Skip to main content

The Technological Revolution and Its Impact on Copyright Law

  • Chapter
  • First Online:
Conceptualizing Copyright Exceptions in China and South Africa

Part of the book series: China-EU Law Series ((CELS,volume 6))

  • 412 Accesses

Abstract

The information network, particularly the Internet, makes it much easier to disseminate information. With the rapid development of ICT and information networks, new forms of copyright products are becoming a part of daily life. For instance, software has been greatly improved so MP3s and DVDs can be played on a variety of multimedia platforms. At the same time, conventionally printed copyrighted material such as books and periodicals remains an important source of reliable information for education and research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See Religious Tech Center v Netcom On-Line Comm 907 F Supp 1361 (ND Cal 1995) 1370. The Court ruled that:

    The decentralized network was designed so that if one link in the chain be closed off, the information will be dynamically rerouted through another link.

  2. 2.

    Vinje (2000), pp. 559–560.

  3. 3.

    Hardy (1996), pp. 223–224 and Netanel (1996), p. 384.

  4. 4.

    Lewis (2000). It quotes Lars Ulrich, Metallica drummer who said:

    From a business standpoint [trading files via Napster], this is about piracy--a.k.a. taking something that doesn’t belong to you; and that is morally and legally wrong. The trading of such information--whether it’s music, videos, photos, or whatever--is, in effect, trafficking in stolen goods.

    Right owners resort to criminal law to stop unauthorised access, see, e.g., UMG Recordings Inc. v MP3.Com Inc. 92 F Supp 2d 349 (SDNY 2000); Recording Indust of America v Diamond Multimedia 29 F Supp 2d 624 (CD Cal 1998); Studios v Metro Goldwyn Mayer Studios Inc. 307 F Supp 2d 1085 (ND Cal 2004); Metro–Goldwyn–Mayer Studios Inc. v Grokster 125 S Ct 2764 (2005) 2775.

  5. 5.

    Lipton (2005), p. 145, Lipton argues the anti-trafficking and anti-device provisions in the DMCA and the CDPA can stifle individual users’ legitimate uses of works. Kretschmer presents similar arguments in ‘Digital Copyright: The End of an Era’ (2003), pp. 333–341. Possibly, computer codes may replace the law. See Wu (2003), pp. 679–752. Scholars argue copyright owners tend to implement their own policy with technological measures, see Ginsburg (2001), pp. 1613–1648; Cohen (1997), pp. 161–162 and Litman (1994–1995), pp. 29–54.

  6. 6.

    Luo (2006), p. 100. Dusollier also argues technology should not determine what copyright law should look like, see Dusollier (2005), pp. 201–204.

  7. 7.

    Historically, copyright law always responded to technological development. The invention of printing technology induced the birth and development of copyright law. For more discussion, see Dreier (1995), pp. 31–50. Entering the electronic era, an innovative copyright levy system for remuneration collection and distribution for copyright holders was employed for such analogue equipment as the photocopy machine, and analogue video and audio tapes. More recently this has come to include hard disks. For more discussions, see Akester and Akester (2006), pp. 159–168. Also see the Final Report for Institute for Information Law prepared by Hugenholtz et al. (2003) and Guibault (2003). For typical cases showing the interaction between copyright law and technology, see e.g., Sony Corp v Universal City Studios 464 US 417 (1984) 447; Teleprompter Corp v Columbia Broadcasting Sys Inc. 415 US 394 (1974); Buck v Jewell-La Salle Realty Co 283 US 191 (1931).

  8. 8.

    Zetter (2004). Sui generis database rights are found in Chapter III of the Legal Protection of Databases Directive 96/9/EC on 11 March 1996 and the Database and Collections of Information Misappropriation Act of 2003 (HR 3261) on 8 October 2003.

  9. 9.

    Geiger (2006a, b), pp. 368–370.

  10. 10.

    Watal (2001), pp. 218–221.

  11. 11.

    Serial numbers and passwords are examples of technical means.

  12. 12.

    They are employed to protect videotapes, audio CDs, software and DVDs. For example, the Content Scrambling System (CSS) is used widely to protect unauthorised access and duplication of DVDs; Sony BMG Music employs Extended Copy Protection (XCP) to control CD production.

  13. 13.

    Digital rights management (DRM) is the umbrella term for several technologies used to enforce pre-defined policies controlling access to software, music, movies and other digital data. In more technical terms, DRM deals with description, layering, analyses, valuation, trading and monitoring rights in a digital work. For additional details, see Vinje (1996), pp. 431–440. It has been suggested the final solution for information protection relies on a variety of technologies. For the names of a few, see Clark (1996), pp. 139–146; Poynder (2001), pp. 123–139 and Hollaar (2002), pp. 199–202.

  14. 14.

    Liu (2004), p. 129.

  15. 15.

    Samuelson (1996), pp. 134–139; Stefik (1996), pp. 226–234; Stefik (1997), pp. 139–140 and Clark (1995), pp. 97–101.

  16. 16.

    Litman (2001), p. 27.

  17. 17.

    Kretschmer (2003), p. 337 and Vinje (1996), p. 436.

  18. 18.

    A substantial number of legal scholars have debated and commented on the anti-circumvention rules. For example, Samuelson (1999), pp. 537–544; Samuelson (2001a, b), pp. 2028–2031; Ginsburg (2002), pp. 4–8; Hecht (2004), pp. 8–12 and Lai (1998), pp. 42–55.

  19. 19.

    Pub L No 105-304, 112 Stat 2860 amended title 17 of the United States Code (USC) by codifying relevant provisions as § 1201-1204.

  20. 20.

    Council Directive 2001/29/EC of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society.

  21. 21.

    Gasser and Girsberger (2004).

  22. 22.

    Copyright, Designs and Patents Act of 1988.

  23. 23.

    Lipton (2005), pp. 139–142.

  24. 24.

    17 USC § 1201. Also see Copyright Office (US) The Digital Millennium Copyright Act of 1998: US Copyright Office Summary (December 1998).

  25. 25.

    17 USC § 1201(a)(3)(B).

  26. 26.

    S 296ZF of CDPA.

  27. 27.

    S 296ZF(2).

  28. 28.

    Dusollier (2005), pp. 202–203 and Burk (2002), p. 1096.

  29. 29.

    For example, Universal City Studios Inc. v Reimerdes 111 F Supp 2d 294 (SDNY 2000), aff’d 273 F 3d 429 (2nd Cir 2001) was the first test of the DMCA. The Court held the defender whom devised a device circumventing the CSS was liable under the DMCA. In United States v Elcom Ltd. and Sklyarov a computer programmer was charged with providing computer software to the public for circumvention. See also Lexmark Intern v Static Control Components 2003 US Dist LEXIS 3734 (ED Ky 2003); Studios v Metro Goldwyn Mayer Studios Inc. No C 02-1955 SI (ND Cal 2004).

  30. 30.

    17 USC § 1201(a)(1)(A).

  31. 31.

    Ss 296ZA(1)(b) and 296ZB(5) of CDPA.

  32. 32.

    17 USC § 1201(a)(1)(A) and (a)(2). For details, see Summary of DMCA 3 and HR Rep No 105-551, pt. 1 18.

  33. 33.

    17 USC § 1201(b).

  34. 34.

    S Rep 105-190, S Rep No 190, 105th Cong, 2nd Sess 1998, 1998 WL 239623 29.

  35. 35.

    Summary of DMCA 4. However, in Universal City Studios Inc. v Corley 273 F 3d 429 (2nd Cir 2001) 443-444, 60 USPQ 2d (BNA) 1953 1961–1962, it was ruled the fair use defence was not applicable to circumvention. Nevertheless, the Supreme Court acted differently in Chamberlain Group v Skylink Tech Inc. 381 F 3d 1178 (Fed Cir 2004) 1204, 72 USPQ 2d (BNA) 1225 1244. It ruled the DMCA did not prohibit circumvention if it did not constitute or facilitate copyright infringement. In Lexmark 387 F 3d 522 (6th Cir 2004) 546–549, 72 USPQ 2d (BNA) 1839 1856–1858, the Sixth Circuit substantially diminished the scope of access-control measures and upheld the legality of circumvention for interoperability between competing products.

  36. 36.

    Ss 296ZB(1)(c)(iv) and 296ZD(1)(b)(C) of CDPA.

  37. 37.

    Importing circumventing devices other than for private and domestic use is an offense, see s 296ZB(1)(b) of CDPA. According to the wording of s 296ZB(1)(c)(iv), possession in the course of business is prohibited.

  38. 38.

    Heide (2000–2001), p. 475; Gasaway (2002), pp. 269–308 and Ginsburg (2002–2003), pp. 119–126.

  39. 39.

    Vinje (1997), p. 235.

  40. 40.

    Art 11 of the WCT.

  41. 41.

    Koelman (2000), p. 274.

  42. 42.

    See subs 4 1 3.

  43. 43.

    17 USC § 1201(a)(2).

  44. 44.

    S 296ZD(1)(b) of the CDPA.

  45. 45.

    Burk and Cohen (2001), pp. 46–47. Lobbyists argued the substantial non-infringing standard established in Sony was insufficient for copyright protection. See statement of Peters, Register of Copyrights, Copyright Office of the United States in On-Line Copyright Liability Limitation Act: Hearing before the Subcommittee on Courts and Intellectual Property of the Committee on the Judiciary 105th Cong (1997), p. 33.

  46. 46.

    Kreiss (1995–1996), pp. 1–77.

  47. 47.

    Id 74.

  48. 48.

    Id 41–70.

  49. 49.

    71–74.

  50. 50.

    17 USC § 1201(c)(1).

  51. 51.

    The exceptions are for (1) a non-profit library, archive, and educational institution; (2) reverse engineering; (3) encryption research; (4) minor protection; (5) personal privacy and (6) security testing.

  52. 52.

    17 USC § 1201(a)(1)(B)-(E).

  53. 53.

    For an evaluation of the ongoing administrative rule-making procedure, see Hartzog (2005), pp. 309–351.

  54. 54.

    Library of Congress Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies (2012) Fed Reg 65260-65279.

  55. 55.

    The permitted acts are enumerated in Pt 1 of Sch 5A of the CDPA.

  56. 56.

    Samuelson (2001a, b), p. 7; also see Samuelson (1999), pp. 544–546.

  57. 57.

    Hatch (1997–1998), pp. 749–750.

  58. 58.

    See the statement by Valenti (1997), pp. 78–82; the statement by Black (1997), pp. 256–265. The Business Software Alliance with its principal member being Microsoft advocated a cooperative system between computer and software makers that makes the use or copying of a protected work very difficult for law to endorse. For details, see Lipton (2005), p. 111 and Kerr et al. (2002–2003), p. 32.

  59. 59.

    See Lehman (1995). Many have criticised the report and an earlier draft because it overly favoured publishers’ interests. See Jaszi (1996), pp. 299–308; Kurtz (1996), pp. 120–126; Litman (1994–1995), pp. 29–54 and Samuelson (1996), pp. 369–440.

  60. 60.

    Samuelson (2001a, b), p. 7.

  61. 61.

    For example, see Davidson & Associates v Jung 422 F 3d 630 (8th Cir 2005), 2005 Copr L Dec P 29,043, 76 USPQ 2d (BNA) 1287.

  62. 62.

    Samuelson (2015) and Shayesteh (1999), pp. 213–216 and 223–224.

  63. 63.

    Art 11 of the WCT only requires Contracting Parties to provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures by authors exercising their rights.

  64. 64.

    Gasser (2006), p. 102. The author proposed five principles in constructing a model anti-circumvention law, see 102–106. The first principle is defining core concepts clearly and unambiguously.

  65. 65.

    Producers of copying assisting devices at one time were considered contributory infringers. Historically, most European countries imposed levies on media or equipment used primarily for private copying. Since a device that might be used for circumvention can be multifunctional, it is unfair to prohibit such kind of devices simply because they have a circumvention function. In addition, end users usually have to pay for material with a pay-per-view format. A strict ban on devices that could assist circumvention is akin to a second subsidy for right holders.

  66. 66.

    Samuelson (2001a, b), p. 6.

  67. 67.

    Reichman and Franklin (1999), pp. 899–911.

  68. 68.

    A shrink-wrap licence is a protective wrapping for articles consisting of a clear plastic film that is wound around an article and then shrunk by heat to form a sealed, tight-fitting package. By tearing open a shrink-wrap, a user automatically assents to the enclosed software terms.

  69. 69.

    A click-wrap licence is often found on the Internet as a part of the installation of many software packages or where agreement is sought electronically.

  70. 70.

    Pub L No 94-553, 90 Stat 2541 (1976).

  71. 71.

    A shrink-wrap licence with software strengthens copyright protection for software producers. See Klinefelter (1997), p. 224.

  72. 72.

    Gasaway and Wiant (1994), p. 119 and Klinefelter (1997), p. 225.

  73. 73.

    86 F 3d 1447 (7th Cir 1996).

  74. 74.

    One function of s 301 of the 17 USC is to prevent states from giving special protection to works of authorship that Congress has decided should be in the public domain. S 301(a) reads:

    On and after January 1, 1978, all legal or equitable rights that are equivalent to any of the exclusive rights within the general scope of copyright as specified by section 106 in works of authorship that are fixed in a tangible medium of expression and come within the subject matter of copyright as specified by sections 102 and 103, whether created before or after that date and whether published or unpublished, are governed exclusively by this title. Thereafter, no person is entitled to any such right or equivalent right in any such work under the common law or statutes of any State.

  75. 75.

    1455.

  76. 76.

    86 F 3d 1447 (7th Cir 1996) 1454.

  77. 77.

    1454.

  78. 78.

    1449.

  79. 79.

    See, e.g., Wrench LLC v Taco Bell Corp 256 F 3d 446 (6th Cir 2001) 455 held that a state law contract claim was not pre-empted by federal copyright law; similar decisions can be found in Lipscher v LRP Publications Inc. 266 F 3d 1305 (11th Cir 2001) 1318; Bowers v Baystate Technologies Inc. 320 F 3d 1317 (Fed Cir 2003) 1324–1325; Lattie v Murdach No C-96-2524 MHP, 42 USPQ 2d (BNA) 1240 1244–1245, 1997 US Dist LEXIS 3558 11–12 (ND Cal 8 Jan 1997); I Lan Systems Inc. v Netscout Service Level 183 F Supp 2d 328 (D Mass 2002) 338 where the enforceability of a click wrap licence is affirmed. But see Vault Corp v Quaid Software Ltd. 847 F 2d 255 (5th Cir 1988) 269, it affirmed a shrink-wrap software licence was a ‘contract of adhesion’ and therefore was unenforceable; Shoptalk Ltd. v Concorde-New Horizon Corp 897 F Supp 144 (SDNY 1995) 147, declined to enforce a contractual obligation to pay royalties after the expiration of a work’s copyright.

  80. 80.

    See In re RealNetworks Inc., Privacy Litigation Not Reported in F Supp 2d, 2000 WL 631341 (ND ILL 2000), upheld an arbitration clause, 5–6.

  81. 81.

    Register.com Inc. v Verio Inc. 356 F 3d 393 (2nd Cir 2004) 429; Specht v Netscape Communications Corp 150 F Supp 2d 585 (SDNY 2001) 593–594.

  82. 82.

    Elkin-Koren (1997), pp. 109–110.

  83. 83.

    Kabehie v Zoland 102 Cal App 4th 513 (Cal App 2 Dist 2002) 528; Green v Hendrickson Publishers Inc. 770 NE 2d 784 (Ind 2002) 789–790, held that ProCD relied on three other cases, each involving a contract right significantly broader than the simple right not to reproduce. Accordingly, none of them supported the broad conclusion the Seventh Circuit ascribes to them. Also see Arizona Retail Systems v Software Link 831 F Supp 759 (D Ariz 1993); Step-Saver Data Systems Inc. v Wyse Technology 939 F 2d 91 (3rd Cir 1991).

  84. 84.

    The phrase ‘Uniform Laws’ can be misleading. A Uniform Law is not law unless the National Conference has approved it. Otherwise it is simply a 50 state legislative proposal. The UCC is a success with some of its versions in nearly all US jurisdictions—see the Legal Information Institute ‘Uniform Commercial Code’ Cornell University Law School http://www.law.cornell.edu/ucc/ (accessed 27-08-2017).

  85. 85.

    Bitton (2006), p. 161. The UCITA is a proposed state contract law to regulate transactions for such computer information products as computer software, online databases, software access contracts and e-books.

  86. 86.

    See, e.g., Lemley (1999), pp. 166–168. It stated that Article 2B was not in line with the anti-trust doctrine; Effross (1997), pp. 1328–1359, showing that often the terms of a shrink-wrap licence only appear on a computer screen when a buyer attempts to run the software. The buyer either accepts the terms limiting further use or is not allowed to use the software. This is patently unfair because the terms only are displayed after customers have paid and opened the package.

  87. 87.

    Maryland and Virginia.

  88. 88.

    Guibault (2002), pp. 214–215.

  89. 89.

    Verstrynge (1992), p. 12.

  90. 90.

    Council Directive 91/250/EEC of 14 May 1991 on the legal protection of computer programs.

  91. 91.

    See also Recital 26 of the Directive.

  92. 92.

    Council Directive 96/9/EC of 11 March 1996 on the legal protection of databases.

  93. 93.

    Vermande v Bojkovski District Court of The Hague, decision of 20 March 1998 Informatierecht/AMI 1998 65–67.

  94. 94.

    See Hemnes (1993–1994), pp. 577–606, that discussed enforceability of restrictions on software use by referring to the doctrine of equitable servitudes; Radin and Wagner (1998), pp. 1295–1318 and Sterk (1985), pp. 615–662, discusses the extent law should interfere with private agreements. The article also justifies restrictions on equitable servitude on the grounds that such servitude creates significant negative externalities. Sterk’s analysis on real property also applies to intellectual property, see Lemley (1999), pp. 111–172.

  95. 95.

    Cohen et al. (2006), p. 709.

  96. 96.

    Ibid.

  97. 97.

    Lemley (1999), p. 123. In a discussion of the potential harm of adopting UCC Article 2B, Lemley describes three ways that the Article could expand the scope and power of contracts. First, Article 2B automatically recognises a transaction as a licence regardless of its substantial economic impact. Traditionally, a transaction has been distinguished as a sale, a lease, or a licence. Second, Article 2B prejudices customers’ rights in shifting the traditional focus on contractual norms of offer and acceptance to a straightforward recognition of the conclusion of contracts. The shift makes licences with digital products more akin to property right because of the lack of negotiation. Third, Article 2B endows contracts with omnipotent power to waive all legal default rules by making special agreements between contracting parties.

  98. 98.

    17 USC § 117 (a):

    Making of Additional Copy or Adaptation by Owner of Copy--Notwithstanding the provisions of section 106, it is not an infringement for the owner of a copy of a computer program to make or authorize the making of another copy or adaptation of that computer program provided:

    (1) that such a new copy or adaptation is created as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other manner, or

    (2) that such new copy or adaptation is for archival purposes only and that all archival copies are destroyed in the event that continued possession of the computer program should cease to be rightful.

    For cases, see Vault Corp v Quaid Software Ltd. 847 F 2d 255 (5th Cir 1988) 270, holding that s 117 authorised the defendant to make a copy necessary to analyse and defeat a copyrighted ‘anti-copying’ program. A similar decision is found in Foresight Resources Corp v Pfortmiller 719 F Supp 1006 (D Kan 1989) 1009–1010.

  99. 99.

    The term ‘owners of a copy’ in s 117 has made some courts focus on whether a computer program user is really an ‘owner’ or a ‘licensee’. See MAI Systems Corp v Peak Computer Inc. 991 F 2d 511 (9th Cir 1993) 519 n 5, holding s 117 did not apply to software that was licensed since the user of such software was not the ‘owner’ of a copy. Therefore, the customer could not hire a third party to install or debug a purchased program. In contrast, see DSC Communications Corp v Pulse Communications 976 F Supp 359 (ED Va 1997) 362, holding that whether a defendant owned a copy under s 117 should be determined by the economic realities of the transaction rather than simply by the form of a licence.

  100. 100.

    Reverse engineering of software is also called ‘decompilation’ that involves working backwards from object codes to produce source codes that can be used to devise a new program without simply duplicating the original, see Johnson-Laird (1993–1994), pp. 843–902. Most courts and most commentators agree that reverse engineering is legitimate, particularly for achieving interoperability. See, e.g., DSC Communications Corp v DGI Technologies Inc. 81 F 3d 597 (5th Cir 1996) 601; Bateman v Mnemonics Inc. 79 F 3d 1532 (11th Cir 1996) 1539 n 18; Sega Enterprises Ltd. v Accolade Inc. 977 F 2d 1510 (9th Cir 1992) 1527–1528; DSC Communications Corp v Pulse Communications 976 F Supp 359 (ED Va 1997) 364. For comments, see Cohen (1994), pp. 1091–1202; Graham and Zerbe Jr. (1996), pp. 61–142; Karjala (1994), pp. 1016–1018; O’Rourke (1995), p. 534; Rice (1994), p. 1168; Samuelson (1993), pp. 49–118 and Teter (1993), pp. 1061–1098, argues rightfully so that the value of computer programs depends very much on interoperability.

  101. 101.

    See HR 94-1476, 94th Cong (1976).

  102. 102.

    The ProCD case is an example. Minassian (1997–1998), p. 593.

  103. 103.

    Hardy (1995), p. 2.

  104. 104.

    Lemley (1999), pp. 143–144.

  105. 105.

    Lemley (1999), p. 145; Reichman and Franklin (1999), p. 922 and O’Rourke (1995), pp. 534–541. The author also proposed to expand the treatment of antitrust law rather than merely to rely on the pre-emption doctrine, at 545.

  106. 106.

    Guibault (2002), pp. 121–152.

  107. 107.

    Lemley (1999), pp. 144–146. However, the fair use doctrine is sometimes considered more than merely a default rule, see Karjala (1996–1997), p. 520; Lemley (1996–1997), pp. 1042–1083 and Rice (1992), pp. 556–570.

  108. 108.

    Lemley (1999), p. 146. 17 USC ss 203(a)(3) & (5) and 304(a)(3) & (5).

  109. 109.

    US Constitution art VI. Stewart v Abend 495 US 207 (US Cal 1990) 228. The Court stated that:

    Absent an explicit statement of congressional intent that the rights in the renewal term of an owner of a pre-existing work are extinguished when his work is incorporated into another work, it is not the role of this Court to alter the delicate balance Congress has labored to achieve.

  110. 110.

    Hardy (1995) para 23.

  111. 111.

    A host of courts have agreed that contracts are not equivalent to statutory rights. In ProCD 1455, the Court held a simple two-party contract was not equivalent to any of the exclusive rights within the general scope of copyright and therefore was enforceable. Warlick IV (1997), pp. 168–169 criticised the approach. In contrast, see Jaccard (1997), p. 647. The author argued that the rights conveyed by a contract may be equivalent to copyrights even though the contract law has different elements. The District Court in PC Films Corp v Turner Entertainment Co 954 F Supp 711 (SDNY 1997) 715 concluded that an agreement that bound a licensee beyond the expiration of copyright was enforceable because it was ‘merely a contract between two private parties’.

    The Second Circuit rejected this approach in dictum, though it concluded not to resolve the issue of whether restrictions on licensees could survive the expiration of copyright. See PC Films Corp v MGM/UA Home Video Inc. 138 F 3d 453 (2nd Cir 1998) 458, the Court stated that:

    We are not convinced that this analysis gives sufficient weight to federal copyright law and the constitutional principle that a grant of copyright rights can be for ‘limited times’ only.

  112. 112.

    Hardy (1995) para 23.

  113. 113.

    Lemley (1999), p. 148, the author concluded that three types of public policy can pre-empt contracts, namely copyright misuse, restrictions from federal law and restrictions from state law.

  114. 114.

    Lemley (1999), p. 148, quoting about a number of cases in which courts pre-empted the contracts attached to products or services that contradicted such intellectual property rules as the fair use and trade secret doctrines. For recent examples, see, e.g., Markogianis v Burger King Corp 42 USPQ 2d 1862 (SDNY 1997) 1865 pre-empted a claim for implied contract to protect ideas; American Movie Classics v Turner Entertainment Co 922 F Supp 926 (SDNY 1996) 930–931; Wright v Warner Books Inc. 953 F 2d 731 (2nd Cir 1991) 741 held that a broad construction of a book licence restriction would conflict with the fair use doctrine; Wolff v Institute of Elec & Electronics Eng 768 F Supp 66 (SDNY 1991) 69; SOS Inc. v Payday Inc. 886 F 2d 1081 (9th Cir 1989) 1088; Vault Corp v Quaid Software Ltd. 847 F 2d 255 (5th Cir 1988) 270; Saturday Evening Post Co v Rumbleseat Press Inc. 816 F 2d 1191 (7th Cir 1987) 1199–1200, refused to enforce an agreement by a licensee not to challenge the possible copyrighting of a licensed work.

  115. 115.

    Lemley (1999), p. 148.

  116. 116.

    WIPO Diplomatic Conference Records and Neighboring Rights II 672.

  117. 117.

    Vinje (1997), p. 231.

  118. 118.

    Ficsor (2002), p. 112.

  119. 119.

    WIPO Diplomatic Conference Records and Neighboring Rights II 670.

  120. 120.

    WIPO Diplomatic Conference Records and Neighboring Rights II I 670–671.

  121. 121.

    WIPO Diplomatic Conference Records and Neighboring Rights I 670–671.

  122. 122.

    Vinje (1997), p. 233.

  123. 123.

    WIPO Diplomatic Conference Records and Neighboring Rights II 672–673. Norway, Denmark, Switzerland and a number of other countries were concerned that transient and incidental copying could be protected as reproduction under the Berne Convention.

  124. 124.

    Agreed statement concerning Article 6 of the WCT.

  125. 125.

    Art 5(1) of the Information Society Directive.

  126. 126.

    Van Coppenhagen (2002), p. 435.

  127. 127.

    Preamble 33 preceding to the Information Society Directive.

  128. 128.

    S 17(6) of the CDPA 1988.

  129. 129.

    S 28A.

  130. 130.

    Dreier and Hugenholtz (2006), p. 371.

  131. 131.

    Harper (1994).

  132. 132.

    Harper (1994).

  133. 133.

    Art 19(1) of Federal Law on Copyright and Neighboring Rights of 9 October 1992, as last amended on 16 December 1994 (WIPO English version).

  134. 134.

    Tremlett (2006).

  135. 135.

    S 53(5) Law on Copyright and Neighboring Rights of 9 September 1965 (Federal Law Gazette [BGBl] Pt I 1273), last amended on 8 May 1998 ([BGBl] Pt I 1014) (WIPO English version).

  136. 136.

    Art 12(3) of Act on Copyright in Literary and Artistic Works of 30 December 1960 No 729, last amended on 1 July 2005 (WIPO English version).

  137. 137.

    Art 12 of Protection of Copyright and Rights Related to Its Exercise of 22 April 1941 No. 633, as last amended on 30 April 2010 (WIPO English version).

  138. 138.

    Clark (1996), p. 139.

  139. 139.

    Clark (1996), p. 139. Also see Chong et al. (2003), pp. 434–435. The authors proposed a licence named LicenseScript Engine allowing users to assert new rights in a licence issued by a copyright owner as well as allowing the copyright owner to monitor asserted rights and subsequent usage of the work by an audit logging mechanism. The copyright owner can allow or disallow the asserted rights and bring an action against any subsequent user. However, it is unclear what rights a user enjoys if the final decision is subject to the copyright owner’s discretion.

  140. 140.

    Geiger (2006a, b), p. 372.

  141. 141.

    Geiger et al. (2008), p. 685.

  142. 142.

    Gasser and Ernst (2006), p. 11.

  143. 143.

    11.

  144. 144.

    Art 9(2) of the Berne Convention provides:

    It shall be a matter for legislation in the countries of the Union to permit the reproduction of such works in certain special cases, provided that such reproduction does not conflict with a normal exploitation of the work and does not unreasonably prejudice the legitimate interests of the author.

  145. 145.

    A good number of scholars have suggested adopting a non-voluntary licensing system to address the copyright issues caused by P2P technology. For example, see Netanel (2003), p. 19; Fisher (2004), pp. 199–251 and Lessig (2001), p. 254.

  146. 146.

    For example, the German Supreme Court had private copying levies from the 1950s to 1960s in a series of cases. The manufacturers and distributors of recording equipment were considered to have contributory liability in copyright infringement cases. More recently levies have been imposed on digital media such as CD-ROMs and even digital equipment, see Senftleben (2004), pp. 11–12 and 37.

  147. 147.

    Senftleben (2004), p. 37.

  148. 148.

    Senftleben (2004), p. 34. Also see Reinbothe (2003).

  149. 149.

    Art 5(2)(b) of the Information Society Directive states:

    in respect of reproductions on any medium made by a natural person for private use and for ends that are neither directly nor indirectly commercial, on condition that the rightholders receive fair compensation which takes account of the application or non-application of technological measures referred to in Article 6 to the work or subject-matter concerned.

  150. 150.

    Council Directive 92/100/EEC of 19 November 1992 on rental right and lending right and on certain rights related to copyright in the field of intellectual property.

  151. 151.

    Preamble 35 of the Information Society Directive states:

    In cases where rightholders have already received payment in some other form, for instance as part of a licence fee, no specific or separate payment may be due. The level of fair compensation should take full account of the degree of use of technological protection measures referred to in this Directive. In certain situations where the prejudice to the rightholder would be minimal, no obligation for payment may arise.

  152. 152.

    Preamble 35. Activities with little effect on right owners’ economic benefits include recording broadcasts for later perusal, and converting the format of a copyrighted work to play it on different platforms as long as the material is legally acquired. However, the de minimis rule is eroded in Bridgeport Music Inc. v Dimension Films 410 F3d 792 (6th Cir 2005). The Court of Appeals held usage of any section of a music work, even sampling a two-second chord, would be in violation of copyright unless the copyright owner gave permission and was compensated. This decision is deemed to have extremely adverse effect on the balance between creativity and copyright protection, see Free Expression Policy Project (2005).

  153. 153.

    Preamble 36.

  154. 154.

    Preamble 40–41.

  155. 155.

    Hugenholtz (1996), p. 83.

  156. 156.

    Art 11 of the Berne Convention.

  157. 157.

    Art 11ter.

  158. 158.

    Arts 11bis & 11ter.

  159. 159.

    Art 11.

  160. 160.

    Arts 11ter & 14.

  161. 161.

    Art 8 of the WCT.

  162. 162.

    Ginsburg (2004), pp. 234–247.

  163. 163.

    Ginsburg (2004), pp. 235–236.

  164. 164.

    Art 11bis of the Berne Convention.

  165. 165.

    Ginsburg (2004), p. 241 and Reinbothe and von Lewinski (2002), p. 103.

  166. 166.

    Ginsburg (2004), p. 244.

  167. 167.

    Ginsburg (2004), p. 244.

  168. 168.

    Agreed statement concerning Article 8 of the WCT.

  169. 169.

    Ginsburg (2004), p. 243.

  170. 170.

    Nimmer and Nimmer (2003) ch 12 B.05[A][2].

  171. 171.

    Amendments of the CDPA SI 2003/2498.

  172. 172.

    S 4 of the Copyright and Related Rights Regulations.

  173. 173.

    S 20 of the CDPA.

  174. 174.

    MacQueen and Waelde (2006), p. 11.

  175. 175.

    Schlosser (2001), pp. 15–25.

  176. 176.

    Molz (1994), pp. 71 and 93.

  177. 177.

    For software is an important means to carry information, see Brandy et al. (1991), p. 81. Software also is important for the library collection, see Klinefelter (1997), p. 222.

  178. 178.

    The Computer Software Rental Amendments Act of 1990: The Nonprofit Library Lending Exemption to the ‘Rental Right’ (1994) (Register’s Report), pp. 35–36.

  179. 179.

    Computer Software Amendments Act 1990, Pub L No 101-650, 104 Stat 5089, tit VIII.

  180. 180.

    Klinefelter (1997), p. 219.

  181. 181.

    S 802 of the Computer Software Amendments Act 1990.

  182. 182.

    Klinefelter (1997), p. 220.

  183. 183.

    Klinefelter (1997), p. 220.

  184. 184.

    Chafee (1928), p. 982.

  185. 185.

    Register’s Report 35-36.

  186. 186.

    EC Directive 2002/38/EC of 7 May 2002, amending and amending temporarily Directive 77/388/EEC as regards the value added tax arrangements applicable to radio and television broadcasting, see Annex.

  187. 187.

    Boyce (1997), p. 442.

  188. 188.

    See American Geophysical Union v Texaco Inc. 802 F Supp 1 (SDNY 1992) 26; American Geophysical Union v Texaco Inc. 37 F 3d 881 (2nd Cir 1994) 896.

  189. 189.

    Boyce (1997), p. 445.

  190. 190.

    Boyce (1997), p. 442. Moreover, the on-demand service’s pay-per-view format limits users’ ability to copy a copyrighted work even though they can access the work, see Harnad (1996), p. 120.

  191. 191.

    Boyce (1997), p. 447.

  192. 192.

    Boyce (1997), pp. 446–447. Having considered several ways to amend the copyright law, Boyce finally came to a radical conclusion that to promote science and learning, copyright should be abolished from applying to learning literature.

  193. 193.

    Bennett and Matheson (1992), p. 36.

  194. 194.

    Hilty (2007), p. 329.

  195. 195.

    Hilty (2007), pp. 324–327.

  196. 196.

    Visser (2007).

  197. 197.

    Hilty (2007), p. 329.

  198. 198.

    Hilty (2007), p. 350.

  199. 199.

    Hilty (2007), p. 446. ASCAP protects rights of its members including composers, songwriters, lyricists and music publishers by licensing and distributing royalties for non-dramatic public performances of their copyrighted works. ASCAP functions as an intermediary between copyright proprietors and users.

  200. 200.

    Hilty (2007), p. 446.

  201. 201.

    Hilty (2007), p. 447.

  202. 202.

    McClure (1997), p. 186.

  203. 203.

    Ensign (1997), p. 155.

  204. 204.

    Roche (1993), p. 12 and Alexander (1995), p. 489.

  205. 205.

    Alexander (1995), p. 489.

  206. 206.

    Ensign (1997), pp. 156–158.

  207. 207.

    S 108 of the Copyright Act of 1976.

  208. 208.

    S 108(a).

  209. 209.

    S 108(g).

  210. 210.

    S 109(b)(1)(A).

  211. 211.

    S 107(3). For example, in Radji v Khakbaz 607 F Supp 1296 (DCDC 1985) 1302, the court held that the defendant’s argument of the insignificant portion (2.6%) of the work that was used was ‘frivolous’. It stated:

    [i]t obviously does not matter, in law, what proportion of a particular publication consists of bootleg material; what is significant is how much of a copyrighted article or book is being reprinted.

    In Basic Books Inc. v Kinko’s Graphics Corp 758 F Supp 1522 (SNDY 1991) 1533, the Court emphasised how substantial what is being copied is more decisive than the length of the copied piece. The copying of a mediocre long paragraph might not be copyright infringement but the copying of a short essential piece would be an infringement. In the Basic Books case, the reproduction of 5% of the work was considered sufficient to constitute a copyright infringement, at 1527.

  212. 212.

    Ensign (1997), p. 63.

  213. 213.

    157–158.

  214. 214.

    Section 109(b)(1)(A) of the Copyright Act of 1976.

  215. 215.

    Crews (1997), p. 390.

  216. 216.

    Ss 110(3) & 110(9) of the Copyright Act of 1976.

  217. 217.

    Crews (1997), p. 391.

  218. 218.

    S 110(2)(C)(i) of Copyright Act 1976.

  219. 219.

    Crews (1997), pp. 391–392.

  220. 220.

    Lutzker (2003), p. 253.

  221. 221.

    S 112(b)(1) of the Copyright Act of 1976.

  222. 222.

    S 112(b)(2).

  223. 223.

    Crews (1997), p. 392. Boyce suggested in order to encourage learning as well as distance education, non-profit organisations should be allowed to display or reproduce copyrighted materials for instructional purpose, see Boyce (1997), p. 446. See also Wynbrandt (1990), pp. 224–225.

  224. 224.

    Crews (1997), p. 392.

  225. 225.

    However, policymakers favoured copyright proprietors by granting them exclusive control of transmitting their works; see Intellectual Property and the National Information Infrastructure 95–96 and 213–218.

  226. 226.

    Pub L No 107-273, 116 Stat 1758.

  227. 227.

    Crews ‘New Copyright Law for Distance Education: The Meaning and Importance of the TEACH Act’ American Library Association.

  228. 228.

    Art 12(2) of the E-Commerce Directive.

  229. 229.

    S 512(c) of OCILLA.

  230. 230.

    S 512(g).

  231. 231.

    Stratton Oakmont Inc. v Prodigy Services Co 1995 WL 323710 (NY Sup Ct).

  232. 232.

    Cubby Inc. v CompuServe Inc. No 90 Civ 6571 (PKL), 776 F Supp 135 (SDNY1991).

  233. 233.

    Business Wire ‘EMI Music Launches DRM-free Superior Sound Quality Downloads across Its Entire Digital Repertoire’ (2007).

  234. 234.

    Business Wire ‘EMI Music Launches DRM-free Superior Sound Quality Downloads across Its Entire Digital Repertoire’.

  235. 235.

    Downloading music has not significantly reduced the sale of CDs, see Liebowitz (2003), p. 9.

  236. 236.

    Takeyama (2003), p. 62. Since some works may be copied more frequently than others, copyright proprietors charge for the more frequently copied works at a higher price to indirectly obtain revenue from copies made from them, see Liebowitz (2003), p. 13.

  237. 237.

    Takeyama (2003), p. 62.

  238. 238.

    Business Wire ‘EMI Music Launches DRM-free Superior Sound Quality Downloads across Its Entire Digital Repertoire’.

  239. 239.

    Lessig (2001), pp. 12–13.

  240. 240.

    Alternatively, musicians can, on their own, sell their CDs and other tangible products directly in online shops, or distribute their music online via digital transmission technology. See Regner (2003), p. 111. The author suggests a concentrated music industry is not the only efficient way to distribute music and collect royalties for artists with digital technology. Instead, artists should consider managing their works with the assistance of technology.

  241. 241.

    Liebowitz (2005), p. 42.

  242. 242.

    Liebowitz (2005), p. 42. Quality sound tracks sold at $1.29 without a DRM restriction while standard sound tracks sold at $0.99 with DRM applied.

  243. 243.

    Tummon (2008).

  244. 244.

    Belleflamme (2003), p. 50.

  245. 245.

    A&M Records Inc. v Napster Inc. 284 F 3d 1091 (9th Cir 2002).

  246. 246.

    In re Aimster Copyright Litigation 334 F 3d 643 (7th Cir 2003).

References

  • Akester P, Akester R (2006) Digital rights management in the 21st century. Eur Intellect Prop Rev 28(3):159

    Google Scholar 

  • Alexander AW (1995) Prices of US and foreign published materials. In: Barr C (ed) The Bowker annual of library & book trade almanac, 40th edn. R R Bowker, New Providence

    Google Scholar 

  • Belleflamme P (2003) Pricing information goods in the presence of copying. In: Gordon WJ, Watt W (eds) The economics of copyright: developments in research and analysis. Edward Elgar, Cheltenham

    Google Scholar 

  • Bennett S, Matheson N (1992) Scholarly articles: valuable commodities for universities. Chronicle of Higher Education

    Google Scholar 

  • Bitton M (2006) A new outlook on the economic dimension of the database protection debate. IDEA J Law Technol 47(2):93

    Google Scholar 

  • Black EJ (1997) President of the computer and communications industry association on-line copyright liability limitation act: hearing before the subcommittee on courts and intellectual property of the committee on the judiciary 105th Cong

    Google Scholar 

  • Boyce BR (1997) In: Gasaway LN (ed) Does faculty assignment of copyright violate the constitutional mandate? Fred B Rothman & Co, Littleton

    Google Scholar 

  • Brandy ML, Rockman IF, Walch DB (1991) Software for patron use in libraries: physical access. Libr Trends 40:63

    Google Scholar 

  • Burk DL (2002) Anticircumvention misuse. Univ Calif Los Angeles Law Rev 50:1095

    Google Scholar 

  • Burk D, Cohen J (2001) Fair use infrastructure for rights management systems. Harv J Law Technol 15:41

    Google Scholar 

  • Business Wire “EMI Music Launches DRM-free Superior Sound Quality Downloads across Its Entire Digital Repertoire” (2007) Mobility tech zone. http://www.mobilitytechzone.com/news/2007/04/02/2457667.htm. Accessed 27 Aug 2017

  • Chafee Z (1928) Equitable servitudes on chattels. Harv Law Rev 41(8):945

    Google Scholar 

  • Chong CN, Etalle S, Hartel PH, Law YW (2003) Approximating fair use in licensescript. In: Sembok TMT, Zaman HB, Chen H, Urs SR, Myaeng SH (eds) Digital libraries: technology and management of indigenous knowledge for global access: 6th international conference on Asian digital libraries, ICADL 2003, Kuala Lumpur, Malaysia, December 8–12, 2003: proceedings. Springer, Berlin

    Google Scholar 

  • Clark C (1995) The publisher in the digital world. In: Brunnstein K, Sint PP (eds) Proceedings of the conference on intellectual property rights and new technologies. Oldenbourg, Munchen

    Google Scholar 

  • Clark C (1996) The answer to the machine is in the machine. In: Hugenholtz PB (ed) The future of copyright in a digital environment. Kluwer Law International, The Hague

    Google Scholar 

  • Cohen JE (1994) Reverse engineering and the rise of electronic vigilantism: intellectual property implications of ‘Lock-Out’ programs. South Calif Law Rev 68:1091

    Google Scholar 

  • Cohen JE (1997) Some reflections on copyright management systems and laws designed to protect them. Berkeley Technol Law J 12:161

    Google Scholar 

  • Cohen JE, Loren LP, Okediji RL, O’Rourke MA (eds) (2006) Copyright in a global information economy. Aspen Publishers, New York

    Google Scholar 

  • Copyright Office (US) The Digital Millennium Copyright Act of 1998: US Copyright Office Summary (US: Copyright Office, December 1998) http://www.copyright.gov/legislation/dmca.pdf. Assessed 27 Aug 2017

  • Crews KD (1997) Copyright and distance education: displays, performances, and the limitations of current law. In: Gasaway LN (ed) Growing pains: adapting copyright for libraries, education and society. Fred B Rothman & Co, Littleton

    Google Scholar 

  • Crews KD, New copyright law for distance education: the meaning and importance of the TEACH act. American Library Association. http://www.ala.org/advocacy/copyright/teachact/distanceeducation. Accessed 27 Aug 2017

  • Dreier T (1995) Developments and perspectives of copyright: from Gutenberg to data highways. In: Brunnstein K, Sint PR (eds) Proceedings of the conference on intellectual property rights and new technologies, p 31

    Google Scholar 

  • Dreier T, Hugenholtz B (eds) (2006) Concise European copyright law. Kluwer Law International, The Hague

    Google Scholar 

  • Dusollier S (2005) Technology as an imperative for regulating copyright: from the public exploitation to the private use of the work. Eur Intellect Prop Rev:201

    Google Scholar 

  • Effross WA (1997) The legal architecture of virtual stores: world wide web sites and the uniform commercial code. San Diego Law Rev 34:1263

    Google Scholar 

  • Elkin-Koren N (1997) Copyright policy and the limits of freedom of contract. Berkeley Technol Law J 12:93

    Google Scholar 

  • Ensign DJ (1997) Resource sharing and copyright among library consortia members. In: Gasaway (ed) Growing pains: adapting copyright for libraries, education and society. FB Rothman & Co, Littleton

    Google Scholar 

  • Ficsor M (2002) The law of copyright and the internet: the 1996 WIPO treaties, their interpretation and implementation. Oxford University Press, Oxford

    Google Scholar 

  • Fisher WW (2004) Promises to keep: technology, law, and the future of entertainment. Stanford University Press, California, pp 199–251

    Google Scholar 

  • Free Expression Policy Project (2005) Appeals court reaffirms its tone-deaf approach to music sampling. Free Express Policy Project. http://www.fepproject.org/news/bridgeport.html. Accessed 27 Aug 2017

  • Gasaway LN (2002) The new access right and its impact on libraries and library users. J Intell Prop Law 10:269

    Google Scholar 

  • Gasaway LN, Wiant SK (1994) Libraries and copyright: a guide to copyright law in the 1990s. Special Libraries Association, Washington

    Google Scholar 

  • Gasser U (2006) Legal frameworks and technological protection of digital content: moving forward towards a best practice model. Fordham Intell Prop Media Entertain Law J 17:39

    Google Scholar 

  • Gasser U, Ernst S (2006) “EUCD best practice guide: implementing the EU copyright directive in the digital age” (December 2006) U of St Gallen Law & Economics Working Paper No. 2007–01; Berkman Center Research Publication No. 2006–10

    Google Scholar 

  • Gasser U, Girsberger M (2004) Transposing the copyright directive: legal protection of technological measures in EU-member states: a genie stuck in the bottle? Berkman Publication Series No 2004-10. http://cyber.law.harvard.edu/home/2004-10. Assessed 27 Aug 2017

  • Geiger C (2006a) Copyright and free access to information: for a fair balance of interests in a globalised world. Eur Intellect Prop Rev 28(7):366

    Google Scholar 

  • Geiger C (2006b) The three-step test, a threat to a balanced copyright law? Int Rev Intell Prop Compet Law 37(6):683

    Google Scholar 

  • Geiger C, Griffiths J, Hilty RM (2008) Towards a balanced interpretation of the ‘Three-step Test’ in copyright law. Eur Intellect Prop Rev 30:489

    Google Scholar 

  • Ginsburg J (2001) Columbia Law Rev:1613–1648

    Google Scholar 

  • Ginsburg JC (2002a–2003) From having copies to experiencing works: the development of an access right in US copyright law. J Copyr Soc USA 53:113

    Google Scholar 

  • Ginsburg L (2002b) Anti-circumvention rules and fair use. UCLA J Law Technol:4

    Google Scholar 

  • Ginsburg JC (2004) The (new?) right of making available to the public. In: Vaver DV, Bently L (eds) Intellectual property in the new millennium: essays in honour of William R Cornish. Cambridge University Press, Cambridge

    Google Scholar 

  • Graham LD, Zerbe RO Jr (1996) Economically efficient treatment of computer software: reverse engineering, protection, and disclosure. Rutgers Comp Technol Law J 22:61

    Google Scholar 

  • Guibault LMCR (2002) Copyright limitations and contracts: an analysis of the contractual overridability of limitations on copyright. Kluwer Law International, London

    Google Scholar 

  • Guibault LMCR (2003) The reprography levies across the European Union. Institute for Information Law. http://www.ivir.nl/publications/guibault/introconcl.pdf. Assessed 27 Aug 2017

  • Hardy IT (1995) Contracts, copyright and preemption in a digital world. Richmond J Law Technol 1:2

    Google Scholar 

  • Hardy T (1996) Property (and copyright) in cyberspace. Univ Chicago Leg Forum 217:217

    Google Scholar 

  • Harnad S (1996) Implementing peer review on the net: scientific quality control in scholarly electronic journals. In: Peek R, Newby G (eds) Scholarly publishing: the electronic frontier. MIT Press, Cambridge

    Google Scholar 

  • Harper G (1994) Will we need fair use in the twenty-first century? University of Texas Libraries. http://www.utsystem.edu/ogc/intellectualproperty/fair_use.htm. Accessed 27 Aug 2017

  • Hartzog WN (2005) Falling on deaf ears: is the ‘Fail-Safe’ triennial exemption provision in the digital millennium copyright act effective in protecting fair use? J Intell Prop Law 12(2):309

    Google Scholar 

  • Hatch OG (1997–1998) Toward a principled approach to copyright legislation at the turn of the millennium. Univ Pittsbg Law Rev 59:719

    Google Scholar 

  • Hecht JDM (2004) Reconciling software technology and anti-circumvention provisions in the digital millenium copyright act. UCLA J Law Technol:3

    Google Scholar 

  • Heide T (2000–2001) Copyright in the EU and United States: what ‘Access Right’? Eur Intellect Prop Rev 48:469

    Google Scholar 

  • Hemnes TMS (1993–1994) Restraints on alienation, equitable servitudes, and the feudal nature of computer software licensing. Denver Univ Law Rev 71:577

    Google Scholar 

  • Hilty R (2007) Copyright law and scientific research. In: Torresmans PL (ed) Copyright law: a handbook of contemporary research. Edward Elgar, Cheltenham

    Google Scholar 

  • Hollaar LA (2002) Legal protection of digital information. Bureau of National Affairs, Washington

    Google Scholar 

  • HR 94-1476, 94th Cong (1976)

    Google Scholar 

  • Hugenholtz PB (1996) Adapting copyright to the information superhighway. In: Hugenholtz PB (ed) The future of copyright in a digital environment. Kluwer Law International, The Hague

    Google Scholar 

  • Hugenholtz PB, Guibault L, van Geffen S (2003) The future of levies in a digital environment: final report. Institute for Information Law, Amsterdam. http://www.ivir.nl/publications/other/DRM&levies-report.pdf. Accessed 27 Aug 2017

    Google Scholar 

  • Jaccard MA (1997) Securing copyright in transnational cyberspace: the case for contracting with potential infringers. Columbia J Transnat Law 35:619

    Google Scholar 

  • Jaszi P (1996) Caught in the net of copyright. Oreg Law Rev 75:299

    Google Scholar 

  • Johnson-Laird A (1993–1994) Software reverse engineering in the real world. Univ Dayton Law Rev 19:843

    Google Scholar 

  • Karjala DS (1994) Copyright protection of computer documents, reverse engineering, and Professor Miller. Univ Dayton Law Rev 19:975

    Google Scholar 

  • Karjala DS (1996–1997) Federal preemption of shrinkwrap and on-line licenses. Univ Dayton Law Rev 22:511

    Google Scholar 

  • Kerr IR, Maurushat A, Tacit CS (2002–2003) Technical protection measures: tilting at copyright’s windmill. Ottawa Law Rev 34:7

    Google Scholar 

  • Klinefelter A (1997) The circulation of software by libraries. In: Gasaway LN (ed) Growing pains: adapting copyright for libraries, education and society. Fred B Rothman & Co, Littleton

    Google Scholar 

  • Koelman KJ (2000) A hard nut to crack: the protection of technological measures. Eur Intellect Prop Rev 6:272

    Google Scholar 

  • Kreiss RA (1995–1996) Accessibility and commercialization in copyright theory. Univ Calif Los Angeles Law Rev 43:1

    Google Scholar 

  • Kretschmer M (2003) Digital copyright: the end of an era. Eur Intellect Prop Rev 25:333

    Google Scholar 

  • Kurtz LA (1996) Copyright and the National Information Infrastructure in the United States. Eur Intellect Prop Rev 18:120

    Google Scholar 

  • Lai S (1998) The impact of the recent WIPO copyright treaty and other initiatives on software copyright in the United Kingdom. Intellect Prop Q 1:35

    Google Scholar 

  • Legal Information Institute “Uniform Commercial Code” Cornell University Law School. http://www.law.cornell.edu/ucc/. Accessed 27 Aug 2017

  • Lehman BA (1995) The report of the working group on intellectual property rights. Information Infrastructure Task Force, Washington

    Google Scholar 

  • Lemley MA (1996–1997) The economics of improvement in intellectual property law. Texas Law Rev 75:989

    Google Scholar 

  • Lemley MA (1999) Beyond preemption: the law and policy of intellectual property licensing. Calif Law Rev 87(1):111

    Google Scholar 

  • Lessig L (2001) The future of ideas: the fate of the commons in a connected world. Random House, New York

    Google Scholar 

  • Lewis M (2000) Metallica sues napster, universities, citing copyright infringement and RICO violations. LiveDaily. http://www.livedaily.com/news/781.html. Accessed 27 Aug 2017

  • Liebowitz SJ (2003) Back to the future: can copyright owners appropriate revenues in the face of new copying technologies? In: Gordon WJ, Watt R (eds) The economics of copyright: developments in research and analysis. Edward Elgar, Cheltenham

    Google Scholar 

  • Liebowitz SJ (2005) MP3s and copyright collectives: a cure worse than the disease? In: Takeyama LN, Gordon WJ, Towse R (eds) Developments in the economics of copyright: research and analysis. Edward Elgar, Cheltenham

    Google Scholar 

  • Lipton JD (2005) Solving the digital piracy puzzle: disaggregating fair use from the DMCA’s anti-device provisions. Harv J Law Technol 19(1):111

    Google Scholar 

  • Litman JD (1994–1995) The exclusive right to read. Cardozo Arts Entertain Law J 13:29

    Google Scholar 

  • Litman J (2001) Digital copyright: protecting intellectual property on the internet. Prometheus Books, Amherst

    Google Scholar 

  • Liu J (2004) Regulatory copyright. N C Law Rev 83(1):87

    Google Scholar 

  • Luo L (2006) Legal protection of technological measures in China. Eur Intellect Prop Rev 28:100

    Google Scholar 

  • Lutzker AP (2003) Content rights for creative professionals: copyrights and trademarks in a digital age, 2nd edn. Focal Press, Waltham

    Google Scholar 

  • MacQueen H, Waelde C (2006) UK copyright law in the digital environment. Electron J Comp Law 10(3):1. http://www.ejcl.org/103/art103-10.pdf. Accessed 27 Aug 2017

  • McClure LW (1997) Interlibrary loan in the electronic world. In: Gasaway LN (ed) Growing pains: adapting copyright for libraries, education and society. Fred B Rothman & Co, Littleton

    Google Scholar 

  • Minassian A (1997–1998) The death of copyright: enforceability of shrinkwrap licensing agreements. Univ Calif Los Angeles Law Rev 45:569

    Google Scholar 

  • Molz RK (1994) The public library inquiry as public policy research. Libr Cult 29(1):61

    Google Scholar 

  • Netanel NW (1996) Copyright and a democratic civil society. Yale Law J 106(2):283

    Google Scholar 

  • Netanel NW (2003) Impose a noncommercial use levy to allow free peer-to-peer file sharing. Harv J Law Technol 17:1

    Google Scholar 

  • Nimmer MB, Nimmer D (2003) Nimmer on copyright, vol 3. LexisNexis, Los Angeles. ch 12 B.05[A][2]

    Google Scholar 

  • O’Rourke MA (1995) Drawing the boundary between copyright and contract: copyright preemption of software license terms. Duke Law J 45(3):479

    Google Scholar 

  • Peters, Register of Copyrights, Copyright Office of the United States in On-Line Copyright Liability Limitation Act: Hearing before the Subcommittee on Courts and Intellectual Property of the Committee on the Judiciary 105th Cong (1997)

    Google Scholar 

  • Poynder R (2001) The answer to the machine is the machine. In: Poynder R (ed) Caught in a web, intellectual property in cyberspace. Derwent/Thomson Scientific, London

    Google Scholar 

  • Radin MJ, Wagner RP (1998) The myth of private ordering: rediscovering legal realism in cyberspace. Chicago-Kent Law Rev 73:1295

    Google Scholar 

  • Regner T (2003) Innovation of music. In: Gordon WJ, Watt R (eds) The economics of copyright: developments in research and analysis. Edward Elgar, Cheltenham

    Google Scholar 

  • Reichman JH, Franklin JA (1999) Privately legislated intellectual property rights: reconciling freedom of contract with public good uses of information. Univ Pa Law Rev 147(4):875

    Google Scholar 

  • Reinbothe J, von Lewinski S (2002) The WIPO treaties 1996: the WIPO copyright treaty and the WIPO performances and phonograms treaty: commentary and legal analysis. Butterworths Canada, Markham

    Google Scholar 

  • Reinbothe J (2003) Private copying, levies and DRMs, against the background of the EU copyright framework. Presentation delivered at the Conference on The Compatibility of DRM and Levies, Brussels. http://ec.europa.eu/internal_market/copyright/documents/2003-speech-reinbothe_en.htm. Accessed 27 Aug 2017

  • Rice DA (1992) Public goods, private contract and public policy: federal preemption of software license prohibitions against reverse engineering. Univ Pittsbg Law Rev 53:543

    Google Scholar 

  • Rice DA (1994) Sega and beyond: a beacon for fair use analysis … at least as far as it goes. Univ Dayton Law Rev 19:1131

    Google Scholar 

  • Roche MM (1993) ARL/RLG interlibrary loan cost study: a joint effort by the Association of Research Libraries and the Research Libraries Group. Association of Research Libraries, Washington

    Google Scholar 

  • Samuelson P (1993) Fair use for computer programs and other copyrightable works in digital form: the implications of Sony, Galoob and Sega. J Intell Prop Law 1:49

    Google Scholar 

  • Samuelson P (1996) The Copyright Grab 4.01 Wired, p 134

    Google Scholar 

  • Samuelson P (1999) Intellectual property and the digital economy: why the anti-circumvention regulations need to be revised. Berkeley Technol Law J 14:519

    Google Scholar 

  • Samuelson P (2001a) Anticircumvention rules: threat to science. Science 293:2028

    Google Scholar 

  • Samuelson P (2001b) Towards more sensible anti-circumvention regulations. 1962 Financial cryptography: lecture notes in computer science. http://people.ischool.berkeley.edu/~pam/papers/fincrypt2.pdf. Accessed 27 Aug 2017

  • Samuelson P (2015) Freedom to Tinker. Theoretical inquiries in law, Forthcoming; available at SSRN: http://ssrn.com/abstract=2605195SS. Accessed 27 July 2016

  • Schlosser SM (2001) The high price of (criticizing) coffee: the chilling effect of the federal trademark dilution act on corporate parody. Ariz Law Rev 43(4):931

    Google Scholar 

  • Senftleben M (2004) Copyright, limitations and the three-step test: an analysis of the three-step test in international and EC copyright law. In: Hugenholtz B (ed) Kluwer Law International, The Hague

    Google Scholar 

  • Shayesteh SA (1999) High-speed chase on the information superhighway: the evolution of criminal liability for internet piracy. Loy LAL Rev 33:183

    Google Scholar 

  • Stefik M (1996) Letting loose the light: igniting commerce in electronic publication. In: Stefik M (ed) Internet dreams: archetypes, myths, and metaphors, p 219

    Google Scholar 

  • Stefik MJ (1997) Shifting the possible: how trusted systems and digital property rights challenge us to rethink digital publishing. Berkeley Technol Law J 12:137

    Google Scholar 

  • Sterk SE (1985) Freedom from freedom of contract: the enduring value of servitude restrictions. Iowa Law Rev 70:615

    Google Scholar 

  • Takeyama LN (2003) Piracy, asymmetric information and product quality. In: Gordon WJ, Watt R (eds) The economics of copyright: developments in research and analysis. Edward Elgar, Cheltenham

    Google Scholar 

  • Teter TS (1993) Merger and the machines: an analysis of the pro-compatibility trend in computer software copyright cases. Stanford Law Rev 45(4):1061

    Google Scholar 

  • The Computer Software Rental Amendments Act of 1990: The Nonprofit Library Lending Exemption to the “Rental Right”: A Report on the Acting Register of Copyrights (1994) (Register’s Report)

    Google Scholar 

  • Tremlett G (2006) Spanish court rules free music downloads are legal for own use. The Guardian

    Google Scholar 

  • Tummon J (2008) The case for the death of copyright. Vancouver Sun

    Google Scholar 

  • Valenti J (1997) Chairman and CEO of the Motion Picture Association of America at on-line copyright liability limitation act: hearing before the subcommittee on courts and intellectual property of the committee on the judiciary 105th Cong

    Google Scholar 

  • Van Coppenhagen V (2002) Copyright and the WIPO copyright treaty, with specific reference to the rights applicable in a digital environment and the protection of technological measures. S Afr Law J 119:429

    Google Scholar 

  • Verstrynge JF (1992) Protecting intellectual property rights within the new pan-European framework: the case of computer software. Droit de l’informatique et des télécoms 2:6

    Google Scholar 

  • Vinje TC (1996) A brave new world for technical protection systems: will there still be room for copyright? Eur Intellect Prop Rev 8:431

    Google Scholar 

  • Vinje TC (1997) The new WIPO copyright treaty: a happy result in Geneva. Eur Intellect Prop Rev 19:230

    Google Scholar 

  • Vinje TC (2000) Should we begin digging copyright’s grave? Eur Intellect Prop Rev 22(12):551

    Google Scholar 

  • Visser C (2007) Intellectual property rights from publicly financed research: the way to research hell is paved with good intentions. S Afr Mercantile Law J 19:363

    Google Scholar 

  • Warlick JT IV (1997) A wolf in Sheep’s clothing? Information licensing and de facto copyright legislation in UCC 2B. J Copyr Soc USA 45:158

    Google Scholar 

  • Watal J (2001) Intellectual property rights in the WTO and developing countries. Kluwer International Law, The Hague

    Google Scholar 

  • WIPO Diplomatic Conference Records and Neighboring Rights I & II

    Google Scholar 

  • Wu T (2003) When code isn’t law. Va Law Rev 89(4):679

    Google Scholar 

  • Wynbrandt RA (1990) Music performance in libraries: is a license from ASCAP required? Public Libr 29:224

    Google Scholar 

  • Zetter K (2004) Hands off! that fact is mine Wired. http://www.wired.com/techbiz/media/news/2004/03/62500. Accessed 27 Aug 2017

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wang, J. (2018). The Technological Revolution and Its Impact on Copyright Law. In: Conceptualizing Copyright Exceptions in China and South Africa. China-EU Law Series, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-71831-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71831-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71830-9

  • Online ISBN: 978-3-319-71831-6

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics