13.07.2015 Views

Advanced Copyright Issues on the Internet - Fenwick & West LLP

Advanced Copyright Issues on the Internet - Fenwick & West LLP

Advanced Copyright Issues on the Internet - Fenwick & West LLP

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1201(a)(3)(B) provides that a technological measure “effectively c<strong>on</strong>trols access to a work” if itrequires <strong>the</strong> applicati<strong>on</strong> of informati<strong>on</strong> or a process with <strong>the</strong> authority of <strong>the</strong> copyright owner togain access to a work. Because <strong>on</strong>e cannot gain access to a CSS-protected work <strong>on</strong> a DVDwithout <strong>the</strong> applicati<strong>on</strong> of three keys that are required by <strong>the</strong> player software and are madeavailable <strong>on</strong>ly under license, CSS satisfied this definiti<strong>on</strong>. The court refused to import into <strong>the</strong>statute any requirement for a technologically “str<strong>on</strong>g means” of protecti<strong>on</strong>. 686The court also rejected <strong>the</strong> defendants’ argument that DeCSS was written to fur<strong>the</strong>r <strong>the</strong>development of a DVD player that would run under <strong>the</strong> Linux operating system, as <strong>the</strong>reallegedly were no Linux-compatible players <strong>on</strong> <strong>the</strong> market at <strong>the</strong> time. The court ruled that, evenif <strong>the</strong>re were so, it would be immaterial to whe<strong>the</strong>r <strong>the</strong> defendants had violated Secti<strong>on</strong>1201(a)(2) by trafficking in DeCSS. 687 “The offering or provisi<strong>on</strong> of <strong>the</strong> program is <strong>the</strong>prohibited c<strong>on</strong>duct – and it is prohibited irrespective of why <strong>the</strong> program was written, except towhatever extent motive may be germane to determining whe<strong>the</strong>r [<strong>the</strong> defendants’] c<strong>on</strong>duct fallswithin <strong>on</strong>e of <strong>the</strong> statutory excepti<strong>on</strong>s.” 688The court rejected a number of o<strong>the</strong>r defenses under <strong>the</strong> DMCA asserted by <strong>the</strong>defendants. First, for <strong>the</strong> reas<strong>on</strong>s set forth in Secti<strong>on</strong> II.G.1(g) above in <strong>the</strong> discussi<strong>on</strong> of Secti<strong>on</strong>1201(f), <strong>the</strong> court rejected <strong>the</strong> defendants’ argument that <strong>the</strong> reverse engineering excepti<strong>on</strong> ofSecti<strong>on</strong> 1201(f) was applicable.Sec<strong>on</strong>d, <strong>the</strong> defendants asserted <strong>the</strong> encrypti<strong>on</strong> research defense under Secti<strong>on</strong> 1201(g),which requires a showing that <strong>the</strong> pers<strong>on</strong> asserting <strong>the</strong> defense lawfully obtained <strong>the</strong> encryptedcopy of <strong>the</strong> work being studied, <strong>the</strong> circumventi<strong>on</strong> act at issue is necessary to c<strong>on</strong>duct encrypti<strong>on</strong>research, <strong>the</strong> pers<strong>on</strong> made a good faith effort to obtain authorizati<strong>on</strong> before <strong>the</strong> circumventi<strong>on</strong>,and <strong>the</strong> act does not c<strong>on</strong>stitute copyright infringement. The court held that <strong>the</strong> defendants hadfailed to prove that any of <strong>the</strong>m were engaged in good faith encrypti<strong>on</strong> research, nor was <strong>the</strong>reany evidence that <strong>the</strong> defendants made any effort to provide <strong>the</strong> results of <strong>the</strong> DeCSS effort to<strong>the</strong> copyright owners (which Secti<strong>on</strong> 1201(g)(3) instructs <strong>the</strong> court to take into account inassessing whe<strong>the</strong>r <strong>on</strong>e is engaged in good faith encrypti<strong>on</strong> research), nor any evidence that anyof <strong>the</strong>m made a good faith effort to obtain authorizati<strong>on</strong> from <strong>the</strong> copyright owners. 689Third, <strong>the</strong> defendants asserted <strong>the</strong> security testing defense under Secti<strong>on</strong> 1201(j). Thecourt rejected this defense, which is limited to “assessing a computer, computer system, orcomputer network, solely for <strong>the</strong> purpose of good faith testing, investigating, or correcting [of a]security flaw or vulnerability, with <strong>the</strong> authorizati<strong>on</strong> of <strong>the</strong> owner or operator,” because <strong>the</strong>record did not establish that DeCSS has anything to do with testing computers, computer686687688689Id. at 318. The court cited legislative history to <strong>the</strong> effect that a technological measure “effectively c<strong>on</strong>trolsaccess” to a copyrighted work merely if its functi<strong>on</strong> is to c<strong>on</strong>trol access. Id. at 317-18.Id. at 319.Id.Id. at 320-21.- 165 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!