Spring, 1999
14 Berkeley Tech. L.J. 519
LENGTH: 25580 words
SYMPOSIUM: Intellectual Property
and the Digital Economy: Why the Anti-Circumvention Regulations Need to
Be Revised
By Pamela Samuelson*
© 1999 Pamela Samuelson.
* Professor of Information Management
and of Law, University of California at Berkeley; Co-Director of the
Berkeley Center for Law and Technology.
This paper is an outgrowth of work initially done for an Emory Law
School conference on the law of
cyberspace held in February 1996. The draft article produced for that
conference entitled Technical Protection
for Copyrighted Works discussed a 1995 legislative proposal for
regulating the circumvention of
technical protection systems. I am deeply indebted to Benjamin Black who
was
my research assistant during preparation
of this draft. He subsequently collaborated with me on a derivative
work of that paper. Although that
project was never completed, this article builds on the base of that
collaboration. I am also grateful
for comments on this draft from Hal Abelson, Jonathan Band, Yochai Benkler,
Julie Cohen, Gideon Frieder, Joan
Feigenbaum, Bob Glushko, Peter Huang, Laurel Jamtgaard, and Kurt Opsahl.
SUMMARY:
... The Digital Millennium Copyright
Act of 1998 ("DMCA") prohibits the circumvention of technological
protection measures used by copyright
owners to control access to their works. ... Some representatives of
major copyright industries who testified
at a Congressional hearing on this legislation expressed the view that
fair use should not be an acceptable
reason to "break" a technical protection system used by copyright
owners to protect their works. ...
It also proposed a moratorium on the anti-circumvention rules so that a
study could be conducted about the
potential impact of anti-circumvention rules on fair use, the public
domain, and other noninfringing
uses of copyrighted works. ... The only way to find out whether the copyright
owner's suspicion is valid may be
to circumvent the technical protection system to get access to the
encrypted material. ... It is, however,
difficult to believe that most judges would find providing either software
or information to enable circumvention
of this component of a technical protection system to fall within the
DMCA anti-device rules. ... This
creates a potential for "strike suits" by nervous or opportunistic copyright
owners who might challenge (or threaten
to challenge) the deployment of a new information technology tool
whose capabilities may include circumvention
of some technical protection system. ...
TEXT:
[*519]
Abstract
The Digital Millennium Copyright
Act of 1998 ("DMCA") prohibits the circumvention of technological protection
measures used by copyright owners
to control access to their works. It also bans devices whose primary
purpose is to enable circumvention
of technical protection systems. The Clinton administration proposed these
anti-circumvention rules as implementations
of U.S. obligations under the World Intellectual Property
Organization Copyright Treaty. However,
the DMCA's provisions are significantly broader than the treaty
required. They violate the Administration's
stated goal of only imposing "predictable, minimalist, consistent, and
simple" regulations on the budding
digital economy.
Although Congress heeded some concerns
of digital economy firms by crafting certain exceptions to authorize
legitimate circumvention, those
exceptions are overly narrow and shortsighted. They should be supplemented
by a more general "other legitimate
purposes" exception. The DMCA's anti-device provisions are, moreover,
overbroad and unclear, especially
on the question whether it is legal to develop a technology necessary to
engage in a privileged act of circumvention
(e.g., a fair use). Either Congress or the courts will be forced to
constrain the reach of the anti-device
rules so as not to undermine Congressional intent to preserve fair uses
and so as not to harm competition
and innovation in the information technology sector. Finally, though the
DMCA provides [*520]
for a study of one class of potentially harmful impacts of the anti-circumvention
rules,
this study needs to be broadened
to consider the full impact of this unprecedented legislation.
I. Introduction
The Clinton Administration's Framework
For Global Electronic Commerce aims to promote the development of a
vast global market in which electronic
contracts will be made for delivery of electronic information products
and services via digital networks
which will be paid for with electronic currencies. n1 The Framework
simultaneously encourages private
investment and entrepreneurship, urges governments at all levels to act
with restraint in considering regulations
of the emerging digital economy, and argues for international
cooperation in adopting consistent
policies that will promote this commerce. n2 The Commerce Department's
First Annual Report on the Framework
initiative indicates that this initiative has [*521] met with
some
success. n3 Passage of the Digital
Millennium Copyright Act ("DMCA") n4 is among the successes claimed in
this report. n5
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n1. See William J. Clinton &
Albert Gore, Jr., A Framework for Global Electronic Commerce (1997), available
at
<http://www.iitf.nist.gov/eleccomm/ecomm.htm>
[hereinafter Framework].
n2. See id. at 2-4.
n3. See U.S. Gov't Working Group
on Elec. Commerce, First Annual Report (1998), available at
<http://www.doc.gov/ecommerce/E-comm.pdf>
[hereinafter First Annual Report].
n4. Digital Millennium Copyright Act, Pub. L. No. 105-304, 112 Stat. 2860 (1998).
n5. See First Annual Report, supra
note 3, at 2.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The Commerce Department may be correct
in thinking that the interests of the digital economy will be
furthered by widespread acceptance
of the World Intellectual Property Organization ("WIPO") Copyright Treaty
n6 in the international community.
n7 This treaty establishes several important international norms for applying
copyright law in the digital environment.
n8 International consensus on these norms should aid the growth of
the global digital economy. n9 However,
the DMCA was largely unnecessary to implement the WIPO Copyright
Treaty because U.S. law already
complied with all but one minor provision of that treaty. n10
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n6. See WIPO Copyright Treaty, adopted
by the Diplomatic Conference on Dec. 20, 1996, WIPO Doc.
CRNR/DC/94 (Dec. 23, 1996) [hereinafter
WIPO Copyright Treaty]. There were actually two treaties concluded
at this diplomatic conference. The
other was the WIPO Performances and Phonograms Treaty, adopted by the
Diplomatic Conference on Dec. 20,
1996, WIPO Doc. CRNR/DC/95 (Dec. 23, 1996). Because the U.S. protects
the interests of producers and performers
of phonograms largely through copyright law and because the
phonograms treaty was not materially
different in its requirements as regards issues covered in this article,
the
article will, for the sake of simplicity,
focus on the WIPO Copyright Treaty provisions.
n7. See generally Pamela Samuelson,
The U.S. Digital Agenda at WIPO, 37 Va. J. Int'l L. 369 (1997) (discussing
the negotiations leading to conclusion
of the WIPO Copyright Treaty).
n8. See infra notes 45-55 and accompanying text for a discussion of these norms.
n9. See First Annual Report, supra note 3, at 10-11.
n10. See, e.g., Pamela Samuelson,
Big Media Beaten Back, Wired, March 1997, at 64 (explaining that U.S. law
was in compliance with almost all
norms of the treaty). Only the treaty provision calling for protecting
the
integrity of rights management information
needed legislative implementation in U.S. law. WIPO Copyright
Treaty, supra note 7, art. 12; see
also infra notes 56-64 and accompanying text.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Although the WIPO Copyright Treaty
requires countries to provide "adequate protection" against the
circumvention of technical measures
used by copyright owners to protect their works from infringement, the
DMCA went far beyond treaty requirements
in broadly outlawing acts of circumvention of access controls and
technologies that have circumvention-enabling
uses. n11
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n11. WIPO Copyright Treaty, supra
note 6, art. 11. The DMCA anti-circumvention provision can be found at
17
U.S.C.A. 1201 (West Supp. 1999).
See infra notes 66-70 and accompanying text for a discussion of why the
treaty did not require the DMCA
provisions.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
[*522] The anti-circumvention
rules in the DMCA do not match up well with the needs of the digital
economy, or with the principles
propounded in the Framework. n12 Although the First Annual Report praises
the DMCA for the balance it embodies
between copyright protection and access to information, n13 this article
will demonstrate that such balance
as the DMCA contains is attributable to congressional foresight, not to
the
Clinton Administration. n14 Indeed,
for the past five years, the Administration has supported highly unbalanced
digital copyright initiatives and
has resisted most efforts to introduce more balance in these initiatives.
n15
With the enactment of the anti-circumvention
provisions of the DMCA, the Administration may have had more
success in achieving imbalance in
digital copyright law than Congress may have realized. n16
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n12. See infra Part III for an articulation
of these principles. See infra Parts V-VIII for an analysis of why these
provisions may be harmful to digital
economy interests.
n13. See First Annual Report, supra note 3, at 14.
n14. See infra Part V.
n15. See U.S. Dep't of Commerce Info.
Infrastructure Task Force, Intellectual Property and the National
Information Infrastructure: The
Report of the Working Group on Intellectual Property Rights (1995) [hereinafter
White Paper]. Numerous articles
have criticized this and an earlier draft report because of its imbalance
heavily
tilted in favor of publisher interests.
See, e.g., Peter A. Jaszi, Caught in the Net of Copyright, 75 Or. L. Rev.
299 (1996); Leslie Kurtz, Copyright
and the National Information Infrastructure, 18 Eur. Intell. Prop. Rev.
120
(1996); Jessica Litman, The Exclusive
Right to Read, 13 Cardozo Arts & Ent. L. 29 (1994); Charles R. McManis,
Taking TRIPS on the Information
Superhighway: International Intellectual Property Protection and Emerging
Computer Technology, 41 Vill. L.
Rev. 207 (1996); Pamela Samuelson, The Copyright Grab, Wired, Jan. 1996,
at 134.
n16. See infra Parts V-VII.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
It would oversimplify the facts -
although not by much - to say that the battle in Congress over the
anti-circumvention provisions of
the DMCA was a battle between Hollywood and Silicon Valley. n17 Hollywood
and its allies sought the strongest
possible ban both on the act of circum [*523] venting a technical
protection system used by copyright
owners to protect their works and on technologies having
circumvention-enabling uses. n18
Silicon Valley firms and their allies opposed this broad legislation because
of
deleterious effects it would have
on their ability to engage in lawful reverse engineering, computer security
testing, and encryption research.
n19 They supported legislation to outlaw acts of circumvention engaged
in
for the purpose of infringing copyrights
and would have supported narrowly drawn device legislation had the
Congressional subcommittees principally
responsible for formulating WIPO treaty implementation legislation
been receptive to a narrower bill.
n20 Silicon Valley and its allies warned of dire consequences if the overbroad
anti-circumvention provisions Hollywood
supported were adopted. n21 Yet, by colorful use of high rhetoric and
forceful lobbying, Hollywood and
its allies were successful in persuading Congress to adopt the broad
anti-circumvention legislation they
favored, even if it is now subject to some specific exceptions that respond
to some concerns raised by Silicon
Valley firms and their allies in the legislative process. n22
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n17. See, e.g., WIPO Copyright Treaties
Implementation Act; and Online Copyright Liability Limitation Act:
Hearing on H.R. 2281 and H.R. 2280
Before the Subcomm. on Courts and Intellectual Property of the House
Comm. on the Judiciary 105th Cong.
78-82 (1997) [hereinafter Judiciary Hearing] (statement of Jack Valenti,
President and CEO, Motion Picture
Ass'n of America); id. at 256-65 (statement of Edward J. Black, President,
Computer and Communications Industry
Ass'n ). It should be noted that the Business Software Alliance, whose
principal member is Microsoft, supported
Hollywood's preferred bill for reasons which may become apparent
later in this article. See infra
notes 180-186 and accompanying text. See also Judiciary Hearing, supra,
at
68-77 (statement of Robert W. Holleyman
II, President, Business Software Alliance).
n18. See, e.g., Judiciary Hearing,
supra note 17, at 78-82 (statement of Jack Valenti); id. at 204-12
(statement of Allan R. Adler, Vice
President for legal and governmental affairs, Ass'n of American Publishers).
n19. See infra notes 87-94 and accompanying
text. Other groups opposed to the broad anti-circumvention
legislation of H.R. 2281 included
librarians and educators. See infra notes 117-120 and accompanying text.
n20. The Digital Future Coalition
- whose members include the Computer & Communications Industry
Association, among other high tech
industry groups - endorsed H.R. 3048, 105th Cong. (1997), which
proposed such a narrow circumvention
provision. See Introduction of the Digital Era Copyright Enhancement
Act, 55 BNA Pat., Trademark &
Copyright J. 68, 70-71 (1997) (describing the anti-circumvention provision
of
H.R. 3048). See also Judiciary Hearing,
supra note 17, at 256-65 (statement of Edward J. Black) (critical of
the Administration's anti-circumvention
proposal); id. at 249-56 (statement of Chris Byrne, Director of
Intellectual Property, Silicon Graphics,
Inc., on behalf of the Info. Tech. Indus. Council) (critical of H.R. 2281).
n21. See, e.g., Judiciary Hearing,
supra note 17, at 260 (prepared statement of Edward J. Black); see also
id.
at 154-55 (prepared statement of
Prof. Robert L. Oakley, Georgetown University Law Center).
n22. See infra Part V.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Had the Administration sought to
broker a fairer compromise between the interests of Hollywood and its allies
and the interests of Silicon Valley
and its allies, this process would almost certainly have produced better
legislation than the anti-circumvention
provisions of the DMCA. One would have thought, given the
Framework's principles and the Administration's
enthusiasm for the strong economic performance of the infor
[*524] mation technology
sector, that the Administration would have taken a more balanced position
on
these issues. n23 One can call the
DMCA's anti-circumvention provisions many things, but one cannot honestly
speak of them as "predictable, minimalist,
consistent, and simple" components of a legal environment for
electronic commerce, as the Framework
principles would suggest they should be. n24
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n23. See infra Part III.
n24. See Framework, supra note 1,
at 3. For further criticism of the DMCA's anti-circumvention provisions
on
constitutional grounds, see Yochai
Benkler, Free As the Air To Common Use: First Amendment Constraints on
the Enclosure of the Public Domain,
74 N.Y.U. L. Rev. 354 (1999).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
This article will make three main
points about the anti-circumvention rules in the DMCA. First, there are
far
more legitimate reasons to circumvent
a technical protection system than the DMCA's act-of-circumvention
provision expressly recognizes.
n25 This provision should be amended to provide a general purpose "or other
legitimate purposes" provision to
avert judicial contortions in interpreting the statute. Second, the anti-device
provisions of the DMCA are highly
ambiguous and overbroad, raising questions about whether Congress
understood the potential for these
provisions to undermine circumvention privileges built into the
act-of-circumvention prohibition.
n26 The anti-device provisions of DMCA should be clarified and a more
minimalist approach taken to the
regulation of technologies with circumvention-enabling uses so that the
ambiguity and overbreadth of the
existing provisions will not cause harm to innovation and competition in
the
information technology sector. Third,
periodic reviews of the impact of the anti-circumvention provisions of
the
DMCA as a whole should be undertaken.
n27 Given how broad the anti-circumvention rules are, given their
unprecedented character, and given
the potential for harmful consequences from these rules, Congress should
authorize a far broader study of
the impact of these provisions than the DMCA presently contemplates. It
should also heed proposals for change
to the anti-circumvention provisions recommended in such studies.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n25. See infra Part VI.
n26. See infra Part VII.
n27. See infra Part VIII.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
[*525] II. THE DIGITAL
ECONOMY IS A HIGH GROWTH, HIGH POTENTIAL SECTOR WHOSE NEEDS DESERVE
CAREFUL CONSIDERATION
An April 1998 report, The Emerging
Digital Economy, published by the U.S. Department of Commerce begins
with the following observations:
During the past few years, the United
States economy has performed beyond most expectations. A shrinking
budget deficit, low interest rates,
a stable macroeconomic environment, expanding international trade with
fewer barriers, and effective private
sector management are all credited with playing a role in this healthy
economic performance.
Many observers believe advances in
information technology ("IT"), driven by the growth of the Internet, have
also contributed to creating this
healthier-than-expected economy.
In recent testimony to Congress,
Federal Reserve Board Chairman Alan Greenspan noted, "our nation has been
experiencing a higher growth rate
of productivity - output per hour - worked in recent years. The dramatic
improvements in computing power
and communication and information technology appear to have been a major
force behind this beneficial trend."
n28
This report indicates that the IT
sector of the U.S. economy - which includes the computer hardware,
software, networking and telecommunications
industries - now constitutes an estimated 8.2 per cent of the
gross domestic product, close to
twice its share of GDP as compared with a decade or so before. n29 The
IT
sector, moreover, accounts for more
than one-quarter of the real economic growth in the American economy.
n30 Approximately 45 per cent of
current expenditures on business equipment are investments in IT products
and services. n31 It is no wonder,
then, that the collective capitalization of five major firms in this sector
-
Microsoft, Intel, Compaq, Dell,
and Cisco Systems - has grown from $ 12 billion in 1987 to $ 588 billion
in 1997,
nearly a fifty-fold increase in
only a dec [*526] ade. n32 Perhaps somewhat more wondrous are
the
astonishing market capitalizations
of relatively new Internet firms, such as Amazon.com, Yahoo!, and E*Trade.
These valuations reflect the market's
belief in the high growth potential of these players in the digital
economy, even if their earnings
so far might seem to belie this. n33 It is, of course, important to realize
that
the IT sector is not the only component
of the digital economy. n34 It is, however, a significant part of that
economy, and it is also the enabler
of growth in other parts of the digital economy, as vendors of products
and services of both tangible and
intangible kinds make use of digital networks to offer their wares to a
global
market. n35 Especially as electronic
commerce via the Internet and the World Wide Web expands, the IT
sector is likely to experience further
explosive growth. n36
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n28. U.S. Dep't Of Commerce, Secretariat
on Elec. Commerce, The Emerging Digital Economy 1 (1998)
[hereinafter Emerging Digital Economy].
n29. See id. at 4.
n30. See id. at 6.
n31. See id.
n32. See id. Of course, it is fair
to observe that some of this growth has occurred by virtue of acquisitions
of
other substantial firms, such as
Compaq's acquisition of Digital Equipment Corp.
n33. See, e.g., James J. Cramer,
TulipMania.com? Despite their soaring prices, the best Internet stocks
are
still bargains. Here's how to pick
'em, Time, Aug. 3, 1998, at 77; see generally Steve Mott, Where Eagles
Soar:
Making Sense of Internet Valuations,
Business 2.0, Nov. 1998.
n34. See Emerging Digital Economy, supra note 28, chs. 4-5 (discussing digital economy sectors).
n35. See id.
n36. See id.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The Emerging Digital Economy report
continues along the path set by the Administration's early policy
document, The Framework for Global
Electronic Commerce, in seeking to foster the growth potential of the
digital economy. n37 Both documents
recognize that "governments can have a profound effect on the growth
of commerce on the Internet. By
their actions, they can facilitate electronic trade or inhibit it. Knowing
when
to act and - at least as important
- when not to act, will be crucial to the development of electronic
commerce." n38 One of the signal
achievements of the Framework was the promulgation of five principles that
were supposed to guide U.S. as well
as other governmental action on policy initiatives on electronic
commerce:
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n37. See id. at 50-51.
n38. Framework, supra note 1, at
2; Emerging Digital Economy, supra note 28, at 50-51.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
1) The private sector should lead.
2) Governments should avoid undue restrictions on electronic commerce.
[*527] 3) Where government
involvement is needed, its aim should be to support and enforce a predictable,
minimalist, consistent, and simple
legal environment for commerce.
4) Governments should recognize the unique qualities of the Internet.
5) Electronic commerce over the Internet
should be facilitated on a global basis. n39
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n39. Framework, supra note 1, at
2-3.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The First Annual Report of the U.S.
Working Group on Electronic Commerce offers evidence that the
Framework's policy objectives are
being achieved. n40
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n40. See id. at iii-v.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
As laudable as the Framework's principles
are, it should be said that the Clinton Administration has been
somewhat erratic in following them.
The Administration has a good record in promoting minimalist tax and
customs policies. n41 However, it
has been widely criticized by the IT/digital economy sector for not following
these principles in the security/encryption
policy area and in the content policy area, owing to the
Administration's support for the
Clipper Chip and the Communications Decency Act. n42 In the legislative
struggle leading up to adoption
of the DMCA, the Administration deviated from these principles once again
in
heeding the desires of established
copyright industries to reconstruct the legal infrastructure of the digital
environment so that it would accommodate
their preferences. These industries insisted that this restructuring
was necessary to protect them from
the grave threat of piracy posed in the digital environment. n43 Many
significant players in the existing
digital economy counseled against this restructuring. n44 The Administration
should, of course, have considered
the interests and concerns of Hollywood and other copyright industry
groups in its consideration of an
appropriate digital copyright policy initiative. However, the Administration
might have done more to consider
the interests of those already partici [*528] pating in the
digital economy
in its policy formation on these
issues, particularly since its preferred policy so clearly violated the
principles
that the Administration had asserted
it would follow.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n41. See id. at iii, 7 (mentioning
passage of the Internet Tax Freedom Act); see also id. at 12 (discussing
foreign tax initiatives).
n42. See, e.g., Esther Dyson, Release 2.0 (1997).
n43. See Judiciary Hearing, supra note 17, at 79-80 (prepared statement of Jack Valenti).
n44. See id. (testimony of Edward
J. Black; testimony of Chris Byrne); see also The WIPO Copyright Treaties
Implementation Act: Hearing on H.R.
2281 Before the Subcomm. on Telecomm., Trade, & Consumer Protection
of the House Comm. on Commerce,
105th Cong. (1998) [hereinafter Commerce Hearing].
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
III. THE WIPO COPYRIGHT TREATY IS
GOOD FOR THE NEW ECONOMY
The WIPO Copyright Treaty established
several norms about applying copyright law in the digital environment.
n45 They include:
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n45. See WIPO Copyright Treaty, supra
note 7. See also Samuelson, supra note 7 (discussing the digital
agenda WIPO treaty provisions).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
1) copyright owners should have an
exclusive right to control the making of copies of their works in digital
form, n46
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n46. There was an explicit provision
on the reproduction right in the draft treaty initially considered at WIPO.
See Basic Proposal For the Substantive
Provisions of the Treaty On Certain Questions Concerning the
Protection of Literary and Artistic
Works To Be Considered at the Diplomatic Conference, WIPO Doc.
CRNR/DC/4, art. 7(1) (Aug. 30, 1996).
However, this provision did not attract consensus because of its
inclusion of temporary reproductions,
which was highly controversial. See Samuelson, supra note 7, at 382-90.
Instead, the diplomatic conference
agreed on certain statements of interpretation of the treaty which included
a provision on the reproduction
right. See Agreed Statements Concerning the WIPO Copyright Treaty, adopted
by the Diplomatic Conference on
Dec. 20, 1996, WIPO Doc. CRNR/DC/96 at 1 (Dec. 23, 1996) [hereinafter
Agreed Statements]. For a discussion
of the tortured history of the draft treaty provision, the Agreed
Statements, and what they mean,
see Samuelson, supra note 7, at 382-92.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
2) copyright owners should have an
exclusive right to control the communication of their works to the public,
n47
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n47. See WIPO Copyright Treaty, supra
note 6, art. 8. While the United States does not have an exclusive
right of communication in its copyright
law, see 17 U.S.C. 106 (1994) (exclusive rights provisions), its public
performance and distribution rights
are substantively equivalent to this right. See id.; Samuelson, supra note
7, at 392-98 (discussing negotiations
concerning digital communications).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
3) countries can continue to apply
existing exceptions and limitations, such as fair use, as appropriate in
the
digital environment, and can even
create new exceptions and limitations appropriate to the digital
environment, n48
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n48. See Agreed Statements, supra
note 46, at 2. This agreed statement was in striking contrast to the
proposed treaty language and proposed
comments on exceptions and limitations to copyright in the draft
treaty considered at the WIPO diplomatic
conference. See Samuelson, supra note 7, at 398-409 (discussing
the draft and final provisions on
fair use and other exceptions). Although the White Paper had expressed
doubts about the viability of fair
use in the digital environment, the Clinton Administration was ultimately
persuaded that the WIPO Copyright
Treaty should contain a more positive statement about fair use in the
digital environment. See White Paper,
supra note 15, at 82; Samuelson, supra note 7, at 406.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
[*529] 4) merely providing
facilities for the communication of works should not be a basis for infringement
liability, n49
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n49. See Agreed Statements, supra
note 46, at 2. This issue had been highly contentious, both in the U.S.
and at the diplomatic conference,
because the Clinton Administration supported holding online service
providers strictly liable for infringing
acts of their users. See White Paper, supra note 15, at 114-24;
Samuelson, supra note 7, at 385-88
(discussing controversy at diplomatic conference). The DMCA included a
provision substantially limiting
on online service provider liability. See 17 U.S.C.A. 512 (West Supp. 1999).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
5) it should be illegal to tamper
with copyright management information insofar as this would facilitate
or
conceal infringement in the digital
environment, n50 and
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n50. See WIPO Copyright Treaty, supra
note 7, art. 12. For a discussion of the history and meaning of this
provision, see Samuelson, supra
note 7, at 415-18.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
6) countries should have "adequate
legal protection and effective legal remedies against the circumvention
of
effective technological measures"
used by copyright owners to protect their works from infringing uses. n51
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n51. See WIPO Copyright Treaty, supra
note 7, art. 11. The draft treaty considered at WIPO included a
provision quite similar to the anti-circumvention
provision endorsed by the Clinton Administration in the White
Paper which sought to outlaw technologies,
the primary purpose or effect of which was to circumvent
technical protection measures. The
draft treaty provision, like the White Paper's proposed anti-circumvention
regulation, was highly controversial
within the United States and even more so at the diplomatic conference.
Many delegations expressed concern
about the impact of such regulations on fair uses and public domain
information. As a consequence, the
final treaty included only a very general norm on anti-circumvention. See
Samuelson, supra note 7, at 409-15.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
To the extent that uncertainties
about how copyright law should apply in the digital environment were
impeding the growth of a global
market in electronic intellectual property products, n52 there was reason
to be
optimis [*530] tic that
conclusion of this treaty would remove these blockages and allow e-commerce
to
flourish. n53 These norms are as
"predictable, minimalist, consistent, and simple" components of a legal
environment for commerce as one
could expect copyright professionals to devise. n54 Thus, the WIPO treaty
itself established norms compatible
with Framework principles and with the needs of the digital economy. That
nearly one hundred sixty nations
signed this treaty indicated a strong consensus that digital works should
be
given appropriate protection on
an international scale. n55 This was very good news for U.S. digital economy
industries.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n52. Other factors besides uncertainties
about the application of copyright law in the digital environment may
be responsible for the slower-than-anticipated
growth in the market for digital versions of copyrighted works.
See, e.g., Pamela Samuelson, Authors'
Rights in Cyberspace: Are New International Rules Needed?, First
Monday (Oct. 1996), available at
<http://www.firstmonday.dk/issues/issue4/samuelson/index.html>. However,
there is a better case for such
uncertainties being an impediment on an international scale than in the
United
States. That U.S. copyright law
protects authors against unauthorized digital reproductions of their works
has
been clear since 1979. See National
Comm'n on New Technological Uses of Copyrighted Works, Final Report
(1979). In some countries, however,
this was not as clear. Insofar as the WIPO Copyright Treaty clarified this
on an international basis, it did
contribute to the legal infrastructure for global e-commerce. See Samuelson,
supra note 7, at 382-85 (discussing
lack of clarity about the reproduction right in the digital environment).
n53. See, e.g., First Annual Report, supra note 3, at 13-14.
n54. Framework, supra note 1, at 3.
n55. See List of Participants, WIPO
Doc. No. CRNR/DC/INF.2 (Dec. 20, 1996).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The WIPO treaty digital copyright
norms were, however, mostly old news for U.S. law. n56 Its cases had
already recognized the rights of
authors to control digital reproductions of their works, n57 as well as
to
control digital transmissions of
their works to the public. n58 Courts had invoked fair use in a number
of digital
copyright cases, n59 and had refused
to hold online service providers liable for infringing activities of users
about which the providers had no
knowledge. n60 Because of the substantial accord between the WIPO treaty
norms and existing U.S. law, the
Clinton Administration initially considered whether the WIPO Copyright
Treaty
might even be sent to the Senate
for ratification "clean" of implementing legislation. n61 This would have
avoided the kind of protracted legislative
battle that oc [*531] curred when Congress considered the
Administration's White Paper legislation
in 1996. n62 Eventually, the Administration decided that implementing
legislation was necessary for the
U.S. to comply with the WIPO treaty provision requiring protection for
the
integrity of copyright management
information. n63 The DMCA implementation of this norm, which closely
tracks the treaty language, was
uncontroversial during the legislative process. n64
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n56. The WIPO Copyright Treaty, as
finally concluded, was actually far more consistent with U.S. copyright
law than the draft treaty with which
the negotiations had begun (and which was substantially based on
proposals by U.S. officials). See
Samuelson, supra note 7, at 434-37.
n57. See, e.g., Sega Enterprises, Ltd. v. MAPHIA, 857 F. Supp. 679 (N.D. Cal. 1994).
n58. See, e.g., Playboy Enterprises, Inc. v. Frena, 839 F. Supp. 1552 (M.D. Fla. 1993).
n59. See, e.g., Lewis Galoob Toys,
Inc. v. Nintendo of America, 964 F.2d 965 (9th Cir. 1992) (software
enabling temporary changes in the
play of Nintendo games held fair use).
n60. See, e.g., Religious Tech. Center
v. Netcom Online Comm. Corp., 907 F. Supp. 1361 (N.D. Cal. 1995)
(online service provider should
not be held strictly liable for user infringement of which it had no knowledge).
n61. See Clinton Administration Is
Undecided On Implementing Steps For WIPO Treaties, 53 BNA Pat.,
Trademark & Copyright J. 241
(1997).
n62. See Samuelson, supra note 7,
at 427-32 (arguing that U.S. efforts at WIPO conference were aimed at
bypassing contention over domestic
legislative proposals).
n63. See WIPO Copyright Treaty, supra
note 7, art. 12. Had this treaty defined the term "rights management
information" ("RMI") only as "information
which identifies the work, the author of the work, the owner of any
right in the work," the U.S. could
have relied on section 43(a) of the Lanham Act to assert that it was in
compliance with the norms of this
Article as well. See Julie E. Cohen, Some Reflections on Copyright
Management Systems and Laws Designed
to Protect Them, 12 Berkeley Tech. L.J. 161, 169 n.31. However,
the treaty defines RMI as including
"information about the terms and conditions of use of the work, or any
numbers or codes that represent
such information<elip>." WIPO Copyright Treaty, supra note 6, art. 12.
Section 43(a) would not seem to
cover misrepresentations of this sort. See 15 U.S.C. 1125(a) (1994); see
also Cohen, supra, at 169 n.31.
In addition, it appears that some technical amendments to U.S. law were
necessary to change the terminology
about which foreign nationals could claim rights under U.S. law. See
Section-by-Section Analysis of H.R.
2281 As Passed By the United States House of Representatives on August
4, 1998, 105th Cong., at 3-4 (1998)
[hereinafter House Manager's Report].
n64. See 17 U.S.C.A. 1202 (West Supp.
1999). Concerns had earlier been expressed that copyright
management systems might be intrusive
on privacy interests of users. See, e.g., Julie E. Cohen, The Right to
Read Anonymously: A Closer Look
at "Copyright Management" in Cyberspace, 28 Conn. L. Rev. 981 (1996). In
response to concerns of this sort,
the legislative history of DMCA makes clear that copyright management
information ("CMI") does not include
digital information used to track or monitor usage of copyrighted works:
"It would be inconsistent with the
purpose and construction of this bill and contrary to the protection of
privacy to include tracking and
usage information within the definition of CMI." House Manager's Report,
supra
note 63, at 20.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The U.S. could have asserted that
its law already complied with the WIPO treaty's anti-circumvention norm.
n65 This norm was, after all, very
[*532] general in character and provided treaty signatories with
considerable latitude in implementation.
Moreover, anti-circumvention legislation was new enough to many
national intellectual property systems,
and certainly to international law, to mean that there was no standard
by which to judge how to instantiate
the norm. The U.S. could have pointed to a number of statutes and
judicial decisions that establish
anti-circumvention norms. n66 With U.S. copyright industries thriving in
the
current legal environment, it would
have been fair to conclude that copyright owners already were adequately
protected by the law. n67 Even many
of those who favor use of technical systems to protect digital
copyrighted works have expressed
skepticism about the need for or appropriateness of anti-circumvention
regulations, at least at this stage.
n68 Let content producers build their technical fences, advised one
prominent information economist,
but do not legislatively reinforce those fences until experience proves
the
existence of one or more abuses
in need of a specific cure. n69 However, the political reality and legislative
dynamics of the WIPO Copyright Treaty
implementation process were such that some sort of
anti-circumvention provision appeared
to be a necessary part of the bill.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n65. It is far more plausible that
the U.S. is in compliance with the WIPO treaty anti-circumvention norm
than
that it is in compliance with the
moral rights provision of the Berne Convention, which is one of the minimum
standard rules required of Berne
Union members. See Berne Convention for the Protection of Literary and
Artistic Works, Sept. 9, 1886, art.
6bis (Paris Text, 1971, amended 1979), reprinted in 1 Basic Documents of
Int'l Econ. L. (CCH) 715 (1994).
See also Jessica Litman, The Tales That Article 2B Tells, 13 Berkeley Tech.
L.J. 931, 932 (1998) (discussing
the U.S. rationale for claiming to be in compliance with the Berne Convention's
moral rights provision, and expressing
skepticism about the adequacy of this rationale). See also Jonathan
Band & Taro Isshiki, The New
Anti-Circumvention Provision in the Copyright Act: A Flawed First Step,
3
Cyberspace Law. 2 (1999) (explaining
that the DMCA's anti-circumvention regulations were not required for
compliance with the WIPO Copyright
Treaty).
n66. See White Paper, supra note
15, at 232-34 (discussing statutes); Sega Enterprises, Ltd. v. MAPHIA,
857
F. Supp. 679 (N.D. Cal. 1994) (finding
copyright liability for providing tools to enable game software to be
removed from disks and posted on
the Internet).
n67. See, e.g., Judiciary Hearing,
supra note 17, at 78 (statement of Jack Valenti) (citing $ 60 billion in
annual
U.S. revenues from international
sales of intellectual property and naming copyright industry as single
greatest
contributor to U.S. economy); Motion
Picture Ass'n of America Research Dep't, MPAA 1998 U.S. Economic
Review (visited Apr. 22, 1999) <http://www.mpaa.org/useconomicreview/1998/index.htm>
(demonstrating
steadily increasing U.S. box office
receipts between 1991 and 1998).
n68. See, e.g., Tom W. Bell, Fair
Use vs. Fared Use: The Impact of Automated Rights Management on
Copyright's Fair Use Doctrine, 76
N.C. L. Rev. 557, 561-62 (1998); David Friedman, In Defense of Private
Orderings, 13 Berkeley Tech. L.J.
1151, 1163-64 n.31 (1998).
n69. See Ejan Mackaay, The Economics
of Emergent Property Rights on the Internet, in The Future Of
Copyright in a Digital Environment
13, 21 (P. Bernt Hugenholtz ed., 1996). "It is this restraint," says MacKaay,
"that guards us from sliding into
rent-seeking." Id. at 22.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Even if a reasoned assessment of
U.S. law might have led policymakers to conclude that some additional
anti-circumvention legislation was
necessary or desirable, one would have thought that the Administration
would have supported a "predictable,
minimalist, consistent, and simple" [*533] legal rule, as its
Framework
principles call for. The Administration
might have, for example, proposed to make it illegal to circumvent a
technical protection system for
purposes of engaging in or enabling copyright infringement. This, after
all, was
the danger that was said to give
rise to the call for anti-circumvention regulations in the first place.
Silicon
Valley Representative Tom Campbell
proposed such an approach in his alternative bill. n70 If this same
assessment caused policymakers to
decide there was also a need for some regulation of circumvention
technologies to promote electronic
commerce, then a "predictable, minimalist, consistent, and simple" legal
rule
would have been to outlaw making
or distributing a technology intentionally designed or produced to enable
copyright infringement. n71 Many
"digital economy" firms and organizations supported the first of these
proposals, n72 and they would likely
have supported the second if it had ever had a chance of being taken
seriously.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n70. See H.R. 3048, 105th Cong. 8
(1997). Northern Virginia Representative Rick Boucher (whose district
includes America Online) cosponsored
this bill.
n71. This was how most previous regulations
of circumvention technologies had been framed. See, e.g.,
Thomas C. Vinje, A Brave New World
of Technical Protection Systems, 8 Eur. Intell. Prop. Rev. 431 (1996).
n72. See supra note 20.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Clinton Administration officials,
bowing to the wishes of Hollywood and its allies, opted instead to support
an
unpredictable, overbroad, and maximalist
set of anti-circumvention regulations. During Congressional
consideration of these provisions,
these regulations became complex and inconsistent for reasons that will
become evident in later sections
of this article. n73 It was, in short, not the needs of the digital economy
that
drove adoption of the anti-circumvention
provisions in the DMCA. Rather, what drove the debate was high
rhetoric, exaggerated claims, and
power politics from representatives of certain established but frightened
copyright indu [*534]
stries. These groups seem to believe they are so important to America that
they
should be allowed to control every
facet of what Americans do with digital information. n74 They also seem
to
think they are entitled to control
the design and manufacture of all information technologies that can process
digital information. n75 The DMCA
caters to their interests far more than to the interests of the innovative
information technology sector or
of the public.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n73. The anti-circumvention regulations
are one of a number of amendments to the Copyright Act of 1976 that
are contributing to its becoming
increasingly unreadable. See, e.g., 17 U.S.C. 104A (1994) (restoration
of
copyright in foreign works that
had fallen into the public domain for lack of compliance with U.S. formality
rules
in effect until 1989). This is not
to say that the 1976 Act was a model of comprehensibility in all respects.
See, e.g., 17 U.S.C. 111-112 (1994)
(effective Jan. 1, 1978) (exceptions permitting passive retransmission
of
broadcast signals by cable systems
and ephemeral recordings during broadcast transmission). However, these
incomprehensible provisions had
at least been negotiated by affected industry sectors who understood what
the provisions meant, even if virtually
no one else could comprehend them. In contrast, the restoration of
foreign copyright and the new anti-circumvention
regulations affect a broad range of industries. This makes
the incomprehensibility of the provisions
more troublesome.
n74. See Samuelson, supra note 15
(discussing the copyright maximalist agenda the Clinton Administration
has
supported).
n75. The potential for broad anti-circumvention
regulations to give copyright owners power to control the
design of consumer electronics products
was recognized in Geneva. See John Browning, Africa 1, Hollywood 0,
Wired, March 1997, at 61, 186 ("Japan
and other Asian nations were up in arms about proposals that would
effectively have turned the consumer
electronics industry into a branch of publishing."). Indeed, some
unnoticed provisions of the DMCA
will require the makers of consumer videotape recorders to build in
anti-copying technology in subsequent
models. See 17 U.S.C.A. 1201(k).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
IV. DMCA'S OVERBROAD ANTI-CIRCUMVENTION
PROVISIONS ARE NEITHER CONSISTENT WITH FRAMEWORK
PRINCIPLES NOR GOOD FOR THE NEW
ECONOMY
There are three principal rules
in the final DMCA's anti-circumvention provision. The first focuses on
the act of
circumvention. Section 1201(a)(1)(A)
generally outlaws the act of circumventing "a technological measure
that effectively controls access
to a work protected under this title." n76 This rule will, however, not
take
effect for two years from enactment,
in part to allow time for a study to be conducted of the potential impact
of this norm on noninfringing uses
of copyrighted works. n77 When it does come into force, it will be subject
to
seven complex exceptions that will
be discussed below in Part V.A. n78
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n76. 17 U.S.C.A. 1201(a)(1)(A).
n77. See id.; infra notes 208-210 and accompanying text.
n78. See id. 1201(d)-(j), discussed
infra notes 98-135 and accompanying text.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Section 1201 also contains two "anti-device"
provisions. Sections 1201(a)(2) and 1201(b)(1) both regulate
technologies with circumvention-enabling
capabilities. The former focuses on devices that circumvent "a
technological measure that effectively
controls access to a [copyrighted] work" (access controls). n79 The
latter relates to devices that circumvent
the "protection afforded by a technological measure that effectively
protects a [*535] right
of a copyright owner <elip> in a work or a portion thereof" (e.g., copy
controls). n80
In each case, section 1201 states
that "no person shall manufacture, import, offer to the public, provide,
or
otherwise traffic in any technology,
product, service, device, component, or part thereof" n81 if it (1) "is
primarily designed or produced for
the purpose of circumventing," n82 (2) "has only limited commercially
significant purpose or use other
than to circumvent," n83 or (3) "is marketed by that person or another
acting
in concert with that person with
that person's knowledge for use in circumventing" n84 the technological
measure or the protection it affords.
The anti-device rules have a narrower range of exceptions than does the
act-of-circumvention ban. n85
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n79. Id. 1201(a)(2); see also id.
1201(a)(3) (defining the phrases "circumvent a technological measure" and
"effectively controls access to
a work").
n80. Id. 1201 (b)(1); see also id.
1201(b)(2) (defining the terms "circumvent protection afforded by a
technological measure" and "effectively
protects a right of a copyright owner under this title").
n81. Id. 1201(a)(2), (b)(1).
n82. Id. 1201(a)(2)(A), (b)(1)(A).
There is no definition of "primarily designed or produced" in the statute;
nor
are any criteria for determining
it provided in the statute.
n83. Id. 1201(a)(2)(B), (b)(1)(B).
This subsection may be the broadest and most dangerous of the three
conditions because it would seem
to put at risk "freeware" or "shareware" programs that, by their very nature,
have no commercial uses. MIT Professor
Hal Abelson has informed me that he expressed his reservations about
this subsection to Rep. Barney Frank
who serves on the House Intellectual Property Subcommittee. Prof.
Abelson said that this provision
should outlaw technologies having "only limited legitimate uses." He reports
that Rep. Frank agreed with this
assessment. Yet the final provision retains the "limited commercial purposes"
construction with which it began.
Email correspondence with Hal Abelson (Feb. 28, 1999) (on file with author).
n84. 17 U.S.C.A. 1201(a)(2)(C), (b)(1)(C).
n85. See id. 1201(g)(4), (j)(4).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
One would have to admit that the
act-of-circumvention rule initially sought by the Administration was simpler,
and at least in this respect, more
consistent with the Framework's principles than the DMCA as enacted. The
original proposal would have outlawed
circumventions of technical protection systems except when done for
legitimate law enforcement or intelligence
purposes. n86 However, representatives of major information
technology firms and organizations
brought to Congress's attention that this norm would interfere with many
legitimate activities. n87 It would,
for example, have outlawed encryption research and computer security
testing, even though these activities
are critical to achieving many of the ob [*536] jectives of
the digital
economy. n88 As Congress came to
recognize that there were a number of legitimate reasons to circumvent
technical protection systems, the
bill slowly accreted exceptions that made the bill more complicated but
less
harmful to growth of the digital
economy. n89
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n86. See H.R. 2281 1201, 105th Cong.
(1997) (as introduced in the House of Representatives on July 29,
1997), reprinted in 54 BNA Pat.,
Trademark & Copyright J. 270 (1997).
n87. See, e.g., Judiciary Hearing, supra note 17, at 256-61 (statement of Edward J. Black).
n88. See Letter from Dr. Charles
Brownstein, Chair of the Public Policy Committee of the U.S. Chapter of
the
Association for Computing Machinery,
to Rep. Thomas J. Bliley, Chairman of the House Commerce Committee
(Sept. 29, 1998) (on file with author)
(expressing concern about impact of broad anti-circumvention
regulations on computer security
research). See also Framework, supra note 1 , 6 (emphasizing the importance
of computer security to the growth
of global economic commerce).
n89. See infra Part V.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
These same firms and organizations,
in alliance with major consumer electronics firms, were also critical of
the
Administration's preferred anti-device
provisions. n90 However, these digital economy groups exhausted their
political capital on getting critical
exceptions to the act-of-circumvention ban n91 and on establishing that
they had no affirmative duty to
build their technologies to respond to technical protection systems, but
only a
duty to refrain from actively undermining
them. n92 They took some comfort in statements by Congressional
supporters of a limited interpretation
of [*537] the anti-device norms indicating that Congress meant
for the
anti-device provisions to apply
to ""black boxes' that are expressly intended to facilitate circumvention."
n93
Still, the digital economy sector
remains understandably concerned about the potential for overbroad
application of the anti-circumvention
and anti-device norms, and recent developments suggest that there is
reason for this concern. n94
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n90. See Commerce Hearing, supra
note 44, at 32-33 (prepared statement of Chris Byrne, Director of
Intellectual Property, Silicon Graphics,
Inc., on behalf of Info. Tech. Indus. Council); id. at 28-30 (statement
of Jonathan Callas, Chief Technology
Officer, Network Assocs., Inc.); id. at 58-63 (statement of Seth
Greenstein, Esq., on behalf of the
Digital Media Ass'n); id. at 46-49 (statement of Walter H. Hinton, Vice
President, Storage Tech. Corp.,
on behalf of the Computer and Communications Indus. Ass'n); id. at 18-27
(statement of Gary J. Shapiro, Chairman,
Home Recording Rights Coalition, and President, Consumer Elecs.
Mfrs. Ass'n).
n91. See 17 U.S.C.A. 1201(f), (g), and (j).
n92. See id. 1201(c)(3); 144 Cong. Rec. H7093, H7095 (daily ed. Aug. 4, 1998) (statement of Rep. Bliley).
n93. See id. at H7094-95 ("This provision
is not aimed at products that are capable of commercially significant
noninfringing uses<elip>.").
See also id. at H7097 ("It is not enough for the primary effect of the
device to be
circumvention. It, therefore, excludes
legitimate multipurpose devices<elip>."); House Manager's Report, supra
note 63, at 9 ("[Section 1201(a)(2)]
is carefully drafted to target "black boxes' and to ensure that legitimate
multipurpose devices can continue
to be made and sold."); infra note 192 and accompanying text.
n94. See infra notes 193-195and accompanying
text.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Although Administration officials
admitted in Congressional testimony that its preferred legislation went
beyond
what the WIPO Copyright Treaty required,
it argued for this broader rule in part to set a standard that would
help the U.S. persuade other countries
to pass similarly strong rules. n95 Proponents of the Administration's
preferred anti-circumvention regulations
scoffed at arguments made by an alliance of consumer electronics
firms and by representatives of
the computer and software industries about the harm that broad
anti-circumvention regulations would
do in this industry. n96 They also dismissed as specious arguments made
by library and educational groups
about threats to fair use and the public domain arising from broad
anti-circumvention regulations.
n97
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n95. See, e.g., House Subcommittee
Holds Hearings on WIPO Treaty Bills, OSP Liability, 54 BNA Pat.,
Trademark & Copyright J. 414
(1997).
n96. See, e.g., Judiciary Hearing, supra note 17, at 204-12 (statement of Allan Adler).
n97. See, e.g., id. at 229, 235-36
(testimony of Michael K. Kirk, executive director, American Intellectual
Property Law Ass'n).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
V. THE ENUMERATED EXCEPTIONS IN THE
ACT-OF-CIRCUMVENTION BAN ARE UNDULY NARROW AND
INCONSISTENT WITH FRAMEWORK PRINCIPLES
A. The Statutory Exceptions to the
Circumvention Ban
The DMCA ban on the act of circumventing
technical protection systems is subject to seven very specific
exceptions, n98 as well as being
qualified by several other subsections. n99 In addition, it is subject
to a
two-year moratorium during which
the Librarian of Congress is supposed to study the potential impact of
the
anti-circumvention ban on noninfringing
uses of copyrighted works which may lead to further limitations on the
act-of-circumvention rule. n100
While several of these exceptions and limitations respond to the gravest
of
concerns expressed by digital economy
firms, n101 [*538] they are still too narrowly crafted, as
examples
given below will reveal. n102 Congress
should have adopted a provision enabling courts to exempt acts of
circumvention engaged in for other
legitimate purposes. Courts interpreting section 1201 may either be forced
to find liability in some situations
in which it would be inappropriate to impose it or to stretch existing
limitations. Congress may eventually
need to revise this provision to recognize a broader range of exceptions.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n98. See 17 U.S.C.A. 1201(d)-(i) (West Supp. 1999).
n99. See id. 1201(c)(1)-(4).
n100. See id. 1201(a)(1)(A)-(C).
n101. See id. 1201(f) (reverse engineering
exception), 1201(g) (encryption research), and 1201(j) (computer
security testing). See also Judiciary
Hearing, supra note 17, at 260-61 (prepared statement of Edward J.
Black) (expressing concern about
reverse engineering); Commerce Hearing, supra note 44, at 29-30 (prepared
statement of Jonathan Callas) (expressing
concern about encryption and security research).
n102. See infra Part V.B.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The structure of the final DMCA anti-circumvention
provision and its complexity resulted from the maximalist
position with which the Administration
and its major copyright industry allies began the legislative struggle.
Only when IT industry groups were
able to identify particularized situations in which circumvention was
appropriate was there any legislative
"give" on the issue, and then only to the extent of that identified
situation. n103 As noted above,
Clinton Administration officials initially sought an almost unlimited ban
of
circumvention activities. n104 The
only exception to the circumvention ban in the Administration's favored
legislation was an authorization
of circumvention of technical protection systems for legitimate law
enforcement, intelligence, and other
governmental purposes. n105 Without this exception, suspected Mafia
bosses and terrorists, oddly enough,
might have been able to challenge attempted law enforcement or
intelligence agency decryptions
of their records or communications under section 1201(a)(1). n106
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n103. See supra note 101.
n104. See Band & Isshiki, supra
note 65 (indicating that Patent and Trademark Office (PTO) officials had
initially sought to outlaw circumvention
of copy controls, as well as of access controls, and that lobbying by
library and educational groups had
persuaded Commerce Department officials to drop this provision of the
PTO's preferred bill).
n105. See H.R. 2281 1201(e), 105th
Cong. (1997) (as introduced in the House of Representatives on July 29,
1997). The DMCA version of 1201
has such a provision, although it has been expanded to enable government
agencies to test the vulnerabilities
of their computer systems or networks. See 17 U.S.C.A. 1201(e) (West
Supp. 1999).
n106. Virtually all such records
would likely embody a modicum of originality that would enable these actors
to
claim copyright protection in fixations
of these records. If these persons used technical protection systems to
prevent unauthorized access to these
records, any act of the government to circumvent such systems would,
strictly speaking, run afoul of
1201(a)(1).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The Administration's preferred bill
also provided that nothing in section 1201 would "affect rights, remedies,
limitations, or defenses to copy
[*539] right infringement, including fair use, under this title."
n107 This
seemed to recognize that circumventing
a technical protection system for purposes of engaging in fair use or
other noninfringing acts would be
lawful, although it did not directly say so. n108 Some representatives
of
major copyright industries who testified
at a Congressional hearing on this legislation expressed the view that
fair use should not be an acceptable
reason to "break" a technical protection system used by copyright
owners to protect their works. n109
Allan Adler, testifying on behalf of the Association of American Publishers,
for example, stated that "the fair
use doctrine has never given anyone a right to break other laws for the
stated purpose of exercising the
fair use privilege. Fair use doesn't allow you to break into a locked library
in
order to make "fair use' copies
of the books in it, or steal newspapers from a vending machine in order
to copy
articles and share them with a friend."
n110 The "breaking and entering" metaphor for circumvention activities
swayed some influential Congressmen
in the debate over anti-circumvention regulations. n111
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n107. H.R. 2281 1201(d) (as introduced
in the House of Representatives on July 29, 1997). See 17 U.S.C.A.
1201(c)(1).
n108. An extremely narrow interpretation
of the provision might suggest that fair use could be raised as a
defense to an infringement claim
based on activities engaged in after a circumvention had taken place (e.g.,
reproducing a portion of the work
for fair use purposes), even if the act of circumvention itself would not
be
excused. See Judiciary Hearing,
supra note 17, at 235-36 (testimony of Michael K. Kirk).
n109. See also White Paper, supra
note 15, at 231 (indicating that copyright owners have no obligation to
make their works available in a
form that will enable fair uses to be made of them).
n110. Judiciary Hearing, supra note
17, at 208 (prepared statement of Allan Adler). This same speaker went
on
to say that "the Declaration of
Independence is in the public domain, but there is nothing wrong with the
National Archives keeping it in
a vault and punishing anyone who tries to break through security to get
hold of
that copy." Id.
n111. See House Manager's Report,
supra note 63, at 5 (characterizing circumvention to get unauthorized
access as "the electronic equivalent
to breaking into a locked room to obtain a copy of a book"). But see,
e.g., Friedman, supra note 68, at
1163 n.31 (arguing against the treatment of technologies capable of
circumventing technical protection
systems as "the digital equivalent of burglar's tools").
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Courts should distinguish between
circumvention aimed at getting unauthorized access to a work and
circumvention aimed at making noninfringing
uses of a lawfully obtained copy. n112 Section 1201(a)(1) is
aimed at the former, not the latter.
Fair use, for example, would provide a poor [*540] excuse for
breaking
into a computer system in order
to get access to a work one wished to parody. However, if one had already
lawfully acquired a copy of the
work, and it was necessary to bypass a technical protection system to make
fair use of that copy, this would
appear to be lawful under section 1201(a)(1) and (c)(1). n113 Take, for
example, an act of circumvention
performed by Geoffery Nunberg, a friend of mine who works for Xerox's Palo
Alto Research Center. He was an
expert witness in a lawsuit which successfully challenged the Washington
Redskins' trademark on the ground
that the word "redskins" is scandalous or disparaging. n114 Nunberg decided
it was necessary to take a clip
from an old Western movie to demonstrate derogatory uses of the term in
context. It was necessary for him
to defeat a technical protection system adopted by the owner of the
copyright in this movie in order
to make the clip for this purpose. If section 1201(c)(1)'s preservation
of fair
use and other defenses to infringement
are to be given their plain meaning, it would seem that this sort of
circumvention should be permissible.
n115 Thus, if the clip from the movie qualifies as a fair use, the act
of
circumvention may be privileged
under section 1201(c)(1). n116
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n112. See Cohen, supra note 63, at
174-76 (discussing lawful circumvention); see also Julie E. Cohen,
Copyright and The Jurisprudence
of Self-Help, 13 Berkeley Tech. L.J. 1089, 1142 n.200 (1998) (finding in
copyright's fair use doctrine an
affirmative right to "hack" technical protection systems to make fair uses).
n113. See 144 Cong. Rec. H7097 (daily
ed. Aug. 4, 1998) (letter from Rep. Howard Coble to Rep. Rick Boucher)
(indicating an intent to distinguish
between circumvention to get unauthorized access to a work and
circumvention to make fair uses).
n114. See Harjo v. Pro-Football,
Inc., 45 U.S.P.Q.2d (BNA) 1789 (1998); 15 U.S.C. 1052(a) (1994) (excluding
scandalous and disparaging matter
from trademark protection); See also "Redskins" Mark is Cancelled as
Disparaging to Native Americans,
BNA Pat., Trademark & Copyright Law Daily (Apr. 12, 1999).
n115. See, e.g., 144 Cong. Rec. H7093
(daily ed. Aug. 4, 1998) (statement of Rep. Bliley) (indicating that the
Commerce Committee understood the
legislation to enable consumers to "exercise their historical fair use
rights"); see also id. at H7097
(letter from Rep. Coble to Rep. Boucher).
n116. But see infra notes 157-162
and accompanying text for a discussion about whether this person's
development of a technology enabling
him to defeat the technical protection system would be similarly
privileged.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Although this section's apparent
preservation of fair use was important, it did not satisfy library and
nonprofit
groups who expressed substantial
concern about the impact that the anti-circumvention provisions would have
on public access to information.
n117 The only additional concession that the House Subcommittee on
Intellectual Property thought should
be made to concerns expressed by these groups was to create a special
"shopping privilege" for them. This
exception, which was included in the final DMCA, enables nonprofit library
and educational institutions to
circum [*541] vent technical protection systems to "make a
good faith
determination of whether to acquire
a copy" of the work. n118 Librarians and educators do not see much value
in this provision because vendors
of technically protected copyrighted works will generally have incentives
to
allow librarians and educators to
have sufficient access to make acquisition decisions. n119 Their broader
concerns about the impact of anti-circumvention
regulations on noninfringing uses fell on deaf ears in both the
House and Senate Subcommittees on
Intellectual Property. n120
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n117. See, e.g., Commerce Hearing, supra note 44, at 64-66 (statement of Prof. Robert L. Oakley).
n118. See 17 U.S.C.A. 1201(d) (West Supp. 1999).
n119. See infra notes 151-156 and
accompanying text, concerning whether the shopping privilege could be
undermined by the lack of available
tools to enable this circumvention.
n120. See, e.g., Judiciary Hearing,
supra note 17, at 148-56 (statement of Robert L. Oakley); id. at 64-68
(statement of M.R.C. Greenwood,
chancellor of the University of California, Santa Cruz) (expressing concerns
about the impact of technical protection
systems on noninfringing uses of protected works - concerns the
"shopping privilege" does not address).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Computer and software industry groups
were initially unsuccessful in persuading Congress to create additional
exceptions to the anti-circumvention
rules and other changes to the anti-circumvention regulations to make
them less harmful to legitimate
activities in these industries. n121 Not until the full Senate Judiciary
Committee
and the House Commerce Committee
undertook their reviews of the legislation were concerns of these industry
groups heeded. Out of the Senate
Committee emerged three significant changes to the DMCA. The first was
creation of a new exception to enable
circumvention of technical protection systems for purposes of enabling
a software developer to achieve
interoperability among computer programs. n122 The second was a provision
clarifying that equipment manufacturers
were under no obligation to specially design their products to respond
to any particular technical measure
used by those providing content for this equipment. n123 The third was
a
provision indicating that section
1201 was not intended to broaden contributory or vicarious copyright liability.
n124
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n121. See, e.g., id. at 256-65 (statement
of Edward J. Black) (expressing concern about the impact of the
anti-circumvention provisions for
achieving interoperability among computer programs).
n122. See 17 U.S.C.A. 1201(f) (West Supp. 1999).
n123. See id. 1201(c)(3).
n124. See id. 1201(c)(2).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
An interesting twist in the saga
leading up to adoption of the DMCA was the House Commerce Committee's
decision to exercise jurisdiction
[*542] over part of the digital copyright legislation. n125 Its review
led to
several other significant changes
to the bill. Some of these responded to concerns expressed by digital
economy firms; others responded
to concerns expressed by library, educational, and other nonprofit groups.
n126 The Commerce version of the
bill added a new exception to enable encryption research and the
development of encryption-research
tools. n127 It also created two consumer-oriented exceptions, one to
enable parents to circumvent access
controls when necessary to protect their children from accessing harmful
material on the Internet, and the
other to enable circumvention to protect personal privacy. n128 It also
proposed a moratorium on the anti-circumvention
rules so that a study could be conducted about the
potential impact of anti-circumvention
rules on fair use, the public domain, and other noninfringing uses of
copyrighted works. n129
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n125. See Commerce Hearing, supra
note 44, at 1-3 (statement of Rep. Tauzin, Subcomm. Chairman)
(explaining the Commerce Committee's
reasons for reviewing the WIPO treaty implementation legislation).
n126. See Commerce Panel Clears Digital
Copyright Bill With Further Concessions on Fair Use, 56 BNA Pat.,
Trademark & Copyright J. 326
(1998).
n127. This eventually was codified in the DMCA. See 17 U.S.C.A. 1201(g) (West Supp. 1999).
n128. These were also eventually codified in the DMCA. See id. 1201(h), (i).
n129. See id. 1201(a)(1)(B). See
also infra notes 205-206 and accompanying text for discussion of this
provision.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
More clearly than the Judiciary Committees
in either branch of Congress, the Commerce Committee recognized
the unprecedented nature of the
access right that was implicit in the act-of-circumvention provision of
section 1201. "If left unqualified,"
said Congressman Bliley, "this new right <elip> could well prove to
be the
legal foundation for a society in
which information becomes available only on a "pay-per-use' basis." n130
To
ensure this would not occur, the
legislation was amended to enable librarians and educators to make a
showing that the anti-circumvention
provision was interfering with noninfringing uses of copyrighted materials
and to seek an exemption from the
ban. n131 Insofar as such a showing could be made, the Commerce
Committee thought that affected
classes of works or of users should be exempt from section 1201(a)(1)(A).
Congressman Bliley pointed out that
"copyright law is not just about protecting information. It's just as much
about affording reasonable access
to it as a means of [*543] keeping our democracy healthy<elip>."
n132
The Commerce Committee review of
the legislation also led to inclusion of a provision indicating that nothing
in
section 1201 "shall enlarge or diminish
any rights of free speech or of the press for activities using consumer
electronics, telecommunications,
or computing products." n133 This provision recognizes the potential impact
of the anti-circumvention rule on
free speech and free press interests.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n130. 144 Cong. Rec. H7094 (daily ed. Aug. 4, 1998) (statement of Rep. Bliley).
n131. See 17 U.S.C.A. 1201(a)(1)(B)-(D). See infra notes 203-210 and accompanying text.
n132. 144 Cong. Rec. H7094 (daily ed. Aug. 4, 1998) (statement of Rep. Bliley).
n133. 17 U.S.C.A. 1201(c)(4).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
During the final negotiations leading
up to passage of the DMCA, several of the exceptions were refined. n134
In addition, the computer security
research community finally persuaded legislators to add another exception
to enable circumvention of technical
protection systems necessary for legitimate testing of the security of
computer systems. n135
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n134. Compare H.R. 2281, 105th Cong.
(1998) (as passed on Aug. 4, 1998), with Digital Millennium Copyright
Act, Pub. L. No. 105-304, 112 Stat.
2860 (1998).
n135. See 17 U.S.C.A. 1201(j). This
too had been the subject of testimony before the House Commerce
Committee. See Commerce Hearing,
supra note 44, at 27-30 (statement of Jonathan Callas).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
B. Circumvention for Other Legitimate
Reasons Should Be Privileged
While the final version of the DMCA
anti-circumvention provision responded to several significant concerns
of
the digital economy sector, it did
so mainly by adopting specific exceptions. There are, however, many other
legitimate reasons for circumventing
technical protection systems that are not, strictly speaking, covered by
the exceptions in the final bill.
Five examples demonstrate that section 1201 should have an "or other
legitimate purposes" exception to
section 1201(a)(1).
Suppose, for example, that a copyright
owner had reason to believe that an encrypted work contained an
infringing version of one of its
works. The only way to find out whether the copyright owner's suspicion
is valid
may be to circumvent the technical
protection system to get access to the encrypted material. Even if its
suspicions proved correct, the copyright
owner would have violated section 1201(a)(1)(A) in the course of
discovering this. There is no exception
in section 1201 to protect this kind of decryption activity.
Or suppose that a content producer
had licensed certain software that was essential to the development of
its product (e.g., editing software
used in the process of making motion pictures). In the course of a dispute
about the performance quality of
this software, the content producer might with [*544] hold
payment of a
royalty as a way of communicating
its displeasure with the licensor's maintenance of the software. The
software's licensor might then respond
by activating a technical "self-help" system embedded in the software
to stop the software from operating.
n136 To deal with this development, the licensee might well attempt to
circumvent the self-help feature
now blocking access to the software because the licensee needed to use
the
software to finish its movie and
because it regarded itself as having a legitimate claim of licensor breach
to
justify holding back the royalty.
n137 However legitimate the claim or this activity, there is no exception
to
the anti-circumvention rule to protect
the licensee in this situation.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n136. Software developers can embed
specialized disabling subprograms in licensed software. These may
cause the software to cease operation
unless a new code has been made available to the licensee by the
licensor. They can also be invoked
via a network connection to the licensor's site or by a remote act by the
licensor. For a discussion of public
policy issues raised by technical self-help systems, see Pamela Samuelson,
Embedding Technical Self-Help in
Licensed Software, 40 Comm. ACM 13 (1997).
n137. A model law to regulate licensing
of computer information has proposed to validate, as a matter of
contract law, a licensor's use of
technical self-help systems as long as certain procedural steps are taken
to
protect licensee interests. See
U.C.C. 2B-716 (Feb. 1999 Draft). See also Memorandum from Susan H. Nycum
to Uniform Commercial Code Article
2B Reporter and Drafting Committee regarding Licensor Self-Help Revision
of Proposed UCC 2B, at 1 (Jan. 27,
1997) available at <http://www.2bguide.com/docs/nycshelp.html>
(expressing objections to proposed
validation of technical self-help features in licensed software, speaking
of
them as a "trap for the unwary -
in the extreme"); Memorandum from Michele Kane on behalf of Walt Disney
Co. to Prof. Raymond T. Nimmer,
Reporter for Article 2B, at 3 (Jan. 27, 1997), available at
<http://www.2bguide.com/docs/mkane.html>
(strenuously objecting to Article 2B's endorsement of technical
self-help provisions in model licensing
law as "unnecessary and unfair").
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Two further examples will illustrate
the narrowness of certain existing privileges in the DMCA. Suppose, for
example, that a firm circumvented
a technical protection system to stop software it had licensed from
monitoring certain uses of the software
in ways not contemplated in the license agreement and which the
licensee regarded as unwarranted
and detrimental to its interests. Although there is a "personal privacy"
exception in the DMCA, n138 there
is no general exception for circumventing to protect other confidentiality
interests. Or suppose that a firm
was considering making a multi-million dollar acquisition of a computer
system
whose producer asserted was highly
secure. If this firm wished to test the veracity of the producer's
assertions, without getting the
producer's permission or over the [*545] producer's objection,
it would seem
to violate section 1201. Although
there is a computer security testing exception in the Act, it only applies
if
one is already the owner or operator
of the computer system being tested. n139 It should be noted here that
many security flaws discovered in
widely deployed systems have been found by researchers who tested the
system without permission of either
the owner or manufacturer of such systems. n140 These activities too are
not covered by the computer security
exception provided for in the DMCA.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n138. See 17 U.S.C.A. 1201(i). For
a discussion of the concerns leading to adoption of this exception, see
Commerce Hearing, supra note 44,
at 12-18 (statement of Marc Rotenberg, Director, Electronic Privacy Info.
Ctr.).
n139. See 17 U.S.C.A. 1201(j).
n140. See, e.g., John Markoff, Software
Security Flaw Puts Shoppers on Internet at Risk, N.Y. Times, Sept.
19, 1995, at A1.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Finally, because the DMCA recognizes
that the anti-circumvention rules may have an impact on free speech
and free press concerns, n141 it
may be worth considering an example of this sort. Suppose that an employee
of a major chemical company gave
a reporter a disk containing a digital copy of a report and several
photographs pertaining to a major
chemical spill that the company was trying to cover up. If information
on
the disk was technically protected
and the employee was not authorized by the company to provide the
information to the reporter, it
would appear that the reporter would violate section 1201(a)(1) if he
circumvented the technical protection
system to get access to this information, even if consideration of free
press and free speech interests
might suggest that such a circumvention was justifiable.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n141. See 17 U.S.C.A. 1201(c)(4).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
One response to these examples might
be to assert that copyright owners will generally not sue when these or
other legitimate circumvention activities
occur. However, in some of the examples given above, the technical
protector might well have incentives
to sue the circumventor. n142 Given that there are serious criminal
penalties for willfully violating
section 1201, n143 the overbreadth of this provision and the narrowness
of
existing exceptions will put many
legitimate circumventors at unnecessary risk. If such suits are brought,
courts may, of course, and probably
will, find other ways to reach just results. They might, for example,
decide that the "other defenses"
provision of the anti-circumvention rule legitimized the circumvention,
n144
that some instances were within
the spirit, even if not the letter, of an existing privilege, or that there
was
insufficient harm [*546]
to the legitimate interests of the person challenging the circumvention
activity to
justify imposing liability. n145
However, there should be a general purpose "or other legitimate purposes"
provision in section 1201 so that
courts will not have to thrash to reach appropriate results. This would
add
flexibility, adaptability, and fairness
to the law. In many other parts of copyright law - with the fair use
doctrine, for example, or the distinction
between ideas and expressions - Congress has trusted the common
law process to distinguish between
legitimate and illegitimate activities. It could (and should) have done
so
with respect to circumvention legislation
as well.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n142. See supra note 136 (licensor whose self-help feature might be defeated by a licensee).
n143. See 17 U.S.C.A. 1204.
n144. See id. 1201(c)(1).
n145. Section 1203(a) requires that
a person be "injured by a violation of section 1201" in order to bring
a suit
to challenge a violation of this
provision. Id. 1203(a).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
It would have been especially appropriate
to adopt a general purpose "other legitimate purpose" provision
because the anti-circumvention ban
is an unprecedented provision for copyright law as to a significant new
technology issue with which neither
Congress nor the courts have much experience. n146 The lack of a
general purpose exception is particularly
troubling in view of the harsh criminal and civil provisions in the
statute, which may have a chilling
effect on legitimate activities, including those affecting free speech.
It
could also put at risk some legitimate
activities in the digital economy that will impede the growth of
e-commerce, as will become more
apparent in the next section.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n146. Professor Julie Cohen, in commenting
on the structure of section 1201, observed that this provision is
almost European in its construction.
Typically, European legislators formulate laws as though all contingencies
can be foreseen and the rule can
be established for all time. Europeans typically provide a broad rule and
only
limited exceptions to the rule.
American laws more typically have some openness that allow the laws to
adapt
to new circumstances. This may provide
American law with needed flexibility in times of rapid technological
change. Yet, section 1201 deviates
from this general American approach. Conversation with Julie E. Cohen
(Jan. 1999).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
VI. THE ANTI-DEVICE PROVISIONS SHOULD
BE NARROWED BY LEGISLATIVE MENDMENT OR JUDICIAL
INTERPRETATION
The text of the DMCA and its legislative
history clearly demonstrate that Congress intended to ensure that
users would continue to enjoy a
wide range of noninfringing uses of copyrighted works, even if copyright
owners used technical protection
systems to impede them. This is evident in the DMCA's recognition that
circumventions for fair use, free
speech, and [*547] free press purposes should be lawful. n147
It is also
apparent in the provision enabling
the Librarian of Congress to exempt certain classes of users or works from
the general anti-circumvention rule
when necessary to preserve socially valued noninfringing uses. n148 In
addition, it explains why Congress
adopted some exceptions to the act-of-circumvention ban, notably, the
interoperability privilege. n149
As the last part has shown, if Congress had not been blinded by the politics
of
the day, it would likely have recognized
other legitimate reasons to engage in acts of circumvention.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n147. See 17 U.S.C.A. 1201(c)(1),
(c)(4), discussed supra notes 99, 107, 113-116 and accompanying text.
This same subsection indicates that
it also does not intend to enlarge or diminish vicarious or contributory
copyright infringement. See id.
1201(c)(2).
n148. See id. 1201(a)(1)(B)-(D).
n149. See id. 1201(f). This exception
preserves the fair use privilege recognized in Sega Enterprises, Ltd. v.
Accolade, Inc., 977 F.2d 1510 (9th
Cir. 1992), that permits the intermediate copying of computer programs
when necessary to obtain information
in order to achieve interoperability among independently developed
computer programs.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
If Congress intended for circumvention
of technical protection systems to be legal when done for legitimate
purposes, it might seem obvious
that Congress should be understood to have intended to enable users to
effectuate the circumvention privileges
it recognized. n150 Although it will not always be necessary for a
legitimate circumventor to make
or use a circumvention technology to accomplish a privileged circumvention
(e.g., enciphered text might be
decoded by purely mental activity), most often this will be necessary.
n151
The deepest puzzle of section 1201
is whether Congress implicitly intended to allow the development and/or
distribution of technologies necessary
to accomplish legitimate circumvention activities, or whether, in
essence, it created a number of
meaningless privileges.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n150. See Benkler, supra note 24,
at 416 ("If the act of circumvention were privileged to users, particularly
if
it were privileged as a matter of
free speech, it would be difficult to sustain a prohibition on manufacture
and
sale of the products necessary to
enable users to engage in circumvention.").
n151. See, e.g., James R. Davis,
On Self-Enforcing Contracts, the Right to Hack, and Willfully Ignorant
Agents,
13 Berkeley Tech. L.J. 1145, 1147
(1998) (questioning whether a "right to hack" for fair use would be
meaningful, given that most users
would be unable to overcome technical protection systems without tools
designed for that purpose).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Seemingly relevant to addressing
this question are some curious features of section 1201 that close study
of
this complex provision reveals.
First, several exceptions to the anti-circumvention rule specifically authorize
the creation of tools necessary
to achieving a legitimate circumvention activity (e.g., the encryption
research
and interoperability privi
[*548] leges), n152 while several others (e.g., the law enforcement
privilege and
the privacy privilege) do not. n153
Secondly, while the interoperability privilege exempts necessary tools
from
both device provisions of section
1201, n154 the encryption and security research privileges exempt tools
only
from the access-device provision,
not from the control-device provision. Yet, it would seem that encryption
and security research would often
require testing both of access and of control components of technical
protection systems. n155 Thirdly,
section 1201 contains no provision enabling the development or distribution
of circumvention tools to enable
fair use or other privileged uses in terrain which section 1201(a)(1)(A)
doesn't
reach (i.e., making fair uses of
lawfully acquired copies). If Congress intended to recognize a right to
"hack" a
technical protection system to make
fair uses, this right could be undermined if it could not be exercised
without developing a tool to bypass
the technical protection system or otherwise getting access to such a
tool. n156 Under some interpretations
of section 1201(b)(1), development or distribution of such a tool would
be unlawful.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n152. See 17 U.S.C.A. 1201(f)(2), (g)(4).
n153. See id. 1201(e), (i). There
is, however, a better textual argument for inferring a tool-making privilege
for
law enforcement activities than
for inferring tool-making authority to enable privacy protection. Section
1201(i) limits the application of
section 1201(a)(1)(A), whereas 1201(e) indicates that "this section does
not
prohibit any lawfully authorized
investigative <elip> activity" of a government agent.
n154. See id. 1201(f)(2).
n155. See id. 1201(g)(4), (j)(4).
n156. See Cohen, supra note 63, at
174-78 (discussing lawful tampering with technical protection systems
and its implications for the availability
of tools to accomplish this).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Consider, for example, the Xerox
PARC researcher who circumvented a movie's technical protection system
in
order to make a fair use clip for
the Washington Redskins' litigation. n157 It was necessary for him to develop
a tool to enable him to bypass the
technical protection system to make the clip. Suppose that the motion
picture copyright owner found out
about the circumvention and decided to make an example of this
researcher, suing him for statutory
damages for violating section 1201(b)(1). n158 On a strict interpretation
of
this subsection, the researcher
might seem to be in trouble. The tool was, after all, "primarily designed
<elip>
for the purpose of circumventing
protection afforded by a technological [*549] measure that
effectively
protects a right of the copyright
owner under this title in a work or a portion thereof." n159 However, one
can
easily imagine a court deciding
that the researcher's code did not run afoul of section 1201(b)(1). The
code
might be viewed as a special purpose
tool made for the limited purpose of effectuating fair use rights. In view
of its lack of commercial significance
and the absence of deleterious effects of the sort that the anti-device
provisions were intended to reach,
n160 a court might decide that this code should not be held to violate
this
law. n161
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n157. See supra note 114-116 and accompanying text.
n158. See 17 U.S.C.A. 1203(c)(3).
This researcher would likely be spared from criminal liability for violation
of
1201(b) because he was serving as
a pro bono publico expert witness in this case. Section 1204(a) requires
that a violation of 1201 not only
be willful, but done for commercial advantage or private financial gain
for
criminal liability to be imposed.
See id. 1204(a).
n159. Id. 1201(b)(1).
n160. See House Manager's Report, supra note 63, at 9-13.
n161. Alternatively, the court could find only a technical or de minimis violation of the statute in this instance.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Would the result be different if
the researcher asked a co-worker or a friend to develop the tool instead
of
doing it himself? Or would the result
be different if the researcher shared this tool with a co-worker who
needed to make a fair use circumvention
of a different movie? Even though he might be "providing" this
technology to another person, perhaps
he would escape liability because he was not "trafficking" in this
technology or "offer[ing it] for
sale" which are the principal activities Congress meant to curb by enacting
this
part of DMCA. n162 However, it is
fair to observe that courts would have to read some limiting language into
section 1201(b)(1) to decide that
the researcher would not be liable in all three situations.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n162. 17 U.S.C.A. 1201(b)(1).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
An undoubtedly closer question is
what courts would do about a technology distributed in the mass-market
for
purposes of enabling privileged
circumventions. Consider, for example, how the 1985 Vault v. Quaid n163
case
would fare under the DMCA anti-device
provisions. Vault sued Quaid for [*550] contributory copyright
infringement based on Quaid's development
and sale of a program called Ramkey. Quaid's customers could use
Ramkey to defeat Vault's Prolok
copy-protection software (which Vault sold to other software developers
to
protect their own software from
unauthorized copying). By spoofing Vault's copy-protect system, n164 Quaid's
customers could make unauthorized
copies of the third-party software protected by Vault's program. n165
Quaid successfully defended against
the contributory infringement claim by showing that Ramkey had a
substantial noninfringing use, namely,
to enable users to effectuate their rights under copyright law to make
backup copies. n166
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n163. 775 F.2d 638 (5th Cir. 1985).
n164. In essence, this and other
"spoofing" software generally operate by emitting a signal which will be
interpreted by the other firm's
copy-protection software (or conceivably hardware) as an indication that
the
system is operating effectively.
n165. Vault also claimed direct copyright
infringement, trade secret misappropriation, and breach of contract.
See Vault, 847 F.2d at 257-58.
n166. See id. at 262 (relying on
the Supreme Court's decision in Sony Corp. of America v. Universal City
Studios, Inc., 464 U.S. 417 (1984),
which rejected a claim that Sony had contributorily infringed Universal's
movie copyrights by selling Betamax
machines which enabled home copying of these movies off the broadcast
television because of noninfringing
uses of the Betamax machine).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Quaid would probably not run afoul
of the access-device provision of section 1201(a)(2). n167 However, less
clear is whether it could successfully
defend against a section 1201(b)(1) claim. Suppose that Quaid's
president testified that his primary
purpose in designing and producing Ramkey was to enable his customers to
do legitimate backup copying. Suppose
further that the marketing literature for Ramkey emphasized this
purpose of the program and even
warned potential customers not to use Ramkey to make infringing copies.
If
a court considered this evidence
credible, it would probably save Quaid from criminal prosecution for violating
the second anti-device norm, because
it would show a lack of wrongful intent. But would it save Quaid from
civil liability? n168
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n167. Quaid could probably argue
that Ramkey was primarily designed to enable bypassing of the Prolok
system for lawfully acquired copies
of protected programs. This would seem to make 1201(a)(2) inapplicable
to
the Vault v. Quaid-like controversies.
n168. An interesting question is
who could sue Quaid under 1201(b)(1). The Clinton Administration's Green
Paper on Intellectual Property and
the National Information Infrastructure suggested that the maker of a
protective technology, such as Vault,
would not have standing to challenge the maker of circumvention
technologies. See U.S. Gov't Working
Group On Intellectual Property, Green Paper On Intellectual Property And
The National Information Infrastructure
130 (1994). Copyright owners who used technical protection systems
to protect their works would seem
to have standing to initiate the suit. This could mean that a firm such
as
Quaid would thus be faced, not just
with one lawsuit, but potentially thousands to defend. As will be
discussed further, see infra note
194 and accompanying text, in none of these lawsuits would the plaintiff
have to demonstrate that any underlying
act of infringement actually took place. The White Paper was silent
on the issue of standing. Nor is
the issue expressly dealt with in the DMCA. Proposals by representatives
of
Macrovision Corp., which makes technical
protection systems, to change 17 U.S.C.A. 1203(a) to facilitate its
ability to obtain standing in such
a suit were not heeded by Congress. See Judiciary Hearing, supra note 17,
at
271-77 (statement of Mark S. Belinksy,
Vice President, Copy Protection Group, Macrovision Corp.).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
To answer that question, courts would
have to grapple with a seeming inconsistency in the statute. On the
one hand, the DMCA seems to outlaw
technologies if their primary purpose is to circumvent a technical
protection measure that effectively
protects a right of a copyright owner to con [*551] trol its
work (in this
case, a right to control illegal
copying). n169 On the other hand, the DMCA recognizes that fair use-like
circumventions should be lawful.
n170 Backup copying is a specially privileged activity in the copyright
statute.
n171 Because the copyright owner
doesn't have a statutory right to control backup copying, perhaps a
spoofing technology intended to
enable backup copying should be outside the statute. It is important to
understand that circumvention for
backup copying purposes generally cannot occur without access to such a
technology.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n169. See 17 U.S.C.A. 1201(a)(2), (b)(1).
n170. See id. 1201(c)(1), discussed supra notes 99, 107, 113-116, 147 and accompanying text.
n171. See 17 U.S.C. 117 (1994).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
So if most lawful users of Prolok-protected
software lack the skills to write a Ramkey-equivalent, perhaps it
should be lawful to make and distribute
a technology to effectuate the backup copy privilege. It is unclear
whether Congress intended for the
technologically savvy who could "do it themselves" to be the only ones
who could engage in privileged acts
of circumvention. Yet, as the example of the Xerox researcher illustrates,
even the technically sophisticated
will often need to develop a tool to accomplish a privileged circumvention;
this would seem to put them at risk
under a strict reading of section 1201(b)(1). n172
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n172. Even they, of course, may have
to manufacture a technology or provide a service to make backup
copies, in apparent violation of
section 1201's anti-device rules. See Benkler, supra note 24, at 416.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Potentially relevant to whether the
distribution of a tool like Ramkey is lawful is section 1201 (c)(2), which
states that nothing in section 1201
"shall enlarge or diminish vicarious or contributory liability for copyright
infringement in connection with
any technology, product, service, device, component, or part thereof."
n173 If
what this subsection purports is
true, perhaps the result in Vault v. Quaid would be the same after DMCA
as
before. One can imagine some courts
deciding to construe section 1201(b)(1) narrowly so that the honest
maker of a Ramkey-equivalent for
purposes of enabling backup copying would be able to do so. But they are
certainly not constrained to do
so.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n173. 17 U.S.C.A. 1201(c)(3). Recall
that the main claim made by Vault against Quaid was a contributory
infringement claim, and it was unsuccessful.
See supra note 163-166 and accompanying text.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Moreover, the major copyright industries
that supported a broad ban on circumvention technologies would
assert that courts should not construe
the DMCA so narrowly. They would likely consider Quaid's argu [*552]
ment that Ramkey was primarily designed
and produced to enable lawful backup copying as a ruse. Moreover,
they would likely point out that
Ramkey doesn't just enable lawful backup copying; it enables illegal copying
as
well. They would regard the danger
that Ramkey would be used for illegal purposes - regardless of Quaid's
intent - as so substantial as to
justify banning this technology. The DMCA's anti-device provisions were
broadly drafted, they would argue,
to address this very danger. n174 They would also consider it an
unnecessary burden for copyright
owners to have to prove that the primary use of a technology like Ramkey
was to engage in infringement. n175
This would be difficult to do, especially for a technology that was about
to be introduced into the market.
When the dangers of infringement are high, they would argue, the
technology ought to be deemed illegal
if its purpose is to circumvent a technical protection system copyright
owners are using to protect rights
granted to them by copyright law. n176 According to this view, Ramkey is
illegal under the DMCA. The major
copyright industry supporters of the broad anti-device provisions of the
DMCA would probably like nothing
better than to make Congress' apparent preservation of noninfringing uses
into a meaningless promise.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n174. See Judiciary Hearing, supra
note 17, at 57 (statements of Hon. Bruce A. Lehman, Commissioner of
Patents and Trademarks, Patent and
Trademark Office).
n175. See Commerce Hearing, supra
note 44, at 54-58 (prepared statement of Steven J Metalitz on behalf of
the Motion Picture Ass'n of America)
(objecting to proposals that would require copyright owners to prove that
circumvention or circumvention devices
would cause infringement).
n176. There is no "authority of law"
exception in the DMCA's anti-device provisions, as there was in the White
Paper's original proposal for an
anti-device regulation. See White Paper, supra note 15, app. 1 at 6. How,
if at
all, this might affect the scope
of the DMCA's anti-device provisions remains to be seen.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Different judges might reach different
conclusions on a Ramkey-like case, but consider how they might deal
with another plausible "spoofing"
technology. Intel has recently developed a line of semiconductor chips
with a
built-in identification system for
each processor. n177 Privacy advocates have raised concerns about the
threat that processor identification
systems pose for personal privacy on the Internet. n178 In response to
these [*553] concerns,
Intel announced its intent to ship these chips with the processor identity
function
"off." n179 Suppose, however, that
Microsoft develops Windows 2000 as a "trusted system" technology n180
to run on this line of Intel chips
and that it requires that licensees of Windows 2000 agree to keep the Intel
identification system on at all
times. n181 Having the identifier on, Microsoft might well contend, is
a critical
component to the effectiveness of
its trusted system technology. Suppose further that Windows 2000 will not
install until the Intel identifier
is on, and that the installation software, after a user clicks "I agree"
to the
conditions of the license, will
actually turn the identifier on if necessary. n182 If a privacy advocacy
group
developed and distributed software
to spoof Windows into thinking the Intel identifier was on when it was
not
in order to protect user privacy,
or if the group posted information about how users could turn the identifier
off even when using Windows 2000,
would it be violating section 1201(b)(1)? n183
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n177. See Peter H. Lewis, Whoosh!
The Next Pentium Chip Is On Its Way, N.Y. Times on the Web (Jan. 14,
1999) <http://www.nytimes.com/library/tech/99/01/circuits/articles/12pete.html>.
n178. See Jeri Clausing, Privacy
Groups Seek Recall of Intel Chip, N.Y. Times on the Web (Jan. 29, 1999)
<http://www.nytimes.com/library/tech/99/01/cyber/articles/29privacy.html>.
Although the threat the Intel
processor ID poses for privacy has
gotten the most attention in the press, the potential for the Intel
processor ID to be used to prevent
"piracy" of software has also been recognized. See Peter Wayner, Debate
on Intel Chip Misses Piracy Issue,
N.Y. Times on the Web (Jan. 30, 1999)
<http://www.nytimes.com/library/tech/99/01/cyber/articles/30chip.html>.
n179. See Jeri Clausing, Intel Alters
Plan Said to Undermine PC Users' Privacy, N.Y. Times, Jan. 26, 1999, at
A1.
n180. "Trusted system" is a term
used to describe a computer and software system constructed to make it
impossible (or at least very difficult)
to make unauthorized copies or uses of legally protected works. See Mark
Stefik, Shifting the Possible: How
Trusted Systems and Digital Property Rights Challenge Us To Rethink Digital
Publishing, 12 Berkeley Tech. L.J.
137 (1997).
n181. This is no mere conjecture.
Microsoft is reportedly intending to deploy trusted system software with
the
next version of Windows. See Jason
Chicola et al., Digital Rights Architectures for Intellectual Property
Protection 99 (1998), paper prepared
for Ethics and Law on the Electronic Frontier, Massachusetts Institute
of
Technology, available at
<http://swissnet.ai.mit.edu/6805/student-papers/fall98-papers/trusted-systems/trustsys.doc>
(MS Word
document). This is especially worrisome
since Microsoft has a monopoly position in the market for operating
systems software, making it largely
immune from competitive pressures that might limit its ability to impose
trusted system technology on the
market.
n182. Another important policy initiative
affecting the enforceability of mass-market licenses of this sort is
proposed Article 2B of the Uniform
Commercial Code. See generally Symposium, Intellectual Property and
Contract Law in the Information
Age: The Impact of Article 2B of the Uniform Commercial Code on the Future
of Transactions in Information and
Electronic Commerce, 13 Berkeley Tech. L.J. 809 (1998); Symposium,
Intellectual Property and Contract
Law for the Information Age: The Impact of Article 2B of the Uniform
Commercial Code on the Future of
Information and Commerce, 87 Calif. L. Rev. 1 (1999).
n183. If the Pentium III chip ID
is designed to allow for copyright protection, as Intel claims it is, it
might be a
technology which effectively controls
access to copyrighted works under 1201. If so, it would seem that a
hardware device which disables the
Processor Serial Number could be subject to the anti-device provisions.
Take, for example, IBM's new hardware
disablement feature: "IBM plans to go the extra step and disable the
processor ID feature at the BIOS
(or hardware) level in our Pentium III client systems," Letter from Chistopher
G. Caine on behalf of IBM Corp.
to Jerry Berman, Executive Director of the Center for Democracy and
Technology (Jan. 24, 1999), available
at <http://www.cdt.org/privacy/ibmletter.shtml>.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
[*554] Under a very strict
interpretation of section 1201(b)(1), either act might be viewed as illegal.
n184 It
is, however, difficult to believe
that most judges would find providing either software or information to
enable
circumvention of this component
of a technical protection system to fall within the DMCA anti-device rules.
The DMCA, judges might point out,
authorizes circumvention in order to protect personal privacy. n185 While
this provision doesn't specifically
authorize the development or use of circumvention technologies to
accomplish this legitimate act,
judges might conclude that Congress must have intended for people to be
able
to develop or use technology to
accomplish the privileged privacy act, or that the Intel identifier was
not a
component of an effective technical
measure. To avert an injustice, judges would likely find an ambiguity in
the statute or read in appropriate
limiting language. This is clearly not the kind of "black box" circumvention
device that Congress had in mind
when adopting DMCA. n186 To hold otherwise would, in effect, allow
Microsoft to employ the anti-circumvention
provisions of DMCA to impose trusted system technology on the
public.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n184. Posting information on the website might be seen as providing a service to the circumventors.
n185. See 17 U.S.C.A. 1201(i) (West
Supp. 1999). This provision is extremely complicated and would seem to
be very narrow. It is not clear
it would apply to the Microsoft example.
n186. See supra note 93 and accompanying
text and infra note 231.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
It is, of course, an irony that so
much of Congressional debate on section 1201 focused on refining the
act-of-circumvention provision given
that the anti-device provisions are, as a practical matter, by far the
more important rules in this section.
n187 Those who have followed the Clinton Administration's digital
copyright policy over the last five
years should realize that the anti-device provisions were what
Administration officials and major
copyright industry allies really cared about. The legislation proposed
in the
Administration's 1995 White Paper
did not include any provision about circumvention of technical protection
measures as such. n188 It sought
only to outlaw technologies whose "primary purpose or effect" was
[*555]
to enable the circumvention of technical
protection measures. n189 Was this lack of attention to
circumvention an oversight? Or did
the Administration believe that it would be difficult to detect individual
acts
of circumvention, and as long as
such acts were done on an isolated, individual basis (due to the unavailability
of circumvention devices), the danger
to copyright owners would be small? It is difficult to discern why
circumvention as such escaped attention
until mid-1997 when the WIPO treaty implementation legislation was
first introduced in Congress. n190
Far easier to discern has been the Administration's goal of stopping the
manufacture and distribution of
technologies with circumvention-enabling uses, either by commercial firms
or
by technically savvy Robin Hoods.
n191
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n187. See Benkler, supra note 24, at 416.
n188. See White Paper, supra note 15, at 230-36.
n189. See id., app. 1 at 6.
n190. See supra note 86.
n191. Professor Benkler likens this
strategy to banning VCRs in order to stop home taping. See Benkler, supra
note 24, at 416. Speaking of VCRs,
little noticed in DMCA were its provisions requiring consumer electronics
companies to build specific anti-copying
technologies into future VCRs. See 17 U.S.C.A. 1201(k) (West Supp.
1999).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Eventually someone in the Administration
must have realized that it was a bit strange to be proposing to make
illegal the manufacture and distribution
of technologies whose ordinary uses were not themselves illegal. To
justify a broad ban on circumvention
technologies, a broad ban on the act of circumvention seemed to be
needed. This explains why the Administration
and its allies were so insistent that section 1201(a)(1) be
structured to broadly ban acts of
circumvention. It also explains why the Administration sought to limit
the
proliferation of exceptions to the
anti-circumvention ban, and why such exceptions as were added to the
statute were very narrow. The broader
the acknowledged range of legitimate circumventions, the narrower
should be an appropriately crafted
regulation of circumvention technologies. The Administration may have
hoped that in all the hoopla about
crafting exceptions to section 1201(a), Congress would not notice that
its
seeming recognition of the legitimacy
of circumventions for noninfringing purposes in section 1201(c)(1) might
effectively be nullified by section
1201(b)(1), which arguably broadly bans technologies necessary to
accomplish such circumventions.
When testifying before Congress,
proponents of the Administration's [*556] anti-device rules
repeatedly
emphasized that the legislation
was needed to stop deliberate and systematic piracy by "black box" providers.
n192 Yet, the anti-device provisions
adopted by Congress are far broader than this, providing a basis to
challenge an unacceptably wide range
of technologies that have circumvention-enabling uses. This creates a
potential for "strike suits" by
nervous or opportunistic copyright owners who might challenge (or threaten
to
challenge) the deployment of a new
information technology tool whose capabilities may include circumvention
of some technical protection system.
No doubt some expert can be found to say that deployment of a
particular technology in the market
would meet one of the three conditions in the anti-device provisions,
giving plausibility to the suit.
Weak as such testimony might be, it may be enough to extract a settlement
sum
from the information technology
firm. n193
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n192. See Judiciary Hearing, supra
note 17, at 212-16 (statement of Gail Markels, General Counsel and Senior
Vice President, Interactive Digital
Software Ass'n) (relying on example of circumvention device with no
legitimate purpose that had been
used to pirate games); id. at 273-77 (prepared statement of Mark Belinsky
on behalf of Macrovision Corp.)
(emphasizing the need to outlaw pirate devices). See also NII Copyright
Protection Act of 1995 (Part II):
Hearings on H.R. 2441 Before the Subcomm. on Courts and Intellectual
Property of the House Comm. on the
Judiciary, 104th Cong. 23 (1996) (prepared statement of Jack Valenti,
President and CEO, Motion Picture
Ass'n of America) ("But all security measures, no matter how sophisticated,
can be circumvented by clever hackers.
Therefore, the law must provide clear and effective sanctions against
those who would violate the security
of the NII. This requires more than mere civil remedies. Criminal sanctions
are essential. Too many NII bandits,
some operating totally in the underground economy, will scoff at the
threat of civil damages, which many
regard as simply a cost of doing business. There must be criminal
penalties attached to deliberate,
systematic acts of circumvention if such acts are to be seriously lessened.").
n193. Some commentators even perceive
the anti-device rules of 1201 as threatening the distribution of many
widely used editing and related
software tools. See Peter Wayner, The Copyright Boomerang, Salon Magazine
(Nov. 20, 1998) <http://www.salonmagazine.com/21st/feature/1998/11/20feature.html>
(considering whether
"cutting and pasting" will be rendered
unlawful).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The potential for strike suits becomes
stronger if one realizes that it is not necessary (or arguably even
relevant) to litigation under the
anti-device provisions of DMCA whether any act of underlying infringement
(e.g., illegal copying of a protected
work) has ever taken place. The mere potentiality for infringement will
suffice to confer rich rewards on
a successful plaintiff. Consider, for example, a recent lawsuit brought
by the
maker of a proprietary game console
against the maker of emulation software that permits games initially
developed for the proprietary console
to be played on iMac computers. n194 Relying on the DMCA anti-device
provision, the plaintiff is seeking
up to $ 25,000 per unit sold in damages because the emulation software
allegedly bypasses an anti-copying
feature in [*557] the games. n195 The plaintiff did not allege
and need
not prove any actual illicit copying
by users of the defendant's emulation software.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n194. See Complaint, Sony Computer
Entertainment, Inc. v. Connectix Corp., Civ., No. 99-0390 (N.D. Cal.,
filed Jan. 27, 1999) [hereinafter
Sony Complaint]. For a discussion of this lawsuit, see Band & Isshiki,
supra
note 65.
n195. See Sony Complaint, supra note
194, at 7-8. This lawsuit is particularly disturbing because the software
at issue was named "Best of Show"
at Macworld Expo shortly before the lawsuit was filed. See Best of Show,
Macworld Online (visited Apr. 21,
1999) <http://macworld.zdnet.com/expo/report/bestofshow.html>.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The anti-device provisions of section
1201 are not predictable, minimalist, consistent, or simple, as the
Framework principles suggest that
they should be. Due to inconsistencies in the statute, it is unclear whether
section 1201's anti-device provisions
would be interpreted to allow the development and distribution of
technologies to enable legitimate
uses. Boiled down to its essence, this presents the question of whether
Congress should be understood to
have made an empty promise of fair use and other privileged circumvention.
Unless the anti-device provisions
of the DMCA are modified, either by narrow judicial interpretation or by
legislative amendments, n196 they
are likely to have harmful effects on competition and innovation in the
high
technology sector. This is not good
news for the digital economy.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n196. A predictable, minimalist,
consistent, and simple anti-device norm might outlaw the manufacture and
distribution of technologies intended
to facilitate copyright infringement or of technologies with limited
legitimate uses.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
VII. POLICYMAKERS SHOULD PERIODICALLY
REVIEW BOTH THE ACT AND DEVICE PROVISIONS
The Clinton Administration did not
recommend or support inclusion of any provision in the WIPO treaty
implementation legislation to assess
the impact of the DMCA's anti-circumvention norms. n197 This might seem
surprising in view of the breadth
of these norms, their unprecedented character, and their potential impact
on
both information technology markets
and on public access to information. Even if the Administration had
initially been unaware of these
potential negative impacts, it could not have failed to become aware of
them
during the legislative process.
n198 The Administration was surely aware that the case for the
act-of-circumvention and anti-device
norms was long on rhetoric and short on actual evidence of [*558]
harm to copyright owners. n199 Yet,
the Administration did nothing to support post-legislative review of these
norms.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n197. See H.R. 2281, 105th Cong.
(1997) (as originally introduced into Congress on July 29, 1997); Judiciary
Hearing, supra note 17, at 34-42
(statement of Bruce Lehman) (endorsing legislation but not asking for a
study provision).
n198. See Judiciary Hearing, supra
note 17, at 148-56 (statement of Robert L. Oakley); id. at 64-68
(statement of M.R.C. Greenwood).
n199. One of the few concrete examples
of a device claimed to have contributed to international piracy was
that offered in Judiciary Hearing,
supra note 17, at 213-216 (statement of Gail Markels) (discussing "Game
Doctor" said to have been used to
pirate game software in Hong Kong and Taiwan).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
This is in striking contrast to the
periodic review process endorsed by the Administration as to another
legislative initiative affecting
digital economy markets, namely, the proposal to create a new form of legal
protection for the contents of databases.
n200 Writing on behalf of the Administration concerning its
reservations about a bill under
consideration in the second session of the 105th Congress, Andrew Pincus,
General Counsel to the Commerce
Department, stated:
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n200. See Letter from Andrew Pincus,
General Counsel of the U.S. Dep't of Commerce, to Sen. Patrick Leahy 3
(Aug. 4, 1998) (on file with author)
[hereinafter Pincus Letter]. After the House passed the Collections of
Information Antipiracy Act, H.R.
2652, 105th Cong. (1998), Mr. Pincus wrote to Senator Leahy to express
the
Administration's reservations about
the wisdom of this bill and about its constitutionality. See Pincus Letter,
supra, at 1.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The Administration believes that,
given our limited understanding of the future digital environment and the
evolving markets for information,
it would be desirable for the [database] bill to include a provision for
an
interagency review of the law's
impact at periodic intervals following implementation of the law. This
would be
consistent with the laws and proposed
laws in other emerging technologies where Congress has mandated
examination of a new law's economic
impact. n201
At least one of the database bills
seemingly under consideration in the 106th Congress contains a study
provision to assess the impact of
the new law. n202 This conforms to the Administration's proposal and to
Framework principles. Much the same
comment might have been made about the anti-circumvention norms of
the DMCA.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n201. Pincus Letter, supra note 200,
at 3. The letter proposed that "such a study might be conducted under
the auspices of the Secretary of
Commerce in consultation with the Office of Science and Technology Policy
and the Register of Copyrights."
Id.
n202. See 145 Cong. Rec. S322 (daily
ed. Jan. 19, 1999) (provision entitled "Report to Congress," from one of
three potential database bills referred
to by Sen. Hatch).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Even though the Administration did
not support inclusion of study provisions in the DMCA, section 1201
actually does contain a study provision
that will provide an opportunity to review some impacts of the anti-
[*559] circumvention
regulations. n203 In response to the strong concerns expressed by librarians
and
educators about the potential negative
impacts that broad anti-circumvention provisions might have on fair
uses of copyrighted works and on
access to information and to public domain works, n204 the House
Commerce Committee decided that
there should be a two-year moratorium on enforcement of the
act-of-circumvention provision.
n205 It also proposed a study to determine whether noninfringing uses were
being adversely affected by technical
protection systems. If so, the Commerce Committee's version of the bill
would have waived application of
the anti-circumvention norm as to the affected works or users. n206
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n203. See 17 U.S.C.A. 1201(a)(1)(B)-(D)
(West Supp. 1999). Section 1201 also contains a provision for
studying the impact of the encryption
research provision. Id. 1201(f)(5).
n204. See supra note 117 and accompanying text.
n205. See Commerce Panel Clears Digital
Copyright Bill With Further Concessions On Fair Use, 56 BNA Pat.,
Trademark & Copyright J. 326,
326 (1998).
n206. See id. As Professor Benkler
has pointed out, this would not stop copyright owners from employing
technical protection systems to
inhibit noninfringing uses; it would only allow circumvention to obtain
access.
See Benkler, supra note 24, at 428.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The Commerce Committee's insistence
on the moratorium and an impact study proved surprisingly persuasive.
Section 1201(a)(1)(A) provides that
the general anti-circumvention ban will not take effect until two years
after enactment of the legislation.
n207 Subsections (C) and (D) call upon the Librarian of Congress to
conduct periodic studies to determine
whether certain classes of users or works should be exempt from the
ban because technical protection
systems are impeding the ability to make noninfringing uses of copyrighted
works. n208 Subsection (B) goes
on to provide the statutory basis for granting such an exemption to the
classes of works or users determined
by the Librarian to be adversely affected by the anti-circumvention
norm. n209 The DMCA calls for the
Librarian's first study to be completed before the anti-circumvention
moratorium ends. n210
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n207. 17 U.S.C.A. 1201(a)(1)(A) (West Supp. 1999).
n208. The first study is to be completed
two years after the date of DMCA's enactment. See 17 U.S.C.A.
1201(a)(1)(A) (West Supp. 1999).
Follow-on studies are to be conducted every three years thereafter. See
id. 1201(a)(1)(C). Given how weak
was the showing that gave rise to the DMCA's anti-device provisions, it
would seem that the showing of interference
with lawful uses ought not to be too rigorous. However, the
House Manager's report on the legislation
would seem to anticipate a relatively high standard of proof. See
House Manager's Report, supra note
63, at 6-7.
n209. See 17 U.S.C.A. 1201(a)(1)(B)
(West Supp. 1999). It appears that any moratorium resulting from such a
determination will last for three
years. Id. 1201(a)(1)(D). The rulemaking procedure set forth in
1201(a)(1)(B)-(D) may, however,
be unconstitutional because the Librarian of Congress is not an executive
branch official. See Band &
Isshiki, supra note 65, at 7.
n210. See 17 U.S.C.A. 1201(a)(1)(A)
(West Supp. 1999).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
[*560] The DMCA directs
the Librarian of Congress to consider four factors in carrying out this
study:
(i) the availability for use of
copyrighted works, (ii) the availability for use of works for nonprofit
archival,
preservation, and educational purposes,
(iii) the impact [of] the prohibition <elip> on criticism, comment,
news
reporting, teaching, scholarship,
or research, [and] (iv) the effect of circumvention of technical measures
on
the market for or value of copyrighted
works." n211
The Librarian has authority to consider
"such other factors as the Librarian considers appropriate." n212 The
DMCA is quite clear, however, that
the Librarian's determinations cannot be asserted as a defense to an
anti-device claim. n213 Although
users would be entitled, after the Librarian's determination, to "hack"
technical protection systems for
any classes of works whose noninfringing uses had been inhibited, the
no-defense-to-an-anti-device-claim
subsection would appear to make such user self-help available only if one
could accomplish the act without
a device, once again raising the specter of Congress having created a
meaningless privilege. As Professor
Benkler has pointed out, the Librarian has no power to tell copyright owners
to stop using technical protection
systems that are impeding noninfringing uses. n214 Thus, it is quite possible
that noninfringing uses will continue
to be substantially impeded, notwithstanding the Librarian's determination
and rulemaking concomitant to it.
Surely, this should be the subject of further study.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n211. Id. 1201(a)(1)(C). Another
subsection of the DMCA requires the Register of Copyrights and the
Assistant Secretary for Communications
and Information of the Commerce Department to study the impact of
the encryption research exception.
See id. 1201(g)(5).
n212. Id. 1201(a)(1)(C).
n213. See id. 1201(a)(1)(E).
n214. See Benkler, supra note 24,
at 428.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
While the study provisions in DMCA
are surely better than nothing, n215 they fall far short of the periodic
review and reporting process appropriate
to the unprecedented nature of the anti-circumvention regulations.
n216 To [*561] limit
an assessment of the circumvention ban to a narrow range of possible effects
would
ignore the wider swath of harm the
provision may do. n217 Besides, the device ban is the true heart of the
anti-circumvention provisions of
the DMCA. It is integrally interrelated with the circumvention activity
ban.
n218 To assess the act-of-circumvention
ban without considering the device ban is to ignore the most
significant technology-regulating
provision in the DMCA. Unless construed narrowly, the anti-device provisions
may do as much harm to competition
and innovation in the information technology industry as the
circumvention ban may do to noninfringing
academic uses. One would have thought that Congress and the
Administration would be concerned
about these impacts given that these are the very industries whose
tremendous growth the Commerce Department
has been trumpeting to the world. n219 The Librarian of
Congress should, therefore, decide
that his studies can consider the impact of anti-device rules on the ability
of certain classes of users or works
to make noninfringing uses of protected works. n220 The Librarian should
also be entitled to make other observations
about possible unintended side-effects of the anti-circumvention
regulations that may be detrimental
to the public interest. n221
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n215. The principal value of the
study provisions may well lie in deterring some publishers from egregious
uses
of technical protection systems
that would interfere with fair uses..
n216. Among the factors likely to
limit the effectiveness of the study system devised in the DMCA is the
fact
that the Librarian of Congress is
apparently supposed to initiate studies of the impact of anti-circumvention
rules "upon the recommendation of
the Register of Copyrights." Id. 1201(a)(1)(C). The Register, in turn,
is
supposed to consult with an official
from the Department of Commerce before recommending a study. See id.
It has been a long time since the
Register of Copyrights or the Commerce Department have taken more than
tepid steps to represent the interests
of users of copyrighted works, particularly those from the educational
and library sectors. Moreover, because
none of the Librarian's findings last for more than a three year period,
copyright industry lobbyists will
have multiple opportunities to carve back or eliminate any user-friendly
exceptions that the Librarian might
have the temerity to recommend.
n217. See supra note 136-140 and
accompanying text for examples of legitimate circumvention activities
unlikely to be captured by the scope
of the intended studies by the Librarian.
n218. See supra notes 24 and accompanying text. See also Benkler, supra note 24, at 416.
n219. See supra notes 28-36 and accompanying text.
n220. See 17 U.S.C.A. 1201 (a)(1)(C)
(West Supp. 1999) (setting forth factors); see also Benkler, supra note
24, at 420 ("Enforcement of the
anti-device provision is unconstitutional unless and until the Librarian
makes a
determination that no non-infringing
uses will be adversely affected by utilization of technological protection
measures.").
n221. See supra notes 136-140 and
accompanying text for examples of other potential deleterious effects.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
It is especially important to have
periodic reviews of the whole of the anti-circumvention provisions because
they sweep so broadly that they
may come to be used widely to deal with circumventions far beyond the
copyright industry concerns that
Congress contemplated. The low level of [*562] proof needed
to maintain
an action for anti-circumvention
violations, n222 along with the generous remedies the Act provides, n223
may
prove to be a magnet for firms seeking
to challenge acts of circumvention or devices that might, for example,
concern trade secrecy or computer
hacking matters. n224 As long as there is a plausible claim that some
material being protected by the
technical protection system has a modicum of creative content that would
entitle it to copyright protection,
n225 any act of circumvention or tool to aid the circumvention might be
challenged under section 1201. Such
uses of the statute could make copyright law into a general purpose
misappropriation law regulating
computer security matters. Moreover, as Part VI has shown, section 1201
is so
ambiguous and broad that it may
wreak considerable havoc in the information technology field, harming
competition and innovation in this
important sector. For these reasons, a broad regular review of the
anti-circumvention rules should
be undertaken.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n222. See supra notes 174-176, 193-195 and accompanying text.
n223. See 17 U.S.C.A. 1203(b) (West Supp. 1999) (civil remedy provision).
n224. This potential was recognized
in the Congressional debate over the anti-circumvention rules. See 144
Cong. Rec., H7096 (daily ed. Aug.
4, 1998) (remarks of Rep. Goodblatte). Although Rep. Goodblatte indicated
that computer hacking statutes should
be used to deal with computer hacking problems, there is no reason
why someone injured by a computer
hacker could not seek relief under 1201.
n225. See 17 U.S.C. 102 (1994) (copyright
protection subsists in all original works of authorship that have
been fixed in a tangible medium
of expression).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
VIII. CONCLUSION
The WIPO Copyright Treaty provides
a "predictable, minimalist, consistent and simple legal environment" that
should promote global commerce in
electronic information products and services, in line with objectives and
principles announced in the Clinton
Administration's Framework for Global Electronic Commerce. n226 As the
principal leader in the treaty-making
effort that led to conclusion of this treaty, the Clinton Administration
deserves credit for promoting this
policy initiative that promises to substantially benefit the U.S. digital
economy industries.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n226. See Framework, supra note 1,
at 3.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
In most respects, the legislation
implementing the WIPO Copyright Treaty in U.S. law also conforms to
Framework principles. n227 The anti-circumvention
provisions of the DMCA, however, do not. They are
unpredictable, overbroad, inconsistent,
and complex. The many flaws in this [*563] legislation are
likely to be
harmful to innovation and competition
in the digital economy sector, and harmful to the public's broader
interests in being able to make
fair and other noninfringing uses of copyrighted works. If these regulations
are
not as maximalist as those initially
proposed to Congress, this is mainly due to Congress' heeding of concerns
expressed by some of the leading
firms of digital economy interests, rather than to the Administration's
leadership.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n227. See supra notes 70-72 and accompanying
text.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
In the U.S. Congress, as well as
in Geneva during the diplomatic conference leading up to adoption of the
WIPO Copyright Treaty, proposed
anti-circumvention regulations have been contentious. Among the concerns
expressed in both venues were these:
the potential effect of such rules on public access to information and
on the ability to make noninfringing
uses of copyrighted works, and their potential effect on competition and
innovation in the market for hardware
and software products whose uses might include the bypassing of some
technical protection systems. n228
The diplomatic conference had the good sense to adopt only a general
norm on circumvention, leaving nations
free to implement this norm in their own way. n229 Thus, the flaws in
the DMCA's anti-circumvention provisions
do not derive from the treaty, but rather from the bad judgment of
the Administration and the major
copyright industry groups that urged adoption of overbroad rules in the
DMCA.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n228. See supra notes 51, 87-89and accompanying text.
n229. See supra note 51 and accompanying
text.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
This article has demonstrated that
the DMCA's ban on the act of circumventing access controls should have
included a general purpose "or other
legitimate reasons" provision because the seven exceptions built into the
statute, while they respond to the
main concerns identified in the legislative debate, do not exhaust the
legitimate reasons to bypass access
controls. n230 The article has provided examples of other legitimate
circumvention activities and has
suggested that if Congress does not narrow the reach of this provision,
courts likely will do so, even if
it involves some stretching to do so.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n230. See supra notes 136-146 and
accompanying text.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The article has also demonstrated
that the anti-device provisions of the DMCA are substantially overbroad
and
need to be revised. The principal
intent of Congress was to ban the development and deployment of "black
boxes" that promote and enable piracy
of copyrighted works. n231 However, the ban is far broader than this
and threatens to bring about a flood
of liti [*564] gation challenging a broad range of technologies,
even
where there is no proof that the
technologies have or realistically would be widely used to enable piracy.
n232
The legislation is also unclear
about a crucial question: whether it is lawful for people to develop or
distribute
technologies that will enable implementation
of the exceptions and limitations on the circumvention ban built
into the statute. n233 Did Congress
intend to allow people to exercise these privileges, or did it intend to
render these privileges meaningless
because the technologies to enable the excepted activities have been
made illegal? No clear answer to
this question emerges from a careful study of the anti-circumvention
provisions. While legislative clarification
of this issue would be desirable, most likely the courts will have no
choice but to address this question.
Because of ambiguities in the statute, it is unclear how courts will resolve
disputes in which such questions
will be posed.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n231. See supra notes 93 and accompanying text.
n232. See supra notes 194-195 and accompanying text.
n233. See supra notes 150-151 and
accompanying text.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Finally, this article urges that
the anti-circumvention provisions be subject to periodic interagency review
that
would consider their impact as a
whole. n234 The DMCA includes a provision authorizing the Librarian of
Congress to study the impact of
the act-of-circumvention provision and make a determination about whether
this provision interferes with the
ability of certain classes of users to make noninfringing uses of certain
classes of copyrighted works. n235
This provision is too narrow in at least two respects. One is that it does
not perceive the potential impact
of the device bans on the ability of users to make noninfringing uses of
copyrighted works. The Librarian
of Congress can and should consider this as well. n236 A second is that
the
DMCA's study provision does not
recognize other kinds of potential harm that the anti-circumvention provisions
may do to competition and innovation
in the information technology sector. n237 Because of the
unprecedented character of the anti-circumvention
provisions and their overbreadth, it would be highly
desirable for a broader study to
be undertaken of the impact of these regulations with an eye to
recommending changes to remedy unintended
harmful consequences they may be having.
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n234. See supra notes 215-225 and accompanying text.
n235. See 17 U.S.C.A. 1201(a)(1)(B).
n236. See supra notes 220 and accompanying text.
n237. See supra notes 217 and accompanying
text.
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Before concluding this article, it
is perhaps worth noting that as yet relatively few copyrighted works are
being
distributed with technical pro
[*565] tection systems built in. n238 Much research and development
work is,
however, underway to develop such
systems. n239 Many copyright owners seem to hope or expect that such
systems will be widely used for
a broad range of work in the not-too-distant future and that these systems
will stop piracy and other unauthorized
and arguably unlawful uses of copyrighted works. n240
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n238. See Computer Science and telecomms.
Bd., National Academy of Sciences, Intellectual Property Rights
and the Emerging Digital Economy
(forthcoming 1999).
n239. See Eric Schlachter, The Intellectual
Property Renaissance in Cyberspace: Why Copyright Law Could Be
Unimportant on the Internet, 12
Berkeley Tech. L.J. 15, 38-45 (discussing various kinds of systems).
n240. See Charles Clark, The Publisher
in the Digital World, in Intellectual Property Rights And New
Technologies: Proceedings of the
KnowRight'95 Conference 85 (Klaus Braunstein & Peter Paul Sint eds.,
1995).
See also White Paper, supra note
15, at 177-90 (foreseeing wide deployment).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
One factor that will significantly
affect how widely technical protection systems will be deployed and how
tightly they will restrict uses
of copyrighted works is how consumers will react to them. n241 Copyright
owners
may feel far more secure if their
works are technically protected so well that no unauthorized uses can ever
be made of them. However, economists
Carl Shapiro and Hal Varian argue that copyright owners must consider
this:
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n241. Carl Shapiro and Hal Varian
assert that "trusted systems, cryptographic envelopes, and other copy
protection schemes have their place
but are unlikely to pay a significant role in mass-market information goods
because of standardization problems
and competitive pressures." Carl Shapiro & Hal Varian, Information
Rules
102 (1998).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
The more liberal you make the terms
under which customers can have access to your product, the more
valuable it is to them. A product
that can be shared with friends, loaned out and rented, repeatedly accessed,
or sold in a resale market is obviously
more valuable to a potential user than one that can be accessed only
once, under controlled conditions,
by only a single party. n242
Moreover, people are very used to
being able to make a wide range of uses of copyrighted works without
seeking the copyright owner's permission.
It is unclear how well they will react to a radical shift in the market
for information products. Professor
Benkler observes that "we have no idea how a world in which information
goods are perfectly excludable -
as technical protection measures promise to make them - will look. Because
[*566] of the non-rival
nature of information, prevailing economic theory would suggest that we
are as likely
to lose as gain productivity from
this technological change." n243 In addition, if consumers won't buy tightly
restricted copies, copyright owners
may end up worse off than before. n244
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n242. Id. at 98.
n243. Benkler, supra note 24 , at 424.
n244. See Branko Geravac et al.,
Electronic Commerce and Intellectual Property - Protect Revenues, Not Bits,
2 IMA Intell. Prop. Proc. 111 (1996).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
Competition among information providers
may also affect the successful deployment of technical protection
systems. If one information provider
tightly locks up his content, a competing provider may see a business
opportunity in supplying a less
tightly restricted copy to customers who might otherwise buy from the first
provider. n245 A competitive alternative
to tight technical controls may well be to adopt one of the several
strategies that Shapiro and Varian
discuss to show how content providers can take advantage of the
opportunities presented by digital
technologies, rather than being overwhelmed by the risks. n246 There are,
they say, many other good business
models out there waiting to be invented by creative content providers.
n247
- - - - - - - - - - - - - - - -
- -Footnotes- - - - - - - - - - - - - - - - - -
n245. This, in essence, is what happened
when software developers, such as Lotus Development Corp. started
distributing copy-protected versions
of their programs. Firms with similar products who were willing to sell
their
products without copy-protection
systems attracted enough customers that the leading firms eventually
abandoned their technical protection
schemes. This is, of course, more likely to occur where markets are
competitive and where participants
in the market are not acting jointly in deciding on technologies so that
consumers will not have a competitive
choice.
n246. See Shapiro & Varian, supra note 241, ch. 4.
n247. See id. at 84. Some of these
business models may themselves be subject to intellectual property
protection. See, e.g., Robert P.
Merges, As Many as Six Impossible Patents Before Breakfast: Property Rights
for Business Concepts, 14 Berkeley
Tech. L.J. 577 (1999).
- - - - - - - - - - - - - - - -
-End Footnotes- - - - - - - - - - - - - - - - -
If content providers come to believe
that a good business model is the best way to protect intellectual
property from market-destructive
appropriations, perhaps the current debate over the DMCA's
anti-circumvention regulations will
seem in time like a tempest in a teapot. However, in the meantime, the
impact of this legislation should
be closely watched because of its potential for substantial unintended
detrimental consequences.