Digital Millennium Copyright Act: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Removed {{worldwide}} tag. Article is about a US law.
 
Line 1: Line 1:
{{short description|United States copyright law}}
{{Refimprove|date=December 2007}}
{{pp-vandalism|small=yes}}
{{Infobox U.S. legislation|
{{Infobox U.S. legislation
fullname=To amend title 17, United States Code, to implement the [[World Intellectual Property Organization]] Copyright Treaty and Performances and Phonograms Treaty, and for other purposes.|
| fullname = To amend [[Title 17 of the United States Code|title 17, United States Code]], to implement the [[World Intellectual Property Organization]] Copyright Treaty and Performances and Phonograms Treaty, and for other purposes.
acronym=DMCA|
| acronym = DM, DMCA
enacted by=105th|
| enacted by = 105th
effective date=[[October 28]], [[1998]]|
| effective date = October 28, 1998
cite public law=Pub. L. 105-304|
| cite public law = Pub. L. 105-304
public law url=http://thomas.loc.gov/cgi-bin/toGPO/http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=105_cong_public_laws&docid=f:publ304.105.pdf|
| public law url = https://www.gpo.gov/fdsys/pkg/PLAW-105publ304/pdf/PLAW-105publ304.pdf
cite statutes at large=112 Stat. 2860 (1998)|
| cite statutes at large = {{usstat|112|2860}}
acts amended=[[Copyright Act of 1976]]|
title amended=5 (Government Organization and Employees); 17 (Copyrights); 28 (Judiciary and Judicial Procedure); 35 (Patents)|
| acts amended = [[Copyright Act of 1976]]
| title amended = 5 (Government Organization and Employees); 17 (Copyrights); 28 (Judiciary and Judicial Procedure); 35 (Patents)
sections created=17 U.S.C. §§ 512, 1201–1205, 1301–1332; 28 U.S.C. § 4001|
| sections created = 17 U.S.C. §§ 512, 1201–1205, 1301–1332; 28 U.S.C. § 4001
sections amended=17 U.S.C. §§ 101, 104, 104A, 108, 112, 114, 117, 701|
| sections amended = 17 U.S.C. §§ 101, 104, 104A, 108, 132, 114, 117, 701
leghisturl=http://thomas.loc.gov/cgi-bin/bdquery/z?d105:HR02281:@@@X|
| leghisturl = https://www.congress.gov/bill/105th-congress/house-bill/2281
introducedin=[[United States House of Representatives|House of Representatives]]|
| introducedin = [[United States House of Representatives|House of Representatives]]
introducedbill=H.R. 2281|
| introducedbill = H.R. 2281
introducedby=Rep. [[Howard Coble]] ([[United States Republican Party|R]]-[[North Carolina|NC]])|
| introducedby = [[Howard Coble]] ([[Republican Party (United States)|R]]-[[North Carolina|NC]])
introduceddate=[[July 29]], [[1997]]|
| introduceddate = July 29, 1997
committees=[[House Judiciary Committee]] (Subcommittee on Courts and Intellectual Property); [[House Commerce Committee]] (Subcommittee on Telecommunications, Trade, and Consumer Protection)|
| committees = [[United States House Committee on the Judiciary|House Judiciary Committee]] (Subcommittee on Courts and Intellectual Property); [[House Commerce Committee]] (Subcommittee on Telecommunications, Trade, and Consumer Protection)
passedbody1=[[United States House of Representatives|House]]|
| passedbody1 = [[United States House of Representatives|House]]
passeddate1=[[August 4]], [[1998]]|
| passeddate1 = August 4, 1998
passedvote1=voice vote|
| passedvote1 = [[voice vote]]
passedbody2=[[United States Senate|Senate]]|
| passedbody2 = [[United States Senate|Senate]]
passeddate2=[[September 17]], [[1998]]|
| passeddate2 = September 17, 1998
passedvote2=unanimous consent|
| passedvote2 = unanimous consent
conferencedate=[[October 8]], [[1998]]|
| conferencedate = October 8, 1998
passedbody3=[[United States Senate|Senate]]|
| passedbody3 = [[United States Senate|Senate]]
passeddate3=[[October 8]], [[1998]]|
| passeddate3 = October 8, 1998
passedvote3=unanimous consent|
| passedvote3 = consent
passedbody4=[[United States House of Representatives|House]]|
| passedbody4 = [[United States House of Representatives|House]]
passeddate4=[[October 12]], [[1998]]|
| passeddate4 = October 12, 1998
passedvote4=voice vote|
| passedvote4 = voice vote
signedpresident=[[Bill Clinton|Clinton]]|
| signedpresident = [[Bill Clinton]]
signeddate=[[October 28]], [[1998]]|
| signeddate = October 28, 1998
amendments=None|
| amendments =
| shorttitle =
| unsignedpresident =
| vetoedpresident =
}}
}}
'''The Digital Millennium Copyright Act''' (DMCA) is a [[United States]] [[copyright]] [[law]] which implements two 1996 treaties of the [[World Intellectual Property Organization]] (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures (commonly known as [[Digital Rights Management]] or DRM) that control access to copyrighted works and it also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the [[Internet]]. Passed on [[October 12]], [[1998]] by a unanimous vote in the [[U.S. Senate]] and signed into law by President [[Bill Clinton]] on [[October 28]], [[1998]], the DMCA amended [[Title 17 of the United States Code|Title 17]] of the [[United States Code]] to extend the reach of copyright, while limiting the liability of the [[Online service providers|providers of on-line services]] for [[copyright infringement]] by their users.


The '''Digital Millennium Copyright Act''' ('''DMCA''') is a 1998 United States [[copyright]] [[law]] that implements two 1996 treaties of the [[World Intellectual Property Organization]] (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to [[copyright]]ed works (commonly known as [[digital rights management]] or DRM). It also criminalizes the act of circumventing an [[access control]], whether or not there is actual [[Copyright infringement|infringement of copyright]] itself. {{Citation needed|reason=Do you have a source backing the claim that, circumvention of access control to a public domain work is punishable under DMCA|date=March 2024}} In addition, the DMCA heightens the penalties for copyright infringement on the [[Internet]].<ref>{{Cite web|url=http://www.copyright.gov/legislation/dmca.pdf|title=DMCA p7.}}</ref><ref>{{Cite web|url=https://www.govinfo.gov/content/pkg/USCODE-2010-title17/html/USCODE-2010-title17-chap5-sec506.htm|title=U.S.C. Title 17 – COPYRIGHTS|website=www.govinfo.gov}}</ref> Passed on October 12, 1998, by a unanimous vote in the [[United States Senate]] and signed into law by President [[Bill Clinton]] on October 28, 1998, the DMCA amended [[Title 17 of the United States Code]] to extend the reach of copyright, while limiting the [[Legal liability|liability]] of the [[Online service provider|providers of online services]] for copyright infringement by their users.
On [[May 22]], [[2001]], the [[European Union]] passed the [[EU Copyright Directive]] or EUCD, which addresses some of the same issues as the DMCA. But the DMCA's principal innovation in the field of copyright, the exemption from direct and indirect liability of internet service providers and other intermediaries (Title II of the DMCA), was separately addressed, and largely followed, in Europe by means of the separate [[Electronic Commerce Directive]]. ''(Unlike U.S. federal laws and regulations, the execution of European Union directives usually requires separate legislation by or within each of the Union's member states.)''

The DMCA's principal innovation in the field of copyright is the exemption from direct and [[indirect liability]] of [[Internet service provider]]s and other intermediaries. This exemption was adopted by the [[European Union]] in the [[Electronic Commerce Directive 2000]]. The [[Information Society Directive]] 2001 implemented the 1996 [[WIPO Copyright Treaty]] in the EU.

==Background and legislative history==
The Digital Millennium Copyright Act (DMCA) had its basis as part of the United States' commitment to comply with two treaties passed by the [[World Intellectual Property Organization]] (WIPO) in December 1996 that dealt with the nature of copyright with modern information systems such as the [[Internet]]. The [[World Intellectual Property Organization Copyright Treaty|WIPO Copyright Treaty]] identified numerous electronic works as eligible for copyright protection, and stated that [[anti-circumvention|circumvention of technological measures used to secure electronic works]] was to be prohibited. The [[WIPO Performances and Phonograms Treaty]] worked to normalize the copyright protections for performed works as uniformly for member states as possible.<ref name="nimmer riff"/>

The process of ratifying the treaties for the United States was the first major piece of copyright-related legislation since the [[Copyright Act of 1976]], and led to numerous interested groups to express concerns for how the treaties should be implemented, including content producers and distributors, technology manufacturers, online service providers, researchers and academics, and consumer groups. Some groups urged for stronger copyright enforcement while others sought more relaxing of rules. As the bill was being formed in the [[United States House Committee on Energy and Commerce|Commerce Committee in the House of Representatives]], the committee recognized that the final bill would be far more encompassing than just copyright reform but would be establishing key principles in the digital commerce marketplace.<ref name="nimmer riff">{{cite journal | last = Nimmer | first = David | title = A Riff on Fair Use in the Digital Millennium Copyright Act | journal = [[University of Pennsylvania Law Review]] | volume = 148 | pages = 673–742 | year = 2000 | issue = 3 | doi = 10.2307/3312825 | jstor = 3312825 | ssrn = 222370 | url = https://scholarship.law.upenn.edu/cgi/viewcontent.cgi?article=3355&context=penn_law_review }}</ref>

In evaluating the enforcement of the WIPO Copyright Treaty with its anti-circumvention provisions with U.S. copyright law, lawmakers recognized that traditionally copyright law did not generally account for the medium of the work, as it was generally impossible to make an exact copy of an analog work previously, and current law was only concerned with unlawful acts of copyright violations. Since digital technology could allow for infinite numbers of exact copies of works to be made, the lawmakers agreed they had to extend copyright to include limits on devices and services which could be used for circumvention in addition to acts of circumvention.<ref name="nimmer riff"/> In establishing this, the lawmakers also recognized this would have a negative impact on [[fair use]] without exceptions, with electronic works potentially falling into the public domain but still locked beyond circumvention measures, but they also needed to balance the rights of copyright holders. The DMCA as passed contained some basic fair use allowance such as for limited [[reverse engineering]] and for [[Information security|security research]]. Lawmakers opted to create a [[United States administrative law|rulemaking]] mechanism through the [[United States Copyright Office]] to review the state of copyrights and fair use to make limited classes of allowance for fair use which would be considered lawful means of using circumvention technology.<ref name="nimmer riff"/>


==Provisions==
==Provisions==

{{Update|inaccurate=yes|section|date=October 2020}}

===Title I: WIPO Copyright and Performances and Phonograms Treaties Implementation Act===
===Title I: WIPO Copyright and Performances and Phonograms Treaties Implementation Act===
DMCA Title I, the [[WIPO Copyright and Performances and Phonograms Treaties Implementation Act]], has two major portions. One portion includes works covered by several treaties in US copy prevention laws and gave the title its name. For further analysis of this portion of the Act and of cases under it, see [[WIPO Copyright and Performances and Phonograms Treaties Implementation Act]].
DMCA Title I, the [[WIPO Copyright and Performances and Phonograms Treaties Implementation Act]], amends U.S. copyright law to comply with the [[World Intellectual Property Organization Copyright Treaty|WIPO Copyright Treaty]] and the [[WIPO Performances and Phonograms Treaty]], adopted at the WIPO Diplomatic Conference in December 1996. The treaties have two major portions. One portion includes works covered by several treaties in U.S. copy prevention laws and gave the title its name. For further analysis of this portion of the Act and of cases under it, see [[WIPO Copyright and Performances and Phonograms Treaties Implementation Act]].


The second portion is often known as the DMCA [[anti-circumvention]] provisions. These provisions changed the remedies for the circumvention of copy prevention systems (also called "technical protection measures") and required that all analog video recorders have support for a specific form of copy prevention commonly known as [[Macrovision]] built in, effectively giving Macrovision a monopoly on the analog video recording copy prevention market. However, section 1201(c) of the title clarified that the title does not change the underlying substantive copyright infringement rights, remedies, or defenses. The title contains other limitations and exemptions, including for research and reverse engineering in specified situations.
The second portion (17 U.S.C. 1201) is often known as the DMCA [[anti-circumvention]] provisions. These provisions changed the remedies for the circumvention of copy-prevention systems (also called "technical protection measures"). The section contains a number of specific limitations and exemptions, for such things as government research and [[reverse engineering]] in specified situations. Although section 1201(c) of the title stated that the section does not change the underlying substantive copyright infringement rights, remedies, or defenses, it did not make those defenses available in circumvention actions. The section does not include a [[fair use]] exemption from criminality nor a [[scienter]] requirement, so criminal liability could attach to even unintended circumvention for legitimate purposes.<ref>{{Cite book|author1=Band, Jonathan |author2=Katoh, Masanobu|year=2011|title=Interfaces on Trial 2.0|publisher=MIT Press|page=[https://books.google.com/books?id=dFMUBhojiA0C&pg=PA92 92]|isbn=978-0-262-01500-4}}</ref>


===Title II: Online Copyright Infringement Liability Limitation Act===
===Title II: Online Copyright Infringement Liability Limitation Act===
DMCA Title II, the [[Online Copyright Infringement Liability Limitation Act]] ("OCILLA"), creates a [[safe harbor]] for online service providers (OSPs, including ISPs) against copyright liability if they adhere to and qualify for certain prescribed safe harbor guidelines and promptly block access to allegedly infringing material (or remove such material from their systems) if they receive a notification claiming infringement from a copyright holder or the copyright holder's agent. OCILLA also includes a counter-notification provision that offers OSPs a safe harbor from liability to their users, if the material upon notice from such users claiming that the material in question is not, in fact, infringing. OCILLA also provides for [[subpoena]]s to OSPs to provide their users' identity.
DMCA Title II, the [[Online Copyright Infringement Liability Limitation Act]] ("OCILLA"), creates a [[safe harbor (law)|safe harbor]] for [[online service provider]]s (OSPs, including [[Internet service provider|ISPs]]) against copyright infringement liability, provided they meet specific requirements.<ref>Cullins, Ashley [https://www.hollywoodreporter.com/thr-esq/music-industry-a-listers-call-879718 Music Industry A-Listers Call on Congress to Reform Copyright Act] ''Hollywood Reporter''. April 5, 2016.</ref> OSPs must adhere to and qualify for certain prescribed safe harbor guidelines and promptly block access to alleged infringing material (or remove such material from their systems) when they receive [[DMCA takedown notice|notification of an infringement claim]] from a copyright holder or the copyright holder's agent (a "notice and takedown" process). OCILLA also includes a counternotification provision that offers OSPs a safe harbor from liability to their users when users claim that the material in question is not, in fact, infringing. OCILLA also facilitates issuing of [[subpoena]]s against OSPs to provide their users' identity.


===Title III: Computer Maintenance Competition Assurance Act===
===Title III: Computer Maintenance Competition Assurance Act===
DMCA Title III modified [http://www.law.cornell.edu/uscode/17/117.html section 117] of the copyright title so that those repairing computers could make certain temporary, limited copies while working on a computer.
DMCA Title III modified [https://www.law.cornell.edu/uscode/17/117.html section 117] of the copyright title so that those repairing computers could make certain temporary, limited copies while working on a computer. It reversed the precedent set in ''[[MAI Systems Corp. v. Peak Computer, Inc.]]'', 991 F.2d 511 (9th Cor. 1993).


===Title IV: Miscellaneous Provisions===
===Title IV: Miscellaneous Provisions===
DMCA Title IV contains an assortment of provisions:
DMCA Title IV contains an assortment of provisions:
*Clarified and added to the duties of the Copyright Office.
* Clarified and added to the duties of the [[United States Copyright Office|Copyright Office]].
*Added ephemeral copy for broadcasters provisions, including certain [[statutory license]]s.
* Added ephemeral copy for broadcasters provisions, including certain [[statutory license]]s.
*Added provisions to facilitate distance education.
* Added provisions to facilitate [[distance education]].
*Added provisions to assist libraries with keeping copies of sound recordings.
* Added provisions to assist libraries with keeping phonorecords of sound recordings.
*Added provisions relating to collective bargaining and the transfer of movie rights.
* Added provisions relating to collective bargaining and the transfer of movie rights.


===Title V: Vessel Hull Design Protection Act===
===Title V: Vessel Hull Design Protection Act===
DMCA Title V added sections [http://www.law.cornell.edu/uscode/17/1301.html 1301] through [http://www.law.cornell.edu/uscode/17/1332.html 1332] to add a ''[[sui generis]]'' protection for boat hull designs. Boat hull designs were not considered covered under copyright law because they are useful articles whose form cannot be cleanly separated from their function.<ref>17 U.S.C. 101 (defining "Pictorial, graphic and sculptural works" as "Such works shall include works of artistic craftsmanship insofar as their form but not their mechanical or utilitarian aspects are concerned; the design of a useful article, as defined in this section, shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.")</ref><ref>[http://www.copyright.gov/docs/hr2696.html "Vessel Hull Design Protection Act of 1997 (H.R. 2696)"], Statement of MaryBeth Peters, The Register of Copyrights, before the Subcommittee on Courts and Intellectual Property, Committee on the Judiciary, Oct. 23, 1997 ("It is a long-held view of the Office that a gap exists in legal protection for the designs of useful articles. Existing bodies of federal intellectual property law do not provide appropriate and practical coverage for such designs, while state law is largely preempted in this area. Consequently, while considerable investment and creativity may go into the creation of innovative designs, they often can be copied with impunity.").</ref>
'''DMCA''' Title V added sections [https://www.law.cornell.edu/uscode/17/1301.html 1301] through [https://www.law.cornell.edu/uscode/17/1332.html 1332] to add a ''[[sui generis]]'' protection for boat hull designs. Boat hull designs were not considered covered under copyright law because boats are useful articles whose form cannot be separated from their function as determined by the Supreme Court case ''[[Bonito Boats, Inc. v. Thunder Craft Boats, Inc.]]''.<ref name=" nimmer riff"/><ref>17 U.S.C. 101 (defining "Pictorial, graphic and sculptural works" as "Such works shall include works of artistic craftsmanship insofar as their form but not their mechanical or utilitarian aspects are concerned; the design of a useful article, as defined in this section, shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.")</ref><ref>[http://www.copyright.gov/docs/hr2696.html "Vessel Hull Design Protection Act of 1997 (H.R. 2696)"], Statement of MaryBeth Peters, The Register of Copyrights, before the Subcommittee on Courts and Intellectual Property, Committee on the Judiciary, Oct. 23, 1997 ("It is a long-held view of the Office that a gap exists in legal protection for the designs of useful articles. Existing bodies of federal intellectual property law do not provide appropriate and practical coverage for such designs, while state law is largely preempted in this area. Consequently, while considerable investment and creativity may go into the creation of innovative designs, they often can be copied with impunity.").</ref>


==Anti-circumvention exemptions==
==Anti-circumvention exemptions==
{{Update|inaccurate=yes|section|date=May 2013}}
In addition to the safe harbors and exemptions the statute explicitly provides, [http://www.copyright.gov/title17/92chap12.html#1201 17 U.S.C. 1201(a)(1)] requires that the [[Librarian of Congress]] issue exemptions from the prohibition against circumvention of access-control technology. Exemptions are granted when it is shown that access-control technology has had a substantial adverse effect on the ability of people to make non-infringing uses of copyrighted works.
In addition to the safe harbors and exemptions the statute explicitly provides, [http://www.copyright.gov/title17/92chap12.html#1201 17 U.S.C. 1201(a)(1)] requires that the [[Librarian of Congress]] issue exemptions from the prohibition against circumvention of access-control technology. Exemptions are granted when it is shown that access-control technology has had a substantial adverse effect on the ability of people to make non-infringing uses of copyrighted works.


The exemption rules are revised every three years. Exemption proposals are submitted by the public to the Registrar of Copyrights, and after a process of hearings and public comments, the final rule is recommended by the Registrar and issued by the Librarian. Exemptions expire after three years and must be resubmitted for the next rulemaking cycle. Consequently, the exemptions issued in the prior rulemakings, in 2000 and 2003, are no longer valid.
The exemption rules are revised every three years. Exemption proposals are submitted by the public to the Registrar of Copyrights, and after a process of hearings and public comments, the final rule is recommended by the Registrar and issued by the Librarian. Exemptions expire after three years and must be resubmitted for the next rulemaking cycle.


=== Previous exemptions ===
The current administratively-created [http://www.copyright.gov/1201/ exemptions], issued in November 2006, are:
The Copyright Office approved two exemptions in 2000, four in 2003, six each in 2006 and 2010, five in 2012, and nine in 2015.


; 2000 rulemaking
* Audiovisual works included in the educational library of a college or university’s film or media studies department, when circumvention is accomplished for the purpose of making compilations of portions of those works for educational use in the classroom by media studies or film professors. (A new exemption in 2006.)
In 2000, the first rulemaking, the Office exempted:<ref>{{cite web|website=[[United States Copyright Office]]|date= October 27, 2000|title= Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works |url=http://www.copyright.gov/1201/anticirc.html }}</ref>
* Computer programs and video games distributed in formats that have become obsolete and that require the original media or hardware as a condition of access, when circumvention is accomplished for the purpose of preservation or archival reproduction of published digital works by a library or archive. A format shall be considered obsolete if the machine or system necessary to render perceptible a work stored in that format is no longer manufactured or is no longer reasonably available in the commercial marketplace. (A renewed exemption, first approved in 2003.)
* "Compilations consisting of lists of websites blocked by filtering software applications" (renewed in 2003 but not renewed in 2006); and
* Computer programs protected by [[dongle]]s that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace. (Revised from a similar exemption approved in 2003.)
* "Literary works, including computer programs and databases, protected by access control mechanisms that fail to permit access because of malfunction, damage, or obsoleteness." (revised and limited in 2003 and again in 2006).
* Literary works distributed in [[e-book]] format when all existing e-book editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book’s read-aloud function or of screen readers that render the text into a specialized format. (Revised from a similar exemption approved in 2003.)
* Computer programs in the form of [[firmware]] that enable [[wireless telephone]] handsets to connect to a wireless telephone communication network, when circumvention is accomplished for the sole purpose of lawfully connecting to a wireless telephone communication network. (A new exemption in 2006.)
* Sound recordings, and audiovisual works associated with those sound recordings, distributed in [[compact disc]] format and protected by technological protection measures that control access to lawfully purchased works and create or exploit security flaws or vulnerabilities that compromise the security of personal computers, when circumvention is accomplished solely for the purpose of good faith testing, investigating, or correcting such security flaws or vulnerabilities. (A new exemption created in 2006, after a faulty [[copy protection]] system installed on [[Sony]]'s compact discs had caused technical problems for many users.)


;2003 rulemaking
The Copyright Office approved two exemptions in 2000; four in 2003; and six in 2006. In 2000, the Office exempted (a) "Compilations consisting of lists of websites blocked by filtering software applications" (renewed in 2003 but not renewed in 2006); and (b) "Literary works, including computer programs and databases, protected by access control mechanisms that fail to permit access because of malfunction, damage, or obsoleteness." (revised and limited in 2003 and again in 2006). In 2003, the 2000 "literary works including computer programs" exemption was limited to "Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete." 2003 also added an ebook exemption for text readers and an obsolete software and video game format exemptions, both of which were renewed in 2006. The 2000 filtering exemption was revised and renewed in 2003, but was not renewed in 2006.<ref>''See'' U.S. Copyright Office, Oct. 27, 2000, Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works, at http://www.copyright.gov/1201/anticirc.html ; U.S. Copyright Office, Oct. 28, 2003, Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works, at http://www.copyright.gov/1201/2003/index.html .</ref>
In 2003, the Office made the following rules:<ref>{{cite web|date=October 28, 2003|title= Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works|url= http://www.copyright.gov/1201/2003/index.html|website=[[United States Copyright Office]]}}</ref>
* The 2000 filtering exemption was revised and renewed.
* The 2000 "literary works including computer programs" exemption was limited to "Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete" and this exemption was renewed in both 2006 and 2010.
* A new exemption was implemented for [[electronic books]] for which technological protection measures prevented the use of read-aloud software or screen readers. This exemption was renewed in 2006, 2010, 2012, and 2015.
* A new exemption was made for "Computer programs and video games distributed in formats that have become obsolete and which require the original media or hardware as a condition of access." This exemption was renewed in 2006 but not in 2010.


;2006 rulemaking
==Linking to infringing content==
In 2006, the Office made the following rules:<ref>{{cite web|website=[[United States Copyright Office]]|date= November 27, 2006|title= Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works|url=http://www.copyright.gov/1201/2006/index.html}}</ref>
The law is currently unsettled with regard to websites that contain links to infringing material; however, there have been a few lower-court decisions which have ruled against linking in some narrowly prescribed circumstances. One is when the owner of a website has already been issued an injunction against posting infringing material on their website and then links to the same material in an attempt to circumvent the injunction. Another area involves linking to software or devices which are designed to circumvent DRM ([[digital rights management]]) devices, or links from websites whose sole purpose is to circumvent copyright protection by linking to copyrighted material.<ref>{{cite news
* The 2003 exemption on obsolete computer programs and video games was renewed.
|url = http://www.webtvwire.com/linking-to-infringing-content-is-probably-illegal-in-the-us/
* The 2003 exemption on computer programs protected by dongles was renewed.
|title = Linking to infringing content is probably illegal in the US
* The 2003 exemption on electronic books was renewed.
|publisher = WebTVWire
* A new exemption was made for sound recordings allowed after security flaws were found in [[Sony BMG CD copy protection scandal|a copy protection system]] on some [[Sony]] CDs; this was not renewed in 2010.
|date = [[2006-09-12]]
* A new exemption was implemented covering the audiovisual works included in the educational library of a college or university's film or media studies department; this was not renewed in 2010.
|accessdate = 2006-10-12
* A new exemption was implemented allowing circumvention to allow wireless telephone handsets to connect to wireless networks. This exemption was revised in 2010 to specify used handsets and require authorization from the wireless network operator. Another exemption for wireless handsets was introduced in 2010 specific to interoperability software on the phone itself.
}}</ref>


; 2010 rulemaking
There have been no cases in the US where a website owner has been found liable for linking to copyrighted material outside of the above narrow circumstances.
Rulemaking was scheduled to occur in 2009, but the final rule was not issued until the following year. The 2010 exemptions, issued in July 2010, are:<ref>{{cite web|website=[[United States Copyright Office]]|date=July 26, 2010|title= Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works |url=http://www.copyright.gov/1201/}}</ref>
* Motion pictures on [[DVD]]s that are lawfully made and acquired and that are protected by the [[Content Scrambling System]] when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances:
** Educational uses by college and university professors and by college and university film and media studies students;
** Documentary filmmaking;
** Obsolete software and video game formats.
** Noncommercial videos. (A new exemption in 2010, similar to a previous educational exemption.)
* Computer programs that enable [[Mobile phone|wireless telephone]] handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset. (A new exemption in 2010.)
* Computer programs, in the form of [[firmware]] or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network. (Revised from a similar exemption approved in 2006.)
* Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if:
** The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and
** The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law. (A new exemption in 2010.)
* Computer programs protected by [[dongle]]s that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace. (A renewed exemption from 2006, based on a similar exemption approved in 2003.)
* Literary works distributed in [[e-book]] format when all existing e-book editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book's read-aloud function or of [[screen reader]]s that render the text into a specialized format. (A renewed exemption from 2006, based on a similar exemption approved in 2003.)


; 2012 rulemaking
==Court cases==
The 2012 exemptions, issued in November 2012,<ref>{{Cite web|title = Federal Register {{!}} Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies|url = http://www.copyright.gov/fedreg/2012/77fr65260.pdf|website = www.federalregister.gov|access-date = 2016-04-04}} {{PD-notice}}</ref> are for:
{{US-law-stub}}
* Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies
* Computer programs that enable smartphones and portable all-purpose mobile computing devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device
* Computer programs that enable certain types of wireless devices to connect to a wireless telecommunications network, when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network
* Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in limited instances
* Motion pictures and other audiovisual works on DVDs that are protected by the Content Scrambling System, or that are distributed by an online service and protected by technological measures that control access to such works, where circumvention is related to developing captioning and descriptive audio technologies


; 2015 rulemaking
==Reform and opposition==
The 2015 exemptions, issued in October 2015,<ref>{{Cite web|title = Federal Register {{!}} Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies|url = https://www.federalregister.gov/articles/2015/10/28/2015-27212/exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control#h-12|website = www.federalregister.gov|access-date = 2016-01-26}}</ref> are for:
There are efforts in Congress to modify the Act. [[Rick Boucher]], a Democratic congressman from Virginia, is leading one of these efforts by introducing the [[Digital Media Consumers' Rights Act]] (DMCRA).
* Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in limited instances,
* Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies,
* Computer programs that enable the following types of wireless devices to connect to a wireless telecommunications network, when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network,
* Computer programs that enable smartphones, tablets, and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device,
* Computer programs that are contained in and control the functioning of a motorized land vehicle such as a personal automobile, commercial motor vehicle, or mechanized agricultural vehicle, except for computer programs primarily designed for the control of telematics or entertainment systems for such vehicle, when circumvention is a necessary step undertaken by the authorized owner of the vehicle to allow the diagnosis, repair or lawful modification of a vehicle function,
* Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates solely for the purpose of good-faith security research and does not violate any applicable law,
* Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay,
* Computer programs that operate 3D printers that employ microchip-reliant technological measures to limit the use of feedstock, when circumvention is accomplished solely for the purpose of using alternative feedstock and not for the purpose of accessing design software, design files or proprietary data, and
* Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, where such circumvention is undertaken by a patient for the sole purpose of lawfully accessing the data generated by his or her own device or monitoring system.


; 2018 rulemaking
A prominent bill related to the DMCA is the [[Consumer Broadband and Digital Television Promotion Act]] (CBDTPA), known in early drafts as the Security Systems and Standards Certification Act (SSSCA). This bill, if it had passed, would have dealt with the devices used to access digital content and would have been even more restrictive than the DMCA.
The 2018 exemptions, issued in October 2018, are for:<ref>{{cite web | url = https://www.govinfo.gov/content/pkg/FR-2018-10-26/pdf/2018-23241.pdf | title = Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies | date= October 26, 2018 | access-date= December 28, 2020 | work = [[Federal Register]] }} {{PD-notice}}</ref>
* Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment, for supervised educational purposes, or to accommodate for [[accessibility]] for disabled students in educational institutions;
* Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies;
* Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, for the sole purpose of lawfully accessing the data on one's own device;
* Computer programs that enable wireless devices to connect to a wireless telecommunications network when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network;
* Computer programs that enable smartphones, tablets and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device;
* Computer programs that enable smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smart television;
* Computer programs that enable voice assistant devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the device;
* Computer programs that are contained in and control the functioning of a motorized land vehicle such as a personal automobile, commercial motor vehicle, or mechanized agricultural vehicle, except for computer programs primarily designed for the control of telematics or entertainment systems for such vehicle, when circumvention is a necessary step undertaken by the authorized owner of the vehicle to allow the diagnosis, repair or lawful modification of a vehicle function;
* Computer programs that are contained in and control the functioning of a lawfully acquired smartphone or home appliance or home system when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device or system;
* Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates solely for the purpose of good-faith security research and does not violate any applicable law,
* Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay;
* Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, that do not require access to an external computer server for gameplay, and that are no longer reasonably available in the commercial marketplace, solely for the purpose of preservation of the game in a playable form by an eligible library, archives, or museum;
* Computer programs used to operate video game consoles solely to the extent necessary for an eligible library, archives, or museum to engage in the preservation activities for the video game exceptions above;
* Computer programs, except video games, that have been lawfully acquired and that are no longer reasonably available in the commercial marketplace, solely for the purpose of lawful preservation of a computer program, or of digital materials dependent upon a computer program as a condition of access, by an eligible library, archives, or museum; and
* Computer programs that operate 3D printers that employ microchip-reliant technological measures to limit the use of feedstock, when circumvention is accomplished solely for the purpose of using alternative feedstock and not for the purpose of accessing design software, design files, or proprietary data.


; 2021 rulemaking
Timothy B. Lee<!--NOT Tim Berners-Lee!-->, in a paper written for the [[Cato Institute]], wrote:
The 2021 exemptions, issued in October 2021, are for:<ref>{{cite web|date=October 21, 2021|title=Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies|url=https://www.govinfo.gov/content/pkg/FR-2021-10-28/pdf/2021-23311.pdf|work=[[United States Copyright Office]]|accessdate=October 29, 2021}}</ref>
:The DMCA is anti-competitive. It gives copyright holders — and the technology companies that distribute their content — the legal power to create [[closed technology]] platforms and exclude competitors from interoperating with them. Worst of all, DRM technologies are clumsy and ineffective; they inconvenience legitimate users but do little to stop [[Copyright infringement|pirate]]s. [http://www.cato.org/pub_display.php?pub_id=6025]
* Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment, for supervised educational purposes, to accommodate for [[accessibility]] for disabled students in educational institutions, for preservation of the motion picture by a library, archive, or museum, or for research purposes at educational institutions;
* Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies, or for research purposes at educational institutions;
* Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, for the sole purpose of lawfully accessing the data on one's own device;
* Computer programs that enable wireless devices to connect to a wireless telecommunications network when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network;
* Computer programs that enable smartphones, tablets, and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device;
* Computer programs that enable smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smart television;
* Computer programs that enable voice assistant devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the device;
* Computer programs that enable routers and dedicated network devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the router or dedicated network device, and is not accomplished for the purpose of gaining unauthorized access to other copyrighted works;
* Computer programs that are contained in and control the functioning of a lawfully acquired motorized land vehicle or marine vessel such as a personal automobile or boat, commercial vehicle or vessel, or mechanized agricultural vehicle or vessel, except for programs accessed through a separate subscription service, when circumvention is a necessary step to allow the diagnosis, repair, or lawful modification of a vehicle or vessel function, where such circumvention is not accomplished for the purpose of gaining unauthorized access to other copyrighted works;
* Computer programs that are contained in and control the functioning of a lawfully acquired device that is primarily designed for use by consumers, when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device, and is not accomplished for the purpose of gaining access to other copyrighted works;
* Computer programs that are contained in and control the functioning of a lawfully acquired medical device or system, and related data files, when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device or system.
* Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates, or is undertaken on a computer, computer system, or computer network on which the computer program operates with the authorization of the owner or operator of such computer, computer system, or computer network, solely for the purpose of good-faith security research.
* Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay;
* Computer programs, except video games, that have been lawfully acquired and that are no longer reasonably available in the commercial marketplace, solely for the purpose of lawful preservation of a computer program, or of digital materials dependent upon a computer program as a condition of access, by an eligible library, archives, or museum, where such activities are carried out without any purpose of direct or indirect commercial advantage.
* Computer programs that operate 3D printers that employ technological measures to limit the use of material, when circumvention is accomplished solely for the purpose of using alternative material and not for the purpose of accessing design software, design files, or proprietary data;
* Computer programs, solely for the purpose of investigating a potential infringement of [[free and open source]] computer programs;
* Video games in the form of computer programs, embodied in lawfully acquired physical or downloaded formats, and operated on a general-purpose computer, where circumvention is undertaken solely for the purpose of allowing an individual with a physical disability to use software or hardware input methods other than a standard keyboard or mouse.

=== 2015 Study ===
After much criticism (see [[#Criticisms|below]]), on December 29, 2015, the Copyright Office initiated a study to assess the operation of section 1201 and the triennial rulemaking process. This is different from usual public comments on exemption proposals. It includes the role of the anti-trafficking provisions and permanent exemptions, and the requirements of the rulemaking itself. The Office has issued a Notice of Inquiry requesting public comment.<ref>{{cite web |url=http://www.copyright.gov/policy/1201/ |title=Section 1201 Study |work=U.S. Copyright Office |year=2015}}</ref>

Several comments were posted by individuals and organizations.<ref>{{Cite web|url=https://www.regulations.gov/docketBrowser/COLC-2015-0012&refD=COLC-2015-0012-0088|title=Regulations.gov|website=www.regulations.gov}}</ref> An individual recalls that the [[Copyright Clause]] has limitations.<ref>{{cite web |url=https://www.regulations.gov/document?D=COLC-2015-0012-0014 |title=Initial Comments – David Oster |author=David Oster |date=March 4, 2016}}</ref> [[Association of American Publishers]] ''et al.'' hold there is no need to amend the statute or to significantly alter the rulemaking. They are happy with the protection they are being granted, including anti-trafficking provisions, and talk of placing the cart before the horse, when they argue about requiring a proof of the mindset that consumers would have when utilizing circumvention tools before actual acts of circumvention occur. In their opinion, the meaning of Section 1201 is to ''extend'', not merely duplicate, copyright holder's rights.<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0077&amp;attachmentNumber=1&amp;contentType=pdf |title=Reply Comments of: Association of American Publishers, Motion Picture Association of America, Recording Industry Association of America |date=April 1, 2016 |author1=Allan R. Adler |author2=Benjamin S. Sheffner}}</ref> [[Society of American Archivists]] say they are not aware that the anti-trafficking provisions of section 1201(a)(2) and 1201(b) have had any impact in deterring copyright infringement. They do know, however, that the provisions have created an absurd, Catch-22 situation for any archives that sought to adhere to the letter of the law.<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0016&amp;attachmentNumber=1&amp;contentType=pdf |title=Comments Of The Society Of American Archivists |author1=Dennis E. Meissner |author2=Nancy Beaumont |date=February 18, 2016}}</ref> [[iFixit]] also talks of Catch-22 on stressing that since it is up to proponents to show that an exemption is relevant, they need to show that there's overwhelming market demand ''if only it were legal''.<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0053&amp;attachmentNumber=1&amp;contentType=pdf |title=Comments of iFixit |author=Kyle Wiens |date=March 3, 2016}}</ref> [[Rapid7]] notice that DMCA adversely affects good faith security research by forbidding researchers from circumventing technological protection measures (TPMs) to analyze software for vulnerabilities.<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0047&amp;attachmentNumber=1&amp;contentType=pdf |title=Rapid7, Bugcrowd, & HackerOne Joint Comments to US Copyright Office Section 1201 Study |date=March 3, 2016 |author=Harley Geiger}}</ref> Cyberlaw Clinic at [[Harvard Law School]] points out that the rulemaking is a complicated, ''ad hoc'', and unduly burdensome process.<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0052&amp;attachmentNumber=1&amp;contentType=pdf |author=Andrew F. Sellars |date=March 3, 2016 |title=Comment of the Cyberlaw Clinic at Harvard Law School}}</ref> Professors [[Andrea M. Matwyshyn]], [[Steven M. Bellovin]], [[Matt Blaze]], [[J. Alex Halderman]], and [[Nadia Heninger]], jointly advocated making the security research exemption granted in the 2015 Triennial Section 1201 Rulemaking permanent.<ref name=":1">{{Cite web|title=Section 1201 of Title 17|url=https://www.copyright.gov/policy/1201/section-1201-full-report.pdf}}</ref>

The [[Learning Disabilities Association]] of America (LDA) commented that circumventing DRM restrictions to meet accessibility needs deserves a permanent exception.<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0022&amp;attachmentNumber=1&amp;contentType=pdf |title=Initial Comments – Learning Disabilities Association of America |date=February 25, 2016 |author=Steve Noble}}</ref> [[Entertainment Software Association]] gives a vivid and detailed description of a flourishing market which is only possible because of DMCA.<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0038&amp;attachmentNumber=1&amp;contentType=pdf |title=Initial Comments – Entertainment Software Association |author1=Stanley Pierre-Louis |author2=Ben Golant |author3=Steven K. Englund |date=March 3, 2016}}</ref> They are deeply concerned about people with disabilities, but that concern is already being taken care of by the copyright holders, so that no permanent exception is needed.<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0078&amp;attachmentNumber=1&amp;contentType=pdf |title=Reply Comments – Entertainment Software Association |author1=Stanley Pierre-Louis |author2=Ben Golant |author3=Steven K. Englund |date=April 1, 2016}}</ref>

<!-- unquoted, in order of appearance (1st documentId) -->Comments have also been submitted by, among others, [[R Street Institute]]<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0005&amp;attachmentNumber=1&amp;contentType=pdf |title=Initial Comments – R Street Institute |date=February 16, 2015 |author=Catherine R. Gellis}}</ref> [[American Association of Law Libraries]],<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0027&amp;attachmentNumber=1&amp;contentType=pdf |title=Initial Comments – American Association of Law Libraries |date=February 26, 2016 |author=Emily Feltren}}</ref> [[Business Software Alliance]],<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0030&amp;attachmentNumber=1&amp;contentType=pdf |title=Initial Comments – BSA The Software Alliance |date=March 3, 2016 |author=Christian Troncoso}}</ref> [[Alliance of Automobile Manufacturers]],<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0031&amp;attachmentNumber=1&amp;contentType=pdf |title=Reply Comments – Alliance of Automobile Manufacturers |date=March 2, 2016 |author1=Jessica L. Simmons |author2=Steven J. Metalitz}}</ref><ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0072&amp;attachmentNumber=1&amp;contentType=pdf |title=Reply Comments – Alliance of Automobile Manufacturers |date=March 30, 2016 |author1=Jessica L. Simmons |author2=Steven J. Metalitz}}</ref> [[Association of American Universities]] ''et al.'',<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0033&amp;attachmentNumber=1&amp;contentType=pdf |title=Comments Of The Association Of American Universities, The American Council On Education, The Association Of Public And Land-Grant Universities, And Educause On Section 1201 Of The Digital Millennium Copyright Act |date=March 6, 2016 |author1=Jonathan Band |author2=Jessica Sebeok}}</ref> [[Copyright Alliance]],<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0034&amp;attachmentNumber=1&amp;contentType=pdf |title=Initial Comments – Copyright Alliance 1201 Study Comments final |date=March 3, 2016 |author=Terry Hart}}</ref><ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0076&amp;attachmentNumber=1&amp;contentType=pdf |title=Reply Comments – Copyright Alliance 1201 Study |date=April 1, 2016 |author=Keith Kupferschmid}}</ref> [[Association for Computing Machinery]] U.S. Public Policy Council,<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0046&amp;attachmentNumber=1&amp;contentType=pdf |title=Initial Comments – ACM US Public Policy Council |date=March 3, 2016 |author1=Eugene H. Spafford |author2=Paul Hyland}}</ref> the [[Software and Information Industry Association]],<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0050&amp;attachmentNumber=1&amp;contentType=pdf |title=Initial Comments of the Software and Information Industry Association |date=March 3, 2016 |author=Christopher A. Mohr}}</ref><ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0084&amp;attachmentNumber=1&amp;contentType=pdf |title=Reply Comments of the Software and Information Industry Association |date=April 1, 2016 |author=Christopher A. Mohr}}</ref> DVD Copy Control Association ("DVD CCA") ''et al.'',<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0051&amp;attachmentNumber=1&amp;contentType=pdf |title=Joint Comments Of The Dvd Copy Control Association And The Advanced Access Content System Licensing Administrator, Llc |date=March 3, 2016 |author1=Bruce H. Turnbull |author2=David Jonathan Taylor}}</ref> [[Microsoft Corporation]],<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0054&amp;attachmentNumber=1&amp;contentType=pdf |title=Initial Comments – Microsoft Corporation |date=March 3, 2016 |author=Dave Green}}</ref> Association for Competitive Technology,<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0057&amp;attachmentNumber=1&amp;contentType=pdf |title=ACT Comments re USCO Sec 1201 Study v4 |date=March 3, 2016 |author=Morgan Reed}}</ref> [[Public Knowledge]],<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0068&amp;attachmentNumber=1&amp;contentType=pdf |title=Section 1201 Comments for Copyright Office |date=March 4, 2016 |author1=Raza Panjwani |author2=Charles Duan |author3=Kerry Sheehan}}</ref><ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0087&amp;attachmentNumber=1&amp;contentType=pdf |title=Reply Comments of Public Knowledge |date=April 2, 2016 |author1=Kerry Maeve Sheehan |author2=Raza Panjwani |author3=John Bergmayer |author4=Charles Duan}}</ref> [[American Automobile Association]].<ref>{{cite web |url=https://www.regulations.gov/contentStreamer?documentId=COLC-2015-0012-0080&amp;attachmentNumber=1&amp;contentType=pdf |title=Reply Comments of AAA (American Automobile Association) |date=April 1, 2016 |author=Jill Ingrassia}}</ref>

In June 2017, the Copyright Office published a report where it "shares the concern" that Section 1201 can affect activities unrelated to copyright infringement, but also expressed concerns over weakening "the right of copyright owners to exercise meaningful control over the terms of access to their works online", which they believe is "essential to the development of the digital marketplace for creative content".<ref>[https://www.copyright.gov/policy/1201/section-1201-full-report.pdf Section 1201 of Title 17: A report of the Register of Copyrights] – United States Copyright Office, June 2017</ref> However, with respect to the question of whether the security research exemption granted in the 2015 Triennial cycle should be made permanent in some form, the Office recommended "that Congress consider expanding the reach of this exemption, easing the strict authorization requirement for researchers and restrictions on the use of information generated from the research, and abandoning or clarifying the multifactor test," stating that "it continues to believe that the exemption adopted in 2015 can be a useful starting point, and notes that most of the security researchers who petitioned for that exemption ... agree."<ref name=":1" />

==Case law==
===Anti-circumvention===
The anti-circumvention provisions in Section 1201 of the DMCA have seen some challenges in the courts but which have generally been upheld. While initially the challenges were focused on clear applications to software-based access control products, some cases considered how the DMCA also extended to hardware-based access controls.

====Software-based case law====
'''''[[Universal City Studios, Inc. v. Reimerdes]]/Universal City Studios, Inc. v. Corley''''' – Eight movie studios had sued [[Eric Corley]], Shawn Reimerdes, and Roman Kazan, editors of ''[[2600: The Hacker Quarterly]]'', for publishing the code of [[DeCSS]], an algorithm designed to bypass the [[Content Scramble System]] (CSS) used to encrypt [[DVD]] content. The studios argued that the code was an anti-circumvention device as defined by the DMCA. While Reimerdes and Kazan entered into consent decrees and were subsequently dropped from the suit, Corley continued the case. He argued that DeCSS, as computer code, was protected as free speech, and the DMCA allowed users to make copies of media they legally owned. Both the District Court and the [[United States Court of Appeals for the Second Circuit|Second Circuit]] rejected Corley's arguments. While the court agreed that a computer program qualifies as protected speech, the distribution of anti-circumvention devices was not considered a fair use option by Section 1201, and thus DeCSS was not protected by First Amendment rights.<ref>{{cite journal | last = Mihet | first = Harry | title = Universal City Studios, Inc. v. Corley: The Constitutional Underpinnings of Fair Use Remain an Open Question | journal = [[Duke Law & Technology Review]] | volume = 1 | issue = 1 | year = 2002 | pages = 1–11 }}</ref>

'''''[[United States v. Elcom Ltd.]]''''' – Moscow-based Elcom had developed software that was able to remove protections on an [[Adobe Acrobat]] PDF file, such as those used in [[ebook]] distribution. Adobe requested the U.S. Department of Justice take action against the company for violating the DMCA. Elcom argued in court that the DMCA was unconstitutionally vague and allowed for circumvention of use controls for purposes of fair use. The company also claimed that the act violated the First Amendment by placing too much burden on those seeking to use protected works for fair use. The initial ruling at the [[U.S. District Court for the Northern District of California]] rejected both arguments on the basis of ''Corley''. The ruling established that the DMCA was not unconstitutional, and that while it did place a burden on users accessing works for fair use, the DMCA did not outright restrict fair use. In the case of the ebook example, the ruling observed that the user may have to type a quote from the ebook rather than copy and paste from the unprotected version.<ref>{{cite journal | last = Sieber | first = Albert | title = The Constitutionality of the DMCA Explored: Universal City Studios, Inc. v. Corley & (and) United States v. Elcom Ltd. | journal = [[Berkeley Technology Law Journal]] |volume= 18 | issue= 7 |year= 2003 |pages= 7–42 }}</ref>

'''''[[321 Studios v. Metro Goldwyn Mayer Studios, Inc.]]''''' – 321 Studios made copies that allowed users to copy DVDs, including those with CSS copy protection, to another DVD or to a CD-ROM. The company sought [[declaratory judgment]] from MGM Studios that their software did not violate the DMCA, or sought to have the DMCA ruled unconstitutional. The case, heard in the United States District Court for the Northern District of California, ruled against 321 Studios on both arguments. The court ruled that 321 Studios' software was not protected speech and violated the DMCA. Additionally, they argued that the issues pertaining to the constitutionality of the DMCA were answered by prior cases, as case law from ''Corley'' and ''Elcom'' effectively established that the DMCA could not be challenged on the basis of constitutionality.<ref name="btlj growing body"/>

====Durable goods case law====
'''''[[Chamberlain Group, Inc. v. Skylink Technologies, Inc.]]''''' – Chamberlain manufactured garage door openers and accessories, while Skylink created universal remotes that worked with a variety of door openers. Chamberlain developed a security protocol for its remotes that matched the remote to the door via software-based [[rolling code]]; this was intended to prevent unauthorized opening. Skylink utilized a resynchronization feature of the Chamberlain security software to create a universal remote that worked with the Chamberlain openers. Chamberlain sued Skylink, arguing that the rolling code was effectively an access control device, and Skylink violated the DMCA. Both the [[United States District Court for the Northern District of Illinois]] and the [[United States Court of Appeals for the Federal Circuit]] ruled in favor of Skylink that there was no DMCA violation. The courts ruled the DMCA did not create a new property right, and thus consumers that owned Chamberlain's product had a right to circumvent any restrictions, since this was typical practice on the market. They also pointed out that customers purchasing a Chamberlain garage door opener did not sign an [[end user license agreement]] waiving those rights.<ref>{{cite journal | last = Sapp | first = Heather A. | title = Garage Door Openers and Toner Cartridges: Why Congress Should Revisit the Anti-circumvention Provisions of the DMCA | journal= [[Buffalo Intellectual Property Law Journal]] |volume = 3 | year =2005 | pages = 135–163 }}</ref>

'''''[[Lexmark International, Inc. v. Static Control Components, Inc.]]''''' – Lexmark had developed a lock-out mechanism for its [[Inkjet printing|inkjet printers]] that would prevent use of any third party ink cartridges. The mechanism used a program in the printer along with an [[Integrated circuit|electronic chip]] on the cartridge to validate the authenticity of the product. Static Control Components reverse engineered the chip using the program from the printer and were able to make their own ink cartridges compatible with Lexmark printers. Lexmark sued, claiming a DMCA violation, and won at the District Court. However, the case was overturned shortly after by the [[United States Court of Appeals for the Sixth Circuit]]. The Sixth Circuit acknowledged that Lexmark's programs to manage the lockout were copyrightable and thus eligible for protections under the DMCA. However, the appeals court pointed out that Lexmark failed to include an anti-circumvention device that "effectively controls access" to the printer lockout program.<ref name="btlj growing body">{{cite journal | last = Barker | first = Diane M. | title = Defining the contours of the Digital Millennium Copyright Act: The growing body of case law surrounding the DMCA | journal = [[Berkeley Technology Law Journal]] | volume = 20 | issue = 1 | year = 2005 | pages = 47–63 }}</ref>

===Linking to infringing content===
Case law is currently unsettled with regard to websites that contain links to infringing material; however, there have been a few lower-court decisions which have ruled against linking in narrowly prescribed circumstances. It is considered a violation when the owner of a website has been issued an injunction against posting infringing material on their website, and then links to the same material to circumvent the injunction. Another area involves linking to software or devices which are designed to circumvent [[digital rights management]] devices, or links from websites whose sole purpose is to circumvent copyright protection by linking to copyrighted material.<ref>{{cite news|url=http://www.webtvwire.com/linking-to-infringing-content-is-probably-illegal-in-the-us/|title=Linking to infringing content is probably illegal in the US|publisher=WebTVWire|date=2006-09-12|access-date=2006-10-12}}</ref>

{{Expand section|more cases. look: [https://www.eff.org/cases?tid=516 EFF], [[WIPO Copyright and Performances and Phonograms Treaties Implementation Act|DMCA 1201]]|date=November 2008|note=https://www.eff.org/issues/dmca}}

====''Edelman v. N2H2''====
In July 2002, [[American Civil Liberties Union]] filed a lawsuit on the behalf of Benjamin Edelman, a computer researcher at Berkman Center for Internet and Society, seeking a [[declaratory judgment]] to affirm his first amendment rights when reverse engineering the censorware product of defendant N2H2 in case he intended to publish the finding. N2H2 filed a motion to dismiss, which the court granted on the basis that Edelman had not finished reverse engneeering, and the court did not make advisory opinions.<ref>{{Cite web |title=Feature on Edelman v. N2H2 lawsuit |url=https://www.aclu.org/other/feature-edelman-v-n2h2-lawsuit |access-date=2022-09-30 |website=American Civil Liberties Union |language=en}}</ref> {{citation needed|date=September 2014}}

====''RealNetworks, Inc. v. DVD Copy Control Association, Inc.''====
{{main|RealNetworks, Inc. v. DVD Copy Control Association, Inc.}}
In August 2009, the [[DVD Copy Control Association]] won a lawsuit against [[RealNetworks]] for violating copyright law in selling its RealDVD software, allowing users to copy DVDs and store them on a harddrive. The DVD Copy Control Association claimed that Real violated the DMCA by manufacturing and trafficking a tool that circumvented anti-piracy measures [[ARccOS Protection]] and [[RipGuard]], as well as breaking Real's licensing agreement with the Content Scrambling System.<ref>{{cite web|last=Sandoval|first=Greg|url=http://news.cnet.com/8301-1023_3-10307921-93.html|title=RealNetworks loses critical ruling in RealDVD case|publisher=CNET.com|date=2009-08-11|access-date=2011-11-12}}</ref>

====''Viacom Inc. v. YouTube, Google Inc.''====
{{main|Viacom International Inc. v. YouTube, Inc.}}
On March 13, 2007, [[Viacom (2005–present)|Viacom]] filed a lawsuit against [[YouTube]] and its corporate parent [[Google]] for copyright infringement seeking more than $1 billion in damages. The complaint was filed in the [[U.S. District Court for the Southern District of New York]].

Viacom claims the popular video-sharing site was engaging in "massive intentional copyright infringement" for making available a contended 160,000 unauthorized clips of Viacom's entertainment programming. Google relied on the 1998 Digital Millennium Copyright Act's "safe harbor" provision to shield them from liability.<ref>{{cite web|url=http://news.cnet.com/Viacom-sues-Google-over-YouTube-clips/2100-1030_3-6166668.html?tag=nw.10|title=Viacom sues Google over YouTube clips|publisher=News.cnet.com|date=2007-03-13|access-date=2011-11-12}}</ref>

On June 23, 2010, U.S. District Judge Louis Stanton granted summary judgment in favor of YouTube.<ref>''Viacom Int'l Inc., et al., v. YouTube, Inc., et al.'', Nos. 07-Civ-2103 (LLS), 07-Civ-3582 (LLS) [https://www.google.com/press/pdf/msj_decision.pdf Opinion and Order] (S.D.N.Y. June 24, 2010).</ref> The court held that YouTube is protected by the safe harbor of the DMCA. Viacom appealed to the U.S. Court of Appeals for the Second Circuit.<ref>{{cite news|url=http://news.cnet.com/8301-31001_3-20008636-261.html|work=cnet news|location=U.S.|title=Google defeats Viacom in landmark copyright case|first=Greg|last=Sandoval|date=June 23, 2010|access-date=June 23, 2010}}</ref>

On April 5, 2012, the federal Second Circuit Court of Appeals vacated Judge Louis Stanton's ruling, and instead ruled that Viacom had presented enough evidence against YouTube to warrant a trial, and the case should not have been thrown out in summary judgment. The court did uphold the ruling that YouTube could not be held liable based on "general knowledge" that users on its site were infringing copyright. The case was sent back to the District Court in New York,<ref>{{cite web|url=http://www.mediapost.com/publications/article/171852/appeals-court-gives-viacom-second-shot-at-youtube.html|location= U.S.|title=Appeals Court Gives Viacom Second Shot at YouTube|first=Wendy|last=Davis|date=April 6, 2012|access-date=April 7, 2012}}</ref> and on April 18, 2013, Judge Stanton issued another order granting summary judgment in favor of YouTube. Before it was sent back to the Court of Appeals, a settlement was reached; no money changed hands.<!--see main article for source-->

====''IO Group, Inc. v. Veoh Networks, Inc.''====
{{main|IO Group, Inc. v. Veoh Networks, Inc.}}
On June 23, 2006, IO Group, Inc. filed a complaint against [[Veoh|Veoh Networks, Inc.]] in the U.S. District Court for California's Northern District.<ref>{{cite news|url=https://www.wsj.com/articles/SB115154757274993889 |work=The Wall Street Journal|title=Veoh Faces Copyright Suit, A Test of Web Video|date=June 29, 2006|first=Kevin J.|last=Delaney}}</ref>

IO Group alleged that Veoh was responsible for copyright infringement by allowing videos owned by IO Group to be accessed through Veoh's online service without permission over 40,000 times between the dates June 1 and June 22.<ref>{{cite web|last=Ali|first=Rafat|url=http://www.paidcontent.org/entry/test-for-web-video-veoh-faces-copyright-suit|title=Test For Web Video? Veoh Faces Copyright Suit|publisher=paidContent|date=2006-06-28|access-date=2011-11-12|archive-date=2009-02-15|archive-url=https://web.archive.org/web/20090215054329/http://www.paidcontent.org/entry/test-for-web-video-veoh-faces-copyright-suit|url-status=dead}}</ref>

Veoh is a Flash video site relying on user contributed content. IO Group argued that since Veoh [[transcode]]d user uploaded videos to Flash format it became a direct infringer and the materials were under their direct control, thereby disqualifying them for DMCA safe harbor protection.

The ruling judge disagreed with the argument, stating that

<blockquote>Veoh has simply established a system whereby software automatically processes user-submitted content and recasts it in a format that is readily accessible to its users. Veoh preselects the software parameters for the process from a range of default values set by the thirdparty software... But Veoh does not itself actively participate or supervise the uploading of files. Nor does it preview or select the files before the upload is completed. Instead, video files are uploaded through an automated process which is initiated entirely at the volition of Veoh's users.</blockquote>

The Court has granted the Veoh's motion for [[summary judgment]], on the basis of the DMCA, holding that the defendant's video-sharing web site complied and was entitled to the protection of the statute's "safe harbor" provision.<ref>{{cite web|url=https://techcrunch.com/2008/08/27/transcoding-is-not-a-crime-says-court-in-veoh-porn-case/|title=Transcoding Is Not A Crime, Says Court In Veoh Porn Case|publisher=TechCrunch|date=2008-08-27|access-date=2011-11-12}}</ref> Even though Veoh won the court case, it blamed the litigation as one of the causes of its preparing to file Chapter 7 bankruptcy and its subsequent sale to Qlipso.<ref>"Content sharing company Qlipso buys Veoh" (Apr 9, 2010) Athena Information Solutions Pvt. Ltd.</ref><ref>"UMG v. Veoh: victory has never been so [[Pyrrhic victory|pyrrhic]]" (Dec 22, 2011) Engadget, Newstex</ref>

====''Vernor v. Autodesk, Inc.''====
{{main|Vernor v. Autodesk, Inc.}}
After numerous [[DMCA takedown notice]]s in response to his eBay listings, Timothy S. Vernor sued Autodesk in August 2007, alleging that Autodesk abused the DMCA and disrupted his right to sell used software he bought at a garage sale.<ref>{{cite web|last=Cheng|first=Jacqui|url=https://arstechnica.com/software/news/2007/09/autodesk-sued-for-10-million-after-invoking-dmca-to-stop-ebay-resales.ars|title=Autodesk sued for $10 million after invoking DMCA to stop eBay resales|publisher=Arstechnica.com|date=2007-09-13|access-date=2011-11-12}}</ref> In May 2008, a federal district judge in Washington State Autodesk's authorized that the software's license agreement preempted the seller from his rights under the [[first-sale doctrine]].<ref>{{cite web|last=Lee|first=Timothy B.|url=https://arstechnica.com/tech-policy/news/2008/05/court-smacks-autodesk-affirms-right-to-sell-used-software.ars|title=Court smacks Autodesk, affirms right to sell used software|publisher=Arstechnica.com|date=2008-05-23|access-date=2011-11-12}}</ref> In September 2010, the U.S. Court of Appeals for the Ninth Circuit reversed, holding that "a software user is a licensee rather than an owner of a copy where the copyright owner (1) specifies that the user is granted a license; (2) significantly authorized the user's ability to transfer the software; and (3) imposes notable use authorizations."<ref>{{cite web|last=Anderson|first=Nate|url=https://arstechnica.com/tech-policy/news/2010/09/the-end-of-used-major-ruling-tough-software-licenses.ars|title=Yes, you own it: Court release holds EULAs, digital resale|publisher=Arstechnica.com|date=2010-09-10|access-date=2011-11-12}}</ref>

====''Lenz v. Universal Music Corp.''====
{{main|Lenz v. Universal Music Corp.}}
In 2007, Stephanie Lenz, a writer and editor from [[Gallitzin, Pennsylvania]] made a home video of her 13-month-old son dancing to the [[Prince (musician)|Prince]] song "[[Let's Go Crazy]]" and posted a 29-second video on the video-sharing site [[YouTube]]. Four months after the video was originally uploaded, [[Universal Music Group]], which owned the copyrights to the song, ordered YouTube to remove the video enforcing the Digital Millennium Copyright Act.

Lenz notified YouTube immediately that her video was within the scope of fair use, and demanded that it be restored. YouTube complied after six weeks—not two weeks, as required by the Digital Millennium Copyright Act—to see whether Universal planned to sue Lenz for infringement. Lenz then sued Universal Music in California for her legal costs, claiming the music company had acted in bad faith by ordering removal of a video that represented fair use of the song.<ref>{{cite news|first= Bob|last= Egelko|title=Woman can sue over YouTube clip de-posting|url=http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/08/20/MNU412FKRL.DTL|work=[[San Francisco Chronicle]]|date=August 20, 2008|access-date=2008-08-25}}</ref>

In August 2008, U.S. District Judge [[Jeremy Fogel]] of [[San Jose, California]] ruled that copyright holders cannot order a deletion of an online file without determining whether that posting reflected "fair use" of the copyrighted material.

On February 25, 2010, Judge Fogel issued a ruling rejecting several of Universal's affirmative defenses, including the defense that Lenz suffered no damages.<ref>{{Cite web|url=http://thepriorart.typepad.com/the_prior_art/files/Lenz.2.25.order.pdf|title=''Lenz v. Universal Music Corp.''}}</ref>

In 2015, the court ultimately upheld the finding that Universal was liable under 17 USC 512(f) (the DMCA's bad faith notice and takedown provision) for failing to consider fair use before sending its initial takedown notice.

====''Flava Works Inc. v. Gunter''====
{{main|Flava Works Inc. v. Gunter}}
In the case of Flava Works Inc. v. Gunter the court denied the defendant safe harbor protection under DMCA {{uscsub|17|512}}. The district court found that the defendant had knowledge of its users' infringing activity and also failed to prevent future infringing activity. As such the plaintiff's motion for preliminary injunction was granted.<ref>{{cite web|url=http://docs.justia.com/cases/federal/district-courts/illinois/ilndce/1:2010cv06517/248465/77/0.pdf|title=Memorandum opinion|first=John F.|last=Grady|date=27 July 2011|work=Court rule in favour of plaintiff's motion for preliminary injunction.|access-date=21 November 2011}}</ref> On appeal, however, the Seventh Circuit vacated the injunction, citing the standard set in [[eBay Inc. v. MercExchange, L.L.C.]], which states that courts should not rely on categorical rules as a standard for injunction.<ref>{{cite web|url=https://www.eff.org/deeplinks/2012/08/myvidster-victory-innovation-and-vote-sensible-copyright-law|title=myVidster: A Victory for Innovation and a Vote for Sensible Copyright Law|first1=Julie P.|last1=Samuels|first2=Parker|last2=Higgins|date=6 August 2012|publisher=Electronic Frontier Foundation|access-date=8 August 2012}}</ref>

====''Ouellette v. Viacom International Inc.''====
{{main|Ouellette v. Viacom International Inc.}}
In this case of Ouellette v. Viacom International Inc., the court denied plaintiff's attempt to find liability for YouTube and Myspace's takedowns of the plaintiff's homemade videos. Despite potential fair use claims, the court found it impossible to use the DMCA takedown provisions as a foundation for liability. The court found that the safe harbor provision serves "to limit the liability of internet service providers, not to create liability that could not otherwise be imposed under existing law independent of the DMCA."<ref>{{Cite web|url=https://scholar.google.com/scholar_case?q=Ouellette+v.+Viacom&hl=en&as_sdt=2,5&case=3753744983787595468&scilh=0|title=Ouellette v. Viacom, Dist. Court, D. Montana 2011 – Google Scholar}}</ref>

====''Sony v. George Hotz''====
{{main|Sony Computer Entertainment America v. George Hotz}}
In January 2011, [[Sony Computer Entertainment]] sued [[George Hotz]] over violating the Section 1201 of the Digital Millennium Copyright Act as well as the [[Computer Fraud and Abuse Act|Federal Fraud and Abuse Act]] due to facilitating consumers to [[PlayStation Jailbreak|jailbreak]] their [[PlayStation 3]] consoles.<ref>[https://www.engadget.com/2011/01/12/sony-follows-up-officially-sues-geohot-and-fail0verflow-over-ps/ Sony follows up, officially sues Geohot and fail0verflow over PS3 jailbreak]. Nilay Patel, Engadget (2011-01-12). Retrieved on 2011-02-16.</ref> Hotz argued that because he had purchased the product, he had the right to do with it as he pleased. After three months, Sony and Hotz decided to settle out of court. This also included an injunction against George Hotz, barring him from hacking any more Sony products.<ref>{{Cite web|url=https://www.gamespot.com/articles/sony-hotz-settlement-details-surface/1100-6308347/|title=Sony/Hotz settlement details surface}}</ref><ref>{{cite web|url=http://www.joystiq.com/2011/04/11/sony-and-playstation-3-jailbreaker-george-hotz-settle-out-of-cou/|title=Sony and PlayStation 3 jailbreaker George Hotz settle out of court}}</ref>

====''Automattic, Inc. and Oliver Hotham v. Nick Steiner''====
In 2013, Oliver Hotham wrote an article on [[WordPress.com|WordPress]] (owned by Automattic, Inc.) critical of Straight Pride UK that included material from a press release sent to him by Straight Pride UK's press officer, Nick Steiner. Steiner sent WordPress a DMCA takedown notice claiming that Hotham's article infringed their copyright. WordPress and Hotham sued in a federal District Court in California, under §512(f) of the DMCA, claiming that the takedown notice was fraudulent, and that the takedown cost the plaintiffs time, lost work and attorneys' fees. In 2015, the court issued a [[default judgment]] in favor of WordPress and Hotham in the amount of $25,084.<ref>Van der Sar, Ernesto. [http://torrentfreak.com/wordpress-wins-25000-from-dmca-takedown-abuser-150305/ "WordPress Wins $25,000 From DMCA Takedown Abuser"], TorrentFreak.com, March 5, 2015</ref>


==Criticisms==
==Criticisms==
{{See also|Censorship by copyright}}


===Abuse of takedown notice===
The DMCA has been criticized for forcing all companies producing analog video equipment to support the proprietary copy protection technology of a particular commercial firm ([[Macrovision]]). The producers of video equipment are forced by law to support the Macrovision technology to the financial benefit of Macrovision whereas those who build the video equipment get nothing in compensation.
[[Google]] asserted misuse of the DMCA in a filing concerning New Zealand's copyright act,<ref>{{cite web|url=http://tcf.org.nz/content/ebc0a1f5-6c04-48e5-9215-ef96d06898c0.cmr|archive-url=https://web.archive.org/web/20090320215445/http://www.tcf.org.nz/content/ebc0a1f5-6c04-48e5-9215-ef96d06898c0.cmr|url-status=dead|archive-date=20 March 2009|format=PDF|title=Google submission on TCF Draft ISP Copyright Code of Practice|author1=Carolyn Dalton |author2=Antoine Aubert |date=6 March 2009|access-date=2009-10-14}}</ref><ref>{{cite news|last1=Keall|first1=Chris|title=Google piles into S92|url=https://www.nbr.co.nz/article/google-piles-s92-81494|access-date=26 September 2017|work=National Business Review|date=16 March 2009|archive-url=https://web.archive.org/web/20170925180921/https://www.nbr.co.nz/article/google-piles-s92-81494|archive-date=25 September 2017|url-status=dead}}</ref> quoting results from a 2005 study by California academics [[Laura Quilter]] and Jennifer Urban based on data from the [[Chilling Effects (group)|Chilling Effects]] clearinghouse.<ref>{{cite web|url=https://www.law.berkeley.edu/files/Chilling_Effects_Report.pdf|title=Efficient Process or 'Chilling Effects'? Takedown Notices Under Section 512 of the Digital Millennium Copyright Act – Summary Report|author=[[Laura Quilter]] and Jennifer Urban|year=2005|access-date=2017-07-16}}</ref> Takedown notices targeting a competing business made up over half (57%) of the notices Google has received, the company said, and more than one-third (37%) "were not valid copyright claims."<ref>{{cite news|url=http://www.pcworld.co.nz/article/483729/google_submission_hammers_section_92a/|title=Google submission hammers section 92A|publisher=New Zealand PCWorld|date=2009-03-16|access-date=2009-03-19|archive-date=2013-10-18|archive-url=https://web.archive.org/web/20131018023333/http://www.pcworld.co.nz/article/483729/google_submission_hammers_section_92a/|url-status=dead}}</ref>


Currently, there are three main abuses of the DMCA. First, fair use has been a legal gray area, and subject to opposing interpretations. This has caused inequity in the treatment of individual cases. Second, the DMCA has often been invoked overbearingly, favoring larger copyright holders over smaller ones. This has caused accidental takedowns of legitimate content, such as a record company accidentally removing a music video from their own artist. Third, the lack of consequences for perjury in claims encourages censorship. This has caused temporary takedowns of legitimate content that can be financially damaging to the legitimate copyright holder, who has no recourse for reimbursement. This has been used by businesses to censor competition.<ref>{{Cite journal|last=Cobia|first=Jeffrey|year=2008|title=The Digital Millennium Copyright Act Takedown Notice Procedure: Misuses, Abuses, and Shortcomings of the Process|url=http://heinonline.org/HOL/Page?handle=hein.journals/mipr10&g_sent=1&collection=journals&id=391|journal=Minnesota Journal of Law Science & Technology|volume=1|pages=391–393|via=Hein Online}}</ref>
The DMCA has been criticized for making it too easy for copyright owners to encourage website owners to take down allegedly infringing content and links which may in fact not be infringing. When website owners receive a takedown notice it is in their interest not to challenge it, even if it is not clear if infringement is taking place, because if the potentially infringing content is taken down the website will not be held liable. The [[Electronic Frontier Foundation]] senior IP attorney Fred von Lohmann has said this is one of the problems with the DMCA.<ref>{{cite news
|url = http://www.boingboing.net/2006/12/01/fox_commits_copyrigh.html
|title = Fox commits copyright fraud (See comment from EFF)
|publisher = BoingBoing
|date = [[2006-01-12]]
|accessdate = 2006-10-12
}}</ref>


The use of DMCA-enabled takedown notices has been raised for a number of services that allow users to provide content. Early concerns were focused on [[peer-to-peer file sharing]] services such as [[BitTorrent]]. Such services grew after [[Napster]] was sued by several music industry groups in ''[[A&M Records, Inc. v. Napster, Inc.]]'' (2001) which ruled that Napster was liable for enabling copyright infringement under the DMCA since they maintained central servers that tracked file sharing; by switching to the peer-to-peer model, these new services avoided this possible legality. However, some still saw legal challenges, such as ''[[MGM Studios, Inc. v. Grokster, Ltd.]]'' (2005) based on the fact they were operated commercially and promoted the ability to share copyrighted works. Non-commercial and open-source peer-to-peer services were able to survive from these case laws, leading entertainment groups to deploy software on the services to track downloads,<ref>{{Cite journal|title = The P2P war: Someone is monitoring your activities|journal = Computer Networks|date = 2008-04-24|pages = 1272–1280|volume = 52|issue = 6|doi = 10.1016/j.comnet.2008.01.011|first1 = Anirban|last1 = Banerjee|first2 = Michalis|last2 = Faloutsos|first3 = Laxmi|last3 = Bhuyan|citeseerx = 10.1.1.76.9451}}</ref> and subsequently attempted to serve takedown notices and sue users on the services for copyright violations under the DMCA since around 2003.<ref>{{cite magazine | url = https://www.wired.com/2008/09/proving-file-sh/ | title = File Sharing Lawsuits at a Crossroads, After 5 Years of RIAA Litigation | first = David | last = Kravitz| date = September 4, 2009 | access-date = December 30, 2020 | magazine = [[Wired (magazine)|Wired]] }}</ref> However, many of these methods were imprecise, leading to a number of false accusations at users.<ref>{{cite web | url = https://bits.blogs.nytimes.com/2008/06/05/the-inexact-science-behind-dmca-takedown-notices/ | title = The Inexact Science Behind D.M.C.A. Takedown Notices | first = Brad | last = Stone | date = June 5, 2008 | access-date= December 30, 2020 | work = [[The New York Times]] }}</ref>
===Impact on research===
{{main|Digital rights management}}


===Abuse of the anti-circumvention provision===
The DMCA has had an impact on the worldwide [[cryptography]] research community, since an argument can be made that any cryptanalytic research violates, or might violate, the DMCA. The arrest of Russian programmer [[Dmitry Sklyarov]] in 2001, for alleged infringement of the DMCA, was a highly publicized example of the law's use to prevent or penalize development of anti-DRM measures.<ref>[http://www.cybercrime.gov/Sklyarovindictment.htm First Indictment Under Digital Millennium Copyright Act Returned Against Russian National]</ref> While working for [[Elcomsoft]] in Russia, he developed ''The Advanced eBook Processor'', a software application allowing users to strip usage restriction information from restricted [[e-book]]s, an activity legal in both Russia and the United States.<ref>[http://www.adobe.com/aboutadobe/pressroom/pressreleases/200108/elcomsoftqa.html Adobe FAQ: ElcomSoft legal background]</ref> Paradoxically, under the DMCA, it is not legal in the United States to provide such a tool. Sklyarov was arrested in the United States after presenting a speech at [[DEF CON]] and subsequently spent several months in jail.<ref>[http://www.wired.com/politics/law/news/2001/08/45879 Sklyarov: A Huge Sigh of Release]</ref> The DMCA has also been cited as [[chilling effect (term)|chilling]] to legitimate users, such as students of [[cryptanalysis]] (including, in a well-known instance, Professor [[Edward Felten]] and students at [[Princeton University|Princeton]]<ref>[http://cryptome.org/sdmi-attack.htm RIAA challenges SDMI attack] 2002-01-07, Retrieved on 2007-02-26</ref>), and security consultants such as [[Niels Ferguson]], who has declined to publish information about vulnerabilities he discovered in an [[Intel]] secure-computing scheme because of his concern about being arrested under the DMCA when he travels to the US.<ref>[http://www.securityfocus.com/news/236 Video crypto standard cracked?]</ref>


In 2015 [[Volkswagen]] abused the DMCA to hide their vehicles' [[Volkswagen emissions scandal|emissions cheat]].<ref>{{Cite web|url=https://www.eff.org/deeplinks/2015/09/researchers-could-have-uncovered-volkswagens-emissions-cheat-if-not-hindered-dmca|title=Researchers Could Have Uncovered Volkswagen's Emissions Cheat If Not Hindered by the DMCA|first=Kit|last=Walsh|date=September 21, 2015|website=Electronic Frontier Foundation}}</ref> It has been suggested that had the DMCA not prevented access to the software "...{{nbsp}}a researcher with legal access to Volkswagen's software could have discovered the code that changed how the cars behave in testing{{nbsp}}..."<ref>{{Cite magazine|url=https://www.wired.com/2015/09/epa-opposes-rules-couldve-exposed-vws-cheating/|title=The EPA Opposes Rules That Could've Exposed VW's Cheating|first=Alex|last=Davies|magazine=Wired |via=www.wired.com}}</ref>
==See also==
''Related US laws:''
*The "No Electronic Theft" ([[NET Act|NET]]) Act
*[[Copyright Term Extension Act]] (1998)


=== Effect on analog video equipment ===
''Proposed US legislation:''
*Benefit Authors without Limiting Advancement or Net Consumer Expectations ([[H.R. 1066|BALANCE]]) Act of 2003
*The "Inducing Infringement of Copyrights Act" ([[Inducing Infringement of Copyrights Act|INDUCE]]) Act (introduced 2004)
*[[Pirate Act]] (introduced 2004)
*Digital Media Consumers' Rights Act ([[DMCRA]]) (introduced 2003 & 2005)
*[[Digital Transition Content Security Act]] (introduced 2005)


[[Analog Copy Protection]] (ACP), the encryption technology created by [[Rovi Corporation]] (formerly Macrovision, now TiVo), is designed to thwart users' attempts to reproduce content via analog cables. When a DVD is played through an analog video cable and recorded using a [[VCR]], Rovi's ACP technology will distort the copy partially or completely.<ref>{{cite web|url=http://www.rovicorp.com/products/content_producers/protect/acp.htm|title=ACP|access-date=2010-07-12|archive-url=https://web.archive.org/web/20100327214055/http://www.rovicorp.com/products/content_producers/protect/acp.htm|archive-date=2010-03-27|url-status=dead}}</ref>
''Related non-US law:''
*[[EU Copyright Directive]] ([[European Union]])
*[[DADVSI]] ([[France]] — ''Loi sur le Droit d'Auteur et les Droits Voisins dans la Société de l'Information'')
*[[Bill C-60]] ([[Canada]] — ''proposed'')
*[[Bill C-61 (39th Canadian Parliament, 2nd Session)|Bill C-61]] (Canada — ''proposed'')


The technology works by adding additional lines to the video signal. In the [[NTSC]] video standard, blank lines ([[vertical blanking interval]]s) that the user cannot see are used for functions like closed captioning. Rovi Corporation uses these blank lines to implement its ACP technology.<ref>{{Cite web|url=https://www.techtarget.com/whatis/definitions/V|title=V – V to M to VIR &#124; WhatIs.com – Search Results &#124; {1}|website=www.techtarget.com}}</ref>
''DMCA anti-circumvention cases'':
*''[[Chamberlain v. Skylink]]''
*''[[Universal v. Reimerdes]]''
*[[Dmitri Sklyarov]] in [[The case of Sklyarov, ElcomSoft, Adobe, and the DMCA]]
*''[[Lexmark Int'l v. Static Control Components]]''


The implementation of ACP has been ill-regarded by some video enthusiasts. Many claim that the technology has led to signal issues with VCRs and analog video equipment. Some VCRs misread the encryption used to prevent copying, distorting the video image regardless of whether the recording is original or a copy.
''DMCA damages cases'':
*''[[Stockwire Research Group, Inc., et. al. v. Lebed, et. al.]]''


The DMCA has been criticized for forcing all producers of analog video equipment to support the proprietary copy protection technology of Rovi Corporation, a commercial firm. The producers of video equipment are forced by law to support and implement the corporation's proprietary technology. This benefits Rovi Corporation financially, whereas those forced to implement it receive neither profit nor compensation.<ref>{{cite web|url=http://www.publicknowledge.org/node/19|title=Analog Off|website=Publicknowledge.org|access-date=2010-07-12|archive-url=https://web.archive.org/web/20100627184546/http://www.publicknowledge.org/node/19|archive-date=2010-06-27|url-status=dead}}</ref><ref>{{cite web|title=Another DMCA Misuse: Macrovision v. Sima|date=15 August 2006|url=https://www.eff.org/deeplinks/2006/08/another-dmca-misuse-macrovision-v-sima|publisher=Electronic Frontier Foundation}}</ref>
''DMCA notice-and-takedown issues'':

*[[Online Copyright Infringement Liability Limitation Act]] (OCILLA) (more information about the DMCA 512 takedown provisions)
Additionally, some criticize the implementation of ACP as a violation of their [[fair use]] rights. A TV-streaming product called the [[Slingbox]] uses analog signals to convey video from television to a mobile device. However, the encryption used by ACP blocks analog transmission, rendering the Slingbox unusable. Additionally ACP blocks the use of recording for educational purposes. On one or more accounts, students have not been able to cite and record cable sources properly due to ACP restrictions.<ref>{{cite web|url=https://www.eff.org/issues/analog-hole|title=Analog Hole|publisher=Electronic Frontier Foundation|access-date=2013-01-13}}</ref>

===Effect on research===
{{Main|Digital rights management}}

The DMCA has affected the worldwide [[cryptography]] research community, since an argument can be made that any cryptanalytic research violates, or might violate, the DMCA. The arrest of Russian programmer [[Dmitry Sklyarov]] in 2001, for alleged infringement of the DMCA, was a highly publicized example of the law's use to prevent or penalize development of anti-DRM measures.<ref>{{cite web|url=http://www.cybercrime.gov/Sklyarovindictment.htm |title=First Indictment Under Digital Millennium Copyright Act Returned Against Russian National |publisher=Cybercrime.gov |access-date=2011-11-12 |url-status=dead |archive-url=https://web.archive.org/web/20111017035005/http://www.cybercrime.gov/Sklyarovindictment.htm |archive-date=October 17, 2011 }}</ref> While working for [[ElcomSoft]] in Russia, he developed ''The Advanced eBook Processor'', a software application allowing users to strip usage restriction information from restricted [[e-book]]s, an activity legal in both Russia and the United States.<ref>{{cite web|url=https://www.adobe.com/aboutadobe/pressroom/pressreleases/200108/elcomsoftqa.html|title=Adobe FAQ: ElcomSoft legal background|publisher=Adobe.com|access-date=2011-11-12|archive-url=https://web.archive.org/web/20111104031758/http://www.adobe.com/aboutadobe/pressroom/pressreleases/200108/elcomsoftqa.html|archive-date=2011-11-04|url-status=dead}}</ref> Paradoxically, under the DMCA, it is not legal in the United States to provide such a tool. Sklyarov was arrested in the United States after presenting a speech at [[DEF CON (convention)|DEF CON]] and subsequently spent nearly a month in jail.<ref>{{cite news|author=Farhad Manjoo|url=https://www.wired.com:80/politics/law/news/2001/12/49272|archive-url=https://web.archive.org/web/20140324044239/http://www.wired.com/politics/law/news/2001/12/49272|url-status=dead|archive-date=2014-03-24|title=Sklyarov: A Huge Sigh of Release|publisher=Wired.com|date=2001-08-07|access-date=2014-03-24}}</ref> The DMCA has also been cited as [[chilling effect (term)|chilling]] to legitimate users, such as students of [[cryptanalysis]] (including, in a well-known instance, Professor [[Edward Felten]] and students at [[Princeton University|Princeton]]),<ref>[http://cryptome.info/sdmi-attack.htm RIAA challenges SDMI attack] 2002-01-07, Retrieved on 2007-02-26</ref> and security consultants such as [[Niels Ferguson]], who has declined to publish information about vulnerabilities he discovered in an [[Intel Corporation|Intel]] secure-computing scheme because of his concern about being arrested under the DMCA when he travels to the U.S.<ref>{{cite web|author=Ann Harrison|url=http://www.securityfocus.com/news/236|title=Video crypto standard cracked?|publisher=Securityfocus.com|date=2001-08-13|access-date=2011-11-12|archive-date=2020-08-02|archive-url=https://web.archive.org/web/20200802160713/https://www.securityfocus.com/news/236|url-status=dead}}</ref>

===Effect on innovation and competition===
In at least one court case, the DMCA has been used by [[Open-source software|open source]] software projects to defend against conversion of software (i.e., license violations) that involved removal of copyright notices.<ref>{{cite web|url=http://www.decoderpro.net/k/docket/395.pdf|title=Jacobsen v Katzer: Order Granting in Part and Denying in Part Plaintiff's Motion for Summary Judgement and Denying Defendants Motion for Partial Summary Judgement|access-date=2010-05-29}}</ref>

Jonathan Bailey of ''Plagiarism Today'' argued that the DMCA has left [[Kindle Direct Publishing]] (an [[Amazon (company)|Amazon]] subsidiary) with no incentive to find new innovations for vetting submitted books for [[plagiarism]] or copyright theft before allowing them to be published. According to Bailey, "Amazon doesn't do much to vet the books it publishes. Plagiarism isn't even mentioned in its KDP help files. What this means is that it's trivial to publish almost anything you want regardless of the quality of the work or, in these cases, how original it is. In fact, many complain that Amazon fails to vet works for even simple issues such as formatting and layout. Though Amazon will, sometimes, remove works that violates their terms of service after they get complaints, they're happy to sell the books and reap the profits until they get such a notice. And, from Amazon's perspective, this is completely legal. They are protected by the Digital Millennium Copyright Act (DMCA) as well as other laws, in particular [[Section 230]] of the Communications Decency Act, that basically mean they are under no obligation to vet or check the works they publish. They are legally free to produce and sell books, physical and digital, regardless of whether they are plagiarized, copyright infringing or otherwise illegal."<ref>{{cite web |last1=Bailey |first1=Jonathan |title=How Amazon Could Fix Its Plagiarism Problem And Why It Never Will... |url=https://www.plagiarismtoday.com/2019/02/26/how-amazon-could-fix-its-plagiarism-problem/ |website=www.plagiarismtoday.com |date=26 February 2019 |publisher=Plagiarism Today |access-date=14 August 2022}}</ref>

==Legislative reform==
{{See also|Digital Copyright Act}}

There have been several Congressional efforts to modify the Act. [[The Unlocking Technology Act of 2013]] was introduced to attempt to exempt non-infringing uses from the anti-circumvention clause.<ref name="Couts">{{Cite news|author=Couts, Andrew|date=9 May 2013|title=Awesome new bill legalizes cell phone unlocking, 'fixes' the DMCA|newspaper=Digital Trends Newsletter|publisher=Designtechnica Corporation|url=http://www.digitaltrends.com/mobile/new-bill-legalizes-cell-phone-unlocking-fixes-the-dmca/|archive-url=https://web.archive.org/web/20130703073505/http://www.digitaltrends.com/mobile/new-bill-legalizes-cell-phone-unlocking-fixes-the-dmca/|archive-date=3 July 2013|url-status=live}}</ref> However, the bill was not passed by Congress. In 2014, the [[Unlocking Consumer Choice and Wireless Competition Act]] was passed, granting a specific exemption for unlocking cell phones, without affecting the other provisions of the DMCA.

Bills in 2015 included the Unlocking Technology Act of 2015,<ref>{{Cite web|url=https://www.govtrack.us/congress/bills/114/hr1587/text|title=Text of H.R. 1587 (114th): Unlocking Technology Act of 2015 (Introduced version)|website=GovTrack.us}}</ref> and the Breaking Down Barriers to Innovation Act of 2015.<ref>{{Cite web|url=http://www.congress.gov/|title=S.990 – 114th Congress (2015-2016): Breaking Down Barriers to Innovation Act of 2015|first=Ron|last=Wyden|date=April 16, 2015|website=www.congress.gov}}</ref> Republicans are considering legislation as well, as it becomes clear that Section 1201 is impeding the country's security. Facing escalating numbers of cyberthreats, cybersecurity researchers petitioned to conduct research to keep pace with evolving cybersecurity risks and vulnerabilities, stating: "Without such an exemption, security risks will lie unaddressed and the public will be substantially less safe."<ref>[http://engagedscholarship.csuohio.edu/cgi/viewcontent.cgi?article=1007&context=lawfac_reports Engagedscholarship.csuohio.edu]</ref> The bills are intended to address the fact that section 1201 prevents circumvention even when doing so is not copyright infringement. In addition, the section requires exemption proponents to bear the burden of proof every time their exemption comes up for triennial review, instead of there being a presumption of renewal for an exemption whose importance was previously proven.

[[Rick Boucher]], a congressman from Virginia, led previous efforts by introducing the [[Digital Media Consumers' Rights Act]] (DMCRA).

A prominent bill related to the DMCA is the [[Consumer Broadband and Digital Television Promotion Act]] (CBDTPA), known in early drafts as the Security Systems and Standards Certification Act (SSSCA). This bill, if it had passed, would have dealt with the devices used to access digital content and would have been even more restrictive than the DMCA.{{vague|date=February 2015}}

Senator [[Thom Tillis]] introduced a draft revision of the DMCA in December 2020. A fundamental change in his language would be to support "[[notice and stay down]]" for service providers, requiring them to take measures to prevent material that has already been determined to be violating copyright to be re-uploaded by users. While the draft was praised by the entertainment industry, free speech advocacy groups feared the language would require services to employ automatic filtering and would further limit freedom of expression.<ref>{{cite web | url = https://variety.com/2020/politics/news/thom-tillis-online-copyright-act-1234871695/ | title = Sen. Thom Tillis Proposes 'Notice and Stay Down' Rewrite of Online Copyright Law | first = Gene | last=Maddaus | date = December 22, 2020 | access-date = December 30, 2020 | work = [[Variety (magazine)|Variety]] }}</ref>

==Opposition==
On the fifth anniversary of the DMCA, and several times afterwards, the [[Electronic Frontier Foundation]] documented harmful consequences of the anti-circumvention provisions.<ref>{{cite web|url=https://www.eff.org/wp/unintended-consequences-under-dmca |title=Unintended Consequences: Twelve Years under the DMCA &#124; Electronic Frontier Foundation |publisher=Eff.org |date=2010-03-03 |access-date=2013-06-14}}</ref> They document that the DMCA:

# Stifles free expression, such as in its use against Russian programmer [[Dmitry Sklyarov]], Princeton Professor [[Edward Felten]], and journalists;
# Jeopardizes [[fair use]];
# Impedes competition, such as blocking aftermarket competition in toner cartridges, garage door openers, and enforcing [[walled garden (technology)|walled gardens]] around the [[iPod]];<ref>[[OdioWorks v. Apple]] [https://www.eff.org/cases/odioworks-v-apple Eff.org]</ref> and
# Interferes with computer intrusion laws.<ref>{{cite web|url=https://www.eff.org/wp/unintended-consequences-under-dmca|title=Unintended Consequences: Twelve Years under the DMCA|date=March 2010|publisher=[[Electronic Frontier Foundation]]}}</ref>

In July 2016, the [[Electronic Frontier Foundation]] sued the US government in ''[[Green v. Department of Justice]]'' alleging that Section 1201 violates the [[First Amendment to the United States Constitution|First Amendment]].<ref>[https://www.engadget.com/2016/07/22/eff-sues-us-government-dmca/ EFF sues US government to void 'onerous' copyright rules]</ref>

==See also==
{{Portal|United States|Politics|Internet}}
;Proposed international law
* [[Anti-Counterfeiting Trade Agreement]]
;DMCA anti-circumvention cases
{{Div col|colwidth=27em}}
* ''[[321 Studios v. Metro Goldwyn Mayer Studios, Inc.]]''
* ''[[Chamberlain v. Skylink]]''
* ''[[Facebook, Inc. v. Power Ventures, Inc.]]''
* ''[[Lexmark Int'l v. Static Control Components]]''
* ''[[Murphy v. Millennium Radio Group LLC]]''
* [[Dmitry Sklyarov]] in ''[[United States v. ElcomSoft and Sklyarov]]''
* ''[[Universal v. Reimerdes]]''
{{Div col end}}
;DMCA notice-and-takedown issues
* [[Online Copyright Infringement Liability Limitation Act]] (OCILLA) (more information about the DMCA 512 takedown provisions)
* [[Lumen (website)|Lumen]] (clearinghouse for DMCA takedowns)
* ''[[Lenz v. Universal Music Corp.]]''
;Economic concepts
* [[Protectionism]]
;Related US laws
* [[Copyright Term Extension Act]] (1998)
* [[Digital Performance Right in Sound Recordings Act]] (1995)
* [[Inducement rule]]
* [[NET Act]], the "No Electronic Theft"
;Proposed US legislation
* [[BALANCE Act]], Benefit Authors without Limiting Advancement or Net Consumer Expectations Act of 2003
* [[Inducing Infringement of Copyrights Act]] (INDUCE) (introduced 2004)
* [[Pirate Act]] (introduced 2004)
* [[Digital Media Consumers' Rights Act]] (introduced 2003 & 2005)
* [[Digital Transition Content Security Act]] (introduced 2005)
* [[FAIR USE Act]] (introduced in 2007)
;Shelved US Legislation
* [[PROTECT IP Act]] (introduced in 2011, stopped by protests)
* [[Stop Online Piracy Act]] (SOPA) (introduced in 2011, stopped by protests)
;Related international law
* [[DADVSI]] ([[France]] – ''Loi sur le Droit d'Auteur et les Droits Voisins dans la Société de l'Information'')
* [[Digital Economy Act 2010]] ([[United Kingdom]])
* [[Copyright law of the European Union]]
* [[Protection of Broadcasts and Broadcasting Organizations Treaty]] (''proposed'')


==References==
==References==
{{reflist|30em}}
* ''[http://www.msen.com/~litman/digital-copyright/ Digital Copyright]'' by [[Jessica Litman]] (2001), a history of the lobbying that led to the DMCA.


===Footnotes===
===Further reading===
{{reflist|2}}
{{refbegin}}
* {{cite book|last=Litman|first=Jessica|author-link=Jessica Litman|title=Digital Copyright|publisher=[[Prometheus Books]]| location=Berlin| date=2000<!--ref: https://www.amazon.com/exec/obidos/ASIN/1573928895/o/qid=978292479/sr=8-1/ref=aps_sr_b_1_1/105-7381207-3264763-->|page=[https://archive.org/details/digitalcopyright00litm_0/page/208 208]|isbn=1-57392-889-5|title-link=Digital Copyright}}
{{refend}}


==External links==
==External links==
{{Wikisource-inline}}
{{Portal|Internet|Crystal_Clear_app_browser.png}}
* [https://www.govinfo.gov/link/plaw/105/public/304?link-type=pdf&.pdf Digital Millennium Copyright Act] as enacted ([https://www.govinfo.gov/link/plaw/105/public/304?link-type=details details]) in the [[United States Statutes at Large|US Statutes at Large]]
===DMCA information===
* {{USBill|105|HR|2281}}, DMCA
{{wikisource-inline}}
*[http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.2281: Text of the DMCA]
* [http://www.copyright.gov/legislation/dmca.pdf U.S. Copyright Office summary of the DMCA] ([[Portable Document Format|PDF]] format)
* [https://wikimediafoundation.org/wiki/Category:DMCA Wikimediafoundation.org]
*[http://www.copyright.gov/legislation/dmca.pdf U.S. Copyright Office summary of the DMCA] ([[Portable Document Format|PDF]] format)
*[http://www.law.cornell.edu/uscode/17/ Title 17 of the U.S. Code], Cornell Law School
* [https://www.law.cornell.edu/uscode/17/ Title 17 of the U.S. Code], Cornell Law School
*[http://www.cybertelecom.org/ip/dmca.htm Cybertelecom's DMCA information and background material]
* [http://www.cybertelecom.org/ip/dmca.htm Cybertelecom's DMCA information and background material]
* [http://www.newmediarights.org/guide/legal/copyright/citizens_legal_guide_digital_millenium_copyright_act_dmca A citizen's guide to the DMCA]
* [http://www.anti-dmca.org/ Anti-DMCA], a website that has updates on DMCA lawsuits.
* [http://www.marketingdock.com/copyrights/dealing-with-copyright-infringement.php Info on Dealing with Digital Copyrights Infringement including filing DMCA Notices] {{Webarchive|url=https://web.archive.org/web/20210211223019/http://www.marketingdock.com/copyrights/dealing-with-copyright-infringement.php |date=2021-02-11 }}
*[http://chillingeffects.org/ ChillingEffects.org], a clearinghouse of DMCA 512 notices and cease and desist letters
* [http://tcattorney.typepad.com/digital_millennium_copyri/2007/08/post.html Interview of Marcia Hoffman from the EFF on Lenz v. Universal DMCA lawsuit]
*[http://www.learnaboutlaw.com/General/learnaboutDMCA.htm]LearnAboutLaw.com, DMCA Instructions with sample DMCA notices and counter-notices
* Seth Finkelstein, ''[https://web.archive.org/web/20071012204332/http://www.eff.org/IP/DMCA/finkelstein_on_dmca.html How To Win (DMCA) Exemptions And Influence Policy]''.
*[http://www.marketingdock.com/copyrights/dealing-with-copyright-infringement.php Info on Dealing with Digital Copyrights Infringement including filing DMCA Notices]
* [https://www.eff.org/issues/dmca The Electronic Frontier Foundation (EFF) page on the DMCA]
*[http://tcattorney.typepad.com/digital_millennium_copyri/2007/08/post.html Interview of Marcia Hoffman from the EFF on Lenz v. Universal DMCA lawsuit]
* [https://www.eff.org/files/DMCAUnintended10.pdf Unintended Consequences: Ten Years under the DMCA – EFF]
* Seth Finkelstein, ''[http://www.eff.org/IP/DMCA/finkelstein_on_dmca.html How To Win (DMCA) Exemptions And Influence Policy]''.

* [http://www.eff.org: The Electronic Frontier Foundation (EFF)]
{{USCopyrightActs}}
* Bill D. Herman and Oscar H. Gandy, Jr., [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=844544 Catch 1201: A Legislative History and Content Analysis of the DMCA Exemption Proceedings]
* Marcia Wilbur, ''[http://www.tim.netblues.org - (Downloads) A Decade Under the DMCA presentation for The Last Hope, July 2008]''.
* DMCA Wiki [http://www.dmcawiki.com: Contributatory wiki dedicated to DMCA information and cases]


{{authority control}}
[[Category:1998 in law]]
[[Category:1998 in the United States]]
[[Category:Computer law]]
[[Category:Copyright legislation]]
[[Category:United States copyright law]]
[[Category:United States federal intellectual property legislation]]


[[cs:Digital Millennium Copyright Act]]
[[Category:Digital Millennium Copyright Act| ]]
[[Category:United States federal communications legislation]]
[[de:Digital Millennium Copyright Act]]
[[Category:United States federal computing legislation]]
[[es:Digital Millennium Copyright Act]]
[[Category:United States federal copyright legislation]]
[[eu:DMCA]]
[[Category:United States federal criminal legislation]]
[[fr:Digital Millennium Copyright Act]]
[[Category:Internet law in the United States]]
[[it:Digital Millennium Copyright Act]]
[[Category:Acts of the 105th United States Congress]]
[[hu:Digital Millennium Copyright Act]]
[[Category:History of the Internet]]
[[ja:デジタルミレニアム著作権法]]
[[Category:Hardware restrictions]]
[[no:Digital Millennium Copyright Act]]
[[Category:Controversies in the United States]]
[[pl:DMCA]]
[[Category:1998 in American law]]
[[pt:Digital Millennium Copyright Act]]
[[Category:October 1998 events in the United States]]
[[ru:DMCA]]
[[fi:Digital Millennium Copyright Act]]

Latest revision as of 08:01, 1 May 2024

Digital Millennium Copyright Act
Great Seal of the United States
Long titleTo amend title 17, United States Code, to implement the World Intellectual Property Organization Copyright Treaty and Performances and Phonograms Treaty, and for other purposes.
Acronyms (colloquial)DM, DMCA
Enacted bythe 105th United States Congress
EffectiveOctober 28, 1998
Citations
Public lawPub. L. 105-304
Statutes at Large112 Stat. 2860
Codification
Acts amendedCopyright Act of 1976
Titles amended5 (Government Organization and Employees); 17 (Copyrights); 28 (Judiciary and Judicial Procedure); 35 (Patents)
U.S.C. sections created17 U.S.C. §§ 512, 1201–1205, 1301–1332; 28 U.S.C. § 4001
U.S.C. sections amended17 U.S.C. §§ 101, 104, 104A, 108, 132, 114, 117, 701
Legislative history

The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works (commonly known as digital rights management or DRM). It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. [citation needed] In addition, the DMCA heightens the penalties for copyright infringement on the Internet.[1][2] Passed on October 12, 1998, by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while limiting the liability of the providers of online services for copyright infringement by their users.

The DMCA's principal innovation in the field of copyright is the exemption from direct and indirect liability of Internet service providers and other intermediaries. This exemption was adopted by the European Union in the Electronic Commerce Directive 2000. The Information Society Directive 2001 implemented the 1996 WIPO Copyright Treaty in the EU.

Background and legislative history

The Digital Millennium Copyright Act (DMCA) had its basis as part of the United States' commitment to comply with two treaties passed by the World Intellectual Property Organization (WIPO) in December 1996 that dealt with the nature of copyright with modern information systems such as the Internet. The WIPO Copyright Treaty identified numerous electronic works as eligible for copyright protection, and stated that circumvention of technological measures used to secure electronic works was to be prohibited. The WIPO Performances and Phonograms Treaty worked to normalize the copyright protections for performed works as uniformly for member states as possible.[3]

The process of ratifying the treaties for the United States was the first major piece of copyright-related legislation since the Copyright Act of 1976, and led to numerous interested groups to express concerns for how the treaties should be implemented, including content producers and distributors, technology manufacturers, online service providers, researchers and academics, and consumer groups. Some groups urged for stronger copyright enforcement while others sought more relaxing of rules. As the bill was being formed in the Commerce Committee in the House of Representatives, the committee recognized that the final bill would be far more encompassing than just copyright reform but would be establishing key principles in the digital commerce marketplace.[3]

In evaluating the enforcement of the WIPO Copyright Treaty with its anti-circumvention provisions with U.S. copyright law, lawmakers recognized that traditionally copyright law did not generally account for the medium of the work, as it was generally impossible to make an exact copy of an analog work previously, and current law was only concerned with unlawful acts of copyright violations. Since digital technology could allow for infinite numbers of exact copies of works to be made, the lawmakers agreed they had to extend copyright to include limits on devices and services which could be used for circumvention in addition to acts of circumvention.[3] In establishing this, the lawmakers also recognized this would have a negative impact on fair use without exceptions, with electronic works potentially falling into the public domain but still locked beyond circumvention measures, but they also needed to balance the rights of copyright holders. The DMCA as passed contained some basic fair use allowance such as for limited reverse engineering and for security research. Lawmakers opted to create a rulemaking mechanism through the United States Copyright Office to review the state of copyrights and fair use to make limited classes of allowance for fair use which would be considered lawful means of using circumvention technology.[3]

Provisions

Title I: WIPO Copyright and Performances and Phonograms Treaties Implementation Act

DMCA Title I, the WIPO Copyright and Performances and Phonograms Treaties Implementation Act, amends U.S. copyright law to comply with the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty, adopted at the WIPO Diplomatic Conference in December 1996. The treaties have two major portions. One portion includes works covered by several treaties in U.S. copy prevention laws and gave the title its name. For further analysis of this portion of the Act and of cases under it, see WIPO Copyright and Performances and Phonograms Treaties Implementation Act.

The second portion (17 U.S.C. 1201) is often known as the DMCA anti-circumvention provisions. These provisions changed the remedies for the circumvention of copy-prevention systems (also called "technical protection measures"). The section contains a number of specific limitations and exemptions, for such things as government research and reverse engineering in specified situations. Although section 1201(c) of the title stated that the section does not change the underlying substantive copyright infringement rights, remedies, or defenses, it did not make those defenses available in circumvention actions. The section does not include a fair use exemption from criminality nor a scienter requirement, so criminal liability could attach to even unintended circumvention for legitimate purposes.[4]

Title II: Online Copyright Infringement Liability Limitation Act

DMCA Title II, the Online Copyright Infringement Liability Limitation Act ("OCILLA"), creates a safe harbor for online service providers (OSPs, including ISPs) against copyright infringement liability, provided they meet specific requirements.[5] OSPs must adhere to and qualify for certain prescribed safe harbor guidelines and promptly block access to alleged infringing material (or remove such material from their systems) when they receive notification of an infringement claim from a copyright holder or the copyright holder's agent (a "notice and takedown" process). OCILLA also includes a counternotification provision that offers OSPs a safe harbor from liability to their users when users claim that the material in question is not, in fact, infringing. OCILLA also facilitates issuing of subpoenas against OSPs to provide their users' identity.

Title III: Computer Maintenance Competition Assurance Act

DMCA Title III modified section 117 of the copyright title so that those repairing computers could make certain temporary, limited copies while working on a computer. It reversed the precedent set in MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511 (9th Cor. 1993).

Title IV: Miscellaneous Provisions

DMCA Title IV contains an assortment of provisions:

  • Clarified and added to the duties of the Copyright Office.
  • Added ephemeral copy for broadcasters provisions, including certain statutory licenses.
  • Added provisions to facilitate distance education.
  • Added provisions to assist libraries with keeping phonorecords of sound recordings.
  • Added provisions relating to collective bargaining and the transfer of movie rights.

Title V: Vessel Hull Design Protection Act

DMCA Title V added sections 1301 through 1332 to add a sui generis protection for boat hull designs. Boat hull designs were not considered covered under copyright law because boats are useful articles whose form cannot be separated from their function as determined by the Supreme Court case Bonito Boats, Inc. v. Thunder Craft Boats, Inc..[3][6][7]

Anti-circumvention exemptions

In addition to the safe harbors and exemptions the statute explicitly provides, 17 U.S.C. 1201(a)(1) requires that the Librarian of Congress issue exemptions from the prohibition against circumvention of access-control technology. Exemptions are granted when it is shown that access-control technology has had a substantial adverse effect on the ability of people to make non-infringing uses of copyrighted works.

The exemption rules are revised every three years. Exemption proposals are submitted by the public to the Registrar of Copyrights, and after a process of hearings and public comments, the final rule is recommended by the Registrar and issued by the Librarian. Exemptions expire after three years and must be resubmitted for the next rulemaking cycle.

Previous exemptions

The Copyright Office approved two exemptions in 2000, four in 2003, six each in 2006 and 2010, five in 2012, and nine in 2015.

2000 rulemaking

In 2000, the first rulemaking, the Office exempted:[8]

  • "Compilations consisting of lists of websites blocked by filtering software applications" (renewed in 2003 but not renewed in 2006); and
  • "Literary works, including computer programs and databases, protected by access control mechanisms that fail to permit access because of malfunction, damage, or obsoleteness." (revised and limited in 2003 and again in 2006).
2003 rulemaking

In 2003, the Office made the following rules:[9]

  • The 2000 filtering exemption was revised and renewed.
  • The 2000 "literary works including computer programs" exemption was limited to "Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete" and this exemption was renewed in both 2006 and 2010.
  • A new exemption was implemented for electronic books for which technological protection measures prevented the use of read-aloud software or screen readers. This exemption was renewed in 2006, 2010, 2012, and 2015.
  • A new exemption was made for "Computer programs and video games distributed in formats that have become obsolete and which require the original media or hardware as a condition of access." This exemption was renewed in 2006 but not in 2010.
2006 rulemaking

In 2006, the Office made the following rules:[10]

  • The 2003 exemption on obsolete computer programs and video games was renewed.
  • The 2003 exemption on computer programs protected by dongles was renewed.
  • The 2003 exemption on electronic books was renewed.
  • A new exemption was made for sound recordings allowed after security flaws were found in a copy protection system on some Sony CDs; this was not renewed in 2010.
  • A new exemption was implemented covering the audiovisual works included in the educational library of a college or university's film or media studies department; this was not renewed in 2010.
  • A new exemption was implemented allowing circumvention to allow wireless telephone handsets to connect to wireless networks. This exemption was revised in 2010 to specify used handsets and require authorization from the wireless network operator. Another exemption for wireless handsets was introduced in 2010 specific to interoperability software on the phone itself.
2010 rulemaking

Rulemaking was scheduled to occur in 2009, but the final rule was not issued until the following year. The 2010 exemptions, issued in July 2010, are:[11]

  • Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances:
    • Educational uses by college and university professors and by college and university film and media studies students;
    • Documentary filmmaking;
    • Obsolete software and video game formats.
    • Noncommercial videos. (A new exemption in 2010, similar to a previous educational exemption.)
  • Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset. (A new exemption in 2010.)
  • Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network. (Revised from a similar exemption approved in 2006.)
  • Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if:
    • The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and
    • The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law. (A new exemption in 2010.)
  • Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace. (A renewed exemption from 2006, based on a similar exemption approved in 2003.)
  • Literary works distributed in e-book format when all existing e-book editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book's read-aloud function or of screen readers that render the text into a specialized format. (A renewed exemption from 2006, based on a similar exemption approved in 2003.)
2012 rulemaking

The 2012 exemptions, issued in November 2012,[12] are for:

  • Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies
  • Computer programs that enable smartphones and portable all-purpose mobile computing devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device
  • Computer programs that enable certain types of wireless devices to connect to a wireless telecommunications network, when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network
  • Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in limited instances
  • Motion pictures and other audiovisual works on DVDs that are protected by the Content Scrambling System, or that are distributed by an online service and protected by technological measures that control access to such works, where circumvention is related to developing captioning and descriptive audio technologies
2015 rulemaking

The 2015 exemptions, issued in October 2015,[13] are for:

  • Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in limited instances,
  • Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies,
  • Computer programs that enable the following types of wireless devices to connect to a wireless telecommunications network, when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network,
  • Computer programs that enable smartphones, tablets, and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device,
  • Computer programs that are contained in and control the functioning of a motorized land vehicle such as a personal automobile, commercial motor vehicle, or mechanized agricultural vehicle, except for computer programs primarily designed for the control of telematics or entertainment systems for such vehicle, when circumvention is a necessary step undertaken by the authorized owner of the vehicle to allow the diagnosis, repair or lawful modification of a vehicle function,
  • Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates solely for the purpose of good-faith security research and does not violate any applicable law,
  • Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay,
  • Computer programs that operate 3D printers that employ microchip-reliant technological measures to limit the use of feedstock, when circumvention is accomplished solely for the purpose of using alternative feedstock and not for the purpose of accessing design software, design files or proprietary data, and
  • Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, where such circumvention is undertaken by a patient for the sole purpose of lawfully accessing the data generated by his or her own device or monitoring system.
2018 rulemaking

The 2018 exemptions, issued in October 2018, are for:[14]

  • Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment, for supervised educational purposes, or to accommodate for accessibility for disabled students in educational institutions;
  • Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies;
  • Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, for the sole purpose of lawfully accessing the data on one's own device;
  • Computer programs that enable wireless devices to connect to a wireless telecommunications network when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network;
  • Computer programs that enable smartphones, tablets and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device;
  • Computer programs that enable smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smart television;
  • Computer programs that enable voice assistant devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the device;
  • Computer programs that are contained in and control the functioning of a motorized land vehicle such as a personal automobile, commercial motor vehicle, or mechanized agricultural vehicle, except for computer programs primarily designed for the control of telematics or entertainment systems for such vehicle, when circumvention is a necessary step undertaken by the authorized owner of the vehicle to allow the diagnosis, repair or lawful modification of a vehicle function;
  • Computer programs that are contained in and control the functioning of a lawfully acquired smartphone or home appliance or home system when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device or system;
  • Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates solely for the purpose of good-faith security research and does not violate any applicable law,
  • Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay;
  • Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, that do not require access to an external computer server for gameplay, and that are no longer reasonably available in the commercial marketplace, solely for the purpose of preservation of the game in a playable form by an eligible library, archives, or museum;
  • Computer programs used to operate video game consoles solely to the extent necessary for an eligible library, archives, or museum to engage in the preservation activities for the video game exceptions above;
  • Computer programs, except video games, that have been lawfully acquired and that are no longer reasonably available in the commercial marketplace, solely for the purpose of lawful preservation of a computer program, or of digital materials dependent upon a computer program as a condition of access, by an eligible library, archives, or museum; and
  • Computer programs that operate 3D printers that employ microchip-reliant technological measures to limit the use of feedstock, when circumvention is accomplished solely for the purpose of using alternative feedstock and not for the purpose of accessing design software, design files, or proprietary data.
2021 rulemaking

The 2021 exemptions, issued in October 2021, are for:[15]

  • Motion pictures (including television shows and videos), as defined in 17 U.S.C. 101, where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment, for supervised educational purposes, to accommodate for accessibility for disabled students in educational institutions, for preservation of the motion picture by a library, archive, or museum, or for research purposes at educational institutions;
  • Literary works, distributed electronically, that are protected by technological measures that either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies, or for research purposes at educational institutions;
  • Literary works consisting of compilations of data generated by medical devices that are wholly or partially implanted in the body or by their corresponding personal monitoring systems, for the sole purpose of lawfully accessing the data on one's own device;
  • Computer programs that enable wireless devices to connect to a wireless telecommunications network when circumvention is undertaken solely in order to connect to a wireless telecommunications network and such connection is authorized by the operator of such network;
  • Computer programs that enable smartphones, tablets, and portable all-purpose mobile computing devices, and smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smartphone or device or to permit removal of software from the smartphone or device;
  • Computer programs that enable smart televisions to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the smart television;
  • Computer programs that enable voice assistant devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the device;
  • Computer programs that enable routers and dedicated network devices to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the router or dedicated network device, and is not accomplished for the purpose of gaining unauthorized access to other copyrighted works;
  • Computer programs that are contained in and control the functioning of a lawfully acquired motorized land vehicle or marine vessel such as a personal automobile or boat, commercial vehicle or vessel, or mechanized agricultural vehicle or vessel, except for programs accessed through a separate subscription service, when circumvention is a necessary step to allow the diagnosis, repair, or lawful modification of a vehicle or vessel function, where such circumvention is not accomplished for the purpose of gaining unauthorized access to other copyrighted works;
  • Computer programs that are contained in and control the functioning of a lawfully acquired device that is primarily designed for use by consumers, when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device, and is not accomplished for the purpose of gaining access to other copyrighted works;
  • Computer programs that are contained in and control the functioning of a lawfully acquired medical device or system, and related data files, when circumvention is a necessary step to allow the diagnosis, maintenance, or repair of such a device or system.
  • Computer programs, where the circumvention is undertaken on a lawfully acquired device or machine on which the computer program operates, or is undertaken on a computer, computer system, or computer network on which the computer program operates with the authorization of the owner or operator of such computer, computer system, or computer network, solely for the purpose of good-faith security research.
  • Video games in the form of computer programs embodied in physical or downloaded formats that have been lawfully acquired as complete games, when the copyright owner or its authorized representative has ceased to provide access to an external computer server necessary to facilitate an authentication process to enable local gameplay;
  • Computer programs, except video games, that have been lawfully acquired and that are no longer reasonably available in the commercial marketplace, solely for the purpose of lawful preservation of a computer program, or of digital materials dependent upon a computer program as a condition of access, by an eligible library, archives, or museum, where such activities are carried out without any purpose of direct or indirect commercial advantage.
  • Computer programs that operate 3D printers that employ technological measures to limit the use of material, when circumvention is accomplished solely for the purpose of using alternative material and not for the purpose of accessing design software, design files, or proprietary data;
  • Computer programs, solely for the purpose of investigating a potential infringement of free and open source computer programs;
  • Video games in the form of computer programs, embodied in lawfully acquired physical or downloaded formats, and operated on a general-purpose computer, where circumvention is undertaken solely for the purpose of allowing an individual with a physical disability to use software or hardware input methods other than a standard keyboard or mouse.

2015 Study

After much criticism (see below), on December 29, 2015, the Copyright Office initiated a study to assess the operation of section 1201 and the triennial rulemaking process. This is different from usual public comments on exemption proposals. It includes the role of the anti-trafficking provisions and permanent exemptions, and the requirements of the rulemaking itself. The Office has issued a Notice of Inquiry requesting public comment.[16]

Several comments were posted by individuals and organizations.[17] An individual recalls that the Copyright Clause has limitations.[18] Association of American Publishers et al. hold there is no need to amend the statute or to significantly alter the rulemaking. They are happy with the protection they are being granted, including anti-trafficking provisions, and talk of placing the cart before the horse, when they argue about requiring a proof of the mindset that consumers would have when utilizing circumvention tools before actual acts of circumvention occur. In their opinion, the meaning of Section 1201 is to extend, not merely duplicate, copyright holder's rights.[19] Society of American Archivists say they are not aware that the anti-trafficking provisions of section 1201(a)(2) and 1201(b) have had any impact in deterring copyright infringement. They do know, however, that the provisions have created an absurd, Catch-22 situation for any archives that sought to adhere to the letter of the law.[20] iFixit also talks of Catch-22 on stressing that since it is up to proponents to show that an exemption is relevant, they need to show that there's overwhelming market demand if only it were legal.[21] Rapid7 notice that DMCA adversely affects good faith security research by forbidding researchers from circumventing technological protection measures (TPMs) to analyze software for vulnerabilities.[22] Cyberlaw Clinic at Harvard Law School points out that the rulemaking is a complicated, ad hoc, and unduly burdensome process.[23] Professors Andrea M. Matwyshyn, Steven M. Bellovin, Matt Blaze, J. Alex Halderman, and Nadia Heninger, jointly advocated making the security research exemption granted in the 2015 Triennial Section 1201 Rulemaking permanent.[24]

The Learning Disabilities Association of America (LDA) commented that circumventing DRM restrictions to meet accessibility needs deserves a permanent exception.[25] Entertainment Software Association gives a vivid and detailed description of a flourishing market which is only possible because of DMCA.[26] They are deeply concerned about people with disabilities, but that concern is already being taken care of by the copyright holders, so that no permanent exception is needed.[27]

Comments have also been submitted by, among others, R Street Institute[28] American Association of Law Libraries,[29] Business Software Alliance,[30] Alliance of Automobile Manufacturers,[31][32] Association of American Universities et al.,[33] Copyright Alliance,[34][35] Association for Computing Machinery U.S. Public Policy Council,[36] the Software and Information Industry Association,[37][38] DVD Copy Control Association ("DVD CCA") et al.,[39] Microsoft Corporation,[40] Association for Competitive Technology,[41] Public Knowledge,[42][43] American Automobile Association.[44]

In June 2017, the Copyright Office published a report where it "shares the concern" that Section 1201 can affect activities unrelated to copyright infringement, but also expressed concerns over weakening "the right of copyright owners to exercise meaningful control over the terms of access to their works online", which they believe is "essential to the development of the digital marketplace for creative content".[45] However, with respect to the question of whether the security research exemption granted in the 2015 Triennial cycle should be made permanent in some form, the Office recommended "that Congress consider expanding the reach of this exemption, easing the strict authorization requirement for researchers and restrictions on the use of information generated from the research, and abandoning or clarifying the multifactor test," stating that "it continues to believe that the exemption adopted in 2015 can be a useful starting point, and notes that most of the security researchers who petitioned for that exemption ... agree."[24]

Case law

Anti-circumvention

The anti-circumvention provisions in Section 1201 of the DMCA have seen some challenges in the courts but which have generally been upheld. While initially the challenges were focused on clear applications to software-based access control products, some cases considered how the DMCA also extended to hardware-based access controls.

Software-based case law

Universal City Studios, Inc. v. Reimerdes/Universal City Studios, Inc. v. Corley – Eight movie studios had sued Eric Corley, Shawn Reimerdes, and Roman Kazan, editors of 2600: The Hacker Quarterly, for publishing the code of DeCSS, an algorithm designed to bypass the Content Scramble System (CSS) used to encrypt DVD content. The studios argued that the code was an anti-circumvention device as defined by the DMCA. While Reimerdes and Kazan entered into consent decrees and were subsequently dropped from the suit, Corley continued the case. He argued that DeCSS, as computer code, was protected as free speech, and the DMCA allowed users to make copies of media they legally owned. Both the District Court and the Second Circuit rejected Corley's arguments. While the court agreed that a computer program qualifies as protected speech, the distribution of anti-circumvention devices was not considered a fair use option by Section 1201, and thus DeCSS was not protected by First Amendment rights.[46]

United States v. Elcom Ltd. – Moscow-based Elcom had developed software that was able to remove protections on an Adobe Acrobat PDF file, such as those used in ebook distribution. Adobe requested the U.S. Department of Justice take action against the company for violating the DMCA. Elcom argued in court that the DMCA was unconstitutionally vague and allowed for circumvention of use controls for purposes of fair use. The company also claimed that the act violated the First Amendment by placing too much burden on those seeking to use protected works for fair use. The initial ruling at the U.S. District Court for the Northern District of California rejected both arguments on the basis of Corley. The ruling established that the DMCA was not unconstitutional, and that while it did place a burden on users accessing works for fair use, the DMCA did not outright restrict fair use. In the case of the ebook example, the ruling observed that the user may have to type a quote from the ebook rather than copy and paste from the unprotected version.[47]

321 Studios v. Metro Goldwyn Mayer Studios, Inc. – 321 Studios made copies that allowed users to copy DVDs, including those with CSS copy protection, to another DVD or to a CD-ROM. The company sought declaratory judgment from MGM Studios that their software did not violate the DMCA, or sought to have the DMCA ruled unconstitutional. The case, heard in the United States District Court for the Northern District of California, ruled against 321 Studios on both arguments. The court ruled that 321 Studios' software was not protected speech and violated the DMCA. Additionally, they argued that the issues pertaining to the constitutionality of the DMCA were answered by prior cases, as case law from Corley and Elcom effectively established that the DMCA could not be challenged on the basis of constitutionality.[48]

Durable goods case law

Chamberlain Group, Inc. v. Skylink Technologies, Inc. – Chamberlain manufactured garage door openers and accessories, while Skylink created universal remotes that worked with a variety of door openers. Chamberlain developed a security protocol for its remotes that matched the remote to the door via software-based rolling code; this was intended to prevent unauthorized opening. Skylink utilized a resynchronization feature of the Chamberlain security software to create a universal remote that worked with the Chamberlain openers. Chamberlain sued Skylink, arguing that the rolling code was effectively an access control device, and Skylink violated the DMCA. Both the United States District Court for the Northern District of Illinois and the United States Court of Appeals for the Federal Circuit ruled in favor of Skylink that there was no DMCA violation. The courts ruled the DMCA did not create a new property right, and thus consumers that owned Chamberlain's product had a right to circumvent any restrictions, since this was typical practice on the market. They also pointed out that customers purchasing a Chamberlain garage door opener did not sign an end user license agreement waiving those rights.[49]

Lexmark International, Inc. v. Static Control Components, Inc. – Lexmark had developed a lock-out mechanism for its inkjet printers that would prevent use of any third party ink cartridges. The mechanism used a program in the printer along with an electronic chip on the cartridge to validate the authenticity of the product. Static Control Components reverse engineered the chip using the program from the printer and were able to make their own ink cartridges compatible with Lexmark printers. Lexmark sued, claiming a DMCA violation, and won at the District Court. However, the case was overturned shortly after by the United States Court of Appeals for the Sixth Circuit. The Sixth Circuit acknowledged that Lexmark's programs to manage the lockout were copyrightable and thus eligible for protections under the DMCA. However, the appeals court pointed out that Lexmark failed to include an anti-circumvention device that "effectively controls access" to the printer lockout program.[48]

Linking to infringing content

Case law is currently unsettled with regard to websites that contain links to infringing material; however, there have been a few lower-court decisions which have ruled against linking in narrowly prescribed circumstances. It is considered a violation when the owner of a website has been issued an injunction against posting infringing material on their website, and then links to the same material to circumvent the injunction. Another area involves linking to software or devices which are designed to circumvent digital rights management devices, or links from websites whose sole purpose is to circumvent copyright protection by linking to copyrighted material.[50]

Edelman v. N2H2

In July 2002, American Civil Liberties Union filed a lawsuit on the behalf of Benjamin Edelman, a computer researcher at Berkman Center for Internet and Society, seeking a declaratory judgment to affirm his first amendment rights when reverse engineering the censorware product of defendant N2H2 in case he intended to publish the finding. N2H2 filed a motion to dismiss, which the court granted on the basis that Edelman had not finished reverse engneeering, and the court did not make advisory opinions.[51] [citation needed]

RealNetworks, Inc. v. DVD Copy Control Association, Inc.

In August 2009, the DVD Copy Control Association won a lawsuit against RealNetworks for violating copyright law in selling its RealDVD software, allowing users to copy DVDs and store them on a harddrive. The DVD Copy Control Association claimed that Real violated the DMCA by manufacturing and trafficking a tool that circumvented anti-piracy measures ARccOS Protection and RipGuard, as well as breaking Real's licensing agreement with the Content Scrambling System.[52]

Viacom Inc. v. YouTube, Google Inc.

On March 13, 2007, Viacom filed a lawsuit against YouTube and its corporate parent Google for copyright infringement seeking more than $1 billion in damages. The complaint was filed in the U.S. District Court for the Southern District of New York.

Viacom claims the popular video-sharing site was engaging in "massive intentional copyright infringement" for making available a contended 160,000 unauthorized clips of Viacom's entertainment programming. Google relied on the 1998 Digital Millennium Copyright Act's "safe harbor" provision to shield them from liability.[53]

On June 23, 2010, U.S. District Judge Louis Stanton granted summary judgment in favor of YouTube.[54] The court held that YouTube is protected by the safe harbor of the DMCA. Viacom appealed to the U.S. Court of Appeals for the Second Circuit.[55]

On April 5, 2012, the federal Second Circuit Court of Appeals vacated Judge Louis Stanton's ruling, and instead ruled that Viacom had presented enough evidence against YouTube to warrant a trial, and the case should not have been thrown out in summary judgment. The court did uphold the ruling that YouTube could not be held liable based on "general knowledge" that users on its site were infringing copyright. The case was sent back to the District Court in New York,[56] and on April 18, 2013, Judge Stanton issued another order granting summary judgment in favor of YouTube. Before it was sent back to the Court of Appeals, a settlement was reached; no money changed hands.

IO Group, Inc. v. Veoh Networks, Inc.

On June 23, 2006, IO Group, Inc. filed a complaint against Veoh Networks, Inc. in the U.S. District Court for California's Northern District.[57]

IO Group alleged that Veoh was responsible for copyright infringement by allowing videos owned by IO Group to be accessed through Veoh's online service without permission over 40,000 times between the dates June 1 and June 22.[58]

Veoh is a Flash video site relying on user contributed content. IO Group argued that since Veoh transcoded user uploaded videos to Flash format it became a direct infringer and the materials were under their direct control, thereby disqualifying them for DMCA safe harbor protection.

The ruling judge disagreed with the argument, stating that

Veoh has simply established a system whereby software automatically processes user-submitted content and recasts it in a format that is readily accessible to its users. Veoh preselects the software parameters for the process from a range of default values set by the thirdparty software... But Veoh does not itself actively participate or supervise the uploading of files. Nor does it preview or select the files before the upload is completed. Instead, video files are uploaded through an automated process which is initiated entirely at the volition of Veoh's users.

The Court has granted the Veoh's motion for summary judgment, on the basis of the DMCA, holding that the defendant's video-sharing web site complied and was entitled to the protection of the statute's "safe harbor" provision.[59] Even though Veoh won the court case, it blamed the litigation as one of the causes of its preparing to file Chapter 7 bankruptcy and its subsequent sale to Qlipso.[60][61]

Vernor v. Autodesk, Inc.

After numerous DMCA takedown notices in response to his eBay listings, Timothy S. Vernor sued Autodesk in August 2007, alleging that Autodesk abused the DMCA and disrupted his right to sell used software he bought at a garage sale.[62] In May 2008, a federal district judge in Washington State Autodesk's authorized that the software's license agreement preempted the seller from his rights under the first-sale doctrine.[63] In September 2010, the U.S. Court of Appeals for the Ninth Circuit reversed, holding that "a software user is a licensee rather than an owner of a copy where the copyright owner (1) specifies that the user is granted a license; (2) significantly authorized the user's ability to transfer the software; and (3) imposes notable use authorizations."[64]

Lenz v. Universal Music Corp.

In 2007, Stephanie Lenz, a writer and editor from Gallitzin, Pennsylvania made a home video of her 13-month-old son dancing to the Prince song "Let's Go Crazy" and posted a 29-second video on the video-sharing site YouTube. Four months after the video was originally uploaded, Universal Music Group, which owned the copyrights to the song, ordered YouTube to remove the video enforcing the Digital Millennium Copyright Act.

Lenz notified YouTube immediately that her video was within the scope of fair use, and demanded that it be restored. YouTube complied after six weeks—not two weeks, as required by the Digital Millennium Copyright Act—to see whether Universal planned to sue Lenz for infringement. Lenz then sued Universal Music in California for her legal costs, claiming the music company had acted in bad faith by ordering removal of a video that represented fair use of the song.[65]

In August 2008, U.S. District Judge Jeremy Fogel of San Jose, California ruled that copyright holders cannot order a deletion of an online file without determining whether that posting reflected "fair use" of the copyrighted material.

On February 25, 2010, Judge Fogel issued a ruling rejecting several of Universal's affirmative defenses, including the defense that Lenz suffered no damages.[66]

In 2015, the court ultimately upheld the finding that Universal was liable under 17 USC 512(f) (the DMCA's bad faith notice and takedown provision) for failing to consider fair use before sending its initial takedown notice.

Flava Works Inc. v. Gunter

In the case of Flava Works Inc. v. Gunter the court denied the defendant safe harbor protection under DMCA 17 U.S.C. § 512. The district court found that the defendant had knowledge of its users' infringing activity and also failed to prevent future infringing activity. As such the plaintiff's motion for preliminary injunction was granted.[67] On appeal, however, the Seventh Circuit vacated the injunction, citing the standard set in eBay Inc. v. MercExchange, L.L.C., which states that courts should not rely on categorical rules as a standard for injunction.[68]

Ouellette v. Viacom International Inc.

In this case of Ouellette v. Viacom International Inc., the court denied plaintiff's attempt to find liability for YouTube and Myspace's takedowns of the plaintiff's homemade videos. Despite potential fair use claims, the court found it impossible to use the DMCA takedown provisions as a foundation for liability. The court found that the safe harbor provision serves "to limit the liability of internet service providers, not to create liability that could not otherwise be imposed under existing law independent of the DMCA."[69]

Sony v. George Hotz

In January 2011, Sony Computer Entertainment sued George Hotz over violating the Section 1201 of the Digital Millennium Copyright Act as well as the Federal Fraud and Abuse Act due to facilitating consumers to jailbreak their PlayStation 3 consoles.[70] Hotz argued that because he had purchased the product, he had the right to do with it as he pleased. After three months, Sony and Hotz decided to settle out of court. This also included an injunction against George Hotz, barring him from hacking any more Sony products.[71][72]

Automattic, Inc. and Oliver Hotham v. Nick Steiner

In 2013, Oliver Hotham wrote an article on WordPress (owned by Automattic, Inc.) critical of Straight Pride UK that included material from a press release sent to him by Straight Pride UK's press officer, Nick Steiner. Steiner sent WordPress a DMCA takedown notice claiming that Hotham's article infringed their copyright. WordPress and Hotham sued in a federal District Court in California, under §512(f) of the DMCA, claiming that the takedown notice was fraudulent, and that the takedown cost the plaintiffs time, lost work and attorneys' fees. In 2015, the court issued a default judgment in favor of WordPress and Hotham in the amount of $25,084.[73]

Criticisms

Abuse of takedown notice

Google asserted misuse of the DMCA in a filing concerning New Zealand's copyright act,[74][75] quoting results from a 2005 study by California academics Laura Quilter and Jennifer Urban based on data from the Chilling Effects clearinghouse.[76] Takedown notices targeting a competing business made up over half (57%) of the notices Google has received, the company said, and more than one-third (37%) "were not valid copyright claims."[77]

Currently, there are three main abuses of the DMCA. First, fair use has been a legal gray area, and subject to opposing interpretations. This has caused inequity in the treatment of individual cases. Second, the DMCA has often been invoked overbearingly, favoring larger copyright holders over smaller ones. This has caused accidental takedowns of legitimate content, such as a record company accidentally removing a music video from their own artist. Third, the lack of consequences for perjury in claims encourages censorship. This has caused temporary takedowns of legitimate content that can be financially damaging to the legitimate copyright holder, who has no recourse for reimbursement. This has been used by businesses to censor competition.[78]

The use of DMCA-enabled takedown notices has been raised for a number of services that allow users to provide content. Early concerns were focused on peer-to-peer file sharing services such as BitTorrent. Such services grew after Napster was sued by several music industry groups in A&M Records, Inc. v. Napster, Inc. (2001) which ruled that Napster was liable for enabling copyright infringement under the DMCA since they maintained central servers that tracked file sharing; by switching to the peer-to-peer model, these new services avoided this possible legality. However, some still saw legal challenges, such as MGM Studios, Inc. v. Grokster, Ltd. (2005) based on the fact they were operated commercially and promoted the ability to share copyrighted works. Non-commercial and open-source peer-to-peer services were able to survive from these case laws, leading entertainment groups to deploy software on the services to track downloads,[79] and subsequently attempted to serve takedown notices and sue users on the services for copyright violations under the DMCA since around 2003.[80] However, many of these methods were imprecise, leading to a number of false accusations at users.[81]

Abuse of the anti-circumvention provision

In 2015 Volkswagen abused the DMCA to hide their vehicles' emissions cheat.[82] It has been suggested that had the DMCA not prevented access to the software "... a researcher with legal access to Volkswagen's software could have discovered the code that changed how the cars behave in testing ..."[83]

Effect on analog video equipment

Analog Copy Protection (ACP), the encryption technology created by Rovi Corporation (formerly Macrovision, now TiVo), is designed to thwart users' attempts to reproduce content via analog cables. When a DVD is played through an analog video cable and recorded using a VCR, Rovi's ACP technology will distort the copy partially or completely.[84]

The technology works by adding additional lines to the video signal. In the NTSC video standard, blank lines (vertical blanking intervals) that the user cannot see are used for functions like closed captioning. Rovi Corporation uses these blank lines to implement its ACP technology.[85]

The implementation of ACP has been ill-regarded by some video enthusiasts. Many claim that the technology has led to signal issues with VCRs and analog video equipment. Some VCRs misread the encryption used to prevent copying, distorting the video image regardless of whether the recording is original or a copy.

The DMCA has been criticized for forcing all producers of analog video equipment to support the proprietary copy protection technology of Rovi Corporation, a commercial firm. The producers of video equipment are forced by law to support and implement the corporation's proprietary technology. This benefits Rovi Corporation financially, whereas those forced to implement it receive neither profit nor compensation.[86][87]

Additionally, some criticize the implementation of ACP as a violation of their fair use rights. A TV-streaming product called the Slingbox uses analog signals to convey video from television to a mobile device. However, the encryption used by ACP blocks analog transmission, rendering the Slingbox unusable. Additionally ACP blocks the use of recording for educational purposes. On one or more accounts, students have not been able to cite and record cable sources properly due to ACP restrictions.[88]

Effect on research

The DMCA has affected the worldwide cryptography research community, since an argument can be made that any cryptanalytic research violates, or might violate, the DMCA. The arrest of Russian programmer Dmitry Sklyarov in 2001, for alleged infringement of the DMCA, was a highly publicized example of the law's use to prevent or penalize development of anti-DRM measures.[89] While working for ElcomSoft in Russia, he developed The Advanced eBook Processor, a software application allowing users to strip usage restriction information from restricted e-books, an activity legal in both Russia and the United States.[90] Paradoxically, under the DMCA, it is not legal in the United States to provide such a tool. Sklyarov was arrested in the United States after presenting a speech at DEF CON and subsequently spent nearly a month in jail.[91] The DMCA has also been cited as chilling to legitimate users, such as students of cryptanalysis (including, in a well-known instance, Professor Edward Felten and students at Princeton),[92] and security consultants such as Niels Ferguson, who has declined to publish information about vulnerabilities he discovered in an Intel secure-computing scheme because of his concern about being arrested under the DMCA when he travels to the U.S.[93]

Effect on innovation and competition

In at least one court case, the DMCA has been used by open source software projects to defend against conversion of software (i.e., license violations) that involved removal of copyright notices.[94]

Jonathan Bailey of Plagiarism Today argued that the DMCA has left Kindle Direct Publishing (an Amazon subsidiary) with no incentive to find new innovations for vetting submitted books for plagiarism or copyright theft before allowing them to be published. According to Bailey, "Amazon doesn't do much to vet the books it publishes. Plagiarism isn't even mentioned in its KDP help files. What this means is that it's trivial to publish almost anything you want regardless of the quality of the work or, in these cases, how original it is. In fact, many complain that Amazon fails to vet works for even simple issues such as formatting and layout. Though Amazon will, sometimes, remove works that violates their terms of service after they get complaints, they're happy to sell the books and reap the profits until they get such a notice. And, from Amazon's perspective, this is completely legal. They are protected by the Digital Millennium Copyright Act (DMCA) as well as other laws, in particular Section 230 of the Communications Decency Act, that basically mean they are under no obligation to vet or check the works they publish. They are legally free to produce and sell books, physical and digital, regardless of whether they are plagiarized, copyright infringing or otherwise illegal."[95]

Legislative reform

There have been several Congressional efforts to modify the Act. The Unlocking Technology Act of 2013 was introduced to attempt to exempt non-infringing uses from the anti-circumvention clause.[96] However, the bill was not passed by Congress. In 2014, the Unlocking Consumer Choice and Wireless Competition Act was passed, granting a specific exemption for unlocking cell phones, without affecting the other provisions of the DMCA.

Bills in 2015 included the Unlocking Technology Act of 2015,[97] and the Breaking Down Barriers to Innovation Act of 2015.[98] Republicans are considering legislation as well, as it becomes clear that Section 1201 is impeding the country's security. Facing escalating numbers of cyberthreats, cybersecurity researchers petitioned to conduct research to keep pace with evolving cybersecurity risks and vulnerabilities, stating: "Without such an exemption, security risks will lie unaddressed and the public will be substantially less safe."[99] The bills are intended to address the fact that section 1201 prevents circumvention even when doing so is not copyright infringement. In addition, the section requires exemption proponents to bear the burden of proof every time their exemption comes up for triennial review, instead of there being a presumption of renewal for an exemption whose importance was previously proven.

Rick Boucher, a congressman from Virginia, led previous efforts by introducing the Digital Media Consumers' Rights Act (DMCRA).

A prominent bill related to the DMCA is the Consumer Broadband and Digital Television Promotion Act (CBDTPA), known in early drafts as the Security Systems and Standards Certification Act (SSSCA). This bill, if it had passed, would have dealt with the devices used to access digital content and would have been even more restrictive than the DMCA.[vague]

Senator Thom Tillis introduced a draft revision of the DMCA in December 2020. A fundamental change in his language would be to support "notice and stay down" for service providers, requiring them to take measures to prevent material that has already been determined to be violating copyright to be re-uploaded by users. While the draft was praised by the entertainment industry, free speech advocacy groups feared the language would require services to employ automatic filtering and would further limit freedom of expression.[100]

Opposition

On the fifth anniversary of the DMCA, and several times afterwards, the Electronic Frontier Foundation documented harmful consequences of the anti-circumvention provisions.[101] They document that the DMCA:

  1. Stifles free expression, such as in its use against Russian programmer Dmitry Sklyarov, Princeton Professor Edward Felten, and journalists;
  2. Jeopardizes fair use;
  3. Impedes competition, such as blocking aftermarket competition in toner cartridges, garage door openers, and enforcing walled gardens around the iPod;[102] and
  4. Interferes with computer intrusion laws.[103]

In July 2016, the Electronic Frontier Foundation sued the US government in Green v. Department of Justice alleging that Section 1201 violates the First Amendment.[104]

See also

Proposed international law
DMCA anti-circumvention cases
DMCA notice-and-takedown issues
Economic concepts
Related US laws
Proposed US legislation
Shelved US Legislation
Related international law

References

  1. ^ "DMCA p7" (PDF).
  2. ^ "U.S.C. Title 17 – COPYRIGHTS". www.govinfo.gov.
  3. ^ a b c d e Nimmer, David (2000). "A Riff on Fair Use in the Digital Millennium Copyright Act". University of Pennsylvania Law Review. 148 (3): 673–742. doi:10.2307/3312825. JSTOR 3312825. SSRN 222370.
  4. ^ Band, Jonathan; Katoh, Masanobu (2011). Interfaces on Trial 2.0. MIT Press. p. 92. ISBN 978-0-262-01500-4.
  5. ^ Cullins, Ashley Music Industry A-Listers Call on Congress to Reform Copyright Act Hollywood Reporter. April 5, 2016.
  6. ^ 17 U.S.C. 101 (defining "Pictorial, graphic and sculptural works" as "Such works shall include works of artistic craftsmanship insofar as their form but not their mechanical or utilitarian aspects are concerned; the design of a useful article, as defined in this section, shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.")
  7. ^ "Vessel Hull Design Protection Act of 1997 (H.R. 2696)", Statement of MaryBeth Peters, The Register of Copyrights, before the Subcommittee on Courts and Intellectual Property, Committee on the Judiciary, Oct. 23, 1997 ("It is a long-held view of the Office that a gap exists in legal protection for the designs of useful articles. Existing bodies of federal intellectual property law do not provide appropriate and practical coverage for such designs, while state law is largely preempted in this area. Consequently, while considerable investment and creativity may go into the creation of innovative designs, they often can be copied with impunity.").
  8. ^ "Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works". United States Copyright Office. October 27, 2000.
  9. ^ "Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works". United States Copyright Office. October 28, 2003.
  10. ^ "Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works". United States Copyright Office. November 27, 2006.
  11. ^ "Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works". United States Copyright Office. July 26, 2010.
  12. ^ "Federal Register | Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies" (PDF). www.federalregister.gov. Retrieved 2016-04-04. Public Domain This article incorporates text from this source, which is in the public domain.
  13. ^ "Federal Register | Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies". www.federalregister.gov. Retrieved 2016-01-26.
  14. ^ "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies" (PDF). Federal Register. October 26, 2018. Retrieved December 28, 2020. Public Domain This article incorporates text from this source, which is in the public domain.
  15. ^ "Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies" (PDF). United States Copyright Office. October 21, 2021. Retrieved October 29, 2021.
  16. ^ "Section 1201 Study". U.S. Copyright Office. 2015.
  17. ^ "Regulations.gov". www.regulations.gov.
  18. ^ David Oster (March 4, 2016). "Initial Comments – David Oster".
  19. ^ Allan R. Adler; Benjamin S. Sheffner (April 1, 2016). "Reply Comments of: Association of American Publishers, Motion Picture Association of America, Recording Industry Association of America".
  20. ^ Dennis E. Meissner; Nancy Beaumont (February 18, 2016). "Comments Of The Society Of American Archivists".
  21. ^ Kyle Wiens (March 3, 2016). "Comments of iFixit".
  22. ^ Harley Geiger (March 3, 2016). "Rapid7, Bugcrowd, & HackerOne Joint Comments to US Copyright Office Section 1201 Study".
  23. ^ Andrew F. Sellars (March 3, 2016). "Comment of the Cyberlaw Clinic at Harvard Law School".
  24. ^ a b "Section 1201 of Title 17" (PDF).
  25. ^ Steve Noble (February 25, 2016). "Initial Comments – Learning Disabilities Association of America".
  26. ^ Stanley Pierre-Louis; Ben Golant; Steven K. Englund (March 3, 2016). "Initial Comments – Entertainment Software Association".
  27. ^ Stanley Pierre-Louis; Ben Golant; Steven K. Englund (April 1, 2016). "Reply Comments – Entertainment Software Association".
  28. ^ Catherine R. Gellis (February 16, 2015). "Initial Comments – R Street Institute".
  29. ^ Emily Feltren (February 26, 2016). "Initial Comments – American Association of Law Libraries".
  30. ^ Christian Troncoso (March 3, 2016). "Initial Comments – BSA The Software Alliance".
  31. ^ Jessica L. Simmons; Steven J. Metalitz (March 2, 2016). "Reply Comments – Alliance of Automobile Manufacturers".
  32. ^ Jessica L. Simmons; Steven J. Metalitz (March 30, 2016). "Reply Comments – Alliance of Automobile Manufacturers".
  33. ^ Jonathan Band; Jessica Sebeok (March 6, 2016). "Comments Of The Association Of American Universities, The American Council On Education, The Association Of Public And Land-Grant Universities, And Educause On Section 1201 Of The Digital Millennium Copyright Act".
  34. ^ Terry Hart (March 3, 2016). "Initial Comments – Copyright Alliance 1201 Study Comments final".
  35. ^ Keith Kupferschmid (April 1, 2016). "Reply Comments – Copyright Alliance 1201 Study".
  36. ^ Eugene H. Spafford; Paul Hyland (March 3, 2016). "Initial Comments – ACM US Public Policy Council".
  37. ^ Christopher A. Mohr (March 3, 2016). "Initial Comments of the Software and Information Industry Association".
  38. ^ Christopher A. Mohr (April 1, 2016). "Reply Comments of the Software and Information Industry Association".
  39. ^ Bruce H. Turnbull; David Jonathan Taylor (March 3, 2016). "Joint Comments Of The Dvd Copy Control Association And The Advanced Access Content System Licensing Administrator, Llc".
  40. ^ Dave Green (March 3, 2016). "Initial Comments – Microsoft Corporation".
  41. ^ Morgan Reed (March 3, 2016). "ACT Comments re USCO Sec 1201 Study v4".
  42. ^ Raza Panjwani; Charles Duan; Kerry Sheehan (March 4, 2016). "Section 1201 Comments for Copyright Office".
  43. ^ Kerry Maeve Sheehan; Raza Panjwani; John Bergmayer; Charles Duan (April 2, 2016). "Reply Comments of Public Knowledge".
  44. ^ Jill Ingrassia (April 1, 2016). "Reply Comments of AAA (American Automobile Association)".
  45. ^ Section 1201 of Title 17: A report of the Register of Copyrights – United States Copyright Office, June 2017
  46. ^ Mihet, Harry (2002). "Universal City Studios, Inc. v. Corley: The Constitutional Underpinnings of Fair Use Remain an Open Question". Duke Law & Technology Review. 1 (1): 1–11.
  47. ^ Sieber, Albert (2003). "The Constitutionality of the DMCA Explored: Universal City Studios, Inc. v. Corley & (and) United States v. Elcom Ltd". Berkeley Technology Law Journal. 18 (7): 7–42.
  48. ^ a b Barker, Diane M. (2005). "Defining the contours of the Digital Millennium Copyright Act: The growing body of case law surrounding the DMCA". Berkeley Technology Law Journal. 20 (1): 47–63.
  49. ^ Sapp, Heather A. (2005). "Garage Door Openers and Toner Cartridges: Why Congress Should Revisit the Anti-circumvention Provisions of the DMCA". Buffalo Intellectual Property Law Journal. 3: 135–163.
  50. ^ "Linking to infringing content is probably illegal in the US". WebTVWire. 2006-09-12. Retrieved 2006-10-12.
  51. ^ "Feature on Edelman v. N2H2 lawsuit". American Civil Liberties Union. Retrieved 2022-09-30.
  52. ^ Sandoval, Greg (2009-08-11). "RealNetworks loses critical ruling in RealDVD case". CNET.com. Retrieved 2011-11-12.
  53. ^ "Viacom sues Google over YouTube clips". News.cnet.com. 2007-03-13. Retrieved 2011-11-12.
  54. ^ Viacom Int'l Inc., et al., v. YouTube, Inc., et al., Nos. 07-Civ-2103 (LLS), 07-Civ-3582 (LLS) Opinion and Order (S.D.N.Y. June 24, 2010).
  55. ^ Sandoval, Greg (June 23, 2010). "Google defeats Viacom in landmark copyright case". cnet news. U.S. Retrieved June 23, 2010.
  56. ^ Davis, Wendy (April 6, 2012). "Appeals Court Gives Viacom Second Shot at YouTube". U.S. Retrieved April 7, 2012.
  57. ^ Delaney, Kevin J. (June 29, 2006). "Veoh Faces Copyright Suit, A Test of Web Video". The Wall Street Journal.
  58. ^ Ali, Rafat (2006-06-28). "Test For Web Video? Veoh Faces Copyright Suit". paidContent. Archived from the original on 2009-02-15. Retrieved 2011-11-12.
  59. ^ "Transcoding Is Not A Crime, Says Court In Veoh Porn Case". TechCrunch. 2008-08-27. Retrieved 2011-11-12.
  60. ^ "Content sharing company Qlipso buys Veoh" (Apr 9, 2010) Athena Information Solutions Pvt. Ltd.
  61. ^ "UMG v. Veoh: victory has never been so pyrrhic" (Dec 22, 2011) Engadget, Newstex
  62. ^ Cheng, Jacqui (2007-09-13). "Autodesk sued for $10 million after invoking DMCA to stop eBay resales". Arstechnica.com. Retrieved 2011-11-12.
  63. ^ Lee, Timothy B. (2008-05-23). "Court smacks Autodesk, affirms right to sell used software". Arstechnica.com. Retrieved 2011-11-12.
  64. ^ Anderson, Nate (2010-09-10). "Yes, you own it: Court release holds EULAs, digital resale". Arstechnica.com. Retrieved 2011-11-12.
  65. ^ Egelko, Bob (August 20, 2008). "Woman can sue over YouTube clip de-posting". San Francisco Chronicle. Retrieved 2008-08-25.
  66. ^ "Lenz v. Universal Music Corp." (PDF).
  67. ^ Grady, John F. (27 July 2011). "Memorandum opinion" (PDF). Court rule in favour of plaintiff's motion for preliminary injunction. Retrieved 21 November 2011.
  68. ^ Samuels, Julie P.; Higgins, Parker (6 August 2012). "myVidster: A Victory for Innovation and a Vote for Sensible Copyright Law". Electronic Frontier Foundation. Retrieved 8 August 2012.
  69. ^ "Ouellette v. Viacom, Dist. Court, D. Montana 2011 – Google Scholar".
  70. ^ Sony follows up, officially sues Geohot and fail0verflow over PS3 jailbreak. Nilay Patel, Engadget (2011-01-12). Retrieved on 2011-02-16.
  71. ^ "Sony/Hotz settlement details surface".
  72. ^ "Sony and PlayStation 3 jailbreaker George Hotz settle out of court".
  73. ^ Van der Sar, Ernesto. "WordPress Wins $25,000 From DMCA Takedown Abuser", TorrentFreak.com, March 5, 2015
  74. ^ Carolyn Dalton; Antoine Aubert (6 March 2009). "Google submission on TCF Draft ISP Copyright Code of Practice". Archived from the original (PDF) on 20 March 2009. Retrieved 2009-10-14.
  75. ^ Keall, Chris (16 March 2009). "Google piles into S92". National Business Review. Archived from the original on 25 September 2017. Retrieved 26 September 2017.
  76. ^ Laura Quilter and Jennifer Urban (2005). "Efficient Process or 'Chilling Effects'? Takedown Notices Under Section 512 of the Digital Millennium Copyright Act – Summary Report" (PDF). Retrieved 2017-07-16.
  77. ^ "Google submission hammers section 92A". New Zealand PCWorld. 2009-03-16. Archived from the original on 2013-10-18. Retrieved 2009-03-19.
  78. ^ Cobia, Jeffrey (2008). "The Digital Millennium Copyright Act Takedown Notice Procedure: Misuses, Abuses, and Shortcomings of the Process". Minnesota Journal of Law Science & Technology. 1: 391–393 – via Hein Online.
  79. ^ Banerjee, Anirban; Faloutsos, Michalis; Bhuyan, Laxmi (2008-04-24). "The P2P war: Someone is monitoring your activities". Computer Networks. 52 (6): 1272–1280. CiteSeerX 10.1.1.76.9451. doi:10.1016/j.comnet.2008.01.011.
  80. ^ Kravitz, David (September 4, 2009). "File Sharing Lawsuits at a Crossroads, After 5 Years of RIAA Litigation". Wired. Retrieved December 30, 2020.
  81. ^ Stone, Brad (June 5, 2008). "The Inexact Science Behind D.M.C.A. Takedown Notices". The New York Times. Retrieved December 30, 2020.
  82. ^ Walsh, Kit (September 21, 2015). "Researchers Could Have Uncovered Volkswagen's Emissions Cheat If Not Hindered by the DMCA". Electronic Frontier Foundation.
  83. ^ Davies, Alex. "The EPA Opposes Rules That Could've Exposed VW's Cheating". Wired – via www.wired.com.
  84. ^ "ACP". Archived from the original on 2010-03-27. Retrieved 2010-07-12.
  85. ^ "V – V to M to VIR | WhatIs.com – Search Results | {1}". www.techtarget.com.
  86. ^ "Analog Off". Publicknowledge.org. Archived from the original on 2010-06-27. Retrieved 2010-07-12.
  87. ^ "Another DMCA Misuse: Macrovision v. Sima". Electronic Frontier Foundation. 15 August 2006.
  88. ^ "Analog Hole". Electronic Frontier Foundation. Retrieved 2013-01-13.
  89. ^ "First Indictment Under Digital Millennium Copyright Act Returned Against Russian National". Cybercrime.gov. Archived from the original on October 17, 2011. Retrieved 2011-11-12.
  90. ^ "Adobe FAQ: ElcomSoft legal background". Adobe.com. Archived from the original on 2011-11-04. Retrieved 2011-11-12.
  91. ^ Farhad Manjoo (2001-08-07). "Sklyarov: A Huge Sigh of Release". Wired.com. Archived from the original on 2014-03-24. Retrieved 2014-03-24.
  92. ^ RIAA challenges SDMI attack 2002-01-07, Retrieved on 2007-02-26
  93. ^ Ann Harrison (2001-08-13). "Video crypto standard cracked?". Securityfocus.com. Archived from the original on 2020-08-02. Retrieved 2011-11-12.
  94. ^ "Jacobsen v Katzer: Order Granting in Part and Denying in Part Plaintiff's Motion for Summary Judgement and Denying Defendants Motion for Partial Summary Judgement" (PDF). Retrieved 2010-05-29.
  95. ^ Bailey, Jonathan (26 February 2019). "How Amazon Could Fix Its Plagiarism Problem And Why It Never Will..." www.plagiarismtoday.com. Plagiarism Today. Retrieved 14 August 2022.
  96. ^ Couts, Andrew (9 May 2013). "Awesome new bill legalizes cell phone unlocking, 'fixes' the DMCA". Digital Trends Newsletter. Designtechnica Corporation. Archived from the original on 3 July 2013.
  97. ^ "Text of H.R. 1587 (114th): Unlocking Technology Act of 2015 (Introduced version)". GovTrack.us.
  98. ^ Wyden, Ron (April 16, 2015). "S.990 – 114th Congress (2015-2016): Breaking Down Barriers to Innovation Act of 2015". www.congress.gov.
  99. ^ Engagedscholarship.csuohio.edu
  100. ^ Maddaus, Gene (December 22, 2020). "Sen. Thom Tillis Proposes 'Notice and Stay Down' Rewrite of Online Copyright Law". Variety. Retrieved December 30, 2020.
  101. ^ "Unintended Consequences: Twelve Years under the DMCA | Electronic Frontier Foundation". Eff.org. 2010-03-03. Retrieved 2013-06-14.
  102. ^ OdioWorks v. Apple Eff.org
  103. ^ "Unintended Consequences: Twelve Years under the DMCA". Electronic Frontier Foundation. March 2010.
  104. ^ EFF sues US government to void 'onerous' copyright rules

Further reading

External links

Works related to Digital Millennium Copyright Act at Wikisource