Legal Aspects of the Information Society. - Free Technology Academy
Legal Aspects of the Information Society. - Free Technology Academy
Legal Aspects of the Information Society. - Free Technology Academy
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
GNUFDL • 29 Intellectual property: authors' rights and copyright<br />
used to make security or backup copies <strong>of</strong> computer programs, leading to <strong>the</strong> argument<br />
that this solution is unfair, and <strong>the</strong> courts have on several occasions required <strong>the</strong> levy<br />
to be returned.<br />
These levies are managed by collecting societies, bodies like <strong>the</strong> PPL in <strong>the</strong> UK,<br />
SACEM in France, or SGAE in Spain, which we comment on below.<br />
4.3. O<strong>the</strong>r rights protected<br />
The legal framework also restricts certain "secondary" acts, in <strong>the</strong> sense that<br />
<strong>the</strong>y are not direct breaches <strong>of</strong> exclusive rights, but indirectly affect <strong>the</strong>m,<br />
associated with s<strong>of</strong>tware, and may constitute intellectual property violations:<br />
• Putting into circulation a copy <strong>of</strong> a computer program knowing, or having<br />
reason to believe, that it is an infringing copy (this could arguably be<br />
extended, for instance, to companies basing <strong>the</strong>ir business on distributing<br />
P2P s<strong>of</strong>tware expressly stating its use for sharing music files).<br />
• The possession, for commercial purposes, <strong>of</strong> a copy <strong>of</strong> a computer program<br />
knowing, or having reason to believe, that it is an infringing copy.<br />
• Putting into circulation, or <strong>the</strong> possession for commercial purposes <strong>of</strong>, any<br />
"means" <strong>the</strong> sole intended purpose <strong>of</strong> which is to facilitate <strong>the</strong> unauthorised<br />
removal or circumvention <strong>of</strong> any technical device (a Technical Protection<br />
Measure, or TPM) which may have been applied to protect a computer<br />
program (e.g. rippers and cracks).<br />
In certain circumstances, <strong>the</strong> general regime <strong>of</strong> copyright law also punishes<br />
those who aid and abet <strong>the</strong> commission <strong>of</strong> a breach (e.g. by providing services<br />
<strong>of</strong> transmission, broadcasting or distribution <strong>of</strong> illegal works with knowledge);<br />
and <strong>the</strong> manufacture, marketing or distribution <strong>of</strong> articles destined for <strong>the</strong><br />
illegal copying <strong>of</strong> protected works.<br />
Supplementary content<br />
Any infringing copy <strong>of</strong> a computer<br />
program and any illegal<br />
means for eluding technical<br />
protection mechanisms<br />
(TPM) shall be liable to seizure<br />
in accordance with <strong>the</strong> legislation<br />
<strong>of</strong> <strong>the</strong> Member State concerned.