Abstract
The information network, particularly the Internet, makes it much easier to disseminate information. With the rapid development of ICT and information networks, new forms of copyright products are becoming a part of daily life. For instance, software has been greatly improved so MP3s and DVDs can be played on a variety of multimedia platforms. At the same time, conventionally printed copyrighted material such as books and periodicals remains an important source of reliable information for education and research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See Religious Tech Center v Netcom On-Line Comm 907 F Supp 1361 (ND Cal 1995) 1370. The Court ruled that:
The decentralized network was designed so that if one link in the chain be closed off, the information will be dynamically rerouted through another link.
- 2.
Vinje (2000), pp. 559–560.
- 3.
- 4.
Lewis (2000). It quotes Lars Ulrich, Metallica drummer who said:
From a business standpoint [trading files via Napster], this is about piracy--a.k.a. taking something that doesn’t belong to you; and that is morally and legally wrong. The trading of such information--whether it’s music, videos, photos, or whatever--is, in effect, trafficking in stolen goods.
Right owners resort to criminal law to stop unauthorised access, see, e.g., UMG Recordings Inc. v MP3.Com Inc. 92 F Supp 2d 349 (SDNY 2000); Recording Indust of America v Diamond Multimedia 29 F Supp 2d 624 (CD Cal 1998); Studios v Metro Goldwyn Mayer Studios Inc. 307 F Supp 2d 1085 (ND Cal 2004); Metro–Goldwyn–Mayer Studios Inc. v Grokster 125 S Ct 2764 (2005) 2775.
- 5.
Lipton (2005), p. 145, Lipton argues the anti-trafficking and anti-device provisions in the DMCA and the CDPA can stifle individual users’ legitimate uses of works. Kretschmer presents similar arguments in ‘Digital Copyright: The End of an Era’ (2003), pp. 333–341. Possibly, computer codes may replace the law. See Wu (2003), pp. 679–752. Scholars argue copyright owners tend to implement their own policy with technological measures, see Ginsburg (2001), pp. 1613–1648; Cohen (1997), pp. 161–162 and Litman (1994–1995), pp. 29–54.
- 6.
- 7.
Historically, copyright law always responded to technological development. The invention of printing technology induced the birth and development of copyright law. For more discussion, see Dreier (1995), pp. 31–50. Entering the electronic era, an innovative copyright levy system for remuneration collection and distribution for copyright holders was employed for such analogue equipment as the photocopy machine, and analogue video and audio tapes. More recently this has come to include hard disks. For more discussions, see Akester and Akester (2006), pp. 159–168. Also see the Final Report for Institute for Information Law prepared by Hugenholtz et al. (2003) and Guibault (2003). For typical cases showing the interaction between copyright law and technology, see e.g., Sony Corp v Universal City Studios 464 US 417 (1984) 447; Teleprompter Corp v Columbia Broadcasting Sys Inc. 415 US 394 (1974); Buck v Jewell-La Salle Realty Co 283 US 191 (1931).
- 8.
Zetter (2004). Sui generis database rights are found in Chapter III of the Legal Protection of Databases Directive 96/9/EC on 11 March 1996 and the Database and Collections of Information Misappropriation Act of 2003 (HR 3261) on 8 October 2003.
- 9.
- 10.
Watal (2001), pp. 218–221.
- 11.
Serial numbers and passwords are examples of technical means.
- 12.
They are employed to protect videotapes, audio CDs, software and DVDs. For example, the Content Scrambling System (CSS) is used widely to protect unauthorised access and duplication of DVDs; Sony BMG Music employs Extended Copy Protection (XCP) to control CD production.
- 13.
Digital rights management (DRM) is the umbrella term for several technologies used to enforce pre-defined policies controlling access to software, music, movies and other digital data. In more technical terms, DRM deals with description, layering, analyses, valuation, trading and monitoring rights in a digital work. For additional details, see Vinje (1996), pp. 431–440. It has been suggested the final solution for information protection relies on a variety of technologies. For the names of a few, see Clark (1996), pp. 139–146; Poynder (2001), pp. 123–139 and Hollaar (2002), pp. 199–202.
- 14.
Liu (2004), p. 129.
- 15.
- 16.
Litman (2001), p. 27.
- 17.
- 18.
- 19.
Pub L No 105-304, 112 Stat 2860 amended title 17 of the United States Code (USC) by codifying relevant provisions as § 1201-1204.
- 20.
Council Directive 2001/29/EC of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society.
- 21.
Gasser and Girsberger (2004).
- 22.
Copyright, Designs and Patents Act of 1988.
- 23.
Lipton (2005), pp. 139–142.
- 24.
17 USC § 1201. Also see Copyright Office (US) The Digital Millennium Copyright Act of 1998: US Copyright Office Summary (December 1998).
- 25.
17 USC § 1201(a)(3)(B).
- 26.
S 296ZF of CDPA.
- 27.
S 296ZF(2).
- 28.
- 29.
For example, Universal City Studios Inc. v Reimerdes 111 F Supp 2d 294 (SDNY 2000), aff’d 273 F 3d 429 (2nd Cir 2001) was the first test of the DMCA. The Court held the defender whom devised a device circumventing the CSS was liable under the DMCA. In United States v Elcom Ltd. and Sklyarov a computer programmer was charged with providing computer software to the public for circumvention. See also Lexmark Intern v Static Control Components 2003 US Dist LEXIS 3734 (ED Ky 2003); Studios v Metro Goldwyn Mayer Studios Inc. No C 02-1955 SI (ND Cal 2004).
- 30.
17 USC § 1201(a)(1)(A).
- 31.
Ss 296ZA(1)(b) and 296ZB(5) of CDPA.
- 32.
17 USC § 1201(a)(1)(A) and (a)(2). For details, see Summary of DMCA 3 and HR Rep No 105-551, pt. 1 18.
- 33.
17 USC § 1201(b).
- 34.
S Rep 105-190, S Rep No 190, 105th Cong, 2nd Sess 1998, 1998 WL 239623 29.
- 35.
Summary of DMCA 4. However, in Universal City Studios Inc. v Corley 273 F 3d 429 (2nd Cir 2001) 443-444, 60 USPQ 2d (BNA) 1953 1961–1962, it was ruled the fair use defence was not applicable to circumvention. Nevertheless, the Supreme Court acted differently in Chamberlain Group v Skylink Tech Inc. 381 F 3d 1178 (Fed Cir 2004) 1204, 72 USPQ 2d (BNA) 1225 1244. It ruled the DMCA did not prohibit circumvention if it did not constitute or facilitate copyright infringement. In Lexmark 387 F 3d 522 (6th Cir 2004) 546–549, 72 USPQ 2d (BNA) 1839 1856–1858, the Sixth Circuit substantially diminished the scope of access-control measures and upheld the legality of circumvention for interoperability between competing products.
- 36.
Ss 296ZB(1)(c)(iv) and 296ZD(1)(b)(C) of CDPA.
- 37.
Importing circumventing devices other than for private and domestic use is an offense, see s 296ZB(1)(b) of CDPA. According to the wording of s 296ZB(1)(c)(iv), possession in the course of business is prohibited.
- 38.
- 39.
Vinje (1997), p. 235.
- 40.
Art 11 of the WCT.
- 41.
Koelman (2000), p. 274.
- 42.
See subs 4 1 3.
- 43.
17 USC § 1201(a)(2).
- 44.
S 296ZD(1)(b) of the CDPA.
- 45.
Burk and Cohen (2001), pp. 46–47. Lobbyists argued the substantial non-infringing standard established in Sony was insufficient for copyright protection. See statement of Peters, Register of Copyrights, Copyright Office of the United States in On-Line Copyright Liability Limitation Act: Hearing before the Subcommittee on Courts and Intellectual Property of the Committee on the Judiciary 105th Cong (1997), p. 33.
- 46.
Kreiss (1995–1996), pp. 1–77.
- 47.
Id 74.
- 48.
Id 41–70.
- 49.
71–74.
- 50.
17 USC § 1201(c)(1).
- 51.
The exceptions are for (1) a non-profit library, archive, and educational institution; (2) reverse engineering; (3) encryption research; (4) minor protection; (5) personal privacy and (6) security testing.
- 52.
17 USC § 1201(a)(1)(B)-(E).
- 53.
For an evaluation of the ongoing administrative rule-making procedure, see Hartzog (2005), pp. 309–351.
- 54.
Library of Congress Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies (2012) Fed Reg 65260-65279.
- 55.
The permitted acts are enumerated in Pt 1 of Sch 5A of the CDPA.
- 56.
- 57.
Hatch (1997–1998), pp. 749–750.
- 58.
See the statement by Valenti (1997), pp. 78–82; the statement by Black (1997), pp. 256–265. The Business Software Alliance with its principal member being Microsoft advocated a cooperative system between computer and software makers that makes the use or copying of a protected work very difficult for law to endorse. For details, see Lipton (2005), p. 111 and Kerr et al. (2002–2003), p. 32.
- 59.
- 60.
- 61.
For example, see Davidson & Associates v Jung 422 F 3d 630 (8th Cir 2005), 2005 Copr L Dec P 29,043, 76 USPQ 2d (BNA) 1287.
- 62.
- 63.
Art 11 of the WCT only requires Contracting Parties to provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures by authors exercising their rights.
- 64.
Gasser (2006), p. 102. The author proposed five principles in constructing a model anti-circumvention law, see 102–106. The first principle is defining core concepts clearly and unambiguously.
- 65.
Producers of copying assisting devices at one time were considered contributory infringers. Historically, most European countries imposed levies on media or equipment used primarily for private copying. Since a device that might be used for circumvention can be multifunctional, it is unfair to prohibit such kind of devices simply because they have a circumvention function. In addition, end users usually have to pay for material with a pay-per-view format. A strict ban on devices that could assist circumvention is akin to a second subsidy for right holders.
- 66.
- 67.
Reichman and Franklin (1999), pp. 899–911.
- 68.
A shrink-wrap licence is a protective wrapping for articles consisting of a clear plastic film that is wound around an article and then shrunk by heat to form a sealed, tight-fitting package. By tearing open a shrink-wrap, a user automatically assents to the enclosed software terms.
- 69.
A click-wrap licence is often found on the Internet as a part of the installation of many software packages or where agreement is sought electronically.
- 70.
Pub L No 94-553, 90 Stat 2541 (1976).
- 71.
A shrink-wrap licence with software strengthens copyright protection for software producers. See Klinefelter (1997), p. 224.
- 72.
- 73.
86 F 3d 1447 (7th Cir 1996).
- 74.
One function of s 301 of the 17 USC is to prevent states from giving special protection to works of authorship that Congress has decided should be in the public domain. S 301(a) reads:
On and after January 1, 1978, all legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106 in works of authorship that are fixed in a tangible medium of expression and come within the subject matter of copyright as specified by sections 102 and 103, whether created before or after that date and whether published or unpublished, are governed exclusively by this title. Thereafter, no person is entitled to any such right or equivalent right in any such work under the common law or statutes of any State.
- 75.
1455.
- 76.
86 F 3d 1447 (7th Cir 1996) 1454.
- 77.
1454.
- 78.
1449.
- 79.
See, e.g., Wrench LLC v Taco Bell Corp 256 F 3d 446 (6th Cir 2001) 455 held that a state law contract claim was not pre-empted by federal copyright law; similar decisions can be found in Lipscher v LRP Publications Inc. 266 F 3d 1305 (11th Cir 2001) 1318; Bowers v Baystate Technologies Inc. 320 F 3d 1317 (Fed Cir 2003) 1324–1325; Lattie v Murdach No C-96-2524 MHP, 42 USPQ 2d (BNA) 1240 1244–1245, 1997 US Dist LEXIS 3558 11–12 (ND Cal 8 Jan 1997); I Lan Systems Inc. v Netscout Service Level 183 F Supp 2d 328 (D Mass 2002) 338 where the enforceability of a click wrap licence is affirmed. But see Vault Corp v Quaid Software Ltd. 847 F 2d 255 (5th Cir 1988) 269, it affirmed a shrink-wrap software licence was a ‘contract of adhesion’ and therefore was unenforceable; Shoptalk Ltd. v Concorde-New Horizon Corp 897 F Supp 144 (SDNY 1995) 147, declined to enforce a contractual obligation to pay royalties after the expiration of a work’s copyright.
- 80.
See In re RealNetworks Inc., Privacy Litigation Not Reported in F Supp 2d, 2000 WL 631341 (ND ILL 2000), upheld an arbitration clause, 5–6.
- 81.
Register.com Inc. v Verio Inc. 356 F 3d 393 (2nd Cir 2004) 429; Specht v Netscape Communications Corp 150 F Supp 2d 585 (SDNY 2001) 593–594.
- 82.
Elkin-Koren (1997), pp. 109–110.
- 83.
Kabehie v Zoland 102 Cal App 4th 513 (Cal App 2 Dist 2002) 528; Green v Hendrickson Publishers Inc. 770 NE 2d 784 (Ind 2002) 789–790, held that ProCD relied on three other cases, each involving a contract right significantly broader than the simple right not to reproduce. Accordingly, none of them supported the broad conclusion the Seventh Circuit ascribes to them. Also see Arizona Retail Systems v Software Link 831 F Supp 759 (D Ariz 1993); Step-Saver Data Systems Inc. v Wyse Technology 939 F 2d 91 (3rd Cir 1991).
- 84.
The phrase ‘Uniform Laws’ can be misleading. A Uniform Law is not law unless the National Conference has approved it. Otherwise it is simply a 50 state legislative proposal. The UCC is a success with some of its versions in nearly all US jurisdictions—see the Legal Information Institute ‘Uniform Commercial Code’ Cornell University Law School http://www.law.cornell.edu/ucc/ (accessed 27-08-2017).
- 85.
Bitton (2006), p. 161. The UCITA is a proposed state contract law to regulate transactions for such computer information products as computer software, online databases, software access contracts and e-books.
- 86.
See, e.g., Lemley (1999), pp. 166–168. It stated that Article 2B was not in line with the anti-trust doctrine; Effross (1997), pp. 1328–1359, showing that often the terms of a shrink-wrap licence only appear on a computer screen when a buyer attempts to run the software. The buyer either accepts the terms limiting further use or is not allowed to use the software. This is patently unfair because the terms only are displayed after customers have paid and opened the package.
- 87.
Maryland and Virginia.
- 88.
Guibault (2002), pp. 214–215.
- 89.
Verstrynge (1992), p. 12.
- 90.
Council Directive 91/250/EEC of 14 May 1991 on the legal protection of computer programs.
- 91.
See also Recital 26 of the Directive.
- 92.
Council Directive 96/9/EC of 11 March 1996 on the legal protection of databases.
- 93.
Vermande v Bojkovski District Court of The Hague, decision of 20 March 1998 Informatierecht/AMI 1998 65–67.
- 94.
See Hemnes (1993–1994), pp. 577–606, that discussed enforceability of restrictions on software use by referring to the doctrine of equitable servitudes; Radin and Wagner (1998), pp. 1295–1318 and Sterk (1985), pp. 615–662, discusses the extent law should interfere with private agreements. The article also justifies restrictions on equitable servitude on the grounds that such servitude creates significant negative externalities. Sterk’s analysis on real property also applies to intellectual property, see Lemley (1999), pp. 111–172.
- 95.
Cohen et al. (2006), p. 709.
- 96.
Ibid.
- 97.
Lemley (1999), p. 123. In a discussion of the potential harm of adopting UCC Article 2B, Lemley describes three ways that the Article could expand the scope and power of contracts. First, Article 2B automatically recognises a transaction as a licence regardless of its substantial economic impact. Traditionally, a transaction has been distinguished as a sale, a lease, or a licence. Second, Article 2B prejudices customers’ rights in shifting the traditional focus on contractual norms of offer and acceptance to a straightforward recognition of the conclusion of contracts. The shift makes licences with digital products more akin to property right because of the lack of negotiation. Third, Article 2B endows contracts with omnipotent power to waive all legal default rules by making special agreements between contracting parties.
- 98.
17 USC § 117 (a):
Making of Additional Copy or Adaptation by Owner of Copy--Notwithstanding the provisions of section 106, it is not an infringement for the owner of a copy of a computer program to make or authorize the making of another copy or adaptation of that computer program provided:
(1) that such a new copy or adaptation is created as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other manner, or
(2) that such new copy or adaptation is for archival purposes only and that all archival copies are destroyed in the event that continued possession of the computer program should cease to be rightful.
For cases, see Vault Corp v Quaid Software Ltd. 847 F 2d 255 (5th Cir 1988) 270, holding that s 117 authorised the defendant to make a copy necessary to analyse and defeat a copyrighted ‘anti-copying’ program. A similar decision is found in Foresight Resources Corp v Pfortmiller 719 F Supp 1006 (D Kan 1989) 1009–1010.
- 99.
The term ‘owners of a copy’ in s 117 has made some courts focus on whether a computer program user is really an ‘owner’ or a ‘licensee’. See MAI Systems Corp v Peak Computer Inc. 991 F 2d 511 (9th Cir 1993) 519 n 5, holding s 117 did not apply to software that was licensed since the user of such software was not the ‘owner’ of a copy. Therefore, the customer could not hire a third party to install or debug a purchased program. In contrast, see DSC Communications Corp v Pulse Communications 976 F Supp 359 (ED Va 1997) 362, holding that whether a defendant owned a copy under s 117 should be determined by the economic realities of the transaction rather than simply by the form of a licence.
- 100.
Reverse engineering of software is also called ‘decompilation’ that involves working backwards from object codes to produce source codes that can be used to devise a new program without simply duplicating the original, see Johnson-Laird (1993–1994), pp. 843–902. Most courts and most commentators agree that reverse engineering is legitimate, particularly for achieving interoperability. See, e.g., DSC Communications Corp v DGI Technologies Inc. 81 F 3d 597 (5th Cir 1996) 601; Bateman v Mnemonics Inc. 79 F 3d 1532 (11th Cir 1996) 1539 n 18; Sega Enterprises Ltd. v Accolade Inc. 977 F 2d 1510 (9th Cir 1992) 1527–1528; DSC Communications Corp v Pulse Communications 976 F Supp 359 (ED Va 1997) 364. For comments, see Cohen (1994), pp. 1091–1202; Graham and Zerbe Jr. (1996), pp. 61–142; Karjala (1994), pp. 1016–1018; O’Rourke (1995), p. 534; Rice (1994), p. 1168; Samuelson (1993), pp. 49–118 and Teter (1993), pp. 1061–1098, argues rightfully so that the value of computer programs depends very much on interoperability.
- 101.
See HR 94-1476, 94th Cong (1976).
- 102.
The ProCD case is an example. Minassian (1997–1998), p. 593.
- 103.
Hardy (1995), p. 2.
- 104.
Lemley (1999), pp. 143–144.
- 105.
- 106.
Guibault (2002), pp. 121–152.
- 107.
- 108.
Lemley (1999), p. 146. 17 USC ss 203(a)(3) & (5) and 304(a)(3) & (5).
- 109.
US Constitution art VI. Stewart v Abend 495 US 207 (US Cal 1990) 228. The Court stated that:
Absent an explicit statement of congressional intent that the rights in the renewal term of an owner of a pre-existing work are extinguished when his work is incorporated into another work, it is not the role of this Court to alter the delicate balance Congress has labored to achieve.
- 110.
Hardy (1995) para 23.
- 111.
A host of courts have agreed that contracts are not equivalent to statutory rights. In ProCD 1455, the Court held a simple two-party contract was not equivalent to any of the exclusive rights within the general scope of copyright and therefore was enforceable. Warlick IV (1997), pp. 168–169 criticised the approach. In contrast, see Jaccard (1997), p. 647. The author argued that the rights conveyed by a contract may be equivalent to copyrights even though the contract law has different elements. The District Court in PC Films Corp v Turner Entertainment Co 954 F Supp 711 (SDNY 1997) 715 concluded that an agreement that bound a licensee beyond the expiration of copyright was enforceable because it was ‘merely a contract between two private parties’.
The Second Circuit rejected this approach in dictum, though it concluded not to resolve the issue of whether restrictions on licensees could survive the expiration of copyright. See PC Films Corp v MGM/UA Home Video Inc. 138 F 3d 453 (2nd Cir 1998) 458, the Court stated that:
We are not convinced that this analysis gives sufficient weight to federal copyright law and the constitutional principle that a grant of copyright rights can be for ‘limited times’ only.
- 112.
Hardy (1995) para 23.
- 113.
Lemley (1999), p. 148, the author concluded that three types of public policy can pre-empt contracts, namely copyright misuse, restrictions from federal law and restrictions from state law.
- 114.
Lemley (1999), p. 148, quoting about a number of cases in which courts pre-empted the contracts attached to products or services that contradicted such intellectual property rules as the fair use and trade secret doctrines. For recent examples, see, e.g., Markogianis v Burger King Corp 42 USPQ 2d 1862 (SDNY 1997) 1865 pre-empted a claim for implied contract to protect ideas; American Movie Classics v Turner Entertainment Co 922 F Supp 926 (SDNY 1996) 930–931; Wright v Warner Books Inc. 953 F 2d 731 (2nd Cir 1991) 741 held that a broad construction of a book licence restriction would conflict with the fair use doctrine; Wolff v Institute of Elec & Electronics Eng 768 F Supp 66 (SDNY 1991) 69; SOS Inc. v Payday Inc. 886 F 2d 1081 (9th Cir 1989) 1088; Vault Corp v Quaid Software Ltd. 847 F 2d 255 (5th Cir 1988) 270; Saturday Evening Post Co v Rumbleseat Press Inc. 816 F 2d 1191 (7th Cir 1987) 1199–1200, refused to enforce an agreement by a licensee not to challenge the possible copyrighting of a licensed work.
- 115.
Lemley (1999), p. 148.
- 116.
- 117.
Vinje (1997), p. 231.
- 118.
Ficsor (2002), p. 112.
- 119.
WIPO Diplomatic Conference Records and Neighboring Rights II 670.
- 120.
WIPO Diplomatic Conference Records and Neighboring Rights II I 670–671.
- 121.
WIPO Diplomatic Conference Records and Neighboring Rights I 670–671.
- 122.
Vinje (1997), p. 233.
- 123.
WIPO Diplomatic Conference Records and Neighboring Rights II 672–673. Norway, Denmark, Switzerland and a number of other countries were concerned that transient and incidental copying could be protected as reproduction under the Berne Convention.
- 124.
Agreed statement concerning Article 6 of the WCT.
- 125.
Art 5(1) of the Information Society Directive.
- 126.
Van Coppenhagen (2002), p. 435.
- 127.
Preamble 33 preceding to the Information Society Directive.
- 128.
S 17(6) of the CDPA 1988.
- 129.
S 28A.
- 130.
Dreier and Hugenholtz (2006), p. 371.
- 131.
Harper (1994).
- 132.
Harper (1994).
- 133.
Art 19(1) of Federal Law on Copyright and Neighboring Rights of 9 October 1992, as last amended on 16 December 1994 (WIPO English version).
- 134.
Tremlett (2006).
- 135.
S 53(5) Law on Copyright and Neighboring Rights of 9 September 1965 (Federal Law Gazette [BGBl] Pt I 1273), last amended on 8 May 1998 ([BGBl] Pt I 1014) (WIPO English version).
- 136.
Art 12(3) of Act on Copyright in Literary and Artistic Works of 30 December 1960 No 729, last amended on 1 July 2005 (WIPO English version).
- 137.
Art 12 of Protection of Copyright and Rights Related to Its Exercise of 22 April 1941 No. 633, as last amended on 30 April 2010 (WIPO English version).
- 138.
Clark (1996), p. 139.
- 139.
Clark (1996), p. 139. Also see Chong et al. (2003), pp. 434–435. The authors proposed a licence named LicenseScript Engine allowing users to assert new rights in a licence issued by a copyright owner as well as allowing the copyright owner to monitor asserted rights and subsequent usage of the work by an audit logging mechanism. The copyright owner can allow or disallow the asserted rights and bring an action against any subsequent user. However, it is unclear what rights a user enjoys if the final decision is subject to the copyright owner’s discretion.
- 140.
- 141.
Geiger et al. (2008), p. 685.
- 142.
Gasser and Ernst (2006), p. 11.
- 143.
11.
- 144.
Art 9(2) of the Berne Convention provides:
It shall be a matter for legislation in the countries of the Union to permit the reproduction of such works in certain special cases, provided that such reproduction does not conflict with a normal exploitation of the work and does not unreasonably prejudice the legitimate interests of the author.
- 145.
- 146.
For example, the German Supreme Court had private copying levies from the 1950s to 1960s in a series of cases. The manufacturers and distributors of recording equipment were considered to have contributory liability in copyright infringement cases. More recently levies have been imposed on digital media such as CD-ROMs and even digital equipment, see Senftleben (2004), pp. 11–12 and 37.
- 147.
Senftleben (2004), p. 37.
- 148.
Senftleben (2004), p. 34. Also see Reinbothe (2003).
- 149.
Art 5(2)(b) of the Information Society Directive states:
in respect of reproductions on any medium made by a natural person for private use and for ends that are neither directly nor indirectly commercial, on condition that the rightholders receive fair compensation which takes account of the application or non-application of technological measures referred to in Article 6 to the work or subject-matter concerned.
- 150.
Council Directive 92/100/EEC of 19 November 1992 on rental right and lending right and on certain rights related to copyright in the field of intellectual property.
- 151.
Preamble 35 of the Information Society Directive states:
In cases where rightholders have already received payment in some other form, for instance as part of a licence fee, no specific or separate payment may be due. The level of fair compensation should take full account of the degree of use of technological protection measures referred to in this Directive. In certain situations where the prejudice to the rightholder would be minimal, no obligation for payment may arise.
- 152.
Preamble 35. Activities with little effect on right owners’ economic benefits include recording broadcasts for later perusal, and converting the format of a copyrighted work to play it on different platforms as long as the material is legally acquired. However, the de minimis rule is eroded in Bridgeport Music Inc. v Dimension Films 410 F3d 792 (6th Cir 2005). The Court of Appeals held usage of any section of a music work, even sampling a two-second chord, would be in violation of copyright unless the copyright owner gave permission and was compensated. This decision is deemed to have extremely adverse effect on the balance between creativity and copyright protection, see Free Expression Policy Project (2005).
- 153.
Preamble 36.
- 154.
Preamble 40–41.
- 155.
Hugenholtz (1996), p. 83.
- 156.
Art 11 of the Berne Convention.
- 157.
Art 11ter.
- 158.
Arts 11bis & 11ter.
- 159.
Art 11.
- 160.
Arts 11ter & 14.
- 161.
Art 8 of the WCT.
- 162.
Ginsburg (2004), pp. 234–247.
- 163.
Ginsburg (2004), pp. 235–236.
- 164.
Art 11bis of the Berne Convention.
- 165.
- 166.
Ginsburg (2004), p. 244.
- 167.
Ginsburg (2004), p. 244.
- 168.
Agreed statement concerning Article 8 of the WCT.
- 169.
Ginsburg (2004), p. 243.
- 170.
Nimmer and Nimmer (2003) ch 12 B.05[A][2].
- 171.
Amendments of the CDPA SI 2003/2498.
- 172.
S 4 of the Copyright and Related Rights Regulations.
- 173.
S 20 of the CDPA.
- 174.
MacQueen and Waelde (2006), p. 11.
- 175.
Schlosser (2001), pp. 15–25.
- 176.
Molz (1994), pp. 71 and 93.
- 177.
For software is an important means to carry information, see Brandy et al. (1991), p. 81. Software also is important for the library collection, see Klinefelter (1997), p. 222.
- 178.
The Computer Software Rental Amendments Act of 1990: The Nonprofit Library Lending Exemption to the ‘Rental Right’ (1994) (Register’s Report), pp. 35–36.
- 179.
Computer Software Amendments Act 1990, Pub L No 101-650, 104 Stat 5089, tit VIII.
- 180.
Klinefelter (1997), p. 219.
- 181.
S 802 of the Computer Software Amendments Act 1990.
- 182.
Klinefelter (1997), p. 220.
- 183.
Klinefelter (1997), p. 220.
- 184.
Chafee (1928), p. 982.
- 185.
Register’s Report 35-36.
- 186.
EC Directive 2002/38/EC of 7 May 2002, amending and amending temporarily Directive 77/388/EEC as regards the value added tax arrangements applicable to radio and television broadcasting, see Annex.
- 187.
Boyce (1997), p. 442.
- 188.
See American Geophysical Union v Texaco Inc. 802 F Supp 1 (SDNY 1992) 26; American Geophysical Union v Texaco Inc. 37 F 3d 881 (2nd Cir 1994) 896.
- 189.
Boyce (1997), p. 445.
- 190.
- 191.
Boyce (1997), p. 447.
- 192.
Boyce (1997), pp. 446–447. Having considered several ways to amend the copyright law, Boyce finally came to a radical conclusion that to promote science and learning, copyright should be abolished from applying to learning literature.
- 193.
Bennett and Matheson (1992), p. 36.
- 194.
Hilty (2007), p. 329.
- 195.
Hilty (2007), pp. 324–327.
- 196.
Visser (2007).
- 197.
Hilty (2007), p. 329.
- 198.
Hilty (2007), p. 350.
- 199.
Hilty (2007), p. 446. ASCAP protects rights of its members including composers, songwriters, lyricists and music publishers by licensing and distributing royalties for non-dramatic public performances of their copyrighted works. ASCAP functions as an intermediary between copyright proprietors and users.
- 200.
Hilty (2007), p. 446.
- 201.
Hilty (2007), p. 447.
- 202.
McClure (1997), p. 186.
- 203.
Ensign (1997), p. 155.
- 204.
- 205.
Alexander (1995), p. 489.
- 206.
Ensign (1997), pp. 156–158.
- 207.
S 108 of the Copyright Act of 1976.
- 208.
S 108(a).
- 209.
S 108(g).
- 210.
S 109(b)(1)(A).
- 211.
S 107(3). For example, in Radji v Khakbaz 607 F Supp 1296 (DCDC 1985) 1302, the court held that the defendant’s argument of the insignificant portion (2.6%) of the work that was used was ‘frivolous’. It stated:
[i]t obviously does not matter, in law, what proportion of a particular publication consists of bootleg material; what is significant is how much of a copyrighted article or book is being reprinted.
In Basic Books Inc. v Kinko’s Graphics Corp 758 F Supp 1522 (SNDY 1991) 1533, the Court emphasised how substantial what is being copied is more decisive than the length of the copied piece. The copying of a mediocre long paragraph might not be copyright infringement but the copying of a short essential piece would be an infringement. In the Basic Books case, the reproduction of 5% of the work was considered sufficient to constitute a copyright infringement, at 1527.
- 212.
Ensign (1997), p. 63.
- 213.
157–158.
- 214.
Section 109(b)(1)(A) of the Copyright Act of 1976.
- 215.
Crews (1997), p. 390.
- 216.
Ss 110(3) & 110(9) of the Copyright Act of 1976.
- 217.
Crews (1997), p. 391.
- 218.
S 110(2)(C)(i) of Copyright Act 1976.
- 219.
Crews (1997), pp. 391–392.
- 220.
Lutzker (2003), p. 253.
- 221.
S 112(b)(1) of the Copyright Act of 1976.
- 222.
S 112(b)(2).
- 223.
- 224.
Crews (1997), p. 392.
- 225.
However, policymakers favoured copyright proprietors by granting them exclusive control of transmitting their works; see Intellectual Property and the National Information Infrastructure 95–96 and 213–218.
- 226.
Pub L No 107-273, 116 Stat 1758.
- 227.
Crews ‘New Copyright Law for Distance Education: The Meaning and Importance of the TEACH Act’ American Library Association.
- 228.
Art 12(2) of the E-Commerce Directive.
- 229.
S 512(c) of OCILLA.
- 230.
S 512(g).
- 231.
Stratton Oakmont Inc. v Prodigy Services Co 1995 WL 323710 (NY Sup Ct).
- 232.
Cubby Inc. v CompuServe Inc. No 90 Civ 6571 (PKL), 776 F Supp 135 (SDNY1991).
- 233.
Business Wire ‘EMI Music Launches DRM-free Superior Sound Quality Downloads across Its Entire Digital Repertoire’ (2007).
- 234.
Business Wire ‘EMI Music Launches DRM-free Superior Sound Quality Downloads across Its Entire Digital Repertoire’.
- 235.
Downloading music has not significantly reduced the sale of CDs, see Liebowitz (2003), p. 9.
- 236.
- 237.
Takeyama (2003), p. 62.
- 238.
Business Wire ‘EMI Music Launches DRM-free Superior Sound Quality Downloads across Its Entire Digital Repertoire’.
- 239.
Lessig (2001), pp. 12–13.
- 240.
Alternatively, musicians can, on their own, sell their CDs and other tangible products directly in online shops, or distribute their music online via digital transmission technology. See Regner (2003), p. 111. The author suggests a concentrated music industry is not the only efficient way to distribute music and collect royalties for artists with digital technology. Instead, artists should consider managing their works with the assistance of technology.
- 241.
Liebowitz (2005), p. 42.
- 242.
Liebowitz (2005), p. 42. Quality sound tracks sold at $1.29 without a DRM restriction while standard sound tracks sold at $0.99 with DRM applied.
- 243.
Tummon (2008).
- 244.
Belleflamme (2003), p. 50.
- 245.
A&M Records Inc. v Napster Inc. 284 F 3d 1091 (9th Cir 2002).
- 246.
In re Aimster Copyright Litigation 334 F 3d 643 (7th Cir 2003).
References
Akester P, Akester R (2006) Digital rights management in the 21st century. Eur Intellect Prop Rev 28(3):159
Alexander AW (1995) Prices of US and foreign published materials. In: Barr C (ed) The Bowker annual of library & book trade almanac, 40th edn. R R Bowker, New Providence
Belleflamme P (2003) Pricing information goods in the presence of copying. In: Gordon WJ, Watt W (eds) The economics of copyright: developments in research and analysis. Edward Elgar, Cheltenham
Bennett S, Matheson N (1992) Scholarly articles: valuable commodities for universities. Chronicle of Higher Education
Bitton M (2006) A new outlook on the economic dimension of the database protection debate. IDEA J Law Technol 47(2):93
Black EJ (1997) President of the computer and communications industry association on-line copyright liability limitation act: hearing before the subcommittee on courts and intellectual property of the committee on the judiciary 105th Cong
Boyce BR (1997) In: Gasaway LN (ed) Does faculty assignment of copyright violate the constitutional mandate? Fred B Rothman & Co, Littleton
Brandy ML, Rockman IF, Walch DB (1991) Software for patron use in libraries: physical access. Libr Trends 40:63
Burk DL (2002) Anticircumvention misuse. Univ Calif Los Angeles Law Rev 50:1095
Burk D, Cohen J (2001) Fair use infrastructure for rights management systems. Harv J Law Technol 15:41
Business Wire “EMI Music Launches DRM-free Superior Sound Quality Downloads across Its Entire Digital Repertoire” (2007) Mobility tech zone. http://www.mobilitytechzone.com/news/2007/04/02/2457667.htm. Accessed 27 Aug 2017
Chafee Z (1928) Equitable servitudes on chattels. Harv Law Rev 41(8):945
Chong CN, Etalle S, Hartel PH, Law YW (2003) Approximating fair use in licensescript. In: Sembok TMT, Zaman HB, Chen H, Urs SR, Myaeng SH (eds) Digital libraries: technology and management of indigenous knowledge for global access: 6th international conference on Asian digital libraries, ICADL 2003, Kuala Lumpur, Malaysia, December 8–12, 2003: proceedings. Springer, Berlin
Clark C (1995) The publisher in the digital world. In: Brunnstein K, Sint PP (eds) Proceedings of the conference on intellectual property rights and new technologies. Oldenbourg, Munchen
Clark C (1996) The answer to the machine is in the machine. In: Hugenholtz PB (ed) The future of copyright in a digital environment. Kluwer Law International, The Hague
Cohen JE (1994) Reverse engineering and the rise of electronic vigilantism: intellectual property implications of ‘Lock-Out’ programs. South Calif Law Rev 68:1091
Cohen JE (1997) Some reflections on copyright management systems and laws designed to protect them. Berkeley Technol Law J 12:161
Cohen JE, Loren LP, Okediji RL, O’Rourke MA (eds) (2006) Copyright in a global information economy. Aspen Publishers, New York
Copyright Office (US) The Digital Millennium Copyright Act of 1998: US Copyright Office Summary (US: Copyright Office, December 1998) http://www.copyright.gov/legislation/dmca.pdf. Assessed 27 Aug 2017
Crews KD (1997) Copyright and distance education: displays, performances, and the limitations of current law. In: Gasaway LN (ed) Growing pains: adapting copyright for libraries, education and society. Fred B Rothman & Co, Littleton
Crews KD, New copyright law for distance education: the meaning and importance of the TEACH act. American Library Association. http://www.ala.org/advocacy/copyright/teachact/distanceeducation. Accessed 27 Aug 2017
Dreier T (1995) Developments and perspectives of copyright: from Gutenberg to data highways. In: Brunnstein K, Sint PR (eds) Proceedings of the conference on intellectual property rights and new technologies, p 31
Dreier T, Hugenholtz B (eds) (2006) Concise European copyright law. Kluwer Law International, The Hague
Dusollier S (2005) Technology as an imperative for regulating copyright: from the public exploitation to the private use of the work. Eur Intellect Prop Rev:201
Effross WA (1997) The legal architecture of virtual stores: world wide web sites and the uniform commercial code. San Diego Law Rev 34:1263
Elkin-Koren N (1997) Copyright policy and the limits of freedom of contract. Berkeley Technol Law J 12:93
Ensign DJ (1997) Resource sharing and copyright among library consortia members. In: Gasaway (ed) Growing pains: adapting copyright for libraries, education and society. FB Rothman & Co, Littleton
Ficsor M (2002) The law of copyright and the internet: the 1996 WIPO treaties, their interpretation and implementation. Oxford University Press, Oxford
Fisher WW (2004) Promises to keep: technology, law, and the future of entertainment. Stanford University Press, California, pp 199–251
Free Expression Policy Project (2005) Appeals court reaffirms its tone-deaf approach to music sampling. Free Express Policy Project. http://www.fepproject.org/news/bridgeport.html. Accessed 27 Aug 2017
Gasaway LN (2002) The new access right and its impact on libraries and library users. J Intell Prop Law 10:269
Gasaway LN, Wiant SK (1994) Libraries and copyright: a guide to copyright law in the 1990s. Special Libraries Association, Washington
Gasser U (2006) Legal frameworks and technological protection of digital content: moving forward towards a best practice model. Fordham Intell Prop Media Entertain Law J 17:39
Gasser U, Ernst S (2006) “EUCD best practice guide: implementing the EU copyright directive in the digital age” (December 2006) U of St Gallen Law & Economics Working Paper No. 2007–01; Berkman Center Research Publication No. 2006–10
Gasser U, Girsberger M (2004) Transposing the copyright directive: legal protection of technological measures in EU-member states: a genie stuck in the bottle? Berkman Publication Series No 2004-10. http://cyber.law.harvard.edu/home/2004-10. Assessed 27 Aug 2017
Geiger C (2006a) Copyright and free access to information: for a fair balance of interests in a globalised world. Eur Intellect Prop Rev 28(7):366
Geiger C (2006b) The three-step test, a threat to a balanced copyright law? Int Rev Intell Prop Compet Law 37(6):683
Geiger C, Griffiths J, Hilty RM (2008) Towards a balanced interpretation of the ‘Three-step Test’ in copyright law. Eur Intellect Prop Rev 30:489
Ginsburg J (2001) Columbia Law Rev:1613–1648
Ginsburg JC (2002a–2003) From having copies to experiencing works: the development of an access right in US copyright law. J Copyr Soc USA 53:113
Ginsburg L (2002b) Anti-circumvention rules and fair use. UCLA J Law Technol:4
Ginsburg JC (2004) The (new?) right of making available to the public. In: Vaver DV, Bently L (eds) Intellectual property in the new millennium: essays in honour of William R Cornish. Cambridge University Press, Cambridge
Graham LD, Zerbe RO Jr (1996) Economically efficient treatment of computer software: reverse engineering, protection, and disclosure. Rutgers Comp Technol Law J 22:61
Guibault LMCR (2002) Copyright limitations and contracts: an analysis of the contractual overridability of limitations on copyright. Kluwer Law International, London
Guibault LMCR (2003) The reprography levies across the European Union. Institute for Information Law. http://www.ivir.nl/publications/guibault/introconcl.pdf. Assessed 27 Aug 2017
Hardy IT (1995) Contracts, copyright and preemption in a digital world. Richmond J Law Technol 1:2
Hardy T (1996) Property (and copyright) in cyberspace. Univ Chicago Leg Forum 217:217
Harnad S (1996) Implementing peer review on the net: scientific quality control in scholarly electronic journals. In: Peek R, Newby G (eds) Scholarly publishing: the electronic frontier. MIT Press, Cambridge
Harper G (1994) Will we need fair use in the twenty-first century? University of Texas Libraries. http://www.utsystem.edu/ogc/intellectualproperty/fair_use.htm. Accessed 27 Aug 2017
Hartzog WN (2005) Falling on deaf ears: is the ‘Fail-Safe’ triennial exemption provision in the digital millennium copyright act effective in protecting fair use? J Intell Prop Law 12(2):309
Hatch OG (1997–1998) Toward a principled approach to copyright legislation at the turn of the millennium. Univ Pittsbg Law Rev 59:719
Hecht JDM (2004) Reconciling software technology and anti-circumvention provisions in the digital millenium copyright act. UCLA J Law Technol:3
Heide T (2000–2001) Copyright in the EU and United States: what ‘Access Right’? Eur Intellect Prop Rev 48:469
Hemnes TMS (1993–1994) Restraints on alienation, equitable servitudes, and the feudal nature of computer software licensing. Denver Univ Law Rev 71:577
Hilty R (2007) Copyright law and scientific research. In: Torresmans PL (ed) Copyright law: a handbook of contemporary research. Edward Elgar, Cheltenham
Hollaar LA (2002) Legal protection of digital information. Bureau of National Affairs, Washington
HR 94-1476, 94th Cong (1976)
Hugenholtz PB (1996) Adapting copyright to the information superhighway. In: Hugenholtz PB (ed) The future of copyright in a digital environment. Kluwer Law International, The Hague
Hugenholtz PB, Guibault L, van Geffen S (2003) The future of levies in a digital environment: final report. Institute for Information Law, Amsterdam. http://www.ivir.nl/publications/other/DRM&levies-report.pdf. Accessed 27 Aug 2017
Jaccard MA (1997) Securing copyright in transnational cyberspace: the case for contracting with potential infringers. Columbia J Transnat Law 35:619
Jaszi P (1996) Caught in the net of copyright. Oreg Law Rev 75:299
Johnson-Laird A (1993–1994) Software reverse engineering in the real world. Univ Dayton Law Rev 19:843
Karjala DS (1994) Copyright protection of computer documents, reverse engineering, and Professor Miller. Univ Dayton Law Rev 19:975
Karjala DS (1996–1997) Federal preemption of shrinkwrap and on-line licenses. Univ Dayton Law Rev 22:511
Kerr IR, Maurushat A, Tacit CS (2002–2003) Technical protection measures: tilting at copyright’s windmill. Ottawa Law Rev 34:7
Klinefelter A (1997) The circulation of software by libraries. In: Gasaway LN (ed) Growing pains: adapting copyright for libraries, education and society. Fred B Rothman & Co, Littleton
Koelman KJ (2000) A hard nut to crack: the protection of technological measures. Eur Intellect Prop Rev 6:272
Kreiss RA (1995–1996) Accessibility and commercialization in copyright theory. Univ Calif Los Angeles Law Rev 43:1
Kretschmer M (2003) Digital copyright: the end of an era. Eur Intellect Prop Rev 25:333
Kurtz LA (1996) Copyright and the National Information Infrastructure in the United States. Eur Intellect Prop Rev 18:120
Lai S (1998) The impact of the recent WIPO copyright treaty and other initiatives on software copyright in the United Kingdom. Intellect Prop Q 1:35
Legal Information Institute “Uniform Commercial Code” Cornell University Law School. http://www.law.cornell.edu/ucc/. Accessed 27 Aug 2017
Lehman BA (1995) The report of the working group on intellectual property rights. Information Infrastructure Task Force, Washington
Lemley MA (1996–1997) The economics of improvement in intellectual property law. Texas Law Rev 75:989
Lemley MA (1999) Beyond preemption: the law and policy of intellectual property licensing. Calif Law Rev 87(1):111
Lessig L (2001) The future of ideas: the fate of the commons in a connected world. Random House, New York
Lewis M (2000) Metallica sues napster, universities, citing copyright infringement and RICO violations. LiveDaily. http://www.livedaily.com/news/781.html. Accessed 27 Aug 2017
Liebowitz SJ (2003) Back to the future: can copyright owners appropriate revenues in the face of new copying technologies? In: Gordon WJ, Watt R (eds) The economics of copyright: developments in research and analysis. Edward Elgar, Cheltenham
Liebowitz SJ (2005) MP3s and copyright collectives: a cure worse than the disease? In: Takeyama LN, Gordon WJ, Towse R (eds) Developments in the economics of copyright: research and analysis. Edward Elgar, Cheltenham
Lipton JD (2005) Solving the digital piracy puzzle: disaggregating fair use from the DMCA’s anti-device provisions. Harv J Law Technol 19(1):111
Litman JD (1994–1995) The exclusive right to read. Cardozo Arts Entertain Law J 13:29
Litman J (2001) Digital copyright: protecting intellectual property on the internet. Prometheus Books, Amherst
Liu J (2004) Regulatory copyright. N C Law Rev 83(1):87
Luo L (2006) Legal protection of technological measures in China. Eur Intellect Prop Rev 28:100
Lutzker AP (2003) Content rights for creative professionals: copyrights and trademarks in a digital age, 2nd edn. Focal Press, Waltham
MacQueen H, Waelde C (2006) UK copyright law in the digital environment. Electron J Comp Law 10(3):1. http://www.ejcl.org/103/art103-10.pdf. Accessed 27 Aug 2017
McClure LW (1997) Interlibrary loan in the electronic world. In: Gasaway LN (ed) Growing pains: adapting copyright for libraries, education and society. Fred B Rothman & Co, Littleton
Minassian A (1997–1998) The death of copyright: enforceability of shrinkwrap licensing agreements. Univ Calif Los Angeles Law Rev 45:569
Molz RK (1994) The public library inquiry as public policy research. Libr Cult 29(1):61
Netanel NW (1996) Copyright and a democratic civil society. Yale Law J 106(2):283
Netanel NW (2003) Impose a noncommercial use levy to allow free peer-to-peer file sharing. Harv J Law Technol 17:1
Nimmer MB, Nimmer D (2003) Nimmer on copyright, vol 3. LexisNexis, Los Angeles. ch 12 B.05[A][2]
O’Rourke MA (1995) Drawing the boundary between copyright and contract: copyright preemption of software license terms. Duke Law J 45(3):479
Peters, Register of Copyrights, Copyright Office of the United States in On-Line Copyright Liability Limitation Act: Hearing before the Subcommittee on Courts and Intellectual Property of the Committee on the Judiciary 105th Cong (1997)
Poynder R (2001) The answer to the machine is the machine. In: Poynder R (ed) Caught in a web, intellectual property in cyberspace. Derwent/Thomson Scientific, London
Radin MJ, Wagner RP (1998) The myth of private ordering: rediscovering legal realism in cyberspace. Chicago-Kent Law Rev 73:1295
Regner T (2003) Innovation of music. In: Gordon WJ, Watt R (eds) The economics of copyright: developments in research and analysis. Edward Elgar, Cheltenham
Reichman JH, Franklin JA (1999) Privately legislated intellectual property rights: reconciling freedom of contract with public good uses of information. Univ Pa Law Rev 147(4):875
Reinbothe J, von Lewinski S (2002) The WIPO treaties 1996: the WIPO copyright treaty and the WIPO performances and phonograms treaty: commentary and legal analysis. Butterworths Canada, Markham
Reinbothe J (2003) Private copying, levies and DRMs, against the background of the EU copyright framework. Presentation delivered at the Conference on The Compatibility of DRM and Levies, Brussels. http://ec.europa.eu/internal_market/copyright/documents/2003-speech-reinbothe_en.htm. Accessed 27 Aug 2017
Rice DA (1992) Public goods, private contract and public policy: federal preemption of software license prohibitions against reverse engineering. Univ Pittsbg Law Rev 53:543
Rice DA (1994) Sega and beyond: a beacon for fair use analysis … at least as far as it goes. Univ Dayton Law Rev 19:1131
Roche MM (1993) ARL/RLG interlibrary loan cost study: a joint effort by the Association of Research Libraries and the Research Libraries Group. Association of Research Libraries, Washington
Samuelson P (1993) Fair use for computer programs and other copyrightable works in digital form: the implications of Sony, Galoob and Sega. J Intell Prop Law 1:49
Samuelson P (1996) The Copyright Grab 4.01 Wired, p 134
Samuelson P (1999) Intellectual property and the digital economy: why the anti-circumvention regulations need to be revised. Berkeley Technol Law J 14:519
Samuelson P (2001a) Anticircumvention rules: threat to science. Science 293:2028
Samuelson P (2001b) Towards more sensible anti-circumvention regulations. 1962 Financial cryptography: lecture notes in computer science. http://people.ischool.berkeley.edu/~pam/papers/fincrypt2.pdf. Accessed 27 Aug 2017
Samuelson P (2015) Freedom to Tinker. Theoretical inquiries in law, Forthcoming; available at SSRN: http://ssrn.com/abstract=2605195SS. Accessed 27 July 2016
Schlosser SM (2001) The high price of (criticizing) coffee: the chilling effect of the federal trademark dilution act on corporate parody. Ariz Law Rev 43(4):931
Senftleben M (2004) Copyright, limitations and the three-step test: an analysis of the three-step test in international and EC copyright law. In: Hugenholtz B (ed) Kluwer Law International, The Hague
Shayesteh SA (1999) High-speed chase on the information superhighway: the evolution of criminal liability for internet piracy. Loy LAL Rev 33:183
Stefik M (1996) Letting loose the light: igniting commerce in electronic publication. In: Stefik M (ed) Internet dreams: archetypes, myths, and metaphors, p 219
Stefik MJ (1997) Shifting the possible: how trusted systems and digital property rights challenge us to rethink digital publishing. Berkeley Technol Law J 12:137
Sterk SE (1985) Freedom from freedom of contract: the enduring value of servitude restrictions. Iowa Law Rev 70:615
Takeyama LN (2003) Piracy, asymmetric information and product quality. In: Gordon WJ, Watt R (eds) The economics of copyright: developments in research and analysis. Edward Elgar, Cheltenham
Teter TS (1993) Merger and the machines: an analysis of the pro-compatibility trend in computer software copyright cases. Stanford Law Rev 45(4):1061
The Computer Software Rental Amendments Act of 1990: The Nonprofit Library Lending Exemption to the “Rental Right”: A Report on the Acting Register of Copyrights (1994) (Register’s Report)
Tremlett G (2006) Spanish court rules free music downloads are legal for own use. The Guardian
Tummon J (2008) The case for the death of copyright. Vancouver Sun
Valenti J (1997) Chairman and CEO of the Motion Picture Association of America at on-line copyright liability limitation act: hearing before the subcommittee on courts and intellectual property of the committee on the judiciary 105th Cong
Van Coppenhagen V (2002) Copyright and the WIPO copyright treaty, with specific reference to the rights applicable in a digital environment and the protection of technological measures. S Afr Law J 119:429
Verstrynge JF (1992) Protecting intellectual property rights within the new pan-European framework: the case of computer software. Droit de l’informatique et des télécoms 2:6
Vinje TC (1996) A brave new world for technical protection systems: will there still be room for copyright? Eur Intellect Prop Rev 8:431
Vinje TC (1997) The new WIPO copyright treaty: a happy result in Geneva. Eur Intellect Prop Rev 19:230
Vinje TC (2000) Should we begin digging copyright’s grave? Eur Intellect Prop Rev 22(12):551
Visser C (2007) Intellectual property rights from publicly financed research: the way to research hell is paved with good intentions. S Afr Mercantile Law J 19:363
Warlick JT IV (1997) A wolf in Sheep’s clothing? Information licensing and de facto copyright legislation in UCC 2B. J Copyr Soc USA 45:158
Watal J (2001) Intellectual property rights in the WTO and developing countries. Kluwer International Law, The Hague
WIPO Diplomatic Conference Records and Neighboring Rights I & II
Wu T (2003) When code isn’t law. Va Law Rev 89(4):679
Wynbrandt RA (1990) Music performance in libraries: is a license from ASCAP required? Public Libr 29:224
Zetter K (2004) Hands off! that fact is mine Wired. http://www.wired.com/techbiz/media/news/2004/03/62500. Accessed 27 Aug 2017
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Wang, J. (2018). The Technological Revolution and Its Impact on Copyright Law. In: Conceptualizing Copyright Exceptions in China and South Africa. China-EU Law Series, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-71831-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-71831-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-71830-9
Online ISBN: 978-3-319-71831-6
eBook Packages: Law and CriminologyLaw and Criminology (R0)