1 Introduction

Law and technology have a complex relationship. Technology shapes legal development, while it is also shaped by law. The unfolding of copyright law confirms these dynamics as its development and enforcement have always been closely inspired by the technological state of the art.Footnote 1 With the emergence and sophistication of blockchain technology as well as blockchain-based smart contracts, some now perceive a new wave of technological transmutation on the horizon that could have a lasting influence on copyright law. Indeed, it is suggested that these technologies could provide new mechanisms for the management of intellectual property rights that could even take the place of current paradigms.

Copyright law has long leveraged the power of computer code to create binding norms for those that engage with related enforcement systems. Over the past decades, this objective has been achieved through reliance on Technological Protection Measures (TPMs) and Rights Management Information (RMI), two technologies that are key components of Digital Rights Management systems (DRM).Footnote 2

DRM and generally the technological enforcement of law, spurred by digitalization, datafication, and the online availability of copyrighted materials as well as ubiquitous computing, is transforming our understanding of law. Joel Reidenberg and Lawrence Lessig affirmed two decades ago that computer code is one of many forms of “law” (in the sense of normative constraints) that shape human behavior.Footnote 3 DRM can in certain scenarios be used as a behavior-constraining force given that computer code can enforce existing legal and contractual rules ex ante and in a more efficient manner.

At the same time, technology can also be relied on to circumvent existing legal protections.Footnote 4 DRM has been denoted as an additional layer of paracopyrightFootnote 5 constraints or technological self-protection – effectively creating a normative regime that can diverge from that designed by lawmakers. DRM as a matter of fact essentially may annihilate legally recognized protections such as exceptions and limitations in the EU and fair use under US copyright law.Footnote 6

As these problematic aspects of DRM attract wide consensus, blockchains and blockchain-based smart contracts are ever more frequently portrayed as the saving grace capable of using technology to enforce copyright law in a better and more balanced manner. Yet this depends on how these technologies are and will be designed. In this paper we provide an early examination of this area. Before introducing blockchain and blockchain-based smart contracts we chart the impact of digital rights management on copyright law taking into consideration the regulation provided for by international copyright treaties. These treaties opened up a tension between public and private ordering in the copyright law domain that has been replicated in national legislations. Examples will be taken from the US and European legal regimes, as they are influential illustrations of regional and national level implementations of international copyright law. Thereafter we provide an overview of the expected uses of blockchains and blockchain-based smart contracts as an alternative to current forms of DRM. The article will follow two main paths. Firstly, we will build on the experience gained so far with DRM systems to explore the delicate interplay between public and private ordering in blockchain environments. Whereas this is an important tension in copyright law, it also assumes a broader significance. In particular, we consider regulation of TPMs – de lege lata – and highlight – de lege ferenda – the need for legal rules to be technology neutral. We explore this point providing some general reflections on the implications of using code as a means of legal enforcement. Secondly, while looking at the prospects of application of blockchain technologies in the copyright domain we evaluate them particularly in relation to supporting an efficient and transparent administration of copyright and neighboring rights.

2 Digital Rights Management

In the last decades of the 20th century the information society triggered the dematerialization of copyrighted materials through digitalization while in the early 21st century datafication has reached a tipping point. This has not been without influence on copyright law. The emergence of those phenomena has caused the “fluidity” of digital subject matter leading to a paradigm shift that generated challenges for a copyright legal framework previously based on tangible assets.Footnote 7 Digital assets can, in principle, more easily be copied, mixed and shared. At the same time the dematerialization of copyrighted materials has made them more broadly accessible. This has led to a retreat of law in favor of private ordering and self-enforcement as the private sector has used the normative force of code to make it express its own interests and goals, sometimes to the detriment of public policy objectives.Footnote 8 DRM systems are a paradigmatic example of this tendency.

2.1 DRM Architecture

DRM refers to software and hardware that defines, protects and manages rules for accessing and using digital content (text, sounds, videos, etc.).Footnote 9 The first model of DRM was put forward in the late 1990s in the form of a system for controlling the distribution and use of digital material that expressed rules in machine-readable form.Footnote 10 These systems have been particularly appealing to the media industry to enforce copyright and neighboring rights protection.Footnote 11 DRM systems have evolved over time and can be used in various domains for different purposes.Footnote 12 In recent years, for example, the appeal of DRM for producers has been amplified in digital markets by the fact that the datafication and connectivity has extended DRM even to interconnected analogue products. As the Internet of Things progresses and copyright protectable software and databasesFootnote 13 become embedded in a wider range of goods the effect of DRM systems in economic and social processes may be pervasive.Footnote 14

DRM has been designed with the aim of giving right holders the broadest possible control over digital content in self-enforcing related terms and conditions of access and use.Footnote 15 For instance, DRM has been intended to support publishing and selling electronic books, digital movies, digital music, interactive games, computer software and other objects distributed in digital form.Footnote 16 Policies and business models of right holders are expressed in license agreements that leverage the exclusive rights recognized by copyright and neighboring rights to determine the rules of use of digital material. Contractual terms and conditions are translated into DRM architecture that concretely define how content can be used by third parties and restrict use possibilities accordingly.Footnote 17 Although there is no standard model of a DRM architecture, DRM solutions typically include a reference policy or business model and technical components for managing content to be protected; creating and managing licenses that specify the rules for consumption of content; tracking usage of content to ensure this is in line with license rules; and submitting packaged content for management by the DRM architecture. These components are also supported by a number of security services. The expectations on these services include guaranteeing the integrity of licenses, protecting content against tampering, authenticating consumers before protected content can be accessed, and safeguarding sensitive data at rest and in transit. These services are implemented to defend against attacks to DRM protocols, against DRM client software, and the software and hardware used to store and render the protected content.Footnote 18

Relevant components of DRM systems are technological protection measures (TPMs) and rights management information (RMI), which are both the subject of international copyright treaties.Footnote 19 TPMs include hardware and software to protect the rules and identify the content, the user’s IT system and the user him/herself. The different types of TPM all seek to provide an effective protection mechanism through which content owners may manage the use of their subject matter and access to it by third parties. TPMs can be as simple as a password system, which provides the entry of specific symbols to access a particular subject matter, or more sophisticated, capable of monitoring all conceivable uses of a work.Footnote 20 The most widely used TPMs are encryption, digital watermarking, copy control, fingerprinting, access control, authentication key management and other restrictions, all of which enforce conditions upon the users of digital subject matter. RMI is information that identifies content protected by copyright or neighboring rights, the rights owners in such content and the terms and conditions of use associated with it. It may provide the basis for user services, such as information accompanying a radio broadcast that gives right holders track and purchase details about particular songs. The WIPO Treaties protect all such RMI: information about works, phonograms and performances, as well as the identification of authors, phonogram producers, performers or other right holders. Protection also extends to information about terms and conditions of use of content. This may be either details of a license already granted or information about how and under what conditions a license can be obtained.Footnote 21

In addition, most DRM systems include certain technologies that enable the machine-readable expression of right holders’ policies, in particular rights expression languages (RELs). RELs are technical languages that have specific syntax and semantic vocabulary rules for expressing what kind of uses are permitted, forbidden or obligatory.Footnote 22 These computer markup languages express a number of permissions such as to stream, copy, delete, modify, embed, execute, export, extract, annotate, aggregate, install, backup, loan, sell, give, lease, play, print, and display in relation to a file. RELs are normally used to express rules contained in the license agreements.Footnote 23

DRM systems are variegated and their architectures are made up of many hardware and software components which are mostly proprietary and often not interoperable.Footnote 24 Interoperability of hardware and software is necessary, for example, for users to enjoy digital content from different devices.Footnote 25 For example, Netflix allows clients using a computer to watch the movies according to the licensing terms governing access and use of content and the interplay between DRM technologies that operate in their computers, the digital movie file, and on Netflix’s servers.Footnote 26 Also, Netflix’s subscribers can watch the movies with the Netflix mobile application. However, as Netflix fully relies on the Widevine DRM provided by Google,Footnote 27 it recently announced that devices that are not Google certified or have been altered will no longer work with the latest Netflix App.Footnote 28 As a result clients visiting Netflix with a device which is not fully interoperable with Netflix-streamed content cannot enjoy movies from that device. This scenario is just one example of how DRM incompatibility can hinder the enjoyment of digital subject matter.Footnote 29

The lack of interoperability is a consequence of either one company’s decision not to license its technology or, more generally, of the lack of standardization. Indeed interoperability and compatibility among different DRM systems depends on licence agreements between IT companies and standardization processes of DRM components.Footnote 30 However, establishing shared standards in the DRM domain has proven to be difficult.Footnote 31 The various existing proprietary DRM systems are often non-interoperable for at least two reasons. Firstly, companies have preferred to follow market strategies that have been aimed at not sharing some technologies with competitors. This can be seen as the consequence of incentives which strive to establish the dominating, rather an interoperable, standard and benefit from the fruits of such a monopoly (or at least market fragmentation) related to network externalities and lock-in effects.Footnote 32 Secondly, the diversity of digital content to be protected (e.g. video games, music, movies and texts) and the related variance in the relevant level of protection has made it difficult to develop a unitary standardized system.Footnote 33

However, some have argued that although lack of interoperability limits users’ experience, DRM interoperability is not always desirable.Footnote 34 To the extent that interoperability increases the network of devices and content within the reach of copyright owners, a world with interoperable DRM systems may consequently expand content control and further increase copyright owners’ control at the expense of otherwise legitimate and flexible uses. As will be explained in the following, DRMs can limit the range of uses a person can make with the digital content as a result of de facto elevation of copyright owners’ control over content.Footnote 35 In this sense, increasing interoperability between digital goods and devices should be balanced with measures allowing users’ rights to access and use digital content and flexibility. At the same time, it has been noted that, if the content industry had incentives to allow that balance among control and flexibility, then it might have incentives to develop an interoperable DRM standard, as interoperability is an important dimension of flexible use.Footnote 36

2.2 DRM Between Public and Private Ordering

DRM is an early example of how computer code can be leveraged as a means of public as well as private ordering. On the one hand, these measures give expression to elements of the copyright law regime, meaning that they are a code-based enforcement mechanism of legislative provisions providing right holders with exclusive rights. Copyright law seeks to create a balance between authors’ and users’ interests. Authors should be rewarded for their work as a means of incentivizing creativity, whereas knowledge should also be openly available.Footnote 37 As a consequence, despite recent legislative trends aimed at extending the scope and duration of copyright protection,Footnote 38 most national copyright systems recognize that copyright protection ought to be balanced with human rights, such as the right to privacy, freedom of expression, freedom of research and education, access to information and the right to participate in the cultural life of community.Footnote 39 The most important limits to copyright protection reflecting that balance include: that protection is guaranteed only if works are original; protection covers only the expressive form and not the content; the first sale doctrine and the exhaustion principle; that exclusive property rights can be subject to compulsory licenses; that exclusive rights are extinguished after a certain number of years when the subject matter of protection falls into the public domain; and copyright permitted uses such as exceptions and limitations.Footnote 40

On the other hand, DRM is a form of private ordering as the private sector has largely used these mechanisms to implement its own objectives, sometimes resulting in the disregard of legal protections such as limitations and exemptions or even in the creation of a factual exclusivity over digital subject matter not eligible for copyright protection.Footnote 41 DRM can indeed neutralize limits enshrined in law. Furthermore, in a mass-contract situation (which is the normal situation in the entertainment and culture digital market) licensors can model terms and conditions in their own favor, limiting the rights of the licensee to use the subject matter of protection.Footnote 42 Moreover, contractors in mass-markets cannot negotiate the terms of the license with the licensor individually, which has led to overly restrictive conditions.Footnote 43

With regard to copyright permitted uses, the example of academic publishing is emblematic.Footnote 44 Some publishers have converted to an e-only business supply, meaning that print versions are no longer available. Academic authors often grant publishers exclusive rights; therefore, publishers are the single source of academic subject matter and can limit use activities contractually and technically, including uses that are permissible based on statutory limitations or fair use.Footnote 45

Also, right holders offering e-books can restrict the number of times a book can be copied or printed. Alternatively, they can prohibit all copying even if the original purchaser agrees to delete their own copy.Footnote 46 Under such conditions it is impossible to transfer the e-book to third parties without transferring the reading device itself. In this business model, the exhaustion doctrine (or first-sale doctrine), which allows a book, movie or music that is legally purchased to be passed on to any third party without infringing copyright law, is challenged.Footnote 47

These examples illustrate that private ordering by code enhances the potential for abuse or misuse of an artificially created factual exclusivity. At the same time these examples also highlight that law sometimes struggles to keep up with digitalization. Going back to the example of the exhaustion doctrine (or first-sale doctrine),Footnote 48 these rules mainly reflect the widely accepted rationale of addressing the inherent contrast between exclusive rights in works and neighboring rights, and the free circulation of legally acquired goods. Exhaustion and first-sale doctrine rules were developed in a technological and economic environment in which the enjoyment and circulation of copyright-protected works presupposed their incorporation in physical carriers. These doctrines were essentially connected to the circulation of physical goods (such as, for example, books, records, etc.) and the right to enjoy the works embedded in those goods was inherent in the good itself. However, the digitalization of content has changed the modes of circulation and enjoyment of works. Both political opportunity and the legal suitability of “digital exhaustion” is challenged.Footnote 49 In this regard it has been questioned whether exhaustion rules are a better way to grant the effective operation of this area of law and businesses related thereto, creating a balance between the interests of the right owner and those of society (users). Some have recently argued that economic and legal challenges to these doctrines in the digital context provide a foundation for reconsidering exhaustion rules, suggesting that other areas of law might help in finding the abovementioned balance in the digital environment (e.g. antitrust law, consumer law).Footnote 50

2.3 Controversial Outsourcing to Private Ordering in Copyright Law

National and international law have legislated with a view to limit users’ ability to circumvent some DRM measures. The treaties on copyright and neighboring rights adopted within the framework of the World Intellectual Property Organization (WIPO) in December 1996Footnote 51 impose obligations to provide adequate legal protection and legal remedies against the circumvention of effective TPMs and the removal or alteration of RMI.Footnote 52 Attention was devoted to technological measures deployed to protect the interests of right holders.Footnote 53 These provisions parallel the substantive rules protecting copyright law and copyright neighboring rights in the sense that they safeguard the effective operation of technological means affording the exercise of copyright in the digital environment.Footnote 54 It is worth noting here that TPMs are individual technologies that protect works and other subject matter, while the term DRM, as explained above, describes more complex protection systems that use technological, contractual and statutory protection concurrently.Footnote 55 A comprehensive regulation of DRM is not provided. States fulfilling international obligations have adopted national schemes such as the US Digital Millennium Copyright ActFootnote 56 or the European Union’s Information Society Directive (InfoSoc Directive).Footnote 57 There legislative acts were enacted to implement the WIPO Treaties. Article 6 of the InfoSoc Directive contains the most general anti-circumvention provision in the European legal framework.Footnote 58 The InfoSoc Directive also harmonizes some aspects of copyright law across Europe.

US and European legislation exceeds international requirements and has been criticized for several reasons, including failing to clearly highlight the necessary functional link between technical measures protection and copyright protection.Footnote 59 The danger therefore is the excessive extension of the protection of technical measures even beyond the boundaries of exclusive rights.Footnote 60 Nonetheless, both schemes introduce strict sanctions for those who violate anti-circumvention rules.Footnote 61 Indeed, while the legal protection of technical measures is incisive, the law on the inverse situation where contracts and technical measures are used to override copyright limitations is weak. The current legislative framework does not offer effective means to limit private ordering based on contracts and technical measures, irrespective of the potential of such means to override limits to copyright exclusivity.Footnote 62

If we limit our focus to the legally permitted uses of protected subject matter (e.g. exceptions and limitations in the European legal framework and the fair use doctrine in the US), and leave aside for example the factual protection of non-protected material that should be in the public domain, one important issue is whether and how legislators reconcile legal, copyright-permitted uses with DRM. In fact, the technical prohibition of such uses – e.g. the use of works for scientific or educational purposes – is one of the typical ways in which right holders try to extend exclusivity beyond the scope intended by copyright protection.Footnote 63 Firstly, it is uncertain to what extent international copyright treaties allow contracting parties to protect technical measures, even in cases where the act of use which is prevented by such measures is permitted under a copyright limitation. It has been argued that the treaties might be interpreted as allowing the contracting parties to give preference to technical measures except in cases where the affected limitation is mandatory.Footnote 64 However, international copyright treaties provide only a few instances of mandatory copyright-permitted use.Footnote 65 At the national level, copyright legislation quite often does not provide a clear distinction as to whether a permitted use is mandatory. Derogations from copyright-permitted uses may therefore be governed by contract law, and copyright-permitted uses can be overridden through technical or contractual means (or a combination thereof).Footnote 66

Focusing on the European legal framework, the InfoSoc Directive provides very narrow and to some extent uncertain answers against the abuse of technical protection measures.Footnote 67 Article 6 of the InfoSoc Directive implements Arts. 11 WCT and 18 WPPT. As mentioned above, Art. 6(4) regulates the relationships to copyright exceptions or limitations. It is important to note first of all that Art. 6(4) specifically forbids the beneficiaries of copyright exceptions or limitations from circumventing technological measures and distributing the tools needed for such circumventions on their own. The consumer who circumvents the TPMs, even for the purpose of exerting an exception or limitation, would still be responsible for violating the anti-circumvention rules.Footnote 68 Compared to other anti-circumvention provisions around the world, the European solution is restrictive. The US, for example, has only considered the solution to exempt the user when the circumvention carried out relates to legitimate fair use.Footnote 69

Article 6(4) lists certain exceptions which Member States should ensure that their beneficiaries can enjoy even if TPMs apply.Footnote 70 More precisely, the first principle laid down in the Directive is to entrust the right holders with the task of reconciling TPMs with the safeguarding of exceptions. Adoption of “voluntary measures” by right holders appears to be the preferred solution. In the absence of “voluntary measures” taken by right holders, Member States must take appropriate measures to ensure that users can enjoy the listed exceptions, even if TPMs apply. The intervention of lawmakers is thus subsidiary to that of right holders. However, as already mentioned, the aforementioned obligation is not provided for all exceptions and limitations but only for those listed in Art. 6(4). Also, the Directive does not define the “voluntary measures” to be undertaken by right holders. Some commentators have considered “building copyright exception by design” as one example of “voluntary measures”.Footnote 71 The right holders could devise the technological measures as to accommodate some copyright exceptions and limitations. This approach, however, has been criticized with respect to its feasibility considering that copyright-permitted uses require a nuanced understanding of contextual and external circumstances which rigid computer code may be unable to replicate.Footnote 72

Further it is important to note that Art. 6(4) is very limited in scope. In fact, the limitations or exceptions to copyright listed in the InfoSoc directive are optional for Member States. If Member States do not implement exceptions under Art. 6(4), the mechanism provided for in this provision is meaningless.Footnote 73 In any case the applicability of exceptions and limitations depends directly on the methods of distribution to the public chosen by the right holder.Footnote 74 Article 6(4) establishes that where works and other subject matter have been made available on demand and access is conditioned on the formation of a contract, right holders are not obliged to undertake any activity to ensure that users can benefit from the exceptions and limitations, even though provided for by law.Footnote 75 In other words, and this is the most important restriction, Member States are not allowed to take any legislative action at all if the right holders offer technologically protected content over the Internet and access is conditional on the conclusion of an agreement.Footnote 76

This shift of copyright from public to private ordering enabled by both contracts and technological measures is highly controversial.Footnote 77 Many scholars criticized the approach of the European legislator, arguing that it conflicts with the very nature of exceptions and limitations.Footnote 78

The copyright domain accordingly confirms the ability of computer code to function as a means of private ordering. Its use has altered the factual availability of existing legal protections. It has also made possible a compression of external limits to copyright law that can be found in other fields of law such as competition law,Footnote 79 including consumer protection.Footnote 80 Right holders may in fact use DRM as a lever to influence market dynamics.Footnote 81 Code can represent a strategic barrier to entry in addition to a contract and the rules protecting the technology that facilitate its use, to erect strategic barriers even in secondary markets.Footnote 82 This has been discussed, for example, when DRM is embedded in a computer platform (think of the well-known case of video game consoles or operating systems), projecting effects both on the platform market and on the complementary goods market.Footnote 83 The technological standard may become the lever to raise barriers to market entry.Footnote 84

The use of computer code to enforce copyright legislation has accordingly generated a number of limitations and controversies. In light of such shortcomings, blockchain-based smart contracts are discussed as a new form of code to be taken into account as a potential alternative to existing systems.

3 Blockchain and Smart Contracts

In recent years, blockchain (also referred to as “Distributed Ledger Technology” or DLT) and blockchain-based smart contracts have been touted as suitable alternatives to current systems of DRM that could replace the latter.Footnote 85 Much hope is placed in these instruments in light of the controversies associated with DRM that we have outlined above. In this section we introduce these instruments before outlining associated promises.

3.1 Blockchain Technology

The first blockchain was created to provide the technical infrastructure of Bitcoin in 2009. At the time, the technology itself was considered to be merely a by-product of the cryptocurrency and the term “blockchain” does not even figure in Satoshi Nakamoto’s famous White Paper.Footnote 86 Rather than being a completely novel technology, it is better understood as an inventive combination of existing mechanisms. Indeed, nearly all of its technical components originated in academic research from the 1980s and 1990s.Footnote 87

3.1.1 Technical Primer

In essence, a blockchain is a shared and synchronized digital database that is maintained by an algorithm and stored on multiple computers such that each stores a complete copy of the database.Footnote 88 Blockchain networks achieve resilience through replication. The ledger’s data is resilient because it is simultaneously stored on many computers, so that even if one or several nodes fail, the data remains unaffected. In light of such replication, there is no single point of failure or attack at the hardware level.

The technology gets its name from the fact that it is usually ordered as a chain of blocks.Footnote 89 Each block groups together multiple transactions and is then added to the existing chain of blocks. Data is grouped into blocks that, upon reaching a certain size, are chained to the existing ledger through a hashing process.Footnote 90 The ledger’s blocks have different key components, including the hash of all transactions contained in the block (its “fingerprint”), a timestamp, and a hash of the previous block (which creates the sequential chain of blocks).Footnote 91

Because blocks are continuously added but never removed, a blockchain can be qualified as an append-only data structure. Cryptographic hash-chaining makes the log tamper-evident, which increases transparency and accountability.Footnote 92 Indeed, where the hash linking one block to another changes, the hash of that block, as well as of all subsequent blocks does, too.

The replicated data stored in blocks is synchronized through a consensus protocol that enables the distributed network to agree on the current state of the ledger in the absence of a centralized point of control.Footnote 93 Through this process, data is chronologically ordered in a manner that makes it difficult to alter data without altering subsequent blocks.

It must be noted that despite these general commonalities, blockchains vary widely in their technical and governance configurations. An important distinction is that between “public and permissionless” as well as “private and permissioned” blockchains.Footnote 94 In public and permissionless blockchains, anyone can join the ledger simply by downloading and running the relevant software – no permission is needed.Footnote 95 Moreover, anyone can download the entire ledger and view transaction data. Permissionless blockchains rely on open source software so that anyone can download it and participate in the network without the need for prior approval by a gatekeeper. Conversely, on such ledgers, transactions are publicly auditable, which ensures transparency but minimizes privacy.Footnote 96

Blockchains can, however, also be private and permissioned, which means that an administrator needs to grant permission to individuals wanting to maintain a node. The key distinction between permissioned and permissionless blockchains is indeed that while one needs access permission to join the former, this is not necessary in respect of the latter. Rather a single party or a consortium acts as a gatekeeper. Permissioned blockchains can be internal to a specific company or joint venture (which is why they are also often referred to as “private” or “enterprise” blockchains). It is accordingly important to bear in mind that there is a wide range of different blockchain technologies that may be more or less suitable for various objectives. Indeed, blockchains are better thought of as a class of technologies.

3.1.2 The Functional Perspective

For our purposes, the relevant question is not so much what blockchain is but what it can do. It is imperative to realize that blockchain is a general-purpose technology, meaning that it can be used for a wide variety of uses. This is so because it is both a database (essentially an accounting book) and a programmable platform on which other applications can run.

A blockchain is a replicated database that is updated in a decentralized manner. This database can be used independently, such as to record transactions in cryptoassets or register information, for instance in a supply chain setting. Here, the blockchain serves as a common asset registry, an innovation in database design that either directly stores data or links to data. These shared accounting systems can be used by different entities to standardize and link data and “enable credible accounting of digital events”.Footnote 97 This in turn enables the coordination of information between many stakeholders.

A distributed ledger can furthermore host a wide range of second-layer applications. The applications deployed on a DLT infrastructure reflect the underlying infrastructure’s characteristics of resilience, decentralization and tamper-evidence. While a blockchain only ever stores data, this data can represent anything we believe and agree it represents.Footnote 98 Over time, different forms of digital assets have emerged that are still nothing but raw data. Such assets can purely have on-chain value (as in Bitcoin) or be the avatar of a real-world asset, whether a good (such as a tokenFootnote 99 representing a house), a service (such as a voucher for a service) or an entitlement (such as a legal right). Blockchain is sometimes labeled “the Internet of Value” as it is expected to disrupt the online circulation of value as they allow for value-transfers that dispense of intermediaries.Footnote 100 To enable much of these projects, smart contracts are needed.

3.2 Smart Contracts

In essence, a smart contract is self-executing computer code that automatically processes its inputs when triggered. It is essentially a small computer program that is deployed on a blockchain. Thus while smart contracts are currently being avidly discussed in relation to blockchain, similar mechanisms have been used for a long time, also by DRM systems. As explained, DRM technology essentially embedded copyright law into digital files by limiting the user’s ability to view, copy, play, print, or otherwise alter the works. For example, digital audio files encrypted with DRM technology were not subject to the double-spending problem because they contained a basic smart contract, which referenced a centralized network (that is, for example, Apple’s server programmed to enforce the iTunes Store Terms and Conditions).Footnote 101 Beyond this rather basic definition there is little consensus as to what this terminology really refers.Footnote 102 It is worth noting that depending on the adopted definition, smart contracts are not necessarily linked to blockchain technology.Footnote 103 Given that they are discussed in relation to distributed ledgers in the literature we introduce below, we will also examine them as such here.

To some, a smart contract is simply a piece of computer code with specific characteristics. Vitalik Buterin portrays smart contracts as “cryptographic ‘boxes’ that contain value and only unlock it if certain conditions are met”.Footnote 104 In the blockchain context, a smart contract is “programmed logic that runs on a ledger-like distributed system in response to transaction submission”.Footnote 105 From a technical perspective, smart contracts are thus simply computer programs that can be consistently executed by a network of computers without the need for an intermediary.Footnote 106 Because of their distributed nature and thus guaranteed execution, smart contracts are resilient to tampering, which makes them appealing in many scenarios including the transfer of value.Footnote 107

Yet, because these technical tools can be relied upon to automate transactions typically governed by contract law (such as value transfers) smart contacts can be useful tools in a contractual setting. Nick Szabo indeed coined the term “smart contract” in 1994, to denote “a set of promises, specified in digital form, including protocols within which the parties perform on these promises”.Footnote 108 Szabo envisaged the creation of computer software resembling contractual clauses to connect parties in a fashion that would make it difficult for one party to unilaterally terminate an agreement.Footnote 109 Seen from this perspective, a smart contract can be a Ricardian contract, the objective of which is to create contracts that can be read by humans and machines alike.Footnote 110 Indeed to some, a smart contract is “a computer program that both expresses the contents of a contractual agreement and operates the implementation of that content, on the basis of triggers provided by the users or extracted from the environment”.Footnote 111

The main value proposition of smart contracts is that of their automated execution. As second-layer applications, smart contracts benefit from the tamper-proof nature of the underlying blockchain infrastructure that anchors their automated execution. Given that many blockchain nodes run smart contract code, it “is not controlled by – and cannot be halted by – any single party”.Footnote 112 Smart contracts execute automatically and cannot be halted unless this option is specifically built into the code.Footnote 113 This enables transactions in situations devoid of human or institutional trust, lowers transaction costs and reduces counterparty risk and interpretative uncertainty.Footnote 114 Once an agreement has been translated into code, the intervention of a party or intermediary (other than the respective oracleFootnote 115) triggering contractual execution is replaced by the software’s automated execution.

Where smart contracts are used to automate the execution of contractual obligations, performance is thus hard-wired into the code. For example, the software can be used for the automatic transfer of collateral in the event of default.Footnote 116 Automated execution of course not only provides benefits but also disadvantages. Where software executes automatically, unwanted transactions can no longer be rolled back. This can be problematic, such as when a party lacks legal capacity or a party decides to default on its obligations. Modifications, such as those mandated by law or court decisions also cannot easily be accommodated.Footnote 117 Through these characteristics, smart contracts promise to trigger efficiency gains particularly attractive in commercial settings, including in relation to copyrighted materials.

3.3 Blockchain Technologies in the Copyright Domain

The potential of blockchain as a general-purpose technology is currently being experimented with in many domains, including copyright law. Over the past months and years variegated suggestions as to how the technology could be deployed for the management of copyrighted works and neighboring rights objects have been voiced by industry and in the academic literature. In this section, we provide a cursory overview of expected application of these technologies. We organize the following overview around three main drivers leveraging the main characteristics of blockchain technologies. The first driver revolves around the potential capacity of blockchain technology to precisely identify a digital asset and thereby counter the problem of digital “fluidity”. The second driver is related to the ability of blockchain technologies to foster transparent and disintermediated transactions. The third axis focuses on the potential of blockchains to be developed as a DRM system. Finally, in the second sub-section we introduce some structural limits of blockchain technologies such as the so-called “garbage-in garbage-out” problem.

3.3.1 Prospects for Application

Firstly, it has been argued that DLT could be used to create artificial scarcity in the digital market. Indeed in the copyright domain tokens may represent various elements including a copy of a protected work.Footnote 118 This may solve a number of issues related to the fluidity of digital objects and create new business models.Footnote 119 This may lead to the commodification of digital worksFootnote 120 and thereby allowing the creation of new markets. Some projects have already been implemented, in particular in the field of artworks leveraging the fact that blockchain technologies make digital artworks more attractive for collectors.Footnote 121 It has also been speculated that these developments create the necessary preconditions for flourishing, technologically-enabled secondary markets for digital content.Footnote 122

DLT may also enable the precise tracking of certain digital assets (through tokens) that could be used as evidence of authorship and provenance. In relation to attribution, hashing can create a unique fingerprint of copyrighted material that allows verification of authorship and that the creative work existed at a given time without revealing the actual contents.Footnote 123 The hash allows monitoring of provenance in through recording ownership and usage.Footnote 124 DLT has been presented as a “revolution in how to keep track of rights”.Footnote 125 Tokens can encode information including the terms of use of protected material (such information can be mentioned under the definition of RMI).Footnote 126 For unregistered intellectual property (IP) rights such as copyright and neighboring rights, blockchain technologies offer the benefit of providing a time-stamped record of its conception, use and qualification requirements.Footnote 127 For example, the hash may facilitate evidence in court cases concerning copyright authorship and violation of the terms of use.

Blockchains’ characteristics provide an opportunity to conceive of a global registry for copyright and neighboring rights. Indeed only the existence of a global registry holding RMI would allow for the development of potential benefits into real benefits of blockchain and smart contracts as described in the following paragraph.Footnote 128 In this regard it is worth mentioning the project currently implemented by PRS for Music, ASCAP and SACEM which aims at improving data accuracy for right holders.Footnote 129 This point will be further developed in the next section.

Secondly, there is the prospect of transparency and cost savings related to smart contracts as once a user purchases the digital asset from a website, the smart contract can be triggered immediately so that all other actions – e.g. payment of royalties to right holders – are automated.Footnote 130 Combined with digital currencies, this enables micropayments, which could change pricing models in relation to copyrighted materials. Micropayments – meaning the payment of a small sum, such as EUR 0002 – is currently not an economically viable solution as transaction fees exceed the price itself. The advantages of this method are manifold: “the smart contract facilitates microtransactions at little to no fee, and payment is divided nearly instantaneously – per the strict logic of the smart contract code – and is immediately disbursed to the musicians in amounts of less than $0.01”.Footnote 131 This innovation could also serve to enable an instantaneous, fairer and transparent remuneration of authors and artists.Footnote 132 To illustrate, Ujo Music uses smart contracts to facilitate the sale of digital music files. The payment of a certain sum to download a song triggers the smart contract, which divides payment between the various contributors to the song.Footnote 133 Notably, this transaction can theoretically occur without the need for a traditional intermediary such as a publisher, a music label or performance organization.Footnote 134 Notwithstanding, these platforms still constitute a new form of for-profit intermediaries so that it is still to be determined what economic impact such solutions will eventually have. Thus blockchain promises allowing artists to independently determine prices and individually license their works in a “direct-to-fan” fashion. This appears to offer some remedies for the digital era’s challenge of easy unauthorized access to and distribution of copyrighted works.Footnote 135

Some hope that smart contracts will generate disintermediation which would affect incumbents at different levels, including: (1) publishers and music labels, (2) collective management organizations (CMOs), and (3) online platforms.Footnote 136 According to others, complete disintermediation is unlikely as blockchains may simply introduce new stakeholders.Footnote 137 In the field of online music many blockchain projects promise disintermediation between artists and audience. Yet in reality such actors can be seen as new intermediaries.Footnote 138 Indeed, while current discourse frequently envisages authors and artists themselves programming their smart contracts and thus directly defining terms of use, it appears that for numerous reasons of an economic, cultural and technological nature, this is an unrealistic prospect. Sometimes the role of intermediaries goes further than the mere management of legal tools being more related to marketing strategies. In any case, for the “direct-to-fan” model to take hold, solutions need to be devised that can provide a user-friendly form of smart contract management, which does not require the user to personally code the smart contract. It should be noted that some are already working on corresponding solutions.Footnote 139

Smart contracts may also play a role in standardizing licensing terms and conditions for copyright works across uses and jurisdictions.Footnote 140 Standardized smart contracts, the terms of which can be described in comprehensible language, augment transparency and reduce barriers to using contracts for transactions. The technology could also be used to generate custom smart contracts with the terms of license payment and even its split between various beneficiaries.Footnote 141

Thirdly, some believe that DRM itself may be disrupted by blockchain technology. A number of projects are already underway in this domain. Sony recently applied for a patent for a DRM solution based on blockchain.Footnote 142 Kodak launched a similar project, KodakOne, which is aimed specifically at photographers and agencies. Whereas over one trillion photos are uploaded to the web each year, most of them fall into the category of orphan works because it is burdensome for photographers to administer image licensing, infringement detection and reporting.Footnote 143 KodakOne seeks to change this by creating an image rights management platform, combined with tokens (to manage instantaneous royalty payments) and smart contracts (to document licenses).

These early initiatives underline that blockchain can serve to create a hard-to-amend record of initial ownership with smart contracts being encoded to license the use of copyrighted works. Here, smart contracts are deployed to automate and standardize copyright-related transactions (such as use and exploitation of content as well as remuneration) in relation to blockchain-based tokenized elements.Footnote 144 Smart contracts would be modelled to hold, execute and monitor contractual code.Footnote 145 The idea is that smart contracts would be used to establish and self-enforce copyright agreements such as licenses, and provide information about rights in copyrighted materials.Footnote 146

Highlighting that traditional DRM solutions rely on single points of failure, are expensive, can be overcome by a single hacker and interfere negatively with consumer expectations, blockchains’ resilience-through-replication is appealing. It is important to note, however, that automated licensing through smart contracts is not to be confused with traditional DRM systems which always involve control of access and use of digital subject matter. Blockchains may offer right holders greater security and stronger protections against possible attackers including copyright infringers that seek to access the digital asset. User rights would be encoded on a blockchain. Connected systems would then verify these rights and decrypt the related copyrighted content where appropriate.Footnote 147 A smart contract would then be used to allocate access to the digital asset via tokens (such as bitcoin, ether, etc.) that reside on the chain, the role of which consists in facilitating remuneration and payments.Footnote 148

Blockchains do not hold the copyrighted digital asset itselfFootnote 149 in light of the technology’s limited processing capabilities but rather facilitate a smart contract that contains information regarding related rights and permissions.Footnote 150 However, when users use a work through their device, they trigger communication with the distributed ledger. The DRM system can scan the record for the necessary permission and give the user access to the acquired work. For example, if the user has purchased a limited-duration license, the system can consult a trusted timeserver and compare the time with the contract terms coded on the blockchain and take away access once the user’s license has expired.Footnote 151 Blockchain technology could therefore control use-rights and just as is the case with current DRM systems, smart contracts do not necessarily encode legally permitted copyright uses.Footnote 152 We will return to this point in the following section.

After having summarized the main themes revolving around copyright management by means of blockchain uses, it is worth stressing some structural limitations of blockchain technologies.

3.3.2 Structural Challenges

An initial structural weakness is seen in relation to those projects that would not only use blockchain as a technical infrastructure (such as to have a time-stamp for new work) but also cryptocurrencies to support new payment structures. Here, it must be noted that a severe limitation exists in the form of the value fluctuations that at present characterize these systems. The lack of stability of cryptocurrencies indeed currently makes them unappealing for use in royalty payments.Footnote 153 While innovations such as pegged cryptocurrencies could solve this, for the time being this remains a prospect for the future.

A further partially related issue is that of network effect.Footnote 154 In order to unleash the full potential of a new blockchain-based copyright management system, it needs to be used by a large number of right owners and cover a sufficient amount of copyrighted works. As the number of users increases, the system will become even more valuable and able to attract a wider user base.Footnote 155 However, it is not yet clear what the threshold of a sufficient number of users will be in order to begin to disrupt the existing status quo.Footnote 156 Therefore in the field of copyright law, adoption is one of the challenges in the implementation of blockchain technologies.

Furthermore, blockchains are unable to solve the double-spending problem off-chain. Where the on-chain token is simply the avatar of an off-chain good, it cannot prevent that copyrighted material such as a physical book is copied or sold without updating the relevant information on the ledger. This is a serious limitation in relation to many of the projects that are currently being suggested. Once copyright is transferred outside the network, records in the ledger no longer provide a reliable certificate of ownership.Footnote 157 Many of the proposed solutions are only feasible where such out-of-system transfers are not possible.

Blockchains and blockchain-based smart contracts could moreover be used as a means of copyright infringement. Indeed, they could facilitate the distribution of infringing content in an encrypted form on a peer-to-peer network on a permanent and append-only ledger.Footnote 158Actual peer-to-peer file sharing of copies of works is difficult to realize in light of blockchains’ technical limitations so that tokenizing access to the infringing content emerges as a more attractive alternative, transaction costs permitting.

Blockchains are append-only ledgers on which information can only be changed in extraordinary circumstances. They are unable to solve the garbage-in garbage-out problem.Footnote 159 Authenticity of information that is not native to the blockchain simply cannot be guaranteed at the moment of registration.Footnote 160 This raises problems, such as where information relevant to copyrighted works is entered incorrectly (either maliciously or mistakenly). Unless technical and governance processes capable of remedying this fact are provided, this remains a severe limitation of the resulting system. It is accordingly unclear how copyright information that was entered incorrectly (whether intentionally or mistakenly) could be altered.Footnote 161 This is, of course, a general concern in relation to blockchains’ tamper-evident nature replicated the “garbage-in garbage-out problem”. Systems using these mechanisms must therefore carefully ponder how this point can be addressed in their systems and governance design.

4 Assessment

Above, we have portrayed the possible benefits and limitations of using blockchain and blockchain-based smart contracts as a means of copyright administration. These technologies raise several legal issues in the field of copyright and beyondFootnote 162 pinpointing the complex relation between copyright, technology and public policy.

It is now opportune to return to the theme of code as a means of public or private ordering examined previously. Indeed, given that these technological tools are based on computer code, just as with DRM, they have the potential to also be leveraged as a means of private ordering to the detriment of legally-protected public policy goals such as access to knowledge. Computer code is one of the many forms of law (in the sense of normative constraints) that shapes human behavior.Footnote 163 Langdon Winner exposed the “politics” of technology over three decades ago, highlighting that technological design choices become part of the wider framework for public order.Footnote 164 The malleability of computer code as a means of expressing normative objectives and constraints is accordingly well known. The normativity of computer code indeed governs the behavior of those that engage with it. Just as law, computer code is also strongly shaped by the objectives and intentions of its creators. What distinguishes both mechanisms, however, is that computer code, unlike law, is enforced in an ex ante fashion, meaning that save for the technologically skilled, those exposed to it have no option other than compliance.

The regulatory force of computer code is a central consideration to be kept in mind when pondering the implications of blockchains and blockchain-based smart contracts for copyright law and beyond. In relation to copyright, computer code has long been used as a means of regulating users’ actions.Footnote 165 We have noted above that in current DRM systems, legally-protected public policy objectives have been partly displaced. Historical experience accordingly teaches us to be alert as to how and by whom blockchain code will be used. Whereas the technology could be used to enable more decentralized and fairer means of administering rights and sharing digital content, it could also be relied on to strengthen private interests including those of (potential) new intermediaries emerging in this space.

Blockchains and smart contracts have an extraordinary regulatory capacity. First, the protocols of distributed ledgers enforce their creators’ normative choices. This can be leveraged by public and private actors alike to create an environment for transactions that adheres to specific rules, which may or may not reflect applicable law. Second, applications running on blockchains, most notably smart contracts, are self-enforcing, automating compliance with a pre-determined rule-set, the execution of which cannot be stopped.Footnote 166 The technology is thus a forceful illustration of Lessig’s “code-is-law” paradigm, highlighting that it could be used to either enforce or undermine law.

Blockchains and blockchain-based smart contracts could be employed by right holders in view of strengthening existing systems or creating new ones. For example, as mentioned above in relation to DRM there have not been incentives to create DRM architecture including copyright permitted uses thereby limiting flexibility of use of content. At the same time, in relation to DRM, there have not been private interests to converge towards a single DRM system producing at least some components based on secret technologies.Footnote 167 This was mostly due to the attempt of establishing the dominating, rather than interoperable, standard and benefiting from the advantages brought by such a market fragmentation.Footnote 168 As explained in the previous sections, DRM interoperability may be desirable to the extent digital content and devices are balanced with measures allowing users to access and use digital content according to legal copyright limitations. As interoperability is an important dimension of flexible use, if the content industry had incentives to allow the balance among control and users’ flexibility, then an interoperable DRM standard might be foreseeable.Footnote 169

These examples clearly showcase that technological infrastructure is developed according to the interests of private companies which, unless specific incentives or legislative constraints are put in place, often disregard users’ interests. These issues also remain a concern in relation to blockchain technology. For example, although there are already ongoing efforts at the level of the International Standards Organization to address standard interoperability this remains an unresolved problem.Footnote 170 Standard setting may be crucial for the establishment of a blockchain infrastructure that allows making the best use of the technology. And the public regulator may have an important role in fostering this purpose.Footnote 171

As a consequence, it is worth considering the introduction of statutory safeguards to foster copyright balance as current legal frameworks are no longer seen as sufficient to guard against misuse of technological enforcement. This has led to suggestions that lawmakers make permitted uses mandatory and irrevocable against contracts and technological self-protection.Footnote 172 Some have suggested a more radical solution in the form of a user-rights approach – a framework for analyzing limits on permissible uses set by private ordering.Footnote 173 This could restore copyright balance as users’ interests could not be threatened by expansive licenses and technological self-enforcement.

Further, proposals of “fair use by design” are suggested as a counterbalancing measure.Footnote 174 Through this approach, public policy considerations would form part of systems architecture, similarly to how the EU’s data protection framework imposes requirements on data protection by design and by default.Footnote 175 This would enable the incorporation of values into systems architecture by default.Footnote 176 Yet, there have been concerns regarding the feasibility of such approaches considering that copyright-permitted use requires a nuanced understanding of contextual and external circumstances that rigid computer code may be unable to replicate.Footnote 177 Elkin Koren, however, considers that sophisticated machine learning techniques are now capable of realizing such solutions.Footnote 178 Such algorithmic enforcement may be relied upon in the realm of blockchain technologies. Through their respective set-up, these technologies express the “code-is-law” paradigm in setting very precise rules of engagement. Time will tell whether the relevant regulatory set-up is determined by the private or public sector.

Blockchain technology, furthermore, also has the potential to be used as a public copyright blockchain registry, favoring the development of a secure global repertoire database of works and other subject matter.Footnote 179 As explained in the previous section, this would facilitate transparency, the remuneration of right holders and accessibility of works.Footnote 180 The current lack of a trustable database including RMI causes several problems such as conflicting claims on the same works and generally a lack of a share of royalties for authors, artists, songwriters and publishers. In the music industry the lack of transparency and questionable royalty trails is partly due to faulty or non-existent data or simply a lack of sharing relevant data. Using different proprietary databases, which are not interoperable with each other is one of the obstacles for data sharing.Footnote 181 Control of data and namely RMI over works and other subject matter is often perceived as a source of power.Footnote 182 At the same time getting clean metadata and reconciling against other data sources remains a massive problem for many CMOs around the word. It is no secret that CMOs have incomplete and inaccurate RMI.Footnote 183 Nonetheless there have been numerous concerted efforts to try to overcome this problem, yet all such projects have failed. It has been argued that given the interest in having a natural monopoly on data, such failures are likely due to lack of trust in the group who proposes running these projects.Footnote 184

For this reason, blockchain has potential relevance to artists, labels, publishers and major music institutions like CMOs.Footnote 185 Some consider that blockchain could take over all the functions of CMOs, making their services almost completely unnecessary.Footnote 186 Smart contracts would collect and distribute rights in almost real time according to pre-agreed rules put in place by right holders. The desirability of such a scenario, however, clashes with the various functions of CMOs,Footnote 187 which go beyond the mere management of rights.Footnote 188 CMOs indeed may assume different functions, such as the development of legal and technological tools to support authors and users, that might not have the technical skills to do so independently. Thus, the benefit of using blockchain in this context is more about reconsidering the existing copyright management systems that run through CMOs. Blockchain can support CMOsFootnote 189 which, however, will need to rethink their role.

The above highlights that the technology could enable a more disintermediated and fair era of copyright management. To illustrate, smart contract-based micropayments could trigger more efficient remuneration models for the benefit of both users and right holders, or alternatively to charge a micropayment which then goes to an intermediary every time the page of a book is turned.Footnote 190 Indeed, while some fear these tools might be used simply as a means for corporations to strengthen existing systems and power structures, a strong innovation ecosystem has emerged that strives to design smart-contracts-based solutions that would provide practical avenues of transposing the ideals of decentralization and disintermediation associated with blockchain technology to the realm of copyright management and enforcement. These include solutions whereby artists gain more control over their work. While a major concern in this domain is the inability of most individuals to code smart contracts on their own, solutions using user-friendly interfaces are emerging that would allow creators to issue content licenses or split ownership rights in a manner compliant with applicable law,Footnote 191 without reliance on centralized authorities nor the need to code related arrangements themselves.Footnote 192 If such initiatives prove to be successful they could indeed inaugurate a new era of copyright management that remedies some of the shortcomings associated with current systems.

However, as already mentioned, blockchain technologies could also be relied on to control digital assets as a stronger form of DRM. If copyrighted materials were once available unless proven to be infringing, increasingly these materials are managed by smart contracts, whether in the form of DRM or blockchain-based mechanisms. Algorithmic copyright enforcement has led to the paradigmatic change where unless explicitly authorized by the right holder any use is prohibited. This would foster the emergence of normative scenarios in which all that is not expressly forbidden is permitted.Footnote 193 Largely steered by private interests, algorithmic enforcement has changed methods of online consumption of digital content and provided pervasive control.Footnote 194 Smart contracts in the form of DRM have been widely criticized for promoting a private order that is not offset by adequate mechanisms to protect the public interest in accessing unprotected content or protected subject matter in case of permitted uses.

5 Conclusion

The origin of DRM and blockchains is noticeably distinct. Whereas the former results from industry efforts to advance corporate interests, the latter initially emerged in the peer-to-peer cryptoanarchist Bitcoin community. Nonetheless, the same points of tension that surfaced in relation to DRM and copyright law are also likely to arise in the context of copyright-management solutions grounded on blockchains and blockchain-based smart contracts. This is an important point to keep in mind as these solutions develop further. At this stage, DLT remains an immature, and hence malleable technology.Footnote 195 Current projects remain at a proof-of-concept stage, making it difficult to predict how copyright-related uses thereof will develop. The specific implications further hinge on which solutions are developed, and also on the precise configuration of the chosen DLT infrastructure. Yet, this very immaturity and related malleability also provide an opportunity to design systems wary of repeating the mistakes of the past and more capable of providing an appropriate balance of the interests of various actors. Indeed, there is a danger that blockchains, just as DRM, will be used primarily as a means of private ordering that does not account for public policy objectives. This factor must be kept in mind amidst a current rethinking of copyright rules and related discussions concerning mandatory permitted uses. Further, as blockchain standards are being developed, it is important to safeguard that such standards also promote public policy objectives. This is an important point of general significance because in the digital economy, standards increasingly take the role of law. In order to address these challenges and ensure responsible innovation, we recommend interdisciplinary research and multi-stakeholder conversations in order to make sure that these new technologies do not simply become DRM 2.0 but rather improve the current state of affairs.