Garage door makers battle over DMCA

Open and shut case

  • alert
  • submit to reddit

Mobile application security vulnerability report

It says something when a Google search on 'DMCA' (Digital Millennium Copyright Act) produces the Anti-DMCA site at the top of the list.

"The DMCA is being used to silence researchers, computer scientists and critics. Corporations are using it against the public," the site states, before going into some detail about the infamous clause that it is a crime to "circumvent" copyright protection systems.

Since the law was passed by the US Congress in 1998, concerns been raised every year that it is being widely abused by companies to restrict competition, control markets and keep prices high. Many since 1998 have asked: "Just how far can this go?"

Well, now we know. The DMCA has finally found a buffer.

And it came in a court case at the end of August: Chamberlain Group vs Skylink Technologies. Never heard of them, you say? How could you not know about some of the finest purveyors of automatic garage-door openers?

Yes, Chamberlain Group launched a case against its rival Skylink under the DMCA because the company was making compatible garage door openers. So, you buy your garage door opening system from Chamberlain and lose the remote control. Fortunately, a control from Skylink will also open the door. Great, but in order to offer this service, says Chamberlain, Skylink circumvented access controls to a computer program in Chamberlain's opener.

Skylink claimed conversely that since the person that uses the control actualy owns the garage and the door opener, they have a lawful right to access the computer program however they want.

Yes, this is how bad things have got.

But there is a sort of silver lining to this legal cloud in the form of District Court judge Rebecca Pallmeyer. If a judge were to say "bollocks", that is what she would have come out with. Instead we have to settle with: "The homeowner has a legitimate expectation that he or she will be able to access the garage even if his transmitter is misplaced or malfunctions."

Can you imagine a world where every electronic item you possess would legally have to be accessed using a piece of equipment from a particular manufacturer? Well, you nearly had to.

There is some sanity in the world then. ®

Related Link

The case archive

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
prev story


Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.