span class="mw-page-title-main">WIPO Copyright Treaty</span>

The World Intellectual Property Organization Copyright Treaty is an international treaty on copyright law adopted by the member states of the World Intellectual Property Organization (WIPO) in 1996. It provides additional protections for copyright to respond to advances in information technology since the formation of previous copyright treaties before it. As of August 2021, the treaty has 110 contracting parties. The WCT and WIPO Performances and Phonograms Treaty, are together termed WIPO "internet treaties".

<span class="mw-page-title-main">DeCSS</span> Free open-source program to decode DVDs with encryption

DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS free and open source operating systems could not play encrypted video DVDs.

The Digital Media Consumers' Rights Act (DMCRA) was a proposed law in the United States that directly challenges portions of the Digital Millennium Copyright Act, and would intensify Federal Trade Commission efforts to mandate proper labeling for copy-protected CDs to ensure consumer protection from deceptive labeling practices. It would also allow manufacturers to innovate in hardware designs and allow consumers to treat CDs as they have historically been able to treat them.

Anti-circumvention refers to laws which prohibit the circumvention of technological barriers for using a digital good in certain ways which the rightsholders do not wish to allow. The requirement for anti-circumvention laws was globalized in 1996 with the creation of the World Intellectual Property Organization's Copyright Treaty.

<i>Universal City Studios, Inc. v. Corley</i> American legal case

Universal City Studios, Inc. v. Corley, 273 F.3d 429, was a court ruling at the United States Court of Appeals for the Second Circuit. The ruling was the first significant test of the anti-circumvention provisions of the Digital Millennium Copyright Act.

<i>Chamberlain Group, Inc. v. Skylink Technologies, Inc.</i> American legal case concerning the DMCA

The Chamberlain Group, Inc. v. Skylink Technologies, Inc., 381 F.3d 1178 is a legal case heard by the United States Court of Appeals for the Federal Circuit concerning the anti-trafficking provision of the Digital Millennium Copyright Act (DMCA), 17 U.S.C. § 1201(a)(2), in the context of two competing universal garage door opener companies. It discusses the statutory structure and legislative history of the DMCA to help clarify the intent of the anti-circumvention provisions and decide who holds the burden of proof. It expresses that the statute creates a cause of action for liability and does not create a property right, and holds that as Chamberlain had alleged that Skylink was in violation of the anti-trafficking provision, it had the burden to prove and failed to show that access was unauthorized and its rights were infringed under the Copyright Act. As Chamberlain incorrectly argued that Skylink had the burden of proof and failed to prove their claim, the court upheld summary judgment in favor of Skylink.

<span class="mw-page-title-main">DVD Decrypter</span>

DVD Decrypter is a software application for Microsoft Windows that can create backup disk images of the DVD-Video structure of DVDs. It can be used to make a copy of any DVD protected with Content Scrambling System (CSS). The program can also record images to disc — functionality that the author has now incorporated into a separate product called ImgBurn. The software also allows a copy of a region-specific DVD to be made region free. It also removes Macrovision content protection, CSS, region codes, and user operation prohibition.

An Act to amend the Copyright Act was a proposed law to amend the Copyright Act initiated by the Government of Canada in the First Session of the Thirty-Eighth Parliament. Introduced by the Minister of Canadian Heritage and Minister responsible for Status of Women Liza Frulla and then Minister of Industry David Emerson as An Act to Amend the Copyright Act, it received its First Reading in the House of Commons of Canada on June 20, 2005. On November 29, 2005, the opposition to the government tabled a non-confidence motion which passed, dissolving Parliament and effectively killing the bill. The subsequent government tabled a similar bill called C-61.

<span class="mw-page-title-main">Advanced Access Content System</span> Standard for content distribution and digital rights management

The Advanced Access Content System (AACS) is a standard for content distribution and digital rights management, intended to restrict access to and copying of the post-DVD generation of optical discs. The specification was publicly released in April 2005. The standard has been adopted as the access restriction scheme for HD DVD and Blu-ray Disc (BD). It is developed by AACS Licensing Administrator, LLC, a consortium that includes Disney, Intel, Microsoft, Panasonic, Warner Bros., IBM, Toshiba and Sony. AACS has been operating under an "interim agreement" since the final specification has not yet been finalized.

<span class="mw-page-title-main">Security of Advanced Access Content System</span>

The security of Advanced Access Content System (AACS) has been a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System (CSS), the digital rights management mechanism used by commercial DVDs, AACS was intended to improve upon the design of CSS by addressing flaws which had led to the total circumvention of CSS in 1999. The AACS system relies on a subset difference tree combined with a certificate revocation mechanism to ensure the security of high definition video content in the event of a compromise.

DVD X Copy is a consumer software program that enabled novice computer users to copy any DVD movie to any blank DVD. Most commercial DVD movies include Content Scrambling System (CSS), a copy-protection technology designed to prevent DVD movies from being copied. This controversial DVD copy software program included technology that decrypts the CSS copy protection mechanism on DVD movie discs. DVD X Copy products are still being sold on the DVD X Copy website, although it was previously believed to be no longer sold or supported.

<span class="mw-page-title-main">Copyright and Information Society Directive</span> 2001 European Union Directive on Copyright

The Copyright and Information Society Directive 2001 is a directive in European Union law that was enacted to implement the WIPO Copyright Treaty and to harmonise aspects of copyright law across Europe, such as copyright exceptions. The directive was first enacted in 2001 under the internal market provisions of the Treaty of Rome.

Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) like access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM technologies govern the use, modification and distribution of copyrighted works and of systems that enforce these policies within devices. DRM technologies include licensing agreements and encryption.

<span class="mw-page-title-main">Copyright infringement</span> Usage of a copyrighted work without the authors permission

Copyright infringement is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works. The copyright holder is typically the work's creator, or a publisher or other business to whom copyright has been assigned. Copyright holders routinely invoke legal and technological measures to prevent and penalize copyright infringement.

<span class="mw-page-title-main">Digital Millennium Copyright Act</span> United States copyright law

The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. Passed on October 12, 1998, by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while limiting the liability of the providers of online services for copyright infringement by their users.

<i>Facebook, Inc. v. Power Ventures, Inc.</i> Lawsuit brought by Facebook in the United States

Facebook, Inc. v. Power Ventures, Inc. is a lawsuit brought by Facebook in the United States District Court for the Northern District of California alleging that Power Ventures Inc., a third-party platform, collected user information from Facebook and displayed it on their own website. Facebook claimed violations of the CAN-SPAM Act, the Computer Fraud and Abuse Act ("CFAA"), and the California Comprehensive Computer Data Access and Fraud Act. According to Facebook, Power Ventures Inc. made copies of Facebook's website during the process of extracting user information. Facebook argued that this process causes both direct and indirect copyright infringement. In addition, Facebook alleged this process constitutes a violation of the Digital Millennium Copyright Act ("DMCA"). Finally, Facebook also asserted claims of both state and federal trademark infringement, as well as a claim under California's Unfair Competition Law ("UCL").

Rooting is the process by which users of Android devices can attain privileged control over various subsystems of the device, usually smartphones. Because Android is based on a modified version of the Linux kernel, rooting an Android device gives similar access to administrative (superuser) permissions as on Linux or any other Unix-like operating system such as FreeBSD or macOS.

<i>RealNetworks, Inc. v. DVD Copy Control Assn, Inc.</i> 2009 court case

RealNetworks, Inc. v. DVD Copy Control Association, Inc., 641 F. Supp. 2d 913 (2009), is a United States District Court case involving RealNetworks, the movie studios and DVD Copy Control Association regarding the Digital Millennium Copyright Act (DMCA) claims on the manufacturing and distribution of RealDVD, and a breach of license agreement. The district court concluded that RealNetworks violated the anti-circumvention and anti-trafficking provisions of the DMCA when the DVD copying software RealDVD bypasses the copy protection technologies of DVD.

<i>321 Studios v. Metro Goldwyn Mayer Studios, Inc.</i>

321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F. Supp. 2d 1085, is a district court case brought by 321 Studios seeking declaratory judgment from the court that their DVD ripping software, i.e. DVD Copy Plus and DVD X Copy do not violate the provisions of the Digital Millennium Copyright Act ("DMCA"), or, in the alternative, that the DMCA is unconstitutional because Congress exceeded its enumerated powers, these provisions are unconstitutionally vague and/or violate the First Amendment.

Remedies for copyright infringement in the United States can be either civil or criminal in nature. Criminal remedies for copyright infringement prevent the unauthorized use of copyrighted works by defining certain violations of copyright to be criminal wrongs which are liable to be prosecuted and punished by the state. Unlike civil remedies, which are obtained through private civil actions initiated by the owner of the copyright, criminal remedies are secured by the state which prosecutes the infringing individual or organisation.

References

  1. "About iTunes Plus".
  2. "BackupHDDVD, a tool to decrypt AACS protected movies - Doom9's Forum". forum.doom9.org.