Feeds

Don't break DRM even if it 'threatens lives'

Copyright cartel opposes DMCA exemptions plan

Internet Security Threat Report 2014

Copyright holders have collectively objected to proposed exemptions to the US Digital Millennium Copyright Act (DMCA) in cases where copyright software causes security and privacy harm. Lawyers for the pigopolists (including the Business Software Alliance, Motion Picture Ass. of America and Recording Industry Ass. of America) also said exceptions that would allow DRM software to be circumvented in hypothetical cases where it "threatens critical infrastructure and potentially endangers lives" might create "uncertainty" in the minds of software developers.

As Ed Felten of Freedom to Tinker puts it, this extraordinary legal argument (page 21-23) means copyright holders want to keep their options open about developing DRM software even when there are doubts about whether it might threaten lives or the systems that underpin the US economy.

"In order to protect their ability to deploy this dangerous DRM, they want the Copyright Office to withhold from users permission to uninstall DRM software that actually does threaten critical infrastructure and endanger lives," Felten writes.

Common sense would dictate that copyright holders would ensure DRM systems pose no risk to critical infrastructure or lives before their deployment, of course, but Felten remains unconvinced good sense will enter into the US Copyright Office's deliberations on the pigopolists submission.

The proposed exemptions were put forward by the Computer and Communications Industry Association and the Open Source and Industry Association during the US Copyright Office’s DMCA exemption rule making review process.

"If past rule makings are a good predictor, it’s more likely than not that the Copyright Office will rule in their favour," he said. ®

Internet Security Threat Report 2014

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.