04.01.2015 Views

Legal Aspects of the Information Society. - Free Technology Academy

Legal Aspects of the Information Society. - Free Technology Academy

Legal Aspects of the Information Society. - Free Technology Academy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GNUFDL • 29 Intellectual property: authors' rights and copyright<br />

used to make security or backup copies <strong>of</strong> computer programs, leading to <strong>the</strong> argument<br />

that this solution is unfair, and <strong>the</strong> courts have on several occasions required <strong>the</strong> levy<br />

to be returned.<br />

These levies are managed by collecting societies, bodies like <strong>the</strong> PPL in <strong>the</strong> UK,<br />

SACEM in France, or SGAE in Spain, which we comment on below.<br />

4.3. O<strong>the</strong>r rights protected<br />

The legal framework also restricts certain "secondary" acts, in <strong>the</strong> sense that<br />

<strong>the</strong>y are not direct breaches <strong>of</strong> exclusive rights, but indirectly affect <strong>the</strong>m,<br />

associated with s<strong>of</strong>tware, and may constitute intellectual property violations:<br />

• Putting into circulation a copy <strong>of</strong> a computer program knowing, or having<br />

reason to believe, that it is an infringing copy (this could arguably be<br />

extended, for instance, to companies basing <strong>the</strong>ir business on distributing<br />

P2P s<strong>of</strong>tware expressly stating its use for sharing music files).<br />

• The possession, for commercial purposes, <strong>of</strong> a copy <strong>of</strong> a computer program<br />

knowing, or having reason to believe, that it is an infringing copy.<br />

• Putting into circulation, or <strong>the</strong> possession for commercial purposes <strong>of</strong>, any<br />

"means" <strong>the</strong> sole intended purpose <strong>of</strong> which is to facilitate <strong>the</strong> unauthorised<br />

removal or circumvention <strong>of</strong> any technical device (a Technical Protection<br />

Measure, or TPM) which may have been applied to protect a computer<br />

program (e.g. rippers and cracks).<br />

In certain circumstances, <strong>the</strong> general regime <strong>of</strong> copyright law also punishes<br />

those who aid and abet <strong>the</strong> commission <strong>of</strong> a breach (e.g. by providing services<br />

<strong>of</strong> transmission, broadcasting or distribution <strong>of</strong> illegal works with knowledge);<br />

and <strong>the</strong> manufacture, marketing or distribution <strong>of</strong> articles destined for <strong>the</strong><br />

illegal copying <strong>of</strong> protected works.<br />

Supplementary content<br />

Any infringing copy <strong>of</strong> a computer<br />

program and any illegal<br />

means for eluding technical<br />

protection mechanisms<br />

(TPM) shall be liable to seizure<br />

in accordance with <strong>the</strong> legislation<br />

<strong>of</strong> <strong>the</strong> Member State concerned.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!