Abstract
This paper outlines some basic characteristics of digital rights management (DRM) systems, as well as the ways that DRM systems can threaten user privacy. The author asserts that consent-based privacy laws are alone insufficient to address privacy threats posed by DRM. The author suggests that privacy norms can be infused in DRM design and implementation and that the interests of end-users, DRM engineers and DRM users support striving toward that goal.
Chapter PDF
References
R.H. Tawney, The Acquisitive Society (G. Bell and Sons, London, 1921), p. 1.
J. Cohen, DRM and Privacy, 18 Berkeley Tech. L.J. 575 (2003).
J. Cohen, A Right to Read Anonymously: A Closer Look at “Copyright Management” in Cyberspace, 28 Conn. L. Rev. 981 (1996).
L.A. Bygrave, in: Digital Rights Management-Technological, Economic, Legal and Political Aspects, edited by E. Becker et al. (Springer, London, 2003).
I. Kerr, A. Maurushat, and C. Tacit, Technical Protection Measures: Part I-Trends in Technical Protection Measures and Circumvention Technologies (2003); http://www.pch.gc.ca/progs/ac-ca/progs/pda-cpb/pubs/protection/tdm_e.cfm.
European Commission, Digital Rights: Background, Systems Assessment, A Commission Staff Working Paper, submitted for discussion at a workshop in Brussels on February 28, 2002, on Digital Rights Management (February 2, 2002); http://europa.eu.int/information_society/newsroom/documents/drm_workingdoc.pdf.
European Committee for Standardization (CEN) and Information Society Standardization System, Digital Rights Management: Final Report (September 30, 2003); http://europa.eu.int/comm/enterprise/ict/policy/doc/drm.pdf, pp. 27–69.
M.I. Yagüe, IASTED International Conference on Communication, Network, and Information Security (2003); http://www.iasted.com/conferences/2003/NewYork/cnisspecsess1.htm.
L. Lessig, Code and Other Laws of Cyberspace (Basic Books, New York, 1999).
J.P. Barlow, Life, Liberty and the Pursuit of Copyright? (September 17, 1998); http://www.theatlantic.com/unbound/forum/copyright/barlow2.htm.
B. Rosenblatt, B. Trippe, and S. Mooney, Digital Rights Management: Business and Technology (Hungry Minds/John Wiley, New York, 2001).
C. Stross, The Panopticon Singularity; http://www.antipope.org/charlie/rant/panopticonessay.html.
D. L. Burk and J. Cohen, Fair Use Infrastructure for Rights Management Systems, 15 Harv. J. Law & Tech. 41 (2001).
Electronic Privacy Information Center (EPIC), Digital Rights Management and Privacy; http://www.epic.org/privacy/drm/default.html.
Microsoft Corporation, What is Windows Media DRM; http://www.microsoft.com/windows/windowsmedia/WM7/DRM/what.aspx.
J. Rosen, The Unwanted Gaze: The Destruction of Privacy in America (Random House, New York, 2000).
D.K. Mulligan, J. Han and A. J. Burstein, in: Proceedings of the 2003 ACM workshop on Digital rights management (ACM Press, New York, 2003), pp. 82–83.
A. Odlyzko, in: Proceedings of the 5th international conference on Electronic commerce (ACM Press, New York, 2003), pp. 355–366.
Organisation for Economic Co-operation and Development, Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (OECD Publications, Paris, 2002), article 7 [OECD Guidelines].
V. Gautrais, The Color of E-consent, presented to the Comparative IP & Cyberlaw Symposium at the University of Ottawa, October 2003, forthcoming in 1 UOLTJ (2004).
B.L. Smith, The Third Industrial Revolution: Policymaking for the Internet, 3 Colum. Sci. & Tech. L. Rev. 1 (2001).
R. Dhamija and F. Wallenberg, in: Proceedings of the First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Internet, edited by O. Pitkänen (HIIT Publications, Helsinki, 2003), pp.13–23.
L. Korba and S. Kenny, in: Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, edited by J. Feigenbaum (Springer, London, 2003).
Recording Industry Association of America, Issues: New Media; http://www.riaa.com/issues/audio/newmedia.asp.
J. Feigenbaum, et al., in: Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, edited by T. Sander (Springer, London, 2001).
Information and Privacy Commissioner/Ontario, Privacy and Digital Rights Management (DRM): An Oxymoron? (October 2002); http://www.ipc.on.ca/docs/drm.pdf.
M. Pastore, Consumers Fear for Their Online Privacy (November 1, 1999); http://cyberatlas.internet.com/markets/retailing/article/0,,6061_228341,00.html.
J. Teh, Privacy Wars in Cyberspace: An Examination of the Legal and Business Tensions in Information Privacy, 4 Yale J. of Law & Tech. (2001–2002), p. 94.
Office of the United States Trade Representative, Free Trade ‘Down Under’: Summary of the U.S.-Australia Free Trade Agreement (February 8, 2004); http://www.ustr.gov/releases/2004/02/2004-02-08-factsheet-australia.pdf.
ACM/IEEE-CS, Software Engineering Code of Ethics and Professional Practice, Version 5.2 as recommended by the ACM/IEEE-CS Joint Task Force on Software Engineering Ethics and Professional Practices and jointly approved by the ACM and the IEEE-CS as the standard for teaching and practicing software engineering (1999); http://vwvw.acm.org/serving/se/code.htm#full.
J.P. Liu, The DMCA and the Regulation of Scientific Research, 18 Berkeley Tech. L.J. 501 (2003).
A. Cavoukian et al., The Privacy Payoff: How Successful Businesses Build Customer Trust (McGraw Hill, Whitby, 2002).
D. Loukidelis, Thoughts on Private Sector Privacy Regulation (November 2003); http://www.oipcbc.org/publications/speeches_presentations/FIPAPIPAspeech112403.pdf
B. Barr, A Tyrant’s Toolbox: Technology and Privacy in America, 26 J. Legis. 71 (2000).
J. Cohen, Privacy, Ideology and Technology: A Response to Jeffrey Rosen, 89 Geo. L.J. 2029 (2001), p. 2035.
The Office of the Federal Privacy Commissioner (Australia), Media Release: No Sympathy for piracy or privacy bandits (November 20, 2003); http://www.privacy.gov.au/news/media/03_16.html.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this paper
Cite this paper
Cameron, A. (2004). Infusing Privacy Norms in DRM. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds) Information Security Management, Education and Privacy. IFIP International Federation for Information Processing, vol 148. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8145-6_23
Download citation
DOI: https://doi.org/10.1007/1-4020-8145-6_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8144-6
Online ISBN: 978-1-4020-8145-3
eBook Packages: Springer Book Archive