Fair Dealing by Giulia Forsythe (CC BY-NC-SA 2.0) https://flic.kr/p/dRkXwP

Fair Dealing by Giulia Forsythe (CC BY-NC-SA 2.0) https://flic.kr/p/dRkXwP

Copyright

Major Record Labels Adopt ACS

The online community is buzzing today over the announcement that Universal Music plans to "give away" music online through a new service called SpiralFrog (which is also negotiating with other major labels including EMI).  The approach is not particularly innovative – the service will be ad-supported, something people like Terry McBride from Nettwerk has been advocating for months and other sectors (television, radio, online gaming, newspapers) have been offering for some time.  Moreover, the service is likely to face some challenges – by relying on DRM that is not compatible with the iPod, it is leaving out a large part of the market. 

That said, there are at least two bigger points worth making.

Read more ›

August 29, 2006 5 comments News

30 Days of DRM – Day 11: Involuntary Installation of Software (Circumvention Rights)

Yesterday's post addressed the negative impact of anti-circumvention legislation on security research.  There is another security issue that merits discussion – the involuntary installation of software that may constitute a personal security threat to individual computer users.  Such software is frequently classified as spyware – software programs that are placed on users' computers without their informed consent that proceed to cause havoc by compromising personal information, posing an identity theft risk, sending spam, and infecting other computers.

While spyware can worm its way onto a personal computer in many different ways, inclusion within a DRM is a possibility. The best-known example of the DRM-spyware connection is last year's Sony rootkit fiasco

Read more ›

August 29, 2006 6 comments News

30 Days of DRM – Day 10: Security Research (Circumvention Rights)

Given the priority currently accorded to security concerns, it is difficult to understand how any government would be willing to undermine security in the name of copyright.  That is precisely what has occurred in the United States, however, where computer security researchers have faced a significant chilling effect on their research due to legal threats from the DMCA.  The U.S. cases are fairly well known: they include Princeton professor Edward Felten facing a potential suit from the RIAA when he planned to disclose his research findings in identifying the weaknesses of an encryption program and Dmitri Sklyarov, a Russian software programmer, spending a summer in jail after presenting a paper at a conference in Las Vegas that described his company's program that defeated the encryption on the Adobe eReader.

Even more compelling are recent comments from Professor Felten at a conference at the University of Michigan. 

Read more ›

August 28, 2006 2 comments News

30 Days of DRM – Day 09: Reverse Engineering (Circumvention Rights)

The inclusion of a reverse engineering circumvention right is another obvious necessary provision.  Reverse engineering is described by the Chilling Effects site as follows:

Reverse engineering is the scientific method of taking something apart in order to figure out how it works. Reverse engineering has been used by innovators to determine a product's structure in order to develop competing or interoperable products. Reverse engineering is also an invaluable teaching tool used by researchers, academics and students in many disciplines, who reverse engineer technology to discover, and learn from, its structure and design.

The need for a reverse engineering provision therefore follows from some of the discussion last week – it is pro-competitive as it facilitates the creation of compatible devices as well as greater competition in the marketplace. 
While there may be general agreement on the need for a reverse engineering provision, it is essential that Canada avoid the U.S. DMCA approach which has been widely criticized for being too limited in scope and thus woefully ineffective.

Read more ›

August 27, 2006 6 comments News

30 Days of DRM – Day 08: Privacy (Circumvention Rights)

Today's post kicks off the heart of the 30 Days of DRM series – circumvention rights.  Circumvention rights are necessary since everyone agrees that an absolute anti-circumvention provision (ie. circumvention prohibited in all circumstances) is unworkable.  There are instances where such a prohibition would result in significant costs by precluding beneficial activities, creating "unintended consequences", and lead to significant harm to the public.  Indeed, the DMCA itself includes several narrow exceptions to the general anti-circumvention rule.

The approach in Bill C-60 was to limit (the government believed eliminate) the need for circumvention rights by creating a direct link between circumvention and copyright.  Bill C-60 only made it an offence to circumvent a technological measure for the purposes of copyright infringement.  In other words, if you had another purpose – for example, protecting your personal privacy – the anti-circumvention provision would not be triggered. 

If the new copyright bill adopts a U.S. style approach, then a crucial part of the discussion will be whether the government has identified all the necessary rights to limit the harms associated with anti-circumvention legislation.  While these rights might be characterized by some as exceptions, I think they are more appropriately viewed as circumvention rights, analogous to the Supreme Court of Canada's emphasis on user rights.

Privacy protection is an obvious example of a circumvention right.

Read more ›

August 26, 2006 1 comment News